U-PROX IP401
Cloud-based access control panel

identifiers
for configuration

Сontrol panel for one door
touch button
network (2.4 GHz)



Cloud-based access control panel
Access control panel for one door with Wi-Fi
Powerful control panel with Wi-Fi
- Controller in a small case
- Wi-Fi IEEE802.11 b/g/n, 2.4 GHz
- Supports DHCP, DNS, works through NAT
- 10,000 cards and 47,000 events
- Designed for maximum autonomy


Single-sided door control panel
- One single-sided door
- Built-in RTE (REX) touch button
- DC, RTE (REX) inputs
- Solid state relay for the lock control
- Alarm output
Works in the cloud ACS
- Working with U-PROX ACS Cloud
- Firmware update from the cloud
- Configuration via smartphone (Wi-Fi, IP addresses, etc.)
- Supports U-PROX IP/WEB

Gallery
Photos and videos
NEW PRODUCTS
Want to buy?
Contact partner companies to purchase or install security and automation devices.
Want to sell?
Become an official distributor, reseller or installer of U-PROX security and safety systems.
TECHNICAL SPECIFICATIONS
Inputs |
DC - Door Contact RTE - Request to Exit button Built-in RTE touch button |
---|---|
Outputs (Relays) |
NO, COM - solid state relay, 1 A @ 30 V (inversion relay mode) OUT - alarm output, OC 0.16 A @ 12 V |
Reader |
OSDP: one reader , up to 1200 m RS232: one reader U-PROX SE/SL, up to 10 m |
Connection | 2.4 GHz, 802.11b/g/n, Open/WPA/WPA2/WEP |
Memory |
Ідентифікаторів - 10 000 Подій - 47 000 Тижневих розкладів - 250 Тайм-зон - 250 Свята - 250 |
Power | +10,8...+15 V, consommation < 100 mA @12V |
Dimensions | 84.3 х 84.3 х 14.5 mm |
Weight | 0.15 kg |
Case colour | black |
Case material | ABS+PC plastic, Gorilla Glass |
Operating temperature range | from -10°C to +55°C |
Configuration | With the U-PROX Config mobile app via Bluetooth |
Complete set |
1. U-PROX IP401; 2. Mounting kit; 3. Quick start guide |










U-PROX IP401 User manual
Cloud Access Control Controller
U‑PROX IP401
Installation and Operation Manual
Rights and Their Protection
All rights to this document are held by Limited Liability Company Integrated Technical Vision.
Trademarks
ITV® and U‑PROX® are registered trademarks of Limited Liability Company Integrated Technical Vision.
About This Document
This manual describes the procedure for installing, connecting, and operating the access control system controller U‑PROX IP401 (hereinafter “the controller”). Please study these instructions carefully before installing the controller.
The characteristics and parameters of the controller are described in the Characteristics section. The Terminology section explains the terms used in this document.
The external appearance of the controller, along with the description of its contacts and operating modes, is presented in the Description and Operation section. The installation, connection of external devices, and configuration of the controller are described in the Controller Operation section.
Attention!
Before installing and connecting the controller, you must carefully study this manual. Installation and connection are permitted only by persons or organizations authorized by the manufacturer.
Training and Technical Support
Training courses covering the installation and use of the U‑PROX IP401 controller are conducted by Limited Liability Company Integrated Technical Vision. For additional information, please contact the personnel of Limited Liability Company Integrated Technical Vision at the phone numbers provided below.
Technical Support:
+38 (091) 481 01 69
support@u-prox.systems
https://t.me/u_prox_support_bot
This support is intended for trained specialists. End users should contact their dealers or installers before reaching out to Limited Liability Company Integrated Technical Vision.
Technical information is available on the website: www.u-prox.systems
Certification
Limited Liability Company Integrated Technical Vision certifies that U‑PROX IP401 complies with the Electromagnetic Compatibility Directive 2014/30/EU and the Directive 2011/65/EU (RoHS). The original Declaration of Conformity is available on the website www.u-prox.systems under the “Certificates” section.
