Westinghouse Home Security System SE 6000 User Manual

SE 6000  
SECURITY  
MANAGEMENT  
SYSTEM  
STANDARD  
PRODUCT  
MANUAL  
Westinghouse  
Security Electronics  
an ISO 9001 certified company  
5452BetsyRossDrive  
SantaClara,CA95054-1184  
(408)727-5170  
FAX(408)727-6707  
P/N 66107919001, Rev. F  
Download from Www.Somanuals.com. All Manuals Search And Download.  
iii  
TABLE OF CONTENTS  
SECTION 1: INTRODUCTION.................................................... 1-1  
MANUAL ORGANIZATION ............................................................................... 1-1  
System Main Menu ..................................................................................... 1-1  
Documentation Methods ............................................................................. 1-2  
DEFINITIONS ................................................................................................... 1-2  
General ....................................................................................................... 1-2  
System Hardware — Devices ..................................................................... 1-3  
System Software ......................................................................................... 1-5  
Principal System Functions ......................................................................... 1-6  
SAMPLE SYSTEM ............................................................................................ 1-7  
CREATING THE DATABASE ............................................................................ 1-8  
BASIC SYSTEM USAGE .................................................................................. 1-9  
Logging On ................................................................................................. 1-9  
System Screens ........................................................................................ 1-10  
Application Screens .................................................................................. 1-10  
SCREEN EXAMPLES ..................................................................................... 1-11  
USING SCREENS AND FIELDS ..................................................................... 1-12  
Selecting Screens ..................................................................................... 1-12  
Moving Between Data Fields..................................................................... 1-12  
Moving to Prior Screens ............................................................................ 1-13  
FINDING, ADDING, AND STORING DATA ..................................................... 1-13  
Finding Data.............................................................................................. 1-13  
Searching With Partial Information............................................................ 1-13  
Adding / Changing Data ............................................................................ 1-14  
Storing Data .............................................................................................. 1-14  
DELETING RECORDS ................................................................................... 1-14  
ZOOM FEATURE ............................................................................................ 1-15  
Cancel Zoom ............................................................................................ 1-15  
MISCELLANEOUS INFORMATION ................................................................ 1-15  
LOGGING OFF ............................................................................................... 1-15  
SHUTTING DOWN ......................................................................................... 1-16  
RESTARTING ................................................................................................. 1-16  
Automatic Restart ..................................................................................... 1-16  
Manual Restart.......................................................................................... 1-16  
SYSTEM SCREEN TREES ............................................................................. 1-17  
Appendix A: System Screen Trees ........................................................... 1-17  
Appendix B: System Screen Hierarchies................................................... 1-17  
OPTIONAL FEATURES .................................................................................. 1-17  
SECTION 2: MONITOR SECURITY ACTIVITY .......................... 2-1  
INTRODUCTION............................................................................................... 2-1  
SECTION ORGANIZATION .............................................................................. 2-1  
FUNCTION KEYS ............................................................................................. 2-2  
DATA ITEM SELECTION .................................................................................. 2-2  
CONTROL FUNCTIONS MENU ....................................................................... 2-2  
Pollers ......................................................................................................... 2-2  
Devices ....................................................................................................... 2-3  
Locks .......................................................................................................... 2-4  
Input Points ................................................................................................. 2-5  
Output Points .............................................................................................. 2-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
iv  
Doors .......................................................................................................... 2-6  
Select Zone................................................................................................. 2-6  
REVIEW TRANSACTIONS (FULL SCREEN) ................................................... 2-7  
ALARM SERVICING ......................................................................................... 2-8  
REAL TIME CONTROL MAPS .......................................................................... 2-8  
CONTROL PROJECTS .................................................................................... 2-9  
ABORT TIMERS ............................................................................................... 2-9  
OTHER FUNCTIONS........................................................................................ 2-9  
Printer Control ............................................................................................. 2-9  
Forgive Passback ..................................................................................... 2-10  
Manual Access Granted............................................................................ 2-10  
Force Table Download .............................................................................. 2-10  
Remote Devices ....................................................................................... 2-11  
Building Modes ......................................................................................... 2-11  
Full Screen Monitoring .............................................................................. 2-12  
MISCELLANEOUS INFORMATION ................................................................ 2-12  
Disk Almost Full Warning .......................................................................... 2-12  
Status Screen Function Timeout ............................................................... 2-13  
Alarm Servicing — No Activity Timeout ..................................................... 2-13  
Monitoring Security - Passwords ............................................................... 2-14  
Modified Usage of Invalid Facility Code Log.............................................. 2-15  
SECTION 3 SECURITY REPORTS ............................................ 3-1  
INTRODUCTION............................................................................................... 3-1  
POINT HISTORY REPORT............................................................................... 3-2  
Point History — Sample Report .................................................................. 3-2  
KEYHOLDER HISTORY REPORT.................................................................... 3-2  
Keyholder History — Sample Report........................................................... 3-3  
TRANSACTION HISTORY REPORT ................................................................ 3-3  
Transaction History — Sample Report ........................................................ 3-4  
ACCESS CONTROL ARCHIVE REPORT ........................................................ 3-4  
ALARM SERVICING REPORT ......................................................................... 3-4  
Alarm Servicing — Sample Report.............................................................. 3-5  
PASSBACK ZONE REPORT ............................................................................ 3-5  
Passback Zone — Sample Report .............................................................. 3-6  
DOWNLOAD STATUS REPORT ...................................................................... 3-6  
Download Status — Sample Report............................................................ 3-7  
KEYHOLDER ZONE REPORT ......................................................................... 3-8  
Keyholder Zone — Sample Report ............................................................. 3-8  
EVENT / POINT REPORT ................................................................................ 3-8  
Event / Point — Sample Report .................................................................. 3-9  
REALTIME PASSBACK ZONE REPORT.......................................................... 3-9  
REALTIME PASSBACK DETAIL — SAMPLE REPORT.................................. 3-10  
SECTION 4 MASTER FILE ENTRY............................................ 4-1  
INTRODUCTION............................................................................................... 4-1  
Screen Access ............................................................................................ 4-1  
KEYHOLDERS .................................................................................................. 4-2  
Keyholder Entry—Page 1 [key_entr] ........................................................... 4-2  
Keyholder Entry—Page 2 [key1entr] ........................................................... 4-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
v
Keyholder Access Entry [empgentr] ............................................................ 4-5  
Project Assignment [epj_entr] ..................................................................... 4-6  
COPY KEYHOLDERS ....................................................................................... 4-7  
Copy Keyholder Information ........................................................................ 4-7  
ACCESS ASSIGNMENT ................................................................................... 4-8  
Keyholder Access Assignment [egrpentr] ................................................... 4-8  
COPY KEYHOLDER ACCESS [ERGCOPY] ..................................................... 4-8  
ACCESS DEFINITION ...................................................................................... 4-9  
Access Code Entry [acdsentr] ..................................................................... 4-9  
Access Group Entry [agdsentr], [agrpentr] ................................................ 4-11  
Access Override Entry .............................................................................. 4-13  
Failsoft Entry ............................................................................................. 4-14  
Project Entry [prj_entr], [prd_entr] ............................................................. 4-14  
TIME CODES [TMCDENTR] ........................................................................... 4-16  
HOLIDAYS [HOL_ENTR] ................................................................................ 4-16  
TENANTS [TENTENTR] ................................................................................. 4-17  
INSTRUCTIONS [INSTENTR] ........................................................................ 4-17  
HARDWARE CONFIGURATION [CONFMENU] ............................................. 4-18  
Zones [zoneentr] ....................................................................................... 4-18  
Areas [areaentr], [areaentr1] ..................................................................... 4-19  
Pollers [pol_entr] ....................................................................................... 4-19  
Devices ..................................................................................................... 4-21  
Device Entry [dev_entr] — All Device Types ............................................. 4-22  
SE NexSentry Device Configuration Entry [nexsentr] ................................ 4-26  
Readers .................................................................................................... 4-31  
Reader Entry [rdr_entr] ............................................................................. 4-32  
Points [pnt_entr] ........................................................................................ 4-39  
Auto Opens / Activates.............................................................................. 4-42  
Device Report Definition [rdefentr] ............................................................ 4-43  
SE 422 PIN Definition ............................................................................... 4-43  
SE 422 Hardware Definition ...................................................................... 4-44  
Dialer Entry ............................................................................................... 4-45  
Site Entry Definition................................................................................... 4-46  
ABA Configuration Entry ........................................................................... 4-47  
DKR Configuration Entry ........................................................................... 4-48  
USER-DEFINED INFORMATION.................................................................... 4-49  
MAPS .............................................................................................................. 4-50  
Map Drawing Commands and Descriptions .............................................. 4-50  
SECTION 5: MASTER FILE REPORTS ..................................... 5-1  
INTRODUCTION............................................................................................... 5-1  
ADDITIONAL INFORMATION ........................................................................... 5-2  
KEYS MASTER ................................................................................................. 5-2  
Keyholder Quick List — Sample Report ...................................................... 5-3  
Keyholder Holder Master Report — Sample Report.................................... 5-3  
ACCESS ASSIGNMENTS................................................................................. 5-4  
Keyholder Access Assignment.................................................................... 5-4  
Keyholder Access Assignment: Regular — Sample Report ........................ 5-4  
Keyholder Access Assignment: Extended — Sample Report...................... 5-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
vi  
Reader Access Assignment ........................................................................ 5-5  
Reader Assignment — Sample Report ....................................................... 5-5  
ACCESS DEFINITION ...................................................................................... 5-6  
Access Code Master ................................................................................... 5-6  
Access Group Master ................................................................................. 5-6  
Access Override ......................................................................................... 5-7  
Intelligent Fail Soft Report ........................................................................... 5-7  
Project Report ............................................................................................. 5-8  
Keyholder Project Report ............................................................................ 5-9  
Reader Project Report .............................................................................. 5-10  
TIME CODES .................................................................................................. 5-10  
HOLIDAYS ...................................................................................................... 5-11  
TENANTS ....................................................................................................... 5-11  
Tenants — Sample Report ........................................................................ 5-12  
COMPANY, DEPT, LOCATION, JOB CAT ....................................................... 5-12  
Company, Dept, Location, Job Cat — Sample Company Report .............. 5-12  
INSTRUCTIONS ............................................................................................. 5-12  
Sample Instructions .................................................................................. 5-13  
MAPS .............................................................................................................. 5-13  
Sample Report — Map Information........................................................... 5-13  
DEVICE CONFIGURATION REPORTS .......................................................... 5-13  
Zones........................................................................................................ 5-13  
Zones — Sample Report .......................................................................... 5-14  
Pollers ....................................................................................................... 5-14  
Pollers — Sample Report.......................................................................... 5-14  
Devices ..................................................................................................... 5-14  
Devices — Sample Report ........................................................................ 5-15  
Readers .................................................................................................... 5-15  
Readers — Sample Report ....................................................................... 5-16  
Points........................................................................................................ 5-16  
Points — Sample Report........................................................................... 5-16  
Auto Opens / Activates.............................................................................. 5-17  
Auto Open / Activate — Sample Report .................................................... 5-17  
808 Report Definition ................................................................................ 5-17  
808 Report Definition —Sample Report .................................................... 5-17  
808 Device Configuration .......................................................................... 5-18  
808 Device Configuration — Sample Report............................................. 5-18  
Dialers....................................................................................................... 5-18  
Dialers — Sample Report ......................................................................... 5-18  
Site Definition ............................................................................................ 5-18  
Site Definition — Sample Report............................................................... 5-19  
ABA Configuration .................................................................................... 5-19  
ABA Configuration — Sample Report ....................................................... 5-19  
DKR Configuration .................................................................................... 5-20  
DKR Configuration — Sample Report ....................................................... 5-20  
SE 422 PIN Master Report........................................................................ 5-20  
SE 422 PIN Master Report — Sample ...................................................... 5-21  
132-COLUMN REPORT DISPLAY .................................................................. 5-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
vii  
SECTION 6: SYSTEM ADMINISTRATION ................................. 6-1  
INTRODUCTION............................................................................................... 6-1  
SECTION ORGANIZATION .............................................................................. 6-1  
ADDITIONAL INFORMATION ........................................................................... 6-2  
ADD USERS [ADDUSERS]............................................................................... 6-2  
MODIFY PASSWORDS [MOD_PASS].............................................................. 6-4  
PROGRAM SECURITY [SEC_MENU] .............................................................. 6-5  
Program Security Level Entry [pgacentr] ..................................................... 6-5  
Program Security Entry Definition [pg1_entr] .............................................. 6-5  
Copy Security [mnaccopy]........................................................................... 6-6  
Security Master List [pgacrprt]..................................................................... 6-6  
DISPLAY ALL VALID LOGINS [SHOWUSER] .................................................. 6-7  
DISPLAY CURRENT DATE AND TIME [SHOWDATE] ..................................... 6-7  
DISPLAY ALL USERS WHO ARE LOGGED IN [SHOWWHO] ......................... 6-7  
PURGE A PENDING REPORT [PURGRPRT] .................................................. 6-8  
ENABLE TERMINALS FOR GLOBAL BEEPING [BEEPENTR] ....................... 6-8  
SYSTEM CONFIGURATION (SYCLMENU)...................................................... 6-8  
Control File Maintenance [ctrlentr] .............................................................. 6-8  
Events [evenentr] ........................................................................................ 6-9  
Tasks [taskentr]......................................................................................... 6-10  
Task Event / Master Report [taskrprt] ........................................................ 6-12  
Transactions [tranentr] .............................................................................. 6-12  
DATABASE MAINTENANCE [DB_MENU] ...................................................... 6-14  
Display Database Statistics [dbstats] ........................................................ 6-14  
Perform Backup [bkup] ............................................................................. 6-14  
Alarm Transaction Clean Up [alrmcln]....................................................... 6-16  
Journal Archive [jourarch] ......................................................................... 6-16  
Journal Reporting [jourrprt] ....................................................................... 6-16  
Special Journal Reporting [josprprt] .......................................................... 6-16  
KEYHOLDER LOADING [LOADMENU] .......................................................... 6-17  
ID SECURITY MAINTENANCE [ID_MENU].................................................... 6-17  
ID Security User Entry [ID1_ entr] ............................................................. 6-17  
ID Security Group Entry [ID2_ entr] ........................................................... 6-18  
ID Security Report [ID1_ rprt] ................................................................... 6-18  
MISCELLANEOUS INFORMATION ................................................................ 6-19  
Adjustable Baud Rate—708P / 800 Pollers ............................................... 6-19  
708P REX Shunt Time Reset.................................................................... 6-19  
Key Inventory [invtmenu] ........................................................................... 6-20  
Inventory Status Code Menu [statentr] ...................................................... 6-20  
Key Inventory Status Code Report [statrprt] .............................................. 6-20  
Key Inventory Entry [cdinentr] ................................................................... 6-21  
Key Inventory Report [cdinrprt].................................................................. 6-21  
PARKING STICKERS [STKRMENU]............................................................... 6-22  
Parking Sticker Entry [stkrentr].................................................................. 6-22  
Parking Sticker Interactive Display [stkrrprt1] ............................................ 6-22  
Parking Sticker Master Report [stkrprt] ..................................................... 6-23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 1: INTRODUCTION  
1-1  
SECTION 1  
INTRODUCTION  
MANUAL ORGANIZATION  
This manual follows the order of the seven standard product items in the system main menu, with  
the Key Inventory and Parking Stickers items merged into the System Administration section:  
Section 2: Monitor Security Activity  
Section 3: Security Management Reports  
Section 4: Master File Entry  
Section 5: Master File Reports  
Section 6: System Administration  
System Main Menu  
The system main menu is the departure point for accessing all other system screens (main menu  
screens may vary according to options purchased).  
Download from Www.Somanuals.com. All Manuals Search And Download.  
1-2  
SECTION 1: INTRODUCTION  
Documentation Methods  
To avoid repetition and to reduce document size, detailed explanations for the system's principal  
data items are given only in Section 4: Master File Entry, which is used when creating the system  
database. For introductory information concerning the data items, see Definitions below.  
Further, with the exception of the screens presented in Basic System Usage in this section, and  
the introductory menu screens for Sections 2 through Section 5, all other screens throughout this  
manualarelimitedtotheparticularscreenareabeingdiscussed(i.e., fullscreensarenotshown).  
In some cases, screen presentations are unnecessary and are not used.  
DEFINITIONS  
General  
Access Code. A group of readers and time codes assigned to keyholders indicating where and  
when entry is permitted. Note that access codes can be associated with a down loadable device  
ID for distributed processing or they can be associated with the host computer for central  
processing.  
Access Group. A group of access codes created to facilitate the assignment of similar access  
privileges to a large number of keyholders.  
Alarm Contact. A dry-contact switch, indicating input conditions for smoke detectors, heat /  
moisture sensors, taut-wire fences, window bands, etc.  
Company. Keyholder's employer.  
Department. A particular group within a company to which a keyholder is assigned.  
Device. A controlling element of the system which communicates with the computer and the  
system points (see System Hardware in this section).  
Event. Any defined transaction which requires action by an access control system. Examples:  
keyholder entry request, activated alarm.  
Job Category. A code assigned to a keyholder indicating the employee group category.  
Key Number. Keyholder's security key number. Unlike the keyholder ID, this number may be  
changed (e.g., if a key is lost) or removed (e.g., if an employee leaves the company).  
Keyholder. Employee or visitor who holds a valid security card for an access control system.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 1: INTRODUCTION  
1-3  
Keyholder ID. Keyholder's ID number. The unique ID number is used by the computer to keep  
track of all activity for that person. Once entered, the keyholder ID cannot be changed.  
Location. Location of the office or branch of the company to which a keyholder is assigned.  
Tenant. One of several distinct occupants of a facility with a single access control system. The  
data for each tenant using the system appears separate from that of all other tenants.  
Time Code. A definition of the time of day, and the days of the week, when events are to occur.  
Used in assigning access privileges, performing scheduled tasks, and monitoring points.  
Trace. A realtime (as it is happening) display of events for a specific keyholder or point.  
Transactions. System responses to events are called transactions. The most frequently seen  
is ACCESS GRANTED, which means a valid key was presented to a reader at an approved door, at  
an approved time, and that the keyholder was granted entry.  
Zones. Selected locations and device types may be grouped into zones to facilitate system  
control. For reporting purposes, zones may be grouped into areas. If zones are created, anti-  
passbackinstructionsorcontrolsmaybeassigned(seeAccessControlFunctionsinthissection).  
System Hardware — Devices  
The principal device is the host computer. The host controls all data maintained in the database,  
recordsallsystemactivity,andisthecentralpointforallreportingactivity. Thehostcommunicates  
with all system devices, or may communicate via an LC or RLC computer (see Optional Features  
in this section).  
Various other devices are included in access control systems. Simple systems may use only  
contact switches and a single reader type. More complex systems may use several reader types  
and many other devices. Devices are classified as input or output units depending on their  
particular function. Input devices are detectors and identifiers; output devices are alarms and  
control units.  
Devices — Microprocessor Units  
AccessControlUnits(ACUs). Inconjunctionwiththehostorlocalcomputer,theACUsareused  
to control door access and maintain status. Example ACUs are: WSE NexSentry, 422, 708P,  
and 8xx-series. TheWSE708Punitsarecalledsimpledevicesbecausetheydonotmakeaccess  
decisions (decisions are made by host). The NexSentry, 422, and 8xx-series units are called  
intelligent devices because they can make access decisions independent of the host.  
Biometric Hand Readers. Devices such as fingerprint analyzers, hand geometry analyzers,  
retina scanners, and other devices which check body characteristics.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
1-4  
SECTION 1: INTRODUCTION  
Readers  
Digital Key Reader. Reads the unique number of 1 to 5 digital command keys simultaneously  
at a range of up to 36 inches.  
KeypadControllers. Thekeypadcontrollers, normallyusedinconjunctionwithanACU, provide  
additional security by requiring a personal identification number (PIN) entry.  
Magnetic Card Readers. Readsthecardnumberfrominformationcodedintothemagneticstrip  
on the card. Card must be moved physically through the reader to work.  
Readers (also called Sensors). These units electronically read the security key presented and  
transmit the data to the ACU. Three reader types are used: Proximity; Magnetic Stripe; Wiegand.  
Inputs  
AlarmContacts. Thesedevicesmonitorsimplecontactinputs, andcontroloutputsandswitches  
with contact closures for alarm monitoring, elevator control, camera switching, and other tasks.  
Contact Alarms. Simple dry-contact switches indicating if a contact is open or closed.  
Door switches. The computer controls only the lock power to the door, and the door switches  
are the contact points which inform the computer whether a specific door is open or closed. Each  
door switch is assigned to a specific reader.  
Fire Alarms / Heat Sensors. Data from smoke detectors and heat sensors can be sent to the  
computer to alert it to alarm conditions. Although fire alarm systems are generally separate from  
access control systems, the computer can be used to provide enhanced response capabilities.  
Intrusion Devices. Taut wire fence, infrared detectors, field-disturbance detectors and other  
device types can alert the computer to the presence of personnel in unauthorized areas.  
Motion Sensors. Detect physical movement in an area. Can be used to tell the computer that  
someone wants to exit (go through a door from the uncontrolled side), or to protect secure areas.  
Video Monitor Switchers. The computer routes the signal from a particular video camera to a  
specific monitor based on conditions in that area. For example, if the computer detects an open  
rear door, it can display the camera output at that door on the terminal at the security desk.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 1: INTRODUCTION  
1-5  
Multiple Switch Monitor (MSM). The MSM is a four-contact switch box that is connected to a  
WSE ACU and the MSM provides four contact-closure inputs.  
Points. Apointisanybasicelementofanaccesscontrolsystem, suchasadoorswitch, analarm  
contact, an output switch. Point IDs uniquely identify all system elements.  
Request-to-Exit (REX) Sensor. Used when both entry and exit control is required. REX points,  
usually push-button devices, motion detectors, or push-bars, tell the computer that someone  
insideabuildingwantstoexit. Thecomputerneedstoknowthistounlockthedoor,ortodisregard  
the door opening as being an alarm event.  
Outputs  
Audible Alarms. The computer can trigger bells, buzzers and other types of audible alarms.  
Remote Alarms. The computer can dial police and / or fire departments, or any other agency,  
as part of an alarm response plan.  
System Software  
The system software links all input and output elements. The software collects and reports data  
from input devices, and controls the output devices based on this information. The software also  
detects and reports any hardware problems that may occur.  
Complete Portability. A specific computer type is not required, although Hewlett-Packard  
computers are preferred because of performance and worldwide service. Application programs  
run under an SCO / UNIX operating system.  
Installation Flexibility. The SE 6000 can control many hardware setups, including remote site  
networks. The system can be programmed to control data flow between central and remote  
computers to create a large-size security system controlled from a central point.  
Integrated Software Support. The SE 6000 communicates with a variety of access control and  
alarm monitoring devices. Currently, the system interfaces with WSE ACUs and their peripheral  
devices, alarmmultiplexersproducedbyStellarSystemsandOptomux, magneticstripereaders,  
CCTV camera switchers made by Burle, Pacom, American Dynamics, and Vicon, Radionics  
alarmpanels,andRecognitionSystemshandgeometryreaders. Inaddition,thesystemsupports  
communication with the WSE 8xx-series ACUs over dial-up telephone lines using a remote dial-  
upinterface(RDI)device.TheID-4000badgingsystemincludesoptionsforbadgedesignsonfilm  
or on PVC.  
Open System Design. There are few restrictions on the number of security keys, key readers,  
or other system elements used with the SE 6000. Increasing system capacity only involves  
upgrading the computer power by adding more memory or disk space, or installing a faster  
processor. This means that, as a company grows, it cannot outgrow the SE 6000.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
1-6  
SECTION 1: INTRODUCTION  
Response Time. The SE 6000 is capable of fast response times in both single and multiple site  
configurations. Fastresponsetimesareimportantforsecuritypersonnelwhomonitoralarmsand  
are always appreciated by keyholders wishing to enter locked doors.  
Principal System Functions  
Access Control  
Anti-Passback Control. The SE 6000 has anti-passback features (applies to zones only) to  
prevent tailgating or unauthorized key use. Anti-passback is possible across multiple access  
control devices, and can be hard (denies access) or soft (allows access, but displays and logs a  
message). The software handles vehicle and personal passback separately.  
Automatic Access Control. Permits employees or visitors with assigned access codes to pass  
through only those doors assigned to them and only during the proper days and hours.  
Automatic Activate / Deactivate. Permits the automatic activation of specific output points to  
control lighting, status indicators, or other electrically controlled functions.  
Automatic Unlock / Lock. Allows doors to be opened automatically only during specified time  
periods, then re-locked automatically at a later time.  
Communications Monitor. Permits security personnel to check all wiring and communications  
to all hardware elements and displays raw data exchange between the host computer and a  
connected device.  
