logo
Language
deutschenglishfrançaisnederlandsitalianodansksvensk
  • Home
  • General safety instructions
    • Product-specific safety instructions
      • Meaning of the text formatting
        • Intended use
          • General
            • Information on data protection
              • IT basic protection
                • What protection requirements do the data processed in the system have?
                  • What IT infrastructure requirements are recommended?
                  • Encryption
                    • Is the data in System 3060 encrypted?
                      • What data is encrypted?
                        • Are the transmission paths via radio, for example, also encrypted?
                        • Working in compliance with data protection regulations (GDPR)
                          • What personal data is stored in the software?
                            • For what purpose is personal data stored in the software?
                              • How long is personal data stored in the software?
                                • Can the right to read access lists be additionally secured?
                                  • Is personal data in the software protected against access by third parties?
                                    • Can the stored data be made available as a copy?
                                      • Can personal data be deleted from the software?
                                    • Range of functions for AXM Classic
                                      • System requirements
                                        • Release notes
                                          • Version 1.0.2305.3101
                                            • Version 1.0.2402.2703
                                            • Installation
                                              • Run AXM as the administrator (recommended)
                                                • Updating AXM
                                                • First steps after a new installation
                                                  • Best practice: setting up the locking system
                                                    • Best practice: Database protection
                                                    • Registration
                                                      • The AXM’s structure
                                                        • Sorting and filtering
                                                          • Installation wizards
                                                            • Multiple options, same result
                                                              • Global search
                                                                • Working with AXM more effectively
                                                                  • Tab operation
                                                                    • Hotkeys
                                                                      • Creating additional objects
                                                                    • Organisational structure
                                                                      • Creating access levels
                                                                        • Creating a person group
                                                                          • Creating a schedule
                                                                            • Create time group
                                                                              • Deleting a time group
                                                                                • Deleting schedules
                                                                                  • Creating a time switchover
                                                                                    • Creating and editing public holidays
                                                                                      • Creating and editing public holiday lists
                                                                                        • Creating a location
                                                                                          • Creating a building and assigning it to a location
                                                                                            • Creating an area
                                                                                              • Creating a hashtag
                                                                                              • Persons and identification media
                                                                                                • Creating an identification medium
                                                                                                  • Creating transponders and cards
                                                                                                    • Creating PIN code keypads
                                                                                                      • Creating special identification media
                                                                                                      • Duplicating an identification medium (including authorisations and settings)
                                                                                                        • Deleting an identification medium
                                                                                                          • Deleting a card/transponder
                                                                                                            • Deleting individual identification media in the matrix
                                                                                                              • Deleting multiple identification media using the tab
                                                                                                              • Deleting a PIN (PIN code keypad AX)
                                                                                                              • Allowing an identification medium to open twice as long
                                                                                                                • Muting all locking devices for an identification medium
                                                                                                                  • Muting all locking devices for a transponder or a card
                                                                                                                  • Allow accesses to be recorded by identification media (physical access list)
                                                                                                                    • Restricting identification medium authorisations to specific times (time group)
                                                                                                                      • Activating or deactivating identification medium once at specific times (activation and expiry date)
                                                                                                                        • Handling defective identification media
                                                                                                                          • Repairing/resynchronising
                                                                                                                            • Repairing a card/transponder (resynchronising)
                                                                                                                              • Repairing a PIN code keypad (resynchronising)
                                                                                                                              • Resetting and replacing
                                                                                                                                • Resetting and replacing a card/transponder
                                                                                                                                  • Resetting and replacing a PIN code keypad
                                                                                                                                  • Delete and replace
                                                                                                                                    • Deleting and replacing a card/transponder
                                                                                                                                      • Deleting and replacing a PIN code keypad
                                                                                                                                      • Take out of use and leave in project
                                                                                                                                        • Take card/transponder out of use and leave in project
                                                                                                                                          • Taking a PIN code keypad out of use and leaving it in project
                                                                                                                                          • Taking out of use and deleting from the project
                                                                                                                                            • Taking a card/transponder out of use and deleting it from project
                                                                                                                                              • Taking a PIN code keypad out of use and deleting it from project
                                                                                                                                            • Duplicating forgotten identification medium temporarily
                                                                                                                                              • Duplicating a forgotten transponder or card temporarily
                                                                                                                                              • Blocking lost/stolen identification media permanently
                                                                                                                                                • Blocking and replacing lost/stolen card/transponder permanently
                                                                                                                                                  • Blocking a lost/stolen PIN code keypad permanently
                                                                                                                                                  • Flag and reset returned identification medium (back to inventory)
                                                                                                                                                    • Flagging and resetting returned card/transponder (back to inventory)
                                                                                                                                                    • Planning and tracking identification medium management tasks
                                                                                                                                                      • Noting the issue date
                                                                                                                                                        • Note card/transponder issue date
                                                                                                                                                        • Planning and logging battery replacement
                                                                                                                                                          • Planning and logging card/transponder battery changes
                                                                                                                                                            • Planning and logging PIN code keypad battery replacement
                                                                                                                                                            • Planning and logging return
                                                                                                                                                              • Planning and logging card/transponder return
                                                                                                                                                            • Finding the identification medium or locking device again in the matrix
                                                                                                                                                              • Exporting identification media as a list
                                                                                                                                                                • Export cards/transponders as a list
                                                                                                                                                                  • Exporting PINs and PIN code keypads as a list
                                                                                                                                                                  • Viewing an identification medium’s serial number and/or TID
                                                                                                                                                                    • Viewing a card’s/transponder’s serial number and TID
