SE 6000
SECURITY
MANAGEMENT
SYSTEM
STANDARD
PRODUCT
MANUAL
Westinghouse
Security Electronics
an ISO 9001 certified company
5452BetsyRossDrive
SantaClara,CA95054-1184
(408)727-5170
FAX(408)727-6707
P/N 66107919001, Rev. F
Download from Www.Somanuals.com. All Manuals Search And Download.
iii
TABLE OF CONTENTS
SECTION 1: INTRODUCTION.................................................... 1-1
MANUAL ORGANIZATION ............................................................................... 1-1
System Main Menu ..................................................................................... 1-1
Documentation Methods ............................................................................. 1-2
DEFINITIONS ................................................................................................... 1-2
General ....................................................................................................... 1-2
System Hardware — Devices ..................................................................... 1-3
System Software ......................................................................................... 1-5
Principal System Functions ......................................................................... 1-6
SAMPLE SYSTEM ............................................................................................ 1-7
CREATING THE DATABASE ............................................................................ 1-8
BASIC SYSTEM USAGE .................................................................................. 1-9
Logging On ................................................................................................. 1-9
System Screens ........................................................................................ 1-10
Application Screens .................................................................................. 1-10
SCREEN EXAMPLES ..................................................................................... 1-11
USING SCREENS AND FIELDS ..................................................................... 1-12
Selecting Screens ..................................................................................... 1-12
Moving Between Data Fields..................................................................... 1-12
Moving to Prior Screens ............................................................................ 1-13
FINDING, ADDING, AND STORING DATA ..................................................... 1-13
Finding Data.............................................................................................. 1-13
Searching With Partial Information............................................................ 1-13
Adding / Changing Data ............................................................................ 1-14
Storing Data .............................................................................................. 1-14
DELETING RECORDS ................................................................................... 1-14
ZOOM FEATURE ............................................................................................ 1-15
Cancel Zoom ............................................................................................ 1-15
MISCELLANEOUS INFORMATION ................................................................ 1-15
LOGGING OFF ............................................................................................... 1-15
SHUTTING DOWN ......................................................................................... 1-16
RESTARTING ................................................................................................. 1-16
Automatic Restart ..................................................................................... 1-16
Manual Restart.......................................................................................... 1-16
SYSTEM SCREEN TREES ............................................................................. 1-17
Appendix A: System Screen Trees ........................................................... 1-17
Appendix B: System Screen Hierarchies................................................... 1-17
OPTIONAL FEATURES .................................................................................. 1-17
SECTION 2: MONITOR SECURITY ACTIVITY .......................... 2-1
INTRODUCTION............................................................................................... 2-1
SECTION ORGANIZATION .............................................................................. 2-1
FUNCTION KEYS ............................................................................................. 2-2
DATA ITEM SELECTION .................................................................................. 2-2
CONTROL FUNCTIONS MENU ....................................................................... 2-2
Pollers ......................................................................................................... 2-2
Devices ....................................................................................................... 2-3
Locks .......................................................................................................... 2-4
Input Points ................................................................................................. 2-5
Output Points .............................................................................................. 2-5
Download from Www.Somanuals.com. All Manuals Search And Download.
iv
Doors .......................................................................................................... 2-6
Select Zone................................................................................................. 2-6
REVIEW TRANSACTIONS (FULL SCREEN) ................................................... 2-7
ALARM SERVICING ......................................................................................... 2-8
REAL TIME CONTROL MAPS .......................................................................... 2-8
CONTROL PROJECTS .................................................................................... 2-9
ABORT TIMERS ............................................................................................... 2-9
OTHER FUNCTIONS........................................................................................ 2-9
Printer Control ............................................................................................. 2-9
Forgive Passback ..................................................................................... 2-10
Manual Access Granted............................................................................ 2-10
Force Table Download .............................................................................. 2-10
Remote Devices ....................................................................................... 2-11
Building Modes ......................................................................................... 2-11
Full Screen Monitoring .............................................................................. 2-12
MISCELLANEOUS INFORMATION ................................................................ 2-12
Disk Almost Full Warning .......................................................................... 2-12
Status Screen Function Timeout ............................................................... 2-13
Alarm Servicing — No Activity Timeout ..................................................... 2-13
Monitoring Security - Passwords ............................................................... 2-14
Modified Usage of Invalid Facility Code Log.............................................. 2-15
SECTION 3 SECURITY REPORTS ............................................ 3-1
INTRODUCTION............................................................................................... 3-1
POINT HISTORY REPORT............................................................................... 3-2
Point History — Sample Report .................................................................. 3-2
KEYHOLDER HISTORY REPORT.................................................................... 3-2
Keyholder History — Sample Report........................................................... 3-3
TRANSACTION HISTORY REPORT ................................................................ 3-3
Transaction History — Sample Report ........................................................ 3-4
ACCESS CONTROL ARCHIVE REPORT ........................................................ 3-4
ALARM SERVICING REPORT ......................................................................... 3-4
Alarm Servicing — Sample Report.............................................................. 3-5
PASSBACK ZONE REPORT ............................................................................ 3-5
Passback Zone — Sample Report .............................................................. 3-6
DOWNLOAD STATUS REPORT ...................................................................... 3-6
Download Status — Sample Report............................................................ 3-7
KEYHOLDER ZONE REPORT ......................................................................... 3-8
Keyholder Zone — Sample Report ............................................................. 3-8
EVENT / POINT REPORT ................................................................................ 3-8
Event / Point — Sample Report .................................................................. 3-9
REALTIME PASSBACK ZONE REPORT.......................................................... 3-9
REALTIME PASSBACK DETAIL — SAMPLE REPORT.................................. 3-10
SECTION 4 MASTER FILE ENTRY............................................ 4-1
INTRODUCTION............................................................................................... 4-1
Screen Access ............................................................................................ 4-1
KEYHOLDERS .................................................................................................. 4-2
Keyholder Entry—Page 1 [key_entr] ........................................................... 4-2
Keyholder Entry—Page 2 [key1entr] ........................................................... 4-4
Download from Www.Somanuals.com. All Manuals Search And Download.
v
Keyholder Access Entry [empgentr] ............................................................ 4-5
Project Assignment [epj_entr] ..................................................................... 4-6
COPY KEYHOLDERS ....................................................................................... 4-7
Copy Keyholder Information ........................................................................ 4-7
ACCESS ASSIGNMENT ................................................................................... 4-8
Keyholder Access Assignment [egrpentr] ................................................... 4-8
COPY KEYHOLDER ACCESS [ERGCOPY] ..................................................... 4-8
ACCESS DEFINITION ...................................................................................... 4-9
Access Code Entry [acdsentr] ..................................................................... 4-9
Access Group Entry [agdsentr], [agrpentr] ................................................ 4-11
Access Override Entry .............................................................................. 4-13
Failsoft Entry ............................................................................................. 4-14
Project Entry [prj_entr], [prd_entr] ............................................................. 4-14
TIME CODES [TMCDENTR] ........................................................................... 4-16
HOLIDAYS [HOL_ENTR] ................................................................................ 4-16
TENANTS [TENTENTR] ................................................................................. 4-17
INSTRUCTIONS [INSTENTR] ........................................................................ 4-17
HARDWARE CONFIGURATION [CONFMENU] ............................................. 4-18
Zones [zoneentr] ....................................................................................... 4-18
Areas [areaentr], [areaentr1] ..................................................................... 4-19
Pollers [pol_entr] ....................................................................................... 4-19
Devices ..................................................................................................... 4-21
Device Entry [dev_entr] — All Device Types ............................................. 4-22
SE NexSentry Device Configuration Entry [nexsentr] ................................ 4-26
Readers .................................................................................................... 4-31
Reader Entry [rdr_entr] ............................................................................. 4-32
Points [pnt_entr] ........................................................................................ 4-39
Auto Opens / Activates.............................................................................. 4-42
Device Report Definition [rdefentr] ............................................................ 4-43
SE 422 PIN Definition ............................................................................... 4-43
SE 422 Hardware Definition ...................................................................... 4-44
Dialer Entry ............................................................................................... 4-45
Site Entry Definition................................................................................... 4-46
ABA Configuration Entry ........................................................................... 4-47
DKR Configuration Entry ........................................................................... 4-48
USER-DEFINED INFORMATION.................................................................... 4-49
MAPS .............................................................................................................. 4-50
Map Drawing Commands and Descriptions .............................................. 4-50
SECTION 5: MASTER FILE REPORTS ..................................... 5-1
INTRODUCTION............................................................................................... 5-1
ADDITIONAL INFORMATION ........................................................................... 5-2
KEYS MASTER ................................................................................................. 5-2
Keyholder Quick List — Sample Report ...................................................... 5-3
Keyholder Holder Master Report — Sample Report.................................... 5-3
ACCESS ASSIGNMENTS................................................................................. 5-4
Keyholder Access Assignment.................................................................... 5-4
Keyholder Access Assignment: Regular — Sample Report ........................ 5-4
Keyholder Access Assignment: Extended — Sample Report...................... 5-5
Download from Www.Somanuals.com. All Manuals Search And Download.
vi
Reader Access Assignment ........................................................................ 5-5
Reader Assignment — Sample Report ....................................................... 5-5
ACCESS DEFINITION ...................................................................................... 5-6
Access Code Master ................................................................................... 5-6
Access Group Master ................................................................................. 5-6
Access Override ......................................................................................... 5-7
Intelligent Fail Soft Report ........................................................................... 5-7
Project Report ............................................................................................. 5-8
Keyholder Project Report ............................................................................ 5-9
Reader Project Report .............................................................................. 5-10
TIME CODES .................................................................................................. 5-10
HOLIDAYS ...................................................................................................... 5-11
TENANTS ....................................................................................................... 5-11
Tenants — Sample Report ........................................................................ 5-12
COMPANY, DEPT, LOCATION, JOB CAT ....................................................... 5-12
Company, Dept, Location, Job Cat — Sample Company Report .............. 5-12
INSTRUCTIONS ............................................................................................. 5-12
Sample Instructions .................................................................................. 5-13
MAPS .............................................................................................................. 5-13
Sample Report — Map Information........................................................... 5-13
DEVICE CONFIGURATION REPORTS .......................................................... 5-13
Zones........................................................................................................ 5-13
Zones — Sample Report .......................................................................... 5-14
Pollers ....................................................................................................... 5-14
Pollers — Sample Report.......................................................................... 5-14
Devices ..................................................................................................... 5-14
Devices — Sample Report ........................................................................ 5-15
Readers .................................................................................................... 5-15
Readers — Sample Report ....................................................................... 5-16
Points........................................................................................................ 5-16
Points — Sample Report........................................................................... 5-16
Auto Opens / Activates.............................................................................. 5-17
Auto Open / Activate — Sample Report .................................................... 5-17
808 Report Definition ................................................................................ 5-17
808 Report Definition —Sample Report .................................................... 5-17
808 Device Configuration .......................................................................... 5-18
808 Device Configuration — Sample Report............................................. 5-18
Dialers....................................................................................................... 5-18
Dialers — Sample Report ......................................................................... 5-18
Site Definition ............................................................................................ 5-18
Site Definition — Sample Report............................................................... 5-19
ABA Configuration .................................................................................... 5-19
ABA Configuration — Sample Report ....................................................... 5-19
DKR Configuration .................................................................................... 5-20
DKR Configuration — Sample Report ....................................................... 5-20
SE 422 PIN Master Report........................................................................ 5-20
SE 422 PIN Master Report — Sample ...................................................... 5-21
132-COLUMN REPORT DISPLAY .................................................................. 5-21
Download from Www.Somanuals.com. All Manuals Search And Download.
vii
SECTION 6: SYSTEM ADMINISTRATION ................................. 6-1
INTRODUCTION............................................................................................... 6-1
SECTION ORGANIZATION .............................................................................. 6-1
ADDITIONAL INFORMATION ........................................................................... 6-2
ADD USERS [ADDUSERS]............................................................................... 6-2
MODIFY PASSWORDS [MOD_PASS].............................................................. 6-4
PROGRAM SECURITY [SEC_MENU] .............................................................. 6-5
Program Security Level Entry [pgacentr] ..................................................... 6-5
Program Security Entry Definition [pg1_entr] .............................................. 6-5
Copy Security [mnaccopy]........................................................................... 6-6
Security Master List [pgacrprt]..................................................................... 6-6
DISPLAY ALL VALID LOGINS [SHOWUSER] .................................................. 6-7
DISPLAY CURRENT DATE AND TIME [SHOWDATE] ..................................... 6-7
DISPLAY ALL USERS WHO ARE LOGGED IN [SHOWWHO] ......................... 6-7
PURGE A PENDING REPORT [PURGRPRT] .................................................. 6-8
ENABLE TERMINALS FOR GLOBAL BEEPING [BEEPENTR] ....................... 6-8
SYSTEM CONFIGURATION (SYCLMENU)...................................................... 6-8
Control File Maintenance [ctrlentr] .............................................................. 6-8
Events [evenentr] ........................................................................................ 6-9
Tasks [taskentr]......................................................................................... 6-10
Task Event / Master Report [taskrprt] ........................................................ 6-12
Transactions [tranentr] .............................................................................. 6-12
DATABASE MAINTENANCE [DB_MENU] ...................................................... 6-14
Display Database Statistics [dbstats] ........................................................ 6-14
Perform Backup [bkup] ............................................................................. 6-14
Alarm Transaction Clean Up [alrmcln]....................................................... 6-16
Journal Archive [jourarch] ......................................................................... 6-16
Journal Reporting [jourrprt] ....................................................................... 6-16
Special Journal Reporting [josprprt] .......................................................... 6-16
KEYHOLDER LOADING [LOADMENU] .......................................................... 6-17
ID SECURITY MAINTENANCE [ID_MENU].................................................... 6-17
ID Security User Entry [ID1_ entr] ............................................................. 6-17
ID Security Group Entry [ID2_ entr] ........................................................... 6-18
ID Security Report [ID1_ rprt] ................................................................... 6-18
MISCELLANEOUS INFORMATION ................................................................ 6-19
Adjustable Baud Rate—708P / 800 Pollers ............................................... 6-19
708P REX Shunt Time Reset.................................................................... 6-19
Key Inventory [invtmenu] ........................................................................... 6-20
Inventory Status Code Menu [statentr] ...................................................... 6-20
Key Inventory Status Code Report [statrprt] .............................................. 6-20
Key Inventory Entry [cdinentr] ................................................................... 6-21
Key Inventory Report [cdinrprt].................................................................. 6-21
PARKING STICKERS [STKRMENU]............................................................... 6-22
Parking Sticker Entry [stkrentr].................................................................. 6-22
Parking Sticker Interactive Display [stkrrprt1] ............................................ 6-22
Parking Sticker Master Report [stkrprt] ..................................................... 6-23
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 1: INTRODUCTION
1-1
SECTION 1
INTRODUCTION
MANUAL ORGANIZATION
This manual follows the order of the seven standard product items in the system main menu, with
the Key Inventory and Parking Stickers items merged into the System Administration section:
•
•
•
•
•
Section 2: Monitor Security Activity
Section 3: Security Management Reports
Section 4: Master File Entry
Section 5: Master File Reports
Section 6: System Administration
System Main Menu
The system main menu is the departure point for accessing all other system screens (main menu
screens may vary according to options purchased).
Download from Www.Somanuals.com. All Manuals Search And Download.
1-2
SECTION 1: INTRODUCTION
Documentation Methods
To avoid repetition and to reduce document size, detailed explanations for the system's principal
data items are given only in Section 4: Master File Entry, which is used when creating the system
database. For introductory information concerning the data items, see Definitions below.
Further, with the exception of the screens presented in Basic System Usage in this section, and
the introductory menu screens for Sections 2 through Section 5, all other screens throughout this
manualarelimitedtotheparticularscreenareabeingdiscussed(i.e., fullscreensarenotshown).
In some cases, screen presentations are unnecessary and are not used.
DEFINITIONS
General
Access Code. A group of readers and time codes assigned to keyholders indicating where and
when entry is permitted. Note that access codes can be associated with a down loadable device
ID for distributed processing or they can be associated with the host computer for central
processing.
Access Group. A group of access codes created to facilitate the assignment of similar access
privileges to a large number of keyholders.
Alarm Contact. A dry-contact switch, indicating input conditions for smoke detectors, heat /
moisture sensors, taut-wire fences, window bands, etc.
Company. Keyholder's employer.
Department. A particular group within a company to which a keyholder is assigned.
Device. A controlling element of the system which communicates with the computer and the
system points (see System Hardware in this section).
Event. Any defined transaction which requires action by an access control system. Examples:
keyholder entry request, activated alarm.
Job Category. A code assigned to a keyholder indicating the employee group category.
Key Number. Keyholder's security key number. Unlike the keyholder ID, this number may be
changed (e.g., if a key is lost) or removed (e.g., if an employee leaves the company).
Keyholder. Employee or visitor who holds a valid security card for an access control system.
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 1: INTRODUCTION
1-3
Keyholder ID. Keyholder's ID number. The unique ID number is used by the computer to keep
track of all activity for that person. Once entered, the keyholder ID cannot be changed.
Location. Location of the office or branch of the company to which a keyholder is assigned.
Tenant. One of several distinct occupants of a facility with a single access control system. The
data for each tenant using the system appears separate from that of all other tenants.
Time Code. A definition of the time of day, and the days of the week, when events are to occur.
Used in assigning access privileges, performing scheduled tasks, and monitoring points.
Trace. A realtime (as it is happening) display of events for a specific keyholder or point.
Transactions. System responses to events are called transactions. The most frequently seen
is ACCESS GRANTED, which means a valid key was presented to a reader at an approved door, at
an approved time, and that the keyholder was granted entry.
Zones. Selected locations and device types may be grouped into zones to facilitate system
control. For reporting purposes, zones may be grouped into areas. If zones are created, anti-
passbackinstructionsorcontrolsmaybeassigned(seeAccessControlFunctionsinthissection).
System Hardware — Devices
The principal device is the host computer. The host controls all data maintained in the database,
recordsallsystemactivity,andisthecentralpointforallreportingactivity. Thehostcommunicates
with all system devices, or may communicate via an LC or RLC computer (see Optional Features
in this section).
Various other devices are included in access control systems. Simple systems may use only
contact switches and a single reader type. More complex systems may use several reader types
and many other devices. Devices are classified as input or output units depending on their
particular function. Input devices are detectors and identifiers; output devices are alarms and
control units.
Devices — Microprocessor Units
AccessControlUnits(ACUs). Inconjunctionwiththehostorlocalcomputer,theACUsareused
to control door access and maintain status. Example ACUs are: WSE NexSentry, 422, 708P,
and 8xx-series. TheWSE708Punitsarecalledsimpledevicesbecausetheydonotmakeaccess
decisions (decisions are made by host). The NexSentry, 422, and 8xx-series units are called
intelligent devices because they can make access decisions independent of the host.
Biometric Hand Readers. Devices such as fingerprint analyzers, hand geometry analyzers,
retina scanners, and other devices which check body characteristics.
Download from Www.Somanuals.com. All Manuals Search And Download.
1-4
SECTION 1: INTRODUCTION
Readers
Digital Key Reader. Reads the unique number of 1 to 5 digital command keys simultaneously
at a range of up to 36 inches.
KeypadControllers. Thekeypadcontrollers, normallyusedinconjunctionwithanACU, provide
additional security by requiring a personal identification number (PIN) entry.
Magnetic Card Readers. Readsthecardnumberfrominformationcodedintothemagneticstrip
on the card. Card must be moved physically through the reader to work.
Readers (also called Sensors). These units electronically read the security key presented and
transmit the data to the ACU. Three reader types are used: Proximity; Magnetic Stripe; Wiegand.
Inputs
AlarmContacts. Thesedevicesmonitorsimplecontactinputs, andcontroloutputsandswitches
with contact closures for alarm monitoring, elevator control, camera switching, and other tasks.
Contact Alarms. Simple dry-contact switches indicating if a contact is open or closed.
Door switches. The computer controls only the lock power to the door, and the door switches
are the contact points which inform the computer whether a specific door is open or closed. Each
door switch is assigned to a specific reader.
Fire Alarms / Heat Sensors. Data from smoke detectors and heat sensors can be sent to the
computer to alert it to alarm conditions. Although fire alarm systems are generally separate from
access control systems, the computer can be used to provide enhanced response capabilities.
Intrusion Devices. Taut wire fence, infrared detectors, field-disturbance detectors and other
device types can alert the computer to the presence of personnel in unauthorized areas.
Motion Sensors. Detect physical movement in an area. Can be used to tell the computer that
someone wants to exit (go through a door from the uncontrolled side), or to protect secure areas.
Video Monitor Switchers. The computer routes the signal from a particular video camera to a
specific monitor based on conditions in that area. For example, if the computer detects an open
rear door, it can display the camera output at that door on the terminal at the security desk.
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 1: INTRODUCTION
1-5
Multiple Switch Monitor (MSM). The MSM is a four-contact switch box that is connected to a
WSE ACU and the MSM provides four contact-closure inputs.
Points. Apointisanybasicelementofanaccesscontrolsystem, suchasadoorswitch, analarm
contact, an output switch. Point IDs uniquely identify all system elements.
Request-to-Exit (REX) Sensor. Used when both entry and exit control is required. REX points,
usually push-button devices, motion detectors, or push-bars, tell the computer that someone
insideabuildingwantstoexit. Thecomputerneedstoknowthistounlockthedoor,ortodisregard
the door opening as being an alarm event.
Outputs
Audible Alarms. The computer can trigger bells, buzzers and other types of audible alarms.
Remote Alarms. The computer can dial police and / or fire departments, or any other agency,
as part of an alarm response plan.
System Software
The system software links all input and output elements. The software collects and reports data
from input devices, and controls the output devices based on this information. The software also
detects and reports any hardware problems that may occur.
Complete Portability. A specific computer type is not required, although Hewlett-Packard
computers are preferred because of performance and worldwide service. Application programs
run under an SCO / UNIX operating system.
Installation Flexibility. The SE 6000 can control many hardware setups, including remote site
networks. The system can be programmed to control data flow between central and remote
computers to create a large-size security system controlled from a central point.
Integrated Software Support. The SE 6000 communicates with a variety of access control and
alarm monitoring devices. Currently, the system interfaces with WSE ACUs and their peripheral
devices, alarmmultiplexersproducedbyStellarSystemsandOptomux, magneticstripereaders,
CCTV camera switchers made by Burle, Pacom, American Dynamics, and Vicon, Radionics
alarmpanels,andRecognitionSystemshandgeometryreaders. Inaddition,thesystemsupports
communication with the WSE 8xx-series ACUs over dial-up telephone lines using a remote dial-
upinterface(RDI)device.TheID-4000badgingsystemincludesoptionsforbadgedesignsonfilm
or on PVC.
Open System Design. There are few restrictions on the number of security keys, key readers,
or other system elements used with the SE 6000. Increasing system capacity only involves
upgrading the computer power by adding more memory or disk space, or installing a faster
processor. This means that, as a company grows, it cannot outgrow the SE 6000.
Download from Www.Somanuals.com. All Manuals Search And Download.
1-6
SECTION 1: INTRODUCTION
Response Time. The SE 6000 is capable of fast response times in both single and multiple site
configurations. Fastresponsetimesareimportantforsecuritypersonnelwhomonitoralarmsand
are always appreciated by keyholders wishing to enter locked doors.
Principal System Functions
Access Control
Anti-Passback Control. The SE 6000 has anti-passback features (applies to zones only) to
prevent tailgating or unauthorized key use. Anti-passback is possible across multiple access
control devices, and can be hard (denies access) or soft (allows access, but displays and logs a
message). The software handles vehicle and personal passback separately.
Automatic Access Control. Permits employees or visitors with assigned access codes to pass
through only those doors assigned to them and only during the proper days and hours.
Automatic Activate / Deactivate. Permits the automatic activation of specific output points to
control lighting, status indicators, or other electrically controlled functions.
Automatic Unlock / Lock. Allows doors to be opened automatically only during specified time
periods, then re-locked automatically at a later time.
Communications Monitor. Permits security personnel to check all wiring and communications
to all hardware elements and displays raw data exchange between the host computer and a
connected device.
Event Monitoring. Displayseventsasthey occurandmonitorsthedoorstatusandotheraccess
points. Allows security personnel to watch events at all doors in the system from one location.
Flexible Event Handling. Flexible event handling automatically activates outputs, displays
special messages, and enables / disables devices. Anything which can be done manually on the
SE 6000 can also be performed automatically using this feature.
IndependentPINEntry. Accesscontrolcanbeenhancedusingpersonalidentificationnumbers
(PINs). PINsareenteredviakeypaddevicesassignedtoreaders.Also,high-securityindependent
devices (hand geometry readers, e.g.) can identify the user.
ManualAccessControl. Allowssecuritypersonneltomanuallyopenanydoorinresponsetoan
access request. May be used with closed-circuit TV to verify and admit people, or to track
keyholders who have forgotten their keys. Includes the capability to record keyholder IDs if keys
are not available. All manual actions are logged as events.
Two-Man Rule. The SE 6000 can be programmed to grant access only after two valid key
presentations have been made at the same reader within a predefined period of time.
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 1: INTRODUCTION
1-7
Multiple Occupancy Feature. Similar to the two-man rule except that it requires that two
keyholders enter and leave a specified zone together; refer to Section 4 for details.
File Maintenance
To perform its access control functions, the system must know the unique ID numbers of all
keyholders and the doors and times they can enter. Further, the SE 6000 maintains other
keyholder data to facilitate scheduling and reporting.
Thesystemalsoneedstoknowdetailsofthelocationofinputdevicesandothersecurityhardware.
File maintenance functions allow users to enter, modify, or delete employee, company, physical
connection and time information, as required.
Reporting
The SE 6000 produces a comprehensive selection of reports for display at the system terminal
or for hard-copy output from the system printer:
AlarmsandResponses. Ahistoryreportofalarmswhichoccurredataspecifictimeandlocation,
and the responses taken by the security staff.
All Transactions. A report detailing all system activity. The items reported can be limited to
specific information items.
Database Changes. A report of database change activity, which includes the name of the
operator who made the changes. Note that this requires that the journaling feature be enabled.
InvalidAccessAttempts. Areportdetailingeventswhichwerenotvalidaccessesduringspecific
time periods at particular doors.
Keyholder History. A report of the last twenty uses from a particular keyholder.
Point History. A report of the last twenty events at any door or point. Designed as a quick way
toviewalimitednumberofevents. Additionally, reportscanbecreatedwhichprovideinformation
about the keyholders in the system, access privilege definitions, company information, input
devices, and other subjects.
SAMPLE SYSTEM
An illustration of a basic SE 6000 system follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
1-8
SECTION 1: INTRODUCTION
SE 6000
Pollers
1
2
3
4
5
6
7
8
Alarm
Monitoring
Device
Access Control Unit—
ACU
Switcher
(Up to 16 per poller)
(Up to 16 per poller)
Sensor Connections
1 2 3 4 5 6 7 8
Multiple Switch
Contact Relays
Monitor—MSM
(1—16)
CCTV
Contacts
Camera
1
2
3
4
Contact
Switch
(Point)
REX
(Point)
Reader
Door Switch
(Point)
One Complete Door
BASIC SE 6000 SYSTEM
CREATING THE DATABASE
Once the system is in place, first obtain the following from the system installer:
System Interconnect Diagram. This shows all wiring and connections in the system, and
provides information needed for entering pollers, devices, readers, and points.
Poller Initialization Parameters Information. The information shows how the pollers were
initialized, including poller type, physical port connection, and other poller-specific information.
Becauseallsystemactivityisbasedonfour-digitIDnumbers,youneedtodecidebeforedataentry
howthesenumbersaretobeassignedtothesystemhardwareelements. Althoughthenumbering
system is entirely the choice of the SE 6000 owner, we recommend one of the two following
methods:
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 1: INTRODUCTION
1-9
1. Following the System Interconnect Diagram, number each element in turn with a four-digit
number, including numbers for devices, pollers, and readers.
2. Use the following ID groupings for average-sized system:
0001-0010 — Computers
0011-0099 — Pollers
0100-0999 — Devices
1000-1999 — Sensors
2000-2999
3000-3999
4000-5999
6000-7999
—
—
—
—
Door switches
REX contacts
Input points
Outputs
Data Entry Sequence
Notethatalthoughthezoomfeature(describedlaterinthissection)permitsfasterdataentry, WSE
recommends the following sequence for most efficient data entry when you are creating your
database (data entry is detailed in Section 4: Master File Entry):
1. Time Codes
2. Tenants
3. Zones / Areas
4. Pollers
9. Access Groups
10. User-Defined Fields
11. Keyholders
12. Access Privileges
13. Holidays
17. Tasks
18. Events
19. EnableTerminalsforGlobalAlert
20. Program Security Levels
21. Add Users
5. Devices
6. Points
7. Readers
8. Access Codes
14. Alarm Instructions
15. Maps
16. Transactions
22. Passwords
23. System Owner Name
24. Terminals for Alarm Auto-Switch
NOTE
Consultthesysteminstallerifyouhavequestionsconcerningnumbering. Inanycase, keeptrack
of your numbering method and advise each operator of the method selected
BASIC SYSTEM USAGE
ThissubsectiongivesintroductoryinformationforusingtheSE6000system,andincludesrelated
miscellaneous information.
Logging On
Poweronthesystemterminal. Thescreendisplaysabriefwelcomemessagefollowedbythelogin
andpasswordprompts. EntertheloginIDandpasswordinlowercaseletters. Ifuppercaseletters
are entered by mistake, log off using uppercase letters then log on again with lowercase letters.
If the login and password are not valid or if one or both were not entered correctly, the computer
respondswithloginincorrectthendisplaysloginagain. ReentertheloginIDandpasswordmaking
surethateachletteriscorrectlytyped. Iftheloginincorrectmessagecontinues,consultthesystem
administrator. When logged in correctly, the system displays the SE 6000 title page, sets the
terminal environment, then displays the main menu. Call WSE Customer Service if you have a
login problem.
Download from Www.Somanuals.com. All Manuals Search And Download.
1-10
SECTION 1: INTRODUCTION
System Screens
There are two basic screen types: Menu and Application:
Menu Screens
Menu screens list application selections by group according to function (exception Monitor
Security Activity — see Section 2). All menu screen IDs end in menu (example: [fmntmenu] —
Master File Entry).
The menu screens have three elements: the list of choices, the highlight bar, and the Enter
Selection field. The highlight bar, controlled by the arrow keys, is used to make a selection to be
placed into the Enter Selection field. Screen access descriptions are given in Moving Between
Screens and Fields in this section.
A sample menu screen follows:
Application Screens
Application screens use status windows and various fields for entering new data or displaying
existing data. The screen title is in brackets and on the same line and to the left of the screen title.
Most screen title IDs indicate screen function, e.g., entr (enter data), rprt (report). A sample
screen follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 1: INTRODUCTION
1-11
Indicates replace or insert mode. With replace, entries overwrite existing data. With insert,
entries push existing data to the right. Toggle between the modes by pressing insert.
Indicates if the information displaying is stored.
Indicates the current screen mode (see Finding, Adding, and Storing Data in this section).
In some systems, this window is in reverse video.
Indicates if the zoom feature exists for a field (see Zoom Feature in this section).
Displays the number of records found as a result of a find request (see Finding, Adding, and
Storing Data in this section).
SCREEN EXAMPLES
SE 6000 screen displays show the path used to access the screen. For example, the final screen
used when setting up keyholders, [epj_entr], is accessed via three preceding keyholder setup
screens: [key_entr], [key1entr], [empgentr]. This useful feature considerably assists the new SE
6000 user when becoming familiar with the system. A sample [epj_entr] screen follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
1-12
SECTION 1: INTRODUCTION
USING SCREENS AND FIELDS
Selecting Screens
There are three screen selection methods:
1. Use the arrow keys to select the menu choice. Press Enter to place it in the Enter Selection
field, and pressEnter again to display the selection.
2. Use the arrow keys to select the menu choice, and press F2 to display the selection.
3. Press Enter anywhere in the list of choices to move the highlight bar to the Enter Selection
field. Press Ctrl + y to clear the field and type the title of the screen required and then press
Enter.
Moving Between Data Fields
Move between the application screen data fields as follows:
•
•
•
To move forward through the fields, press Enter.
To move backward through the fields, press Ctrl + u.
To move between characters within a single field, use the left and right arrow keys.
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 1: INTRODUCTION
1-13
Moving to Prior Screens
Press F1 to return to the previous screen displayed. If required, continue to press F1 to return
to the system main menu.
FINDING, ADDING, AND STORING DATA
Finding Data
Usethefindmodetolocateandselectdata. Aspecificrecord(asinglekeyholderID, forexample)
or a group of records (all keyholders in a particular job category, for example) can be found.
For example, assume we need to find all keyholders assigned to tenant 2 who began work after
May 1, 1995. First, select the keyholder entry screen, [key_entr]:
NOTE
The keyholders are the object of the search, which is why we begin at the keyholder entry screen.
Tenant 2 and issue date are the search criteria.
1. Press F4 to clear fields and to enter the find mode. The third status field at the top of the
screen displays find.
2. Press Enter to advance the highlight bar until you reach the first search item, Tenant, and
type 2.
3. Press Enter to advance the highlight bar until you reach the second search item, IssueDate,
andtype05/01/96.(Note:Enterthedateaccordingtotheformatforyoursystem,thatis,either
MM/DD/YY or DD/MM/YY.)
4. Press F3 to begin the search process; the sixth status field displays finding. The length of
the search process will depend upon the size of the data base.
5. When the search completes, the system displays the first record found and shows the
number of records found in the fifth status window (Record 1 of n). (If the system doesn't
find any records matching the search criteria, the message No Records Found displays.)
Use the down arrow key to display other records found in the search process. Use the up
arrow key to go back to previous records.