Event Monitoring. Displayseventsasthey occurandmonitorsthedoorstatusandotheraccess  
points. Allows security personnel to watch events at all doors in the system from one location.  
Flexible Event Handling. Flexible event handling automatically activates outputs, displays  
special messages, and enables / disables devices. Anything which can be done manually on the  
SE 6000 can also be performed automatically using this feature.  
IndependentPINEntry. Accesscontrolcanbeenhancedusingpersonalidentificationnumbers  
(PINs). PINsareenteredviakeypaddevicesassignedtoreaders.Also,high-securityindependent  
devices (hand geometry readers, e.g.) can identify the user.  
ManualAccessControl. Allowssecuritypersonneltomanuallyopenanydoorinresponsetoan  
access request. May be used with closed-circuit TV to verify and admit people, or to track  
keyholders who have forgotten their keys. Includes the capability to record keyholder IDs if keys  
are not available. All manual actions are logged as events.  
Two-Man Rule. The SE 6000 can be programmed to grant access only after two valid key  
presentations have been made at the same reader within a predefined period of time.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 1: INTRODUCTION  
1-7  
Multiple Occupancy Feature. Similar to the two-man rule except that it requires that two  
keyholders enter and leave a specified zone together; refer to Section 4 for details.  
File Maintenance  
To perform its access control functions, the system must know the unique ID numbers of all  
keyholders and the doors and times they can enter. Further, the SE 6000 maintains other  
keyholder data to facilitate scheduling and reporting.  
Thesystemalsoneedstoknowdetailsofthelocationofinputdevicesandothersecurityhardware.  
File maintenance functions allow users to enter, modify, or delete employee, company, physical  
connection and time information, as required.  
Reporting  
The SE 6000 produces a comprehensive selection of reports for display at the system terminal  
or for hard-copy output from the system printer:  
AlarmsandResponses. Ahistoryreportofalarmswhichoccurredataspecifictimeandlocation,  
and the responses taken by the security staff.  
All Transactions. A report detailing all system activity. The items reported can be limited to  
specific information items.  
Database Changes. A report of database change activity, which includes the name of the  
operator who made the changes. Note that this requires that the journaling feature be enabled.  
InvalidAccessAttempts. Areportdetailingeventswhichwerenotvalidaccessesduringspecific  
time periods at particular doors.  
Keyholder History. A report of the last twenty uses from a particular keyholder.  
Point History. A report of the last twenty events at any door or point. Designed as a quick way  
toviewalimitednumberofevents. Additionally, reportscanbecreatedwhichprovideinformation  
about the keyholders in the system, access privilege definitions, company information, input  
devices, and other subjects.  
SAMPLE SYSTEM  
An illustration of a basic SE 6000 system follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
1-8  
SECTION 1: INTRODUCTION  
SE 6000  
Pollers  
1
2
3
4
5
6
7
8
Alarm  
Monitoring  
Device  
Access Control Unit—  
ACU  
Switcher  
(Up to 16 per poller)  
(Up to 16 per poller)  
Sensor Connections  
1 2 3 4 5 6 7 8  
Multiple Switch  
Contact Relays  
Monitor—MSM  
(1—16)  
CCTV  
Contacts  
Camera  
1
2
3
4
Contact  
Switch  
(Point)  
REX  
(Point)  
Reader  
Door Switch  
(Point)  
One Complete Door  
BASIC SE 6000 SYSTEM  
CREATING THE DATABASE  
Once the system is in place, first obtain the following from the system installer:  
System Interconnect Diagram. This shows all wiring and connections in the system, and  
provides information needed for entering pollers, devices, readers, and points.  
Poller Initialization Parameters Information. The information shows how the pollers were  
initialized, including poller type, physical port connection, and other poller-specific information.  
Becauseallsystemactivityisbasedonfour-digitIDnumbers,youneedtodecidebeforedataentry  
howthesenumbersaretobeassignedtothesystemhardwareelements. Althoughthenumbering  
system is entirely the choice of the SE 6000 owner, we recommend one of the two following  
methods:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 1: INTRODUCTION  
1-9  
1. Following the System Interconnect Diagram, number each element in turn with a four-digit  
number, including numbers for devices, pollers, and readers.  
2. Use the following ID groupings for average-sized system:  
0001-0010 — Computers  
0011-0099 — Pollers  
0100-0999 — Devices  
1000-1999 — Sensors  
2000-2999  
3000-3999  
4000-5999  
6000-7999  
Door switches  
REX contacts  
Input points  
Outputs  
Data Entry Sequence  
Notethatalthoughthezoomfeature(describedlaterinthissection)permitsfasterdataentry, WSE  
recommends the following sequence for most efficient data entry when you are creating your  
database (data entry is detailed in Section 4: Master File Entry):  
1. Time Codes  
2. Tenants  
3. Zones / Areas  
4. Pollers  
9. Access Groups  
10. User-Defined Fields  
11. Keyholders  
12. Access Privileges  
13. Holidays  
17. Tasks  
18. Events  
19. EnableTerminalsforGlobalAlert  
20. Program Security Levels  
21. Add Users  
5. Devices  
6. Points  
7. Readers  
8. Access Codes  
14. Alarm Instructions  
15. Maps  
16. Transactions  
22. Passwords  
23. System Owner Name  
24. Terminals for Alarm Auto-Switch  
NOTE  
Consultthesysteminstallerifyouhavequestionsconcerningnumbering. Inanycase, keeptrack  
of your numbering method and advise each operator of the method selected  
BASIC SYSTEM USAGE  
ThissubsectiongivesintroductoryinformationforusingtheSE6000system,andincludesrelated  
miscellaneous information.  
Logging On  
Poweronthesystemterminal. Thescreendisplaysabriefwelcomemessagefollowedbythelogin  
andpasswordprompts. EntertheloginIDandpasswordinlowercaseletters. Ifuppercaseletters  
are entered by mistake, log off using uppercase letters then log on again with lowercase letters.  
If the login and password are not valid or if one or both were not entered correctly, the computer  
respondswithloginincorrectthendisplaysloginagain. ReentertheloginIDandpasswordmaking  
surethateachletteriscorrectlytyped. Iftheloginincorrectmessagecontinues,consultthesystem  
administrator. When logged in correctly, the system displays the SE 6000 title page, sets the  
terminal environment, then displays the main menu. Call WSE Customer Service if you have a  
login problem.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
1-10  
SECTION 1: INTRODUCTION  
System Screens  
There are two basic screen types: Menu and Application:  
Menu Screens  
Menu screens list application selections by group according to function (exception Monitor  
Security Activity — see Section 2). All menu screen IDs end in menu (example: [fmntmenu] —  
Master File Entry).  
The menu screens have three elements: the list of choices, the highlight bar, and the Enter  
Selection field. The highlight bar, controlled by the arrow keys, is used to make a selection to be  
placed into the Enter Selection field. Screen access descriptions are given in Moving Between  
Screens and Fields in this section.  
A sample menu screen follows:  
Application Screens  
Application screens use status windows and various fields for entering new data or displaying  
existing data. The screen title is in brackets and on the same line and to the left of the screen title.  
Most screen title IDs indicate screen function, e.g., entr (enter data), rprt (report). A sample  
screen follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 1: INTRODUCTION  
1-11  
Indicates replace or insert mode. With replace, entries overwrite existing data. With insert,  
entries push existing data to the right. Toggle between the modes by pressing insert.  
Indicates if the information displaying is stored.  
Indicates the current screen mode (see Finding, Adding, and Storing Data in this section).  
In some systems, this window is in reverse video.  
Indicates if the zoom feature exists for a field (see Zoom Feature in this section).  
Displays the number of records found as a result of a find request (see Finding, Adding, and  
Storing Data in this section).  
SCREEN EXAMPLES  
SE 6000 screen displays show the path used to access the screen. For example, the final screen  
used when setting up keyholders, [epj_entr], is accessed via three preceding keyholder setup  
screens: [key_entr], [key1entr], [empgentr]. This useful feature considerably assists the new SE  
6000 user when becoming familiar with the system. A sample [epj_entr] screen follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
1-12  
SECTION 1: INTRODUCTION  
USING SCREENS AND FIELDS  
Selecting Screens  
There are three screen selection methods:  
1. Use the arrow keys to select the menu choice. Press Enter to place it in the Enter Selection  
field, and pressEnter again to display the selection.  
2. Use the arrow keys to select the menu choice, and press F2 to display the selection.  
3. Press Enter anywhere in the list of choices to move the highlight bar to the Enter Selection  
field. Press Ctrl + y to clear the field and type the title of the screen required and then press  
Enter.  
Moving Between Data Fields  
Move between the application screen data fields as follows:  
To move forward through the fields, press Enter.  
To move backward through the fields, press Ctrl + u.  
To move between characters within a single field, use the left and right arrow keys.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 1: INTRODUCTION  
1-13  
Moving to Prior Screens  
Press F1 to return to the previous screen displayed. If required, continue to press F1 to return  
to the system main menu.  
FINDING, ADDING, AND STORING DATA  
Finding Data  
Usethefindmodetolocateandselectdata. Aspecificrecord(asinglekeyholderID, forexample)  
or a group of records (all keyholders in a particular job category, for example) can be found.  
For example, assume we need to find all keyholders assigned to tenant 2 who began work after  
May 1, 1995. First, select the keyholder entry screen, [key_entr]:  
NOTE  
The keyholders are the object of the search, which is why we begin at the keyholder entry screen.  
Tenant 2 and issue date are the search criteria.  
1. Press F4 to clear fields and to enter the find mode. The third status field at the top of the  
screen displays find.  
2. Press Enter to advance the highlight bar until you reach the first search item, Tenant, and  
type 2.  
3. Press Enter to advance the highlight bar until you reach the second search item, IssueDate,  
andtype05/01/96.(Note:Enterthedateaccordingtotheformatforyoursystem,thatis,either  
MM/DD/YY or DD/MM/YY.)  
4. Press F3 to begin the search process; the sixth status field displays finding. The length of  
the search process will depend upon the size of the data base.  
5. When the search completes, the system displays the first record found and shows the  
number of records found in the fifth status window (Record 1 of n). (If the system doesn't  
find any records matching the search criteria, the message No Records Found displays.)  
Use the down arrow key to display other records found in the search process. Use the up  
arrow key to go back to previous records.  
Searching With Partial Information  
Records can be found using partial information. For example, to find all keyholders whose last  
name begins with T, enter T in the Last Name field. The system also searches for several criteria.  
For example, to find all keyholders who work for tenants 1 and 5, enter 1,5 in the tenant field. In  
addition, you can enter less than (<) and greater than (>) symbols to narrow a search.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
1-14  
SECTION 1: INTRODUCTION  
The computer automatically changes to the update mode when a search completes, and the  
recordsselectedcanbeupdatedifrequired. Tostartanothersearch, pressF4toclearthescreen  
and begin again.  
Adding / Changing Data  
Theaddmodeisusedtoinputnewrecords.Oncearecordisfoundusingthesearchmode,update  
is automatically selected which allows the user to change the existing data.  
If not already in the add mode, press F5 to clear fields and to begin adding. Press Enter to move  
the highlight bar to the next field and type the data. (If a typing mistake is made, press Ctrl + y to  
clear a field, Ctrl + f to delete characters in a field, Ctrl + u to move back through the fields.)  
Many fields have default values, which are used if a field entry is not made. Default values are  
usedtosimplifytheentryprocessbyautomaticallysettingcertainfieldstocommonlyusedvalues.  
For example, many yes or no type fields, (Y / N), have Y as the default.  
Storing Data  
StorealladditionsandchangeswhencompletedPressF6. IfF1isusedtoreturntotheprevious  
screen without first storing the new / changed information, all the new data is lost.  
DELETING RECORDS  
From time to time, it may be necessary to delete records from the database. The delete record  
function is easy to perform, although some cautions are involved. To remove a record from the  
database, first display the record using the find mode, then press Esc, followed by d (lowercase),  
then r (lowercase). If the operation can be performed, the computer displays deleted.  
It may not be possible to delete records in some cases. For example, the system would not allow  
areadertobedeletedwithoutfirstdeletingitsassociatedaccesscodes. Displaytheaccesscode  
records and delete the reader data appearing on them, then delete the reader record itself again.  
CAUTION  
Be careful when deleting certain records. For example, it is unwise to be hasty when deleting  
keyholder records. Consider Employee A who occasionally entered a certain room where  
valuable material is stored. The employee then abruptly left the company, and the keyholder  
record is deleted. A theft is then discovered from the room, and from shipping and receiving  
records it is determined that the theft occurred within a particular time frame. But with the  
keyholder information now erased for Employee A, there is no way to link the transaction history  
to a particular keyholder.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 1: INTRODUCTION  
1-15  
ZOOM FEATURE  
The zoom feature provides a fast method for accessing linked or dependent application screens  
and for copying data from these screens to other application screens. When the feature is  
available, zoom displays in the status bar.  
For example, you are entering keyholder data (keyholder entry screen) but don’t know the tenant  
codeforthekeyholder. Wheninthetenant field,pressF7tozoomtothetenantentryscreen. Once  
there, use the find mode to see the tenant codes defined and to select the one you need or enter  
anewone. ThenpressF1,andthesystemautomaticallyreturnsyoutothekeyholderentryscreen  
and enters the keyholder's tenant code in the tenant field.  
Cancel Zoom  
If you don't need data from the zoom screen, press Esc, then Ctrl + z to return to the previous  
screen, or simply return using F1 and key over the returned data.  
MISCELLANEOUS INFORMATION  
If you need help in any field in the system, check the instructions on the information line at  
the bottom of the screen.  
Ifthecomputerbeepsanddisplaysamessage,orifyouseethesymbol'---'intheinformation  
area at the bottom of the screen, press Enter to let the computer know you've read the  
message. The computer will not allow further action, and will beep each time you press a  
key until you press Enter to acknowledge.  
Occasionally, a screen will not display properly. This can occur when accessing the system  
from a remote dial-in terminal via a modem or when the system administrator sends a  
message. If this happens, try using Ctrl + r to redraw the screen. To completely clear the  
problem, log off the system and log on again.  
To save time when moving around the SE 6000 system, it pays to learn the screen titles of  
the most commonly used application screens (see the screen location trees and the table  
at the end of this section). For fast screen access, type a screen title in the Enter Selection  
field(pressEnterinanymenuscreen),thenpressEnterandthesystemimmediatelydisplays  
thescreen. NotethatyoushoulddeleteanycharactersremainingintheEnterSelectionfield  
before you select Enter.  
LOGGING OFF  
When the SE 6000 session is completed, press F1 until you reach the main menu screen. From  
here, press F1 again; the computer asks for log off confirmation. Enter yes (full word) and press  
Entertoleavethesystem. (YoucanalsotypeexitinanyEnterSelectionfieldtoleavethesystem.)  
After log off, the computer displays the login prompt again.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
1-16  
SECTION 1: INTRODUCTION  
IMPORTANT  
LogofftheSE6000systemformallybeforeyouleavetheterminal. Ifyoudonotlogoff, anyaction  
taken by the next person at the terminal will appear under your name.  
SHUTTING DOWN  
Always use the following procedures, in the order given, when powering off the SE 6000:  
1. Gotothemainsystemterminal(systemconsole). Thisterminalhasoverallcomputercontrol  
and displays all system messages.  
2. Log off the system using the procedures given in the previous subsection.  
3. Log in using the SHUTDOWN login. Your system administrator will provide you with the  
password. Ifotherusersarestillloggedon, youmayhavetopressEntertocontinuetheshut  
down process which will forcibly log off other users.  
Step 3 automatically shuts down the SE 6000 system in an orderly way. The last message  
displayed when the internal shutdown procedures have completed is Safe to Power Off or Press  
any Key to Reboot. It is now safe to power off the computer. To restart the computer, press any  
key and follow the instructions in the following subsection.  
RESTARTING  
Use one of the following methods, Automatic or Manual, when powering on the SE 6000 (the  
shutdown / restart process is also known as rebooting the computer).  
Automatic Restart  
The SE 6000 has an automatic restart capability that reboots the system in the event of a power  
interruption. If unattended, the Boot prompt displays for 30 seconds, then the auto-boot function  
reloads the operating system and restarts the application including the pollers.  
Manual Restart  
1. Turn the power on; the computer displays Boot. Press Enter to continue.  
2. After various messages, the computer displays Type Control-d to Proceed with Normal  
Startup (or give root password for system maintenance). Press and hold the Ctrl key, and  
press the d key (lowercase).  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 1: INTRODUCTION  
1-17  
3. The computer displays Enter new time ([yymmdd]hhmm). Change the date and time values  
as required (do not enter the parentheses or brackets); press Enter when completed. To  
keep the displayed date and time, press Enter.  
4. The computer continues its startup procedures, and the login prompt displays after a brief  
pause. If any other message displays apart from those noted here, just press Enter.  
SYSTEM SCREEN TREES  
The SE 6000 screens are arranged in tree structures, with hierarchies established from the  
primary screen to the lowest level screens in each tree. Each screen has a unique title which  
displays in the upper-left.  
Appendix A: System Screen Trees  
Treestructuresforthefirstsevenstandard-productselectionsonthesystemmainmenuaregiven  
in Appendix A:  
Monitor Security Activity  
Security Management Reports  
Master File Entry  
Master File Reports  
Key Inventory / Parking Stickers  
System Administration  
Appendix B: System Screen Hierarchies  
Appendix B lists all screens within their respective tree structures, along with a brief explanation  
foreach. Leftcolumnindentionsshowtherelativepositionofeachscreenwithintheindividualtree  
structures. Indentedscreenscanbeaccessedonlyfromthepreviouslevelinthescreenhierarchy.  
OPTIONAL FEATURES  
A variety of optional software packages are available with the SE 6000:  
IQ. A report writer package that allows the user to select, sort, display and / or print database  
information in a format specified by the user. It can be used for quick ad hoc enquiries or formal  
reports. Once defined, report formats may be saved and rerun on demand.  
CCTV Camera Switcher Control. Controls the actions of closed-circuit television system  
switchers, allowing the system to switch video output from a particular camera to a specified  
monitor. When used in conjunction with the system flexible event handling feature, this provides  
an important method for monitoring system events.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
1-18  
SECTION 1: INTRODUCTION  
ControllerSystems. ControllersystemsarecomputersrunningtheSE6000local(LC)orremote  
location controller (RLC) software. The LC system is a computer attached via dedicated lines to  
the host. The RLC system is a computer attached via dial-up telephone lines to the host.  
Elevator Control. Permits floor-by-floor control of elevator call buttons. When a keyholder  
presents a key to a reader in the elevator, certain buttons, wired via computer-controlled output  
contracts, can be enabled or disabled for use. The keyholder is able to select only those which  
have been enabled for his / her specific access privileges.  
Guard Tour. Schedules and monitors security personnel guard tour activities. Specifies certain  
reader output points as guard tour points, and assigns the minimum and maximum times which  
can pass between stops on the tour. The feature reports if tours have started too early or too late,  
or if too little or too much time has passed between stations.  
Parking Control. Controls and monitors a parking facility including employee and revenue  
generating parking spaces. Includes keyholder and daily cash customer functions, tenant billing,  
and overage features. Supported hardware includes point-of-sale terminals, automated ticket  
dispensers, and gate control mechanisms. Produces detailed reports for keyholders, cash  
customers, parking lot attendant activity, and keeps track of the number of cars in the lot on a  
tenant-by-tenant basis.  
Remote Dial-Up Interface (RDI). Permits communication with remotely-located 8xx-series  
devices via dial-up telephone lines. The feature retains transaction information, and determines  
when conditions at a remote site warrant a call to the host (alarm event occurring, log buffer  
reachingauser-definedthreshold, etc.). Frequencyandcalldurationaredeterminedbytheuser.  
The host contacts remote sites in turn to access information and to transfer event logs.  
Time and Attendance. Captures hours worked by each employee for transfer to a payroll or  
accounting system. The feature can be programmed to:  
Generate specialized reports of time and attendance activity.  
Monitor the number of meals taken by a keyholder.  
Recognize early and late entrances and exits.  
All records can be edited and modified prior to transfer to another system.  
Visitor Control. Tracks visitors, prints visitor badges (black and white or color), and creates  
comprehensive reports of visitor activity. The feature also provides a record of who was visited  
and the date. It provides the company name of the visitor if applicable.  
WSEID-4000Interface. IntegratesoneormorePolaroidID-4000photobadgingsystemswiththe  
SE 6000. Keyholder information and photo IDs created on the Polaroid system are transferred  
viaaLANorserialconnectiontotheSE6000. BadgescanbeprintedonfilmoronPVC.Keyholder  
maintenance may be initiated on either system; all data is stored in a single database resident on  
the SE 6000.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 2: MONITOR SECURITY ACTIVITY  
2-1  
SECTION 2  
MONITOR SECURITY  
ACTIVITY  
INTRODUCTION  
Systemmonitoringandcontrolisperformedviathemonitormenu, thefirstselectioninthesystem  
main menu. The monitor menu screen is shown below.  
Notice this is a split screen, with the lower half constantly updated as transactions (any system  
event) occur. Most monitor screens are divided this way, and for user convenience the screen  
examples from this point on are shown without the transaction listings. Also, other screens not  
accessed from the monitor menu in this section are reduced to show the required data fields only.  
SECTION ORGANIZATION  
Theproceduresinthissectionareintheordershowninthemonitormenu (above). Theassociated  
subscreens also follow in order (the section table of contents reflects the hierarchies).  
Download from Www.Somanuals.com. All Manuals Search And Download.  
2-2  
SECTION 2: MONITOR SECURITY ACTIVITY  
FUNCTION KEYS  
Beneath the transactions display are the applicable function keys for each screen, with the key  
actions shown next to the key numbers. For most function key actions, the system displays  
messages confirming that the action has been completed, e.g., POLLER STOPPED.  
In general, F1 is used to exit from the current screen, and F7 and F8 are used respectively to  
displaythepreviousscreenandthenextscreenwithinthesetofscreensthatapplytotheparticular  
data item being controlled or when there are more items then will fit into a single screen.  
DATA ITEM SELECTION  
Usetheupanddownarrowkeystoselectthedataitemtobecontrolled, thenpresstheapplicable  
function key for the system action to be taken.  
CONTROL FUNCTIONS MENU  
Pollers  
The Control Pollers screen displays point ID, description, status.  
Control Pollers Function Keys  
F2HALT. Stopapollerwhenworkistobeperformedondevicesattachedtothepollerortoreload  
a poller parameter following a change.  
F3RESTART. Restartthepollerwhenworkiscompleted(systemdisplaysmessagesannouncing  
eachdeviceattachedtothepollerasitcomesbackonline). Iftherearedeviceswithsystemorkey  
checksum errors, perform a reset to the device.  
F4DEVCOMM. Thisfunctionmonitorscommunicationbetweenthepollersandthedevicepollers.  
In normal operation, the devices are asked for information by the pollers many times a second,  
and with a properly operating system the controller screen updates rapidly.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 2: MONITOR SECURITY ACTIVITY  
2-3  
When F4 is pressed, a second screen displays showing the connections between the host and  
the devices of the particular poller selected:  
Poller-device communication should be one of the first items checked whenever there is an  
apparent problem with the system.  
Devices  
The Control Devices screen displays point ID, description, status, tamper, shunt. Applies to  
NexSentry, 422, and 8xx-series ACUs.  
Control Devices Function Keys  
F2DEVSTAT. DeviceStatus—WhenF2ispressed,asecondscreendisplaysshowingthestatus  
of the particular device selected:  
F3DEVRSET. DeviceReset—UsedwhensettingupnewACUsorreestablishingrepairedACUs,  
or when the integrity of the data currently resident in the ACU is suspected. Downloads all host  
device data to the ACU and silences a latched alarm.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
2-4  
SECTION 2: MONITOR SECURITY ACTIVITY  
F4 KEY RSET. Key Reset—Used when setting up new ACUs or reestablishing repaired ACUs,  
or when the integrity of the data currently resident in the ACU is suspected. Downloads all host  
key data to the ACU.  
F5 SHUNT. Shunt a device.  
F6 UNSHUNT. Unshunt a device previously shunted.  
Locks  
The Control Locks screen displays point ID, description, lock status, shunt, sensor, coax, door  
status.  
Control Locks Function Keys  
F2 LOCK. Lock selected door. If no door is selected, F2 locks all doors in the zone.  
F3 UNLOCK. Unlock selected door. If no is door selected, F3 unlocks all doors in the zone.  
F4 TIME OPEN. Unlock selected door for the amount of time programmed at the ACU or on the  
readerentryscreen. Ifnodoorisselectedinazone, F4unlocksalldoorsinthezonefortheamount  
of time programmed.  
F5 SHUNT. Shunt a door.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 2: MONITOR SECURITY ACTIVITY  
2-5  
F6 UNSHUNT. Unshunt a door previously shunted.  
Input Points  
The Control Inputs screen displays point ID, description, point status, tamper, shunt.  