                                                                                                                                                                      • Viewing a PIN code keypad’s serial number
                                                                                                                                                                      • Assigning persons to person groups
                                                                                                                                                                        • Assigning individual persons/identification media to a person group (in transponder window)
                                                                                                                                                                          • Assign a number of persons/identification media to person group (in the person group window)
                                                                                                                                                                          • Use identification media in multiple locking systems
                                                                                                                                                                            • Reuse identification medium in the same project
                                                                                                                                                                              • Reusing identification medium in other projects/databases
                                                                                                                                                                              • Setting the PIN length (PinCode AX)
                                                                                                                                                                                • Changing a PIN (PinCode AX)
                                                                                                                                                                                • Doors and locking devices
                                                                                                                                                                                  • Creating a locking device
                                                                                                                                                                                    • Duplicating the locking device (including authorisations and settings)
                                                                                                                                                                                      • Delete locking device
                                                                                                                                                                                        • Deleting an individual locking device using the matrix
                                                                                                                                                                                          • Deleting several locking devices using the tab
                                                                                                                                                                                          • Changing locking device type at later stage
                                                                                                                                                                                            • Handling defective locking devices
                                                                                                                                                                                              • Re-synchronise (repair)
                                                                                                                                                                                                • Resetting and replacing
                                                                                                                                                                                                  • Delete and replace
                                                                                                                                                                                                    • Reset
                                                                                                                                                                                                      • Purge (only reset in database/software reset)
                                                                                                                                                                                                      • Assigning locking devices to buildings/locations
                                                                                                                                                                                                        • Moving locking devices to areas
                                                                                                                                                                                                          • Assigning individual locking devices to a different area (in the locking device window)
                                                                                                                                                                                                            • Assign multiple locking devices to another area (in the area window)
                                                                                                                                                                                                            • Limiting authorisations for locking devices to specific times (schedule)
                                                                                                                                                                                                              • Engaging and disengaging locking devices automatically with time switchover
                                                                                                                                                                                                                • Have accesses logged by locking device (access list)
                                                                                                                                                                                                                  • Leaving the locking device open for longer, less time or permanently
                                                                                                                                                                                                                    • Limit locking device read range (close range mode)
                                                                                                                                                                                                                      • Muting a locking device (for battery warnings and programming)
                                                                                                                                                                                                                        • Activating and deactivating card readers
                                                                                                                                                                                                                          • Ignoring activation and expiry date of identification media
                                                                                                                                                                                                                            • Setting up door monitoring (DoorMonitoring)
                                                                                                                                                                                                                              • Setting up DoorMonitoring for locking cylinders
                                                                                                                                                                                                                              • Changing the SmartRelay settings
                                                                                                                                                                                                                                • Using internal and external antenna simultaneously
                                                                                                                                                                                                                                  • Invert outputs
                                                                                                                                                                                                                                    • Using the serial interface
                                                                                                                                                                                                                                      • Changing the signalling
                                                                                                                                                                                                                                      • Planning and tracking locking device management tasks
                                                                                                                                                                                                                                        • Note installation, replacement or removal date
                                                                                                                                                                                                                                          • Planning and logging battery replacement
                                                                                                                                                                                                                                          • Displaying all locking devices in a project
                                                                                                                                                                                                                                            • Exporting locking devices as a list
                                                                                                                                                                                                                                            • Permissions
                                                                                                                                                                                                                                              • Changing individual authorisations (cross)
                                                                                                                                                                                                                                                • Changing many authorisations (on identification media and/or locking devices)
                                                                                                                                                                                                                                                  • Allowing all or blocking all
                                                                                                                                                                                                                                                    • Access levels
                                                                                                                                                                                                                                                      • Adding locking devices and identification media to access levels
                                                                                                                                                                                                                                                        • Adding areas and person groups to access levels
                                                                                                                                                                                                                                                          • Show all access levels in a project
                                                                                                                                                                                                                                                            • Exporting access levels as a list
                                                                                                                                                                                                                                                            • Controlling authorisations in terms of time (schedules)