Searching With Partial Information
Records can be found using partial information. For example, to find all keyholders whose last
name begins with T, enter T in the Last Name field. The system also searches for several criteria.
For example, to find all keyholders who work for tenants 1 and 5, enter 1,5 in the tenant field. In
addition, you can enter less than (<) and greater than (>) symbols to narrow a search.
Download from Www.Somanuals.com. All Manuals Search And Download.
1-14
SECTION 1: INTRODUCTION
The computer automatically changes to the update mode when a search completes, and the
recordsselectedcanbeupdatedifrequired. Tostartanothersearch, pressF4toclearthescreen
and begin again.
Adding / Changing Data
Theaddmodeisusedtoinputnewrecords.Oncearecordisfoundusingthesearchmode,update
is automatically selected which allows the user to change the existing data.
If not already in the add mode, press F5 to clear fields and to begin adding. Press Enter to move
the highlight bar to the next field and type the data. (If a typing mistake is made, press Ctrl + y to
clear a field, Ctrl + f to delete characters in a field, Ctrl + u to move back through the fields.)
Many fields have default values, which are used if a field entry is not made. Default values are
usedtosimplifytheentryprocessbyautomaticallysettingcertainfieldstocommonlyusedvalues.
For example, many yes or no type fields, (Y / N), have Y as the default.
Storing Data
Storealladditionsandchangeswhencompleted—PressF6. IfF1isusedtoreturntotheprevious
screen without first storing the new / changed information, all the new data is lost.
DELETING RECORDS
From time to time, it may be necessary to delete records from the database. The delete record
function is easy to perform, although some cautions are involved. To remove a record from the
database, first display the record using the find mode, then press Esc, followed by d (lowercase),
then r (lowercase). If the operation can be performed, the computer displays deleted.
It may not be possible to delete records in some cases. For example, the system would not allow
areadertobedeletedwithoutfirstdeletingitsassociatedaccesscodes. Displaytheaccesscode
records and delete the reader data appearing on them, then delete the reader record itself again.
CAUTION
Be careful when deleting certain records. For example, it is unwise to be hasty when deleting
keyholder records. Consider Employee A who occasionally entered a certain room where
valuable material is stored. The employee then abruptly left the company, and the keyholder
record is deleted. A theft is then discovered from the room, and from shipping and receiving
records it is determined that the theft occurred within a particular time frame. But with the
keyholder information now erased for Employee A, there is no way to link the transaction history
to a particular keyholder.
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 1: INTRODUCTION
1-15
ZOOM FEATURE
The zoom feature provides a fast method for accessing linked or dependent application screens
and for copying data from these screens to other application screens. When the feature is
available, zoom displays in the status bar.
For example, you are entering keyholder data (keyholder entry screen) but don’t know the tenant
codeforthekeyholder. Wheninthetenant field,pressF7tozoomtothetenantentryscreen. Once
there, use the find mode to see the tenant codes defined and to select the one you need or enter
anewone. ThenpressF1,andthesystemautomaticallyreturnsyoutothekeyholderentryscreen
and enters the keyholder's tenant code in the tenant field.
Cancel Zoom
If you don't need data from the zoom screen, press Esc, then Ctrl + z to return to the previous
screen, or simply return using F1 and key over the returned data.
MISCELLANEOUS INFORMATION
•
If you need help in any field in the system, check the instructions on the information line at
the bottom of the screen.
•
Ifthecomputerbeepsanddisplaysamessage,orifyouseethesymbol'---'intheinformation
area at the bottom of the screen, press Enter to let the computer know you've read the
message. The computer will not allow further action, and will beep each time you press a
key until you press Enter to acknowledge.
•
•
Occasionally, a screen will not display properly. This can occur when accessing the system
from a remote dial-in terminal via a modem or when the system administrator sends a
message. If this happens, try using Ctrl + r to redraw the screen. To completely clear the
problem, log off the system and log on again.
To save time when moving around the SE 6000 system, it pays to learn the screen titles of
the most commonly used application screens (see the screen location trees and the table
at the end of this section). For fast screen access, type a screen title in the Enter Selection
field(pressEnterinanymenuscreen),thenpressEnterandthesystemimmediatelydisplays
thescreen. NotethatyoushoulddeleteanycharactersremainingintheEnterSelectionfield
before you select Enter.
LOGGING OFF
When the SE 6000 session is completed, press F1 until you reach the main menu screen. From
here, press F1 again; the computer asks for log off confirmation. Enter yes (full word) and press
Entertoleavethesystem. (YoucanalsotypeexitinanyEnterSelectionfieldtoleavethesystem.)
After log off, the computer displays the login prompt again.
Download from Www.Somanuals.com. All Manuals Search And Download.
1-16
SECTION 1: INTRODUCTION
IMPORTANT
LogofftheSE6000systemformallybeforeyouleavetheterminal. Ifyoudonotlogoff, anyaction
taken by the next person at the terminal will appear under your name.
SHUTTING DOWN
Always use the following procedures, in the order given, when powering off the SE 6000:
1. Gotothemainsystemterminal(systemconsole). Thisterminalhasoverallcomputercontrol
and displays all system messages.
2. Log off the system using the procedures given in the previous subsection.
3. Log in using the SHUTDOWN login. Your system administrator will provide you with the
password. Ifotherusersarestillloggedon, youmayhavetopressEntertocontinuetheshut
down process which will forcibly log off other users.
Step 3 automatically shuts down the SE 6000 system in an orderly way. The last message
displayed when the internal shutdown procedures have completed is Safe to Power Off or Press
any Key to Reboot. It is now safe to power off the computer. To restart the computer, press any
key and follow the instructions in the following subsection.
RESTARTING
Use one of the following methods, Automatic or Manual, when powering on the SE 6000 (the
shutdown / restart process is also known as rebooting the computer).
Automatic Restart
The SE 6000 has an automatic restart capability that reboots the system in the event of a power
interruption. If unattended, the Boot prompt displays for 30 seconds, then the auto-boot function
reloads the operating system and restarts the application including the pollers.
Manual Restart
1. Turn the power on; the computer displays Boot. Press Enter to continue.
2. After various messages, the computer displays Type Control-d to Proceed with Normal
Startup (or give root password for system maintenance). Press and hold the Ctrl key, and
press the d key (lowercase).
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 1: INTRODUCTION
1-17
3. The computer displays Enter new time ([yymmdd]hhmm). Change the date and time values
as required (do not enter the parentheses or brackets); press Enter when completed. To
keep the displayed date and time, press Enter.
4. The computer continues its startup procedures, and the login prompt displays after a brief
pause. If any other message displays apart from those noted here, just press Enter.
SYSTEM SCREEN TREES
The SE 6000 screens are arranged in tree structures, with hierarchies established from the
primary screen to the lowest level screens in each tree. Each screen has a unique title which
displays in the upper-left.
Appendix A: System Screen Trees
Treestructuresforthefirstsevenstandard-productselectionsonthesystemmainmenuaregiven
in Appendix A:
•
•
•
•
•
•
Monitor Security Activity
Security Management Reports
Master File Entry
Master File Reports
Key Inventory / Parking Stickers
System Administration
Appendix B: System Screen Hierarchies
Appendix B lists all screens within their respective tree structures, along with a brief explanation
foreach. Leftcolumnindentionsshowtherelativepositionofeachscreenwithintheindividualtree
structures. Indentedscreenscanbeaccessedonlyfromthepreviouslevelinthescreenhierarchy.
OPTIONAL FEATURES
A variety of optional software packages are available with the SE 6000:
IQ. A report writer package that allows the user to select, sort, display and / or print database
information in a format specified by the user. It can be used for quick ad hoc enquiries or formal
reports. Once defined, report formats may be saved and rerun on demand.
CCTV Camera Switcher Control. Controls the actions of closed-circuit television system
switchers, allowing the system to switch video output from a particular camera to a specified
monitor. When used in conjunction with the system flexible event handling feature, this provides
an important method for monitoring system events.
Download from Www.Somanuals.com. All Manuals Search And Download.
1-18
SECTION 1: INTRODUCTION
ControllerSystems. ControllersystemsarecomputersrunningtheSE6000local(LC)orremote
location controller (RLC) software. The LC system is a computer attached via dedicated lines to
the host. The RLC system is a computer attached via dial-up telephone lines to the host.
Elevator Control. Permits floor-by-floor control of elevator call buttons. When a keyholder
presents a key to a reader in the elevator, certain buttons, wired via computer-controlled output
contracts, can be enabled or disabled for use. The keyholder is able to select only those which
have been enabled for his / her specific access privileges.
Guard Tour. Schedules and monitors security personnel guard tour activities. Specifies certain
reader output points as guard tour points, and assigns the minimum and maximum times which
can pass between stops on the tour. The feature reports if tours have started too early or too late,
or if too little or too much time has passed between stations.
Parking Control. Controls and monitors a parking facility including employee and revenue
generating parking spaces. Includes keyholder and daily cash customer functions, tenant billing,
and overage features. Supported hardware includes point-of-sale terminals, automated ticket
dispensers, and gate control mechanisms. Produces detailed reports for keyholders, cash
customers, parking lot attendant activity, and keeps track of the number of cars in the lot on a
tenant-by-tenant basis.
Remote Dial-Up Interface (RDI). Permits communication with remotely-located 8xx-series
devices via dial-up telephone lines. The feature retains transaction information, and determines
when conditions at a remote site warrant a call to the host (alarm event occurring, log buffer
reachingauser-definedthreshold, etc.). Frequencyandcalldurationaredeterminedbytheuser.
The host contacts remote sites in turn to access information and to transfer event logs.
Time and Attendance. Captures hours worked by each employee for transfer to a payroll or
accounting system. The feature can be programmed to:
•
•
•
•
Generate specialized reports of time and attendance activity.
Monitor the number of meals taken by a keyholder.
Recognize early and late entrances and exits.
All records can be edited and modified prior to transfer to another system.
Visitor Control. Tracks visitors, prints visitor badges (black and white or color), and creates
comprehensive reports of visitor activity. The feature also provides a record of who was visited
and the date. It provides the company name of the visitor if applicable.
WSEID-4000Interface. IntegratesoneormorePolaroidID-4000photobadgingsystemswiththe
SE 6000. Keyholder information and photo IDs created on the Polaroid system are transferred
viaaLANorserialconnectiontotheSE6000. BadgescanbeprintedonfilmoronPVC.Keyholder
maintenance may be initiated on either system; all data is stored in a single database resident on
the SE 6000.
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 2: MONITOR SECURITY ACTIVITY
2-1
SECTION 2
MONITOR SECURITY
ACTIVITY
INTRODUCTION
Systemmonitoringandcontrolisperformedviathemonitormenu, thefirstselectioninthesystem
main menu. The monitor menu screen is shown below.
Notice this is a split screen, with the lower half constantly updated as transactions (any system
event) occur. Most monitor screens are divided this way, and for user convenience the screen
examples from this point on are shown without the transaction listings. Also, other screens not
accessed from the monitor menu in this section are reduced to show the required data fields only.
SECTION ORGANIZATION
Theproceduresinthissectionareintheordershowninthemonitormenu (above). Theassociated
subscreens also follow in order (the section table of contents reflects the hierarchies).
Download from Www.Somanuals.com. All Manuals Search And Download.
2-2
SECTION 2: MONITOR SECURITY ACTIVITY
FUNCTION KEYS
Beneath the transactions display are the applicable function keys for each screen, with the key
actions shown next to the key numbers. For most function key actions, the system displays
messages confirming that the action has been completed, e.g., POLLER STOPPED.
In general, F1 is used to exit from the current screen, and F7 and F8 are used respectively to
displaythepreviousscreenandthenextscreenwithinthesetofscreensthatapplytotheparticular
data item being controlled or when there are more items then will fit into a single screen.
DATA ITEM SELECTION
Usetheupanddownarrowkeystoselectthedataitemtobecontrolled, thenpresstheapplicable
function key for the system action to be taken.
CONTROL FUNCTIONS MENU
Pollers
The Control Pollers screen displays point ID, description, status.
Control Pollers Function Keys
F2HALT. Stopapollerwhenworkistobeperformedondevicesattachedtothepollerortoreload
a poller parameter following a change.
F3RESTART. Restartthepollerwhenworkiscompleted(systemdisplaysmessagesannouncing
eachdeviceattachedtothepollerasitcomesbackonline). Iftherearedeviceswithsystemorkey
checksum errors, perform a reset to the device.
F4DEVCOMM. Thisfunctionmonitorscommunicationbetweenthepollersandthedevicepollers.
In normal operation, the devices are asked for information by the pollers many times a second,
and with a properly operating system the controller screen updates rapidly.
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 2: MONITOR SECURITY ACTIVITY
2-3
When F4 is pressed, a second screen displays showing the connections between the host and
the devices of the particular poller selected:
Poller-device communication should be one of the first items checked whenever there is an
apparent problem with the system.
Devices
The Control Devices screen displays point ID, description, status, tamper, shunt. Applies to
NexSentry, 422, and 8xx-series ACUs.
Control Devices Function Keys
F2DEVSTAT. DeviceStatus—WhenF2ispressed,asecondscreendisplaysshowingthestatus
of the particular device selected:
F3DEVRSET. DeviceReset—UsedwhensettingupnewACUsorreestablishingrepairedACUs,
or when the integrity of the data currently resident in the ACU is suspected. Downloads all host
device data to the ACU and silences a latched alarm.
Download from Www.Somanuals.com. All Manuals Search And Download.
2-4
SECTION 2: MONITOR SECURITY ACTIVITY
F4 KEY RSET. Key Reset—Used when setting up new ACUs or reestablishing repaired ACUs,
or when the integrity of the data currently resident in the ACU is suspected. Downloads all host
key data to the ACU.
F5 SHUNT. Shunt a device.
F6 UNSHUNT. Unshunt a device previously shunted.
Locks
The Control Locks screen displays point ID, description, lock status, shunt, sensor, coax, door
status.
Control Locks Function Keys
F2 LOCK. Lock selected door. If no door is selected, F2 locks all doors in the zone.
F3 UNLOCK. Unlock selected door. If no is door selected, F3 unlocks all doors in the zone.
F4 TIME OPEN. Unlock selected door for the amount of time programmed at the ACU or on the
readerentryscreen. Ifnodoorisselectedinazone, F4unlocksalldoorsinthezonefortheamount
of time programmed.
F5 SHUNT. Shunt a door.
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 2: MONITOR SECURITY ACTIVITY
2-5
F6 UNSHUNT. Unshunt a door previously shunted.
Input Points
The Control Inputs screen displays point ID, description, point status, tamper, shunt.
Control Inputs Function Keys
F5 SHUNT. Shunt a selected input point. If no input point is selected, F5 shunts all input points
in the zone.
F6 UNSHUNT. Unshunt a selected input point previously shunted. If no input point is selected,
F6 unshunts all input points in the zone.
Output Points
The Control Outputs screen displays point ID, description, status, shunt.
Control Outputs Function Keys
F2ACTIVATE. Activateaselectedoutputpoint. Ifnooutputpointisselected,F2shuntsalloutput
points in the zone.
F3 NORMAL. Deactivate a selected output point. If no output point is selected, F3 deactivates all
output points in the zone.
F5SHUNT. Shuntaselectedoutputpoint. Ifnooutputpointisselected,F5shuntsalloutputpoints
in the zone.
Download from Www.Somanuals.com. All Manuals Search And Download.
2-6
SECTION 2: MONITOR SECURITY ACTIVITY
F6 UNSHUNT. Unshunt a selected output point previously shunted. If no output point is selected,
F6 unshunts all output points in the zone.
Doors
The Control Doors screen displays point ID, description, status, and shunt of the door switches.
Control Doors Function Keys
F5 SHUNT. Shunt a selected door. If no door is selected, F5 shunts all doors in the zone.
F6 UNSHUNT. Unshunt a selected door previously shunted. If no door is selected, F6 unshunts
all doors in the zone.
Select Zone
The Select Zone screen displays zone, description, count, PBarea, PBtype, PBlevel (see F3
RSET CNT below).
UsethearrowkeytomakethedesiredselectionandpressF2. Controlactivityremainsexclusively
for this zone until you return to the monitor menu.
The keyholder count fields apply if passback control is in effect for the zone selected
Select Zone Function Keys
F2 SEL ZONE. Select zone.
F3 RSET CNT. If passback control is in effect for a zone, the following display:
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 2: MONITOR SECURITY ACTIVITY
2-7
Count
— Number of keyholders currently in the zone.
PBarea — Passback zone type—personal, vehicle, none.
PBtype — Passback type —hard, soft, none.
PBlevel — Passback control—global (host), local (ACU), none.
Note that zone count is automatically reset whenever a zone is selected.
Multi-user systems employ record locking techniques for keyholder file maintenance, and locked
records are not updated by the passback routine that maintains keyholder location. If this occurs,
thekeyholdercountiscorrect, butthepassbackzonereport(whichreadsthekeyholderfile)does
not include the locked records.
F3 corrects the zone count where privileged keyholders (not subject to passback control) have
reentered a controlled zone without having exited in the normal manner or when the previous
defined condition exists.
REVIEW TRANSACTIONS (FULL SCREEN)
This feature displays all transactions in the review transaction memory. Typically, the last 3,000
transactions which occurred are available. To view the screen without interruption, new
transactionsdonotappearwhenusingthisfunction. Ifnokeyboardactionistakenwiththisfeature
for a five-minute period, the system returns to the monitor menu. A sample full screen follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
2-8
SECTION 2: MONITOR SECURITY ACTIVITY
Review Transactions Function Keys
F2 BACKWARD. Page backward through the transactions.
F3 FORWARD. Page forward through the transactions.
F4 OLDEST. Go to first transaction.
F5 LATEST. Go to last transaction.
ALARM SERVICING
The system emits beeps when an alarm occurs, and displays the number of pending and active
alarm data in the upper-right corner of the monitor menu screen: Pending—alarm condition no
longer occurring but not yet formally resolved. Active—alarm condition still occurring. Begin
resolving alarms using the alarm servicing screen:
Alarm Servicing Function Keys
F2VIEWMAP. PressF2todisplayamapshowingalarmlocation. Locationindicatedbythepoint
ID in a red rectangle (other map symbols do not display when an alarm is triggered).
F3INSTRUCT. Instructions—PressF3todisplayalistofactionstotakeinresponsetothealarm.
F4 RESPONSE. Press F4 to display the alarm response entry screen. First enter Y or N in the
situation resolved field (Y cannot be entered if the alarm is still occurring—take action to halt the
alarmcondition), thenentertheactionstaken. Aprintablerecordoftheseactionsiswrittentodisk
(see Section 3: Alarm Servicing Report).
F5 FAST ACK. Fast Acknowledge—Press F5 and the alarm is considered resolved (use with
caution because this does not allow entry of operator response to an alarm).
F6 SIL ALL. Silence All—Press F6 to silence beeping at all terminals.
REAL TIME CONTROL MAPS
Systemactivitycanbemonitoredusingthesystemmapfunction(createdusingtheDRAWMAPS
function—see Section 4: Maps). The maps display triggered alarms (icon displays in red; goes
toyellowwhenpending),doorstatus(messagedisplays),deviceshuntstatus(messagedisplays),
door unlocks (icon goes from black to white).
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 2: MONITOR SECURITY ACTIVITY
2-9
CONTROL PROJECTS
The Control Projects screen (not controllable on LC systems—host only) displays project, status,
description, start, end. The control projects screen permits operator override of doors assigned
to projects which directly affects keyholder access.
Control Projects Function Keys
F2 ACTIVATE. Activates a project.
F3 DE-ACTIV. Deactivates a project.
F4 NORMAL. Normalizes a project based on start/stop dates and time.
ABORT TIMERS
The Abort Timers function (F6) allows you to stop interactive timers that have started.
OTHER FUNCTIONS
Printer Control
Control Printers Function Keys
F3 RELOAD. Reloads printer data from the host which resets the printer logic and font size.
Download from Www.Somanuals.com. All Manuals Search And Download.
2-10
SECTION 2: MONITOR SECURITY ACTIVITY
F5 PRNT ON. Switch printer #1 on or off depending on current state (used to control log printer
only).
F6 PRNT ON. Switch printer #2 on or off depending on current state.
Forgive Passback
A passback violation occurs when a keyholder uses their key to reenter a door without first using
their key to exit the same door. For example, a keyholder (number 1) uses their key and unlocks
the door. The system flags keyholder number 1 as "in." Keyholder number 1 passes their key to
keyholder number 2. When keyholder number 2 attempts to use the key, the systems gives
keyholder number 1 a passback violation. This was originally developed for parking lot control.
The system handles vehicle and personal passback separately.
To allow the keyholder to enter the area, use the forgive passback function.
1. Enter key number (or ALL for all keyholders); press Enter.
2. Press F1 to confirm the passback forgive.
Manual Access Granted
Usedwhenacommandkeyisnotavailable(mislaid,stolen,etc.),thisfunctionallowstheoperator
to grant manual access following entry of the key number (system records entry). Enter the key
number and reader ID. Enter the keyholder ID if the key number is unknown. Manual access is
available for all keyholders at any reader regardless of access assignments.
Force Table Download
This function first writes database information to a text file, then transfers the information to host
memory and LC memory (if applicable). The function is used during system servicing, and when
requested by customer support. A sample screen follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 2: MONITOR SECURITY ACTIVITY
2-11
When requested, enter the number of the table to be downloaded and press Enter. The system
requests confirmation — press F1. REPACK OK displays when transfer completes.
Remote Devices
This function is used to establish a telephone connection to a remote device to perform certain
actions, for example, unlock a door to a remote ATM for Service. Note that the remote device
remains connected until the operator selects the device and presses F3-Hang Up.
Control Remote Devices Function Keys
F2 CALL/HLD. Call device.
F3 HANGUP. Disengage connection.
Building Modes
Building modes — open, closed, limited — combined with the ACU report definitions provide an
extra level of security when the building is empty or a reduced number of staff are present. Door
switches and / or other monitor points active in the building open mode can be configured to
generate alarms if activated when the building is in limited or closed mode. Also, if open mode,
closed mode, or station readers have been defined, reader operation for those locations will
change when the building mode changes. For example, an open mode reader will not read keys
when the building is in limited or closed mode.
Control Building Modes Function Keys
F2 OPEN. Change current building mode to open.
Download from Www.Somanuals.com. All Manuals Search And Download.
2-12
SECTION 2: MONITOR SECURITY ACTIVITY
F3 LIMITED. Change current building mode to limited.
F4 CLOSED. Change current building mode to closed (takes approximately one minute to
complete). If a device input point configured to prevent building closure is active, the building will
remain in the limited mode until the point is cleared.
Full Screen Monitoring
Displays system logs in a manner similar to the review transactions feature (see Review
Transactions—FullScreeninthissection)exceptthatnewtransactionsdisplayastheyoccur.Use
F8 to toggle between full and half screen displays.
MISCELLANEOUS INFORMATION
Disk Almost Full Warning
This feature warns operators when the disk drive has reached a specified percentage of its total
capacity:
Whenthewarningappears,takeimmediateactiontoreducetheamountofdatastoredonthedisk
(delete unwanted files, etc.).
This feature uses the DISKWARN keyword parameter located in the $DATAPATH/PARAMS.M
file:
Parameter
Default Condition
DISKWARN keyword missing
DISKWARN =0
—
—
—
Defaults to 90%
Feature disabled
DISKWARN =n
Feature enabled; n is the range 1—99
NOTE
1. Shut down and reboot after changing DISKWARN parameters.
2. The DISK ALMOST FULL message is generated only once.
3. Since the message is generated only once, we recommend that system message #242 be
changed to an alarm event by changing the alarm priority field to a value greater than 0. See
Section 6, Transactions [tranentr] for details.
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 2: MONITOR SECURITY ACTIVITY
2-13
Status Screen Function Timeout
Some system functions temporarily disable the realtime display until the sub-menu is exited. The
status screen function Timeout feature provides a user-defined method for controlling the length
of time that the realtime display is disabled. If the system does not detect any keyboard or mouse
activity for the number of seconds defined by the TIMEOUT parameter, the monitor program
returns to the previous menu and resumes realtime display.
This feature uses the parameter file $DATAPATH/MONITOR, with the control parameter
TIMEOUT having a numeric value in seconds:
Parameter
Default Condition
Parameter missing
TIMEOUT=0
—
—
—
—
TIMEOUT defaults to 0—feature disabled
Feature disabled
TIMEOUT=n
Feature enabled using the numeric value n (five digits maximum)
Feature enabled using the numeric value 600—600 seconds, default
TIMEOUT=600
NOTE
1. The control parameter is read by the monitor program at log-on time and remains in effect
as long as the monitor program is active. A change to the Timeout value does not take effect
until the user logs off, and then logs back on to the system (reboot not required).
2. This feature is operational with the following screens:
A. The device communication function of the control pollers screen (see Pollers in this
section).
B. The device status function of the control devices screen (see Devices in this section).
Alarm Servicing — No Activity Timeout
This feature controls how long the alarm servicing screen displays when there is no keyboard or
mouse activity. On Timeout, the system exits the alarm servicing program and returns to the
realtime display of system events.
This feature uses the $DATAPATH/ALARMSRV parameter file, with the control parameter
TIMEOUT having a numeric value in seconds: Acceptable values are:
Parameter
Default Condition
Parameter missing
TIMEOUT=0
—
—
—
—
TIMEOUT defaults to 0—feature disabled
Feature disabled
TIMEOUT=n
TIMEOUT=600
Feature enabled using the numeric value n (five digits maximum)
Feature enabled using the numeric value 600—600 seconds, default
Download from Www.Somanuals.com. All Manuals Search And Download.
2-14
SECTION 2: MONITOR SECURITY ACTIVITY
NOTE
1. The control parameter is read by the alarm servicing program at log-on time and remains in
effect as long as the alarm program is active. A change to the Timeout value does not take
effect until the user logs off, and then logs back on to the system (reboots).
2. Timeout is deactivated when responding to an alarm in the alarm response screen.
Monitoring Security - Passwords
With enhanced monitor security function and the addition of password logic, any or all portions of
the monitor functions can be set up to require a valid ID and password combination before the
functioncanbeinitiated. Inplaceofthefactory-suppliedstatuslogin,theusermaycreateasimilar
login ID, with or without password, and control access to monitor capabilities. While many
operators may use the generic login, individual users will have only monitor privileges consistent
with their own custom security profiles.
This feature uses the PASSWORD keyword parameter located in the $DATAPATH/MONITOR
file. The acceptable values are:
PASSWORD keyword missing
PASSWORD=0
—
—
—
Feature disabled
Feature disabled (default)
Feature enabled
PASSWORD=1
This feature also requires that the user has a custom security profile. See also note #1 regarding
system upgrades with users created on an earlier version of the software.
Implementing the Feature
For additional information see Chapter 6, Adding a User.
1. Log on using an assigned login name and password, or use a generic login name (and
optional password) as required by facility procedures.
2. With the password feature enabled, any action attempted from the monitor for which
permission has not been granted causes the system to prompt for a login name and
password.
3. If the login name and password entered are valid, the associated security profile initiates the
action requested (see note #4).
4. If the feature is disabled or an incorrect login / password is entered, the system displays
PERMISSION DENIED.
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 2: MONITOR SECURITY ACTIVITY
2-15
NOTE
1. Ifyoursystemhasbeenupgraded, anduserscreatedonapreviousreleasehavebeen
saved, their user profiles must be updated with the new monitor security privileges. To
dothis,logonasadduserswiththecorrectpassword,selectsystemadministration,and
then select add users. Update the security profile for each user as follows:
-
-
-
-
Enter the user ID
Select modify—F5
Press the return key through all fields
Store the updated profile—F8
Repeat for all applicable users. The new custom security information is appended
without changing the current privileges.
2. If the password keyword parameter is changed, users must log off then log back on
(reboot) before a change is recognized by the monitor program.
3. All functions that generate log messages are logged with the user ID entered to gain
access to the requested function.
4. Permissions associated with the entered login ID remain in effect until the operator
returns to the point where the login ID and password were required, or, if the status
screen function Timeout feature has been enabled, the screen itself will Timeout (see
Status Screen Function Timeout Feature in this section).
Modified Usage of Invalid Facility Code Log
Thisfeaturesuppressesakeyholder'snamefromthemonitoringscreenandvariousreportswhen
an INVALID FACILITY CODE message is logged. In some cases, this resulted in a log message
erroneously associating a valid keyholder with an invalid facility. This function is automatic and
does not require operator action.
NOTE
This occurred with the 708 type device where different facility codes were used on different
buildings.Itonlyappliesto1030/1040cardswithfacilitycodeswhereauserhaskeyswithmultiple
codes.
Download from Www.Somanuals.com. All Manuals Search And Download.
2-16
SECTION 2: MONITOR SECURITY ACTIVITY
1. This feature affects the following displays and reports:
-
-
-
-
-
-
Monitor screen, both full- and half-screen displays
Review transactions screen
Point history report
Keyholder history report
Transaction history report - all sort options
Archive history report - all sort options
2. Log records are not altered.
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 3
SECURITY REPORTS
INTRODUCTION
Security management reports provide a permanent record of transactions, and are also used to
examine specific events. The reports are accessed through the security management reports
menu screen, [accsmenu], via the main menu. In this section, the reports are documented
following the security management reports menu sequence (see section table of contents). A
sample [accsmenu] screen follows:
All screens in this section show the system default values, with most screen fields requiring a
numeric range entry. For example, the default range for keyholders is 1 — 999999999 (to reduce
waiting time while a report is generating, enter the smallest range of numbers for each category
which will still provide the information required). Other screen fields include choices for a specific
data item, date ranges, regular or extended information, and report sequencing. When all fields
have been entered, press Enter (Yes - default) to begin report generation:
Oncecompiled,areportoutputselectiondisplays. Normally,1(systemreportprinter)orD(display
at terminal) is chosen. Report totals are printed at the end of each report.
Download from Www.Somanuals.com. All Manuals Search And Download.
3-2
SECTION 3: SECURITY MANAGEMENTS REPORTS
NOTE
1. Some reports are over-wide (132 characters instead of the standard 80 characters), and
havebeenformattedtouseasmallerprintsizenotavailablewithsometerminals(HPprinters
can handle the smaller print). These reports can be displayed but will 'wrap'; that is, some
lines continue to the next display line . In such a case, use the display option to check report
details, then use one of the print options to create a hard copy of the report.
2. For color PCs with Reflections 4 software, or an HP700/44, the display automatically
changes to the 132-column mode for any reports with lines exceeding 80 characters.
POINT HISTORY REPORT
The point history report, [phstrprt], lists transaction activity at a specific point. The report lists the
key number and name (if any) associated with a transaction, date and time, and description.
Tofacilitateprocessing,onlythelast20transactionsareused. Ifmorethanthelast20transactions
are required, use the transaction history report. A sample [phstrprt] screen follows:
Point History — Sample Report
06/27/96
14:36
Packlett Industries
Point History
PAGE
1
KeyhldID Keyholder Name
________ _______________
Date
_____
Time
____
Access Description
_________________
166603 HALSTON RICHARD
166603 HALSTON RICHARD
166755 GREENE LORRAINE
166755 GREENE LORRAINE
161221 ROBINS JAMES
161221 ROBINS JAMES
163878 COUSINS TERRY
163878 COUSINS TERRY
165446 AVERY JOE
06/24/96 16:50:47 MANUAL LOCK
06/24/96 16:50:46 MANUAL OPEN
06/24/96 16:50:45 MANUAL LOCK
06/24/96 16:50:44 MANUAL OPEN
06/24/96 16:50:43 MANUAL LOCK
06/24/96 16:50:42 MANUAL OPEN
06/24/96 15:09:23 MANUAL LOCK
06/24/96 15:09:21 MANUAL OPEN
06/21/96 14:19:22 UNABLE TO UNLOCK DOOR
06/21/96 13:55:47 UNABLE TO LOCK DOOR
165446 AVERY JOE
KEYHOLDER HISTORY REPORT
Thekeyholderhistoryreport,[chstrprt],listsactivitiesforaspecifickeyholder. Also,thereportcan
be used for tracking actions taken by a system operator. The report contains point or sensor data
showingwhereactivityoccurred,dateandtime,anddescription. Tofacilitateprocessing,onlythe
last 20 transactions are used. If more than the last 20 transactions are required, use the
transaction history report. A sample [chstrprt] screen follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 3: SECURITY MANAGEMENT REPORTS
3-3
Keyholder History — Sample Report
06/27/96
14:36
Packlett Industries
Point History
PAGE
1
Point Point Description
_____ ____________________
Date
________
Time
________
Access Type
__________________
Keyholder
2771 Dale, Deborah
0225 RDI-8082-SEN2
0221 RDI-8082-SEN1
0215 RDI-8081-SEN1-READER
0220 T&A READER 3 N/A
0210 T&A READER 2 OUT
0200 T&A READER 1 IN
06/27/96
06/27/96
06/27/96
06/26/96
06/26/96
06/26/96
09:32:52
07:34:24
07:34:22
15:40:42
15:40:40
15:40:34
ACCESS GRANTED
ACCESS GRANTED
ACCESS GRANTED
MANUAL OPEN
MANUAL OPEN
MANUAL OPEN
0120 ELEVATOR FREIGHT CAR
06/26/96
15:40:31
MANUAL LOCK
TRANSACTION HISTORY REPORT
The transaction history report, [excprprt], lists all transactions according to selected criteria. The
transaction report function is used to create a who, what, where, and when report of all
transactions.Thisfunctionincludesinformation abouttheIDanddescriptionofthepointorsensor
where the transaction occurred, the zone number of the point or sensor, the date and time of the
transaction, the type of access (for an access transaction) and the ID and name of the keyholder
involvedwiththetransaction,ifany.Tworeporttypesareavailable:shortandextended. Theshort
report accesses all standard information; the extended report does the same but includes user-
defined field information. A sample [excprprt] screen follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
3-4
SECTION 3: SECURITY MANAGEMENTS REPORTS
Transaction History — Sample Report
11/15/96
10:34
SHARPSMITH LABS, INC.