Control Inputs Function Keys  
F5 SHUNT. Shunt a selected input point. If no input point is selected, F5 shunts all input points  
in the zone.  
F6 UNSHUNT. Unshunt a selected input point previously shunted. If no input point is selected,  
F6 unshunts all input points in the zone.  
Output Points  
The Control Outputs screen displays point ID, description, status, shunt.  
Control Outputs Function Keys  
F2ACTIVATE. Activateaselectedoutputpoint. Ifnooutputpointisselected,F2shuntsalloutput  
points in the zone.  
F3 NORMAL. Deactivate a selected output point. If no output point is selected, F3 deactivates all  
output points in the zone.  
F5SHUNT. Shuntaselectedoutputpoint. Ifnooutputpointisselected,F5shuntsalloutputpoints  
in the zone.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
2-6  
SECTION 2: MONITOR SECURITY ACTIVITY  
F6 UNSHUNT. Unshunt a selected output point previously shunted. If no output point is selected,  
F6 unshunts all output points in the zone.  
Doors  
The Control Doors screen displays point ID, description, status, and shunt of the door switches.  
Control Doors Function Keys  
F5 SHUNT. Shunt a selected door. If no door is selected, F5 shunts all doors in the zone.  
F6 UNSHUNT. Unshunt a selected door previously shunted. If no door is selected, F6 unshunts  
all doors in the zone.  
Select Zone  
The Select Zone screen displays zone, description, count, PBarea, PBtype, PBlevel (see F3  
RSET CNT below).  
UsethearrowkeytomakethedesiredselectionandpressF2. Controlactivityremainsexclusively  
for this zone until you return to the monitor menu.  
The keyholder count fields apply if passback control is in effect for the zone selected  
Select Zone Function Keys  
F2 SEL ZONE. Select zone.  
F3 RSET CNT. If passback control is in effect for a zone, the following display:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 2: MONITOR SECURITY ACTIVITY  
2-7  
Count  
— Number of keyholders currently in the zone.  
PBarea — Passback zone type—personal, vehicle, none.  
PBtype — Passback type —hard, soft, none.  
PBlevel — Passback control—global (host), local (ACU), none.  
Note that zone count is automatically reset whenever a zone is selected.  
Multi-user systems employ record locking techniques for keyholder file maintenance, and locked  
records are not updated by the passback routine that maintains keyholder location. If this occurs,  
thekeyholdercountiscorrect, butthepassbackzonereport(whichreadsthekeyholderfile)does  
not include the locked records.  
F3 corrects the zone count where privileged keyholders (not subject to passback control) have  
reentered a controlled zone without having exited in the normal manner or when the previous  
defined condition exists.  
REVIEW TRANSACTIONS (FULL SCREEN)  
This feature displays all transactions in the review transaction memory. Typically, the last 3,000  
transactions which occurred are available. To view the screen without interruption, new  
transactionsdonotappearwhenusingthisfunction. Ifnokeyboardactionistakenwiththisfeature  
for a five-minute period, the system returns to the monitor menu. A sample full screen follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
2-8  
SECTION 2: MONITOR SECURITY ACTIVITY  
Review Transactions Function Keys  
F2 BACKWARD. Page backward through the transactions.  
F3 FORWARD. Page forward through the transactions.  
F4 OLDEST. Go to first transaction.  
F5 LATEST. Go to last transaction.  
ALARM SERVICING  
The system emits beeps when an alarm occurs, and displays the number of pending and active  
alarm data in the upper-right corner of the monitor menu screen: Pending—alarm condition no  
longer occurring but not yet formally resolved. Active—alarm condition still occurring. Begin  
resolving alarms using the alarm servicing screen:  
Alarm Servicing Function Keys  
F2VIEWMAP. PressF2todisplayamapshowingalarmlocation. Locationindicatedbythepoint  
ID in a red rectangle (other map symbols do not display when an alarm is triggered).  
F3INSTRUCT. Instructions—PressF3todisplayalistofactionstotakeinresponsetothealarm.  
F4 RESPONSE. Press F4 to display the alarm response entry screen. First enter Y or N in the  
situation resolved field (Y cannot be entered if the alarm is still occurring—take action to halt the  
alarmcondition), thenentertheactionstaken. Aprintablerecordoftheseactionsiswrittentodisk  
(see Section 3: Alarm Servicing Report).  
F5 FAST ACK. Fast Acknowledge—Press F5 and the alarm is considered resolved (use with  
caution because this does not allow entry of operator response to an alarm).  
F6 SIL ALL. Silence All—Press F6 to silence beeping at all terminals.  
REAL TIME CONTROL MAPS  
Systemactivitycanbemonitoredusingthesystemmapfunction(createdusingtheDRAWMAPS  
function—see Section 4: Maps). The maps display triggered alarms (icon displays in red; goes  
toyellowwhenpending),doorstatus(messagedisplays),deviceshuntstatus(messagedisplays),  
door unlocks (icon goes from black to white).  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 2: MONITOR SECURITY ACTIVITY  
2-9  
CONTROL PROJECTS  
The Control Projects screen (not controllable on LC systems—host only) displays project, status,  
description, start, end. The control projects screen permits operator override of doors assigned  
to projects which directly affects keyholder access.  
Control Projects Function Keys  
F2 ACTIVATE. Activates a project.  
F3 DE-ACTIV. Deactivates a project.  
F4 NORMAL. Normalizes a project based on start/stop dates and time.  
ABORT TIMERS  
The Abort Timers function (F6) allows you to stop interactive timers that have started.  
OTHER FUNCTIONS  
Printer Control  
Control Printers Function Keys  
F3 RELOAD. Reloads printer data from the host which resets the printer logic and font size.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
2-10  
SECTION 2: MONITOR SECURITY ACTIVITY  
F5 PRNT ON. Switch printer #1 on or off depending on current state (used to control log printer  
only).  
F6 PRNT ON. Switch printer #2 on or off depending on current state.  
Forgive Passback  
A passback violation occurs when a keyholder uses their key to reenter a door without first using  
their key to exit the same door. For example, a keyholder (number 1) uses their key and unlocks  
the door. The system flags keyholder number 1 as "in." Keyholder number 1 passes their key to  
keyholder number 2. When keyholder number 2 attempts to use the key, the systems gives  
keyholder number 1 a passback violation. This was originally developed for parking lot control.  
The system handles vehicle and personal passback separately.  
To allow the keyholder to enter the area, use the forgive passback function.  
1. Enter key number (or ALL for all keyholders); press Enter.  
2. Press F1 to confirm the passback forgive.  
Manual Access Granted  
Usedwhenacommandkeyisnotavailable(mislaid,stolen,etc.),thisfunctionallowstheoperator  
to grant manual access following entry of the key number (system records entry). Enter the key  
number and reader ID. Enter the keyholder ID if the key number is unknown. Manual access is  
available for all keyholders at any reader regardless of access assignments.  
Force Table Download  
This function first writes database information to a text file, then transfers the information to host  
memory and LC memory (if applicable). The function is used during system servicing, and when  
requested by customer support. A sample screen follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 2: MONITOR SECURITY ACTIVITY  
2-11  
When requested, enter the number of the table to be downloaded and press Enter. The system  
requests confirmation — press F1. REPACK OK displays when transfer completes.  
Remote Devices  
This function is used to establish a telephone connection to a remote device to perform certain  
actions, for example, unlock a door to a remote ATM for Service. Note that the remote device  
remains connected until the operator selects the device and presses F3-Hang Up.  
Control Remote Devices Function Keys  
F2 CALL/HLD. Call device.  
F3 HANGUP. Disengage connection.  
Building Modes  
Building modes — open, closed, limited — combined with the ACU report definitions provide an  
extra level of security when the building is empty or a reduced number of staff are present. Door  
switches and / or other monitor points active in the building open mode can be configured to  
generate alarms if activated when the building is in limited or closed mode. Also, if open mode,  
closed mode, or station readers have been defined, reader operation for those locations will  
change when the building mode changes. For example, an open mode reader will not read keys  
when the building is in limited or closed mode.  
Control Building Modes Function Keys  
F2 OPEN. Change current building mode to open.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
2-12  
SECTION 2: MONITOR SECURITY ACTIVITY  
F3 LIMITED. Change current building mode to limited.  
F4 CLOSED. Change current building mode to closed (takes approximately one minute to  
complete). If a device input point configured to prevent building closure is active, the building will  
remain in the limited mode until the point is cleared.  
Full Screen Monitoring  
Displays system logs in a manner similar to the review transactions feature (see Review  
Transactions—FullScreeninthissection)exceptthatnewtransactionsdisplayastheyoccur.Use  
F8 to toggle between full and half screen displays.  
MISCELLANEOUS INFORMATION  
Disk Almost Full Warning  
This feature warns operators when the disk drive has reached a specified percentage of its total  
capacity:  
Whenthewarningappears,takeimmediateactiontoreducetheamountofdatastoredonthedisk  
(delete unwanted files, etc.).  
This feature uses the DISKWARN keyword parameter located in the $DATAPATH/PARAMS.M  
file:  
Parameter  
Default Condition  
DISKWARN keyword missing  
DISKWARN =0  
Defaults to 90%  
Feature disabled  
DISKWARN =n  
Feature enabled; n is the range 1—99  
NOTE  
1. Shut down and reboot after changing DISKWARN parameters.  
2. The DISK ALMOST FULL message is generated only once.  
3. Since the message is generated only once, we recommend that system message #242 be  
changed to an alarm event by changing the alarm priority field to a value greater than 0. See  
Section 6, Transactions [tranentr] for details.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 2: MONITOR SECURITY ACTIVITY  
2-13  
Status Screen Function Timeout  
Some system functions temporarily disable the realtime display until the sub-menu is exited. The  
status screen function Timeout feature provides a user-defined method for controlling the length  
of time that the realtime display is disabled. If the system does not detect any keyboard or mouse  
activity for the number of seconds defined by the TIMEOUT parameter, the monitor program  
returns to the previous menu and resumes realtime display.  
This feature uses the parameter file $DATAPATH/MONITOR, with the control parameter  
TIMEOUT having a numeric value in seconds:  
Parameter  
Default Condition  
Parameter missing  
TIMEOUT=0  
TIMEOUT defaults to 0—feature disabled  
Feature disabled  
TIMEOUT=n  
Feature enabled using the numeric value n (five digits maximum)  
Feature enabled using the numeric value 600—600 seconds, default  
TIMEOUT=600  
NOTE  
1. The control parameter is read by the monitor program at log-on time and remains in effect  
as long as the monitor program is active. A change to the Timeout value does not take effect  
until the user logs off, and then logs back on to the system (reboot not required).  
2. This feature is operational with the following screens:  
A. The device communication function of the control pollers screen (see Pollers in this  
section).  
B. The device status function of the control devices screen (see Devices in this section).  
Alarm Servicing — No Activity Timeout  
This feature controls how long the alarm servicing screen displays when there is no keyboard or  
mouse activity. On Timeout, the system exits the alarm servicing program and returns to the  
realtime display of system events.  
This feature uses the $DATAPATH/ALARMSRV parameter file, with the control parameter  
TIMEOUT having a numeric value in seconds: Acceptable values are:  
Parameter  
Default Condition  
Parameter missing  
TIMEOUT=0  
TIMEOUT defaults to 0—feature disabled  
Feature disabled  
TIMEOUT=n  
TIMEOUT=600  
Feature enabled using the numeric value n (five digits maximum)  
Feature enabled using the numeric value 600—600 seconds, default  
Download from Www.Somanuals.com. All Manuals Search And Download.  
2-14  
SECTION 2: MONITOR SECURITY ACTIVITY  
NOTE  
1. The control parameter is read by the alarm servicing program at log-on time and remains in  
effect as long as the alarm program is active. A change to the Timeout value does not take  
effect until the user logs off, and then logs back on to the system (reboots).  
2. Timeout is deactivated when responding to an alarm in the alarm response screen.  
Monitoring Security - Passwords  
With enhanced monitor security function and the addition of password logic, any or all portions of  
the monitor functions can be set up to require a valid ID and password combination before the  
functioncanbeinitiated. Inplaceofthefactory-suppliedstatuslogin,theusermaycreateasimilar  
login ID, with or without password, and control access to monitor capabilities. While many  
operators may use the generic login, individual users will have only monitor privileges consistent  
with their own custom security profiles.  
This feature uses the PASSWORD keyword parameter located in the $DATAPATH/MONITOR  
file. The acceptable values are:  
PASSWORD keyword missing  
PASSWORD=0  
Feature disabled  
Feature disabled (default)  
Feature enabled  
PASSWORD=1  
This feature also requires that the user has a custom security profile. See also note #1 regarding  
system upgrades with users created on an earlier version of the software.  
Implementing the Feature  
For additional information see Chapter 6, Adding a User.  
1. Log on using an assigned login name and password, or use a generic login name (and  
optional password) as required by facility procedures.  
2. With the password feature enabled, any action attempted from the monitor for which  
permission has not been granted causes the system to prompt for a login name and  
password.  
3. If the login name and password entered are valid, the associated security profile initiates the  
action requested (see note #4).  
4. If the feature is disabled or an incorrect login / password is entered, the system displays  
PERMISSION DENIED.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 2: MONITOR SECURITY ACTIVITY  
2-15  
NOTE  
1. Ifyoursystemhasbeenupgraded, anduserscreatedonapreviousreleasehavebeen  
saved, their user profiles must be updated with the new monitor security privileges. To  
dothis,logonasadduserswiththecorrectpassword,selectsystemadministration,and  
then select add users. Update the security profile for each user as follows:  
-
-
-
-
Enter the user ID  
Select modify—F5  
Press the return key through all fields  
Store the updated profile—F8  
Repeat for all applicable users. The new custom security information is appended  
without changing the current privileges.  
2. If the password keyword parameter is changed, users must log off then log back on  
(reboot) before a change is recognized by the monitor program.  
3. All functions that generate log messages are logged with the user ID entered to gain  
access to the requested function.  
4. Permissions associated with the entered login ID remain in effect until the operator  
returns to the point where the login ID and password were required, or, if the status  
screen function Timeout feature has been enabled, the screen itself will Timeout (see  
Status Screen Function Timeout Feature in this section).  
Modified Usage of Invalid Facility Code Log  
Thisfeaturesuppressesakeyholder'snamefromthemonitoringscreenandvariousreportswhen  
an INVALID FACILITY CODE message is logged. In some cases, this resulted in a log message  
erroneously associating a valid keyholder with an invalid facility. This function is automatic and  
does not require operator action.  
NOTE  
This occurred with the 708 type device where different facility codes were used on different  
buildings.Itonlyappliesto1030/1040cardswithfacilitycodeswhereauserhaskeyswithmultiple  
codes.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
2-16  
SECTION 2: MONITOR SECURITY ACTIVITY  
1. This feature affects the following displays and reports:  
-
-
-
-
-
-
Monitor screen, both full- and half-screen displays  
Review transactions screen  
Point history report  
Keyholder history report  
Transaction history report - all sort options  
Archive history report - all sort options  
2. Log records are not altered.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 3  
SECURITY REPORTS  
INTRODUCTION  
Security management reports provide a permanent record of transactions, and are also used to  
examine specific events. The reports are accessed through the security management reports  
menu screen, [accsmenu], via the main menu. In this section, the reports are documented  
following the security management reports menu sequence (see section table of contents). A  
sample [accsmenu] screen follows:  
All screens in this section show the system default values, with most screen fields requiring a  
numeric range entry. For example, the default range for keyholders is 1 — 999999999 (to reduce  
waiting time while a report is generating, enter the smallest range of numbers for each category  
which will still provide the information required). Other screen fields include choices for a specific  
data item, date ranges, regular or extended information, and report sequencing. When all fields  
have been entered, press Enter (Yes - default) to begin report generation:  
Oncecompiled,areportoutputselectiondisplays. Normally,1(systemreportprinter)orD(display  
at terminal) is chosen. Report totals are printed at the end of each report.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3-2  
SECTION 3: SECURITY MANAGEMENTS REPORTS  
NOTE  
1. Some reports are over-wide (132 characters instead of the standard 80 characters), and  
havebeenformattedtouseasmallerprintsizenotavailablewithsometerminals(HPprinters  
can handle the smaller print). These reports can be displayed but will 'wrap'; that is, some  
lines continue to the next display line . In such a case, use the display option to check report  
details, then use one of the print options to create a hard copy of the report.  
2. For color PCs with Reflections 4 software, or an HP700/44, the display automatically  
changes to the 132-column mode for any reports with lines exceeding 80 characters.  
POINT HISTORY REPORT  
The point history report, [phstrprt], lists transaction activity at a specific point. The report lists the  
key number and name (if any) associated with a transaction, date and time, and description.  
Tofacilitateprocessing,onlythelast20transactionsareused. Ifmorethanthelast20transactions  
are required, use the transaction history report. A sample [phstrprt] screen follows:  
Point History — Sample Report  
06/27/96  
14:36  
Packlett Industries  
Point History  
PAGE  
1
KeyhldID Keyholder Name  
________ _______________  
Date  
_____  
Time  
____  
Access Description  
_________________  
166603 HALSTON RICHARD  
166603 HALSTON RICHARD  
166755 GREENE LORRAINE  
166755 GREENE LORRAINE  
161221 ROBINS JAMES  
161221 ROBINS JAMES  
163878 COUSINS TERRY  
163878 COUSINS TERRY  
165446 AVERY JOE  
06/24/96 16:50:47 MANUAL LOCK  
06/24/96 16:50:46 MANUAL OPEN  
06/24/96 16:50:45 MANUAL LOCK  
06/24/96 16:50:44 MANUAL OPEN  
06/24/96 16:50:43 MANUAL LOCK  
06/24/96 16:50:42 MANUAL OPEN  
06/24/96 15:09:23 MANUAL LOCK  
06/24/96 15:09:21 MANUAL OPEN  
06/21/96 14:19:22 UNABLE TO UNLOCK DOOR  
06/21/96 13:55:47 UNABLE TO LOCK DOOR  
165446 AVERY JOE  
KEYHOLDER HISTORY REPORT  
Thekeyholderhistoryreport,[chstrprt],listsactivitiesforaspecifickeyholder. Also,thereportcan  
be used for tracking actions taken by a system operator. The report contains point or sensor data  
showingwhereactivityoccurred,dateandtime,anddescription. Tofacilitateprocessing,onlythe  
last 20 transactions are used. If more than the last 20 transactions are required, use the  
transaction history report. A sample [chstrprt] screen follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 3: SECURITY MANAGEMENT REPORTS  
3-3  
Keyholder History — Sample Report  
06/27/96  
14:36  
Packlett Industries  
Point History  
PAGE  
1
Point Point Description  
_____ ____________________  
Date  
________  
Time  
________  
Access Type  
__________________  
Keyholder  
2771 Dale, Deborah  
0225 RDI-8082-SEN2  
0221 RDI-8082-SEN1  
0215 RDI-8081-SEN1-READER  
0220 T&A READER 3 N/A  
0210 T&A READER 2 OUT  
0200 T&A READER 1 IN  
06/27/96  
06/27/96  
06/27/96  
06/26/96  
06/26/96  
06/26/96  
09:32:52  
07:34:24  
07:34:22  
15:40:42  
15:40:40  
15:40:34  
ACCESS GRANTED  
ACCESS GRANTED  
ACCESS GRANTED  
MANUAL OPEN  
MANUAL OPEN  
MANUAL OPEN  
0120 ELEVATOR FREIGHT CAR  
06/26/96  
15:40:31  
MANUAL LOCK  
TRANSACTION HISTORY REPORT  
The transaction history report, [excprprt], lists all transactions according to selected criteria. The  
transaction report function is used to create a who, what, where, and when report of all  
transactions.Thisfunctionincludesinformation abouttheIDanddescriptionofthepointorsensor  
where the transaction occurred, the zone number of the point or sensor, the date and time of the  
transaction, the type of access (for an access transaction) and the ID and name of the keyholder  
involvedwiththetransaction,ifany.Tworeporttypesareavailable:shortandextended. Theshort  
report accesses all standard information; the extended report does the same but includes user-  
defined field information. A sample [excprprt] screen follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3-4  
SECTION 3: SECURITY MANAGEMENTS REPORTS  
Transaction History — Sample Report  
11/15/96  
10:34  
SHARPSMITH LABS, INC.  
Access Control Transaction Report  
Page 1  
Point Point Description  
_____ _______________________ ____ ____  
Zone Date  
Time  
____  
Access Type  
Keyholder Keyholder Name  
Key No  
_______________________ _________ ________________ ______  
1 HOST  
1 HOST  
1 HOST  
1 HOST  
1 HOST  
1 HOST  
801 10/28/96 11:12:00 FORGIVE PASSBACK  
0 10/28/96 11:23:00 REPACK OK  
801 10/28/96 13:37:00 FORGIVE PASSBACK  
001 10/28/96 14:12:00 FORGIVE PASSBACK  
0 10/28/96 14:17:00 REPACK OK  
661094 Stanling, Bob  
34421  
662886 Jonesman, Linda 32211  
656633 Buchmann, G.T.  
641918 Saunder, Rick  
34588  
34876  
0 10/28/96 14:49:00 FORGIVE PASSBACK  
ACCESS CONTROL ARCHIVE REPORT  
The access control archive report, [acrtrprt], is identical to the transaction history report (previous  
report) except that it reads data from an archive tape rather than from the system database.  
ALARM SERVICING REPORT  
The alarm servicing report, [almarprt], details actions taken by operators in response to alarms.  
A sample [almarprt] screen follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 3: SECURITY MANAGEMENT REPORTS  
3-5  
Alarm Servicing — Sample Report  
06/27/96  
15:01  
PacAtlantic Racing  
Alarm Master List  
PAGE 1  
Alarm No Alrmtime Alrmdate Point Zone Resp Time Resp Date Clear Time Clear Date Serviced By  
________ ________ ________ _____ ____ _________ _________ __________ __________ ___________  
Point Descrip = CHEMICALS GPS 3  
2851 09:18:00 06/26/96  
20  
3 14:19:05 06/26/96 11:10:10  
Alarm Instructions:  
06/26/96  
Maintenance  
Operator Response:  
CALLED FIRE DEPT.  
CLEARED BUILDING  
OPENED VENTS  
PUT ON MASK  
CALL FIRE DEPARTMENT IMMEDIATELY  
EVACUATE ALL PEOPLE FROM BUILDING  
OPEN EMERGENCY VENTS  
LEAVE BUILDING  
LEFT BUILDING  
REENTERED WHEN ALL CLEAR  
PASSBACK ZONE REPORT  
Thepassbackzonereport,[whowhere],listskeyholderscurrentlypresentinpassbackzones.The  
summaryselectionprovidestotalsbyzone, whilethedetailedreportlistsspecifickeyholders. The  
source for the information is the keyholder file. A sample [whowhere] screen follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3-6  
SECTION 3: SECURITY MANAGEMENTS REPORTS  
Passback Zone — Sample Report  
04/05/96  
14:43  
Easthaven Manufacturing  
Passback Zone Report  
Page 1  
Keyholder  
_________  
Key No Keyholder Name  
_____ __________________________ ______ _____  
Tenant Pzone  
Vzone  
_____  
1055699  
1061128  
1086201  
1099004  
1100015  
1116345  
83383 MAITLING, JACK  
84128 LYONS, CINDY  
83361 DENEUVE, DENISE  
86660 SMITH, PAULA  
87083 MACKLING, JACKIE  
88883 FLYNN, SEAN  
0
0
0
0
0
0
-1  
-1  
0
1
-1  
-1  
-1  
-1  
-1  
2
-1  
-1  
DOWNLOAD STATUS REPORT  
The download status report, [downrprt], is used to create an audit-trail of system information  
changeattempts, thedevicesaffected, whoattemptedthechanges, andwhenandifthechanges  
were successful. A sample screen follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 3: SECURITY MANAGEMENT REPORTS  
3-7  
Download Status — Sample Report  
06/27/96  
15:03  
Nevadia Industries  
Download Status Report  
PAGE 1  
Serial # Key Value File Descrip Typ Date  
_________ _________ ____ _______ ___ ____  
Time Maint By Status  
____ ________ ______  
Point Point Descrip  
_____ _____________  
21729  
21730  
21731  
21723  
21724  
21725  
21726  
76  
76  
76  
2 Points Chg 06/27/96 08:34 Paul  
Received & Processed  
Received & Processed  
Received & Processed  
Received & Processed  
Received & Processed  
Received & Processed  
Received & Processed  
0 HOST  
2 Points Chg 06/27/96 08:34 Paul  
2 Points Chg 06/27/96 08:34 Paul  
8 Events Del 06/27/96 08:31 Paul  
8 Events Del 06/27/96 08:31 Paul  
8 Events Del 06/27/96 08:31 Paul  
8 Events Del 06/27/96 08:31 Paul  
60 1ST CNTRLLER  
61 CNTRL P28081  
0 HOST  
52 BAIL C1 CNTRL  
60 1ST CNTRLLER  
61 CNTRL P28081  
21463  
21463  
21463  
21463  
Possible system messages for this report are:  
Unprocessed — Information changed in the database, but has not yet been sent to the  
communications program module.  