                                                                                                                                                                                                                                                              • Adding locking devices to the schedule
                                                                                                                                                                                                                                                                • Adding identification medium to time group
                                                                                                                                                                                                                                                                  • Add card/transponder to time group
                                                                                                                                                                                                                                                                    • Adding PINs from a PIN code keypad to the time group
                                                                                                                                                                                                                                                                    • Add area, including locking devices, to a schedule
                                                                                                                                                                                                                                                                  • Meaning of the authorisation crosses in the matrix
                                                                                                                                                                                                                                                                  • Locking systems
                                                                                                                                                                                                                                                                    • Create locking system
                                                                                                                                                                                                                                                                      • Adding a card configuration
                                                                                                                                                                                                                                                                        • MIFARE Classic (new/empty card)
                                                                                                                                                                                                                                                                          • MIFARE Classic (card already used)
                                                                                                                                                                                                                                                                            • MIFARE DESFire (new/empty card)
                                                                                                                                                                                                                                                                              • MIFARE DESFire (card already in use)
                                                                                                                                                                                                                                                                            • Changing locking system password
                                                                                                                                                                                                                                                                              • Replacing the locking system
                                                                                                                                                                                                                                                                                • Enable cards or transponders
                                                                                                                                                                                                                                                                                  • Using a common locking level
                                                                                                                                                                                                                                                                                    • Creating a common locking level
                                                                                                                                                                                                                                                                                      • Creating transponders for common locking level
                                                                                                                                                                                                                                                                                        • Authorising a transponder with common locking level
                                                                                                                                                                                                                                                                                      • Synchronisation: Comparison between locking plan and reality
                                                                                                                                                                                                                                                                                        • Synchronising the locking device (including reading access list)
                                                                                                                                                                                                                                                                                          • Display locking device equipment and status
                                                                                                                                                                                                                                                                                            • Displaying and exporting a locking device’s access list
                                                                                                                                                                                                                                                                                            • Identifying an unknown locking device
                                                                                                                                                                                                                                                                                              • Re-setting the locking device
                                                                                                                                                                                                                                                                                                • Synchronising an identification medium
                                                                                                                                                                                                                                                                                                  • Synchronise a card/transponder (including importing physical access list)
                                                                                                                                                                                                                                                                                                    • Displaying the identification medium battery status
                                                                                                                                                                                                                                                                                                      • Displaying and exporting physical access lists for cards/transponders
                                                                                                                                                                                                                                                                                                      • Synchronising a PIN code keypad
                                                                                                                                                                                                                                                                                                      • Identifying an unknown ID medium
                                                                                                                                                                                                                                                                                                        • Recognise unknown cards/transponders
                                                                                                                                                                                                                                                                                                          • Identifying unknown PIN code keypad
                                                                                                                                                                                                                                                                                                          • Resetting identification media
                                                                                                                                                                                                                                                                                                            • Resetting cards/transponders
                                                                                                                                                                                                                                                                                                              • Resetting the PIN code keypad
                                                                                                                                                                                                                                                                                                              • Viewing connected/supported programming devices
                                                                                                                                                                                                                                                                                                              • Your personalised AXM interface
                                                                                                                                                                                                                                                                                                                • Interchanging (transposing) doors and persons in the matrix
                                                                                                                                                                                                                                                                                                                  • Select columns and rows in the matrix (enable/disable crosshairs)
                                                                                                                                                                                                                                                                                                                    • Click to change authorisations
                                                                                                                                                                                                                                                                                                                      • Hiding deactivated and defective identification media
                                                                                                                                                                                                                                                                                                                        • Showing or hiding rows/columns in the matrix