Access Control Transaction Report
Page 1
Point Point Description
_____ _______________________ ____ ____
Zone Date
Time
____
Access Type
Keyholder Keyholder Name
Key No
_______________________ _________ ________________ ______
1 HOST
1 HOST
1 HOST
1 HOST
1 HOST
1 HOST
801 10/28/96 11:12:00 FORGIVE PASSBACK
0 10/28/96 11:23:00 REPACK OK
801 10/28/96 13:37:00 FORGIVE PASSBACK
001 10/28/96 14:12:00 FORGIVE PASSBACK
0 10/28/96 14:17:00 REPACK OK
661094 Stanling, Bob
34421
662886 Jonesman, Linda 32211
656633 Buchmann, G.T.
641918 Saunder, Rick
34588
34876
0 10/28/96 14:49:00 FORGIVE PASSBACK
ACCESS CONTROL ARCHIVE REPORT
The access control archive report, [acrtrprt], is identical to the transaction history report (previous
report) except that it reads data from an archive tape rather than from the system database.
ALARM SERVICING REPORT
The alarm servicing report, [almarprt], details actions taken by operators in response to alarms.
A sample [almarprt] screen follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 3: SECURITY MANAGEMENT REPORTS
3-5
Alarm Servicing — Sample Report
06/27/96
15:01
PacAtlantic Racing
Alarm Master List
PAGE 1
Alarm No Alrmtime Alrmdate Point Zone Resp Time Resp Date Clear Time Clear Date Serviced By
________ ________ ________ _____ ____ _________ _________ __________ __________ ___________
Point Descrip = CHEMICALS GPS 3
2851 09:18:00 06/26/96
20
3 14:19:05 06/26/96 11:10:10
Alarm Instructions:
06/26/96
Maintenance
Operator Response:
CALLED FIRE DEPT.
CLEARED BUILDING
OPENED VENTS
PUT ON MASK
CALL FIRE DEPARTMENT IMMEDIATELY
EVACUATE ALL PEOPLE FROM BUILDING
OPEN EMERGENCY VENTS
LEAVE BUILDING
LEFT BUILDING
REENTERED WHEN ALL CLEAR
PASSBACK ZONE REPORT
Thepassbackzonereport,[whowhere],listskeyholderscurrentlypresentinpassbackzones.The
summaryselectionprovidestotalsbyzone, whilethedetailedreportlistsspecifickeyholders. The
source for the information is the keyholder file. A sample [whowhere] screen follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
3-6
SECTION 3: SECURITY MANAGEMENTS REPORTS
Passback Zone — Sample Report
04/05/96
14:43
Easthaven Manufacturing
Passback Zone Report
Page 1
Keyholder
_________
Key No Keyholder Name
_____ __________________________ ______ _____
Tenant Pzone
Vzone
_____
1055699
1061128
1086201
1099004
1100015
1116345
83383 MAITLING, JACK
84128 LYONS, CINDY
83361 DENEUVE, DENISE
86660 SMITH, PAULA
87083 MACKLING, JACKIE
88883 FLYNN, SEAN
0
0
0
0
0
0
-1
-1
0
1
-1
-1
-1
-1
-1
2
-1
-1
DOWNLOAD STATUS REPORT
The download status report, [downrprt], is used to create an audit-trail of system information
changeattempts, thedevicesaffected, whoattemptedthechanges, andwhenandifthechanges
were successful. A sample screen follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 3: SECURITY MANAGEMENT REPORTS
3-7
Download Status — Sample Report
06/27/96
15:03
Nevadia Industries
Download Status Report
PAGE 1
Serial # Key Value File Descrip Typ Date
_________ _________ ____ _______ ___ ____
Time Maint By Status
____ ________ ______
Point Point Descrip
_____ _____________
21729
21730
21731
21723
21724
21725
21726
76
76
76
2 Points Chg 06/27/96 08:34 Paul
Received & Processed
Received & Processed
Received & Processed
Received & Processed
Received & Processed
Received & Processed
Received & Processed
0 HOST
2 Points Chg 06/27/96 08:34 Paul
2 Points Chg 06/27/96 08:34 Paul
8 Events Del 06/27/96 08:31 Paul
8 Events Del 06/27/96 08:31 Paul
8 Events Del 06/27/96 08:31 Paul
8 Events Del 06/27/96 08:31 Paul
60 1ST CNTRLLER
61 CNTRL P28081
0 HOST
52 BAIL C1 CNTRL
60 1ST CNTRLLER
61 CNTRL P28081
21463
21463
21463
21463
Possible system messages for this report are:
Unprocessed — Information changed in the database, but has not yet been sent to the
communications program module.
Before Transmit— Information has been sent to the communications program module, but
has not yet been sent to target device.
Transmitted—Datahasbeensentfromthehosttothetargetdevice,butacknowledgmenthas
not yet been received from the target device.
Received and Processed— Information successfully transmitted by the host and success-
fully received by the target device (download completed).
ERR Transmitting Data— Error on host side of transmission. Normally, this means that the
host communications program module was unable to complete the requested download.
ERR Receiving Data—Informationsuccessfullytransmittedbythehost, butthetargetdevice
was unable to receive.
Download from Www.Somanuals.com. All Manuals Search And Download.
3-8
SECTION 3: SECURITY MANAGEMENTS REPORTS
KEYHOLDER ZONE REPORT
The report lists the most recent zone information for all keyholders that meet the search criteria;
however, information is not necessarily current. A sample [kyznrprt] screen follows:
Keyholder Zone — Sample Report
05/12/96
14:41
Vogler Vineyards
Keyholder Zone Report
Page
Time
1
Keyholder Keyholder Name
Tenant Point Point Description Date
Zone
_________ ___________________ ______ _____ _________________ _______ _______ ____
10556 MAITLING JAMES
10564 LYONS SHELLEY
10569 MCDUFF GORDON
10622 DENEUVE DENISE
10643 SMITH PAULA
0
0
0
0
0
0
3120 808SX RDR 2
3120 808SX RDR 2
3120 808SX RDR 2
3120 808SX RDR 2
3120 808SX RDR 2
3120 808SX RDR 2
04/02/96 16:48:12
04/02/96 16:48:12
04/02/96 16:48:12
04/02/96 16:48:12
04/02/96 16:48:12
04/02/96 16:48:12
0
0
0
0
0
0
10701 HERALD RICHARD
EVENT / POINT REPORT
Theevent/pointreport,[evptrprt],liststhenumberofeventsofaparticulartypethathaveoccurred
at a point or within a range of points. The report is limited to the current contents of the archive
history file. A sample [evptrprt] screen follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 3: SECURITY MANAGEMENT REPORTS
3-9
Event / Point — Sample Report
03/17/96
09:15
Security Electronics
Event/Point Report
Page 1
Point Point Description
Tran.
Tran. Description
Occurrences
______________________________________________________________
___________
1 HOST
1 HOST
2 DATA BASE POLLER
2 DATA BASE POLLER
4 808/422 POLLER
4 808/422 POLLER
231
242
24
25
222
224
PROJECT DEACTIVATED
DISK ALMOST FULL
POLLER STARTED
POLLER STOPPED
POLLER STOPPED
POLLER STARTED
2
5
1
1
2
12
REALTIME PASSBACK ZONE REPORT
Therealtimepassbackzonereport,[rpasrprt], isessentiallythesamereportasthepassbackzone
report (described earlier in this section), with one important difference. The realtime report is
created directly from shared memory instead of from the database. This feature substantially
reduces the amount of time necessary to find out where keyholders are currently located. This
canbeveryusefulformonitoringhazardousareas, orwhenitisimportanttorapidlydeterminethe
number or identity of the keyholders in a particular zone.
Download from Www.Somanuals.com. All Manuals Search And Download.
3-10
SECTION 3: SECURITY MANAGEMENTS REPORTS
REALTIME PASSBACK DETAIL — SAMPLE REPORT
03/14/96
15:18
McPowell-Angus Aviation
Realtime Passback Detail Report
Page 1
Keyholder Key No Keyholder Name
_________ ________ _________________________
223141 188954 McDaniels, Jeff
237473 140226 Wellington, Lambert
233974 195226 Du Pont, Michael
239965 200026 Senter, Carol
Tenant Pzone Vzone
______ _____ _____
0
0
0
0
0
0
-1
-1
-1
-1
-1
-1
-1
-1
248366 180463 Pons, Antonia
249037 143511 Segwick, G.J.
-1 7100
-1 -1
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 4: MASTER FILE ENTRY
4-1
SECTION 4
MASTER FILE ENTRY
INTRODUCTION
The master file entry procedures are used to create and maintain the database. All initial system
data is entered following the methods detailed in this section. The data item menu screens are
accessed via the master file entry menu [fmntmenu], displayed via the main menu. A sample
[fmntmenu] screen follows.
Somemasterfileentryproceduresareusedmorefrequentlythanothers. Forexample,keyholder
data is usually added, changed, and deleted daily. On the other hand, additions or changes to
system configuration information may occur only once every several months.
Screen Access
The procedures in this section are in the order as they appear on the [fmntmenu] screen (above).
Following each menu entry are the associated subscreens, again in order (the section table of
contents reflects the hierarchy). After the current screen has been saved (F6), most subscreens
display by pressing F2 but some display automatically.
Download from Www.Somanuals.com. All Manuals Search And Download.
4-2
SECTION 4: MASTER FILE ENTRY
KEYHOLDERS
Four data entry screens are used to add new keyholders to the system, and to change or delete
existing keyholder information:
1. Keyholder Entry - Page 1, [key_entr]. Used to enter primary keyholder information.
2. Keyholder Entry - Page 2, [key1entr]. Used to enter optional keyholder information.
3. KeyholderAccessEntry,[empgentr]. Usedtoenteraccesscodes,accessgroups(keyholder
access assignments), etc.
4. Project Assignment [epj_entr]. Used to enter projects, if applicable.
The first screen, [key_entr], is accessed from Keyholders (first item in the [fmntmenu] menu); the
other screens are displayed using F2 after the previous screen has been saved.
IMPORTANT
1. All keyholder data is linked to the keyholder ID rather than by key number or name. This
allows the change or removal of key numbers from the system—a frequent requirement—
without affecting entire keyholder records.
2. Forfuturereportingpurposes,werecommendthatthekeyholderIDrecordberetainedwhen
a keyholder leaves your facility. To block the keyholder ID from normal system processing,
enter zero for the key number in [key_entr], and/or delete access assignments (Esc, d, r)
in [empgentr].
Keyholder Entry—Page 1 [key_entr]
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 4: MASTER FILE ENTRY
4-3
KeyholderID. RequiredintheAddmode(thesystemdeniesfurtherscreenaccessuntilthis
field is entered). Enter a unique nine-digit maximum keyholder ID number (alphabetical
letters are not supported).
Last Name. Optional. Enter the keyholder’s last name.
First Name. Optional. Enter the keyholder’s first name.
NOTE
Namesareindex-maintainedratherthansequential, allowingquickkeyholderrecordsearch
by name or partial name.
Key Type. Required. Enter the key type code number:
*
=
=
=
=
=
No key (default)
1
2
3
4
1030
1040
1050
1060 and digital keys
Note that if the key type is unknown, use type 3. This can be changed later if necessary.
Facility code. Required for 1030 / 1040 key types. Enter the four-digit facility code printed
on 1030 and 1040 keys; example: DO34. Default is **** — No facility code.
Key Number. Conditional. Enter an eight-digit maximum key number. If you do not wish
to select a key number at this point, the system default 0 is entered automatically.
PIN # (personal identification number). Required if certain keypad identification equipment
is used with your system (MCCI or VIP-2 poller); otherwise, disregard this field.
Tenant Number. Optional. Enter a four-digit maximum tenant code (zoom available).
Default is tenant 0.
User-defined field titles. Using the control file maintenance screen (see Control File
Maintenance [ctrlentr] in Section 6), these field titles can be changed to suit the individual
user. Entriesarenumericandpointtoadescriptiontable. (Appliesalsotofieldsusr1through
usr6, and Remarks, in [key1entr].)
Company
Dept
—
—
—
—
—
—
Keyholder's company name
Keyholder's department name
Location of keyholder's department
Keyholder's job category
Location
Jobcat
Shift
Keyholder's normal working hours
Keyholder's status
Emp Stat
Download from Www.Somanuals.com. All Manuals Search And Download.
4-4
SECTION 4: MASTER FILE ENTRY
Issue Date. Optional. Enter the date that the access control card for the keyholder will
become valid. Default is current system date. Note that a future date will not permit access
until that date is reached.
Issue Time. Optional. Enter the time that the access control card for the keyholder will
become valid. Note that this only applies with host access. Default is current system time.
Return Date. Optional—Recommended if keyholder is a visitor (see Visitor below). Enter
the final date that the keyholder's card will be valid. Default is ******** — No expiration date.
Return Time. Optional—Recommended if keyholder is a visitor (see Visitor below). Enter
the time on the final date that the keyholder's card will be valid. Default is blank—No
expiration time. Note that this only applies with host access.
Visitor. Recommended. AY/Nfieldindicatingifthekeyholderisavisitor. IfY, itisadvisable
to enter a return date and time (previous fields). Note that this is listed for reference only.
Default is N.
Trace. Optional. AY/Nfieldindicatingifthekeyholderistobemonitored(movementstraced
while in the building). Trace monitors doors, readers, and records. Using Trace causes an
extra key trace log message. This feature is sometimes desirable if the keyholder is a visitor
(see previous field). Default is N.
Privileged. Conditional. A Y / N field for ACUs supporting building modes and global anti-
passback. Enter Y if this keyholder can change building modes at a remote reader and is
immune from anti-passback. Default is N.
Personal Zone. If passback is in effect, the zone where the keyholder is currently located
and reported to the system by the reader last used by the keyholder. When setting up the
database, use the default (-1, unknown).
Vehicular Zone. The zone (car park) where the keyholder's vehicle is currently located;
reported to the system by the parking lot reader last used by the keyholder. When setting
up the database, use the default (-1, unknown).
Keyholder Entry—Page 2 [key1entr]
The data entered in this screen is for information only. Field entry is self-evident (field titles usr1
through usr6, and Remarks, can be changed to suit the individual user (see Section 6: System
Administration). Note that data is unique and not selected as table reference (see user-defined
field titles, reference 9). Simply complete those fields required by your company, store (F6), then
press F2 to display the access assignment screen [empgentr].
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 4: MASTER FILE ENTRY
4-5
Keyholder Access Entry [empgentr]
1
2
Access Code. Optional. Enter an access code number that applies to this keyholder (the
system automatically enters the access code description). Default is 0—No access code.
NOTE
There is no limit to the number of access codes that can be assigned, with the following two
exceptions:
1. Do not assign a keyholder more than one access code for a single NexSentry, 8xx
series, or 422 ACU.
2. The system will not allow you to combine two access codes with the same download
device ID number in one access group.
3. Do not assign two access groups with codes for the same download device ID.
SFS (smart failsoft option). Optional. Smart failsoft access codes are used when
communications between the host and ACU are disrupted for more than 15 seconds. Enter
Download from Www.Somanuals.com. All Manuals Search And Download.
4-6
SECTION 4: MASTER FILE ENTRY
Y if the downloaded access code is to be sent to the ACU as a smart failsoft access code.
Default is N. Note that this is used only in conjunction with the host access codes.
NOTE
The smart failsoft option is not supported with any keys used in conjunction with 708P and
718PACUs, butafunctionisbuiltintotheunitswhichdoesprovidesomemeasureoffailsoft
protection in the event of a communications failure with the host.
The 708P and 718P ACUs can be programmed to accept up to 25 command keys, and
accessisallowedwhenthesearepresented(eightdoorsmaximum). Usually,thecommand
keys selected are those issued to managerial and engineering staff, and to persons
responsible for building maintenance.
This feature is limited to some extent in that time codes cannot be used in conjunction with
this special programming, and event entries (door opening records, in this case) are not
logged.
Access Group. Optional. Enter an access group number (no limit) that applies to this
keyholder (the system automatically enters the access group description). Default is 0—No
access group.
Note
There is no limit to the number of access codes that can be assigned, with the following two
exceptions:
1. Do not assign a keyholder more than one access code for a single NexSentry, 8xx
series, or 422 series ACU.
2. The system will not allow you to combine two access codes with the same download
device ID number in one access group.
3. Do not assign two access groups with codes for the same download devices.
Access Override. Optional (zoom available). Enter the access override code that applies
"
to this keyholder. Default is 0—No access override code.
Project Assignment [epj_entr]
If the keyholder has been assigned to a project, enter the project number using the [epj_entr]
screen (multiple projects can be assigned). Display this screen by pressing F2 after the access
assignment screen (previous screen) has been saved (F6). Note that the project function will not
work properly unless the host provides access control.
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 4: MASTER FILE ENTRY
4-7
A sample [epj_entr] screen follows. Enter the project number (zoom available) then press Enter;
the project description displays automatically. If multiple projects are to be assigned, enter and
store each one separately.
COPY KEYHOLDERS
Copy Keyholder Information
Used when creating new keyholders who share data with existing keyholders, the [key_copy]
screen is an important timesaving feature. A sample screen follows:
1
2
From. Enter an existing keyholder ID (zoom available). The system automatically supplies
the key number and the keyholder names.
To. Enter the new keyholder ID, new key number and new keyholder name.
System responds with Okay to continue? When complete. Enter Y and a new keyholder record
for the To keyholder is automatically created, with identical parameters as the From keyholder.
Changes and corrections for the new ID are made as required using the various keyholder data
entry screens.
Download from Www.Somanuals.com. All Manuals Search And Download.
4-8
SECTION 4: MASTER FILE ENTRY
ACCESS ASSIGNMENT
Keyholder Access Assignment [egrpentr]
The [egrpentr] and [egrpentr1] screens, accessed from Access Assignment (third item in the
[fmntmenu] menu), are used as a fast way to make access assignments without using the
keyholder data entry screens. Data entry is the same as for the keyholder access entry screen
[empgentr]. The keyholder access allows only assignment permissions without access to
keyholder screen. A sample screen showing [egrpentr] and [egrpentr1] follows:
COPY KEYHOLDER ACCESS [ergcopy]
The copy keyholder access screen, [egrpcopy], is used in the same way as the copy keyholder
information screen for copying keyholders with similar access assignments. This is especially
useful where multiple codes/groups are assigned on keys.
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 4: MASTER FILE ENTRY
4-9
ACCESS DEFINITION
The access definition selection in the master file entry menu displays the access definition menu:
•
•
•
•
•
Access Code Entry, Access Code Definition, Elevator Definition
Access Group Entry, Access Group Definition
Access Override Entry
Fail Soft Entry
Project Definition
ACCESS CODE ENTRY [acdsentr]
Access codes are created using the access code entry [acdsentr] and the access code definition
[acodentr] screens. A third screen, [eleventr], is used for elevator codes.
Three access code types are identified—Centralized (Host); Distributed; Smart Failsoft:
Centralized(Host)—Usedwhenthehostcomputermakesaccessdecisions. Anexampleiswith
global anti-passback, where in/out readers may be connected to different ACUs.
Distributed Access Codes — Distributed access codes are created for each ACU and are
downloaded from the host. When a card is presented to a reader, the ACU makes the access
decision. In some circumstances, the host computer may override an access request denied by
an ACU.
Smart Failsoft — These codes work only if the ACU is in smart failsoft mode. This occurs when
communication between the host and the ACU is interrupted for more than 15 seconds. During
normal operation (ACU communicating with the host), access requests from keyholders with
smart failsoft status are passed to the host for decision.
NOTE
Smart failsoft is not supported with 1050 keys used in conjunction with 708P and 718P ACUs, but
afunctionisbuiltintotheunitswhichdoesprovidesomemeasureoffailsoftprotectionintheevent
of a communications failure with the host. The ACUs can be programmed to accept up to 25
specificcommandkeys, andaccessisallowedwhenthesearepresented(accessmaybeforone
to eight doors). The feature is limited to some extent in that time codes cannot be used in
conjunction with this special programming, and event entries (door opening records, in this case)
are not logged.
A sample [acdsentr] screen follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
4-10
SECTION 4: MASTER FILE ENTRY
1
2
"
Access Code ID. Required. Enter a four-digit maximum access code number.
Tenant. Required (zoom available). Enter a four-digit maximum tenant code number.
Default is tenant 0.
DownloadDeviceID. Optional(zoomavailable). Thisfieldmustbeusediftheaccesscode
being created is to be downloaded to an ACU—enter the ACU ID number. Enter 0 (default)
if access decisions for this code are to be made by the host.
Code Description. Required. Enter a 30-character maximum description of the access
"
code, e.g., REGULAR DAY SHIFT, WEEKEND RECEIVING.
When screen entry is completed press F6 to store the data; the access code definition screen,
[acodentr], displays automatically.
ACCESS CODE DEFINITION [acodentr]
ThisscreenisusedtoenterthereaderIDandtimecodes(fourmaximumperreader)thatwillapply
tothisaccesscode.EachreaderIDenteredmustbeadded(F5)andstored(F6)individually.When
youfinishdataentryforthisscreen, pressF6againtostorethecompletedaccesscodedefinition.
A sample screen follows:
2
1
If this access code is to be
assigned to an elevator
reader, press F2 after en-
tering the Reader ID and
Time Code fields. See El-
evatorAccessCodes—fol-
lowing subsection.
Note that this action may only be done for readers defined as elevator reader types in the reader
definition screen.
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 4: MASTER FILE ENTRY
4-11
Reader ID. Required. Enter the reader number to be linked to this access code (the reader
description is automatically displayed). The reader numbers can be entered in any order.
Time Code. Optional. Enter up to four time codes, in any order, that apply to this access
code(thetimecodeparametersaredisplayedautomatically). Defaultis0whichisnoaccess.
ELEVATOR DEFINITION [eleventr]
The elevator definition screen must be completed if the reader type is an elevator reader (reader
type 5). Perform the following steps:
1. When the Reader ID and Time Code fields have been entered in [acodentr], press F2 to
display the elevator definition screen [eleventr]—example below.
2. Enter the output contact IDs (usually wired to the elevator cab floor buttons) to be closed
(activated) when access is granted via this reader. Store each item (F6) after entry. Use F5
to move to the next output contact ID line.
[eleventr] Elevator Definition
Reader/Point Id
8004 = Contact 4
8006 = Contact 6
8008 = Contact 8
ACCESS GROUP ENTRY [agdsentr], [agrpentr]
Tofacilitateassigningsimilaraccessprivilegestolargenumbersofkeyholders,thesystemallows
twoormoreaccesscodestobecombinedintoanaccessgroup. Twoscreensareused:[agdsentr]
and [agrpentr]. Sample screens follow.
1
2
Access Group ID. Required. Enter a four-digit maximum access group number.
Tenant. Required (zoom available). Enter a four-digit maximum tenant number. Default is
tenant 0.
Download from Www.Somanuals.com. All Manuals Search And Download.
4-12
SECTION 4: MASTER FILE ENTRY
Group Description. Required. Enter a 30-character maximum description of the access
group.
When screen entry is completed press F6 to store the data, at which point the Access Group
Definition screen displays automatically. This screen permits you to enter the access codes that
will apply to this access group. Each access code entered must be added (F5) and stored (F6)
individually. When you finish data entry for this screen, press F6 again to store the now fully
completed access group.
NOTE
Host-controlled and downloaded access codes may be combined in the same access group, but
see Warning at the end of this subsection.
ACCESS GROUP DEFINITION [agrpentr]
1
2
Access Code. Required (zoom available). Enter an access code, in any order, to be linked
to this access group. Each code must be added (F5) and stored (F6) individually.
Access Code Description. Automatically inserted by the system.
SFSonly?(smartfailsoftoption). Optional. Smartfailsoftaccesscodesareusedonlywhen
communications between the host and ACU are disrupted for more than 15 seconds. Enter
Y if the downloaded access code is to be sent to the ACU as a smart failsoft access code.
Note that this is used only in conjunction with host access codes. The default is N.
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 4: MASTER FILE ENTRY
4-13
WARNING
1. Access codes that include the same reader(s) should not be included in the same group
unless one code is a downloaded code, and it has been set up with the SFS (smart failsoft)
flagsettoY. Mixingcodesthatincludecommonreaderswithdifferenttimecodesmaycause
unpredictable results.
2. Do not combine two access codes with the same download device ID in one access group.
3. Keyholders may have only one downloaded access code per ACU.
ACCESS OVERRIDE ENTRY
Accessoverridecodesaretypicallyusedforvisitorstorestrictorallowaccesstospecificlocations
for specific time periods. This is a host function that must be used only if normal access is through
host access codes:
1
2
"
#
Override Code. Required. Enter an override code number in the range 1—9999.
Description. Optional. Enter a 30-character maximum description of the override.
Start Date. Required. Enter the override start date.
End Date. Required. Enter the override end date.
"
#
Permission. Optional. Permissionstatus. EnterAtoallowaccess;enterDtodenyaccess.
Default is A.
Download from Www.Somanuals.com. All Manuals Search And Download.
4-14
SECTION 4: MASTER FILE ENTRY
FAILSOFT ENTRY
708P ACUs can be programmed to recognize up to 25 keyholders (based on key numbers) for
use when communication with the host computer is temporarily unavailable. Known as failsoft,
the feature becomes active (access is granted) for these keyholders after 15 seconds following
the occurrence of the communications interruption (response is not available for specific time
periods, however). A sample screen follows:
1
2
DeviceID. Required(zoomavailable). EnterthedeviceIDforwhichfailsoftistobeassigned
(the readers associated with the 708P automatically display).
Keyholder ID. Required (zoom available). Enter the applicable keyholder ID (keyholder
name automatically displays).
Allowed. Optional. Enter Y or N as appropriate for the individual keyholder. Default is N.
PROJECT ENTRY [prj_entr], [prd_entr]
This is designed primarily for high security facilities. Project is used to grant temporary access to
selected keyholders at project-controlled doors when a project is activated, while access for all
other keyholders who normally enter through these doors is temporarily denied. The projects are
continually monitored by the system and are updated as project status changes from activated to
deactivated, and vice versa. This is a host function that must be used only if normal access is
through host access codes. A sample [prj_entr] screen follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 4: MASTER FILE ENTRY
4-15
1
2
"
Project ID. Required. Enter a four-character maximum project ID code.
Description. Optional. Enter a 40-character maximum description of the project.
Starting Date and Time. Enter the project's starting date and time in the formats MM/DD/
YY and HH:MM.
Ending Date and Time. Enter the project's ending date and time in the formats MM/DD/YY
"
and HH:MM.
Store (F6) data when completed; the project definition [prd_entr] screen automatically displays.
Enter the applicable reader IDs for this project (zoom available). Store (F6) each ID separately
when entered, then immediately press F5 to move the cursor to the next data entry point on the
screen. Repeat for as many readers as are to be included in the project. A sample [prd_entr]
screen follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
4-16
SECTION 4: MASTER FILE ENTRY
TIME CODES [tmcdentr]
Time codes are normally used to define when points and readers are active. The codes are also
used to automatically lock / unlock doors, activate / deactivate output relays, and to initiate
recurring tasks. When combined with readers into access codes, the time codes define when
access is valid for particular readers. A sample [tmcdentr] screen follows:
2
1
4
5
TimeCode#. Required. Enteratwo-digit(maximum) timecode. Ifthetimecodeisomitted,
the system defaults to time code 0 (zero). The default time code description is NEVER
ACTIVE, with start/end times of 00:00 and N (no) for all the day entries.
= (description). Optional. Enter a 30-character maximum description of the time code.
Start. Required. Enter a start time using 24-hour notation with an intervening colon.
Examples: 08:45 (8:45 a.m.), 19:15 (7:15 p.m.). If the start time is entered incorrectly, the
systemeitherpreventsfurtherdataentryordisplaysanerrormessage(pressEntertoreturn
to data entry). In both cases, reenter the time code using the correct format.
End. Required. Enter an end time All details for the Start field pertain.
4
Mon through Hol. Optional. The field represents the days of the week and holidays. Enter
5
Y or N as applicable for the new time code. Default is N.
HOLIDAYS [hol_entr]
Annual holidays must be entered into the system. The information is required so that the host
computer can determine whether access codes, auto-unlock functions, etc., need to be handled
differently for the specified holidays.
1
2
HolidayDate. Required. EnteradateintheformatMM/DD/YY(thesystemsuppliesleading
zeroes where applicable).
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 4: MASTER FILE ENTRY
4-17
Holiday Name. Optional. Enter a 20-character maximum holiday name.
TENANTS [tententr]
Two or more companies or groups can operate a single SE 6000 system, and they are referred
to as tenants. (If required, the system can also be configured to allow individual tenants to share
components.) Tenants may be unrelated occupants of the same or different facilities who use
a single SE 6000 to view and manipulate only that data which applies to them. One of the tenants
in a multiple tenant usage is the system owner who controls and has access to the entire system
at all times. The systems owner may also be the system administrator. The default tenant code
is 0 (zero), usually the system owner, who has access to the entire system at all times. A sample
[tententr] screen follows.
1
2
Tenant Number. Optional. Enter a 4-digit maximum tenant number. Default is tenant 0.
Tenant Name. Optional. Enter a 30-character maximum tenant name.
INSTRUCTIONS [instentr]
Specific instructions are entered into the system to direct operators as to the action to be taken
when a specific point is activated (usually in response to an activated alarm). The instructions
display automatically on the alarm response screen, or may be selectively viewed from the
realtime control maps. A sample [instentr] screen follows:
1
2
Download from Www.Somanuals.com. All Manuals Search And Download.
4-18
SECTION 4: MASTER FILE ENTRY
Point ID. Required (zoom available). Enter the point ID to which this instruction applies.
Tenant. The tenant number entered when this point was created is automatically entered
into this field.
Instructions. Eight 40-character lines are provided for detailed instruction entry. Refer to
the sample screen for an example.
HARDWARE CONFIGURATION [confmenu]
Thehardwareconfigurationiteminthemasterfileentrymenudisplaysthehardwareconfiguration
menu [confmenu]:
•
•
•
•
•
•
•
Zones
•
•
•
•
•
•
•
Device Report Definition
SE 422 PIN Definition
SE 422 Hardware Definition
Dialer Entry
Areas
Pollers
Devices
Readers
Points
Site Entry Definition
ABA Configuration Entry
DKR Configuration Entry
Auto Opens/Activates
ZONES [ZONEENTR]
Zones comprise user-selected system components grouped to facilitate system operation and
administration, and are required if the anti-passback feature is to be used. Zones may be defined
for vehicles as well as keyholders. A sample [zoneentr] screen follows:
1
2
4
5
Zone Number. Required. Enter an four-digit maximum zone number. There is no default
for this field.
Zone Name. Optional. Enter a 30-character maximum tenant name. If this field is omitted,
the system fills the field with asterisks.
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 4: MASTER FILE ENTRY
4-19
Passback Area. Optional. This field is used to indicate if passback is in effect for this zone.
Enter P if personnel passback is used, V if vehicle passback is used, N if passback is not
used. The default is N.
PassbackType. Requiredifpassback(field#3)iseitherP(personnel)orV(vehicle)forthis
zone. Enter H for hard passback; S for soft passback. Hard passback prevents access if
already in the zone; soft passback allows access and generates a passback violation
message. There is no default for this field.
4
Passback Level. Required if passback (field #3) is either P (personnel) or V (vehicle) for
this zone. Enter G for global (host-controlled); L for local (ACU-controlled). There is no
default for this field.
5
AREAS [areaentr], [areaentr1]
For reporting purposes only, passback zones may be grouped into areas. Reporting (keyholder
zonereport)maybebyzoneorarea, withtheareareportlistingthezonescontainedineacharea.
Assign a number and optional description for the area using [areaentr]; enter the applicable zone
numbers in [areaentr1]. Note that for local passback zones, ensure that both in and out readers
are controlled by the same ACU. A sample screen showing [areaentr] and [areaentr1] follows:
POLLERS [pol_entr]
IMPORTANT
The pollers and poller parameter files discussed below are normally installed and tested at the
factory or by your dealer. Please consult your dealer or WSE customer support before adding,
changing, or deleting poller information.
Pollers are device-specific application programs that communicate with the ACUs and the input
/ output controllers, and in addition to providing these communication links they perform many
other tasks. For example, the pollers make access decisions, report devices that are not
responding, and provide the means to reload devices with system and key data as necessary.
Download from Www.Somanuals.com. All Manuals Search And Download.
4-20
SECTION 4: MASTER FILE ENTRY
The SE 6000 can run different pollers or multiple copies of the same poller concurrently but, with
the exception of the NexSentry, 8xx-series, and 422 ACUs, the pollers can be run with one device
type only. Poller parameter files are read when the poller programs start. The parameters define
the poller type, the physical port assignment, and other required control information.