Before Transmit— Information has been sent to the communications program module, but  
has not yet been sent to target device.  
TransmittedDatahasbeensentfromthehosttothetargetdevice,butacknowledgmenthas  
not yet been received from the target device.  
Received and Processed— Information successfully transmitted by the host and success-  
fully received by the target device (download completed).  
ERR Transmitting Data— Error on host side of transmission. Normally, this means that the  
host communications program module was unable to complete the requested download.  
ERR Receiving DataInformationsuccessfullytransmittedbythehost, butthetargetdevice  
was unable to receive.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3-8  
SECTION 3: SECURITY MANAGEMENTS REPORTS  
KEYHOLDER ZONE REPORT  
The report lists the most recent zone information for all keyholders that meet the search criteria;  
however, information is not necessarily current. A sample [kyznrprt] screen follows:  
Keyholder Zone — Sample Report  
05/12/96  
14:41  
Vogler Vineyards  
Keyholder Zone Report  
Page  
Time  
1
Keyholder Keyholder Name  
Tenant Point Point Description Date  
Zone  
_________ ___________________ ______ _____ _________________ _______ _______ ____  
10556 MAITLING JAMES  
10564 LYONS SHELLEY  
10569 MCDUFF GORDON  
10622 DENEUVE DENISE  
10643 SMITH PAULA  
0
0
0
0
0
0
3120 808SX RDR 2  
3120 808SX RDR 2  
3120 808SX RDR 2  
3120 808SX RDR 2  
3120 808SX RDR 2  
3120 808SX RDR 2  
04/02/96 16:48:12  
04/02/96 16:48:12  
04/02/96 16:48:12  
04/02/96 16:48:12  
04/02/96 16:48:12  
04/02/96 16:48:12  
0
0
0
0
0
0
10701 HERALD RICHARD  
EVENT / POINT REPORT  
Theevent/pointreport,[evptrprt],liststhenumberofeventsofaparticulartypethathaveoccurred  
at a point or within a range of points. The report is limited to the current contents of the archive  
history file. A sample [evptrprt] screen follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 3: SECURITY MANAGEMENT REPORTS  
3-9  
Event / Point — Sample Report  
03/17/96  
09:15  
Security Electronics  
Event/Point Report  
Page 1  
Point Point Description  
Tran.  
Tran. Description  
Occurrences  
______________________________________________________________  
___________  
1 HOST  
1 HOST  
2 DATA BASE POLLER  
2 DATA BASE POLLER  
4 808/422 POLLER  
4 808/422 POLLER  
231  
242  
24  
25  
222  
224  
PROJECT DEACTIVATED  
DISK ALMOST FULL  
POLLER STARTED  
POLLER STOPPED  
POLLER STOPPED  
POLLER STARTED  
2
5
1
1
2
12  
REALTIME PASSBACK ZONE REPORT  
Therealtimepassbackzonereport,[rpasrprt], isessentiallythesamereportasthepassbackzone  
report (described earlier in this section), with one important difference. The realtime report is  
created directly from shared memory instead of from the database. This feature substantially  
reduces the amount of time necessary to find out where keyholders are currently located. This  
canbeveryusefulformonitoringhazardousareas, orwhenitisimportanttorapidlydeterminethe  
number or identity of the keyholders in a particular zone.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3-10  
SECTION 3: SECURITY MANAGEMENTS REPORTS  
REALTIME PASSBACK DETAIL — SAMPLE REPORT  
03/14/96  
15:18  
McPowell-Angus Aviation  
Realtime Passback Detail Report  
Page 1  
Keyholder Key No Keyholder Name  
_________ ________ _________________________  
223141 188954 McDaniels, Jeff  
237473 140226 Wellington, Lambert  
233974 195226 Du Pont, Michael  
239965 200026 Senter, Carol  
Tenant Pzone Vzone  
______ _____ _____  
0
0
0
0
0
0
-1  
-1  
-1  
-1  
-1  
-1  
-1  
-1  
248366 180463 Pons, Antonia  
249037 143511 Segwick, G.J.  
-1 7100  
-1 -1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 4: MASTER FILE ENTRY  
4-1  
SECTION 4  
MASTER FILE ENTRY  
INTRODUCTION  
The master file entry procedures are used to create and maintain the database. All initial system  
data is entered following the methods detailed in this section. The data item menu screens are  
accessed via the master file entry menu [fmntmenu], displayed via the main menu. A sample  
[fmntmenu] screen follows.  
Somemasterfileentryproceduresareusedmorefrequentlythanothers. Forexample,keyholder  
data is usually added, changed, and deleted daily. On the other hand, additions or changes to  
system configuration information may occur only once every several months.  
Screen Access  
The procedures in this section are in the order as they appear on the [fmntmenu] screen (above).  
Following each menu entry are the associated subscreens, again in order (the section table of  
contents reflects the hierarchy). After the current screen has been saved (F6), most subscreens  
display by pressing F2 but some display automatically.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4-2  
SECTION 4: MASTER FILE ENTRY  
KEYHOLDERS  
Four data entry screens are used to add new keyholders to the system, and to change or delete  
existing keyholder information:  
1. Keyholder Entry - Page 1, [key_entr]. Used to enter primary keyholder information.  
2. Keyholder Entry - Page 2, [key1entr]. Used to enter optional keyholder information.  
3. KeyholderAccessEntry,[empgentr]. Usedtoenteraccesscodes,accessgroups(keyholder  
access assignments), etc.  
4. Project Assignment [epj_entr]. Used to enter projects, if applicable.  
The first screen, [key_entr], is accessed from Keyholders (first item in the [fmntmenu] menu); the  
other screens are displayed using F2 after the previous screen has been saved.  
IMPORTANT  
1. All keyholder data is linked to the keyholder ID rather than by key number or name. This  
allows the change or removal of key numbers from the system—a frequent requirement—  
without affecting entire keyholder records.  
2. Forfuturereportingpurposes,werecommendthatthekeyholderIDrecordberetainedwhen  
a keyholder leaves your facility. To block the keyholder ID from normal system processing,  
enter zero for the key number in [key_entr], and/or delete access assignments (Esc, d, r)  
in [empgentr].  
Keyholder Entry—Page 1 [key_entr]  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 4: MASTER FILE ENTRY  
4-3  
KeyholderID. RequiredintheAddmode(thesystemdeniesfurtherscreenaccessuntilthis  
field is entered). Enter a unique nine-digit maximum keyholder ID number (alphabetical  
letters are not supported).  
Last Name. Optional. Enter the keyholder’s last name.  
First Name. Optional. Enter the keyholder’s first name.  
NOTE  
Namesareindex-maintainedratherthansequential, allowingquickkeyholderrecordsearch  
by name or partial name.  
Key Type. Required. Enter the key type code number:  
*
=
=
=
=
=
No key (default)  
1
2
3
4
1030  
1040  
1050  
1060 and digital keys  
Note that if the key type is unknown, use type 3. This can be changed later if necessary.  
Facility code. Required for 1030 / 1040 key types. Enter the four-digit facility code printed  
on 1030 and 1040 keys; example: DO34. Default is **** — No facility code.  
Key Number. Conditional. Enter an eight-digit maximum key number. If you do not wish  
to select a key number at this point, the system default 0 is entered automatically.  
PIN # (personal identification number). Required if certain keypad identification equipment  
is used with your system (MCCI or VIP-2 poller); otherwise, disregard this field.  
Tenant Number. Optional. Enter a four-digit maximum tenant code (zoom available).  
Default is tenant 0.  
User-defined field titles. Using the control file maintenance screen (see Control File  
Maintenance [ctrlentr] in Section 6), these field titles can be changed to suit the individual  
user. Entriesarenumericandpointtoadescriptiontable. (Appliesalsotofieldsusr1through  
usr6, and Remarks, in [key1entr].)  
Company  
Dept  
Keyholder's company name  
Keyholder's department name  
Location of keyholder's department  
Keyholder's job category  
Location  
Jobcat  
Shift  
Keyholder's normal working hours  
Keyholder's status  
Emp Stat  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4-4  
SECTION 4: MASTER FILE ENTRY  
Issue Date. Optional. Enter the date that the access control card for the keyholder will  
become valid. Default is current system date. Note that a future date will not permit access  
until that date is reached.  
Issue Time. Optional. Enter the time that the access control card for the keyholder will  
become valid. Note that this only applies with host access. Default is current system time.  
Return Date. Optional—Recommended if keyholder is a visitor (see Visitor below). Enter  
the final date that the keyholder's card will be valid. Default is ******** — No expiration date.  
Return Time. Optional—Recommended if keyholder is a visitor (see Visitor below). Enter  
the time on the final date that the keyholder's card will be valid. Default is blank—No  
expiration time. Note that this only applies with host access.  
Visitor. Recommended. AY/Nfieldindicatingifthekeyholderisavisitor. IfY, itisadvisable  
to enter a return date and time (previous fields). Note that this is listed for reference only.  
Default is N.  
Trace. Optional. AY/Nfieldindicatingifthekeyholderistobemonitored(movementstraced  
while in the building). Trace monitors doors, readers, and records. Using Trace causes an  
extra key trace log message. This feature is sometimes desirable if the keyholder is a visitor  
(see previous field). Default is N.  
Privileged. Conditional. A Y / N field for ACUs supporting building modes and global anti-  
passback. Enter Y if this keyholder can change building modes at a remote reader and is  
immune from anti-passback. Default is N.  
Personal Zone. If passback is in effect, the zone where the keyholder is currently located  
and reported to the system by the reader last used by the keyholder. When setting up the  
database, use the default (-1, unknown).  
Vehicular Zone. The zone (car park) where the keyholder's vehicle is currently located;  
reported to the system by the parking lot reader last used by the keyholder. When setting  
up the database, use the default (-1, unknown).  
Keyholder Entry—Page 2 [key1entr]  
The data entered in this screen is for information only. Field entry is self-evident (field titles usr1  
through usr6, and Remarks, can be changed to suit the individual user (see Section 6: System  
Administration). Note that data is unique and not selected as table reference (see user-defined  
field titles, reference 9). Simply complete those fields required by your company, store (F6), then  
press F2 to display the access assignment screen [empgentr].  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 4: MASTER FILE ENTRY  
4-5  
Keyholder Access Entry [empgentr]  
1
2
Access Code. Optional. Enter an access code number that applies to this keyholder (the  
system automatically enters the access code description). Default is 0—No access code.  
NOTE  
There is no limit to the number of access codes that can be assigned, with the following two  
exceptions:  
1. Do not assign a keyholder more than one access code for a single NexSentry, 8xx  
series, or 422 ACU.  
2. The system will not allow you to combine two access codes with the same download  
device ID number in one access group.  
3. Do not assign two access groups with codes for the same download device ID.  
SFS (smart failsoft option). Optional. Smart failsoft access codes are used when  
communications between the host and ACU are disrupted for more than 15 seconds. Enter  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4-6  
SECTION 4: MASTER FILE ENTRY  
Y if the downloaded access code is to be sent to the ACU as a smart failsoft access code.  
Default is N. Note that this is used only in conjunction with the host access codes.  
NOTE  
The smart failsoft option is not supported with any keys used in conjunction with 708P and  
718PACUs, butafunctionisbuiltintotheunitswhichdoesprovidesomemeasureoffailsoft  
protection in the event of a communications failure with the host.  
The 708P and 718P ACUs can be programmed to accept up to 25 command keys, and  
accessisallowedwhenthesearepresented(eightdoorsmaximum). Usually,thecommand  
keys selected are those issued to managerial and engineering staff, and to persons  
responsible for building maintenance.  
This feature is limited to some extent in that time codes cannot be used in conjunction with  
this special programming, and event entries (door opening records, in this case) are not  
logged.  
Access Group. Optional. Enter an access group number (no limit) that applies to this  
keyholder (the system automatically enters the access group description). Default is 0—No  
access group.  
Note  
There is no limit to the number of access codes that can be assigned, with the following two  
exceptions:  
1. Do not assign a keyholder more than one access code for a single NexSentry, 8xx  
series, or 422 series ACU.  
2. The system will not allow you to combine two access codes with the same download  
device ID number in one access group.  
3. Do not assign two access groups with codes for the same download devices.  
Access Override. Optional (zoom available). Enter the access override code that applies  
"
to this keyholder. Default is 0—No access override code.  
Project Assignment [epj_entr]  
If the keyholder has been assigned to a project, enter the project number using the [epj_entr]  
screen (multiple projects can be assigned). Display this screen by pressing F2 after the access  
assignment screen (previous screen) has been saved (F6). Note that the project function will not  
work properly unless the host provides access control.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 4: MASTER FILE ENTRY  
4-7  
A sample [epj_entr] screen follows. Enter the project number (zoom available) then press Enter;  
the project description displays automatically. If multiple projects are to be assigned, enter and  
store each one separately.  
COPY KEYHOLDERS  
Copy Keyholder Information  
Used when creating new keyholders who share data with existing keyholders, the [key_copy]  
screen is an important timesaving feature. A sample screen follows:  
1
2
From. Enter an existing keyholder ID (zoom available). The system automatically supplies  
the key number and the keyholder names.  
To. Enter the new keyholder ID, new key number and new keyholder name.  
System responds with Okay to continue? When complete. Enter Y and a new keyholder record  
for the To keyholder is automatically created, with identical parameters as the From keyholder.  
Changes and corrections for the new ID are made as required using the various keyholder data  
entry screens.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4-8  
SECTION 4: MASTER FILE ENTRY  
ACCESS ASSIGNMENT  
Keyholder Access Assignment [egrpentr]  
The [egrpentr] and [egrpentr1] screens, accessed from Access Assignment (third item in the  
[fmntmenu] menu), are used as a fast way to make access assignments without using the  
keyholder data entry screens. Data entry is the same as for the keyholder access entry screen  
[empgentr]. The keyholder access allows only assignment permissions without access to  
keyholder screen. A sample screen showing [egrpentr] and [egrpentr1] follows:  
COPY KEYHOLDER ACCESS [ergcopy]  
The copy keyholder access screen, [egrpcopy], is used in the same way as the copy keyholder  
information screen for copying keyholders with similar access assignments. This is especially  
useful where multiple codes/groups are assigned on keys.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 4: MASTER FILE ENTRY  
4-9  
ACCESS DEFINITION  
The access definition selection in the master file entry menu displays the access definition menu:  
Access Code Entry, Access Code Definition, Elevator Definition  
Access Group Entry, Access Group Definition  
Access Override Entry  
Fail Soft Entry  
Project Definition  
ACCESS CODE ENTRY [acdsentr]  
Access codes are created using the access code entry [acdsentr] and the access code definition  
[acodentr] screens. A third screen, [eleventr], is used for elevator codes.  
Three access code types are identified—Centralized (Host); Distributed; Smart Failsoft:  
Centralized(Host)Usedwhenthehostcomputermakesaccessdecisions. Anexampleiswith  
global anti-passback, where in/out readers may be connected to different ACUs.  
Distributed Access Codes — Distributed access codes are created for each ACU and are  
downloaded from the host. When a card is presented to a reader, the ACU makes the access  
decision. In some circumstances, the host computer may override an access request denied by  
an ACU.  
Smart Failsoft — These codes work only if the ACU is in smart failsoft mode. This occurs when  
communication between the host and the ACU is interrupted for more than 15 seconds. During  
normal operation (ACU communicating with the host), access requests from keyholders with  
smart failsoft status are passed to the host for decision.  
NOTE  
Smart failsoft is not supported with 1050 keys used in conjunction with 708P and 718P ACUs, but  
afunctionisbuiltintotheunitswhichdoesprovidesomemeasureoffailsoftprotectionintheevent  
of a communications failure with the host. The ACUs can be programmed to accept up to 25  
specificcommandkeys, andaccessisallowedwhenthesearepresented(accessmaybeforone  
to eight doors). The feature is limited to some extent in that time codes cannot be used in  
conjunction with this special programming, and event entries (door opening records, in this case)  
are not logged.  
A sample [acdsentr] screen follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4-10  
SECTION 4: MASTER FILE ENTRY  
1
2
"
Access Code ID. Required. Enter a four-digit maximum access code number.  
Tenant. Required (zoom available). Enter a four-digit maximum tenant code number.  
Default is tenant 0.  
DownloadDeviceID. Optional(zoomavailable). Thisfieldmustbeusediftheaccesscode  
being created is to be downloaded to an ACU—enter the ACU ID number. Enter 0 (default)  
if access decisions for this code are to be made by the host.  
Code Description. Required. Enter a 30-character maximum description of the access  
"
code, e.g., REGULAR DAY SHIFT, WEEKEND RECEIVING.  
When screen entry is completed press F6 to store the data; the access code definition screen,  
[acodentr], displays automatically.  
ACCESS CODE DEFINITION [acodentr]  
ThisscreenisusedtoenterthereaderIDandtimecodes(fourmaximumperreader)thatwillapply  
tothisaccesscode.EachreaderIDenteredmustbeadded(F5)andstored(F6)individually.When  
youfinishdataentryforthisscreen, pressF6againtostorethecompletedaccesscodedefinition.  
A sample screen follows:  
2
1
If this access code is to be  
assigned to an elevator  
reader, press F2 after en-  
tering the Reader ID and  
Time Code fields. See El-  
evatorAccessCodes—fol-  
lowing subsection.  
Note that this action may only be done for readers defined as elevator reader types in the reader  
definition screen.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 4: MASTER FILE ENTRY  
4-11  
Reader ID. Required. Enter the reader number to be linked to this access code (the reader  
description is automatically displayed). The reader numbers can be entered in any order.  
Time Code. Optional. Enter up to four time codes, in any order, that apply to this access  
code(thetimecodeparametersaredisplayedautomatically). Defaultis0whichisnoaccess.  
ELEVATOR DEFINITION [eleventr]  
The elevator definition screen must be completed if the reader type is an elevator reader (reader  
type 5). Perform the following steps:  
1. When the Reader ID and Time Code fields have been entered in [acodentr], press F2 to  
display the elevator definition screen [eleventr]—example below.  
2. Enter the output contact IDs (usually wired to the elevator cab floor buttons) to be closed  
(activated) when access is granted via this reader. Store each item (F6) after entry. Use F5  
to move to the next output contact ID line.  
[eleventr] Elevator Definition  
Reader/Point Id  
8004 = Contact 4  
8006 = Contact 6  
8008 = Contact 8  
ACCESS GROUP ENTRY [agdsentr], [agrpentr]  
Tofacilitateassigningsimilaraccessprivilegestolargenumbersofkeyholders,thesystemallows  
twoormoreaccesscodestobecombinedintoanaccessgroup. Twoscreensareused:[agdsentr]  
and [agrpentr]. Sample screens follow.  
1
2
Access Group ID. Required. Enter a four-digit maximum access group number.  
Tenant. Required (zoom available). Enter a four-digit maximum tenant number. Default is  
tenant 0.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4-12  
SECTION 4: MASTER FILE ENTRY  
Group Description. Required. Enter a 30-character maximum description of the access  
group.  
When screen entry is completed press F6 to store the data, at which point the Access Group  
Definition screen displays automatically. This screen permits you to enter the access codes that  
will apply to this access group. Each access code entered must be added (F5) and stored (F6)  
individually. When you finish data entry for this screen, press F6 again to store the now fully  
completed access group.  
NOTE  
Host-controlled and downloaded access codes may be combined in the same access group, but  
see Warning at the end of this subsection.  
ACCESS GROUP DEFINITION [agrpentr]  
1
2
Access Code. Required (zoom available). Enter an access code, in any order, to be linked  
to this access group. Each code must be added (F5) and stored (F6) individually.  
Access Code Description. Automatically inserted by the system.  
SFSonly?(smartfailsoftoption). Optional. Smartfailsoftaccesscodesareusedonlywhen  
communications between the host and ACU are disrupted for more than 15 seconds. Enter  
Y if the downloaded access code is to be sent to the ACU as a smart failsoft access code.  
Note that this is used only in conjunction with host access codes. The default is N.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 4: MASTER FILE ENTRY  
4-13  
WARNING  
1. Access codes that include the same reader(s) should not be included in the same group  
unless one code is a downloaded code, and it has been set up with the SFS (smart failsoft)  
flagsettoY. Mixingcodesthatincludecommonreaderswithdifferenttimecodesmaycause  
unpredictable results.  
2. Do not combine two access codes with the same download device ID in one access group.  
3. Keyholders may have only one downloaded access code per ACU.  
ACCESS OVERRIDE ENTRY  
Accessoverridecodesaretypicallyusedforvisitorstorestrictorallowaccesstospecificlocations  
for specific time periods. This is a host function that must be used only if normal access is through  
host access codes:  
1
2
"
#
Override Code. Required. Enter an override code number in the range 1—9999.  
Description. Optional. Enter a 30-character maximum description of the override.  
Start Date. Required. Enter the override start date.  
End Date. Required. Enter the override end date.  
"
#
Permission. Optional. Permissionstatus. EnterAtoallowaccess;enterDtodenyaccess.  
Default is A.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4-14  
SECTION 4: MASTER FILE ENTRY  
FAILSOFT ENTRY  
708P ACUs can be programmed to recognize up to 25 keyholders (based on key numbers) for  
use when communication with the host computer is temporarily unavailable. Known as failsoft,  
the feature becomes active (access is granted) for these keyholders after 15 seconds following  
the occurrence of the communications interruption (response is not available for specific time  
periods, however). A sample screen follows:  
1
2
DeviceID. Required(zoomavailable). EnterthedeviceIDforwhichfailsoftistobeassigned  
(the readers associated with the 708P automatically display).  
Keyholder ID. Required (zoom available). Enter the applicable keyholder ID (keyholder  
name automatically displays).  
Allowed. Optional. Enter Y or N as appropriate for the individual keyholder. Default is N.  
PROJECT ENTRY [prj_entr], [prd_entr]  
This is designed primarily for high security facilities. Project is used to grant temporary access to  
selected keyholders at project-controlled doors when a project is activated, while access for all  
other keyholders who normally enter through these doors is temporarily denied. The projects are  
continually monitored by the system and are updated as project status changes from activated to  
deactivated, and vice versa. This is a host function that must be used only if normal access is  
through host access codes. A sample [prj_entr] screen follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 4: MASTER FILE ENTRY  
4-15  
1
2
"
Project ID. Required. Enter a four-character maximum project ID code.  
Description. Optional. Enter a 40-character maximum description of the project.  
Starting Date and Time. Enter the project's starting date and time in the formats MM/DD/  
YY and HH:MM.  
Ending Date and Time. Enter the project's ending date and time in the formats MM/DD/YY  
"
and HH:MM.  
Store (F6) data when completed; the project definition [prd_entr] screen automatically displays.  
Enter the applicable reader IDs for this project (zoom available). Store (F6) each ID separately  
when entered, then immediately press F5 to move the cursor to the next data entry point on the  
screen. Repeat for as many readers as are to be included in the project. A sample [prd_entr]  
screen follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4-16  
SECTION 4: MASTER FILE ENTRY  
TIME CODES [tmcdentr]  
Time codes are normally used to define when points and readers are active. The codes are also  
used to automatically lock / unlock doors, activate / deactivate output relays, and to initiate  
recurring tasks. When combined with readers into access codes, the time codes define when  
access is valid for particular readers. A sample [tmcdentr] screen follows:  
2
1
4
5
TimeCode#. Required. Enteratwo-digit(maximum) timecode. Ifthetimecodeisomitted,  
the system defaults to time code 0 (zero). The default time code description is NEVER  
ACTIVE, with start/end times of 00:00 and N (no) for all the day entries.  
= (description). Optional. Enter a 30-character maximum description of the time code.  
Start. Required. Enter a start time using 24-hour notation with an intervening colon.  
Examples: 08:45 (8:45 a.m.), 19:15 (7:15 p.m.). If the start time is entered incorrectly, the  
systemeitherpreventsfurtherdataentryordisplaysanerrormessage(pressEntertoreturn  
to data entry). In both cases, reenter the time code using the correct format.  
End. Required. Enter an end time All details for the Start field pertain.  
4
Mon through Hol. Optional. The field represents the days of the week and holidays. Enter  
5
Y or N as applicable for the new time code. Default is N.  
HOLIDAYS [hol_entr]  
Annual holidays must be entered into the system. The information is required so that the host  
computer can determine whether access codes, auto-unlock functions, etc., need to be handled  
differently for the specified holidays.  
1
2
HolidayDate. Required. EnteradateintheformatMM/DD/YY(thesystemsuppliesleading  
zeroes where applicable).  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 4: MASTER FILE ENTRY  
4-17  
Holiday Name. Optional. Enter a 20-character maximum holiday name.  