Contents
- Controller Description …………………………………. 4
- Purpose of the Device ……………………………………. 4
- Characteristics …………………………………………… 5
- Terminology ………………………………………………… 6
- Description and Operation ……………………………….. 9
- Controller Construction …………………………. 9
- Audio-Visual Indication of the Controller ………. 10
- Controller Operation ……………………………………. 11
- “Standby” Mode …………………………………………. 11
- “Alarm” Mode ……………………………………………… 12
- “Free Passage” Mode …………………………………. 12
- “Lockout” Mode …………………………………………….. 13
- Properties of Identifiers (Cards) ……………………… 13
- Usage Options and Output Operating Modes ……………. 14
- Communicator Operation …………………………………. 15
- Device Operation Procedure …………………………….. 16
- Connection Procedure …………………………………. 16
- Installation Recommendations ………………………… 18
- Reader Connection ………………………………………. 18
- Door Sensor ……………………………………………….. 19
- Exit Request Button ……………………………………… 19
- Output Devices (Relays) ………………………………… 20
- Controller Programming ………………………………….. 22
- Connection to the Controller ……………………….. 22
- Controller Configuration ……………………………….. 24
- Firmware Update ……………………………………………. 26
- Controller Programming Procedure …………………… 27
- Maintenance …………………………………………………. 28
- Factory Reset ……………………………………………….. 28
- Factory Settings ………………………………………………. 28
- Maintenance and Repair …………………………………… 29
- Warranty …………………………………………………….. 29
Controller Description
The U‑PROX IP401 controller is a device designed for controlling access to residential and industrial premises, as well as for recording passage times and events.
The controller is supplied in a case with a built-in touch button for exit requests and without a power module.
The controller works with readers that connect via the RS232 interface (only U‑PROX readers) or via the RS485 interface using the OSDP protocol (U‑PROX SE series or other OSDP2.2-compatible readers).
U‑PROX IP401 processes the information received from the reader and, using two outputs, switches output devices (e.g., locks, sirens, etc.).
The controller has two fixed-function inputs – a door sensor and an exit request button.
The controller can operate autonomously or as part of a network. To integrate controllers in an access control system, the Wi‑Fi interface (a wireless computer network) is used.
The controller supports network configuration via Bluetooth Low Energy (BLE) using the U‑PROX Config mobile app.
Firmware updates are performed from a central server via Wi‑Fi.
The controller is powered by a 12V source.
U‑PROX IP401 controls doors with one reader and an exit request button. Its large non-volatile memory allows the system to manage up to 10,000 identifiers.
Carefully engineered technical and design solutions, communication via Wi‑Fi, non-volatile memory and a real-time clock, and protection of reader ports from short circuits, overvoltage, and reverse polarity enable this controller to be used in various access control and management systems.
Purpose of the Device
The Cloud Controller U‑PROX IP401 is intended for use as part of access control and management systems of various scales – from small office systems to large enterprises. Controllers are interconnected via a computer network.
Characteristics
Power Supply: External 12V source; current consumption (with loads disconnected) not more than 100 mA; ripple voltage not more than 500 mV.
Reader Connection:
- RS232 – up to 10 m (for U‑PROX contactless identifiers)
- RS485 (OSDP2.2) – up to 1000 m
Inputs: 8 inputs for connecting loops with current monitoring (end resistor – 2.2 kΩ).
Built-in Touch Button: for exit requests.
External Signal Inputs: door sensor (DC) and input for the exit request button (RTE).
Tamper Contact: for detecting case opening.
Outputs: one relay (NO/NC, COM) rated at 3 A @ 12V; a transistor open-collector alarm output – 12V, 160 mA.
Wireless Interface: Wi‑Fi 2.4 GHz, 802.11b/g/n, supports Open/WPA/WPA2/WEP.
Cloud AC System: U‑PROX ACS Cloud.
Local AC System: U‑PROX WEB.
Configuration: Full configuration is performed via the access control system using a computer network.
Real-Time Clock.
Non-Volatile Memory:
- Identifiers – 10,000
- Events – 47,000
- Time zones – 250
- Weekly schedules – 250
- Holidays – 250
- Temporary identifiers – 1000
Terminology
Identifiers: In access control systems, each user has a unique code. Identifiers may be in the form of a plastic card, key fob, etc.
Reader: Devices that read identifier codes and connect to the access controller. The Wiegand interface is used.
PIN Code: A code entered via the reader’s keypad; it can be a standalone identifier or supplement a card or key fob.
Doors: The access control point (e.g., doors, turnstiles). The access point is the logical unit of the system.
Access Point: See “Doors”.