Twenty-two poller types are currently in operation (codes 5, 20, 21, and 23 are not used):
1
2
708P
Opto
— 708P ACU
— Optomux 22 alarm monitor
— Stellar RDU 2000 monitor
— Interactive extended processing poller
— 8xx series / SE 422 ACUs
— MCCI keypad
3
Etp - Rdu
Timer Poller
808
4
6
7
MCCI
Parking
8
— Parking controller—Internal: No physical connection
9
Remote Dialer Schd — Remote dial-up interface controller
Elevator
10
11
12
13
14
15
16
17
18
19
— Elevator control poller—Internal: No physical connection
Database
Burle
Vicon
— Database poller—Internal: No physical connection
— Burle closed-circuit television (CCTV)
— Vicon camera switcher
Hand Geometry
Amdi
— Supports up to 32 hand geometry readers
— Amdi 102 / 103 magnetic stripe readers (supports up to 16)
— 6000/6500 Receiver
Radionics
Nesting
— Nested parking timer
— Not used for Polaroid ID 4000
Polaroid Server
WSE XV Poller
— Used for capturing images on an X-Terminal
22
24
25
26
WSE VIP2 Poller
— Used with numeric keypad for entry of PINs
American Dynamcis — Closed circuit television (CCTV)
Pacom CCTV
Intercom System
— Closed circuit television (CCTV)
— Used to automatically switch cameras
A sample [pol_entr] screen follows:
1
2
5
4
6
7
8
Poller ID. Required. Enter a four-digit maximum poller number. There is no default for this
field.
Poller Description. Optional. Enter a 20-character maximum description of the poller. If
omitted, the poller ID number is inserted by default.
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 4: MASTER FILE ENTRY
4-21
Tenant. Optional (zoom available). Enter a four-digit maximum tenant code number.
Default is 0.
Computer ID. Required. Enter the ID of the computer on which this poller is to run. Default
4
5
6
is 0—host computer.
Poller Number. Required. Enter the number of the corresponding poller-parameter file.
Refer to the configuration sheet detailing the factory-assigned poller numbers.
PollerType. Required. Usethezoomfeature(F7)toaccessthePollerTypeDisplayscreen.
Once there, arrow down to the required poller type, press F1, and the poller type number is
entered automatically into the Poller Entry screen.
Disable. Not currently implemented.
7
8
Zone Number. Required. Enter a four-digit maximum zone number. Default is 0.
DEVICES
The most common devices used with SE 6000 system are the WSE NexSentry, 708P, 8xx-
series and 422 ACUs. Other devices supported include:
•
•
•
•
Opto 22 input / output controllers
CCTV switchers
Radionics alarm panels
One or more additional SE 6000 systems used as local controllers
With the exception of the NexSentry, 8xx-series and 422 ACUs, each individual device type
requires its own poller and associated hardware port assignment.
SIMPLE / INTELLIGENT DEVICE TYPES
The terms simple and intelligent are often used to describe certain device types used in
conjunction with the SE 6000.
Simple Devices. With simple devices, the SE 6000 makes the access decisions and also
instructs the device to take various actions. The 708P ACU is a simple device, for example.
Intelligent Devices. Depending on system configuration requirements, intelligent devices can
be programmed to make their own decisions concerning access and actions to be taken. The
devicestypicallyhavetheirownapplicationsoftwareand/orfirmware,andtheymaintaintheirown
internaldatafileswhichareusedfordecisionmaking. TheNexSentry, 8xx-series, and422ACUs
are intelligent devices, for example. As required, the intelligent devices can be set up to be
Download from Www.Somanuals.com. All Manuals Search And Download.
4-22
SECTION 4: MASTER FILE ENTRY
controlled exclusively by the SE 6000 (deferred mode), to operate entirely independently of the
SE 6000 (local mode), or a combination of both.
DEVICE ENTRY SCREENS
The following screens are used when setting up device types:
•
•
•
•
•
8xx-series ACUs — [dev_entr], [d808entr]
NexSentry — [dev_entr], [nexsentr], [d818entr]
818-series ACUs — [dev_entr], [d808entr], [d818entr]
422 ACUs — [dev_entr], [d422entr]
All other devices — [dev_entr]
DEVICE ENTRY [dev_entr] — ALL DEVICE TYPES
Complete the [dev_entr] screen when setting up any device. A sample screen follows:
2
1
5
4
6
7
8
10
9
Device ID. Required. Enter a unique, four-digit maximum device ID number in the range
1—9999.
Device Description. Optional. Enter a 20-character maximum description of the device.
If omitted, the system enters the device ID number in this field.
Tenant. Optional (zoom available). Enter the tenant number applicable for this device.
Default is 0.
Computer ID. Required. Enter the ID of the computer that connects to this poller. Default
4
is 0 (host).
Poller Number. Required. Enter the number of the poller that connects to this device. This
5
information is available from your system installer and should be obtained before beginning
screen entry.
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 4: MASTER FILE ENTRY
4-23
Address. Required. Enter the address of the device. Since each poller can poll a number
6
7
of devices, the Address field is necessary to tell the host which device to poll. The address
ranges are included in the Device Type table (see following field). Note that the system will
not allow duplicate device addresses on the same poller.
Device Type. Required (zoom available). Enter the device type number in the range 1
through 23 (field 20 and 22 are not currently used):
Type
Description
Address Range (see previous field)
1 only
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
21
23
Host
Controller
708P
808S
Opto
Etp
MCCI
RDI
RLC
808SX/SN
818SX/SN
AMDI 102/103
NexSentry
Camera
SE422
Radionics
Polaroid ID 4000
818SC
1
1
1
0
1
1
1
1
1
1
1
1
—
—
— *16
—
—
—
—
—
— *16
— *16
—
—
8
8
15
16
16
32
8
16
16
1 only
— *16
1 only
1
1
1
1
1
— *16
— *16
808SXT
WSE VIP2
Timer Device
—
—
16
16
1 only
*Note that these are limited to 8 if used with host access.
Watch Dog Timer Count. Required for Opto 22 devices only. Indicates the action to be
8
taken if communication is interrupted between the host computer and the device. Enter:
0
1
2
—
—
—
No action (default)
Open on time-out
Close on time-out
Disable. Required. A Y/N field indicating if the device is to be shunted at system start up
9
(Y). This is recommended to disable devices until they are physically connected into the
system. Default is N (device not shunted).
ZoneNumber. Required(zoomavailable). Enterthezonenumberapplicableforthisdevice.
10
Default is 0.
Download from Www.Somanuals.com. All Manuals Search And Download.
4-24
SECTION 4: MASTER FILE ENTRY
SE 8XX-SERIES DEVICE CONFIGURATION ENTRY [d808entr]
The [d808entr] screen must be completed for all 8xx-series ACUs (use F2 to display the screen
after the previous screen has been stored). A sample screen follows:
1
2
4
5
6
7
8
10
9
12
11
14
13
Level,Name,Password. Required. Thesefirstthreefieldsareenteredtoidentifyuptoeight
operators who will be permitted to set/change system parameters for a particular ACU from
the ACU terminal port. User 1 must be established (defaults to operator 1); operators 2
through7areoptional.Entertheoperator'ssecuritycode(AthroughF),nameandpassword.
The security codes A through F control the degree to which the operator may add/change/
delete the system parameters from the ACU terminal port. Code A has the most privileges,
code F has the least. For detailed information concerning operator privilege levels, refer to
the applicable ACU manual.
NOTE
TheLevel,NameandPasswordfieldsarespecifictoindividual804/808ACUsandapplyonly
to operators logging in directly via the ACU's terminal port. The fields are not part of the SE
6000 control parameters.
Tamper. Optional. Enter the tamper report number if a report has been created (see
applicable ACU manual). The report states the system actions that will be taken if the ACU
enclosure housing is opened. Default is 0.
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 4: MASTER FILE ENTRY
4-25
Power Fail. Optional. Enter the power fail report number if a report has been created (see
applicable ACU manual). The report states the actions that will be taken by the ACU should
a power failure occur. Default is 0.
Override. Optional. Enter the operator override report number if a report has been created
(see applicable ACU manual). The report states the actions that will be taken by the ACU if,
for example, a manual unlock or a shunt occurs. Default is 0.
4
Type. Optional. Enter the number for the key type used. Default is 0.
5
NOTE
The valid key types are as follows:
0 — None
1 — 1030
2 — 1040
3 — 1050
4 — 1060
5 — 1050 / 1060 / Digital Keys
Aux. Type. Conditional. Auxiliary key type. A second key type, other than the one entered
6
in the previous field, can be entered here if applicable. Default is 0.
0 — None
1 — 1030
2 — 1040
Note: the previous two fields are applicable only to devices that support multiple key types.
Facility. Required for key types 1 and 2 (previous field). Enter the facility code assigned to
7
8
the keys. Defaults to **** if omitted.
Alt Facility. Conditional. Enter a second facility code to allow a different set of keys to be
used with this ACU. Defaults to **** if omitted.
Auto Forgive. Optional. Up to four time codes can be entered that execute the forgive
9
command at the ACU. Default is 0 (feature disabled if all auto-forgive time codes are 0).
808 Modem Definition. Not used.
Number of Retry Times. Not used.
XON/XOFF. Not used.
10
12
Download from Www.Somanuals.com. All Manuals Search And Download.
4-26
SECTION 4: MASTER FILE ENTRY
BuildingClosedTimeCodes. Optional. Providesuptofourtimeintervalsduringwhichthe
13
14
building should be closed. Default is 0.
Building Open Reminder. Optional. If the building should be closed (indicated by the time
codes entered in the previous field), a reminder message is logged and repeated for the
number of minutes specified (0 to 240). Default is 0.
SE NEXSENTRY DEVICE CONFIGURATION ENTRY [nexsentr]
Complete the [nexsentr] screen for the NexSentry ACU and then press F2 Next Form to display
the [d818entr] screen. Enter all appropriate information and press F6 Store to complete the
NexSentry device configuration. A sample [nexsentr] screen follows:
1
7
8
10
11
Level,Name,Password. Required. Thesefirstthreefieldsareenteredtoidentifyuptoeight
operators who will be permitted to set/change system parameters for a particular ACU from
the ACU terminal port. User 1 must be established (defaults to operator 1); operators 2
through7areoptional.Entertheoperator'ssecuritycode(AthroughF),nameandpassword.
The security codes A through F control the degree to which the operator may add/change/
delete the system parameters from the ACU terminal port. Code A has the most privileges,
code F has the least. For detailed information concerning operator privilege levels, refer to
the applicable ACU manual.
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 4: MASTER FILE ENTRY
4-27
NOTE
The Level, Name and Password fields are specific to the NexSentry and applies only to
operatorsloggingindirectlyviatheACU'sterminalport.ThefieldsarenotpartoftheSE6000
control parameters.
Tamper. Optional. Enter the tamper report number if a report has been created (see
applicable ACU manual). The report states the system actions that will be taken if the ACU
enclosure housing is opened. Default is 0.
Power Fail. Optional. Enter the power fail report number if a report has been created (see
applicable ACU manual). The report states the actions that will be taken by the ACU should
a power failure occur. Default is 0.
Override. Optional. Enter the operator override report number if a report has been created
(see applicable ACU manual). The report states the actions that will be taken by the ACU if,
for example, a manual unlock or a shunt occurs. Default is 0.
4
ABA Site Group. Optional. The ABA site code group ID number.
5
Auto Forgive. Optional. Up to four time codes can be entered that execute the forgive
6
command at the ACU. Default is 0 (feature disabled if all auto-forgive time codes are 0).
808 Modem Definition. Not used.
7
Number of Retry Times. Not used.
XON/XOFF. Not used.
8
9
BuildingClosedTimeCodes. Optional. Providesuptofourtimeintervalsduringwhichthe
10
building should be closed. Default is 0.
Building Open Reminder. Optional. If the building should be closed (indicated by the time
codesenteredinthepreviousfield),aremindermessageisloggedandrepeatedthenumber
of minutes specified (0 to 240). Default is 0.
Download from Www.Somanuals.com. All Manuals Search And Download.
4-28
SECTION 4: MASTER FILE ENTRY
SE 818 DEVICE CONFIGURATION ENTRY [d818entr]
Complete the [d818entr] screen for all 818-series and NexSentry ACUs (use F2 to display the
screen after the previous screen, [d808entr] or [nexsentr], have been stored). A sample screen
follows:
#
$
%
&
1
2
"
PIN Seed. Optional. Enter the base seed number for generating PINs. The value entered
has priority over the system default PIN seed value entered with the [pndfentr] screen (see
SE 422 Pin Definition in this section). Default is 0.
Duress PIN Digits. Optional. Enter the allowed number of digits for a PIN duress code.
Default is 0.
Print PINs. Optional. A Y / N field indicating if the PIN should be displayed once calculated.
Default is Y.
PIN Timeout. Optional. Enter the maximum number of seconds allowed between key
"
presentation and PIN entry. Default is 10.
Max PIN Retries. Optional. Enter the allowed number of PIN entry retries. Default is 4.
#
$
VIP Only Digits. Optional for keypad-controlled doors only. Enter the allowed number of
digits for the PIN (4—8). Default is 4.
Duress Report. Optional. Enter an action report number (1—32) indicating the action the
%
&
ACU is to take should a duress event occur. Default is 0.
Duress Enable. Optional. A Y / N field indicating whether the duress feature is enabled.
Default is Y.
SE 422 DEVICE CONFIGURATION ENTRY [d422entr]
Complete the [d422entr] screen for SE 422 ACUs (use F2 to display the screen after the previous
screen has been stored). A sample screen follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 4: MASTER FILE ENTRY
4-29
2
"
#
$
%
&
ꢀꢁ
'
11
ꢀ
ꢀ#
ꢀ&
ꢀ!
ꢀ$
ꢀ'
ꢀ"
ꢁ
ꢀ%
Level,Name,Password. Required. Thesefirstthreefieldsareenteredtoidentifyuptoeight
operators who will be permitted to set / change system parameters for this particular ACU.
User1mustbeestablished(defaultstooperator1);operators2through7areoptional.Enter
the operator's security code (A through F), name and password.
The security codes A through F control the degree to which the operator may add/change/
delete the system parameters. Code A has the most privileges, code F has the least. For
detailed information concerning operator privilege levels, refer to the applicable ACU
manual.
NOTE
The Level, Name and Password fields are specific to individual SE 422s and apply only to
operatorsloggingindirectlyviatheACU'sterminalport.ThefieldsarenotpartoftheSE6000
control parameters.
Duress. Optional. A number (1-32) which instructs the SE 422 which action report to use
should a duress event occur. Default is 1.
System. Optional. A number (1-32) which instructs the SE 422 which action report to use
in response to system events in the SE 422. Default is 1.
Op. Override. Optional. A number (1-32) which instructs the SE 422 which action report
"
#
to use in response to operator overrides performed on the SE 422. Default is 1.
Alarm Delay. Optional. The amount of time in seconds (10-240) that an alarm condition is
allowed to exist before the alarm contact is closed. Default is 30.
Download from Www.Somanuals.com. All Manuals Search And Download.
4-30
SECTION 4: MASTER FILE ENTRY
PINTimeout. Optional. Themaximumamountoftime,inseconds,whichcanpassbetween
$
%
the presentation of a key and the entry of a verification PIN. Default is 10.
Max Inv. PINs. Optional. The maximum number of invalid PIN entry attempts to permit
before cancelling the key presentation. Default is 4.
VIPsDigits. Optional. ThenumberofdigitsinthePINnumberfordoorsusingkeypadsonly.
&
The range is 4 to 8. Default is 4.
Modem Definition. Not used when the SE 6000 is connected directly or in a dial-up
'
configuration.
Latched Contact. Optional. The number of the output contacts that are assigned as a
ꢀꢁ
latched contact (0—51). Default is 0.
ABA Site Code Grp. Optional. The ABA site code group ID number.
EMPI Alt1 Code. Optional. Alternate EMPI site code #1.
ꢀ
PINseed. Optional. ThebaseseednumberusedwhengeneratingPINs. Thevalueentered
here has priority over the default PIN seed value entered on the [pndfentr] screen (see
Entering Default PIN Digits and Seed for an SE 422 in this section). Default is 0.
ꢀ!
PIN Digits. The number of digits in the PIN code for this SE 422. The value entered here
ꢀ"
has priority over the default PIN digits value entered on the [pndfentr] screen (see Entering
Default PIN Digits and Seed for an SE 422 in this section). Default is 0.
EMPI Alt2 Code. Optional. Alternate EMPI site code #2.
ꢀ#
ꢀ$
# of Retry Times. Used to inform a remotely connected SE 422 the number of times to
attempt to contact the host computer over telephone lines before considering a connection
to be currently impossible to make.
XON/XOFF. Terminal Port and Host Port: Used to inform the SE 422 whether XON/XOFF
ꢀ%
ꢀ&
flow control will be used at either of these two ports. Used for remotely connected SE 422s
only.
Bldg Mode Indicators. Conditional. Enter the input point contact number or output relay
number to initiate and display the status of the building mode.
Monitor — Input point contact ID (0 — 75)
Open, Limited, Closed — Output point relay ID (0 — 51)
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 4: MASTER FILE ENTRY
4-31
Duress Enable. Indicates with a Y or an N whether the PIN duress feature of the SE 422
ꢀ'
is turned on or not.
ShowPIN. IndicateswithaYoranNwhetherthePINnumbershouldbedisplayedonalocal
ꢁ
terminal connected to the SE 422 after it has been calculated.
Building Closed Times. Enter up to four time codes used for building closure.
Building Open Reminder. Enter the number of seconds (0 — 240) that the building open
message is to display.
READERS
Readers are usually assigned to ACUs, but they may be used as standalone devices or linked to
other security monitoring devices. Twelve reader types (1 — 12) are currently defined:
1. Access Control. Controls power to a door lock allowing or denying entry.
2. Time and Attendance (optional feature). Monitors keyholders' entry/exit movements.
3. Meal Monitoring (optional feature). Tracks number of meals taken by a keyholder.
4. Guard Tour (optional feature). Monitors guard check-in activities during guard rounds.
5. Elevator Control. Controls and limits keyholder access to floors.
6. Activate (optional feature). Enables keys for system wide use.
7. Deactivate (optional feature). Disables previously activated keys (see previous item).
8. Auto Key Entry. Allows automatic entry of card numbers.
9. Access with Keypad. Same as #1 except that a keypad is used in addition to the reader.
10. Keypad. Keypad only.
11. Access with Two-Man Rule. (optional feature). Same as #1 above except that two-man
rule is in effect.
12. MultiOccReader. Multipleoccupancyreader. Similarto #11exceptthatitrequiresthattwo
keyholders enter and leave a zone together. Refer to the subsection that covers multiple
occupancy readers in this section for more details.
Data entry begins with the [rdr_entr] screen. (One additional screen each is used for readers
assigned to SE NexSentry, 8xx series, and 422 ACUs. Details follow this subsection.)
Download from Www.Somanuals.com. All Manuals Search And Download.
4-32
SECTION 4: MASTER FILE ENTRY
READER ENTRY [rdr_entr]
1
2
"
#
$
&
%
'
ꢀꢁ
11
ꢀ
ꢀ$
ꢀ%
ꢀ&
ꢀ!
ꢀ"
ꢀ#
ꢀ'
Reader ID. Required (zoom available). Enter a maximum four-digit reader ID number.
Reader Description. Optional. Enter a maximum 20-character description of the reader.
Default is the reader ID number.
Device ID. Required (zoom available). Enter the number of the device which controls this
reader. The related information (computer ID, poller number, address) automatically
displays when the ID is entered.
Sensor. Required. Enter the sensor port number of the ACU to which this reader is
"
connected.
Enable Point ID. Conditional (zoom available). Indicates a point ID that must be activated
#
before the current point can be activated. Enter the enable point ID number.
NOTE
The Enable Point is primarily used with closed circuit television monitors, but can be used
elsewhere. For example, a guard might need to personally recognize you and press an OK
button (activates enable point) before your card will work at an ACU (current point). The
system enters the default value of 0 (zero) if this field does not apply.
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 4: MASTER FILE ENTRY
4-33
Reader Type. Required. Enter the reader type number in the ranges 1 through 12 as
$
%
&
described above.
Assoc Reader ID (Associated Reader). Required if the reader is used in conjunction with
a keypad. Enter the ID number of the Reader used with the keypad. Default is 0.
Door Switch ID. Required. Enter the door switch point ID used in conjunction with this
reader. (Ifpassbackprotectionisineffect,tworeadersmayshareasingledoorswitch.) The
system enters the default value of 0 (zero) if this field does not apply.
Trace. A Y/N field used to indicate if all events at this reader are to be specially reported
'
(traced). Default is N.
Disable. Required. AY/Nfieldindicatingifthedeviceistobeshuntedatsystemstartup(Y).
ꢀꢁ
This function varies with different types of ACUs. Default is N (device not shunted).
REX Point ID. Required if the reader is used in conjunction with a request-to-exit (REX)
device or switch. Enter the REX ID number. The system enters the default value of 0 (zero)
if this field does not apply.
T & A Dir. Time and attendance direction. If the time and attendance feature is used, enter
ꢀ
N—None, I—Global In, or O—Global Out. The default is N.
Unlock Time. Optional for NexSentry, 8xx-series, and SE 422 ACUs. Enter a time period
inseconds(1-240)thatthedooristoremainunlockedwhenavalidkeyispresented. Default
is 10 seconds.
ꢀ!
Read While Open. Optional for NexSentry, 8xx-series, and SE 422 ACUs. A Y/N field used
ꢀ"
ꢀ#
to indicate if keys are to be read while the door is unlocked. The default is N.
Reverse Lock. Optional for NexSentry, 8xx-series, and SE 422 ACUs. A Y/N field used to
indicate if the lock power is normally off (N) or on (Y).
Entering Zone. Optional. Enter the zone number for this reader, if applicable.
ꢀ$
ꢀ%
LeavingZone. Optional. Usedwithanti-passbackifreadercontrolsexitfromazone. Enter
the exit zone number.
Tenant. Optional. Enter a four-digit maximum tenant number. If omitted, Tenant 0 (zero
ꢀ&
ꢀ'
- system owner) is entered by default.
Tim Cd 1: ... and Mod. Both optional. Four time codes may be entered denoting when this
reader is active This function varies with different types of ACUs. Note that the downloaded
ACU will still operate in the field during excluded time periods. If omitted, the reader is never
Download from Www.Somanuals.com. All Manuals Search And Download.
4-34
SECTION 4: MASTER FILE ENTRY
active. For Mod, enter a transaction modifier code (A, B, etc.) to customize log messages
and system actions (see Section 6: System Administration for details). The default for Mod
is 0 (zero); use the standard log message.
AUTO KEY ENTRY AND READER
The Auto Key Entry feature allows you to capture the key number from a key card and assign the
number as well as enter the card number automatically in the Key Number field of the keyholder
Entry[key_entr]screen. BeforeyoucanusethisfeatureyoumustconfigureanAuto-EntryReader
(Reader type 8). Perform the following procedures:
•
•
Configuring the Auto-Entry Reader
Automatically Entering Card Numbers
Configuring the Auto Entry Reader
1. From the Main Menu, select Master File Entry and the Master File Entry screen appears.
2. Select the Hardware Configuration menu and the Configuration Menu [confmenu] screen
appears.
3. Select Readers and the Reader Entry [rdr_entr] screen appears.
4. Select F5 Add Mode.
5. Enter all necessary information, making sure that you enter 8 in the Reader Type field.
6. Select F6 Store.
Automatically Entering Card Numbers
Note before you use the following procedure, you should configure an Auto-Entry Reader.
1. From the Main Menu, select Master File Entry and the Master File Entry screen appears.
2. Select Keyholders and the Keyholder Entry [key_entr] screen appears.
3. Select F5 Add Mode.
4. Enter the keyholders's ID, Last name, and first name and press Enter after each entry.
5. Position the key card next to the reader and at the beep, press F7 AutoKey.
6. Select F6 Store and select F5 Add Mode to enter additional Keyholders.
7. To enter additional keyholders, repeat steps 4 through 6.
MULTIPLE OCCUPANCY READER
The Multiple Occupancy Reader (MOR) is similar to a reader that is configured for the two-man
rule requirement. The difference between them is that the multiple occupancy reader is also
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 4: MASTER FILE ENTRY
4-35
configured for a specific zone and includes the passback feature. In addition, the MOR and the
SE 6000 keep track of the people that are in a specified zone.
ENTERING A MULTIPLE OCCUPANCY ZONE
When a multiple occupancy zone is vacant, two keyholders are required to present their keys to
the reader to unlock the door; first one and within a prescribed time period, the other, unlocking
the door. Once three or more people are in the multiple occupancy zone, the reader works like a
standard reader, that is, as an individual keyholder with rights presents their key, the door is
unlocked, either entering or leaving.
VACATING A MULTIPLE OCCUPANCY ZONE
Vacating a Multiple Occupancy zone, requires that the last two keyholders present their keys at
the same time, first one and then within the prescribed time period the other, unlocking the door.
READER REPORT DEFINITION SCREENS
The reader report definition screens, [rdr1entr], [rdr2entr], [rdr3entr], and [rdr4entr] are used,
respectively, when setting up a reader to operate with an SE 8xx-series, 422, or NexSentry ACU.
Press F2 after storing the data on the [rdr_entr] screen; the appropriate second screen
automaticallydisplays.
SE 8XX-SERIES READER REPORT DEFINITION [rdr1entr]
1
Reader Mode. Optional. Enter the appropriate reader mode number. This is used for
building modes. The default is 0.
0 = Normal, 1 = Open, 2 = Closed, 3 = Station
The remaining fields, Forced Open throughExit Denied, require a report number entry. The word
report in this context identifies a user-defined action or series of actions that the ACU is to take
Download from Www.Somanuals.com. All Manuals Search And Download.
4-36
SECTION 4: MASTER FILE ENTRY
in response to various events occurring within the system. (The field titles indicate the event
types.) See Device Report Definition in the section and the applicable ACU manual for detailed
information.
SE 422 READER REPORT DEFINITION [rdr2entr]
1
2
"
#
$
%
&
'
11
ꢀꢁ
ꢀ
ꢀ"
ꢀ$
ꢀ!
ꢀ#
ꢀ%
ꢀ&
ꢀ'
ꢁ
ReaderMode. Optional. Entertheappropriatereadermodenumber: 0=Normal,1=Open,
2 = Closed, 3 = Station. Default is 0.
Proximity Type. Enter the proximity type: 0 = Sensor interface, 1 = DigiKey reader.
Proximity Code. Enter the proximity reader node number: 0 = None, 15 = 1st proximity
reader node number, 16 = 2nd proximity reader node number
Keypad Type. Enter the keypad type: 0 = VIP2, 1 = MSRK5.
"
Keypad Code. Enter the node number for the VIP keypad: 0 = None, 13 = 1st keypad node
#
number, 14 = 2nd keypad node number.
Mag Stripe Type. Enter the magnetic stripe type: 0 = MSR, 1 = MSR5, 2 = MSRK5.
$
%
Mag Stripe Code. Enter the node number for the magnetic stripe reader: 0 = None, 17 =
1st magnetic stripe reader node number, 18 = 2nd magnetic stripe reader node number.
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 4: MASTER FILE ENTRY
4-37
—
&
ꢀ"
Thefollowingtenfields, ForcedOpenthrough ExitGranted,requiretheentryofareportnumber.
The word report in this context identifies a user-defined action or series of actions that the ACU
is to take in response to various events occurring within the system. (The field titles indicate the
event types.) See Device Report Definition in the section and the applicable ACU manual for
detailed information.
Door Output Relay. Enter the number of the 422 relay.
ꢀ#
ꢀ$
ꢀ%
DKR Configuration. Enter the ID number. Valid ranges of numbers is from 1-9999.
ABA Configuration. Enter the ID number Valid range of numbers is from 1-9999.
Keypad Enable. A Y / N field to activate the associated keypad.
ꢀ&
ꢀ'
KeypadActiveDuringBuildingModes. AY/Nfieldtoindicatewhetherthekeypadshould
be activated during the building open, limited and / or closed mode.
Keypad Active During Time Codes. Up to four time codes
ꢁ
SE 818 READER REPORT DEFINITION [rdr3entr]
2
1
"
#
$
%
ReaderMode. Optional. Entertheappropriatereadermodenumber. 0=Normal, 1=Open,
2 = Closed, 3 = Station. Default is 0.
Download from Www.Somanuals.com. All Manuals Search And Download.
4-38
SECTION 4: MASTER FILE ENTRY
Proximity Type. Enter the proximity type: 0 = Sensor interface, 1 = DigiKey reader.
The following thirteen fields, DKR/SCR Fail through VIP tamper, require the entry of a report
number. The word report in this context identifies a user-defined action or series of actions
that the ACU is to take in response to various events occurring within the system. (The field
titlesindicatetheeventtypes.) SeeDeviceReportDefinitioninthissectionandtheapplicable
ACU manual for detailed information.
DKR Configuration. Enter the ID number. Valid range is from 1-9999.
"
#
VIPEnable. Optional. AY/N/Ofieldtoenable/disabletheVIP(OindicatesVIPonly). Default
is N.
VIPActiveDuringBuildingModes. Optional. AY/Nfieldtoactivate/deactivatetheVIPfor
$
%
building modes Open, Limited and Closed. Default is N for all three.
VIP Active During Time Codes. Optional. Enter up to four time code IDs when the VIP is
to be active. Default is 0 for all four.
SE NEXSENTRY READER REPORT DEFINITION [rdr4entr]
2
1
"
#
$
%
ReaderMode. Optional. Entertheappropriatereadermodenumber. 0=Normal, 1=Open,
2 = Closed, 3 = Station. Default is 0.
Proximity Type. Enter the proximity type: 0 = Sensor interface, 1 = DigiKey reader.
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 4: MASTER FILE ENTRY
4-39
The following eleven fields, DKR/SCR Fail through Device Tamper, require the entry of a
report number. The report in this context identifies a user-defined action or series of actions
that the ACU is to take in response to various events occurring within the system. (The field
titlesindicatetheeventtypes.)SeeDeviceReportDefinitioninthissectionandtheapplicable
ACU manual for detailed information.
DKR Configuration. Enter the ID number. Valid range is from 1-9999.
"
#
$
VIPEnable. Optional. AY/N/Ofieldtoenable/disabletheVIP(OindicatesVIPonly). Default
is N.
VIPActiveDuringBuildingModes. Optional. AY/Nfieldtoactivate/deactivatetheVIPfor
building modes Open, Limited and Closed. Default is N for all three.
VIP Active During Time Codes. Optional. Enter up to four time code IDs when the VIP is
%
to be active. Default is 0 for all four.
POINTS [pnt_entr]
Enter individual point IDs for all input and output points in the system.
Note:
There are eight hardware types (exclusively input and/or output contacts) that require a type
numberandapointnumberwhenbeingsetupinthedatabase.Youestablishthesedevicesusing
the Point Entry screen and cause the log messages to differ depending upon point type:
1. Alarm. An input contact for monitoring conditions defined as alarms.
2. Door Switch. An input contact for determining the open/closed status of a door (only used
when associated with a door record.
3. REX. An input contact for determining the status of a request-to-exit switch.
4. Open On REX. An input contact for determining the status of a request-to-exit switch which
requires an action by the computer to unlock a specific door.
5. Not used.
6. General. An input or output contact for general purpose use. This function generates an
input active message.
7. Camera(optionalfeature). Input/outputcontactforcamerasystemmonitoringandcontrol.
8. Spitter (optional feature). Input contact to indicate a ticket pull for a parking control system.
9. Guard Tour (optional feature). An input contact allowing guard tour activity monitoring.
A sample screen follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
4-40
Section 4: Master File Entry
2
1
"
#
$
%
&
'
ꢀꢁ
11
ꢀ!
ꢀ
ꢀ"
ꢀ#
ꢀ$
Point ID. Required. Enter a four-digit maximum point ID number.
Point Description. Optional. Enter a 20-character maximum description of the point. If
omitted, the system enters the point ID number into this field.
Device ID. Required (zoom available). Enter a four-digit maximum device ID number that
is attached to this point. Once entered, the system automatically enters the associated
computer number, poller number, and address fields.
Sensor/Board. Required. The sensor number or board number through which this point
communicates. A point may be connected through a multiple switch monitor (MSM) to an
ACU, oritmaybeconnecteddirectlytootherdevicetypes. ForanACU, thenumberentered
is the number of the sensor connection to the device. For devices with directly connected
points(e.g.,Optomuxboards,alarmmonitoringdevices),enter0(zero),ortheboardnumber
if multiple boards are connected on the same poller. Note that for WSE 422, 0 is for input
points and 1 is for output points.
"
Contact. Required. For points connected through an MSM to an ACU, enter the MSM point
contact number (1, 2, 3, or 4). For directly connected devices, enter the contact number for
that device (0 through 15). Note for WSE 422, 0-75 is for inputs and 0-51 if for outputs. Refer
to the WSE 422 input/output tables at the back of this section.
#
$
Point Type. Required (zoom available). Enter the point type number in the range 1 through
9 as described above, or screen-check using F7 (zoom).
Download from Www.Somanuals.com. All Manuals Search And Download.
Section 4: Master File Entry
4-41
Time. Required for point type 2 (door switch) and 6 (general, when used with an OPTO 22);
disregard for all other types. For type 2, enter the number of seconds before the door is to
be considered held open. The range is 1 through 240 (the default is 15 seconds and this is
the recommended value for normal usage). For type 6, and if this is an output point, enter
the number of seconds that the OPTO 22 output remains active. The range is 0 through 655
(0 indicates no time limit).
%
Point Mode. Required except for MSMs; enter 0 if this the case. Enter 0 (zero) if the point
is normally open; enter 1 if the point is normally closed. Default is 0.
&
'
Input/Output. Required. Enter I for an input point; enter O (letter O) for an output point.
Default is I.
Watchdog. Required for Opto 22 devices only. Indicates the action to be taken if
ꢀꢁ
communication is interrupted between the host computer and the device. Enter:
0 — No action (default)
1 — Open on time-out
2 — Close on time-out
808 Report #. Required for points attached to 8xx-series ACUs. Note that this is used with
alarm generated points. If it is a door switch or a REX, it is defined on the second page of the
Readerscreen. Thewordreportinthiscontextidentifiesapreviously-definedactionthatthe
ACU is to take in response to specific events. Up to 15 reports can be defined for each ACU
(see the respective ACU manual for detailed information). Enter a number in the range 1
through 15 indicating the 808 report to be used. If omitted, Report #1 — report to host at all
times — is used by default.