TENANTS [tententr]  
Two or more companies or groups can operate a single SE 6000 system, and they are referred  
to as tenants. (If required, the system can also be configured to allow individual tenants to share  
components.) Tenants may be unrelated occupants of the same or different facilities who use  
a single SE 6000 to view and manipulate only that data which applies to them. One of the tenants  
in a multiple tenant usage is the system owner who controls and has access to the entire system  
at all times. The systems owner may also be the system administrator. The default tenant code  
is 0 (zero), usually the system owner, who has access to the entire system at all times. A sample  
[tententr] screen follows.  
1
2
Tenant Number. Optional. Enter a 4-digit maximum tenant number. Default is tenant 0.  
Tenant Name. Optional. Enter a 30-character maximum tenant name.  
INSTRUCTIONS [instentr]  
Specific instructions are entered into the system to direct operators as to the action to be taken  
when a specific point is activated (usually in response to an activated alarm). The instructions  
display automatically on the alarm response screen, or may be selectively viewed from the  
realtime control maps. A sample [instentr] screen follows:  
1
2
Download from Www.Somanuals.com. All Manuals Search And Download.  
4-18  
SECTION 4: MASTER FILE ENTRY  
Point ID. Required (zoom available). Enter the point ID to which this instruction applies.  
Tenant. The tenant number entered when this point was created is automatically entered  
into this field.  
Instructions. Eight 40-character lines are provided for detailed instruction entry. Refer to  
the sample screen for an example.  
HARDWARE CONFIGURATION [confmenu]  
Thehardwareconfigurationiteminthemasterfileentrymenudisplaysthehardwareconfiguration  
menu [confmenu]:  
Zones  
Device Report Definition  
SE 422 PIN Definition  
SE 422 Hardware Definition  
Dialer Entry  
Areas  
Pollers  
Devices  
Readers  
Points  
Site Entry Definition  
ABA Configuration Entry  
DKR Configuration Entry  
Auto Opens/Activates  
ZONES [ZONEENTR]  
Zones comprise user-selected system components grouped to facilitate system operation and  
administration, and are required if the anti-passback feature is to be used. Zones may be defined  
for vehicles as well as keyholders. A sample [zoneentr] screen follows:  
1
2
4
5
Zone Number. Required. Enter an four-digit maximum zone number. There is no default  
for this field.  
Zone Name. Optional. Enter a 30-character maximum tenant name. If this field is omitted,  
the system fills the field with asterisks.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 4: MASTER FILE ENTRY  
4-19  
Passback Area. Optional. This field is used to indicate if passback is in effect for this zone.  
Enter P if personnel passback is used, V if vehicle passback is used, N if passback is not  
used. The default is N.  
PassbackType. Requiredifpassback(field#3)iseitherP(personnel)orV(vehicle)forthis  
zone. Enter H for hard passback; S for soft passback. Hard passback prevents access if  
already in the zone; soft passback allows access and generates a passback violation  
message. There is no default for this field.  
4
Passback Level. Required if passback (field #3) is either P (personnel) or V (vehicle) for  
this zone. Enter G for global (host-controlled); L for local (ACU-controlled). There is no  
default for this field.  
5
AREAS [areaentr], [areaentr1]  
For reporting purposes only, passback zones may be grouped into areas. Reporting (keyholder  
zonereport)maybebyzoneorarea, withtheareareportlistingthezonescontainedineacharea.  
Assign a number and optional description for the area using [areaentr]; enter the applicable zone  
numbers in [areaentr1]. Note that for local passback zones, ensure that both in and out readers  
are controlled by the same ACU. A sample screen showing [areaentr] and [areaentr1] follows:  
POLLERS [pol_entr]  
IMPORTANT  
The pollers and poller parameter files discussed below are normally installed and tested at the  
factory or by your dealer. Please consult your dealer or WSE customer support before adding,  
changing, or deleting poller information.  
Pollers are device-specific application programs that communicate with the ACUs and the input  
/ output controllers, and in addition to providing these communication links they perform many  
other tasks. For example, the pollers make access decisions, report devices that are not  
responding, and provide the means to reload devices with system and key data as necessary.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4-20  
SECTION 4: MASTER FILE ENTRY  
The SE 6000 can run different pollers or multiple copies of the same poller concurrently but, with  
the exception of the NexSentry, 8xx-series, and 422 ACUs, the pollers can be run with one device  
type only. Poller parameter files are read when the poller programs start. The parameters define  
the poller type, the physical port assignment, and other required control information.  
Twenty-two poller types are currently in operation (codes 5, 20, 21, and 23 are not used):  
1
2
708P  
Opto  
— 708P ACU  
— Optomux 22 alarm monitor  
— Stellar RDU 2000 monitor  
— Interactive extended processing poller  
— 8xx series / SE 422 ACUs  
— MCCI keypad  
3
Etp - Rdu  
Timer Poller  
808  
4
6
7
MCCI  
Parking  
8
— Parking controller—Internal: No physical connection  
9
Remote Dialer Schd — Remote dial-up interface controller  
Elevator  
10  
11  
12  
13  
14  
15  
16  
17  
18  
19  
— Elevator control poller—Internal: No physical connection  
Database  
Burle  
Vicon  
— Database poller—Internal: No physical connection  
— Burle closed-circuit television (CCTV)  
— Vicon camera switcher  
Hand Geometry  
Amdi  
— Supports up to 32 hand geometry readers  
— Amdi 102 / 103 magnetic stripe readers (supports up to 16)  
— 6000/6500 Receiver  
Radionics  
Nesting  
— Nested parking timer  
— Not used for Polaroid ID 4000  
Polaroid Server  
WSE XV Poller  
— Used for capturing images on an X-Terminal  
22  
24  
25  
26  
WSE VIP2 Poller  
— Used with numeric keypad for entry of PINs  
American Dynamcis — Closed circuit television (CCTV)  
Pacom CCTV  
Intercom System  
— Closed circuit television (CCTV)  
— Used to automatically switch cameras  
A sample [pol_entr] screen follows:  
1
2
5
4
6
7
8
Poller ID. Required. Enter a four-digit maximum poller number. There is no default for this  
field.  
Poller Description. Optional. Enter a 20-character maximum description of the poller. If  
omitted, the poller ID number is inserted by default.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 4: MASTER FILE ENTRY  
4-21  
Tenant. Optional (zoom available). Enter a four-digit maximum tenant code number.  
Default is 0.  
Computer ID. Required. Enter the ID of the computer on which this poller is to run. Default  
4
5
6
is 0—host computer.  
Poller Number. Required. Enter the number of the corresponding poller-parameter file.  
Refer to the configuration sheet detailing the factory-assigned poller numbers.  
PollerType. Required. Usethezoomfeature(F7)toaccessthePollerTypeDisplayscreen.  
Once there, arrow down to the required poller type, press F1, and the poller type number is  
entered automatically into the Poller Entry screen.  
Disable. Not currently implemented.  
7
8
Zone Number. Required. Enter a four-digit maximum zone number. Default is 0.  
DEVICES  
The most common devices used with SE 6000 system are the WSE NexSentry, 708P, 8xx-  
series and 422 ACUs. Other devices supported include:  
Opto 22 input / output controllers  
CCTV switchers  
Radionics alarm panels  
One or more additional SE 6000 systems used as local controllers  
With the exception of the NexSentry, 8xx-series and 422 ACUs, each individual device type  
requires its own poller and associated hardware port assignment.  
SIMPLE / INTELLIGENT DEVICE TYPES  
The terms simple and intelligent are often used to describe certain device types used in  
conjunction with the SE 6000.  
Simple Devices. With simple devices, the SE 6000 makes the access decisions and also  
instructs the device to take various actions. The 708P ACU is a simple device, for example.  
Intelligent Devices. Depending on system configuration requirements, intelligent devices can  
be programmed to make their own decisions concerning access and actions to be taken. The  
devicestypicallyhavetheirownapplicationsoftwareand/orfirmware,andtheymaintaintheirown  
internaldatafileswhichareusedfordecisionmaking. TheNexSentry, 8xx-series, and422ACUs  
are intelligent devices, for example. As required, the intelligent devices can be set up to be  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4-22  
SECTION 4: MASTER FILE ENTRY  
controlled exclusively by the SE 6000 (deferred mode), to operate entirely independently of the  
SE 6000 (local mode), or a combination of both.  
DEVICE ENTRY SCREENS  
The following screens are used when setting up device types:  
8xx-series ACUs — [dev_entr], [d808entr]  
NexSentry — [dev_entr], [nexsentr], [d818entr]  
818-series ACUs — [dev_entr], [d808entr], [d818entr]  
422 ACUs — [dev_entr], [d422entr]  
All other devices — [dev_entr]  
DEVICE ENTRY [dev_entr] — ALL DEVICE TYPES  
Complete the [dev_entr] screen when setting up any device. A sample screen follows:  
2
1
5
4
6
7
8
10  
9
Device ID. Required. Enter a unique, four-digit maximum device ID number in the range  
1—9999.  
Device Description. Optional. Enter a 20-character maximum description of the device.  
If omitted, the system enters the device ID number in this field.  
Tenant. Optional (zoom available). Enter the tenant number applicable for this device.  
Default is 0.  
Computer ID. Required. Enter the ID of the computer that connects to this poller. Default  
4
is 0 (host).  
Poller Number. Required. Enter the number of the poller that connects to this device. This  
5
information is available from your system installer and should be obtained before beginning  
screen entry.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 4: MASTER FILE ENTRY  
4-23  
Address. Required. Enter the address of the device. Since each poller can poll a number  
6
7
of devices, the Address field is necessary to tell the host which device to poll. The address  
ranges are included in the Device Type table (see following field). Note that the system will  
not allow duplicate device addresses on the same poller.  
Device Type. Required (zoom available). Enter the device type number in the range 1  
through 23 (field 20 and 22 are not currently used):  
Type  
Description  
Address Range (see previous field)  
1 only  
1
2
3
4
5
6
7
8
9
10  
11  
12  
13  
14  
15  
16  
17  
18  
19  
21  
23  
Host  
Controller  
708P  
808S  
Opto  
Etp  
MCCI  
RDI  
RLC  
808SX/SN  
818SX/SN  
AMDI 102/103  
NexSentry  
Camera  
SE422  
Radionics  
Polaroid ID 4000  
818SC  
1
1
1
0
1
1
1
1
1
1
1
1
— *16  
— *16  
— *16  
8
8
15  
16  
16  
32  
8
16  
16  
1 only  
— *16  
1 only  
1
1
1
1
1
— *16  
— *16  
808SXT  
WSE VIP2  
Timer Device  
16  
16  
1 only  
*Note that these are limited to 8 if used with host access.  
Watch Dog Timer Count. Required for Opto 22 devices only. Indicates the action to be  
8
taken if communication is interrupted between the host computer and the device. Enter:  
0
1
2
No action (default)  
Open on time-out  
Close on time-out  
Disable. Required. A Y/N field indicating if the device is to be shunted at system start up  
9
(Y). This is recommended to disable devices until they are physically connected into the  
system. Default is N (device not shunted).  
ZoneNumber. Required(zoomavailable). Enterthezonenumberapplicableforthisdevice.  
10  
Default is 0.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4-24  
SECTION 4: MASTER FILE ENTRY  
SE 8XX-SERIES DEVICE CONFIGURATION ENTRY [d808entr]  
The [d808entr] screen must be completed for all 8xx-series ACUs (use F2 to display the screen  
after the previous screen has been stored). A sample screen follows:  
1
2
4
5
6
7
8
10  
9
12  
11  
14  
13  
Level,Name,Password. Required. Thesefirstthreefieldsareenteredtoidentifyuptoeight  
operators who will be permitted to set/change system parameters for a particular ACU from  
the ACU terminal port. User 1 must be established (defaults to operator 1); operators 2  
through7areoptional.Entertheoperator'ssecuritycode(AthroughF),nameandpassword.  
The security codes A through F control the degree to which the operator may add/change/  
delete the system parameters from the ACU terminal port. Code A has the most privileges,  
code F has the least. For detailed information concerning operator privilege levels, refer to  
the applicable ACU manual.  
NOTE  
TheLevel,NameandPasswordfieldsarespecifictoindividual804/808ACUsandapplyonly  
to operators logging in directly via the ACU's terminal port. The fields are not part of the SE  
6000 control parameters.  
Tamper. Optional. Enter the tamper report number if a report has been created (see  
applicable ACU manual). The report states the system actions that will be taken if the ACU  
enclosure housing is opened. Default is 0.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 4: MASTER FILE ENTRY  
4-25  
Power Fail. Optional. Enter the power fail report number if a report has been created (see  
applicable ACU manual). The report states the actions that will be taken by the ACU should  
a power failure occur. Default is 0.  
Override. Optional. Enter the operator override report number if a report has been created  
(see applicable ACU manual). The report states the actions that will be taken by the ACU if,  
for example, a manual unlock or a shunt occurs. Default is 0.  
4
Type. Optional. Enter the number for the key type used. Default is 0.  
5
NOTE  
The valid key types are as follows:  
0 — None  
1 — 1030  
2 — 1040  
3 — 1050  
4 — 1060  
5 — 1050 / 1060 / Digital Keys  
Aux. Type. Conditional. Auxiliary key type. A second key type, other than the one entered  
6
in the previous field, can be entered here if applicable. Default is 0.  
0 — None  
1 — 1030  
2 — 1040  
Note: the previous two fields are applicable only to devices that support multiple key types.  
Facility. Required for key types 1 and 2 (previous field). Enter the facility code assigned to  
7
8
the keys. Defaults to **** if omitted.  
Alt Facility. Conditional. Enter a second facility code to allow a different set of keys to be  
used with this ACU. Defaults to **** if omitted.  
Auto Forgive. Optional. Up to four time codes can be entered that execute the forgive  
9
command at the ACU. Default is 0 (feature disabled if all auto-forgive time codes are 0).  
808 Modem Definition. Not used.  
Number of Retry Times. Not used.  
XON/XOFF. Not used.  
10  
12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4-26  
SECTION 4: MASTER FILE ENTRY  
BuildingClosedTimeCodes. Optional. Providesuptofourtimeintervalsduringwhichthe  
13  
14  
building should be closed. Default is 0.  
Building Open Reminder. Optional. If the building should be closed (indicated by the time  
codes entered in the previous field), a reminder message is logged and repeated for the  
number of minutes specified (0 to 240). Default is 0.  
SE NEXSENTRY DEVICE CONFIGURATION ENTRY [nexsentr]  
Complete the [nexsentr] screen for the NexSentry ACU and then press F2 Next Form to display  
the [d818entr] screen. Enter all appropriate information and press F6 Store to complete the  
NexSentry device configuration. A sample [nexsentr] screen follows:  
1
7
8
10  
11  
Level,Name,Password. Required. Thesefirstthreefieldsareenteredtoidentifyuptoeight  
operators who will be permitted to set/change system parameters for a particular ACU from  
the ACU terminal port. User 1 must be established (defaults to operator 1); operators 2  
through7areoptional.Entertheoperator'ssecuritycode(AthroughF),nameandpassword.  
The security codes A through F control the degree to which the operator may add/change/  
delete the system parameters from the ACU terminal port. Code A has the most privileges,  
code F has the least. For detailed information concerning operator privilege levels, refer to  
the applicable ACU manual.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 4: MASTER FILE ENTRY  
4-27  
NOTE  
The Level, Name and Password fields are specific to the NexSentry and applies only to  
operatorsloggingindirectlyviatheACU'sterminalport.ThefieldsarenotpartoftheSE6000  
control parameters.  
Tamper. Optional. Enter the tamper report number if a report has been created (see  
applicable ACU manual). The report states the system actions that will be taken if the ACU  
enclosure housing is opened. Default is 0.  
Power Fail. Optional. Enter the power fail report number if a report has been created (see  
applicable ACU manual). The report states the actions that will be taken by the ACU should  
a power failure occur. Default is 0.  
Override. Optional. Enter the operator override report number if a report has been created  
(see applicable ACU manual). The report states the actions that will be taken by the ACU if,  
for example, a manual unlock or a shunt occurs. Default is 0.  
4
ABA Site Group. Optional. The ABA site code group ID number.  
5
Auto Forgive. Optional. Up to four time codes can be entered that execute the forgive  
6
command at the ACU. Default is 0 (feature disabled if all auto-forgive time codes are 0).  
808 Modem Definition. Not used.  
7
Number of Retry Times. Not used.  
XON/XOFF. Not used.  
8
9
BuildingClosedTimeCodes. Optional. Providesuptofourtimeintervalsduringwhichthe  
10  
building should be closed. Default is 0.  
Building Open Reminder. Optional. If the building should be closed (indicated by the time  
codesenteredinthepreviousfield),aremindermessageisloggedandrepeatedthenumber  
of minutes specified (0 to 240). Default is 0.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4-28  
SECTION 4: MASTER FILE ENTRY  
SE 818 DEVICE CONFIGURATION ENTRY [d818entr]  
Complete the [d818entr] screen for all 818-series and NexSentry ACUs (use F2 to display the  
screen after the previous screen, [d808entr] or [nexsentr], have been stored). A sample screen  
follows:  
#
$
%
&
1
2
"
PIN Seed. Optional. Enter the base seed number for generating PINs. The value entered  
has priority over the system default PIN seed value entered with the [pndfentr] screen (see  
SE 422 Pin Definition in this section). Default is 0.  
Duress PIN Digits. Optional. Enter the allowed number of digits for a PIN duress code.  
Default is 0.  
Print PINs. Optional. A Y / N field indicating if the PIN should be displayed once calculated.  
Default is Y.  
PIN Timeout. Optional. Enter the maximum number of seconds allowed between key  
"
presentation and PIN entry. Default is 10.  
Max PIN Retries. Optional. Enter the allowed number of PIN entry retries. Default is 4.  
#
$
VIP Only Digits. Optional for keypad-controlled doors only. Enter the allowed number of  
digits for the PIN (4—8). Default is 4.  
Duress Report. Optional. Enter an action report number (1—32) indicating the action the  
%
&
ACU is to take should a duress event occur. Default is 0.  
Duress Enable. Optional. A Y / N field indicating whether the duress feature is enabled.  
Default is Y.  
SE 422 DEVICE CONFIGURATION ENTRY [d422entr]  
Complete the [d422entr] screen for SE 422 ACUs (use F2 to display the screen after the previous  
screen has been stored). A sample screen follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 4: MASTER FILE ENTRY  
4-29  
2
"
#
$
%
&
ꢀꢁ  
'
11  
  
ꢀ#  
ꢀ&  
ꢀ!  
ꢀ$  
ꢀ'  
ꢀ"  
 ꢁ  
ꢀ%  
Level,Name,Password. Required. Thesefirstthreefieldsareenteredtoidentifyuptoeight  
operators who will be permitted to set / change system parameters for this particular ACU.  
User1mustbeestablished(defaultstooperator1);operators2through7areoptional.Enter  
the operator's security code (A through F), name and password.  
The security codes A through F control the degree to which the operator may add/change/  
delete the system parameters. Code A has the most privileges, code F has the least. For  
detailed information concerning operator privilege levels, refer to the applicable ACU  
manual.  
NOTE  
The Level, Name and Password fields are specific to individual SE 422s and apply only to  
operatorsloggingindirectlyviatheACU'sterminalport.ThefieldsarenotpartoftheSE6000  
control parameters.  
Duress. Optional. A number (1-32) which instructs the SE 422 which action report to use  
should a duress event occur. Default is 1.  
System. Optional. A number (1-32) which instructs the SE 422 which action report to use  
in response to system events in the SE 422. Default is 1.  
Op. Override. Optional. A number (1-32) which instructs the SE 422 which action report  
"
#
to use in response to operator overrides performed on the SE 422. Default is 1.  
Alarm Delay. Optional. The amount of time in seconds (10-240) that an alarm condition is  
allowed to exist before the alarm contact is closed. Default is 30.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4-30  
SECTION 4: MASTER FILE ENTRY  
PINTimeout. Optional. Themaximumamountoftime,inseconds,whichcanpassbetween  
$
%
the presentation of a key and the entry of a verification PIN. Default is 10.  
Max Inv. PINs. Optional. The maximum number of invalid PIN entry attempts to permit  
before cancelling the key presentation. Default is 4.  
VIPsDigits. Optional. ThenumberofdigitsinthePINnumberfordoorsusingkeypadsonly.  
&
The range is 4 to 8. Default is 4.  
Modem Definition. Not used when the SE 6000 is connected directly or in a dial-up  
'
configuration.  
Latched Contact. Optional. The number of the output contacts that are assigned as a  
ꢀꢁ  
latched contact (0—51). Default is 0.  
ABA Site Code Grp. Optional. The ABA site code group ID number.  
EMPI Alt1 Code. Optional. Alternate EMPI site code #1.  
  
PINseed. Optional. ThebaseseednumberusedwhengeneratingPINs. Thevalueentered  
here has priority over the default PIN seed value entered on the [pndfentr] screen (see  
Entering Default PIN Digits and Seed for an SE 422 in this section). Default is 0.  
ꢀ!  
PIN Digits. The number of digits in the PIN code for this SE 422. The value entered here  
ꢀ"  
has priority over the default PIN digits value entered on the [pndfentr] screen (see Entering  
Default PIN Digits and Seed for an SE 422 in this section). Default is 0.  
EMPI Alt2 Code. Optional. Alternate EMPI site code #2.  
ꢀ#  
ꢀ$  
# of Retry Times. Used to inform a remotely connected SE 422 the number of times to  
attempt to contact the host computer over telephone lines before considering a connection  
to be currently impossible to make.  
XON/XOFF. Terminal Port and Host Port: Used to inform the SE 422 whether XON/XOFF  
ꢀ%  
ꢀ&  
flow control will be used at either of these two ports. Used for remotely connected SE 422s  
only.  
Bldg Mode Indicators. Conditional. Enter the input point contact number or output relay  
number to initiate and display the status of the building mode.  
Monitor — Input point contact ID (0 — 75)  
Open, Limited, Closed — Output point relay ID (0 — 51)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 4: MASTER FILE ENTRY  
4-31  
Duress Enable. Indicates with a Y or an N whether the PIN duress feature of the SE 422  
ꢀ'  
is turned on or not.  
ShowPIN. IndicateswithaYoranNwhetherthePINnumbershouldbedisplayedonalocal  
 ꢁ  
terminal connected to the SE 422 after it has been calculated.  
Building Closed Times. Enter up to four time codes used for building closure.  
Building Open Reminder. Enter the number of seconds (0 — 240) that the building open  
message is to display.  
READERS  
Readers are usually assigned to ACUs, but they may be used as standalone devices or linked to  
other security monitoring devices. Twelve reader types (1 — 12) are currently defined:  
1. Access Control. Controls power to a door lock allowing or denying entry.  
2. Time and Attendance (optional feature). Monitors keyholders' entry/exit movements.  
3. Meal Monitoring (optional feature). Tracks number of meals taken by a keyholder.  
4. Guard Tour (optional feature). Monitors guard check-in activities during guard rounds.  
5. Elevator Control. Controls and limits keyholder access to floors.  
6. Activate (optional feature). Enables keys for system wide use.  
7. Deactivate (optional feature). Disables previously activated keys (see previous item).  
8. Auto Key Entry. Allows automatic entry of card numbers.  
9. Access with Keypad. Same as #1 except that a keypad is used in addition to the reader.  
10. Keypad. Keypad only.  
11. Access with Two-Man Rule. (optional feature). Same as #1 above except that two-man  
rule is in effect.  
12. MultiOccReader. Multipleoccupancyreader. Similarto #11exceptthatitrequiresthattwo  
keyholders enter and leave a zone together. Refer to the subsection that covers multiple  
occupancy readers in this section for more details.  
Data entry begins with the [rdr_entr] screen. (One additional screen each is used for readers  
assigned to SE NexSentry, 8xx series, and 422 ACUs. Details follow this subsection.)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4-32  
SECTION 4: MASTER FILE ENTRY  
READER ENTRY [rdr_entr]  
1
2
"
#
$
&
%
'
ꢀꢁ  
11  
  
ꢀ$  
ꢀ%  
ꢀ&  
ꢀ!  
ꢀ"  
ꢀ#  
ꢀ'  
Reader ID. Required (zoom available). Enter a maximum four-digit reader ID number.  
Reader Description. Optional. Enter a maximum 20-character description of the reader.  
Default is the reader ID number.  
Device ID. Required (zoom available). Enter the number of the device which controls this  
reader. The related information (computer ID, poller number, address) automatically  
displays when the ID is entered.  
Sensor. Required. Enter the sensor port number of the ACU to which this reader is  
"
connected.  
Enable Point ID. Conditional (zoom available). Indicates a point ID that must be activated  
#
before the current point can be activated. Enter the enable point ID number.  