Passage Point: A logical unit in an access control system that manages passage through a door in one direction, including the reader, controller (or part of it), and the output mechanism. Doors with a single passage point are one-sided; with two, they are two-sided.
Exit Request Button: Used for exiting the premises; alternative methods (e.g., an electric lock button or key) trigger a “DOOR BREACH” event.
Door Sensor: An input for connecting sensors (magnetic, rotor, etc.) to monitor door status.
“Door Open Time” Interval: The period during which, after a user passes, the door is not monitored even if the sensor signal is disrupted.
Identifier Pickup Attempt: If an unregistered identifier is presented several times consecutively, the controller enters lockout mode.
Schedules: Time intervals and schedules that define access rights. The controller can store up to 250 time intervals, 250 weekly schedules, and 250 holidays.
Time Zones: Time intervals used for organizing access schedules.
Loading: The transfer of settings from a computer to the controller after programming.
Description and Operation
Controller Construction
The external appearance of the device is shown in Figure 1.
The controller consists of the following components:
- The top part of the device casing
- The touch exit request button
- The bottom part of the device casing
- A mounting screw
- The circuit board with terminal blocks
Figure 1. External appearance of U‑PROX IP401
Terminal Block Layout
The layout of the connectors on the bottom board is shown in Figure 2.
Purpose of Controller Contacts
Contact | Name | Purpose |
---|---|---|
GND | – | Connection of the external power source |
+12V | – | – |
NO/NC | Relay Contact | Relay contacts |
COM | Common | – |
RED | +12V, Power | Reader connection |
BLK | GND | – |
GRN | Data 0 | – |
WHT | Data 1 | – |
GND | – | Loop connection |
DC | Door Contact | – |
RTE | Exit Request Button | – |
OUT | Alarm Output | – |
Audio-Visual Indication
The access modes are indicated via the reader connected to the controller. The default indications are as follows:
- Standby Mode: no sound, red blinking once per second
- Night Mode or Lockout: no sound, red-yellow blinking once per second
- Alarm: no sound, continuous red
- Card Registration: no sound, green blinking once per second
- Initialization: no sound, no light indication
- Data Reading/Loading, Firmware Update: no sound, continuous red
- Access Granted: a short beep, continuously green; 5 seconds before door time expires – a short beep once per second
- Access Denied: continuous beep, continuously red
The LED on the touch button indicates only its press.
Controller Operation
Controllers are shipped in the factory default state, in which the red LED blinks once per second.
To operate the controller, it must be configured using the configuration software on a mobile device. Once the settings are loaded, and if the inputs are intact, the controller enters “Standby” mode.
The controller manages a single passage point that can operate in four modes: “Standby”, “Alarm”, “Lockout”, and “Free Passage”. The “Free Passage” mode has the highest priority (for example, during a fire), followed by “Lockout”, “Alarm”, and “Standby”.
Standby Mode
The standby mode is the default operating mode of the controller. In this mode, the controller grants or denies access to registered identifiers.
Passage with Identifier Presentation
To pass through a door, the user presents a contactless identifier to the reader. If the identifier is registered and access is currently allowed, the door is opened (the controller activates the output mechanism).
Passage with Identifier and PIN Code
After presenting a registered identifier, the controller checks if a PIN code is required. If needed, it waits for PIN code entry. Once the correct PIN code is entered, the passage point opens (the output mechanism is activated).
Passage via Exit Request Button (Remote Door Opening)
Exiting through a door with a single-sided passage point or allowing visitor passage is achieved using the exit request button. Pressing and releasing the button opens the passage point (activating the output mechanism).
Access Denied upon Identifier Presentation
Access may be denied for the following reasons:
- The controller is in its factory default (unloaded) state
- The card is not registered in the controller
- The card’s validity period has expired
- Access is currently prohibited due to time and/or day of the week
- An identifier registered as lost or blocked is presented
- The controller is in “Alarm” mode
- The controller is in “Lockout” mode
- The temporary card’s validity period has not yet begun
- The passage counter for a temporary card (visitor card) has been exhausted
Alarm Mode
The passage point enters “Alarm” mode when unauthorized access occurs (e.g., door breach), when the controller case is opened, when an identifier registered as lost is presented, or when the door remains open too long (exceeding the door open time) and if the identifier pickup function is enabled.
In “Alarm” mode, the controller activates outputs designated for ALARM or SIREN. The alarm output remains active until the alarm is cleared, and the siren output is timed.