Enable Point. Conditional (zoom available). Indicates a point ID that must be activated
beforethecurrentpointcanbeactivated.EntertheenablepointIDnumber.Thisisonlyactive
for host control points.
ꢀ
NOTE
The Enable Point is primarily used with closed circuit television monitors (CCTVs), but can
be used elsewhere. For example, in order to open a parking lot gate, a car must first be
sensedbyadetector(enablepoint).Thenwhentheproperkeyholderusestheirkey,thegate
opens, allowing access.
Disable. Required. A Y/N field indicating if the point is currently disabled (Y). Default is N
(point currently active). Note that an intelligent ACU will only control host action not the
physical action at a site where the ACU reports a contact closure.
ꢀ!
Download from Www.Somanuals.com. All Manuals Search And Download.
4-42
Section 4: Master File Entry
Zone number. Required (zoom available). Enter the zone number applicable for this point.
ꢀ"
ꢀ#
ꢀ$
The system enters the default value of 0 (zero) if this field does not apply.
Tenant. Required (zoom available). Enter the tenant number applicable for this point. The
system enters the default value of 0 (zero - system owner) if this field does not apply.
Tim Cd (1-4), Code and Mod.
Code: Required (zoom available). Four time codes can be entered to allow input
monitoring at this point. The default is time code #1.
NOTE
The system effectively shunts points and devices not covered by an active time code.
Recommend controlling events through reporting when using an intelligent ACU.
Mod: Optional. Log messages and system action can be modified using the custom
transaction modifier codes A, B, etc., (see Section 6, System Administration). Default
is 0 and uses standard messages.
AUTO OPENS / ACTIVATES
The auto open / activate feature is used to instruct the system to lock / unlock doors, or activate
/ deactivate output points, for a predefined amount of time. Examples:
•
•
A regular business door is configured to automatically unlock at a prescribed time each
morning. The time code then re-locks the door at close of business each day.
Via an output point, a time code automatically switches on an outside light each evening at
a prescribed time. The same time code then automatically switches off the light at a
prescribed time the following morning.
A sample screen follows:
1
2
Download from Www.Somanuals.com. All Manuals Search And Download.
Section 4: Master File Entry
4-43
Serial #. A nine-digit maximum control number automatically generated and displayed by
the system when a new auto open / activate code is added. This information is not entered
by the user.
Reader ID or Point ID. Required. Enter the applicable reader or output point ID number.
Timecode. Required. Enter the applicable time code.
DEVICE REPORT DEFINITION [rdefentr]
Use this feature to create action reports for the SE 8xx-series and SE 422 ACUs. An action report
isasetofuser-definedtasksperformedbytheACUwhenspecifiedconditionsoccur. Theactions
are defined using the device report definition screen (sample screen shown below); the reports
are assigned using screens described in the device entry subsection. For complete descriptions
onhowtousethereportdefinitionscreenforthevariousACUtypes, pleaserefertotherespective
ACU manuals.
NOTE
Thelistoftimeconditionsinthelefthandsideofthescreen(TimeCodeA-C)andthetaskchoices
running left to right, such as Send To Host are used to define actions. To define an action, type
a Y or N, or a number as appropriate for the desired task in the field under the appropriate task
choice. For example, if you want the report to send information to the host when the building is in
the open mode, type Y in the Bldg Open field under the Send to Host column.
SE 422 PIN DEFINITION
The number of PIN digits and the PIN seed must be defined and entered. The seed is used as
part of an equation to calculate PIN numbers assigned to keyholders.
Download from Www.Somanuals.com. All Manuals Search And Download.
4-44
Section 4: Master File Entry
Assigned PIN numbers can be printed out (see Section 3, SE 422 PIN Master Report). Also, it
is possible, but not recommended, to override the system-wide default values entered here (see
Device Entry, SE 422, in this section). A sample data entry screen follows:
2
1
PIN Digits. Optional. Enter 4 or 5. Default is 4.
PIN Seed. Optional. Enter a number in the range 0 — 999999. Default is 0.
SE 422 HARDWARE DEFINITION
Various special-function subdevices may be connected to the SE 422. These include input
monitoring or output control devices (MIROs), proximity key or magnetic stripe card readers, and
keypads allowing PIN entry.
The subdevices as connected to the SE 422 are known as nodes on the SE 422 communications
network. A node is further defined by assigning it a point ID, by entering the device ID of the SE
422 to which the subdevice is attached, the communication address (node) number of the
attachment, the report number to use if the device fails, and the serial number of the subdevice.
A sample data entry screen follows.
1
2
"
#
Point ID. Required. Enter a four-digit point ID and device description.
Device ID. Required (zoom available). Enter an existing SE 422 device ID.
Node Number. Required. Note that each node device must have an address (or serial
number)assignedtoitwiththeSerialCommandduringdatabasesetup.Enteranodenumber
in the range 1 — 18.
Download from Www.Somanuals.com. All Manuals Search And Download.
Section 4: Master File Entry
4-45
DevFailureRpt. Optional. Enteradevicefailurereportnumberintherange1—32. Default
"
#
is 0 — No report.
Serial Number. Required. Enter the device serial number (imprinted on a rotary switch).
DIALER ENTRY
An optional, factory-set remote dial-up poller must be established to enable the remote dial-up
feature for 8xx-series ACUs connect to an RDI unit or to a dial-up 422. The dialer entry screen
is used to enter various control parameters for the off-site ACUs. A sample screen follows:
1
2
"
#
$
%
&
'
ꢀꢁ
11
ꢀ
ꢀ!
Device ID. Required (zoom available). Enter a four-digit device ID number (system
automatically displays device description).
Associated Poller ID. Required (zoom available). Enter the remote dial-up (scheduler
poller) poller ID number assigned to this device (system automatically displays poller
description).
Remote. Required. Enter remote location phone number. Note that if the host must dial a
prefix, be sure to include it.
Host1. Required. Enter host phone number. For RDI units only, enter log in string and
password (default shown). Note that if the remote must dial an area code or other prefix, be
sure to include it.
"
Download from Www.Somanuals.com. All Manuals Search And Download.
4-46
Section 4: Master File Entry
Host2. Required, if applicable. Enter alternate host #2 phone number. For RDI units only,
#
$
%
&
enter login string and password.
Host3. Required, if applicable. Enter alternate host #3 phone number. For RDI units only,
enter login string and password.
No Activity Disconnect Seconds. Optional. Enter the number of no activity seconds to
elapse before host disconnects from the remote ACU. Default is 90 seconds.
RLC/RDI should: Two related Y / N fields:
•
•
Call when alarm occurs: Y or N
Dial back: Y or N — Not currently implemented.
Number of transactions to hold: Optional. Enter the number of transactions to be held
'
in remote memory. Default is 4000.
Minutes before: Three related fields:
ꢀꢁ
•
•
•
Host Retry. Number of minutes to wait before retrying call to host for example, every
two minutes.
Minimum Call. Minimum elapsed time before dialing remote site for log messages (in
hours) for example, every six hours.
MaxCall. Maximumelapsedtimebeforedialingremotesiteforlogmessages(inhours)
for example, every 12 hours.
Schedule Next Call on / at. Enter the time and date when next call is to be made. Note that
a future date will cause the scheduler to Not dial the devices until the future date/tune is
reached.
Statistics for last successful call (automatically displayed and updated): Date, Time,
Type, Count.
ꢀ
Numberoffailedcallattemptssincelastsuccess(automaticallydisplayedandupdated).
ꢀ!
SITE ENTRY DEFINITION
Site codes restrict the use of one or more doors to specific groups of cards (a particular company,
a particular department, etc.). Up to 64 site codes can be assigned to the same card group ID.
The group ID is used by ACUs which support ABA magnetic card readers to make access
decisions based on site codes. A sample screen follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
Section 4: Master File Entry
4-47
2
1
Group ID. Enter a four-character maximum group ID number.
1
2
Code. Enter a four-character maximum site code. Enter x in any position to act as a wild
card; all characters in that position are matched. With the first 'x entry' in the sample screen,
for example, the range 1230 through 1239 would be matched.
ABA CONFIGURATION ENTRY
The ABA (American Banking Association) configuration entry screen is used to define codes to
be read from a standard ABA magnetic stripe card reader, and to define actions to be taken in
response to the cards read. A sample screen follows:
1
2
"
$
#
%
&
'
ꢀꢁ
11
Configuration ID. Enter a four-character configuration ID number.
1
2
Key A. Start position and length of first part of key. Key fields A, B and C are linked to form
the key field.
Download from Www.Somanuals.com. All Manuals Search And Download.
4-48
Section 4: Master File Entry
Key B. Start position and length of second part of key.
Key C. Start position and length of third part of key.
Expiration Date Start. Expiration date start position.
Site Code. Site code start position.
"
#
$
%
ABACardDataAction. Thereportnumber(ID)thatwillexecuteinresponsetoanABAcard
swipe event.
Based on Key Number. Y / N — Actions to take that are based on the key number.
Based on Site Code. Y / N — Actions to take that are based on the site code.
Based on Expiration Date. Y / N — Actions to take that are based on the expiration date.
Use Site Code as Key. Y / N — Use the site code as the key number.
&
'
ꢀꢁ
11
DKR CONFIGURATION ENTRY
The DKR (Digital Key Reader) configuration entry screen is used to change the factory-set
operationaldefaultvalues. Abriefintroductiontotheseproceduresisgivenhere,butforcomplete
information consult the appropriate DKR manual. In all cases, however, do not attempt these
procedures without first contacting your dealer and/or WSE customer support.
1
2
#
"
$
Configuration ID. Enter a configuration ID number in the range 1 — 9999.
Send Key to ACU Once. Controls the number of times the key number is forwarded to the
ACU while within the read-range of the reader. The default is Y—Once.
Download from Www.Somanuals.com. All Manuals Search And Download.
Section 4: Master File Entry
4-49
Read Range. Controls the maximum read range available with the particular digital reader.
The range is 0—255; default is 255.
NumberofReads. Controlsthenumberofadditionalverificationreadsofasinglekeywithin
"
#
the sensor’s range before declaring the key valid. The range is 0—255; default is 1.
Read Time. Controls the amount of time that the reader retains the key number in memory
after the key is removed from the sensor’s read range. The valid range is 0—65535 clock
ticks (100 clock ticks is equal to 1 second); default is 100.
LEDandBeeperSetup. Beeper, RedLED, andGreenLEDon-time, off-time, andduration.
Override the default operation of the beeper, Red LED, and Green LED on the digital key
reader in response to a valid key read. The valid range for on-time, off-time, and duration
is 0-65535 clock ticks. The default is 0 (uses factory-set predefined behavior).
$
USER-DEFINED INFORMATION
Certain field titles on the keyholder record screens can be changed to suit the individual SE 6000
owner. Since keyholder records may be considered the primary data items for an access control
system,manySE6000ownersusethefieldtitlechangefeaturetotailorthesystemtotheirprecise
requirements(thesefieldsareprovidedforinformationalpurposesandforuseasreportselection
criteria, and have no effect on system processing).
The field titles are changed with the control file maintenance feature accessed from the System
Administration menu (see Section 6: System Administration):
The user-defined information selection here in the master file entry menu is used to assign
descriptions to these fields. A sample screen follows: Note that a description of "unused" will skip
the field during keyholder file maintenance.
Download from Www.Somanuals.com. All Manuals Search And Download.
4-50
Section 4: Master File Entry
MAPS
TheDRAWMAPSfunctionisusedbytheeventmonitoringfunctiontodisplaythelocationofdoors,
points, alarms, etc. To use this feature on an SE 6200 and above, it must be operating under the
Reflection 4 terminal emulation software (mouse required). You can also use this feature on an
SE 6100 or below from your console. This requirement is due to the SCO Unix graphic memory
limitation. The function has several built-in HELP maps, and drawing instructions display at the
foot of all screens. A sample map follows:
MAP DRAWING COMMANDS AND DESCRIPTIONS
COMMAND
Delete Ob
DESCRIPTION
Remove graphics and text. Once selected, the menu list shows only those object types
currently on the map. Select one, then follow deletion instructions.
Download from Www.Somanuals.com. All Manuals Search And Download.
Section 4: Master File Entry
4-51
ReDraw
Rectify
Redraws screen. Use if graphics appear incorrect.
Makes all lines close to horizontal or verticalexactly horizontal or vertical. Lines nearly 45°
are drawn at exactly 45°.
Rescale
Curve
Rescale (resize) map. Lines and curves change; text and icons do not change.
Draw curved lines.
Draw circles.
Circle
Rectangle
Triangle
Polyline
Line
Draw boxes.
Draw triangles.
Draw connected lines.
Draws a single line.
Create text labels (large and small).
Text
Outpt Pt
Output point icon — Rectangle with a smaller rectangle crossing it (point 4103 on sample
map).
Camera Pt Camera point icon — Rectangle with a small projection to the left (point 9997 on sample
map).
Sensor Pt
Sensor point icon — Black rectangle when locked; white when unlocked (point 1030 on
sample map).
DoorSw Pt Door switch icon (point 1031 on sample map).
Alarm Pt
Fire Pt
Alarm point icon — Red rectangle (point 999 on sample map).
Fire point icon. The icon shows a red and yellow flame above a rectangle (point 4102 on
sample map).
File Menu
Switch to File Menu to load, save, rename, copy, delete, or start new maps.
EXIT DRAW Exit DRAWMAPS program.
Download from Www.Somanuals.com. All Manuals Search And Download.
4-52
Section 4: Master File Entry
SE 422 Input Table
0
1
2
3
3
4
5
5
6
ACU (2-state) 0:
M16 /RO1 1:
1
2
4
6
7
8
9
10
11
18
25
32
39
46
53
60
12
13
20
27
34
41
48
55
62
14
21
28
35
42
49
56
63
(4-state input) 2:
15
22
29
36
43
50
57
64
65
66
67
68
69
70
72
74
75
16
23
30
37
44
51
58
17
24
31
38
45
52
59
19
26
33
40
47
54
61
3:
4:
5:
6:
7:
8:
RO4 (4-state) 9:
10:
Input points are always on
sensor 1, contact 1-75
11:
12:
13:
14:
15:
16:
VIP (2-state)
SI (4-state)
71
73
MSR (2-state) 17:
18:
SE 422 Output Table
0
1
2
2
3
3
4
4
5
5
Acu (2-state) 0:
1
M16/RO1
1:
6
7
(4-state input) 2:
8
9
3:
4:
5:
6:
7:
8:
10
12
14
16
18
20
22
27
32
37
11
13
15
17
19
21
23
28
33
38
42
45
Output points are always on
sensor 2, contact 1-51
RO4
9:
24
29
34
39
43
46
25
30
35
40
44
47
26
31
36
41
10:
11:
12:
13:
14:
15:
16:
17:
18:
VIP
SI
MSR
48
50
49
51
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 5
MASTER FILE REPORTS
INTRODUCTION
The master file reports list comprehensive database information. The report menu screens are
accessedviathemasterfilereportsmenu[rprtmenu],displayedviathemainmenu. Inthissection,
the reports are documented following the reports menu sequence (see section table of contents).
A sample [rprtmenu] screen follows:
All screens in this section show the system default values, with most screen fields requiring a
numeric range entry. For example, the default range for keyholders is 1 — 999999999 (to reduce
waiting time while a report is generating, enter the smallest range of numbers for each category
which will still provide the information wanted). Other screen fields include choices for date
ranges, regular or extended information, and report sequencing. When all fields have been
entered, press Enter (Yes - default) to begin report generation:
Oncecompiled,areportoutputselectiondisplays. Normally,1(systemreportprinter)orD(display
at terminal) is chosen. The system also gives the option to print to a terminal printer. Report totals
are printed at the end of each report.
Download from Www.Somanuals.com. All Manuals Search And Download.
5-2
SECTION 5: MASTER FILE REPORTS
ADDITIONAL INFORMATION
An additional report feature not accessed via the reports menu, 132-xx Column Report Display,
is detailed at the end of this section.
KEYS MASTER
Two versions of the keyholder master report are available — Keyholder Quick List and Keyholder
Master List (extended). The quick report includes keyholder ID, key number, keyholder name,
information from user-defined fields B and D, phone number, title, user-defined field C, and floor.
The masterreportincludesallthekeyholderinformationenteredonpage1ofthekeyholderentry
screen, plus address, phone number, and user-defined field 7. Also, the master report prints
access code information (first 20 codes) for each keyholder. A sample [key_rprt] screen follows:
Notethatcertainreportscreensincludeasortsequencefieldandanumberedlistofsortsequence
categories. Enter one of the numbers into this field to print data related to that sequence number.
For example in the Keyholder Master Report screen, enter number 1 in the Sort Sequence field
to sort data by keyholder ID (see the following example).
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 5: MASTER FILE REPORTS
5-3
KEYHOLDER QUICK LIST — SAMPLE REPORT
06/02/96
14:45
BAYOU INDUSTRIES
Key Quick List
Page
1
KeyholderKey No
Keyholder Name
Dept. Pos. Phone
Title
Bldg
___________________________________________________________________________________________________________
220774 409
221922 811
222172 512
233132 588
239445 277
245165 338
246763 445
247666 176
248112 765
249343 453
JENSEN STEVE
KREBS SCOTT
DUNN JEFF
NEWMAN TERESA
CLEMENT KAREN
KIRK KATHY
FERRELL STUART
KERR KATIE
LOWE LORRAINE
GREENWOOD LORI
11
11
11
11
11
11
11
11
11
11
6
6
7
0
0
6
7
0
7
7
18
18
18
18
5
18
18
0
123-4567
890-1234 RECEPTIONIST
PINKERTON SECURITY
567-8901 SECURITY MGR
234-5678 SECURITY RECEPTIONIST
901-2345 SECURITY RECEPTIONIST
2
1
KEYHOLDER HOLDER MASTER REPORT — SAMPLE REPORT
08/02/96
PAGE
McArthur Complex
1
10:58
Keyholder Master List
Keyholder
Lynne
Key No
Engineering
S.S. No 123-45-6789 Addr2
Clara Annex
222541 Name
Company
Cross, Gregory
Company
Dept
2 = J o h n s
2 =
2332 Addr1
1917 Blair Avenue
Weston, CA 95199
Location
Job Cat
5 = S a n t a
14 = Software
Tenant
1 Addr3
Engineer
P.I.N.
1314 Privledge YES
Shift
Status
0 = N/A
0 = N/A
Remarks Occasional late evening, weekend work
Phone (123)456-7890 Trace N Visitor YES Issued 07/14/96 Returned **********
Access Codes 1 4 7 8 21
Download from Www.Somanuals.com. All Manuals Search And Download.
5-4
SECTION 5: MASTER FILE REPORTS
ACCESS ASSIGNMENTS
KEYHOLDER ACCESS ASSIGNMENT
This report prints the access codes and access groups assigned to keyholders. Regular and
extended versions of the report are available.
The regular report lists keyholder numbers and names, access code / group numbers and
descriptions,andaccessoverridecodeswhereapplicable. Theextendedreportincludesthisdata
and also gives key number, social security number, tenant number, PIN, company, department,
location, job category, shift, status, remarks, phone, trace, visitor, and badge issue information.
A sample screen follows:
KEYHOLDER ACCESS ASSIGNMENT: REGULAR — SAMPLE REPORT
06/06/96
BARON PARK HOLDINGS
Page
1
10:13
Keyholder Access Assignment List
Keyholder Keyholder Name
Code Code Description
Group Group Description Override
_________ _____________________ ____ _____________________ _____ _________________ ________
23342 Smith, James
22243 Stevens, Sandy
21188 Svensen, Lars
23397 Swenson, Lawrence
24411 Tauber, Linda
1 Host 422, 708, 818
1 Host 422, 708, 818
1 Host 422, 708, 818
1 Host 422, 708, 818
1 Host 422, 708, 818
1 Main
1 Main
1 Main
1 Main
1 Main
0
0
0
0
0
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 5: MASTER FILE REPORTS
5-5
KEYHOLDER ACCESS ASSIGNMENT: EXTENDED — SAMPLE REPORT
06/09/96
12:30
Nova Systems, Inc.
Keyholder Access Assignment List
Page 1
Access Code1 = Host 422, 808, 818
Override Code 0 =
Company 1 = Nova Systems
Dept 3 = Engineering
Keyholder
Key No
S.S. No987-65-4321 Addr2
331 Name
1038 Addr1
Sands, Jerry
1727 Oakmead Parkway
Apt 12B
Location 1 = Tulip Grove Main
Job Cat 6 = Software Engr
Tenant
P.I.N.
Remarks
1 Addr3
2198 Privledge YES
Tulip Grove, CA 91999
Shift 0
Status 0
= N/A
= N/A
Phone 224-8089Trace NO Visitor NO Issued 03/31/95 Returned ***********
READER ACCESS ASSIGNMENT
This report prints keyholder access permissions at a specific reader and applicable time codes.
A sample screen follows:
READER ASSIGNMENT — SAMPLE REPORT
04/16/96
11:26
Soames Industries
Access Report by Reader
Page
1
Keyhld IdKeyholder Name
Reader Reader DescriptionTmcd Start End Mon Tue Wed Thu Fri Sat SunHol
________ ________________________ ______________________ _____ ___ ___ ___ ___ ___ ___ ___ ______
12235 Honsleigh Paul
12345 McDermott Ian
13445 Allentown Debra
57 Freight Car #3
57 Freight Car #3
57 Freight Car #3
1
1
1
00:00 23:59 Y
00:00 23:59 Y
00:00 23:59 Y
Y
Y
Y
Y
Y
Y
Y Y
Y Y
Y Y
Y Y Y
Y Y Y
Y Y Y
Download from Www.Somanuals.com. All Manuals Search And Download.
5-6
SECTION 5: MASTER FILE REPORTS
ACCESS DEFINITION
ACCESS CODE MASTER
Thisreportdetailsallaccesscodesdefinedinthesystem(thereportcanbelimitedtoasinglecode
or a range of codes, as required). A sample screen follows:
ACCESS CODE MASTER LIST — SAMPLE REPORT
05/02/96
11:26
Soames Industries
Access Code Master List
Page
1
Code Code Description Reader Reader Description Tmcd Start End
____ ________________ ______ __________________ ____ _____ ___
Mon Tue Wed Thu Fri Sat Sun Hol
___ ___ ___ ___ ___ ___ ___ ___
12 Weekend Rcvng
13 Holiday Rcvng
19 Lab After Hrs
20 Lab Weekends
22 Receiving #1
22 Receiving #1
06 Lab Main
14
15
05
06
09:00 15:00 N
09:00 12:00 N
15:30 23:59 Y
09:00 23:59 N
N
N
Y
N
N
N
Y
N
N
N
Y
N
N
N
Y
N
Y
N
N
Y
Y
N
N
Y
N
Y
N
Y
06 Lab Main
ACCESS GROUP MASTER
This report details all access groups defined in the system (the report can be limited to a single
group or a range of groups, as required). A sample screen follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 5: MASTER FILE REPORTS
5-7
ACCESS GROUP MASTER LIST — SAMPLE REPORT
06/10/96
10:03
HIGHLAND ELECTRONICS
Access Group Master List
Page 1
Group Group Description
Code Code Description
SFS
_____ ______________________________ ____ ________________________________ ___
1 DWNLD 801/802/8100/4222
1 DWNLD 801/802/8100/4222
5 DWNLD 801 ACCESS CODE
6 DWNLD 802 ACCESS CODE
N
N
2 SFS/708/801/802/8100/4222
2 SFS/708/801/802/8100/4222
2 SFS/708/801/802/8100/4222
1 HOST 422, 808 & 708
3 DWNLD 804 ALPHA LAB 808S #2
4 DWNLD 805 ALPHA LAB 808S #3
N
N
N
ACCESS OVERRIDE
The report lists access override codes in the database, with descriptions, start / end dates, and
permissions (allow / deny access). A sample screen follows:
ACCESS OVERRIDE — SAMPLE REPORT
03/25/96
08:21
Security Electronics
Access Override Codes
Page 1
Code Description
Start
End
Permission
____ ______________________________ ________ ________ __________
1
2
900
TEST OVERRIDE ALLOW
TOXIC CHEMICALS IN USE
RDI OVERRIDE CODE
03/21/96 03/24/96 Allowed
04/14/96 04/14/96 Allowed
05/11/96 05/11/96 Denied
05/25/96 05/26/96 Denied
999
TEST OVERRIDE DENIED
INTELLIGENT FAIL SOFT REPORT
The intelligent fail soft report function, used in the event of a communications failure, lists
keyholder access permissions for each 708P in the system . The report begins a new page for
each device, and shows the readers attached to a device, and the keyholders and their access
permissionsbyindividualreader. Failsoftaccessisusedonlywhena708Pcannotcommunicate
with the host computer. A sample screen follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
5-8
SECTION 5: MASTER FILE REPORTS
INTELLIGENT FAIL SOFT — SAMPLE REPORT
03/25/96
08:24
Soames Industries
Intelligent Fail Soft Report
Page 1
Keyholder Keyholder Name
7110 7120 7130 7140 7150 7160 7170 7180
_________ ______________________ ____ ____ ____ ____ ____ ____ ____ ____
67100 708P PARKING CNTR
63455 DIGI FI-GI
61096 GUARD NEW
61099 1030 ALT+D+P
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
PROJECT REPORT
The Project Report includes number, description, start / stop times and dates, and current status.
NOTE
This report gives project status based on start / stop dates defined by the project entry function
compared to the current system date and time. Since the selection criteria and reported status
do not consider operator overrides, actual and reported project status may differ.
A sample project report screen follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 5: MASTER FILE REPORTS
PROJECT REPORT — SAMPLE REPORT
5-9
03/25/96
08:29
Security Electronics
Project Report
Page 1
Project Project Description
S.Date
S.Time E.Date
E.Time Schedule
_______ ___________________________ ________ ______ ________ ______ ________
1 TEST PROJECT #1
2 TEST PROJECT #2
06/01/96 15:52 06/01/96 15:56 Active
06/05/96 07:30 06/06/96 23:59 Inactive
5 EMERGENCY CIRCUITBOARD REV. 12/17/96 00:00 01/01/99 23:59 Active
50 NEW TEST PROJECT
51 LAUNCH
100 TEST PROJECT #3
06/23/96 00:00 06/25/96 23:59 Inactive
02/16/96 08:00 02/20/96 17:00 Inactive
06/05/96 00:00 06/10/96 23:59 Inactive
KEYHOLDER PROJECT REPORT
The Keyholder Project Report includes keyholder ID, name, project ID and description, and
current status. A sample keyholder project report screen follows:
NOTE
This report gives keyholder project status based on start / stop dates defined by the project entry
function compared to the current system date and time. Since the selection criteria and reported
status do not consider operator overrides, actual and reported project status may differ.
KEYHOLDER PROJECT REPORT — SAMPLE REPORT
05/05/96
13:47
Security Electronics
Keyholder / Project Report
Page 1
Keyholder Keyholder Name
Project Project Description
Schedule
_________ __________________ _______ _______________________ ________
661091 BOB SMITH
2 TEST PROJECT #2
1 TEST PROJECT #1
Active
661093 JOHN MILLAR
Inactive
Download from Www.Somanuals.com. All Manuals Search And Download.
5-10
SECTION 5: MASTER FILE REPORTS
READER PROJECT REPORT
The Reader Project Report lists project number, description, readers assigned, current status.
NOTE
This report gives reader project status based on start / stop dates defined by the project entry
function compared to the current system date and time. Since the selection criteria and reported
status do not consider operator overrides, actual and reported project status may differ.
A sample reader project report screen follows:
READER PROJECT REPORT — SAMPLE REPORT
05/05/96
13:42
Security Electronics
Project / Reader Report
Page 1
Project Project Description
Schedule Reader Reader Description
_______ ____________________________________ ________ ______ _____________________
10
15
TEST PROJECT #1
Active
Active
8110
8120
808SX DOOR 1
808SX DOOR 2
EMERG. CIRCUIT BOARD REV. PROJECT
1001
1010
422 ENTRY #1
818 #7 DOOR #1 ALPHA
TIME CODES
This report lists all time codes set up in the database. A sample screen follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 5: MASTER FILE REPORTS
TIME CODES — SAMPLE REPORT
5-11
03/25/96
08:36
Security Electronics
Timecode Report
Page 1
Tmcd Description
Start End
Mon Tue Wed Thu Fri Sat Sun Hol
____ ________________________ _____ _____ ___ ___ ___ ___ ___ ___ ___ ___
0
1
2
3
NEVER ACTIVE
00:00 00:00 N N N N N N N N
7-DAYS, 24-HOURS & HOLS 00:00 23:59 Y Y Y Y Y Y Y Y
OFFICE HOURS 7 am - 6 pm 07:00 18:00 Y Y Y Y Y N N N
WEEKENDS & HOLIDAYS
00:00 23:59 N N N N N Y Y Y
HOLIDAYS
This report lists all holidays that have been entered into the system. A sample screen follows:
HOLIDAY CODES — SAMPLE REPORT
03/25/96
08:38
Jamestown Aircraft
Holiday Master Report
Page 1
Date
Description
________ ______________________________
01/01/96
05/27/96
07/04/96
09/01/96
11/28/96
11/29/96
12/24/96
12/25/96
NEW YEAR'S DAY
MEMORIAL DAY
INDEPENDENCE DAY
LABOR DAY
THANKSGIVING DAY
DAY AFTER THANKSGIVING
CHRISTMAS EVE
CHRISTMAS DAY
TENANTS
This report lists all tenant names and numbers defined in the system. A sample screen follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
5-12
SECTION 5: MASTER FILE REPORTS
TENANTS — SAMPLE REPORT
05/04/96
09:07
TRADE CENTER MAIN
Tenant Report
Page 1
Number Description
______ ___________
1 WESTWOOD SECURITY SYSTEMS
2 SOS PUBLISHING (CALIFORNIA)
3 BETA SOFTWARE
4 WALKINS PRODUCTS, INC
COMPANY, DEPT, LOCATION, JOB CAT
Thesereportslistuser-definedcompany,department,locationandjobcategoryinformation. The
report screens are identical for all four — a sample follows:
COMPANY, DEPT, LOCATION, JOB CAT — SAMPLE COMPANY REPORT
03/25/96
08:41
Security Electronics
Company Master List
Page 1
Number
______
Description
_________________________
1
2
3
DRAYTON ENGINEERING
SMITH-JONES WAFER FAB.
MCDOWELL PUBLICATIONS
INSTRUCTIONS
This report lists the operator instructions to be taken following specified events occurring at
specified points. A sample screen follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 5: MASTER FILE REPORTS
SAMPLE INSTRUCTIONS
5-13
03/25/96
08:45
General Electronics Co
Instruction Master List
Page 1
Point Point Description
Zone Instructions
_____ ______________________________ ____ ________________________________________
7114 PRIORITY 10 ALARM
4 EVACUATE LAB AREA
NOTIFY BUILDING MANAGER PAGER #12345
DIRECT FIRE CREW TO SCENE
PROVIDE ASSISTANCE AS NECESSARY
LOG EVENT START/STOP IN SHIFT LOG
9011 RDI 808 #1 1.1 FIRE
5 REMOTE SITE FIRE ALARM
CALL 777-1212 AND NOTIFY LOCAL FIRE DEPT
NOTIFY OPERATIONS MANAGER PAGER #12345
LOG EVENT IN SHIFT LOG BOOK
MAPS
The map report lists all points incorporated into user-defined system maps. The report screen
prompts only for the desired sequence: point ID, point type, or map name.
SAMPLE REPORT — MAP INFORMATION
03/25/96
09:33
CAMPBELL TECHNOLOGY
Map Definition Report
Page 1
Point Point Type Map Name
_____ __________ ________________________
1 CAMERA
1 DOOR
HLP_PNTS
HLP_DOOR
HLP_DOOR
HLP_PNTS
HLP_PNTS
2 DOOR
2 SENSOR
3 ALARM
DEVICE CONFIGURATION REPORTS
ZONES
This report lists all zones defined in the system. A sample screen follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
5-14
SECTION 5: MASTER FILE REPORTS
ZONES — SAMPLE REPORT
03/25/96
08:47
Leigh-Haffner Enterprises
Zone Report
Page 1
Zone Description
Area Prim Level
____ _______________________________ ____ ____ _____
1 ALPHA LAB ZONE
P
P
P
V
H
H
H
H
G
L
L
G
2 HARD PASSBACK ZONE 2
3 HARD PASSBACK ZONE 3
4 HARD ANTI PASSBACK
POLLERS
The report lists all defined pollers in the system. A sample screen follows:
POLLERS — SAMPLE REPORT
03/25/96
08:49
Global Software
Poller Master Report
Page 1
Poller Date In
Comp # Poll # Prim Poller Type Desc Disabled Zone Zone Desc
______ _____________________ ______ ______ ____ ________________ ________ ____ _________
2 DATABASE POLLER
3 422/808 POLLER 1
4 808/422 POLLER 2
5 708P PARK POLLER 5
0
0
0
0
0
1
2
5
11
6
6
Database
808
808
NO
YES
NO
0 OUTSIDE
0 OUTSIDE
0 OUTSIDE
0 OUTSIDE
8
Parking
NO
DEVICES
This report lists all devices defined in the system. A sample screen follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 5: MASTER FILE REPORTS
5-15
DEVICES — SAMPLE REPORT
03/25/96
08:50
McCartney Foundation
Device Master Report
Page 1
Device Device Desc
Comp #Poll # Address Prim Device Type Desc Disabled Zone Zone Description
___________________________________________________________________________________________________
1 HOST
10 LC #1
100 DIAL-UP 422 #1
801 BETA 808 SX# 2
802 BETA 804S #1
0
1
100
0
0
0
0
2
2
0
0
1
2
1
1 Host
NO
NO
YES
NO
0
0
0
2
2
OUTSIDE
2 Controller
15 SE422
10 808SX/SN
4 808S
OUTSIDE BUILDING
OUTSIDE BUILDING
HARD PASS BACK ZONE 2
HARD PASS BACK ZONE 2
0
NO
READERS
This report lists all readers defined in the system. A sample screen follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
5-16
SECTION 5: MASTER FILE REPORTS
READERS — SAMPLE REPORT
06/03/96
12:57
LOVELL-WATKINS INC.