NOTE  
The Enable Point is primarily used with closed circuit television monitors, but can be used  
elsewhere. For example, a guard might need to personally recognize you and press an OK  
button (activates enable point) before your card will work at an ACU (current point). The  
system enters the default value of 0 (zero) if this field does not apply.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 4: MASTER FILE ENTRY  
4-33  
Reader Type. Required. Enter the reader type number in the ranges 1 through 12 as  
$
%
&
described above.  
Assoc Reader ID (Associated Reader). Required if the reader is used in conjunction with  
a keypad. Enter the ID number of the Reader used with the keypad. Default is 0.  
Door Switch ID. Required. Enter the door switch point ID used in conjunction with this  
reader. (Ifpassbackprotectionisineffect,tworeadersmayshareasingledoorswitch.) The  
system enters the default value of 0 (zero) if this field does not apply.  
Trace. A Y/N field used to indicate if all events at this reader are to be specially reported  
'
(traced). Default is N.  
Disable. Required. AY/Nfieldindicatingifthedeviceistobeshuntedatsystemstartup(Y).  
ꢀꢁ  
This function varies with different types of ACUs. Default is N (device not shunted).  
REX Point ID. Required if the reader is used in conjunction with a request-to-exit (REX)  
device or switch. Enter the REX ID number. The system enters the default value of 0 (zero)  
if this field does not apply.  
T & A Dir. Time and attendance direction. If the time and attendance feature is used, enter  
  
N—None, I—Global In, or O—Global Out. The default is N.  
Unlock Time. Optional for NexSentry, 8xx-series, and SE 422 ACUs. Enter a time period  
inseconds(1-240)thatthedooristoremainunlockedwhenavalidkeyispresented. Default  
is 10 seconds.  
ꢀ!  
Read While Open. Optional for NexSentry, 8xx-series, and SE 422 ACUs. A Y/N field used  
ꢀ"  
ꢀ#  
to indicate if keys are to be read while the door is unlocked. The default is N.  
Reverse Lock. Optional for NexSentry, 8xx-series, and SE 422 ACUs. A Y/N field used to  
indicate if the lock power is normally off (N) or on (Y).  
Entering Zone. Optional. Enter the zone number for this reader, if applicable.  
ꢀ$  
ꢀ%  
LeavingZone. Optional. Usedwithanti-passbackifreadercontrolsexitfromazone. Enter  
the exit zone number.  
Tenant. Optional. Enter a four-digit maximum tenant number. If omitted, Tenant 0 (zero  
ꢀ&  
ꢀ'  
- system owner) is entered by default.  
Tim Cd 1: ... and Mod. Both optional. Four time codes may be entered denoting when this  
reader is active This function varies with different types of ACUs. Note that the downloaded  
ACU will still operate in the field during excluded time periods. If omitted, the reader is never  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4-34  
SECTION 4: MASTER FILE ENTRY  
active. For Mod, enter a transaction modifier code (A, B, etc.) to customize log messages  
and system actions (see Section 6: System Administration for details). The default for Mod  
is 0 (zero); use the standard log message.  
AUTO KEY ENTRY AND READER  
The Auto Key Entry feature allows you to capture the key number from a key card and assign the  
number as well as enter the card number automatically in the Key Number field of the keyholder  
Entry[key_entr]screen. BeforeyoucanusethisfeatureyoumustconfigureanAuto-EntryReader  
(Reader type 8). Perform the following procedures:  
Configuring the Auto-Entry Reader  
Automatically Entering Card Numbers  
Configuring the Auto Entry Reader  
1. From the Main Menu, select Master File Entry and the Master File Entry screen appears.  
2. Select the Hardware Configuration menu and the Configuration Menu [confmenu] screen  
appears.  
3. Select Readers and the Reader Entry [rdr_entr] screen appears.  
4. Select F5 Add Mode.  
5. Enter all necessary information, making sure that you enter 8 in the Reader Type field.  
6. Select F6 Store.  
Automatically Entering Card Numbers  
Note before you use the following procedure, you should configure an Auto-Entry Reader.  
1. From the Main Menu, select Master File Entry and the Master File Entry screen appears.  
2. Select Keyholders and the Keyholder Entry [key_entr] screen appears.  
3. Select F5 Add Mode.  
4. Enter the keyholders's ID, Last name, and first name and press Enter after each entry.  
5. Position the key card next to the reader and at the beep, press F7 AutoKey.  
6. Select F6 Store and select F5 Add Mode to enter additional Keyholders.  
7. To enter additional keyholders, repeat steps 4 through 6.  
MULTIPLE OCCUPANCY READER  
The Multiple Occupancy Reader (MOR) is similar to a reader that is configured for the two-man  
rule requirement. The difference between them is that the multiple occupancy reader is also  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 4: MASTER FILE ENTRY  
4-35  
configured for a specific zone and includes the passback feature. In addition, the MOR and the  
SE 6000 keep track of the people that are in a specified zone.  
ENTERING A MULTIPLE OCCUPANCY ZONE  
When a multiple occupancy zone is vacant, two keyholders are required to present their keys to  
the reader to unlock the door; first one and within a prescribed time period, the other, unlocking  
the door. Once three or more people are in the multiple occupancy zone, the reader works like a  
standard reader, that is, as an individual keyholder with rights presents their key, the door is  
unlocked, either entering or leaving.  
VACATING A MULTIPLE OCCUPANCY ZONE  
Vacating a Multiple Occupancy zone, requires that the last two keyholders present their keys at  
the same time, first one and then within the prescribed time period the other, unlocking the door.  
READER REPORT DEFINITION SCREENS  
The reader report definition screens, [rdr1entr], [rdr2entr], [rdr3entr], and [rdr4entr] are used,  
respectively, when setting up a reader to operate with an SE 8xx-series, 422, or NexSentry ACU.  
Press F2 after storing the data on the [rdr_entr] screen; the appropriate second screen  
automaticallydisplays.  
SE 8XX-SERIES READER REPORT DEFINITION [rdr1entr]  
1
Reader Mode. Optional. Enter the appropriate reader mode number. This is used for  
building modes. The default is 0.  
0 = Normal, 1 = Open, 2 = Closed, 3 = Station  
The remaining fields, Forced Open throughExit Denied, require a report number entry. The word  
report in this context identifies a user-defined action or series of actions that the ACU is to take  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4-36  
SECTION 4: MASTER FILE ENTRY  
in response to various events occurring within the system. (The field titles indicate the event  
types.) See Device Report Definition in the section and the applicable ACU manual for detailed  
information.  
SE 422 READER REPORT DEFINITION [rdr2entr]  
1
2
"
#
$
%
&
'
11  
ꢀꢁ  
  
ꢀ"  
ꢀ$  
ꢀ!  
ꢀ#  
ꢀ%  
ꢀ&  
ꢀ'  
 ꢁ  
ReaderMode. Optional. Entertheappropriatereadermodenumber: 0=Normal,1=Open,  
2 = Closed, 3 = Station. Default is 0.  
Proximity Type. Enter the proximity type: 0 = Sensor interface, 1 = DigiKey reader.  
Proximity Code. Enter the proximity reader node number: 0 = None, 15 = 1st proximity  
reader node number, 16 = 2nd proximity reader node number  
Keypad Type. Enter the keypad type: 0 = VIP2, 1 = MSRK5.  
"
Keypad Code. Enter the node number for the VIP keypad: 0 = None, 13 = 1st keypad node  
#
number, 14 = 2nd keypad node number.  
Mag Stripe Type. Enter the magnetic stripe type: 0 = MSR, 1 = MSR5, 2 = MSRK5.  
$
%
Mag Stripe Code. Enter the node number for the magnetic stripe reader: 0 = None, 17 =  
1st magnetic stripe reader node number, 18 = 2nd magnetic stripe reader node number.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 4: MASTER FILE ENTRY  
4-37  
&
ꢀ"  
Thefollowingtenfields, ForcedOpenthrough ExitGranted,requiretheentryofareportnumber.  
The word report in this context identifies a user-defined action or series of actions that the ACU  
is to take in response to various events occurring within the system. (The field titles indicate the  
event types.) See Device Report Definition in the section and the applicable ACU manual for  
detailed information.  
Door Output Relay. Enter the number of the 422 relay.  
ꢀ#  
ꢀ$  
ꢀ%  
DKR Configuration. Enter the ID number. Valid ranges of numbers is from 1-9999.  
ABA Configuration. Enter the ID number Valid range of numbers is from 1-9999.  
Keypad Enable. A Y / N field to activate the associated keypad.  
ꢀ&  
ꢀ'  
KeypadActiveDuringBuildingModes. AY/Nfieldtoindicatewhetherthekeypadshould  
be activated during the building open, limited and / or closed mode.  
Keypad Active During Time Codes. Up to four time codes  
 ꢁ  
SE 818 READER REPORT DEFINITION [rdr3entr]  
2
1
"
#
$
%
ReaderMode. Optional. Entertheappropriatereadermodenumber. 0=Normal, 1=Open,  
2 = Closed, 3 = Station. Default is 0.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4-38  
SECTION 4: MASTER FILE ENTRY  
Proximity Type. Enter the proximity type: 0 = Sensor interface, 1 = DigiKey reader.  
The following thirteen fields, DKR/SCR Fail through VIP tamper, require the entry of a report  
number. The word report in this context identifies a user-defined action or series of actions  
that the ACU is to take in response to various events occurring within the system. (The field  
titlesindicatetheeventtypes.) SeeDeviceReportDefinitioninthissectionandtheapplicable  
ACU manual for detailed information.  
DKR Configuration. Enter the ID number. Valid range is from 1-9999.  
"
#
VIPEnable. Optional. AY/N/Ofieldtoenable/disabletheVIP(OindicatesVIPonly). Default  
is N.  
VIPActiveDuringBuildingModes. Optional. AY/Nfieldtoactivate/deactivatetheVIPfor  
$
%
building modes Open, Limited and Closed. Default is N for all three.  
VIP Active During Time Codes. Optional. Enter up to four time code IDs when the VIP is  
to be active. Default is 0 for all four.  
SE NEXSENTRY READER REPORT DEFINITION [rdr4entr]  
2
1
"
#
$
%
ReaderMode. Optional. Entertheappropriatereadermodenumber. 0=Normal, 1=Open,  
2 = Closed, 3 = Station. Default is 0.  
Proximity Type. Enter the proximity type: 0 = Sensor interface, 1 = DigiKey reader.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 4: MASTER FILE ENTRY  
4-39  
The following eleven fields, DKR/SCR Fail through Device Tamper, require the entry of a  
report number. The report in this context identifies a user-defined action or series of actions  
that the ACU is to take in response to various events occurring within the system. (The field  
titlesindicatetheeventtypes.)SeeDeviceReportDefinitioninthissectionandtheapplicable  
ACU manual for detailed information.  
DKR Configuration. Enter the ID number. Valid range is from 1-9999.  
"
#
$
VIPEnable. Optional. AY/N/Ofieldtoenable/disabletheVIP(OindicatesVIPonly). Default  
is N.  
VIPActiveDuringBuildingModes. Optional. AY/Nfieldtoactivate/deactivatetheVIPfor  
building modes Open, Limited and Closed. Default is N for all three.  
VIP Active During Time Codes. Optional. Enter up to four time code IDs when the VIP is  
%
to be active. Default is 0 for all four.  
POINTS [pnt_entr]  
Enter individual point IDs for all input and output points in the system.  
Note:  
There are eight hardware types (exclusively input and/or output contacts) that require a type  
numberandapointnumberwhenbeingsetupinthedatabase.Youestablishthesedevicesusing  
the Point Entry screen and cause the log messages to differ depending upon point type:  
1. Alarm. An input contact for monitoring conditions defined as alarms.  
2. Door Switch. An input contact for determining the open/closed status of a door (only used  
when associated with a door record.  
3. REX. An input contact for determining the status of a request-to-exit switch.  
4. Open On REX. An input contact for determining the status of a request-to-exit switch which  
requires an action by the computer to unlock a specific door.  
5. Not used.  
6. General. An input or output contact for general purpose use. This function generates an  
input active message.  
7. Camera(optionalfeature). Input/outputcontactforcamerasystemmonitoringandcontrol.  
8. Spitter (optional feature). Input contact to indicate a ticket pull for a parking control system.  
9. Guard Tour (optional feature). An input contact allowing guard tour activity monitoring.  
A sample screen follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4-40  
Section 4: Master File Entry  
2
1
"
#
$
%
&
'
ꢀꢁ  
11  
ꢀ!  
  
ꢀ"  
ꢀ#  
ꢀ$  
Point ID. Required. Enter a four-digit maximum point ID number.  
Point Description. Optional. Enter a 20-character maximum description of the point. If  
omitted, the system enters the point ID number into this field.  
Device ID. Required (zoom available). Enter a four-digit maximum device ID number that  
is attached to this point. Once entered, the system automatically enters the associated  
computer number, poller number, and address fields.  
Sensor/Board. Required. The sensor number or board number through which this point  
communicates. A point may be connected through a multiple switch monitor (MSM) to an  
ACU, oritmaybeconnecteddirectlytootherdevicetypes. ForanACU, thenumberentered  
is the number of the sensor connection to the device. For devices with directly connected  
points(e.g.,Optomuxboards,alarmmonitoringdevices),enter0(zero),ortheboardnumber  
if multiple boards are connected on the same poller. Note that for WSE 422, 0 is for input  
points and 1 is for output points.  
"
Contact. Required. For points connected through an MSM to an ACU, enter the MSM point  
contact number (1, 2, 3, or 4). For directly connected devices, enter the contact number for  
that device (0 through 15). Note for WSE 422, 0-75 is for inputs and 0-51 if for outputs. Refer  
to the WSE 422 input/output tables at the back of this section.  
#
$
Point Type. Required (zoom available). Enter the point type number in the range 1 through  
9 as described above, or screen-check using F7 (zoom).  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Section 4: Master File Entry  
4-41  
Time. Required for point type 2 (door switch) and 6 (general, when used with an OPTO 22);  
disregard for all other types. For type 2, enter the number of seconds before the door is to  
be considered held open. The range is 1 through 240 (the default is 15 seconds and this is  
the recommended value for normal usage). For type 6, and if this is an output point, enter  
the number of seconds that the OPTO 22 output remains active. The range is 0 through 655  
(0 indicates no time limit).  
%
Point Mode. Required except for MSMs; enter 0 if this the case. Enter 0 (zero) if the point  
is normally open; enter 1 if the point is normally closed. Default is 0.  
&
'
Input/Output. Required. Enter I for an input point; enter O (letter O) for an output point.  
Default is I.  
Watchdog. Required for Opto 22 devices only. Indicates the action to be taken if  
ꢀꢁ  
communication is interrupted between the host computer and the device. Enter:  
0 — No action (default)  
1 — Open on time-out  
2 — Close on time-out  
808 Report #. Required for points attached to 8xx-series ACUs. Note that this is used with  
alarm generated points. If it is a door switch or a REX, it is defined on the second page of the  
Readerscreen. Thewordreportinthiscontextidentifiesapreviously-definedactionthatthe  
ACU is to take in response to specific events. Up to 15 reports can be defined for each ACU  
(see the respective ACU manual for detailed information). Enter a number in the range 1  
through 15 indicating the 808 report to be used. If omitted, Report #1 — report to host at all  
times — is used by default.  
Enable Point. Conditional (zoom available). Indicates a point ID that must be activated  
beforethecurrentpointcanbeactivated.EntertheenablepointIDnumber.Thisisonlyactive  
for host control points.  
  
NOTE  
The Enable Point is primarily used with closed circuit television monitors (CCTVs), but can  
be used elsewhere. For example, in order to open a parking lot gate, a car must first be  
sensedbyadetector(enablepoint).Thenwhentheproperkeyholderusestheirkey,thegate  
opens, allowing access.  
Disable. Required. A Y/N field indicating if the point is currently disabled (Y). Default is N  
(point currently active). Note that an intelligent ACU will only control host action not the  
physical action at a site where the ACU reports a contact closure.  
ꢀ!  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4-42  
Section 4: Master File Entry  
Zone number. Required (zoom available). Enter the zone number applicable for this point.  
ꢀ"  
ꢀ#  
ꢀ$  
The system enters the default value of 0 (zero) if this field does not apply.  
Tenant. Required (zoom available). Enter the tenant number applicable for this point. The  
system enters the default value of 0 (zero - system owner) if this field does not apply.  
Tim Cd (1-4), Code and Mod.  
Code: Required (zoom available). Four time codes can be entered to allow input  
monitoring at this point. The default is time code #1.  
NOTE  
The system effectively shunts points and devices not covered by an active time code.  
Recommend controlling events through reporting when using an intelligent ACU.  
Mod: Optional. Log messages and system action can be modified using the custom  
transaction modifier codes A, B, etc., (see Section 6, System Administration). Default  
is 0 and uses standard messages.  
AUTO OPENS / ACTIVATES  
The auto open / activate feature is used to instruct the system to lock / unlock doors, or activate  
/ deactivate output points, for a predefined amount of time. Examples:  
A regular business door is configured to automatically unlock at a prescribed time each  
morning. The time code then re-locks the door at close of business each day.  
Via an output point, a time code automatically switches on an outside light each evening at  
a prescribed time. The same time code then automatically switches off the light at a  
prescribed time the following morning.  
A sample screen follows:  
1
2
Download from Www.Somanuals.com. All Manuals Search And Download.  
Section 4: Master File Entry  
4-43  
Serial #. A nine-digit maximum control number automatically generated and displayed by  
the system when a new auto open / activate code is added. This information is not entered  
by the user.  
Reader ID or Point ID. Required. Enter the applicable reader or output point ID number.  
Timecode. Required. Enter the applicable time code.  
DEVICE REPORT DEFINITION [rdefentr]  
Use this feature to create action reports for the SE 8xx-series and SE 422 ACUs. An action report  
isasetofuser-definedtasksperformedbytheACUwhenspecifiedconditionsoccur. Theactions  
are defined using the device report definition screen (sample screen shown below); the reports  
are assigned using screens described in the device entry subsection. For complete descriptions  
onhowtousethereportdefinitionscreenforthevariousACUtypes, pleaserefertotherespective  
ACU manuals.  
NOTE  
Thelistoftimeconditionsinthelefthandsideofthescreen(TimeCodeA-C)andthetaskchoices  
running left to right, such as Send To Host are used to define actions. To define an action, type  
a Y or N, or a number as appropriate for the desired task in the field under the appropriate task  
choice. For example, if you want the report to send information to the host when the building is in  
the open mode, type Y in the Bldg Open field under the Send to Host column.  
SE 422 PIN DEFINITION  
The number of PIN digits and the PIN seed must be defined and entered. The seed is used as  
part of an equation to calculate PIN numbers assigned to keyholders.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4-44  
Section 4: Master File Entry  
Assigned PIN numbers can be printed out (see Section 3, SE 422 PIN Master Report). Also, it  
is possible, but not recommended, to override the system-wide default values entered here (see  
Device Entry, SE 422, in this section). A sample data entry screen follows:  
2
1
PIN Digits. Optional. Enter 4 or 5. Default is 4.  
PIN Seed. Optional. Enter a number in the range 0 — 999999. Default is 0.  
SE 422 HARDWARE DEFINITION  
Various special-function subdevices may be connected to the SE 422. These include input  
monitoring or output control devices (MIROs), proximity key or magnetic stripe card readers, and  
keypads allowing PIN entry.  
The subdevices as connected to the SE 422 are known as nodes on the SE 422 communications  
network. A node is further defined by assigning it a point ID, by entering the device ID of the SE  
422 to which the subdevice is attached, the communication address (node) number of the  
attachment, the report number to use if the device fails, and the serial number of the subdevice.  
A sample data entry screen follows.  
1
2
"
#
Point ID. Required. Enter a four-digit point ID and device description.  
Device ID. Required (zoom available). Enter an existing SE 422 device ID.  
Node Number. Required. Note that each node device must have an address (or serial  
number)assignedtoitwiththeSerialCommandduringdatabasesetup.Enteranodenumber  
in the range 1 — 18.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Section 4: Master File Entry  
4-45  
DevFailureRpt. Optional. Enteradevicefailurereportnumberintherange1—32. Default  
"
#
is 0 — No report.  
Serial Number. Required. Enter the device serial number (imprinted on a rotary switch).  
DIALER ENTRY  
An optional, factory-set remote dial-up poller must be established to enable the remote dial-up  
feature for 8xx-series ACUs connect to an RDI unit or to a dial-up 422. The dialer entry screen  
is used to enter various control parameters for the off-site ACUs. A sample screen follows:  
1
2
"
#
$
%
&
'
ꢀꢁ  
11  
  
ꢀ!  
Device ID. Required (zoom available). Enter a four-digit device ID number (system  
automatically displays device description).  
Associated Poller ID. Required (zoom available). Enter the remote dial-up (scheduler  
poller) poller ID number assigned to this device (system automatically displays poller  
description).  
Remote. Required. Enter remote location phone number. Note that if the host must dial a  
prefix, be sure to include it.  
Host1. Required. Enter host phone number. For RDI units only, enter log in string and  
password (default shown). Note that if the remote must dial an area code or other prefix, be  
sure to include it.  
"
Download from Www.Somanuals.com. All Manuals Search And Download.  
4-46  
Section 4: Master File Entry  
Host2. Required, if applicable. Enter alternate host #2 phone number. For RDI units only,  
#
$
%
&
enter login string and password.  
Host3. Required, if applicable. Enter alternate host #3 phone number. For RDI units only,  
enter login string and password.  
No Activity Disconnect Seconds. Optional. Enter the number of no activity seconds to  
elapse before host disconnects from the remote ACU. Default is 90 seconds.  
RLC/RDI should: Two related Y / N fields:  
Call when alarm occurs: Y or N  
Dial back: Y or N Not currently implemented.  
Number of transactions to hold: Optional. Enter the number of transactions to be held  
'
in remote memory. Default is 4000.  
Minutes before: Three related fields:  
ꢀꢁ  
Host Retry. Number of minutes to wait before retrying call to host for example, every  
two minutes.  
Minimum Call. Minimum elapsed time before dialing remote site for log messages (in  
hours) for example, every six hours.  
MaxCall. Maximumelapsedtimebeforedialingremotesiteforlogmessages(inhours)  
for example, every 12 hours.  
Schedule Next Call on / at. Enter the time and date when next call is to be made. Note that  
a future date will cause the scheduler to Not dial the devices until the future date/tune is  
reached.  
Statistics for last successful call (automatically displayed and updated): Date, Time,  
Type, Count.  
  
Numberoffailedcallattemptssincelastsuccess(automaticallydisplayedandupdated).  
ꢀ!  
SITE ENTRY DEFINITION  
Site codes restrict the use of one or more doors to specific groups of cards (a particular company,  
a particular department, etc.). Up to 64 site codes can be assigned to the same card group ID.  
The group ID is used by ACUs which support ABA magnetic card readers to make access  
decisions based on site codes. A sample screen follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Section 4: Master File Entry  
4-47  
2
1
Group ID. Enter a four-character maximum group ID number.  
1
2
Code. Enter a four-character maximum site code. Enter x in any position to act as a wild  
card; all characters in that position are matched. With the first 'x entry' in the sample screen,  
for example, the range 1230 through 1239 would be matched.  
ABA CONFIGURATION ENTRY  
The ABA (American Banking Association) configuration entry screen is used to define codes to  
be read from a standard ABA magnetic stripe card reader, and to define actions to be taken in  
response to the cards read. A sample screen follows:  
1
2
"
$
#
%
&
'
ꢀꢁ  
11  
Configuration ID. Enter a four-character configuration ID number.  
1
2
Key A. Start position and length of first part of key. Key fields A, B and C are linked to form  
the key field.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4-48  
Section 4: Master File Entry  
Key B. Start position and length of second part of key.  
Key C. Start position and length of third part of key.  
Expiration Date Start. Expiration date start position.  
Site Code. Site code start position.  
"
#
$
%
ABACardDataAction. Thereportnumber(ID)thatwillexecuteinresponsetoanABAcard  
swipe event.  
Based on Key Number. Y / N — Actions to take that are based on the key number.  
Based on Site Code. Y / N — Actions to take that are based on the site code.  
Based on Expiration Date. Y / N — Actions to take that are based on the expiration date.  
Use Site Code as Key. Y / N — Use the site code as the key number.  
&
'
ꢀꢁ  
11  
DKR CONFIGURATION ENTRY  
The DKR (Digital Key Reader) configuration entry screen is used to change the factory-set  
operationaldefaultvalues. Abriefintroductiontotheseproceduresisgivenhere,butforcomplete  
information consult the appropriate DKR manual. In all cases, however, do not attempt these  
procedures without first contacting your dealer and/or WSE customer support.  
1
2
#
"
$
Configuration ID. Enter a configuration ID number in the range 1 — 9999.  