If the passage point is in “Alarm” mode, passage is blocked. Doors can be opened by pressing the exit request button.
The “Alarm” mode can be disabled by presenting an identifier with the “Alarm Clear” attribute or by issuing a command from a computer.
Free Passage Mode
In some situations, such as during a fire, earthquake, or other emergency, it may be necessary to open the door for free passage. In such cases, the controller supports “Free Passage” mode.
The passage point enters “Free Passage” mode by a command from an operator on a computer.
While in “Free Passage” mode, the lock remains open, and the controller logs all presented identifiers and code entries as “Access Granted” regardless of the schedule. This mode is used to monitor the presence of personnel during emergencies.
To ensure proper operation in “Free Passage” mode when using mechanically actuated locking devices, it is essential to monitor the door sensor. Mechanical locks are released with a current pulse and remain open until the door is closed. When the door is closed, the lock re-engages. The controller in “Free Passage” mode checks the door contact and sends an unlock pulse after each door closure.
If the controller is used without a door contact (e.g., a microswitch), using an “impulse” output type for unlocking is not recommended. In such cases, “Free Passage” mode will not function correctly – the door cannot be opened without presenting an identifier.
Lockout Mode
The controller enters “Lockout” mode when a situation arises that requires all users to be denied access. In this mode, passage is allowed only for identifiers with the “Security Service” attribute. Doors cannot be opened by pressing the exit request button.
The passage point enters “Lockout” mode by a command from a computer operator.
Properties of Identifiers (Cards)
Code (Electronic Card Code)
Each card has its unique code assigned during manufacturing.
PIN Code
A supplementary code for the card. It must consist solely of six decimal digits. It may be used with readers that have an integrated keypad.
After the card is presented to the reader, the integrated keypad is used to enter the PIN code by pressing the “#” button. If the correct PIN code is entered, the controller unlocks the door and grants access. Otherwise, a warning signal is issued, an “Incorrect PIN Code” event is logged, and the door remains locked.
Validity
The expiration date of the card’s validity.
Alarm Clear
When a card with the alarm clear attribute is presented to the reader of a door in alarm state, the controller logs an event “Alarm Cleared” and resets the door to standby mode. If a card without the right to clear the alarm is presented, the door remains in its current state and an event “Access Denied. Alarm State” is logged.
Security Service
This attribute grants the right to pass through locked doors. If a door is in “Lockout” mode, presenting a regular card will result in an “Access Denied. Lockout State” event. However, when a card with the “Security Service” attribute is presented, the controller grants access and logs an “Access Granted. Lockout State” event.
VIP
This attribute allows unconditional access (except when the door is in lockout mode). A VIP card may have any schedule assigned; anti-duplication and validity limitations do not apply. It may also have a PIN code.
If a door is in “Lockout” mode, an identifier with the VIP attribute will not be granted access.
Anti-Duplication Disabled
This means that access is granted regardless of previous passage direction, but still subject to the assigned schedule and other card attributes.
Usage Options and Operating Modes of Outputs
The relay output of the controller can be programmed as a lock (with an optional inversion setting). The OUT output can be programmed as a siren or alarm. In addition, each output is assigned an operating mode: start-stop (the output remains active while the condition persists, e.g., while in “Alarm” mode), impulse (the output is active for a set duration), trigger (the output toggles on the first event and off on the next, etc.), or continuous (the output is activated or deactivated by individual commands).
Communicator Operation
The U‑PROX IP401 controller operates automatically. Once data is loaded from the server, the controller processes the access rules for presented cards and sends event notifications to the access control system server.
The controller’s communicator operates in notification mode, meaning that when an event (e.g., passage, zone breach) occurs, data is transmitted to the AC server.
When connected to a computer network, the controller ensures protection against unauthorized access by encrypting data packets with a 256-bit key and verifying the device’s unique serial number, as well as monitoring the communication channel through periodic test signals.
The U‑PROX IP401 can be connected to a computer network via a wireless connection (Wi‑Fi). It supports operation within a local network (see Figure 3) as well as over the Internet (see Figure 4), allowing for the construction of distributed access control systems of any scale.
Local Network Operation Algorithm
- After the controller is powered on, it connects to the pre-configured Wi‑Fi and obtains an IP address dynamically;
- It periodically updates the IP address status (maintaining the reserved IP address);
- It checks the availability of the AC server (by IP or DNS name);
- It sends periodic test signals;
- It transmits event notifications;
- It waits for commands.