                                                                                                                                                                                                                                                                                                                          • Reading access list/physical access list during synchronisation
                                                                                                                                                                                                                                                                                                                            • Limiting the number of access list entries in the database
                                                                                                                                                                                                                                                                                                                              • Pinning tabs
                                                                                                                                                                                                                                                                                                                                • Changing automatic numbering
                                                                                                                                                                                                                                                                                                                                  • Changing the language
                                                                                                                                                                                                                                                                                                                                    • Personalising reports and exports
                                                                                                                                                                                                                                                                                                                                      • Preventing generated reports from opening automatically
                                                                                                                                                                                                                                                                                                                                        • Personalising properties for person details
                                                                                                                                                                                                                                                                                                                                          • Hide and show existing fields
                                                                                                                                                                                                                                                                                                                                            • Creating your own fields
                                                                                                                                                                                                                                                                                                                                              • Subsequently modified user-defined fields
                                                                                                                                                                                                                                                                                                                                          • Administrative tasks
                                                                                                                                                                                                                                                                                                                                            • Creating a backup
                                                                                                                                                                                                                                                                                                                                              • Restoring the backup
                                                                                                                                                                                                                                                                                                                                                • Exporting error logs
                                                                                                                                                                                                                                                                                                                                                  • Displaying version number and licence key for the AXM installed
                                                                                                                                                                                                                                                                                                                                                    • User management
                                                                                                                                                                                                                                                                                                                                                      • Changing the user password
                                                                                                                                                                                                                                                                                                                                                        • Increase password security
                                                                                                                                                                                                                                                                                                                                                          • Name person as an AXM user
                                                                                                                                                                                                                                                                                                                                                            • Assign tasks/user roles to AXM users
                                                                                                                                                                                                                                                                                                                                                          • Statistics and logs
                                                                                                                                                                                                                                                                                                                                                            • Displaying and exporting a locking device’s access list
                                                                                                                                                                                                                                                                                                                                                              • Displaying and exporting physical access lists for cards/transponders
                                                                                                                                                                                                                                                                                                                                                                • Display doors for which a specific identification medium is authorised
                                                                                                                                                                                                                                                                                                                                                                  • Displaying identification media which are authorised for a specific door
                                                                                                                                                                                                                                                                                                                                                                    • Displaying a locking device’s equipment features
                                                                                                                                                                                                                                                                                                                                                                      • View statistics and warnings (dashboard)
                                                                                                                                                                                                                                                                                                                                                                        • Tracking activities in the database (log)
                                                                                                                                                                                                                                                                                                                                                                          • Setting the log archiving period
                                                                                                                                                                                                                                                                                                                                                                          • Reports
                                                                                                                                                                                                                                                                                                                                                                            • Displaying the report for identification media issue
                                                                                                                                                                                                                                                                                                                                                                              • Exporting the data protection report (GDPR)
                                                                                                                                                                                                                                                                                                                                                                            • Background knowledge and explanations
                                                                                                                                                                                                                                                                                                                                                                              • Identification media, locking devices and the locking plan
                                                                                                                                                                                                                                                                                                                                                                                • PIN Code G1 vs. PIN Code AX
                                                                                                                                                                                                                                                                                                                                                                                • Locking systems
                                                                                                                                                                                                                                                                                                                                                                                  • “Engaging”, “opening”, “locking”, etc.