Send Key to ACU Once. Controls the number of times the key number is forwarded to the  
ACU while within the read-range of the reader. The default is Y—Once.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Section 4: Master File Entry  
4-49  
Read Range. Controls the maximum read range available with the particular digital reader.  
The range is 0—255; default is 255.  
NumberofReads. Controlsthenumberofadditionalverificationreadsofasinglekeywithin  
"
#
the sensor’s range before declaring the key valid. The range is 0—255; default is 1.  
Read Time. Controls the amount of time that the reader retains the key number in memory  
after the key is removed from the sensor’s read range. The valid range is 0—65535 clock  
ticks (100 clock ticks is equal to 1 second); default is 100.  
LEDandBeeperSetup. Beeper, RedLED, andGreenLEDon-time, off-time, andduration.  
Override the default operation of the beeper, Red LED, and Green LED on the digital key  
reader in response to a valid key read. The valid range for on-time, off-time, and duration  
is 0-65535 clock ticks. The default is 0 (uses factory-set predefined behavior).  
$
USER-DEFINED INFORMATION  
Certain field titles on the keyholder record screens can be changed to suit the individual SE 6000  
owner. Since keyholder records may be considered the primary data items for an access control  
system,manySE6000ownersusethefieldtitlechangefeaturetotailorthesystemtotheirprecise  
requirements(thesefieldsareprovidedforinformationalpurposesandforuseasreportselection  
criteria, and have no effect on system processing).  
The field titles are changed with the control file maintenance feature accessed from the System  
Administration menu (see Section 6: System Administration):  
The user-defined information selection here in the master file entry menu is used to assign  
descriptions to these fields. A sample screen follows: Note that a description of "unused" will skip  
the field during keyholder file maintenance.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4-50  
Section 4: Master File Entry  
MAPS  
TheDRAWMAPSfunctionisusedbytheeventmonitoringfunctiontodisplaythelocationofdoors,  
points, alarms, etc. To use this feature on an SE 6200 and above, it must be operating under the  
Reflection 4 terminal emulation software (mouse required). You can also use this feature on an  
SE 6100 or below from your console. This requirement is due to the SCO Unix graphic memory  
limitation. The function has several built-in HELP maps, and drawing instructions display at the  
foot of all screens. A sample map follows:  
MAP DRAWING COMMANDS AND DESCRIPTIONS  
COMMAND  
Delete Ob  
DESCRIPTION  
Remove graphics and text. Once selected, the menu list shows only those object types  
currently on the map. Select one, then follow deletion instructions.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Section 4: Master File Entry  
4-51  
ReDraw  
Rectify  
Redraws screen. Use if graphics appear incorrect.  
Makes all lines close to horizontal or verticalexactly horizontal or vertical. Lines nearly 45°  
are drawn at exactly 45°.  
Rescale  
Curve  
Rescale (resize) map. Lines and curves change; text and icons do not change.  
Draw curved lines.  
Draw circles.  
Circle  
Rectangle  
Triangle  
Polyline  
Line  
Draw boxes.  
Draw triangles.  
Draw connected lines.  
Draws a single line.  
Create text labels (large and small).  
Text  
Outpt Pt  
Output point icon — Rectangle with a smaller rectangle crossing it (point 4103 on sample  
map).  
Camera Pt Camera point icon — Rectangle with a small projection to the left (point 9997 on sample  
map).  
Sensor Pt  
Sensor point icon — Black rectangle when locked; white when unlocked (point 1030 on  
sample map).  
DoorSw Pt Door switch icon (point 1031 on sample map).  
Alarm Pt  
Fire Pt  
Alarm point icon — Red rectangle (point 999 on sample map).  
Fire point icon. The icon shows a red and yellow flame above a rectangle (point 4102 on  
sample map).  
File Menu  
Switch to File Menu to load, save, rename, copy, delete, or start new maps.  
EXIT DRAW Exit DRAWMAPS program.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4-52  
Section 4: Master File Entry  
SE 422 Input Table  
0
1
2
3
3
4
5
5
6
ACU (2-state) 0:  
M16 /RO1 1:  
1
2
4
6
7
8
9
10  
11  
18  
25  
32  
39  
46  
53  
60  
12  
13  
20  
27  
34  
41  
48  
55  
62  
14  
21  
28  
35  
42  
49  
56  
63  
(4-state input) 2:  
15  
22  
29  
36  
43  
50  
57  
64  
65  
66  
67  
68  
69  
70  
72  
74  
75  
16  
23  
30  
37  
44  
51  
58  
17  
24  
31  
38  
45  
52  
59  
19  
26  
33  
40  
47  
54  
61  
3:  
4:  
5:  
6:  
7:  
8:  
RO4 (4-state) 9:  
10:  
Input points are always on  
sensor 1, contact 1-75  
11:  
12:  
13:  
14:  
15:  
16:  
VIP (2-state)  
SI (4-state)  
71  
73  
MSR (2-state) 17:  
18:  
SE 422 Output Table  
0
1
2
2
3
3
4
4
5
5
Acu (2-state) 0:  
1
M16/RO1  
1:  
6
7
(4-state input) 2:  
8
9
3:  
4:  
5:  
6:  
7:  
8:  
10  
12  
14  
16  
18  
20  
22  
27  
32  
37  
11  
13  
15  
17  
19  
21  
23  
28  
33  
38  
42  
45  
Output points are always on  
sensor 2, contact 1-51  
RO4  
9:  
24  
29  
34  
39  
43  
46  
25  
30  
35  
40  
44  
47  
26  
31  
36  
41  
10:  
11:  
12:  
13:  
14:  
15:  
16:  
17:  
18:  
VIP  
SI  
MSR  
48  
50  
49  
51  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 5  
MASTER FILE REPORTS  
INTRODUCTION  
The master file reports list comprehensive database information. The report menu screens are  
accessedviathemasterfilereportsmenu[rprtmenu],displayedviathemainmenu. Inthissection,  
the reports are documented following the reports menu sequence (see section table of contents).  
A sample [rprtmenu] screen follows:  
All screens in this section show the system default values, with most screen fields requiring a  
numeric range entry. For example, the default range for keyholders is 1 — 999999999 (to reduce  
waiting time while a report is generating, enter the smallest range of numbers for each category  
which will still provide the information wanted). Other screen fields include choices for date  
ranges, regular or extended information, and report sequencing. When all fields have been  
entered, press Enter (Yes - default) to begin report generation:  
Oncecompiled,areportoutputselectiondisplays. Normally,1(systemreportprinter)orD(display  
at terminal) is chosen. The system also gives the option to print to a terminal printer. Report totals  
are printed at the end of each report.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5-2  
SECTION 5: MASTER FILE REPORTS  
ADDITIONAL INFORMATION  
An additional report feature not accessed via the reports menu, 132-xx Column Report Display,  
is detailed at the end of this section.  
KEYS MASTER  
Two versions of the keyholder master report are available — Keyholder Quick List and Keyholder  
Master List (extended). The quick report includes keyholder ID, key number, keyholder name,  
information from user-defined fields B and D, phone number, title, user-defined field C, and floor.  
The masterreportincludesallthekeyholderinformationenteredonpage1ofthekeyholderentry  
screen, plus address, phone number, and user-defined field 7. Also, the master report prints  
access code information (first 20 codes) for each keyholder. A sample [key_rprt] screen follows:  
Notethatcertainreportscreensincludeasortsequencefieldandanumberedlistofsortsequence  
categories. Enter one of the numbers into this field to print data related to that sequence number.  
For example in the Keyholder Master Report screen, enter number 1 in the Sort Sequence field  
to sort data by keyholder ID (see the following example).  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 5: MASTER FILE REPORTS  
5-3  
KEYHOLDER QUICK LIST — SAMPLE REPORT  
06/02/96  
14:45  
BAYOU INDUSTRIES  
Key Quick List  
Page  
1
KeyholderKey No  
Keyholder Name  
Dept. Pos. Phone  
Title  
Bldg  
___________________________________________________________________________________________________________  
220774 409  
221922 811  
222172 512  
233132 588  
239445 277  
245165 338  
246763 445  
247666 176  
248112 765  
249343 453  
JENSEN STEVE  
KREBS SCOTT  
DUNN JEFF  
NEWMAN TERESA  
CLEMENT KAREN  
KIRK KATHY  
FERRELL STUART  
KERR KATIE  
LOWE LORRAINE  
GREENWOOD LORI  
11  
11  
11  
11  
11  
11  
11  
11  
11  
11  
6
6
7
0
0
6
7
0
7
7
18  
18  
18  
18  
5
18  
18  
0
123-4567  
890-1234 RECEPTIONIST  
PINKERTON SECURITY  
567-8901 SECURITY MGR  
234-5678 SECURITY RECEPTIONIST  
901-2345 SECURITY RECEPTIONIST  
2
1
KEYHOLDER HOLDER MASTER REPORT — SAMPLE REPORT  
08/02/96  
PAGE  
McArthur Complex  
1
10:58  
Keyholder Master List  
Keyholder  
Lynne  
Key No  
Engineering  
S.S. No 123-45-6789 Addr2  
Clara Annex  
222541 Name  
Company  
Cross, Gregory  
Company  
Dept  
2 = J o h n s  
2 =  
2332 Addr1  
1917 Blair Avenue  
Weston, CA 95199  
Location  
Job Cat  
5 = S a n t a  
14 = Software  
Tenant  
1 Addr3  
Engineer  
P.I.N.  
1314 Privledge YES  
Shift  
Status  
0 = N/A  
0 = N/A  
Remarks Occasional late evening, weekend work  
Phone (123)456-7890 Trace N Visitor YES Issued 07/14/96 Returned **********  
Access Codes 1 4 7 8 21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5-4  
SECTION 5: MASTER FILE REPORTS  
ACCESS ASSIGNMENTS  
KEYHOLDER ACCESS ASSIGNMENT  
This report prints the access codes and access groups assigned to keyholders. Regular and  
extended versions of the report are available.  
The regular report lists keyholder numbers and names, access code / group numbers and  
descriptions,andaccessoverridecodeswhereapplicable. Theextendedreportincludesthisdata  
and also gives key number, social security number, tenant number, PIN, company, department,  
location, job category, shift, status, remarks, phone, trace, visitor, and badge issue information.  
A sample screen follows:  
KEYHOLDER ACCESS ASSIGNMENT: REGULAR — SAMPLE REPORT  
06/06/96  
BARON PARK HOLDINGS  
Page  
1
10:13  
Keyholder Access Assignment List  
Keyholder Keyholder Name  
Code Code Description  
Group Group Description Override  
_________ _____________________ ____ _____________________ _____ _________________ ________  
23342 Smith, James  
22243 Stevens, Sandy  
21188 Svensen, Lars  
23397 Swenson, Lawrence  
24411 Tauber, Linda  
1 Host 422, 708, 818  
1 Host 422, 708, 818  
1 Host 422, 708, 818  
1 Host 422, 708, 818  
1 Host 422, 708, 818  
1 Main  
1 Main  
1 Main  
1 Main  
1 Main  
0
0
0
0
0
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 5: MASTER FILE REPORTS  
5-5  
KEYHOLDER ACCESS ASSIGNMENT: EXTENDED — SAMPLE REPORT  
06/09/96  
12:30  
Nova Systems, Inc.  
Keyholder Access Assignment List  
Page 1  
Access Code1 = Host 422, 808, 818  
Override Code 0 =  
Company 1 = Nova Systems  
Dept 3 = Engineering  
Keyholder  
Key No  
S.S. No987-65-4321 Addr2  
331 Name  
1038 Addr1  
Sands, Jerry  
1727 Oakmead Parkway  
Apt 12B  
Location 1 = Tulip Grove Main  
Job Cat 6 = Software Engr  
Tenant  
P.I.N.  
Remarks  
1 Addr3  
2198 Privledge YES  
Tulip Grove, CA 91999  
Shift 0  
Status 0  
= N/A  
= N/A  
Phone 224-8089Trace NO Visitor NO Issued 03/31/95 Returned ***********  
READER ACCESS ASSIGNMENT  
This report prints keyholder access permissions at a specific reader and applicable time codes.  
A sample screen follows:  
READER ASSIGNMENT — SAMPLE REPORT  
04/16/96  
11:26  
Soames Industries  
Access Report by Reader  
Page  
1
Keyhld IdKeyholder Name  
Reader Reader DescriptionTmcd Start End Mon Tue Wed Thu Fri Sat SunHol  
________ ________________________ ______________________ _____ ___ ___ ___ ___ ___ ___ ___ ______  
12235 Honsleigh Paul  
12345 McDermott Ian  
13445 Allentown Debra  
57 Freight Car #3  
57 Freight Car #3  
57 Freight Car #3  
1
1
1
00:00 23:59 Y  
00:00 23:59 Y  
00:00 23:59 Y  
Y
Y
Y
Y
Y
Y
Y Y  
Y Y  
Y Y  
Y Y Y  
Y Y Y  
Y Y Y  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5-6  
SECTION 5: MASTER FILE REPORTS  
ACCESS DEFINITION  
ACCESS CODE MASTER  
Thisreportdetailsallaccesscodesdefinedinthesystem(thereportcanbelimitedtoasinglecode  
or a range of codes, as required). A sample screen follows:  
ACCESS CODE MASTER LIST — SAMPLE REPORT  
05/02/96  
11:26  
Soames Industries  
Access Code Master List  
Page  
1
Code Code Description Reader Reader Description Tmcd Start End  
____ ________________ ______ __________________ ____ _____ ___  
Mon Tue Wed Thu Fri Sat Sun Hol  
___ ___ ___ ___ ___ ___ ___ ___  
12 Weekend Rcvng  
13 Holiday Rcvng  
19 Lab After Hrs  
20 Lab Weekends  
22 Receiving #1  
22 Receiving #1  
06 Lab Main  
14  
15  
05  
06  
09:00 15:00 N  
09:00 12:00 N  
15:30 23:59 Y  
09:00 23:59 N  
N
N
Y
N
N
N
Y
N
N
N
Y
N
N
N
Y
N
Y
N
N
Y
Y
N
N
Y
N
Y
N
Y
06 Lab Main  
ACCESS GROUP MASTER  
This report details all access groups defined in the system (the report can be limited to a single  
group or a range of groups, as required). A sample screen follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 5: MASTER FILE REPORTS  
5-7  
ACCESS GROUP MASTER LIST — SAMPLE REPORT  
06/10/96  
10:03  
HIGHLAND ELECTRONICS  
Access Group Master List  
Page 1  
Group Group Description  
Code Code Description  
SFS  
_____ ______________________________ ____ ________________________________ ___  
1 DWNLD 801/802/8100/4222  
1 DWNLD 801/802/8100/4222  
5 DWNLD 801 ACCESS CODE  
6 DWNLD 802 ACCESS CODE  
N
N
2 SFS/708/801/802/8100/4222  
2 SFS/708/801/802/8100/4222  
2 SFS/708/801/802/8100/4222  
1 HOST 422, 808 & 708  
3 DWNLD 804 ALPHA LAB 808S #2  
4 DWNLD 805 ALPHA LAB 808S #3  
N
N
N
ACCESS OVERRIDE  
The report lists access override codes in the database, with descriptions, start / end dates, and  
permissions (allow / deny access). A sample screen follows:  
ACCESS OVERRIDE — SAMPLE REPORT  
03/25/96  
08:21  
Security Electronics  
Access Override Codes  
Page 1  
Code Description  
Start  
End  
Permission  
____ ______________________________ ________ ________ __________  
1
2
900  
TEST OVERRIDE ALLOW  
TOXIC CHEMICALS IN USE  
RDI OVERRIDE CODE  
03/21/96 03/24/96 Allowed  
04/14/96 04/14/96 Allowed  
05/11/96 05/11/96 Denied  
05/25/96 05/26/96 Denied  
999  
TEST OVERRIDE DENIED  
INTELLIGENT FAIL SOFT REPORT  
The intelligent fail soft report function, used in the event of a communications failure, lists  
keyholder access permissions for each 708P in the system . The report begins a new page for  
each device, and shows the readers attached to a device, and the keyholders and their access  
permissionsbyindividualreader. Failsoftaccessisusedonlywhena708Pcannotcommunicate  
with the host computer. A sample screen follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5-8  
SECTION 5: MASTER FILE REPORTS  
INTELLIGENT FAIL SOFT — SAMPLE REPORT  
03/25/96  
08:24  
Soames Industries  
Intelligent Fail Soft Report  
Page 1  
Keyholder Keyholder Name  
7110 7120 7130 7140 7150 7160 7170 7180  
_________ ______________________ ____ ____ ____ ____ ____ ____ ____ ____  
67100 708P PARKING CNTR  
63455 DIGI FI-GI  
61096 GUARD NEW  
61099 1030 ALT+D+P  
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
PROJECT REPORT  
The Project Report includes number, description, start / stop times and dates, and current status.  
NOTE  
This report gives project status based on start / stop dates defined by the project entry function  
compared to the current system date and time. Since the selection criteria and reported status  
do not consider operator overrides, actual and reported project status may differ.  
A sample project report screen follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 5: MASTER FILE REPORTS  
PROJECT REPORT — SAMPLE REPORT  
5-9  
03/25/96  
08:29  
Security Electronics  
Project Report  
Page 1  
Project Project Description  
S.Date  
S.Time E.Date  
E.Time Schedule  
_______ ___________________________ ________ ______ ________ ______ ________  
1 TEST PROJECT #1  
2 TEST PROJECT #2  
06/01/96 15:52 06/01/96 15:56 Active  
06/05/96 07:30 06/06/96 23:59 Inactive  
5 EMERGENCY CIRCUITBOARD REV. 12/17/96 00:00 01/01/99 23:59 Active  
50 NEW TEST PROJECT  
51 LAUNCH  
100 TEST PROJECT #3  
06/23/96 00:00 06/25/96 23:59 Inactive  
02/16/96 08:00 02/20/96 17:00 Inactive  
06/05/96 00:00 06/10/96 23:59 Inactive  
KEYHOLDER PROJECT REPORT  
The Keyholder Project Report includes keyholder ID, name, project ID and description, and  
current status. A sample keyholder project report screen follows:  
NOTE  
This report gives keyholder project status based on start / stop dates defined by the project entry  
function compared to the current system date and time. Since the selection criteria and reported  
status do not consider operator overrides, actual and reported project status may differ.  
KEYHOLDER PROJECT REPORT — SAMPLE REPORT  
05/05/96  
13:47  
Security Electronics  
Keyholder / Project Report  
Page 1  
Keyholder Keyholder Name  
Project Project Description  
Schedule  
_________ __________________ _______ _______________________ ________  
661091 BOB SMITH  
2 TEST PROJECT #2  
1 TEST PROJECT #1  
Active  
661093 JOHN MILLAR  
Inactive  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5-10  
SECTION 5: MASTER FILE REPORTS  
READER PROJECT REPORT  
The Reader Project Report lists project number, description, readers assigned, current status.  
NOTE  
This report gives reader project status based on start / stop dates defined by the project entry  
function compared to the current system date and time. Since the selection criteria and reported  
status do not consider operator overrides, actual and reported project status may differ.  
A sample reader project report screen follows:  
READER PROJECT REPORT — SAMPLE REPORT  
05/05/96  
13:42  
Security Electronics  
Project / Reader Report  
Page 1  
Project Project Description  
Schedule Reader Reader Description  
_______ ____________________________________ ________ ______ _____________________  
10  
15  
TEST PROJECT #1  
Active  
Active  
8110  
8120  
808SX DOOR 1  
808SX DOOR 2  
EMERG. CIRCUIT BOARD REV. PROJECT  
1001  
1010  
422 ENTRY #1  
818 #7 DOOR #1 ALPHA  
TIME CODES  
This report lists all time codes set up in the database. A sample screen follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 5: MASTER FILE REPORTS  
TIME CODES — SAMPLE REPORT  
5-11  
03/25/96  
08:36  
Security Electronics  
Timecode Report  
Page 1  
Tmcd Description  
Start End  
Mon Tue Wed Thu Fri Sat Sun Hol  
____ ________________________ _____ _____ ___ ___ ___ ___ ___ ___ ___ ___  
0
1
2
3
NEVER ACTIVE  
00:00 00:00 N N N N N N N N  
7-DAYS, 24-HOURS & HOLS 00:00 23:59 Y Y Y Y Y Y Y Y  
OFFICE HOURS 7 am - 6 pm 07:00 18:00 Y Y Y Y Y N N N  
WEEKENDS & HOLIDAYS  
00:00 23:59 N N N N N Y Y Y  
HOLIDAYS  
This report lists all holidays that have been entered into the system. A sample screen follows:  
HOLIDAY CODES — SAMPLE REPORT  
03/25/96  
08:38  
Jamestown Aircraft  
Holiday Master Report  
Page 1  
Date  
Description  
________ ______________________________  
01/01/96  
05/27/96  
07/04/96  
09/01/96  
11/28/96  
11/29/96  
12/24/96  
12/25/96  
NEW YEAR'S DAY  
MEMORIAL DAY  
INDEPENDENCE DAY  
LABOR DAY  
THANKSGIVING DAY  
DAY AFTER THANKSGIVING  
CHRISTMAS EVE  
CHRISTMAS DAY  
TENANTS  
This report lists all tenant names and numbers defined in the system. A sample screen follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5-12  
SECTION 5: MASTER FILE REPORTS  
TENANTS — SAMPLE REPORT  
05/04/96  
09:07  
TRADE CENTER MAIN  
Tenant Report  
Page 1  
Number Description  
______ ___________  
1 WESTWOOD SECURITY SYSTEMS  
2 SOS PUBLISHING (CALIFORNIA)  
3 BETA SOFTWARE  
4 WALKINS PRODUCTS, INC  
COMPANY, DEPT, LOCATION, JOB CAT  
Thesereportslistuser-definedcompany,department,locationandjobcategoryinformation. The  
report screens are identical for all four — a sample follows:  
COMPANY, DEPT, LOCATION, JOB CAT — SAMPLE COMPANY REPORT  
03/25/96  
08:41  
Security Electronics  
Company Master List  
Page 1  
Number  
______  
Description  
_________________________  
1
2
3
DRAYTON ENGINEERING  
SMITH-JONES WAFER FAB.  
MCDOWELL PUBLICATIONS  
INSTRUCTIONS  
This report lists the operator instructions to be taken following specified events occurring at  
specified points. A sample screen follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 5: MASTER FILE REPORTS  
SAMPLE INSTRUCTIONS  
5-13  
03/25/96  
08:45  
General Electronics Co  
Instruction Master List  
Page 1  
Point Point Description  
Zone Instructions  
_____ ______________________________ ____ ________________________________________  
7114 PRIORITY 10 ALARM  
4 EVACUATE LAB AREA  
NOTIFY BUILDING MANAGER PAGER #12345  
DIRECT FIRE CREW TO SCENE  
PROVIDE ASSISTANCE AS NECESSARY  
LOG EVENT START/STOP IN SHIFT LOG  
9011 RDI 808 #1 1.1 FIRE  
5 REMOTE SITE FIRE ALARM  
CALL 777-1212 AND NOTIFY LOCAL FIRE DEPT  
NOTIFY OPERATIONS MANAGER PAGER #12345  
LOG EVENT IN SHIFT LOG BOOK  
MAPS  
The map report lists all points incorporated into user-defined system maps. The report screen  
prompts only for the desired sequence: point ID, point type, or map name.  
SAMPLE REPORT — MAP INFORMATION  
03/25/96  
09:33  
CAMPBELL TECHNOLOGY  
Map Definition Report  
Page 1  
Point Point Type Map Name  
_____ __________ ________________________  
1 CAMERA  
1 DOOR  
HLP_PNTS  
HLP_DOOR  
HLP_DOOR  
HLP_PNTS  
HLP_PNTS  
2 DOOR  
2 SENSOR  
3 ALARM  
DEVICE CONFIGURATION REPORTS  
ZONES  
This report lists all zones defined in the system. A sample screen follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5-14  
SECTION 5: MASTER FILE REPORTS  
ZONES — SAMPLE REPORT  
03/25/96  
08:47  
Leigh-Haffner Enterprises  
Zone Report  
Page 1  
Zone Description  
Area Prim Level  
____ _______________________________ ____ ____ _____  
1 ALPHA LAB ZONE  
P
P
P
V
H
H
H
H
G
L
L
G
2 HARD PASSBACK ZONE 2  
3 HARD PASSBACK ZONE 3  
4 HARD ANTI PASSBACK  
POLLERS  
The report lists all defined pollers in the system. A sample screen follows:  
POLLERS — SAMPLE REPORT  
03/25/96  
08:49  
Global Software  
Poller Master Report  
Page 1  
Poller Date In  
Comp # Poll # Prim Poller Type Desc Disabled Zone Zone Desc  
______ _____________________ ______ ______ ____ ________________ ________ ____ _________  
2 DATABASE POLLER  
3 422/808 POLLER 1  
4 808/422 POLLER 2  
5 708P PARK POLLER 5  
0
0
0
0
0
1
2
5
11  
6
6
Database  
808  
808  
NO  
YES  
NO  
0 OUTSIDE  
0 OUTSIDE  
0 OUTSIDE  
0 OUTSIDE  
8
Parking  
NO  
DEVICES  
This report lists all devices defined in the system. A sample screen follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 5: MASTER FILE REPORTS  
5-15  
DEVICES — SAMPLE REPORT  
03/25/96  
08:50  
McCartney Foundation  
Device Master Report  
Page 1  
Device Device Desc  
Comp #Poll # Address Prim Device Type Desc Disabled Zone Zone Description  
___________________________________________________________________________________________________  
1 HOST  
10 LC #1  
100 DIAL-UP 422 #1  
801 BETA 808 SX# 2  
802 BETA 804S #1  
0
1
100  
0
0
0
0
2
2
0
0
1
2
1
1 Host  
NO  
NO  
YES  
NO  
0
0
0
2
2
OUTSIDE  
2 Controller  
15 SE422  
10 808SX/SN  
4 808S  
OUTSIDE BUILDING  
OUTSIDE BUILDING  
HARD PASS BACK ZONE 2  
HARD PASS BACK ZONE 2  
0
NO  
READERS  
This report lists all readers defined in the system. A sample screen follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5-16  
SECTION 5: MASTER FILE REPORTS  
READERS — SAMPLE REPORT  
06/03/96  
12:57  
LOVELL-WATKINS INC.  