Reader Master Report
Page
1
Reader Reader Description Comp # Poll Dev Sen Point Type Zone
______ __________________ ______ ____ ___ ___ __________ ____
Dir
___
Disd Dsid Desc Rex Rex Desc
____ _________ ___ ________
295
RM-A EAST ENTRY
1
16
1
1 Acc Ctrl
Tmcd Start End
____ _____ _____ ___ ___ ___ ___ ___ ___ ___ ___
1
N/A
2241 2240
Mon Tue Wed Thu Fri Sat Sun Hol
1
00:00 23:59
Y
Y
Y
Y
Y
Y
Y
Y
296
RM-A WEST ENTRY
1
16
1
2 Acc Ctrl
1
N/A
2245 2244
Tmcd Start End
Mon Tue Wed Thu Fri Sat Sun Hol
____ _____ _____ ___ ___ ___ ___ ___ ___ ___ ___
1
00:00 23:59
Y
Y
Y
Y
Y
Y
Y
Y
POINTS
This report lists all points defined in the system. A sample screen follows:
POINTS — SAMPLE REPORT
07/16/96
11:51
Datastyles, Inc
Point Master List
Page 1
Point Point Description
_____ ____________________ _____ ____ ___ ___ ___ __________ ____ ____
93 LOT 1 (IN) DS
Comp# Pol Dev Sen Con Point Type Zone Trace I/O Enable Normal
___ ______ ______
IN OPEN
0
1
1
1
1
Door Switch0
NO
Tmcd Start
____ _____
End
Mon Tue Wed Thu Fri SatSun Hol
_____ ___ ___ ___ ___ ___ ______ ___
06:00 Y Y Y Y Y Y Y Y
2
17:00
94 LOT 1 (IN) RX
0
1
1
1
2
Open on Rex0
NO
IN
OPEN
Tmcd Start
____ _____
End
Mon Tue Wed Thu Fri SatSun Hol
_____ ___ ___ ___ ___ ___ ______ ___
23:59 Y Y Y Y Y Y Y Y
1
00:00
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 5: MASTER FILE REPORTS
AUTO OPENS / ACTIVATES
5-17
Thisreportlistssystempointsandreaderswhichhaveauto-openorauto-activatetimes. Asample
screen follows:
AUTO OPEN / ACTIVATE — SAMPLE REPORT
03/25/96
08:54
Security Electronics
Auto Open/Activate Master List
Page 1
Point Point Description
Point Type Tmcd Start End
Mon Tue Wed Thu Fri Sat Sun Hol
_____ ___________________________ ___________ _____ _____ _____ ___ ___ ___ ___ ___ ___ ___ ___
1830
1850
1870
8240
818 #7 DOOR #3 +VIP
818 #7 DOOR #5
818 #7 DOOR #7
READER
READER
READER
READER
9
14
16
6
10:35 10:40
11:29 12:31
11:59 13:01
15:39 15:39
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
N
N
N
N
N
N
N
N
N
N
N
N
TIM’S 804S DOOR 4
808 REPORT DEFINITION
This report lists all action reports defined for the system 800-series ACUs. A sample screen
follows:
808 REPORT DEFINITION —SAMPLE REPORT
03/05/96
15:22
Security Electronics
808 Report Definition
Page
1
100
DIAL-UP 808 #1
Y
Report
1
Send To Host
Close Latch
Close Output
Bldg Open
Bldg Limited
Bldg Closed
N
N
N
Y
Y
Y
1
Y
Y
1
Time Code
Time Code
Time Code
Contact Number
Print Asterisk With Log
N
Prevent Building Closure
N
Download from Www.Somanuals.com. All Manuals Search And Download.
5-18
SECTION 5: MASTER FILE REPORTS
808 DEVICE CONFIGURATION
This report lists configuration information for the system 800-series ACUs. A sample screen
follows:
808 DEVICE CONFIGURATION — SAMPLE REPORT
06/05/96
15:25
Simms Oil Corporation
808 Device Configuration
100 DIAL-UP 808 #1
Level Name
Password
Reports
Key Definition
A
A
B
C
OPERATOR MGR NEW
G. SAYLES SAYLSG
LYNN VAUGHAN LYNSID
TIM JONES TJO123
Tamper
Power Fail
Override
9 Primary Key Type
4 Aux. Key Type
1 Facil Code
1060
NONE
*
Alt Facil Code
A000
DIALERS
Thetwodialerreporttypesdetailtheremotedialupinterface(RDI)devicesdefinedforthesystem
or those RDI devices which have experienced communication trouble. A sample screen follows:
DIALERS — SAMPLE REPORT
03/25/96
09:00
Security Electronics
Dial Master Report
Page
1
Device
______
Device Description
__________________
Remote Number
_____________
Last Date
_________
Last Time
_________
Who Called # Trans # Failures
__________ _______ __________
900
RDI - ALPHA LAB
4921342
02/19/94
17:10
Host
0
1
SITE DEFINITION
This report lists all site groups and codes defined for the system. A sample screen follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 5: MASTER FILE REPORTS
5-19
SITE DEFINITION — SAMPLE REPORT
03/25/96
09:02
Security Electronics
Site Code Master Report
Page 1
Group
_____
Code
____
1
100
101
0000
1000
1001
7279
6016
ABA CONFIGURATION
This report lists all the ABA configurations defined for the system, and gives the configuration
parameters. A sample screen follows:
ABA CONFIGURATION — SAMPLE REPORT
03/25/96
09:17
Security Electronics
ABA Configuration Report
Page 1
Configuration ID
1000
Start
Length
Key
Key
Key
A
B
C
1
4
10
3
2
3
Expiration Date Start
ABA Key Data Action
15
0
Site Code Start
20
During Fail Soft
Deny Access
Deny Access
Based on key number
Based on site code
Based on expiration date
Use site code as key
N
N
N
N
N
N
N
N
Download from Www.Somanuals.com. All Manuals Search And Download.
5-20
SECTION 5: MASTER FILE REPORTS
DKR CONFIGURATION
The reports lists the system default DKR parameters. A sample screen follows:
DKR CONFIGURATION — SAMPLE REPORT
06/12/96
15:21
Lotus Refineries
DKR Configuration Report
Page 1
Beeper Times
Config. ID Send Once Read Range Number of Reads Read Time On Off Total
255 100 20 30 20
Red LED Times Green LED Times
On Off Total On Off Total
0 0
1
Y
1
0
0
0
0
SE 422 PIN MASTER REPORT
This report lists keyholders having system-calculated SE 422 PIN numbers. A sample screen
follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 5: MASTER FILE REPORTS
5-21
SE 422 PIN MASTER REPORT — SAMPLE
03/25/96
09:22
Soames Industries
SE/422 Quick List
Page 1
Keyholder
Key No
Keyholder Name
Dept Jobcat Phone
Title
Loca Floor
422Pin
___________ ______
_______________________ ____ ______ ___________ __________ ____________ ______
6109 1895573 Duane Eddie
1
1
1
1
3
3
3
3
Assembler Main Mfg Flr 60030
Assembler Main Mfg Flr 31949
Assembler Main Mfg Flr 32112
Assembler Main Mfg Flr 35976
6110 1784422 Juarez Sandi
6112 1901112 De Witt Charles
6113 1788122 Ames Linda
132-COLUMN REPORT DISPLAY
The local print program was originally written to accommodate an 80-character terminal display.
Some terminals now use up to 132 characters, and the new 132-Column Report Display feature
allows for this. The terminals are: HP700/44; HP700/92; Color PC terminals using Reflections 4
terminalemulationsoftware. Thefeatureisautomaticallyenabled,andautomaticallyresumesthe
80-character display mode when the user exits the report program. A sample 132-character
display follows:
NOTE
1. When in the 132-column mode, the terminal scrolls one half page at a time.
2. This new feature is not supported by the HP console terminal provided with the host and LC
systems.
132-COLUMN REPORT — SAMPLE DISPLAY
Point Point Description
Zone Date
Time
Access Type
Keyholder Keyholder Name
Key No
______
_____ ___________________ ____ ________ ________ __________________________ _________ _______________
8110 TIM's 808SX DOOR 1
8110 TIM's 808SX DOOR 1
8110 TIM's 808SX DOOR 1
8110 TIM's 808SX DOOR 1
801 11/18/96 07:28:26 PROJECT ACCESS GRANTED
801 11/18/96 07:28:06 INVALID PROJECT
801 11/16/96 08:32:58 PROJECT ACCESS GRANTED
801 11/16/96 08:22:10 PROJECT ACCESS GRANTED
123456789 TIM H+P+SMF
123456789 TIM H+P+SMF
123456789 TIM H+P+SMF
123456789 TIM H+P+SMF
5825175
5825175
5825175
5825175
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 6
SYSTEM ADMINISTRATION
INTRODUCTION
The administration functions are used to control and maintain the system. These functions are
accessed from the system administration menu, [sys_menu], via the main menu. (Depending on
the operator's program security level, some or all of these functions may not be available.) A
sample screen follows:
SECTION ORGANIZATION
Theproceduresinthissectionareintheordershowninthesystemadministrationmenu (above).
The associated subscreens also follow in order. After the current screen has been saved, most
subscreens display by pressing F2 but some display automatically.
Download from Www.Somanuals.com. All Manuals Search And Download.
6-2
SECTION 6: SYSTEM ADMINISTRATION
ADDITIONAL INFORMATION
Additional system administration-related information is provided at the conclusion of this section.
ADD USERS [addusers]
The add users screen, [addusers], is entered to add, change, or delete system users / operators.
IMPORTANT
The administration log-on and password must be used to access this screen. If you are already
logged on with your regular password, first log off in the normal way, then log on again using the
administration log-on and password.
A sample [addusers] screen follows:
User Name. Required. Enter the user name (first eight letters of last name recommended).
Keyholder ID. Optional. User's keyholder ID. Default is 0. You should have a keyholders
ID assigned to you. When you enter this menu, your name is displayed at the top of the
screen.
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 6: SYSTEM ADMINISTRATION
6-3
Program Security Level. Optional (range 1—9999). Code number indicating the specific
screens the user can access. Default is 1 (complete access).
Tenant. Optional. Enter tenant number (if applicable). Default is tenant 0.
"
#
Monitoring Group. Optional. System code indicating transaction types available to this
user. Default is * — All transaction types.
Transactions may be defined as elements of monitoring groups. For example, access
granted transactions could be placed in monitoring group A, door forced open transactions
could be placed in monitoring group B, all other transactions could be placed in monitoring
group 0 (zero)—the field default. Assignments for these groups could be:
Group A — Assigned to those who need only to monitor day-to-day access granted
transactions.
Group B — Assigned to security guards who need to see all door forced open transac-
tions.
Group 0 — Assigned to the system administrator who needs to see all transactions.
Monitoring Security Level. System code (0, 1, or 2) indicating the user's monitoring / data
changing capabilities. Monitoring security level 0 allows full monitoring / changing capabili-
ties, including disabling points and halting pollers. Monitoring security level 1 is recom-
mended for general use, since it permits a user to control certain functions, such as doors,
but not pollers and points. Monitoring security level 2 limits users to a purely observational
capacity; no functions can be controlled.
$
IMPORTANT
1. We recommend that level 0 be assigned only to completely trained and responsible
personnel, since some level 0 operations could easily disable the system if not
performed correctly.
2. Enter C inthisfieldtousethenewenhancedsecuritymonitoringfeature(seeEnhanced
Monitor Security below).
Allow Alarm Servicing. Y / N / F field indicating if the user has the authority to respond to
alarms in the monitor program, or enter F if the alarm fast acknowledgment feature is to be
allowed.
%
&
Jump Alarm Servicing. Y / N field indicating if the user has the authority to automatically
jump to alarm servicing from monitor when an alarm occurs.
Download from Www.Somanuals.com. All Manuals Search And Download.
6-4
SECTION 6: SYSTEM ADMINISTRATION
Jump Timer Servicing. Y / N field indicating if the user has the authority to automatically
'
jump to timer servicing from monitor when an timer event occurs.
Language. The code number entered will determine what language the system will use for
ꢀꢁ
11
this user. Valid choices are 1=English, 2=French.
Real-Time Maps Security Level. 0=Complete functionality, 2=View maps only (no control
capabilities).
MODIFY PASSWORDS [mod_pass]
Usethemodifypasswordscreentochangeanexistingpassword(mustbeloggedinas addusers).
Enter the user name, then follow screen prompts. A sample screen follows:
Enter the password twice to confirm it.
NOTE
If you enter a user name but then decide that the password does not need to be changed, then
the current password must be reentered.
Toreturntothesystemadministrationmenuafterthenewpasswordhasbeenentered, firstpress
Enter to return to
then press Enter again.
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 6: SYSTEM ADMINISTRATION
6-5
PROGRAM SECURITY [sec_menu]
PROGRAM SECURITY LEVEL ENTRY [pgacentr]
Begin creating program security level types by first displaying the program security level entry
screen [pgacentr]:
2
1
Enter the security level number (four digits maximum).
Enter a description (30 characters maximum).
1
2
Press F6 Store, then press F2 for the program security level definition screen
PROGRAM SECURITY ENTRY DEFINITION [pg1_entr]
Press F7; the first six system data items display:
Arrow down to the first system item for this new security level; press F1. The system displays the
program name and description to the left, and the add/update/delete fields to the right. For
example:
Download from Www.Somanuals.com. All Manuals Search And Download.
6-6
SECTION 6: SYSTEM ADMINISTRATION
Enter Y or N in the add/update/delete fields to give or deny access to these functions on the
selected screen. If you do not make any Y/N selection in the Add, Update, and delete fields, the
keyholder will not have access to the screen. Press F6 Store and then, before any other action is
taken, press F5 to return to the add mode for the next entry. Repeat these actions for all items
in the new security level. Note that the Add, Update, Delete fields only apply to screens with this
capability not to menus.
NOTE
1. Add items to an existing program security using the foregoing methods.
2. To delete an item, first select as shown above then use Esc, d, r.
COPY SECURITY [mnaccopy]
It may be easier to copy an existing security level and make changes to this when creating a new
security level. To do this, display the [mnaccopy] (Copy Program Security) screen, enter the
existing security level number in the Copy From field and enter the new security level number and
description in the Copy To field. Make changes to the new security level using the above
procedures.
SECURITY MASTER LIST [pgacrprt]
Use the security master list [pgacrprt] facility to print a listing of all security levels established for
your system or those for a selected range. A complete list is given in Appendix D: Program
Security Master List.
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 6: SYSTEM ADMINISTRATION
6-7
DISPLAY ALL VALID LOGINS [showuser]
Use the [showuser] screen to identify — by hard copy printout or report display at the system
terminal — all operators who have access to the system (use the [showwho] (Display All Valid
Logins)screentodisplayoperatorscurrentlyloggedon. Followpromptswhenthescreendisplays.
A sample report is recreated below:
10/23/96
13:02
Eton Engineering
Page 1
Login Name
Tenant Security Keyholder
_________________ ______ _________ _________
anderson
melville
smith
0
0
0
1
1
1
1123456
1334229
1348876
DISPLAY CURRENT DATE AND TIME [showdate]
Usethe[showdate]screentodisplaythecurrentsystemdateandtime. Asampledisplayfollows:
DISPLAY ALL USERS WHO ARE LOGGED IN [showwho]
Use the [showwho] screen to display operators currently logged in (use the [showuser] screen to
identify all operators who have access to the system). Follow prompts when the screen displays.
A sample report is recreated below:
Download from Www.Somanuals.com. All Manuals Search And Download.
6-8
SECTION 6: SYSTEM ADMINISTRATION
PURGE A PENDING REPORT [purgrprt]
Use this feature to halt a report currently being printed (applies only to reports created under your
ID). The feature can also be used to display reports. Note that if you log on using addusers you
will have complete printer control.
ENABLE TERMINALS FOR GLOBAL BEEPING [beepentr]
This feature is used to enable terminals to beep when an alarm occurs. Obtain terminal IDs (port
connection — tty___) from system installer and enter with optional description.
SYSTEM CONFIGURATION (syclmenu)
CONTROL FILE MAINTENANCE [ctrlentr]
For informational / custom reporting purposes, certain field titles that display in keyholder record
screens [key_entr] and [key1entr] can be changed to suit the individual user. Since keyholder
records may be considered the primary data items for an access control system, many SE 6000
ownersusethefieldtitlechangefeaturetotailorthesystemtotheirpreciserequirements. Change
fields A through F and 1 through 7 as required.
TERMINAL AUTO SWITCH [ctrlentr]. An additional field at the foot of this screen is optionally used to
set up a particular terminal to automatically switch to the alarm servicing screen (from monitor)
when an alarm occurs. A sample screen follows:
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 6: SYSTEM ADMINISTRATION
6-9
EVENTS [evenentr]
The task / event subsystem is used to program one or more tasks to be automatically performed
in response to the occurrence of a user-defined event. Tasks and events are linked, and the task
must be entered and stored before the system allows the creation of a related event. Events can
initiatethesametask,orasingleeventcaninitiatemultipletasks. Eventscontrolledbyatimecode
automatically perform the task entered in the activate field at the start of the code and the task
entered under the deactivate code at the end of the time code. A sample screen follows:
1
2
3
4
6
5
7
8
Event Serial #. System-assigned. Keeps track of all event entries.
EventPointID. Required. ThepointIDatwhichaspecifiedtransactionmustoccurtoinitiate
a task (can be time code or event date initiated).
Transaction Type. Required. The transaction number which must occur at the specified
point ID to generate a task (see Appendix C: System Transactions for a list of the system-
generated transactions numbers).
Download from Www.Somanuals.com. All Manuals Search And Download.
6-10
SECTION 6: SYSTEM ADMINISTRATION
Modifier. Optional. If applicable, the transaction modifier which defines the event if the
message is user-defined.
EventDate. Optional. Ifthetaskreferencedbythiseventistobesystem-initiated, enterthe
applicable date.
Event Time. Optional. If the task referenced by this event is to be system-initiated, enter
the applicable time.
Time Code. Optional. If the task referenced by this event applies to a specific time code,
enter the time code number.
Perform Task ID. Required. Enter the task ID number.
TASKS [taskentr]
Usedtosetuptasksforthetask/eventsubsystem. Tasksmustbecreatedbeforetheassociated
event.
1
2
3
4
5
6
7
Task Serial #. System-assigned number used to keep track of all tasks.
Task ID. Required. Enter a user-assigned task ID number. Task IDs do not have to be
unique. All occurrences of a given task will be executed by an associated event.
Description. Optional. Enter a brief description of the task.
Task Point ID. Required. Point ID number controlled by this task.
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 6: SYSTEM ADMINISTRATION
6-11
Activate Code, Extension. Required. System code number for the type of action to be
performed. The extension applies to camera presets for pan and tilt, or image verification
when used with a Polaroid ID-4000 system. See table following this field description list.
DeactivateCode,Extension. Optional. Ifthistaskistobeautomaticallycontrolledbyatime
coded event, enter the activate / deactivate code to be executed when the event time code
ends. See table following this field description list.
User Interactive. Conditional (applies to event times). A Y/N field to indicate if a timed task
can be cancelled by an operator.
ACTIVATE / DEACTIVATE CODES
09 REQ MANUAL ACCESS
29 FORGIVE PASSBACK
41 MANUAL UNLOCK
45 MANUAL LOCK
Request to perform manual access.
Request to forgive passback.
Unlock a sensor / lock for an unlimited time.
Lock a sensor /lock.
46 TIME UNLOCK
Unlock a sensor / lock for the amount of time specified by the
hardware settings, or, where applicable, by the amount of time in
the Unlock Time field of the reader entry screen.
56 BUILDING OPEN
Set building mode to OPEN
Set building mode to LIMITED
Set building mode to CLOSED
57 BUILDING LIMITED
58 BUILDING CLOSED
70 DEACTIVATE OUTPUT
Turn off the specified output. Use this code if you are elsewhere
turning an output on for an unlimited time.
#
Activate / Deactivate Code Explanation
71 ACTIVATE OUTPUT
TurnonaspecifiedoutputfortheamountoftimeshownintheTime
field on the point entry screen. If Time=0, the output will be on for
an unlimited amount of time, and you must turn it off with an a
deactivate output code.
80 Chain Task
Jumps to another group of task records and is used to consolidate
multiple task into a separate task.
#
Activate/Deactivate Code
Explanation
81 EXTENDED PROCESSING Instruct extended processing poller to process a transaction. Use
with elevator, parking control, VIP2, and poller transactions with a
point ID which matches the poller record for these functions.
89 SHUNT POINT
Shunt a specified point.
90 UNSHUNT POINT
Unshunt a specified point.
91 REQUEST RESET DEVICE Perform a device reset for an applicable device.
92 REQUEST RESET KEYS Perform a key download for an applicable device.
Download from Www.Somanuals.com. All Manuals Search And Download.
6-12
SECTION 6: SYSTEM ADMINISTRATION
100 ACTIVATE PROJECT
Activate an inactive project.
Deactivate an active project.
101 DEACTIVATE PROJECT
102 NORMALIZE or
CLEAR PROJECT
Change project status to its normal condition (clears an override
condition).
TASK EVENT / MASTER REPORT [taskrprt]
This report shows all tasks / events established in the system:
04/14/96
13:02
ATARAXIA ELECTRONICS
Page 1
Task Task Description
_____ _______________________
42 UNLOCK DOOR
Point
________
708 #2
Activate Desc
_______________
ENTER ZONE B
Deactivate Desc
_________________
Man Open
Cancelable
__________
N
EVENTS
7120
708 #2 ENTER ZONE B
62 0 KEY NOT ACTIVE No Activity
Mon Tue Wed Thu Fri Sat Sun Hol
___ ___ ___ ___ ___ ___ ___ ___
Tmcd
____
1
Start
_____
15:30
End
_____
16:15
Y
Y
Y
Y
Y
N
N
N
TRANSACTIONS [tranentr]
Customized versions of any system transaction (log message) can be created. The custom
transactions are created using the transaction entry screen, where they are linked to the point or
reader screens by a transaction modifier code. The codes are any of the following: A — Z
(uppercase), a—z(lowercase), 1—9(0isthedefaultmodifierforallstandardtransactions). (Up
to 62 log messages can be associated with the same event.)
2
1
4
6
3
5
8
7
10
12
9
11
13
16
15
14
17
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 6: SYSTEM ADMINISTRATION
6-13
Transaction Type (ID). The unique ID number of a transaction. The system is pre-
programmed to use specific transaction types for certain events at certain types of points.
(See Appendix C: System Transactions for a complete list of standard transactions.)
TransactionModifier. Requiredasapplicable. Enteratransactionmodifiercodetoindicate
acustomizedversionofastandardtransaction. Thevaluesare:AthroughZ(alluppercase),
a through z (all lowercase), 0 through 9.
TransactionGroup. Forfutureuse. Willpermitthecategorizingoftransactionsintobroader
groups for easier reporting and editing.
Alarm Priority. Conditional. Used to declare that a particular transaction is an alarm
transaction, and to indicate the alarm priority. The range is 1 through 9, with 1 being the
highest priority and 9 the lowest. Enter 0 for a non-alarm transaction.
Event/Task Activity. Conditional. Used if the system has been programmed to respond to
a particular event via the event / task subsystem. Enter 1 to activate the task; enter 2 to
deactivate the task.
Time to Acknowledge. Enter a value in minutes to allow for alarm acknowledgment. If the
alarm is not acknowledged by this time, an ALARM NOT ACKNOWLEDGED message is
written to the log and repeats at the interval specified until acknowledged.
Display Color. Determines the transaction display color in the monitor mode. The colors
are:
0
1
2
3
4
=
=
=
=
=
Black
Red
Green
Cyan (light blue)
Blue
ClearTransaction. Conditional. Enterthealarmclearingtransactionnumber.Forexample,
with transaction 92 (Alarm Active), enter 93 (Alarm Clear) as the clearing transaction. If a
clearing transaction is specified, the alarm event cannot be removed from the pending
alarms screen until the clearing transaction is received.
MonitorGroup. Usedtoclassifytransactionsintogroups,sothatthedisplayoftransactions
based on log-in name can be controlled. The default monitor group assignment when users
are added to the system is * — All monitor groups displayed.
Printer Color. Determines the color in which this transaction will display when printed on a
color-capable log printer. The colors are:
0
1
=
=
Black
Red
Download from Www.Somanuals.com. All Manuals Search And Download.
6-14
SECTION 6: SYSTEM ADMINISTRATION
2
3
4
=
=
=
Green
Cyan (light blue)
Blue
Display Icon. For future use.
PrinterGroup. Eachlogprintermustincludetheselectedprintergroupinitslistofavailable
printergroups. Iftheselectedprintergroupisnotincluded, thetransactionwillnotbeprinted
onthelogprinter. Printersarepresettoincludealltransactions(PrinterGroup=*). Toprevent
a transaction from printing, assign it to a printer group other than 0, then change the printer
to 0.
Audible Alert. IndicateswithN(none), S(single), orC(continuous)thetypeofaudiblealert
which this transaction should produce (applies only if a user is in the monitor mode). If you
wish to have a terminal alerted whenever this transaction occurs, enter N in this field.
TransactionLog. Y/Nfieldtoindicateifthistransactionistobestoredinthearchivehistory
file on disk. The transaction history file is listed using the transaction history report.
KeyholderLog. Y/Nfieldtoindicateifthistransactionistobestoredinthekeyholderhistory
fileondisk. Thesystemkeepsasmallareaofdiskspaceavailabletostorethelast20events
for all individual keyholders in the system. The keyholder history file is listed using the
keyholder history report.
Point Log. Y / N field to indicate if this transaction is to be stored in the point history file on
disk. The system keeps a small area of disk space available to store the last 20 events for
allindividualpointsinthesystem. Thepointhistoryfileislistedusingthepointhistoryreport.
Description. Used to define the transaction description displayed on the monitor screen.
DATABASE MAINTENANCE [db_menu]
DISPLAY DATABASE STATISTICS [dbstats]
Display this data regularly to control disk space usage. Note the PUBLIC.archist table size near
theendofthereport. Thetablesizeindicatesthenumberoftransactionscurrentlystored. Perform
an archive whenever the row count is roughly 80% of the expected number of rows.
A message is displayed if the row count reaches the expected number of rows. If this happens,
archive immediately. Two other tables should be checked regularly and purged if the expected
number of rows exceeds 80%: PUBLIC.download; PUBLIC.alrmtran.
PERFORM BACKUP [bkup]
Two backup types are available — Database and Full Volume:
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 6: SYSTEM ADMINISTRATION
6-15
DATABASE BACKUP. A database backup copies all information in the database (exceptions user and map
information). If you make a number of changes to keyholder, hardware, and / or access
information in a single day, then the database backup should be performed each day. For these
purposes, use two alternating tapes (one for odd days, one for even) to guarantee that no
information will be lost in the event of a hardware malfunction.
FULL VOLUME BACKUP. A full volume backup copies all system data including programs, system
configurationinformation, anduser/mapinformation. Thebackuptapecreatedisusedtorestore
the system in the event of a hardware malfunction. A full volume backup should be performed
immediatelyfollowingsysteminstallation,andthenonamonthlybasisorwhenevertherehasbeen
a major system update or reconfiguration.
DOWNLOAD CLEAN UP AND RETRY [downcln]
Download records are data transferred from the database to computer memory or to intelligent
remote devices. Each time information is entered and stored in the database, one or more
download records are created and written to the download file. If the download transfers are
unsuccessful, the number of records created can increase the download file size to a point where
systemperformanceisaffected,andtheserecordsshouldbefirstretriedthendeleted. Ingeneral,
perform a download cleanup when the PUBLIC.download table reaches 80% of the expected
number of rows, or if it has been necessary to make a significant number of database changes.
Monitor this table using Display Database Statistics [dbstats].
If you use a large number of intelligent devices, then this table should be checked frequently. A
typical time period for cleaning the download table is once per month. Download records are not
automatically deleted upon successful transfer.
ACCESS CONTROL TRANSACTION ARCHIVING [accsarch]
Archiving transfers information from the system hard disk to tape, freeing up space on the hard
disk for new data. Archiving should be performed regularly to ensure disk integrity. Perform an
archive when the PUBLIC.archist table reaches 80% of the expected number of rows. Monitor
this table using Display Database Statistics [dbstats]. Archiving is usually performed monthly or
everytwomonths.Notethatunlessnecessaryforreportingpurposes,WSErecommendsthatyou
archive system information when your transaction volume reaches 100,000 records.
Download from Www.Somanuals.com. All Manuals Search And Download.
6-16
SECTION 6: SYSTEM ADMINISTRATION
ALARM TRANSACTION CLEAN UP [alrmcln]
Each time an alarm is triggered, a record is created and stored in a separate file along with the
operator's alarm servicing response. This table is then available for reporting using the alarm
servicing report. Over time, the size of this table grows and takes up excessive space on the hard
disk. Cleanup this table when the PUBLIC.alrmtran table reaches 80% of the expected number
of rows. Monitor this table using Display Database Statistics [dbstats].
JOURNAL ARCHIVE [jourarch]
Thisfunctioncopiesjournalrecordstotapeandthendeletesthemfromtheharddisk. Thejournal
archiveprogramarchivesalljournalinformationexceptforthecurrentday. Archivingisperformed
using the [jourarch] screen:
JOURNAL REPORTING [jourrprt]
This function reports all changes to the database. The report prints the column name and value
for each field of each record that has been entered. With updates, the report shows the record
before and after the change. Associated operator, and date and time are also reported. A sample
report follows:
04/02/96
De Quincy Laboratories
Page
1
12:14
Audit Trail Report
Operator
________________ ____________
jon
Table
Date
________
04/02/96
Time
_____
12:07
Operation Type
__________________
Add
cards
upbzone:
ppbzone:
-1
-1
keyisalt: NULL
priv: N
SPECIAL JOURNAL REPORTING [josprprt]
This function produces a formatted history report of all database changes to the keyholders and
keyholder access assignment Information. Sample screens and reports follow:
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 6: SYSTEM ADMINISTRATION
6-17
KEYHOLDER LOADING [loadmenu]
This function copies keyholder IDs and names from an DOS ASCII file to a Unix then creates
keyholder records. The format of records in the ASCII file must be as follows:
•
•
Keyholder ID ^ALastname ^AFirstname (^A refers to a single control-A character)
Keyholder ID 1 to 9 digits; both name fields 15 characters maximum
ID SECURITY MAINTENANCE [ID_menu]
The ID Security Maintenance function controls access to the information shared by the SE 6000
and the Polaroid ID-4000 Identification System. It also controls access to selected fields in the
keyholder record. Add/update functions within the key enter and key-1 enter screen can be
regulated by user ID.
ID SECURITY USER ENTRY [ID1_ entr]
ID Security Maintenance data is created via the ID Security Maintenance menu:
1
2
Required. Enter the user name.
Required.Entertheuser'ssecuritygroupnumber.WiththeSE6000,IDsecuritygroupsmust
exist (or be created via the ZOOM function) before the system administrator can complete
user entry.
Download from Www.Somanuals.com. All Manuals Search And Download.
6-18
SECTION 6: SYSTEM ADMINISTRATION
ID SECURITY GROUP ENTRY [ID2_ entr]
This function is used to create ID security groups. A sample screen follows:
1
2
Required. Enter a unique security group number in the range 1—999.
Optional. Enter a group description (30 characters maximum).
ID SECURITY REPORT [ID1_ rprt]
This function is used to prepare a report showing all users entered into the ID security feature,
along with tenant and group definition information. A sample of a partial screen and report follow:
06/26/96
07:26
Campbell Engineering
ID Security Maintenance Report
Page 1
Login Name
Tenant Tenant Name
Group Group Name
Add
Del
___
______________ ______ ______________________ ______ ______________________ ___
JERID
0 All Encompassing
1
Complete Record Access Y
Y
Field
View Modify
____ ______
______________________
Keyholder ID
Tenant Number
Key Number
Company
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Dept
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 6: SYSTEM ADMINISTRATION
6-19
MISCELLANEOUS INFORMATION
ADJUSTABLE BAUD RATE—708P / 800 POLLERS
Multiple baud rates are supported for the diverse mix of communications equipment available for
the SE 6000 system. The baud rate is set by changing the HOSTBAUD parameter in the
$DATAPATH/NPOLLER.x filewherexistheassociatedpollernumber. Thebaudrateisentered
during installation or changed as needed by the system administrator; operator action is not
required. The baud rate options are:
Parameter missing
HOSTBAUD=4
HOSTBAUD=3
HOSTBAUD=2
HOSTBAUD=1
HOSTBAUD=0
—
—
—
—
—
—
HOSTBAUD defaults to 4 (9600 bps)
9600 bps
4800 bps
2400 bps
1200 bps
300 bps
NOTE
1. The baud rate set applies to all devices controlled by the poller.
2. Thoughfunctional, the300bpsbaudrate(HOSTBAUD=0)isnotrecommendedforthe800-
series devices. The amount of data downloaded to intelligent ACUs significantly impacts
overall system performance when inefficient communication facilities are used.
3. On 708P ACUs, the host port speed on the device is set with dipswitches. Both the device
and the poller must be set for the same speed.
