Access Control Systems: Standalone vs Networked, Proximity Cards, Fob and Biometric Readers — Installation Basics

Quick Answer: Access control systems range from standalone battery-powered keypads (no network needed) to fully networked IP systems managing hundreds of doors from a central server. Credential types include proximity cards (125 kHz), smart cards (13.56 MHz Mifare/DESFire), fobs, PIN pads, and biometric readers. Selection is driven by the number of doors, audit trail requirements, integration needs, and budget. All electric locking hardware on fire escape routes must fail-safe (fail-open on power loss) in compliance with BS 8220 and the Regulatory Reform (Fire Safety) Order 2005.

Summary

Access control is one of the fastest-growing segments of the security installation market. It ranges in scope from a £150 standalone keypad on an office door to a multi-site IP system managing 500 doors across a corporate estate. The underlying principle is always the same: deny or permit access based on a verified credential, and record who went where and when.

For the installer, the critical decisions at design stage are the locking hardware type (fail-safe vs fail-secure), the credential technology, and whether the system will be standalone or networked. These three decisions drive almost all the downstream installation detail — power requirements, cable routes, door hardware, and integration with fire and intruder alarm systems.

A recurring compliance issue on access control installations is fire safety. Electric strikes, magnetic locks, and electric locking bolts all have different fail-state behaviours. Fitting a fail-secure lock (stays locked on power loss) on a fire exit is a serious safety violation under the Regulatory Reform (Fire Safety) Order 2005. Every access-controlled door must be assessed for its designation as a fire exit, escape route, or means of escape before locking hardware is selected.

Key Facts

Quick Reference Table

Spending too long on quotes? squote turns a 2-minute voice recording into a professional quote.

Try squote free →
Credential Type Frequency Cloning Risk Security Level GDPR Implications
EM4100 proximity 125 kHz Very high Very low Low (ID number only)
Mifare Classic 13.56 MHz High (Crypto-1 broken) Low Low
Mifare Plus SL3 13.56 MHz Low Medium Low
Mifare DESFire EV3 13.56 MHz Very low High Low
SEOS/iCLASS SE 13.56 MHz Very low High Low
Mobile (BLE/NFC) BLE/NFC Very low High Medium
Fingerprint N/A Low High High — explicit consent required
Facial recognition N/A Low High Very high — explicit consent + DPIA

Detailed Guidance

Standalone vs Networked: Choosing the Right Architecture

Standalone systems are self-contained units that store all credentials and access schedules locally. No network cabling to a server is required. They are typically powered from a local PSU with battery backup.

Suitable for:

Limitations:

Networked systems use field controllers (door controllers or intelligent readers) connected via IP or RS-485 back to a head-end server running the management software.

IP networked systems connect directly to the LAN. Each controller gets a fixed IP address and communicates with the server using the manufacturer's proprietary protocol (or OSDP over IP in modern systems).

RS-485 panel/controller systems (older or cost-optimised architectures) wire multiple doors back to a panel that then connects to the server via a single IP link. Common in older Paxton Net2, Salto, and Lenel installations.

Feature Standalone Networked
Audit trail Per-door only, limited Central, real-time
User management Per-device Centralised
Anti-passback No Yes
Integration Limited Fire, intruder, HR, CCTV
Installation cost Low Medium–High
Maintenance Low Medium

Electric Locking Hardware

This is the area where the most costly mistakes are made. The wrong lock on the wrong door creates both security vulnerabilities and life-safety risks.

Magnetic locks (maglocks):

Electric strikes:

Electric bolts:

Electric mortise locks:

Fire Safety and Access Control

The Regulatory Reform (Fire Safety) Order 2005 requires that all fire exits and escape routes can be readily opened without a key or special knowledge. Access control on escape routes must release automatically on fire alarm activation and must allow manual override.

Key requirements:

Always check the Fire Risk Assessment (FRA) for the building before designing access control. The FRA may prohibit access control on specific doors entirely.

Cable Installation

Controller to reader (OSDP): 4-core shielded cable (Belden 9842 or equivalent); RS-485 terminated at 120 Ω at both ends; maximum run 1,200 m at 115,200 baud.

Controller to reader (Wiegand): 6-core or 8-core cable; maximum run 150 m; no encryption — keep cable within secure perimeter.

Maglock power: 12 V DC or 24 V DC depending on lock model; cable sized for the lock's current draw plus 20% margin; typically 0.5 A for a single maglock at 12 V.

Controller data (IP): CAT6 UTP or STP to the nearest IDF/switch; IEEE 802.3af PoE for IP controllers or dedicated PSU.

All access control cabling should be run inside secure areas or in surface conduit where it cannot be accessed. Wiegand cable runs in exposed areas are a security weakness — consider upgrading to OSDP or physical protection.

Frequently Asked Questions

Do I need to inform employees that access control is being installed?

Yes. Under UK GDPR, the organisation installing access control (as data controller) must inform employees through a privacy notice before the system is operational. The notice must state what data is collected (entry/exit times, credential ID), why (security management, health and safety), how long it is retained, and their rights. For biometric systems, explicit consent must be obtained from each employee before enrolment.

What is the difference between a Grade 1 and Grade 3 access control system?

BS EN 60839-11-1 grades access control systems 1–4 similarly to intruder alarm grades. Grade 1 is low security (PIN only, no audit trail). Grade 3 requires encrypted credentials, OSDP or equivalent communication, audit trail, and tamper monitoring. Most commercial installations should be Grade 2 minimum; high-value sites need Grade 3.

Can I connect access control to an intruder alarm panel?

Yes, and it is increasingly expected in commercial installations. Integration allows the alarm panel to arm/disarm based on the last person leaving (using an access control output), prevents access to armed areas, and generates alarms for forced entries. Integration methods vary — dedicated protocol gateways are available for most major combinations (Paxton Net2 + Galaxy, Texecom + Salto, etc.).

How many users can a typical system handle?

Standalone units: 500–5,000 users. Networked systems: typically unlimited from a practical standpoint (database limited, not hardware). Most SME-grade systems handle 10,000–50,000 users with standard SQL databases.

What is GDPR's impact on facial recognition for access control?

Facial recognition data is biometric data — Special Category personal data under UK GDPR Article 9. Processing requires either explicit consent from each individual or another specific legal basis. A Data Protection Impact Assessment (DPIA) is mandatory before deployment. ICO enforcement in this area is active. Most UK solicitors and HR teams advise against facial recognition for routine access control — use card or mobile credentials instead.

Regulations & Standards