Internet (Wired Local Network) Operation Algorithm
- After the controller is powered on, it connects to the pre-configured Wi‑Fi and obtains an IP address dynamically;
- It periodically updates the IP address status (maintaining the reserved IP address);
- It checks for Internet connectivity (availability of the router’s IP address);
- It checks the availability of the AC server (by IP or DNS name);
- It sends periodic test signals;
- It transmits event notifications;
- It waits for commands.
Device Operation Procedure
The controller is housed in a small plastic case with a glass surface.
Connection Procedure
- At the installation site, mark and drill the necessary holes:
- Screw in the mounting screw on the bottom of the controller;
- Remove the top cover;
- Using the back plate of the controller as a template, mark and drill two holes with a 5 mm diameter and a depth of 30 mm.
- Run the cable from the power supply unit;
- Run the cable from the output device (e.g., lock);
- Install the reader and run its cable;
- Run the cables from the sensors/buttons;
- Connect the wires from the power supply, lock, reader, and controller inputs according to the sections below (using a junction box is recommended);
- Lay the installation cables in the wall;
- Install and secure the back plate of the controller, connect the communication cable connector, attach the top cover, and fasten with a screw;
- Using the mobile app, configure the network parameters of the controller;
- The device is ready for operation.
Installation Recommendations
It is recommended to mount the controller on the wall near the door so that all users can easily press the exit request button.
Power and other cables should not run closer than 0.1 m from the device’s casing.
Reader Connection
The controller works with a reader that connects via the RS232 interface (only U‑PROX readers) or via the RS485 interface using the OSDP protocol (U‑PROX SE series or other OSDP2.2-compatible readers).
The reader connection type is configured via the U‑PROX Config mobile app.
Figure 7. Connection of a U‑PROX SE series reader via OSDP
The current consumption of each external reader connected to the “+12V” terminals should not exceed 100 mA. For long-distance readers with consumption above 100 mA, the power should be supplied from a separate source.
Door Sensor
The controller uses a door contact to determine whether the door is open or closed. If the door contact is absent, the controller cannot detect unauthorized access or situations where the door remains open too long (e.g., when several people pass through the same entry point).
Doors in an access control system are recommended to be equipped with a door closer.
Exit Request Button
Doors are opened by pressing and releasing the exit request button.
Additionally, the exit request button can be used for remote door opening (e.g., by a receptionist or security guard).
Using the button on an electric lock for door opening will trigger a DOOR BREACH event.
Output Devices (Relays)
The controller features one solid-state relay to control output devices such as an electric lock or latch.
The relay has normally closed (NC) and normally open (NO) contacts and can handle devices consuming up to 1 A at 30 V.
Voltage drops or surges when all outputs are switched on or off simultaneously should not cause the controller to malfunction. Otherwise, a separate power source should be used for the outputs.
Electric Locks
The ability to program both standard and inverse operating modes, as well as to set the activation time for the lock over a wide range (from 1 to 255 seconds), allows the controller to operate nearly any type of electric lock or latch.
A special case is when the time is set to 0. In this case, a 200 ms pulse is sent to the relay.
Figure 10 shows an example of connecting output devices: the first is activated by applying voltage (NO), and the second by cutting the circuit (NC).
When using relay contacts to control an inductive load (for example, an electromagnetic lock), high-amplitude voltage pulses may occur. To prevent damage to the relay contacts, a flyback diode should be installed across the inductive load in reverse polarity.
Note that inexpensive electromagnetic locks do not tolerate prolonged voltage application. For these devices, the relay activation time should be programmed to prevent coil overheating.
Alarm Output
The controller’s alarm output is a transistor open-collector output. When activated, the OUT contact is connected to GND.
The alarm output can be used to connect to an external alarm system or output device with a current consumption not exceeding 60 mA.
If a door contact (normally closed) is connected, the alarm output will activate when the door contact is interrupted, except during the designated “door open” interval. The alarm output is activated for a programmed duration, from 0 to 254 seconds.
<p style=”font-weight:

Meet the new product that is already available for order - the U-PROX PIR Cam wireless motion detector.
If the detector is triggered, it will send one or a series of photos to assess the situation to the U-PROX Home mobile app and the central monitoring station of the security company. The photo will be sent only during an obvious alarm.