708P REX SHUNT TIME RESET
ThenormaloperationofaREXswitchistoshuntanassociateddoorswitchwhenopeningthedoor
from the nonreader controlled side, or —and in addition— to automatically unlock the door. Once
the door switch is toggled, a DOOR HELD OPEN message is generated if the door is not closed
within the time defined in the door switch point record.
Designed for high-traffic areas, this feature enhances the REX / Door switch functionality by
providing a method to reset the door switch timer while the door is being held open. While
employees continue to present valid keys and to pass through the door (causing the REX point
to continually change state), the door switch timer is reset each time to the number of seconds in
the door switch point record, thus preventing a DOOR HELD OPEN message from being
generated. (The message is generated if the time between key presentation exceeds the time
value in the record.)
Download from Www.Somanuals.com. All Manuals Search And Download.
6-20
SECTION 6: SYSTEM ADMINISTRATION
This feature is enabled / disabled using the REXEXTEND parameter in the $DATAPATH/
NPOLLER.x file where x is the associated 708P poller number. The feature is enabled / disabled
during installation, or may be changed as needed by the system administrator. If changed, the
pollermustbehaltedandrestartedfortheparameterstotakeeffect. TherecognizedREXEXTEND
values are:
Parameter missing
REXEXTEND=0
REXEXTEND=1
—
—
—
REXEXTEND defaults to 0 (feature disabled)
Feature disabled
Feature enabled
NOTE
The enable / disable condition as set applies to all devices controlled by the poller.
KEY INVENTORY [invtmenu]
This feature is used to control system keys. This is an optional feature and does not effect
operation. The menu screen is accessed from the main menu:
INVENTORY STATUS CODE MENU [statentr]
Key codes and descriptions are selected by the user (Code 1=Key in use is frequently set). Other
code descriptions could be: Key available, Key damaged, Key issued, Key lost, Key reported
stolen. In most cases, from four to ten (maximum) are set. The key codes and descriptions are
entered using the key inventory status code entry screen:
KEY INVENTORY STATUS CODE REPORT [statrprt]
This report lists established key codes (for a current key status report, see Key Inventory Report
(following subsection). A sample screen and report follow:
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 6: SYSTEM ADMINISTRATION
6-21
03/25/96
15:52
Ataraxia Electronics
Inventory Status Code Report
Page 1
Code
____
1
Code Description
________________
AVAILABLE
ASSIGNED
2
3
LOST
4
UNUSABLE
5
DAMAGED
6
7
TERMINATED
REISSUED
8
9
10
RECOVERED
PREVIOUS OWNER
RESERVED
KEY INVENTORY ENTRY [cdinentr]
This function is used to add/change key inventory information (to delete a key record, use the
system delete record feature — Esc, d, r):
KEY INVENTORY REPORT [cdinrprt]
A sample screen and report follow:
Download from Www.Somanuals.com. All Manuals Search And Download.
6-22
SECTION 6: SYSTEM ADMINISTRATION
03/25/96
15:55
Alpha Systems
Key Inventory Report
Page 1
Keyholder
_________
Keyholder Name
____________________ ______ ________ _____
Key No Date
Time
Status Descrip
___________________ ________
Remarks
29205
31408
33244
36427
37441
THORPE JAMES
ROSS MICHAEL
DESJARDINS ROBERT
JERRY TIMOTHY
JUDD AL
29606 06/23/96 13:15
31409 06/23/96 13:22
33249 06/23/96 13:25
36426 06/23/96 13:44
37444 06/23/96 13:51
ASSIGNED
ASSIGNED
ASSIGNED
ASSIGNED
ASSIGNED
PARKING STICKERS [stkrmenu]
Thisfeatureisusedtocontrolparkingstickersissuedtokeyholders. Theinitialscreenisaccessed
from the main menu:
PARKING STICKER ENTRY [stkrentr]
Enter the required information; the second parking entry screen automatically displays:
PARKING STICKER INTERACTIVE DISPLAY [stkrrprt1]
This function is used to determine keyholder location. Enter the keyholder ID; the location data
displaysautomatically:
Download from Www.Somanuals.com. All Manuals Search And Download.
SECTION 6: SYSTEM ADMINISTRATION
6-23
PARKING STICKER MASTER REPORT [stkrprt]
The report lists assigned parking stickers. A sample screen and report follow:
06/25/96
16:00
Security Electronics
Parking Sticker Report
Page 1
Keyholder Keyholder Name
_________ _______________________________
Sticker License
_______ _______
28870 TERRY VALE
500003 2MJK239
500031 4B03048
500032 4888308
500001 2PQS707
28977 JESS WHITTINGTON
28993 CHERYL ROBERTS
29001 PETER VAUGHAN
Download from Www.Somanuals.com. All Manuals Search And Download.
APPENDIX A: SYSTEM SCREEN TREES
A-1
mainmenu
monitor
ctrlmenu
dispmap
revtran
alrmserv
othrmenu
ctrlpoll
ctrldev
viewmap
ctrlprnt
devcomm
devstat
insrtns
psbkfrgv
manacc
ctrllock
ctrlinp
response
download
ctrlout
rem_dev
bld_mod
ctrldoor
selzone
monitor
(Full Screen)
Screen Location Tree — Monitor Security Activity
Download from Www.Somanuals.com. All Manuals Search And Download.
A-2
APPENDIX A: SYSTEM SCREEN TREES
mainmenu
accsmenu
chstrprt
acrtrprt
phstrprt
excprprt
almarprt
whowhere
ky2nrprt
rpasrprt
downrprt
evptrprt
Screen Location Tree — Security Management Reports
Download from Www.Somanuals.com. All Manuals Search And Download.
APPENDIX A: SYSTEM SCREEN TREES
A-3
mainmenu
fmntmenu
key_entr
key1entr
tmcdentr
hol_entr
tententr
epj_entr
keycopy
empgentr
acc_menu
prj_entr
fs_entr
acoventr
agdsentr
acdsentr
acodentr
agrpentr
egrpcopy
confmenu
eleventr
instentr
zoneentr
pol_entr
dev_entr
areaentr
usrdmenu
nexsentr
areaentr1
d422entr
compentr
deptentr
d808entr
rdr_entr
loc_entr
usraentr
job_entr
usrbentr
d818entr
rdr3entr
rdr1entr
rdr4entr
rdr2entr
autoentr
pnt_entr
rdefentr
nodeentr
drawmaps
egrpentr
pndfentr
dialentr
siteentr
egrpentr1
abacentr
dkrcentr
Screen Location Tree — Master File Entry
Download from Www.Somanuals.com. All Manuals Search And Download.
A-4
APPENDIX A: SYSTEM SCREEN TREES
mainmenu
rprtmenu
key_rprt
aassmenu
emrdrprt
accrmenu
egrprprt
acodrprt
acovrprt
prj_rprt
fs_rprt
instrprt
agrprprt
hol_rprt
epj_rprt
pro_rprt
comprprt
tmcdrprt
tentrprt
deptrprt
loc_rprt
con_menu
zonerprt
dev_rprt
pnt_rprt
pol_rprt
rdr_rprt
autorprt
job_rprt
maprprt
dconrprt
siterprt
rdefrprt
dialrprt
abacrprt
p422rprt
dkrcrprt
Screen Location Tree — Master File Reports
Download from Www.Somanuals.com. All Manuals Search And Download.
APPENDIX A: SYSTEM SCREEN TREES
A-5
Screen Location Tree — Key Inventory
mainmenu
invtmenu
statmenu
statrprt
statentr
cdientr
cdinrpt
Screen Location Tree — Parking Stickers
mainmenu
stkrmenu
stkrentr
stk1entr
stkrrprt
stkrprt1
stkrprt
Download from Www.Somanuals.com. All Manuals Search And Download.
A-6
APPENDIX A: SYSTEM SCREEN TREES
mainmenu
sys_menu
addusers
Custom
Security
Screens
mod_pass
showuser
showdate
showwho
"
.
.
.
sec_menu
mnaccopy
purgrprt
accsarch
beepentr
db_menu
pgacentr
pgacrprt
syclmenu
pg1_entr
tranentr
ctrlentr
taskentr
evenentr
dbstats
bkup
downcln
taskrprt
loadmenu
accsarch
jourarch
josprprt
alrmcln
jourrprt
ID_menu
ID1_entr
ID2_entr
ID3_entr
ID1_rprt
Screen Location Tree — System Administration
Download from Www.Somanuals.com. All Manuals Search And Download.
APPENDIX B: SYSTEM SCREEN HIERARCHIES
MONITOR SECURITY ACTIVITY
B-1
SCREEN TITLE
monitor
FUNCTION
Watch events and activities as they occur; menu to other monitoring and control screens.
Menu to control functions. Zone selection stays in effect until this screen is exited.
Select pollers to halt or restart, and to check device communication.
ctrlmenu
ctrlpoll
devcomm Check communication between computer and attached devices.
ctrldev
devstat
ctrllock
Select devices to reset / shunt / unshunt, and to check status.
Check point status for a particular device.
Select locks to open, lock, time open, shunt, unshunt.
ctrlinp
Select input points to shunt, unshunt.
ctrlout
ctrldoor
selzone
Select output points to activate, deactivate, shunt, unshunt.
Select door switch points to view status, shunt, unshunt.
Select zone to which the control and monitoring will be limited.
Page forwards / backwards through the last 5,000 system transactions.
Display currently pending alarms; provides response instructions, map.
Display user-created map showing alarm locations.
revtran
alrmserv
viewmap
insrtns
Display user-created list of actions to be taken when an alarm occurs at a specific point.
View copy of alarm instructions; enter actions taken in response to the alarm.
Display user-created system maps showing alarms, door status, lock status, etc.
Menu to several system control functions.
response
dispmap
othrmenu
ctrlprnt
Reset, turn on, turn off system log printers.
psbkfrgv
manacc
download
rem_dev
bld_mod
monitor
Restore passback status for a single keyholder, or for all keyholders in the system.
Allow entry for keyholder who does not have a key (operator and keyholder data logged).
Extract database information, then update memory for host and attached devices.
Establish connection with a remotely connected device.
View and control building modes for individual ACUs or all ACUs in a zone.
Provides a full-screen display (22 lines) of real-time transactions.
SECURITY MANAGEMENT REPORTS
SCREEN TITLE
accsmenu
phstrprt
chstrprt
excprprt
acrtrprt
FUNCTION
Menu to the security management reporting functions.
Report last twenty activities which took place at a specific point.
Report last twenty activities which took place for a specific keyholder.
Report transactions currently stored on the hard disk.
Report transactions currently stored on tape.
almarprt
whowhere
downrprt
k2nrprt
Report of operator responses to alarms.
Report number of keyholders in each passback level.
Report database changes. Serves also as an audit trail of operator activity.
Report last zone entered (summary or detail). Uses keyholder history as source.
Report system events — totals for each event within a selected date range.
Report real-time zone passback activity showing how many and / or who is currently in
which zone. Uses shared memory data as source.
evptrprt
rpasrprt
MASTER FILE ENTRY
SCREEN TITLE
FUNCTION
key_entr
Enter primary keyholder information: keyholder ID, key number, name, tenant, etc.
Enter keyholder personal information: address, phone, title, floor, remarks, etc.
key1entr
empgentr Assign access privileges to a keyholder.
epj_entr Assign projects to a keyholder.
Download from Www.Somanuals.com. All Manuals Search And Download.
B-2
APPENDIX B: SYSTEM SCREEN HIERARCHIES
Create new keyholder record by copying from an existing keyholder record.
key_copy
egrpentr
Select a keyholder for access privilege assignment. Can also be reached from key1entr.
Assign access privileges to a keyholder.
egrpentr1
egrpcopy
acc_menu
Copy one keyholder's information to another keyholder.
Menu to reach the access definition functions.
acdsentr
acodentr
Enter / modify access code information.
Add key readers to an access code.
eleventr Enter elevator output contact information for a specific reader in a specific access code.
acoventr
agdsentr
agrpentr
Temporarily override keyholder or keyholder group access.
Enter / modify access groups.
Add access codes to an access group.
Enter / modify fail-soft access capabilities for a 708P.
Define projects, start / stop dates and times.
Enter / modify time code information.
Enter / modify holiday information.
fs_entr
prj_entr
tmcdentr
hol_entr
tententr
Enter / modify tenant information.
instentr
Enter / modify alarm point information
Menu to the system configuration functions.
Enter / modify zone information.
confmenu
zoneentr
areaentr
Enter / modify areas.
areaentr1Enter / modify zones in areas.
pol_entr
dev_entr
Enter / modify poller information.
Enter / modify device information .
nexsentr
Enter / modify information specific to NexSentry.
Enter / modify information specific to 808S.
d808entr
d818entr
d422entr
Enter / modify information specific to 818x.
Enter / modify information specific to SE 422.
Enter / modify reader / key pad information.
rdr_entr
rdr1entr
rdr2entr
rdr3entr
rdr4entr
Enter / modify reader information specific to 808S.
Enter / modify reader information specific to SE 422.
Enter / modify reader information specific to 818x.
Enter / modify reader information specific to NexSentry.
Enter / modify point information.
pnt_entr
autoentr
rdefentr
pndfentr
nodeentr
Enter auto-activation / auto-opening times for points / readers.
Define 808S action reports.
Define default number of digits and seed the PIN (SE 422).
Enter / modify sub-device information for SE 422.
Enter / modify remotely connected device information.
Define site configuration for SE 422.
dialentr
siteentr
abacentr
dkrcentr
usrdmenu
compentr
deptentr
loc_entr
job_entr
usraentr
usrbentr
drawmaps
Define ABA (magnetic stripe card) configuration.
Define digital key reader configuration.
Menu to the user-defined field entry screens.
Enter / modify user-defined field A (appears on key_entr).
Enter / modify user-defined field B (appears on key_entr).
Enter / modify user-defined field C (appears on key_entr).
Enter / modify user-defined field D (appears on key_entr).
Enter / modify user-defined field E (appears on key_entr).
Enter / modify user-defined field F (appears on key_entr).
Create real-time control maps / alarm location maps.
Download from Www.Somanuals.com. All Manuals Search And Download.
APPENDIX B: SYSTEM SCREEN HIERARCHIES
MASTER FILE REPORTS
B-3
SCREEN TITLE
rprtmenu
key_rprt
FUNCTION
Menu to database reporting functions.
Report keyholder information.
aassmenu
egrprprt
emrdrprt
accrmenu
acodrprt
agrprprt
acovrprt
fs_rprt
Menu to the access assignment reporting functions.
Report access codes / access groups assigned to keyholders.
Report specific readers assigned to keyholders.
Menu to the access definition reporting functions.
Report readers and time codes for the access codes.
Report access assignments for access groups.
Report access override data.
Report fail-soft access privileges for 708P.
Report all projects.
prj_rprt
epj_rprt
pro_rprt
tmcdrprt
hol_rprt
tentrprt
Report all keyholders assigned to projects.
Report all projects / readers included in individual projects.
Report all time codes.
Report all defined holidays.
Report all defined tenants.
comprprt
deptrprt
loc_rprt
job_rprt
instrprt
Report all user-defined field A information.
Report all user-defined field B information.
Report all user-defined field C information.
Report all user-defined field D information.
Report all alarm instructions.
map_rprt
con_menu
zonerprt
pol_rprt
dev_rprt
rdr_rprt
pnt_rprt
autorprt
rdefrprt
dconrprt
dialrprt
Report all map names for specific point IDs.
Menu to the system configuration reporting functions.
Report all defined zones.
Report all defined pollers.
Report all defined device information.
Report all defined readers.
Report all point information
Report all point / reader auto-activate / auto-open information
Report all defined 808S action report information.
Report all remotely connected devices.
Report all remote site information.
siterprt
Report all defined ABA sites
abacrprt
dkrcrprt
p422rprt
Report all defined ABA configurations.
Report all digital key reader information.
Report all keyholders for SE 422 (detailed or summary).
KEY INVENTORY
SCREEN TITLE
invtmenu
statmenu
statentr
FUNCTION
Menu to key Inventory functions.
Menu to the status definition functions.
Enter key inventory status codes.
Report all inventory status codes.
Enter key data.
statrprt
cdinentr
cdinrprt
Report inventory information for all keys.
Download from Www.Somanuals.com. All Manuals Search And Download.
B-4
APPENDIX B: SYSTEM SCREEN HIERARCHIES
PARKING STICKERS
SCREEN TITLE
stkrmenu
stkrentr
stk1entr
stkrrprt
FUNCTION
Menu to parking sticker and license plate management functions.
Select keyholder for parking sticker and / or license plate information entry.
Enter parking sticker or license plate information for keyholder.
Locate keyholder by license plate or parking sticker.
stkrrprt1
stkrprt
Display keyholder location information by license plate or parking sticker number.
Report all parking sticker / license plate information.
SYSTEM ADMINISTRATION
SCREEN TITLE
sys_menu
addusers
mod_pass
sec_menu
pgacentr
FUNCTION
Menu to the system administration functions.
Add operator to system.
Change operator passwords.
Menu to the security level definition functions.
Create / modify security levels.
pg1_entr
Add / modify screen information for a particular security level.
Create new security level by copying existing security level then modifying.
Report all defined security levels.
mnacopy
pgacrprt
showuser
showdate
showwho
purgrprt
beepentr
syclmenu
ctrlentr
Display all system operators.
Display current system date and time.
Display operators currently using the system.
Cancel submitted reports.
Define terminals for alarm response (beep) regardless of system area where operating.
Menu to system configuration functions
Change report titles / user-defined fields. Define terminal for automatic alarm response.
Enter / modify event information.
evenentr
taskentr
taskrprt
tranentr
dbmenu
dbstats
Enter / modify task information.
Report all tasks / events.
Enter / modify transaction information (controls data display and storage).
Menu to the database administration functions.
Display size of database tables (determines if archiving is required).
Backup database to tape.
bkup
downcln
accsarch
alrmcln
Remove unwanted records from the download file.
Transfer records from disk to tape to free up disk space.
Remove operator responses to alarms from disk to free up disk space.
Copy journal records to tape and remove from disk.
Report history of all database changes.
jourarch
jourrprt
josrprt
Report history of all changes to keyholder and keyholder access assignment information.
Load keyholder information from ASCII files.
ID security maintenance menu for WSE ID-4000 interface option.
Enter users, passwords, and privileges for WSE ID-4000 operators.
Define security groups for WSE ID-4000 operators.
Define specific operator privileges for a security group.
loadmenu
ID_menu
ID1_entr
ID2_entr
ID3_entr
Download from Www.Somanuals.com. All Manuals Search And Download.
APPENDIX C: SYSTEM TRANSACTIONS — NUMERICAL SEQUENCE
C-1
#
0
1
2
3
4
5
6
7
8
9
10
Message
Explanation
Negative Acknowledge
Access Granted
Key Trace
708P unable to understand message from host.
Card or keypad entry granted access by ACU or host.
Card flagged as TRACE has been read.
A card has been read by a sensor flagged as TRACE.
Access denied — card not valid at that time.
Access denied — card not valid that day.
Access denied — card not valid at that sensor.
Access denied — card presented prior to issue date.
Access denied — card presented after return date.
Access denied — sensor disabled.
Point Trace
Invalid Time
Invalid Day
Invalid Reader
Key Not Active Yet
Key Terminated
Point Disabled
Point Not On File
Sensor or point not defined in the host computer.
11
12
13
14
15
16
17
18
19
20
Key Not On File
Invalid Facility Code
Manual Unlock
Manual Lock
Access denied — key not in ACU or host memory.
Access denied — wrong facility code (1030/1040 keys only).
Reader / door manually unlocked.
Reader / door manually locked.
Auto Unlock
Reader / door auto-unlocked by host or ACU.
Reader / door auto-locked by host or ACU.
Door with status switch opened without card or REX.
Door with status switch remains open beyond set time.
Forced door has now been closed.
Auto Lock
Door Forced Open
Door Held Open
Door Closed (Forced)
Door Closed (Held)
Door held open too long has now been closed.
21
22
23
24
25
26
Access Requested
Poller Died
Valid key presented; host waiting for corresponding keypad entry
Software poller has failed.
Poller Can't Open Port
Poller Started
Hardware poller has failed (poller device open error).
Poller started.
Poller Stopped
Poller stopped.
Host Comm. Started
Communication initiated between host and LC / RLC.
27
28
Host Comm. Stopped
Printer Off
Communication ended between host and LC / RLC.
Log printer switched off.
Download from Www.Somanuals.com. All Manuals Search And Download.
C-2
APPENDIX C: SYSTEM TRANSACTIONS — NUMERICAL SEQUENCE
#
Message
Explanation
29
30
Printer On
Log printer switched on.
Device Reset
708P / 8xx-series powered up / re-initialized.
31
32
33
34
35
36
Return From Failsoft
Power Failed
708P communication restored — no longer in failsoft mode.
708P / 8xx-series with 3708 UPS has lost AC power.
708P / 8xx-series with 3708 UPS has regained AC power.
708P / 8xx-series tamper input active.
Power Restored
Tamper Active
Tamper Clear
708P / 8xx-series active tamper input now cleared.
Coax cable from ACU to reader shorted.
COAX Failure
37
38
39
40
COAX OK
Coax cable from ACU to reader repaired.
Sensor Failure
Sensor OK
Printer Error
ACU has lost communication with reader (open coax).
Previously failed reader (or open coax) repaired.
Log printer is not functioning properly.
41
42
43
Poller Params Reloaded
Still Held Open
Host has initialized a poller.
DOOR HELD OPEN — Second alert message.
A GENERAL input has been activated.
Input Point Active
44
45
Input Point Normal
Timeout Device
Previously activated GENERAL input point has been cleared.
Response from polled ACU by host not received within allotted time
(usually 2 seconds).
46
Unable to Lock Door
Host unable to implement automatic or manual command to lock a
door (error on lock).
47
48
Unable to Unlock Door
Unable to Clear Output
Host unable to implement automatic or manual command to unlock
a door (error on unlock).
Host unable to restore output contact to normal (error on output
clear).
49
Unable to Act. Output
Hostunabletorestoreoutputcontacttoactive(erroronoutput
clear).
50
51
52
53
Not Used
Reserved for future applications.
Reserved for future applications.
Timed unlock command entered.
Manual access command issued.
Not Used
Manual Unlock Timed
Manual Access Granted
Download from Www.Somanuals.com. All Manuals Search And Download.
APPENDIX C: SYSTEM TRANSACTIONS — NUMERICAL SEQUENCE
C-3
#
Message
Explanation
54
55
56
58
59
60
Device Online
ACU communicating with host.
Request Manual Access
(Building Closed Trace)
Repack OK
Manual access command entered.
Obsolete message
Host has loaded new database information.
Building mode command unsuccessful.
Key presented to activate reader — activate card enabled.
Error Setting Bldg. Mode
Key Activated
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
Key Deactivated
Key Not Active
Key presented to deactivate reader — deactivate card enabled.
Access denied — key applies to activate reader.
Host rebooted or clock has crossed 00:00.
Dial-up device transmission received by host.
Host has called a dial-up device.
New Day
Remote Trans Received
Host Dial OK
Error Dialing Remote
Output Activated
Output Deactivated
Invalid PIN Entered
Redundancy On
Redundancy Off
Host Poller Down
Acknowledge DB Xfer
Failed DB Xfer
Download errors to remote dial-up device encountered.
Output contact manually or automatically activated.
Output contact manually or automatically deactivated.
PIN entered incorrect.
Not used at this time.
Not used at this time.
Not used at this time.
Data successfully downloaded to target device.
Data download attempt to target device failed.
PIN entered without valid key presentation.
No Key Set for PIN
Keyholder Duress
PIN entered in reverse sequence indicating a duress situation. If
valid, access is granted.
77
Controller Comm Error
Host to local controller communication failed.
78
79
80
81
82
RDI Dialed In
RDI unit has dialed host and is logged in.
Optional parking function.
Optional parking function.
Alarm event resolved.
Lot Full
Max Tenant In Lot
Alarm Resolved
Enter Attended Mode
Optional parking function.
Download from Www.Somanuals.com. All Manuals Search And Download.
C-4
APPENDIX C: SYSTEM TRANSACTIONS — NUMERICAL SEQUENCE
#
Message
Explanation
83
84
85
86
Enter Unattended Mode
Batch Request Received
Remote Comm Ended
Global Silence Request
Optional parking function.
Not used at this time.
Not used at this time.
Silence global beeping command issued.
89
90
Ticket Serviced
Parking application has completed ticket update/storage activities.
Difference exists between host and ACU system data.
Chksum Err In Sys DB
91
92
93
94
Chksum Err In Key DB
Alarm Active
Difference exists between host and ACU key data.
Alarm input active.
Alarm Clear
Previously active alarm input cleared.
Device / point shunt command issued.
Shunt Point
95
96
97
98
Unshunt Point
Device / point unshunt command issued.
Reserved for future applications.
Not Used
Parameter Load Error
Tran File Almost Full
Host poller initialization failed.
Archive history file approaching capacity. Archive immediately.
99
Database Error
Data to database failed. There may be many possible causes.
Access denied — passback status.
100 Passback Violation
103 Building Open
808-series — ACU in open mode.
104 Building Open Limited
105 Building Closed
808-series — ACU in limited mode.
808-series — ACU in closed mode.
106 Tamper Report Shunted
8xx-series ACUs — device tamper report is shunted.
107 Tamper Report Unshunt
108 Request To Exit
109 REX Denied
8xx-series ACUs — device tamper report is unshunted.
REX contact activated during valid REX time.
REX contact activated during invalid REX time.
MSM failed.
110 MSM Fail
111 MSM Okay
Previously failed MSM repaired.
112 Door Report Shunted
113 Door Report Unshunted
114 Power Report Shunted
Door forced report shunted.
Door forced report unshunted.
Device power fail report shunted.
Download from Www.Somanuals.com. All Manuals Search And Download.
APPENDIX C: SYSTEM TRANSACTIONS — NUMERICAL SEQUENCE
C-5
#
Message
Explanation
115 Power Report Unshunted
116 COAX Report Shunted
117 COAX Report Unshunted
118 Sensor Report Shunted
119 Sensor Report Unshunted
120 MSM Report Shunted
Device power fail report unshunted.
Reader coax fail report shunted.
Reader coax fail report unshunted.
Sensor / reader fail report shunted.
Sensor / reader fail report unshunted.
8xx-series ACU MSM fail report shunted.
121 MSM Report Unshunted
122 Power Report Shunted
8xx-series ACU MSM fail report unshunted.
8xx-series ACU MSM power fail report shunted.
123 Power Report Unshunted
124 Bldg Opened
8xx-series ACU MSM power fail report unshunted.
8xx-series ACU MSM power fail report shunted.
8xx-series ACU placed in limited mode.
125 Bldg Opened Limited
126 Bldg Closed
8xx-series ACU placed in closed mode.
127 Bldg Should be Closed
128 Can't Close Bldg (Key)
8xx-series ACU in time period where it should be closed.
8xx-series ACU cannot be placed in closed mode because proper
key not presented.
129 Can't Close Bldg - User
8xx-series ACU cannot be placed in closed mode because of user
actions.
130 Terminal Buffer Full
131 Device Cannot Connect
132 Alarm Silenced
8xx-series host port log buffer at capacity.
8xx-series ACU unable to communicate with host / dial-up interface.
8xx-series ACU silenced by a user connected through the ACU
terminal port.
133 Forgive Passback
Passback status on card / card group set to unknown.
No longer used.
134 Invalid T & A Request
135 Time & Attendance Clock
136 Meal Counter - Excp.
137 Meal Counter - Valid
138 and 139
Key presented at a valid time and attendance reader.
Keyholder over meal limit.
Key presented at valid meal counter reader.
Reserved for future applications.
140 User Logged Into Term
141 User Logged Off Term
User logged on to 8xx-series ACU via the terminal port.
User logged off an 8xx-series ACU via the terminal port.
Download from Www.Somanuals.com. All Manuals Search And Download.
C-6
APPENDIX C: SYSTEM TRANSACTIONS — NUMERICAL SEQUENCE
#
Message
Explanation
142 Host Dial Start
143 Carrier Off
Remote device dialing host.
SE 422—Incoming phone line or host port has lost DTR.
SE 422 — Incoming phone line or host port DTR high.
SE 422 — Log buffer purged.
144 Carrier On
145 Logs Purged
146 Threshold Met
147 Deferred Key
148 Auto Forgive
149 Zone Count Reset
SE 422 — Logs have met user-defined threshold.
Key referred to host for access decisions.
Automatic forgive passback issued.
Count for a particular zone or all zones reset.
150 Req. Passback Forgive
151 Timer Started
Forgive passback command issued.
Not used at this time.
152 Timer Cancelled
Not used at this time.
153 Timer Expired
Not used at this time.
154 Request Reset Device
155 Request Reset Keys
Operator initiated device reset from devices menu.
Operator initiated key reset from devices menu.
156 Reset Device Okay
Affirmative response following device reset command.
157 Reset Key Okay
158 Error on Device Reset
159 Error on Key Reset
160 Open Cash Drawer
161 Invalid Card Type
162 Line Cut
Key information successfully reset in 8xx-series ACU.
Unable reset memory / system data for 8xx-series ACU.
Unable reset key data for 8xx-series ACU.
Parking attendant cash drawer opened improperly.
Wrong type magnetic stripe card presented.
SE 422 input line cut.
163 Line Short
SE 422 input line shorted.
164 through 169
Reserved for future applications.
170 Over Device Limit
171 Invalid Site Code
172 ABA Card Expired
System configuration has exceeded specified limits.
Site code not on file or invalid.
ABA card presented has expired.
173 ABA Card Data 1
174 ABA Card Data 2
175 ABA Card Data 3
176 ABA Card Data 4
177 ABA Card Data 5
Five 40-character lines (maximum) encoded on ABA cards.
•
•
•
•
Download from Www.Somanuals.com. All Manuals Search And Download.
APPENDIX C: SYSTEM TRANSACTIONS — NUMERICAL SEQUENCE
C-7
#
Message
Explanation
178 VIP Failure
VIP keypad not responding.
VIP keypad returned from failed status.
VIP tamper fail reported.
VIP tamper switch OK.
179 VIP Okay
180 VIP Tamper Fail
181 VIP Tamper Okay
182 VIP Shunted
VIP shunted.
183 VIP Unshunted
184 VIP Tamper Shunted
185 VIP Tamper Unshunted
VIP unshunted.
VIP tamper switch shunted.
VIP tamper switch unshunted.
200 Radionics Unit Test
201 General Trouble
202 Zone Trouble
For Radionics systems (for future use).
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
203 Line Card Trouble
204 General Restoral Report
205 Zone Restoral
206 Line Card Restored
207 General Opening Report
208 Zone Opening Report
209 General Closing Report
210 Zone Closed
211 General Cancel Report
212 Zone Cancel Report
213 Radionics Unit Power Fail
214 Radionics Unit Restore
215 Listen-In Report
216 Listen Done
217 Communicator Power Fail
218 Was Forced Armed
219 Status Report
220 Busy Seconds
221 Error
222 Power Up Message
223 Radionics Alarm
230 Project Activated
231 Project Deactivated
232 Project Normalized
233 Invalid Project
Project activated.
Active project deactivated.
Project normalized.
Access denied to a project-controlled door (no access privileges).
240 Alarm Not Acknowledged
No alarm response within time specified in transaction description
record.
241 Alarm Acknowledged
Alarm acknowledged.
Download from Www.Somanuals.com. All Manuals Search And Download.
C-8
APPENDIX C: SYSTEM TRANSACTIONS — NUMERICAL SEQUENCE
#
Message
Explanation
242 Disk Almost Full
Disk space at value of DISKWARN parameter (usually 90% full).
Attempt made to download more keys than the device will hold.
250 Over Max Key Limit
300 RDI Full
RDI transaction buffer full.
301 RDI Too Hot
RDI upper temperature limit exceeded.
RDI lower temperature limit exceeded.
RDI unable to communicate with 808S.
RDI has detected an error with its operating hardware.
RDI has detected a modem error.
RDI alarm table full or unusable.
RDI unable to dial out.
302 RDI Too Cold
303 RDI Timeout Problem
304 RDI Hardware Problem
305 RDI Modem Problem
306 RDI Alarm Table Error
307 RDI Comm Error
308 RDI Host Comm Error
309 RDI Can't Close 808 DB
RDI unable to receive.
RDI unable to complete data transfer to 808S; device left in
incomplete state.
500 Debug 0 Transaction
501 Debug 1 Transaction
502 Debug 2 Transaction
503 Debug 3 Transaction
504 Debug 4 Transaction
505 Debug 5 Transaction
WSE development use only.
•
•
•
•
•
Download from Www.Somanuals.com. All Manuals Search And Download.