                                                                                                                                                                                                                                                                                                                                                                                    • Synchronisation of database and actual state
                                                                                                                                                                                                                                                                                                                                                                                      • Access and physical access lists
                                                                                                                                                                                                                                                                                                                                                                                        • Event management
                                                                                                                                                                                                                                                                                                                                                                                          • Time groups and schedules
                                                                                                                                                                                                                                                                                                                                                                                            • Time switchovers
                                                                                                                                                                                                                                                                                                                                                                                              • Examples
                                                                                                                                                                                                                                                                                                                                                                                            • Access levels
                                                                                                                                                                                                                                                                                                                                                                                              • Person groups
                                                                                                                                                                                                                                                                                                                                                                                                • Passwords used
                                                                                                                                                                                                                                                                                                                                                                                                  • Buildings and locations
                                                                                                                                                                                                                                                                                                                                                                                                    • Areas
                                                                                                                                                                                                                                                                                                                                                                                                      • Hashtags
                                                                                                                                                                                                                                                                                                                                                                                                        • DoorMonitoring
                                                                                                                                                                                                                                                                                                                                                                                                          • Possible DoorMonitoring states of locking cylinders
                                                                                                                                                                                                                                                                                                                                                                                                            • Possible DoorMonitoring states of SmartHandles
                                                                                                                                                                                                                                                                                                                                                                                                              • Possible DoorMonitoring states of SmartRelais 3
                                                                                                                                                                                                                                                                                                                                                                                                              • Reports
                                                                                                                                                                                                                                                                                                                                                                                                                • Scaling image files
                                                                                                                                                                                                                                                                                                                                                                                                                • Cards and locking device IDs
                                                                                                                                                                                                                                                                                                                                                                                                                  • Card templates
                                                                                                                                                                                                                                                                                                                                                                                                                • Help and other information
                                                                                                                                                                                                                                                                                                                                                                                                                  1. Home
                                                                                                                                                                                                                                                                                                                                                                                                                  2. Background knowledge and explanations

                                                                                                                                                                                                                                                                                                                                                                                                                  Background knowledge and explanations - AXM Classic

                                                                                                                                                                                                                                                                                                                                                                                                                  Further information

                                                                                                                                                                                                                                                                                                                                                                                                                  • Identification media, locking devices and the locking plan
                                                                                                                                                                                                                                                                                                                                                                                                                  • Locking systems
                                                                                                                                                                                                                                                                                                                                                                                                                  • “Engaging”, “opening”, “locking”, etc.
                                                                                                                                                                                                                                                                                                                                                                                                                  • Synchronisation of database and actual state
                                                                                                                                                                                                                                                                                                                                                                                                                  • Access and physical access lists
                                                                                                                                                                                                                                                                                                                                                                                                                  • Event management
                                                                                                                                                                                                                                                                                                                                                                                                                  • Access levels
                                                                                                                                                                                                                                                                                                                                                                                                                  • Person groups
                                                                                                                                                                                                                                                                                                                                                                                                                  • Passwords used
                                                                                                                                                                                                                                                                                                                                                                                                                  • Buildings and locations
                                                                                                                                                                                                                                                                                                                                                                                                                  • Areas
                                                                                                                                                                                                                                                                                                                                                                                                                  • Hashtags
                                                                                                                                                                                                                                                                                                                                                                                                                  • DoorMonitoring
                                                                                                                                                                                                                                                                                                                                                                                                                  • Reports
                                                                                                                                                                                                                                                                                                                                                                                                                  • Cards and locking device IDs

                                                                                                                                                                                                                                                                                                                                                                                                                  © 2025 SimonsVoss Technologies GmbH - Classification: Public

                                                                                                                                                                                                                                                                                                                                                                                                                  Download document (Manual: AXM Classic) as PDF