This detector also has the “pet immune” function, which means that it is not sensitive to the movement of animals weighing up to 20 kg and up to 1 m high.
Simple installation, easy addition to the new generation U-PROX MPX security system hub, and an unrivaled communication range with the hub allow you to find a good location in your space.
Clear photo verification of the alarm has the highest quality specifications:
- motion detection range up to 12 m
- photo resolution: 640×480, 320×240, 240×176 pixels
- infrared illumination up to 8 meters for shooting in the dark and low light
- photo transfer time up to 9 seconds.
It should also be noted that U-PROX PIR Cam uses intelligent algorithms to eliminate false alarms. This allows you to be sure that you receive notifications only in case of a real threat.
Choose the new U-PROX PIR Cam with photo verification, because clarity adds peace of mind and comfort to life!

We are very proud to announce our newest achievement - U-PROX SE series readers have successfully passed the SIA OSDP certification, confirming their reliability and security.
SIA (Security Industry Association) experts, recognized authorities in the field, have thoroughly tested and verified the compliance of U-PROX SE series readers with the standard and officially included them in the list of devices that have successfully passed OSDP v2.2 certification.
This is not just a certificate, it is a confirmation of the highest quality and unconditional compliance with the most stringent reliability and security standards in the access control industry.
What is OSDP? It is an advanced communication protocol that guarantees:
- maximum security: data is reliably protected from unauthorized access through encryption and device authentication.
- flawless operation: the access control system functions without failures, providing you with peace of mind and confidence.
- extended functionality: support for more functions than other protocols allows you to use U-PROX SE series readers in systems of any complexity and scale.
- easy integration: easy connection to OSDP-enabled controllers simplifies the process of installing and configuring your system.
From now on U-PROX SE Series readers are an investment in the future, a guarantee of reliable protection and uninterrupted operation of your next-generation access control system.
Downloads
FAQ
-
- Connect wires D0 (green) and D1 (white) with each other
- Apply power to the reader
- Connect to the reader with application U-Prox Config installed on smartphone.
- Select “Settings”
- Set a password
- Go back
- Press “Save Settings”
- Press “Disconnect”
-
The control panes is the “brain” of the system, which determines whether or not the owner of the identifier is allowed to enter the door.
It has a built-in memory that stores identifier codes with a list of access rights for each of them.
When a person presents (brings to the reader) an identifier, the code read from it is compared with the one stored in the database, on the basis of which a decision is made to open the door.
-
A reader is a device that reads the code (key) of the identifier and transmits it to the controller.
-
PACS — Physical Access Control System —an access control and management system is a set of hardware and software control and management tools.
The main goal is to restrict and register the entry-exit of objects in a given area through “points of passage”: doors, gates, etc.
The main task is to control access to a given territory (who to let in, at what time and to what territory), including also:
- restricting access to a given territory;
- identification of a person who has access to a given territory.
-
An identifier is the basic element of an access control system that stores a code.
Each client is assigned a specific key (code), which serves to determine the owner’s rights – identification.
A card, a key fob, a tag can perform the function of an identifier.
-
Areas of application have a wide range of ACS:
- company offices, business centers;
- banks;
- educational institutions (schools, technical schools, universities);
- industrial enterprises;
- protected areas;
- parking lots;
- places of passage of vehicles;
- private houses;
- residential complexes;
- cottages;
- hotels;
- public institutions (sports complexes, museums, metro, etc.)
-
Everything that is in U-PROX, from the idea to the engineering implementation is done exclusively in Ukraine.
-
You can buy U-Prox equipment from our partners.
-
Open formats JSON and SOAP (XML) allow interaction between different applications, exchange data with access control systems and create applications that complement and extend the standard functionality of the U-PROX Web system.
API capabilities:
- Secure data exchange over a computer network.
- WEB service – the opportunity to interact with any platform and programming environment for SOAP and JSON protocol.
- Implementation of the user interface using the API.
- The ability to integrate with other systems and applications implemented by third-party developers.
-
U-PROX WEB provides a full range of solutions for quick installation, configuration and daily use of IP ACS by enterprises of any size, from a small office to a large company with many branches.
U-PROX Web has a full-featured web interface with fine-tuning of all ACS capabilities and provides the ability to monitor events, configure equipment, manage personnel access, and generate reports.