APPENDIX C: SYSTEM TRANSACTIONS — ALPHABETICAL SEQUENCE
C-9
Message
#
Message
#
ABA Card Data 1 ........................................ 173
ABA Card Data 2 ........................................ 174
ABA Card Data 3 ........................................ 175
ABA Card Data 4 ........................................ 176
ABA Card Data 5 ........................................ 177
ABA Card Expired ...................................... 172
Access Granted .............................................. 1
Access Requested ....................................... 21
Acknowledge DB Xfer .................................. 73
Alarm Acknowledged ................................. 241
Alarm Active ................................................. 92
Alarm Clear .................................................. 93
Alarm Not Acknowledged ........................... 240
Alarm Resolved ............................................ 81
Alarm Silenced ........................................... 132
Auto Forgive ............................................... 148
Auto Lock ..................................................... 16
Auto Unlock .................................................. 15
Door Report Shunted ................................. 112
Door Report Unshunted ............................. 113
Enter Attended Mode ................................... 82
Enter Unattended Mode ............................... 83
Error ........................................................... 221
Error Dialing Remote .................................... 66
Error on Device Reset ................................ 158
Error on Key Reset ..................................... 159
Error Setting Bldg. Mode .............................. 59
Failed DB Xfer .............................................. 74
Forgive Passback....................................... 133
General Cancel Report .............................. 211
General Closing Report.............................. 209
General Opening Report ............................ 207
General Restoral Report ............................ 204
General Trouble ......................................... 201
Global Silence Request................................ 86
Batch Request Received.............................. 84
Below Lot Limit ............................................. 88
Below Tenant Limit ....................................... 87
Bldg Closed ................................................ 126
Bldg Opened .............................................. 124
Bldg Opened Limited.................................. 125
Bldg Should be Closed............................... 127
Building Closed .......................................... 105
Building Open ............................................. 103
Building Open Limited ................................ 104
Busy Seconds ............................................ 220
Host Comm. Started ..................................... 26
Host Comm. Stopped ................................... 27
Host Dial OK................................................. 65
Host Dial Start ............................................ 142
Host Poller Down.......................................... 72
Input Point Active ......................................... 43
Input Point Normal........................................ 44
Invalid Card Type ....................................... 161
Invalid Day..................................................... .5
Invalid Facility Code ..................................... 12
Invalid PIN Entered ...................................... 69
Invalid Project............................................ 233
Invalid Reader ................................................ 6
Invalid Site Code ........................................ 171
Invalid T & A Request ................................ 134
Invalid Time .................................................... 4
Can’t Close Bldg (Key) ............................... 128
Can’t Close Bldg - User.............................. 129
Carrier Off................................................... 143
Carrier On................................................... 144
Chksum Err In Key DB ................................. 91
Chksum Err In Sys DB ................................. 90
COAX Failure ............................................... 36
COAX OK ..................................................... 37
COAX Report Shunted ............................... 116
COAX Report Unshunted ........................... 117
Communicator Power Fail .......................... 217
Key Activated ............................................... 60
Key Deactivated ........................................... 61
Key Not Active .............................................. 62
Key Not Active Yet ......................................... 7
Key Not On File ............................................ 11
Key Terminated .............................................. 8
Key Trace ....................................................... 2
Keyholder Duress......................................... 76
Database Error ............................................. 99
Debug 0 Transaction .................................. 500
Debug 1 Transaction .................................. 501
Debug 2 Transaction .................................. 502
Debug 3 Transaction .................................. 503
Debug 4 Transaction .................................. 504
Debug 5 Transaction .................................. 505
Deferred Key .............................................. 147
Device Cannot Connect ............................. 131
Device Online ............................................... 54
Device Reset ................................................ 30
Disk Almost Full.......................................... 242
Door Closed (Forced) ................................... 19
Door Closed (Held) ...................................... 20
Door Forced Open........................................ 17
Door Held Open ........................................... 18
Line Card Restored .................................... 206
Line Card Trouble ...................................... 203
Line Cut ...................................................... 162
Line Short ................................................... 163
Listen Done ................................................ 216
Listen-In Report .......................................... 215
Logs Purged ............................................... 145
Lot Full.......................................................... 79
Manual Access Granted ............................... 53
Manual Unlock.............................................. 13
Manual Unlock Timed .................................. 52
Download from Www.Somanuals.com. All Manuals Search And Download.
C-10
APPENDIX C: SYSTEM TRANSACTIONS — ALPHABETICAL SEQUENCE
Message
#
Message
#
Max Tenant In Lot ........................................ 80
Meal Counter - Excp................................... 136
Meal Counter - Valid .................................. 137
MSM Fail .................................................... 110
MSM Okay.................................................. 111
MSM Report Shunted ................................. 120
MSM Report Unshunted ............................. 121
Remote Comm Ended .................................. 85
Remote Trans Received .............................. 64
Repack OK ................................................... 58
Req. Passback Forgive .............................. 150
Request Manual Access .............................. 55
Request Reset Device ............................... 154
Request Reset Keys .................................. 155
Request To Exit .......................................... 108
Reset Device Okay .................................... 156
Reset Key Okay ......................................... 157
Return From Failsoft..................................... 31
REX Denied................................................ 109
Negative Acknowledge................................... 0
New Day ....................................................... 63
No Key Set for PIN ....................................... 75
Not Used ...................................................... 50
Not Used ...................................................... 51
Not Used ...................................................... 96
Sensor Failure .............................................. 38
Sensor OK .................................................... 39
Sensor Report Shunted.............................. 118
Sensor Report Unshunted.......................... 119
Shunt Point ................................................... 94
Status Report ............................................. 219
Still Held Open ............................................. 42
Open Cash Drawer..................................... 160
Output Activated ........................................... 67
Output Deactivated ...................................... 68
Over Device Limit ....................................... 170
Over Max Key Limit .................................... 250
Parameter Load Error................................... 97
Passback Violation ..................................... 100
Point Disabled ................................................ 9
Point Not On File .......................................... 10
Point Trace ..................................................... 3
Poller Can’t Open Port ................................. 23
Poller Died .................................................... 22
Poller Params Reloaded .............................. 41
Poller Started................................................ 24
Poller Stopped .............................................. 25
Power Failed ................................................ 32
Power Report Shunted ............................... 114
Power Report Shunted ............................... 122
Power Report Unshunted ........................... 115
Power Report Unshunted ........................... 123
Power Restored............................................ 33
Power Up Message .................................... 222
Printer Error .................................................. 40
Printer Off ..................................................... 28
Printer On ..................................................... 29
Project Activated ........................................ 230
Project Deactivated .................................... 231
Project Normalized ..................................... 232
Tamper Active .............................................. 34
Tamper Clear ............................................... 35
Tamper Report Shunted ............................. 106
Tamper Report Unshunt ............................. 107
Terminal Buffer Full .................................... 130
Threshold Met ............................................ 146
Ticket Serviced............................................. 89
Time & Attendance Clock........................... 135
Timeout Device ............................................ 45
Timer Cancelled ......................................... 152
Timer Expired ............................................. 153
Timer Started.............................................. 151
Tran File Almost Full .................................... 98
Unable to Act. Output ................................... 49
Unable to Clear Output ................................ 48
Unable to Lock Door .................................... 46
Unable to Unlock Door ................................. 47
Unshunt Point ............................................... 95
User Logged Into Term .............................. 140
User Logged Off Term................................ 141
VIP Failure.................................................. 178
VIP Okay .................................................... 179
VIP Shunted ............................................... 182
VIP Tamper Fail ......................................... 180
VIP Tamper Okay ....................................... 181
VIP Tamper Shunted .................................. 184
VIP Tamper Unshunted .............................. 185
VIP Unshunted ........................................... 183
Radionics Unit Power Fail .......................... 213
Radionics Unit Restore .............................. 214
Radionics Unit Test .................................... 200
RDI Alarm Table Error ................................ 306
RDI Can’t Close 808 DB ............................ 309
RDI Comm Error ......................................... 307
RDI Dialed In ................................................ 78
RDI Hardware Problem .............................. 304
RDI Host Comm Error ................................ 308
RDI Is Full................................................... 300
RDI Is Too Cold .......................................... 302
RDI Is Too Hot............................................ 301
RDI Modem Problem .................................. 305
RDI Timeout Problem ................................. 303
Redundancy Off ........................................... 71
Redundancy On ........................................... 70
Was Forced Armed .................................... 218
Zone Cancel Report ................................... 212
Zone Closed ............................................... 210
Zone Count Reset ...................................... 149
Zone Opening Report................................. 208
Zone Restoral ............................................. 205
Zone Trouble .............................................. 202
Download from Www.Somanuals.com. All Manuals Search And Download.
APPENDIX D: PROGRAM SECURITY MASTER LIST
Level 1 = COMPLETE SYSTEM ACCESS
D-1
dkrcrprt
downcln
downrprt
DKR Configuration
Download Clean Up & Retry
Download Status
N
N
N
N
N
N
N
N
N
N
N
N
ID1_entr
ID1_rprt
ID2_entr
ID Security User Entry
ID Security Report
ID Security Group Entry
Y
N
Y
N
Y
N
Y
N
Y
N
Y
N
drawmaps Maps
egrpcopy Copy Keyholder Access
egrpentr
egrprprt
N
Y
N
N
N
N
Y
N
N
N
N
Y
N
N
N
N
Y
N
N
N
N
Y
N
N
N
N
Y
N
N
N
ID_menu ID Security Report
Access Assignment
Keyholder Access Assign
aassmenu Access Assignments
N
Y
N
N
N
N
N
Y
N
Y
N
N
N
Y
N
N
Y
N
Y
Y
N
N
Y
N
N
N
N
N
Y
N
Y
N
N
N
Y
N
N
Y
N
Y
Y
N
N
Y
N
N
N
N
N
Y
N
Y
N
N
N
Y
N
N
Y
N
Y
Y
N
emp_dnld Keyholder Transfer
abacentr
abacrprt
ABA Configuration Entry
ABA Configuration
emrdrprt
epj_rprt
evenentr
evptrprt
excprprt
exit
Reader Access Assignment
Employee Project Report
Events
Event / Point Report
Selective Transaction
Exit SE / SMS Application
acc_menu Access Definition
accrmenu Access Definition
accsarch Access Ctrl Trans Arch
accsmenu Security Management Rpts
acdsentr
acodrprt
acoventr
acovrprt
acrtrprt
Access Code Entry
Access Code Master Rpt
Access Override Entry
Access Override Report
Access Control Archive
fmntmenu Master File Entry
fs_entr
fs_rprt
N
Y
N
N
Y
N
N
Y
N
Fail Soft Entry
Fail Soft Report
addusers Addusers
hol_entr
hol_rprt
Holidays
Holidays
Y
N
Y
N
Y
N
agdsentr
agrprprt
almarprt
alotentr
alrmcln
areaentr
autoentr
autorprt
Access Group Entry
Access Group Master Rpt
Alarm Servicing
Tenant Allotment
Alarm Trans Clean Up
Areas
instentr
instrprt
invtmenu Key Inventory
Instructions
Instructions
Y
N
N
Y
N
N
Y
N
N
Auto Opens / Activates
Auto Opens / Activates
job_entr
job_rprt
josprprt
jourarch
jourrprt
Jobcat
Jobcat
Special Journal Reporting
Journal Archive
Journal Reporting
Y
N
N
N
N
Y
N
N
N
N
Y
N
N
N
N
badgarch Badge Archiving
N
Y
N
N
N
Y
N
N
Y
N
N
N
Y
N
N
Y
N
N
N
Y
N
badgentr
badgrprt
badtrprt
bdg1rprt
beepentr
bkup
Badge Entry
Print Badges
Offline Badge Reporting
Badge Report
Enable Global Beeping
Perform Backup
key_copy Copy Keyholders
key_entr
key_rprt
keyload1 Keyholder Loading Prog 1
ktimentr
kyznrprt
N
Y
N
N
Y
N
N
Y
N
N
Y
N
N
Y
N
N
Y
N
Keyholders
Keys Master
Keyholder Timer Entry
Keyholder Zone
calliq
AccellIq (Custom Reports)
Cash Summary
Key Inventory Entry
Key Inventory Report
Keyholder History Report
N
N
Y
N
N
Y
N
N
N
N
N
Y
N
N
Y
N
N
N
N
N
Y
N
N
Y
N
N
N
casmrprt
cdinentr
cdinrprt
chstrprt
compentr Company
comprprt Company
loadmenu Key Holder Loading
N
Y
N
N
Y
N
N
Y
N
N
Y
N
N
Y
N
N
Y
N
loc_entr
loc_rprt
lsumdel
lsumentr
lsumrprt
Location
Location
Delete Lot Sum Records
Daily Lot Summary
Daily Lot Summary
con_menu Device Configuration Rpts
confmenu Hardware Configuration
mainmenu SE / SMS Main Menu
mangrprt Daily Manager’s
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
ctrlentr
Control File Maintenance
Y
N
N
N
Y
N
Y
N
Y
N
Y
Y
N
N
N
Y
N
Y
N
Y
N
Y
Y
N
N
N
Y
N
Y
N
Y
N
Y
db_menu Database Maintenance
maprprt
mealrprt
mlwkrprt
Maps
Meal Report
Hours vs. Meals Taken
dbstats
dconrprt
deptentr
deptrprt
dev_entr
dev_rprt
dialentr
dialrprt
Display Data Base Stats
808 Device Configuration
Dept
Dept
Devices
Devices
Dialer Entry
Dialers
DKR Configuration Entry
mnaccopy Copy Security
mod_pass Modify Passwords
monitor
Monitor Security Activity
nodeentr
SE 422 Hardware Def
Y
Y
Y
dkrcentr
Download from Www.Somanuals.com. All Manuals Search And Download.
D-2
APPENDIX D: PROGRAM SECURITY MASTER LIST
outsrprt
overrprt
Outstanding Tickets
Tenant Overage
N
N
N
N
N
N
taskrprt
tatransf
tbleentr
tbllrprt
tententr
tentrprt
termentr
thstrprt
tickentr
tickpost
tickrprt
timemenu Time & Attendance
tkeyrprt
tlogrprt
tmcdentr
tmcdrprt
tourmenu Guard Tour
tranentr
trdsentr
trdsrprt
trptmenu
trshentr
trshrprt
tsumrprt
Task / Event Master Report
Record Transfer
Rate Tables
Tenant Billing
Tenants
N
N
Y
N
Y
N
Y
N
Y
N
N
N
N
N
Y
N
N
Y
Y
N
N
Y
N
N
N
N
Y
N
Y
N
Y
N
Y
N
N
N
N
N
Y
N
N
Y
Y
N
N
Y
N
N
N
N
Y
N
Y
N
Y
N
Y
N
N
N
N
N
Y
N
N
Y
Y
N
N
Y
N
N
p422rprt
SE/422 PIN Report
N
N
N
Y
N
N
Y
Y
Y
N
Y
N
N
Y
N
N
N
N
N
N
Y
N
N
Y
Y
Y
N
Y
N
N
Y
N
N
N
N
N
N
Y
N
N
Y
Y
Y
N
Y
N
N
Y
N
N
N
padmmenu Parking Administration
parkmenu Parking Control
Tenants
pgacentr
pgacrprt
phstrprt
plotentr
pndfentr
pnt_entr
pnt_rprt
pol_entr
pol_rprt
prd_rprt
prj_entr
prj_rprt
Security Entry
Security Master List
Point History
Point/Lot Association
SE422 PIN Definition
Points
Points
Pollers
Pollers
Terminal / Point Xref
Tour Schedule vs Access
Ticket Editing
Post Serviced Tickets
Ticket Transaction Report
Keyholder Tour History
Ticket Log
Time Codes
Project Reader Report
Project Definition
Project Report
Time Codes
Transactions
psetmenu Parking Setup
Tour Definition
Tour Definition
Ticket Reports
Tour Scheduling
Tour Schedule
Daily Ticket Summary
purgrprt
quckrprt
Purge A Pending Report
Quick Ticket Search
N
N
N
rdefentr
rdefrprt
rdr_entr
rdr_rprt
rpasrprt
Device Report Definition
808 Report Definition
Readers
Readers
Passback Zone Report
Y
N
Y
N
N
N
Y
N
Y
N
N
N
Y
N
Y
N
N
N
usraentr
usrbentr
Shift
Emp Stat
Y
Y
N
Y
Y
N
Y
Y
N
usrdmenu User Defined Information
rprtmenu Master File Reports
vctlentr
vistentr
vistmenu Visitors
Badge Color Entry
Visitor Entry
Y
Y
N
N
Y
Y
N
N
Y
Y
N
N
sec_menu Program Security
N
Y
N
N
N
N
Y
N
Y
Y
N
N
Y
N
N
N
N
N
N
N
Y
N
N
N
N
Y
N
Y
Y
N
N
Y
N
N
N
N
N
N
N
Y
N
N
N
N
Y
N
Y
Y
N
N
Y
N
N
N
N
N
N
sel_entr
service
Selection Table
Ticket Servicing
vistrprt
Visitor Report
showdate Display Date & Time
showuser Display All Valid Logins
showwho Display All Users Logged In
weekentr Week Ending Dates
whowhere Passback Zone
Y
N
Y
N
Y
N
siteentr
siterprt
spitentr
statentr
Site Entry Definition
Site Definition
Ticket Spitter Synch
Status Code Entry
zoneentr
zonerprt
Zones
Zones
Y
N
Y
N
Y
N
statmenu Inventory Stat Code Menu
Level 2 = MONITOR ONLY
statrprt
stkrentr
Status Code Report
Parking Sticker Entry
exit
Exit SE / SMS Application
N
N
N
N
N
N
N
N
N
stkrmenu Parking Stickers
mainmenu SE / SMS Main Menu
monitor
stkrprt
stkrrprt
Parking Sticker Master Rpt
Parking Sticker Display
Monitor Security Activity
summdel Delete Ticket Records
syclmenu System Configuration
sys_menu System Administration
taarch
tacfentr
taentr
taexentr
tainrprt
tarprprt
tartrprt
taskentr
Transaction Archiving
Conf Early / Late Hours
Editing
T & A Exceptions
Keyholder Inquiry
Detail / Summary Report
Offline Reporting
Tasks
N
Y
Y
Y
N
N
N
Y
N
Y
Y
Y
N
N
N
Y
N
Y
Y
Y
N
N
N
Y
Download from Www.Somanuals.com. All Manuals Search And Download.
INDEX-1
INDEX
A
Access Assignment, 4-8, 5-4
Keyholder Access, 5-4
Keyholder Access Assignment, 4-8
Readers, 5-5
Access Code, 1-2
Access Code Entry, 4-9
Distributed Access codes, 4-9
Host, 4-9
Smart Failsoft, 4-9
Access Control Archive Report, 3-4
Access Control Transaction Archiving [accsarch], 6-15
Access Control Units (ACUs), 1-3
Access Definition, 4-9, 5-6
Access Code Master, 5-6
Access Group Master, 5-6
Access Override, 5-7
Intelligent Failsoft, 5-7
Keyholder Projects, 5-9
Project Report, 5-8
Reader Projects, 5-10
Access Group, 1-2
Access Group Entry, 4-11
Access Override Entry, 4-13
Activate / Deactivate Codes, 6-11
ACUs, 1-3
Add Users [addusers], 6-2
Adding / Changing Data, 1-14
Adjustable Baud Rate—708P/800 Pollers, 6-19
Alarm Contact, 1-2
Alarm Contacts, 1-4
Alarm Servicing, 2-8
Alarm Servicing Function Keys, 2-8
No Activity Timeout, 2-13
Alarm Servicing Archive Report
Sample Report, 3-5
Alarm Servicing Function Keys, 2-8
Alarm Servicing Report, 3-4
Alarm Transaction Clean Up [alrmcln], 6-16
Alarms and Responses, 1-7
All Transactions, 1-7
Anti-Passback Control, 1-6
Application Screens, 1-10
Audible Alarms, 1-5
Auto Key Entry, 4-34
Automatically Entering Card Numbers, 4-34
Configuring the Reader, 4-34
Download from Www.Somanuals.com. All Manuals Search And Download.
INDEX-2
Auto Opens/Activates, 4-42
Automatic Access Control, 1-6
Automatic Activate / Deactivate, 1-6
Automatic Restart, 1-16
Automatic Unlock/Lock, 1-6
B
Basic System Usage, 1-16
Logging Off, 1-15
Biometric Identifiers, 1-3
Building Modes, 2-11
C
CCTV, 1-17
Clearing a Field, 1-14
Communications Monitor, 1-6
Company, 1-2
Complete Portability, 1-5
Contact Alarms, 1-4
Control Building Modes Function Keys, 2-11
Control Devices Function Keys, 2-3
Control Devices screen, 2-3
Control Doors Function Keys, 2-6
Control File Maintenance [ctrlentr], 6-8
Control Function Keys
Control Doors Function Keys, 2-6
Control Input Function Keys, 2-5
Control Locks Function Keys, 2-4
Control Output Function Keys, 2-5
Control Zone Function Keys, 2-6
Locks, 2-4
Control Function Menu
Devices, 2-3
Control Functions Menu, 2-2
Poller Function Keys, 2-2
Pollers, 2-2
Control Inputs Function Keys, 2-5
Control Locks Function Keys, 2-4
Control Outputs Function Keys, 2-5
Control Pollers Function Keys, 2-2
Control Printers Function Keys, 2-9
Control Projects, 2-9
Control Projects Function Keys, 2-9
Control Remote Devices Function Keys, 2-11
Controller Systems, 1-18
Copy Keyholder Access, 4-8
Copy Keyholders, 4-7
Copy Security [mnaccopy], 6-6
Download from Www.Somanuals.com. All Manuals Search And Download.
INDEX-3
D
Data Entry Sequence, 1-9
Data Item Selection, 2-2
Database Changes, 1-7
Database Maintenance [db_menu], 6-14
Definition, General
Trace, 1-3
Transactions, 1-3
Definition, Inputs
Fire Alarms/Heat Sensors, 1-4
Definition, Principal System Functions
Auto Unlock/Lock, 1-6
Definitions
Access Control, 1-6
Definitions, Basic System Usage, 1-9
Applications Screens, 1-10
Logging On, 1-9
System Screens, 1-10
Definitions, Creating the Database, 1-8
Poller Initializatin, 1-8
Definitions, File Maintenance, 1-7
Definitions, General, 1-2
Access Code, 1-2
Access Group, 1-2
Alarm Contract, 1-2
Company, 1-2
Department, 1-2
Device, 1-2
Event, 1-2
Job Category, 1-2
Key Number, 1-2
Keyholder ID, 1-3
Location, 1-3
Time Code, 1-3
Zones, 1-3
Definitions, Hardware
Devices, 1-3
Microprocessor, 1-3
Definitions, Inputs, 1-4
Alarm Contacts, 1-4
Contact Alarms, 1-4
Door Switches, 1-4
Intrusion Devices, 1-4
Motion Sensors, 1-4
Multiple Switch Monitor, 1-5
Points, 1-5
Request-to-Exit, 1-5
Video Monitor Switchers, 1-4
Definitions, Outputs, 1-5
Audible Alarms, 1-5
Remote Alarms, 1-5
Download from Www.Somanuals.com. All Manuals Search And Download.
INDEX-4
Definitions, Principal System Functions, 1-6
Auto Activate/Deactivate, 1-6
Automatic Access Control, 1-6
Communications Monitor, 1-6
Flexible Event Handling, 1-6
Independent PIN Entry, 1-6
Manual Access Control, 1-6
Two-Man Rule, 1-6
Definitions, Readers, 1-4
Digital Key Reader, 1-4
Magnetic Card Reader, 1-4
Readers, Sensors, 1-4
Definitions, Reporting, 1-7
Alarms and Responses, 1-7
All Transactions, 1-7
Database Changes, 1-7
Invalid Access Attempts, 1-7
Keyholder History, 1-7
Point History, 1-7
Definitions, System Function
Anti-Passback Control, 1-6
Definitions, System Software, 1-5
Installation Flexibility, 1-5
Integrated Software, 1-5
Open System Design, 1-5
Portability, 1-5
Response Time, 1-6
Definitions, Tenant, 1-3
Deleting a Character in a Field, 1-14
Deleting Records, 1-14
Department, 1-2
Device, 1-2
Device Configuration Reports, 5-13
422 PIN Master, 5-20
808, 5-17
808 Configuration, 5-18
ABA Configuration, 5-19
Auto Opens/Activates, 5-17
Dialers, 5-18
DKR Configuration, 5-20
Points, 5-16
Pollers, 5-14
Site Definition, 5-18
Zones, 5-13
Devices
422 Device Configuration Entry, 4-28
422 Reader Report Defined, 4-36
818 Device Configuration Entry, 4-28
818 Reader Report Defined, 4-37
8xx-Series Reader Report, 4-35
Auto Key Entry, 4-34
Device Entry Screen, 4-22
Download from Www.Somanuals.com. All Manuals Search And Download.
INDEX-5
NexSentry Reader Report Defined, 4-38
Reader Entry, 4-32
Reader Report, 4-35
Readers, 4-31
Devices Configuration Reports
Devices, 5-14
Readers, 5-15
Digital Key Reader, 1-4
Disk Almost Full Warning, 2-12
Display All Users Logged In [showwho], 6-7
Display All Valid Logins [showuser], 6-7
Display Current Date and Time [showdate], 6-7
Display Database Statistics [dbstats], 6-14
Distributed Access Codes, 4-9
Documentation Methods, 1-2
Door switches, 1-4
Doors, 2-6
Download Clean Up and Retry [downcln], 6-15
Download Status
Before Transmission, 3-7
Error in Receiving Data, 3-7
Error in Transmitting Data, 3-7
Received and Processed, 3-7
Transmitted, 3-7
Unprocessed, 3-7
Download Status Report, 3-6
Sample Report, 3-7
E
Elevator Control, 1-18
Elevator Definition, 4-11
Enable Terminals for Global Beeping [beepentr], 6-8
Event, 1-2
Event Monitoring, 1-6
Event/Point Report, 3-8
Sample Report, 3-9
Events [evenentr], 6-9
F
Failsoft, 4-14
File Maintenance, 1-7
Finding, Adding, and Storing Data, 1-13
Adding/Changing Data, 1-14
Searching, Partial Information, 1-13
Storing Data, 1-14
Finding Data, 1-13
Fire Alarms, 1-4
Fire Alarms / Heat Sensors, 1-4
Flexible Event Handling, 1-6
Following the System Interconnect Diagram, number, 1-9
Force Table Download, 2-10
Download from Www.Somanuals.com. All Manuals Search And Download.
INDEX-6
Forgive Passback, 2-10
Full Screen Monitoring, 2-12
Function Keys, 2-2
G
General Definitions
Keyholder, 1-2
Guard Tour, 1-18
H
Hardware Configuation
422 Hardware Definition, 4-44
Hardware Configuration
422, 4-28
422 Pin Definition, 4-43
818, 4-28
8xx Series, 4-24
ABA Configuration, 4-47
Areas, 4-19
Device Report, 4-43
Devices, 4-21
Dialer Entry, 4-45
DKR Configuration, 4-48
NexSentry, 4-26
Points, 4-39
Pollers, 4-19
Readers, 4-31
Site Entry Definition, 4-46
Zones, 4-18
Heat Sensors, 1-4
Holidays, 4-16, 5-11
I
ID Security Group Entry [ID2_ entr], 6-18
ID Security Maintenance [ID_menu], 6-17
ID Security Report [ID1_ rprt], 6-18
ID Security User Entry [ID1_ entr], 6-17
ID-4000 Interface, 1-18
Independent PIN Entry, 1-6
Input Points, 2-5
Installation Flexibility, 1-5
Integrated Software Support, 1-5
Intelligent Devices, 4-21
Intrusion Devices, 1-4
Invalid Access Attempts, 1-7
Inventory Status Code Menu [statentr], 6-20
IQ, 1-17
Download from Www.Somanuals.com. All Manuals Search And Download.
INDEX-7
J
Job Category, 1-2
Journal Archive [jourarch], 6-16
Journal Reporting [jourrprt], 6-16
K
Key Inventory [invtmenu], 6-20
Key Inventory Entry [cdinentr], 6-21
Key Inventory Report [cdinrprt], 6-21
Key Inventory Status Code Report [statrprt], 6-20
Key Number, 1-2
Keyholder, 1-2
Access Assignment, 4-8
Keyholder Access Entry, 4-5
Keyholder Entry, Page 1, 4-2
Keyholder Entry, Page 2, 4-4
Master Reports, 5-2
Project Assignment, 4-6
Keyholder History, 1-7
Keyholder History Report, 3-2
Sample Report, 3-3
Keyholder ID, 1-3
Keyholder Loading [loadmenu], 6-17
Keyholder Zone Report, 3-8
Sample Report, 3-8
Keyholders, 4-2
Keypad Controllers, 1-4
Keys Master, 5-2
L
Location, 1-3
Locks, 2-4
Logging Off, 1-15
Logging On, 1-9
M
Magnetic Card Readers, 1-4
Manual Access Control, 1-6
Manual Access Granted, 2-10
Manual Organization, 1-1
Documentation Methods, 1-2
System Main Menu, 1-1
Manual Restart, 1-16
Maps, 4-50, 5-13
Map Drawing, 4-50
Master File Entry, 4-1
Master File Reports, 5-1
Menu Screens, 1-10
Download from Www.Somanuals.com. All Manuals Search And Download.
INDEX-8
Microprocessor
Access Control Units, 1-3
Biometric Hand Reader, 1-3
Miscellaneous Information, 1-15, 2-12
Modified Usage of Invalid Facility Code Log, 2-15
Modify Passwords [mod_pass], 6-4
Monitor Security Activity, 2-1
Monitoring Security - Passwords, 2-14
Motion Sensors, 1-4
Moving Backwards in a Field, 1-14
Moving Between Data Fields, 1-12
Moving to Prior Screens, 1-13
MSMs, 1-5
Multiple Switch Monitors (MSMs), 1-5
O
Open System Design, 1-5
Optional Features, 1-17
CCTV, 1-17
Controller Systems, 1-18
Elevator Control, 1-18
Guard Tour, 1-18
ID-4000, 1-18
IQ, 1-17
Parking Control, 1-18
Remote RDI, 1-18
Time and Attendence, 1-18
Visitor Control, 1-18
Other Functions, 2-9
Printer Control, 2-9
Output Points, 2-5
P
Parking Control, 1-18
Parking Sticker Entry [stkrentr], 6-22
Parking Sticker Interactive Display [stkrrprt1], 6-22
Parking Sticker Master Report [stkrprt], 6-23
PARKING STICKERS [stkrmenu], 6-22
Passback Zone Report, 3-5
Sample Report, 3-6
Perform Backup [bkup], 6-14
Point History, 1-7
Point History Report, 3-2
Sample Report, 3-2
Points, 1-5, 4-39
Poller Initialization Parameters Information, 1-8
Pollers, 2-2
Pollers Function Keys, 2-2
Powering On the System, 1-16
Program Security [sec_menu], 6-5
Download from Www.Somanuals.com. All Manuals Search And Download.
INDEX-9
Program Security Entry Definition [pg1_entr], 6-5
Purge a Pending Report [purgrprt], 6-8
R
Reader Entry, 4-32
Reader Report, 4-35
818, 4-37
NexSentry, 4-38
Reader Report, 422, 4-36
Readers, 1-4
Real Time Control Maps, 2-8
Realtime Passback Zone Report, 3-9
Remote Alarms, 1-5
Remote Devices, 2-11
Remote Dial-Up Interface, 1-18
Reporting, 1-7
Reports
132-Column, 5-21
ABA Configuration, 5-19
Access Code Master List, 5-6
Access Group Master List, 5-7
Access Override, 5-7
Auto Open/Activate, 5-17
Company, Dept, 5-12
Devices, 5-15
Dialers, 5-18
DKR Configuration, 5-20
Holiday Codes, 5-11
Intelligent Fail Soft, 5-8
Keyholder Access Assignment, 5-4
Keyholder Projects, 5-9
Keys Master, 5-2
Maps, 5-13
Points, 5-16
Pollers, 5-14
Projects, 5-9
Reader Assignment, 5-5
Reader Project, 5-10
Readers, 5-16
SE 422 PIN, 5-21
SE 808, 5-17
Sites, 5-19
Tenants, 5-12
Time Codes, 5-11
Zones, 5-14
Request-to-Exit (REX) Sensor, 1-5
Restarting The System
Automatic Restart, 1-16
Manual Restart, 1-16
Restarting the System, 1-16
Download from Www.Somanuals.com. All Manuals Search And Download.
INDEX-10
Review Transactions
Full Screen, 2-7
Review Transactions Function Keys, 2-8
REX, 1-5
S
Sample System, 1-7
Screen Access, 4-1
Screen Examples, 1-11
Searching With Partial Information, 1-13
Section Organization, 2-1
Security Master List [pgacrprt], 6-6
Security Reports, 3-1
Select Zone, 2-6
Select Zone Function Keys, 2-6
Selecting Screens, 1-12
Shutting Down, 1-16
Signature Verify, 1-9
Silence Beeps, 2-9
Simple Devices, 4-21
Smart Failsoft Access Codes, 4-9
Special Journal Reporting [josprprt], 6-16
Status Screen Function Timeout, 2-13
Storing Data, 1-14
System Administration
Add Users, 6-2
Database Maintenance, 6-14
Display All Users Logged In, 6-7
Display All Valid Logins, 6-7
Display Current Date and Time, 6-7
Enable Terminals for Global Beeping, 6-8
ID Security Maintenance, 6-17
Keyholder Loading, 6-17
Miscellaneous Information, 6-19
Modify Passwords, 6-4
Program Security, 6-5
Purge Pending Report, 6-8
System Configuration, 6-8
System Configuration (syclmenu), 6-8
System Interconnect Diagram, 1-8
System Main Menu, 1-1
System Monitoring, 2-1
System Screen Trees, 1-17
See also Appendix A, 1-17
See Also Appendix B, 1-17
System Screens, 1-10
System Software, 1-5
T
Task Event / Master Report [taskrprt], 6-12
Tasks, 6-10
Download from Www.Somanuals.com. All Manuals Search And Download.
INDEX-11
Tenant, 1-3
Tenants, 4-17, 5-11
Time and Attendance, 1-18
Time Code, 1-3
Time Codes, 4-16, 5-10
Trace, 1-3
Transaction History Report, 3-3
Sample Report, 3-4
Transactions, 1-3
Transactions [tranentr], 6-12
Two-Man Rule, 1-6
U
User Defined Information, 4-49
Using Screens and Fields, 1-12
Moving Between Data Fields, 1-12
Moving to Prior Screens, 1-13
Selecting Screens, 1-12
V
Video Monitor Switchers, 1-4
Visitor Control, 1-18
W
Watch Dog Timer Count, 4-23
Y
Y, 1-12
Z
Zones, 1-3, 4-18
Zoom
Canceling Zoom, 1-15
Zoom Feature, 1-15
Download from Www.Somanuals.com. All Manuals Search And Download.
|