Skip to content
  • There are no suggestions because the search field is empty.

Embedded Browser Access Control System Quick Start Guide

A quick start and information guide for using the browser interface for Speco access control systems.


What is the Speco Access Control Network Appliance/Hardware?

Our controller is an embedded, browser managed network appliance that is designed to support physical security of facilities via a fast and intuitive embedded HTML5 web interface it’s 
primary use is to inform control who, what, where and when access events occur . The system 
manages any physical device that the system designer chooses to control such as door locking hardware, device management such as fans, pumps, pullies …. In addition, the system is 
designed to monitor and inform the status of these devices. The hardware and software configured and managed over a network using most internet browsers. The system can manage 
60 transactions per second, using its Quad Core processor with 64 Bit processing.

The access control software runs on an industry standard Linux Ubuntu operating system and 
requires no server or software to be installed on local PC’s or other browser enabled devices. 
As a browser managed system, our technology ensures compatibility with network equipment, smart devices, and computers. As a native IP network appliance, we do not require any 
additional gateways, communication wiring or add on adapters to be installed. Our system’s 
Gigabit auto sensing network connection is responsive while ensuring secure connectivity.
All the hardware is similar in design, using identical software and is uniquely designed to 
perform the function of a “server” or a “client”. In this design each device contains all the 
capabilities of the system and with database redundancy. When installed, a controller is configured as a server, or a client and no special hardware or software is required. Our market 
leading online licensing feature enhancement and system scaling allows you to grow or add 
capabilities when needed. It is fast and easy to turn an enhanced feature on or add additional 
clients to the system to manage more doors.

All communication between devices is encrypted and secure. Whether stored on the panel, 
SD Card and or FTP Server system data, event logs, user data are encrypted and secure.

 

How does Speco Access Control and its hardware leverage the network?

Many customers choose to leverage the company’s network infrastructure to interconnect 
and manage their Physical Access Control System. Leveraging an existing network lowers 
the cost of installation and improves performance when compared to other communication 
methods.

How does Speco Access Control interconnect multiple panels?

Our controllers are designed to interconnect and control access for one or many doors or devices. When controllers are added to a network / system the hardware automatically sets itself an IP address in the zeroconf address space. The expansion controller then multicasts for 
a server controller at a specific IP address and port and presents our Unique Identifier (UID) 
to let it be known as an expansion controller. The Server controller then responds to establish 
the system interlink.

Expansion controllers can be statically or dynamically addressed. Typically, the server is assigned a static IP address and clients are configured for DHCP. However, the systems clients 
could be configured statically should the network administrator prefer.

These panels are designed to be interconnected on the secure side of a local LAN or WAN.

Encryption Standards and Protocol

Network security and encryption is something we do not take lightly. We deploy the latest security encryption and protocols available. We have had and will continually perform PEN tests 
to ensure our standards and cyber protection practices are sound and up to date.

  • SSL Encryption and Authentication for the browser to the controller

  • HTTPS - Hypertext Transfer Protocol Secure

  • SSH Authentication and Encryption between the server and the expansion hardware 

    “clients”. The system administrator has the option to upload a private / corporate key.

  • AES 256 Advanced Encryption Standard – data packets Users, Logs, Systems settings…

  • In addition to the use of industry IT security standards, our system adds a secondary 

    encryption require that only our hardware / ecosystem is capable of decoding and visually 

    displaying the data that is produced and communicated by our system. This is proprietary 

    to our system and is an added protection because the data is specific to our system use 

    only

To ensure our systems are secure, Speco performs and uses a variety of services to test the 
product for Cyber Security (PEN Testing). As a security provider, we take network security 
seriously and provide periodic security updates as required.

System Set up Information Requirement Checklist

  1. DNS (Domain Name Server) IP address (Static for the server, Static or DHCP for the 

    clients) Note: IP Address should be configured inside the firewall.

  2. Gateway IP Address, if any

  3. Subnet mask and IP addresses for the server and clients

  4. E-Mail relay server address or name

  5. E-Mail address name for the controller and setup on the email server to accept the 

    mail for the eNc relay

  6. NTP (Network Time Protocol) server name (s) if the network has no internet access.


Initial submission Date: January 19th, 2026

Article authored by: Daniel Alles, Product Manager

Article transcribed by: Michael Pagano, Technical Support Agent - Tier 1