Reader Master Report  
Page  
1
Reader Reader Description Comp # Poll Dev Sen Point Type Zone  
______ __________________ ______ ____ ___ ___ __________ ____  
Dir  
___  
Disd Dsid Desc Rex Rex Desc  
____ _________ ___ ________  
295  
RM-A EAST ENTRY  
1
16  
1
1 Acc Ctrl  
Tmcd Start End  
____ _____ _____ ___ ___ ___ ___ ___ ___ ___ ___  
1
N/A  
2241 2240  
Mon Tue Wed Thu Fri Sat Sun Hol  
1
00:00 23:59  
Y
Y
Y
Y
Y
Y
Y
Y
296  
RM-A WEST ENTRY  
1
16  
1
2 Acc Ctrl  
1
N/A  
2245 2244  
Tmcd Start End  
Mon Tue Wed Thu Fri Sat Sun Hol  
____ _____ _____ ___ ___ ___ ___ ___ ___ ___ ___  
1
00:00 23:59  
Y
Y
Y
Y
Y
Y
Y
Y
POINTS  
This report lists all points defined in the system. A sample screen follows:  
POINTS — SAMPLE REPORT  
07/16/96  
11:51  
Datastyles, Inc  
Point Master List  
Page 1  
Point Point Description  
_____ ____________________ _____ ____ ___ ___ ___ __________ ____ ____  
93 LOT 1 (IN) DS  
Comp# Pol Dev Sen Con Point Type Zone Trace I/O Enable Normal  
___ ______ ______  
IN OPEN  
0
1
1
1
1
Door Switch0  
NO  
Tmcd Start  
____ _____  
End  
Mon Tue Wed Thu Fri SatSun Hol  
_____ ___ ___ ___ ___ ___ ______ ___  
06:00 Y Y Y Y Y Y Y Y  
2
17:00  
94 LOT 1 (IN) RX  
0
1
1
1
2
Open on Rex0  
NO  
IN  
OPEN  
Tmcd Start  
____ _____  
End  
Mon Tue Wed Thu Fri SatSun Hol  
_____ ___ ___ ___ ___ ___ ______ ___  
23:59 Y Y Y Y Y Y Y Y  
1
00:00  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 5: MASTER FILE REPORTS  
AUTO OPENS / ACTIVATES  
5-17  
Thisreportlistssystempointsandreaderswhichhaveauto-openorauto-activatetimes. Asample  
screen follows:  
AUTO OPEN / ACTIVATE — SAMPLE REPORT  
03/25/96  
08:54  
Security Electronics  
Auto Open/Activate Master List  
Page 1  
Point Point Description  
Point Type Tmcd Start End  
Mon Tue Wed Thu Fri Sat Sun Hol  
_____ ___________________________ ___________ _____ _____ _____ ___ ___ ___ ___ ___ ___ ___ ___  
1830  
1850  
1870  
8240  
818 #7 DOOR #3 +VIP  
818 #7 DOOR #5  
818 #7 DOOR #7  
READER  
READER  
READER  
READER  
9
14  
16  
6
10:35 10:40  
11:29 12:31  
11:59 13:01  
15:39 15:39  
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
N
N
N
N
N
N
N
N
N
N
N
N
TIM’S 804S DOOR 4  
808 REPORT DEFINITION  
This report lists all action reports defined for the system 800-series ACUs. A sample screen  
follows:  
808 REPORT DEFINITION —SAMPLE REPORT  
03/05/96  
15:22  
Security Electronics  
808 Report Definition  
Page  
1
100  
DIAL-UP 808 #1  
Y
Report  
1
Send To Host  
Close Latch  
Close Output  
Bldg Open  
Bldg Limited  
Bldg Closed  
N
N
N
Y
Y
Y
1
Y
Y
1
Time Code  
Time Code  
Time Code  
Contact Number  
Print Asterisk With Log  
N
Prevent Building Closure  
N
Download from Www.Somanuals.com. All Manuals Search And Download.  
5-18  
SECTION 5: MASTER FILE REPORTS  
808 DEVICE CONFIGURATION  
This report lists configuration information for the system 800-series ACUs. A sample screen  
follows:  
808 DEVICE CONFIGURATION — SAMPLE REPORT  
06/05/96  
15:25  
Simms Oil Corporation  
808 Device Configuration  
100 DIAL-UP 808 #1  
Level Name  
Password  
Reports  
Key Definition  
A
A
B
C
OPERATOR MGR NEW  
G. SAYLES SAYLSG  
LYNN VAUGHAN LYNSID  
TIM JONES TJO123  
Tamper  
Power Fail  
Override  
9 Primary Key Type  
4 Aux. Key Type  
1 Facil Code  
1060  
NONE  
*
Alt Facil Code  
A000  
DIALERS  
Thetwodialerreporttypesdetailtheremotedialupinterface(RDI)devicesdefinedforthesystem  
or those RDI devices which have experienced communication trouble. A sample screen follows:  
DIALERS — SAMPLE REPORT  
03/25/96  
09:00  
Security Electronics  
Dial Master Report  
Page  
1
Device  
______  
Device Description  
__________________  
Remote Number  
_____________  
Last Date  
_________  
Last Time  
_________  
Who Called # Trans # Failures  
__________ _______ __________  
900  
RDI - ALPHA LAB  
4921342  
02/19/94  
17:10  
Host  
0
1
SITE DEFINITION  
This report lists all site groups and codes defined for the system. A sample screen follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 5: MASTER FILE REPORTS  
5-19  
SITE DEFINITION — SAMPLE REPORT  
03/25/96  
09:02  
Security Electronics  
Site Code Master Report  
Page 1  
Group  
_____  
Code  
____  
1
100  
101  
0000  
1000  
1001  
7279  
6016  
ABA CONFIGURATION  
This report lists all the ABA configurations defined for the system, and gives the configuration  
parameters. A sample screen follows:  
ABA CONFIGURATION — SAMPLE REPORT  
03/25/96  
09:17  
Security Electronics  
ABA Configuration Report  
Page 1  
Configuration ID  
1000  
Start  
Length  
Key  
Key  
Key  
A
B
C
1
4
10  
3
2
3
Expiration Date Start  
ABA Key Data Action  
15  
0
Site Code Start  
20  
During Fail Soft  
Deny Access  
Deny Access  
Based on key number  
Based on site code  
Based on expiration date  
Use site code as key  
N
N
N
N
N
N
N
N
Download from Www.Somanuals.com. All Manuals Search And Download.  
5-20  
SECTION 5: MASTER FILE REPORTS  
DKR CONFIGURATION  
The reports lists the system default DKR parameters. A sample screen follows:  
DKR CONFIGURATION — SAMPLE REPORT  
06/12/96  
15:21  
Lotus Refineries  
DKR Configuration Report  
Page 1  
Beeper Times  
Config. ID Send Once Read Range Number of Reads Read Time On Off Total  
255 100 20 30 20  
Red LED Times Green LED Times  
On Off Total On Off Total  
0 0  
1
Y
1
0
0
0
0
SE 422 PIN MASTER REPORT  
This report lists keyholders having system-calculated SE 422 PIN numbers. A sample screen  
follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 5: MASTER FILE REPORTS  
5-21  
SE 422 PIN MASTER REPORT — SAMPLE  
03/25/96  
09:22  
Soames Industries  
SE/422 Quick List  
Page 1  
Keyholder  
Key No  
Keyholder Name  
Dept Jobcat Phone  
Title  
Loca Floor  
422Pin  
___________ ______  
_______________________ ____ ______ ___________ __________ ____________ ______  
6109 1895573 Duane Eddie  
1
1
1
1
3
3
3
3
Assembler Main Mfg Flr 60030  
Assembler Main Mfg Flr 31949  
Assembler Main Mfg Flr 32112  
Assembler Main Mfg Flr 35976  
6110 1784422 Juarez Sandi  
6112 1901112 De Witt Charles  
6113 1788122 Ames Linda  
132-COLUMN REPORT DISPLAY  
The local print program was originally written to accommodate an 80-character terminal display.  
Some terminals now use up to 132 characters, and the new 132-Column Report Display feature  
allows for this. The terminals are: HP700/44; HP700/92; Color PC terminals using Reflections 4  
terminalemulationsoftware. Thefeatureisautomaticallyenabled,andautomaticallyresumesthe  
80-character display mode when the user exits the report program. A sample 132-character  
display follows:  
NOTE  
1. When in the 132-column mode, the terminal scrolls one half page at a time.  
2. This new feature is not supported by the HP console terminal provided with the host and LC  
systems.  
132-COLUMN REPORT — SAMPLE DISPLAY  
Point Point Description  
Zone Date  
Time  
Access Type  
Keyholder Keyholder Name  
Key No  
______  
_____ ___________________ ____ ________ ________ __________________________ _________ _______________  
8110 TIM's 808SX DOOR 1  
8110 TIM's 808SX DOOR 1  
8110 TIM's 808SX DOOR 1  
8110 TIM's 808SX DOOR 1  
801 11/18/96 07:28:26 PROJECT ACCESS GRANTED  
801 11/18/96 07:28:06 INVALID PROJECT  
801 11/16/96 08:32:58 PROJECT ACCESS GRANTED  
801 11/16/96 08:22:10 PROJECT ACCESS GRANTED  
123456789 TIM H+P+SMF  
123456789 TIM H+P+SMF  
123456789 TIM H+P+SMF  
123456789 TIM H+P+SMF  
5825175  
5825175  
5825175  
5825175  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 6  
SYSTEM ADMINISTRATION  
INTRODUCTION  
The administration functions are used to control and maintain the system. These functions are  
accessed from the system administration menu, [sys_menu], via the main menu. (Depending on  
the operator's program security level, some or all of these functions may not be available.) A  
sample screen follows:  
SECTION ORGANIZATION  
Theproceduresinthissectionareintheordershowninthesystemadministrationmenu (above).  
The associated subscreens also follow in order. After the current screen has been saved, most  
subscreens display by pressing F2 but some display automatically.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6-2  
SECTION 6: SYSTEM ADMINISTRATION  
ADDITIONAL INFORMATION  
Additional system administration-related information is provided at the conclusion of this section.  
ADD USERS [addusers]  
The add users screen, [addusers], is entered to add, change, or delete system users / operators.  
IMPORTANT  
The administration log-on and password must be used to access this screen. If you are already  
logged on with your regular password, first log off in the normal way, then log on again using the  
administration log-on and password.  
A sample [addusers] screen follows:  
User Name. Required. Enter the user name (first eight letters of last name recommended).  
Keyholder ID. Optional. User's keyholder ID. Default is 0. You should have a keyholders  
ID assigned to you. When you enter this menu, your name is displayed at the top of the  
screen.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 6: SYSTEM ADMINISTRATION  
6-3  
Program Security Level. Optional (range 1—9999). Code number indicating the specific  
screens the user can access. Default is 1 (complete access).  
Tenant. Optional. Enter tenant number (if applicable). Default is tenant 0.  
"
#
Monitoring Group. Optional. System code indicating transaction types available to this  
user. Default is * — All transaction types.  
Transactions may be defined as elements of monitoring groups. For example, access  
granted transactions could be placed in monitoring group A, door forced open transactions  
could be placed in monitoring group B, all other transactions could be placed in monitoring  
group 0 (zero)—the field default. Assignments for these groups could be:  
Group A — Assigned to those who need only to monitor day-to-day access granted  
transactions.  
Group B — Assigned to security guards who need to see all door forced open transac-  
tions.  
Group 0 — Assigned to the system administrator who needs to see all transactions.  
Monitoring Security Level. System code (0, 1, or 2) indicating the user's monitoring / data  
changing capabilities. Monitoring security level 0 allows full monitoring / changing capabili-  
ties, including disabling points and halting pollers. Monitoring security level 1 is recom-  
mended for general use, since it permits a user to control certain functions, such as doors,  
but not pollers and points. Monitoring security level 2 limits users to a purely observational  
capacity; no functions can be controlled.  
$
IMPORTANT  
1. We recommend that level 0 be assigned only to completely trained and responsible  
personnel, since some level 0 operations could easily disable the system if not  
performed correctly.  
2. Enter C inthisfieldtousethenewenhancedsecuritymonitoringfeature(seeEnhanced  
Monitor Security below).  
Allow Alarm Servicing. Y / N / F field indicating if the user has the authority to respond to  
alarms in the monitor program, or enter F if the alarm fast acknowledgment feature is to be  
allowed.  
%
&
Jump Alarm Servicing. Y / N field indicating if the user has the authority to automatically  
jump to alarm servicing from monitor when an alarm occurs.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6-4  
SECTION 6: SYSTEM ADMINISTRATION  
Jump Timer Servicing. Y / N field indicating if the user has the authority to automatically  
'
jump to timer servicing from monitor when an timer event occurs.  
Language. The code number entered will determine what language the system will use for  
ꢀꢁ  
11  
this user. Valid choices are 1=English, 2=French.  
Real-Time Maps Security Level. 0=Complete functionality, 2=View maps only (no control  
capabilities).  
MODIFY PASSWORDS [mod_pass]  
Usethemodifypasswordscreentochangeanexistingpassword(mustbeloggedinas addusers).  
Enter the user name, then follow screen prompts. A sample screen follows:  
Enter the password twice to confirm it.  
NOTE  
If you enter a user name but then decide that the password does not need to be changed, then  
the current password must be reentered.  
Toreturntothesystemadministrationmenuafterthenewpasswordhasbeenentered, firstpress  
Enter to return to  
then press Enter again.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 6: SYSTEM ADMINISTRATION  
6-5  
PROGRAM SECURITY [sec_menu]  
PROGRAM SECURITY LEVEL ENTRY [pgacentr]  
Begin creating program security level types by first displaying the program security level entry  
screen [pgacentr]:  
2
1
Enter the security level number (four digits maximum).  
Enter a description (30 characters maximum).  
1
2
Press F6 Store, then press F2 for the program security level definition screen  
PROGRAM SECURITY ENTRY DEFINITION [pg1_entr]  
Press F7; the first six system data items display:  
Arrow down to the first system item for this new security level; press F1. The system displays the  
program name and description to the left, and the add/update/delete fields to the right. For  
example:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6-6  
SECTION 6: SYSTEM ADMINISTRATION  
Enter Y or N in the add/update/delete fields to give or deny access to these functions on the  
selected screen. If you do not make any Y/N selection in the Add, Update, and delete fields, the  
keyholder will not have access to the screen. Press F6 Store and then, before any other action is  
taken, press F5 to return to the add mode for the next entry. Repeat these actions for all items  
in the new security level. Note that the Add, Update, Delete fields only apply to screens with this  
capability not to menus.  
NOTE  
1. Add items to an existing program security using the foregoing methods.  
2. To delete an item, first select as shown above then use Esc, d, r.  
COPY SECURITY [mnaccopy]  
It may be easier to copy an existing security level and make changes to this when creating a new  
security level. To do this, display the [mnaccopy] (Copy Program Security) screen, enter the  
existing security level number in the Copy From field and enter the new security level number and  
description in the Copy To field. Make changes to the new security level using the above  
procedures.  
SECURITY MASTER LIST [pgacrprt]  
Use the security master list [pgacrprt] facility to print a listing of all security levels established for  
your system or those for a selected range. A complete list is given in Appendix D: Program  
Security Master List.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 6: SYSTEM ADMINISTRATION  
6-7  
DISPLAY ALL VALID LOGINS [showuser]  
Use the [showuser] screen to identify — by hard copy printout or report display at the system  
terminal — all operators who have access to the system (use the [showwho] (Display All Valid  
Logins)screentodisplayoperatorscurrentlyloggedon. Followpromptswhenthescreendisplays.  
A sample report is recreated below:  
10/23/96  
13:02  
Eton Engineering  
Page 1  
Login Name  
Tenant Security Keyholder  
_________________ ______ _________ _________  
anderson  
melville  
smith  
0
0
0
1
1
1
1123456  
1334229  
1348876  
DISPLAY CURRENT DATE AND TIME [showdate]  
Usethe[showdate]screentodisplaythecurrentsystemdateandtime. Asampledisplayfollows:  
DISPLAY ALL USERS WHO ARE LOGGED IN [showwho]  
Use the [showwho] screen to display operators currently logged in (use the [showuser] screen to  
identify all operators who have access to the system). Follow prompts when the screen displays.  
A sample report is recreated below:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6-8  
SECTION 6: SYSTEM ADMINISTRATION  
PURGE A PENDING REPORT [purgrprt]  
Use this feature to halt a report currently being printed (applies only to reports created under your  
ID). The feature can also be used to display reports. Note that if you log on using addusers you  
will have complete printer control.  
ENABLE TERMINALS FOR GLOBAL BEEPING [beepentr]  
This feature is used to enable terminals to beep when an alarm occurs. Obtain terminal IDs (port  
connection — tty___) from system installer and enter with optional description.  
SYSTEM CONFIGURATION (syclmenu)  
CONTROL FILE MAINTENANCE [ctrlentr]  
For informational / custom reporting purposes, certain field titles that display in keyholder record  
screens [key_entr] and [key1entr] can be changed to suit the individual user. Since keyholder  
records may be considered the primary data items for an access control system, many SE 6000  
ownersusethefieldtitlechangefeaturetotailorthesystemtotheirpreciserequirements. Change  
fields A through F and 1 through 7 as required.  
TERMINAL AUTO SWITCH [ctrlentr]. An additional field at the foot of this screen is optionally used to  
set up a particular terminal to automatically switch to the alarm servicing screen (from monitor)  
when an alarm occurs. A sample screen follows:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 6: SYSTEM ADMINISTRATION  
6-9  
EVENTS [evenentr]  
The task / event subsystem is used to program one or more tasks to be automatically performed  
in response to the occurrence of a user-defined event. Tasks and events are linked, and the task  
must be entered and stored before the system allows the creation of a related event. Events can  
initiatethesametask,orasingleeventcaninitiatemultipletasks. Eventscontrolledbyatimecode  
automatically perform the task entered in the activate field at the start of the code and the task  
entered under the deactivate code at the end of the time code. A sample screen follows:  
1
2
3
4
6
5
7
8
Event Serial #. System-assigned. Keeps track of all event entries.  
EventPointID. Required. ThepointIDatwhichaspecifiedtransactionmustoccurtoinitiate  
a task (can be time code or event date initiated).  
Transaction Type. Required. The transaction number which must occur at the specified  
point ID to generate a task (see Appendix C: System Transactions for a list of the system-  
generated transactions numbers).  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6-10  
SECTION 6: SYSTEM ADMINISTRATION  
Modifier. Optional. If applicable, the transaction modifier which defines the event if the  
message is user-defined.  
EventDate. Optional. Ifthetaskreferencedbythiseventistobesystem-initiated, enterthe  
applicable date.  
Event Time. Optional. If the task referenced by this event is to be system-initiated, enter  
the applicable time.  
Time Code. Optional. If the task referenced by this event applies to a specific time code,  
enter the time code number.  
Perform Task ID. Required. Enter the task ID number.  
TASKS [taskentr]  
Usedtosetuptasksforthetask/eventsubsystem. Tasksmustbecreatedbeforetheassociated  
event.  
1
2
3
4
5
6
7
Task Serial #. System-assigned number used to keep track of all tasks.  
Task ID. Required. Enter a user-assigned task ID number. Task IDs do not have to be  
unique. All occurrences of a given task will be executed by an associated event.  
Description. Optional. Enter a brief description of the task.  
Task Point ID. Required. Point ID number controlled by this task.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 6: SYSTEM ADMINISTRATION  
6-11  
Activate Code, Extension. Required. System code number for the type of action to be  
performed. The extension applies to camera presets for pan and tilt, or image verification  
when used with a Polaroid ID-4000 system. See table following this field description list.  
DeactivateCode,Extension. Optional. Ifthistaskistobeautomaticallycontrolledbyatime  
coded event, enter the activate / deactivate code to be executed when the event time code  
ends. See table following this field description list.  
User Interactive. Conditional (applies to event times). A Y/N field to indicate if a timed task  
can be cancelled by an operator.  
ACTIVATE / DEACTIVATE CODES  
09 REQ MANUAL ACCESS  
29 FORGIVE PASSBACK  
41 MANUAL UNLOCK  
45 MANUAL LOCK  
Request to perform manual access.  
Request to forgive passback.  
Unlock a sensor / lock for an unlimited time.  
Lock a sensor /lock.  
46 TIME UNLOCK  
Unlock a sensor / lock for the amount of time specified by the  
hardware settings, or, where applicable, by the amount of time in  
the Unlock Time field of the reader entry screen.  
56 BUILDING OPEN  
Set building mode to OPEN  
Set building mode to LIMITED  
Set building mode to CLOSED  
57 BUILDING LIMITED  
58 BUILDING CLOSED  
70 DEACTIVATE OUTPUT  
Turn off the specified output. Use this code if you are elsewhere  
turning an output on for an unlimited time.  
#
Activate / Deactivate Code Explanation  
71 ACTIVATE OUTPUT  
TurnonaspecifiedoutputfortheamountoftimeshownintheTime  
field on the point entry screen. If Time=0, the output will be on for  
an unlimited amount of time, and you must turn it off with an a  
deactivate output code.  
80 Chain Task  
Jumps to another group of task records and is used to consolidate  
multiple task into a separate task.  
#
Activate/Deactivate Code  
Explanation  
81 EXTENDED PROCESSING Instruct extended processing poller to process a transaction. Use  
with elevator, parking control, VIP2, and poller transactions with a  
point ID which matches the poller record for these functions.  
89 SHUNT POINT  
Shunt a specified point.  
90 UNSHUNT POINT  
Unshunt a specified point.  
91 REQUEST RESET DEVICE Perform a device reset for an applicable device.  
92 REQUEST RESET KEYS Perform a key download for an applicable device.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6-12  
SECTION 6: SYSTEM ADMINISTRATION  
100 ACTIVATE PROJECT  
Activate an inactive project.  
Deactivate an active project.  
101 DEACTIVATE PROJECT  
102 NORMALIZE or  
CLEAR PROJECT  
Change project status to its normal condition (clears an override  
condition).  
TASK EVENT / MASTER REPORT [taskrprt]  
This report shows all tasks / events established in the system:  
04/14/96  
13:02  
ATARAXIA ELECTRONICS  
Page 1  
Task Task Description  
_____ _______________________  
42 UNLOCK DOOR  
Point  
________  
708 #2  
Activate Desc  
_______________  
ENTER ZONE B  
Deactivate Desc  
_________________  
Man Open  
Cancelable  
__________  
N
EVENTS  
7120  
708 #2 ENTER ZONE B  
62 0 KEY NOT ACTIVE No Activity  
Mon Tue Wed Thu Fri Sat Sun Hol  
___ ___ ___ ___ ___ ___ ___ ___  
Tmcd  
____  
1
Start  
_____  
15:30  
End  
_____  
16:15  
Y
Y
Y
Y
Y
N
N
N
TRANSACTIONS [tranentr]  
Customized versions of any system transaction (log message) can be created. The custom  
transactions are created using the transaction entry screen, where they are linked to the point or  
reader screens by a transaction modifier code. The codes are any of the following: A — Z  
(uppercase), a—z(lowercase), 1—9(0isthedefaultmodifierforallstandardtransactions). (Up  
to 62 log messages can be associated with the same event.)  
2
1
4
6
3
5
8
7
10  
12  
9
11  
13  
16  
15  
14  
17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 6: SYSTEM ADMINISTRATION  
6-13  
Transaction Type (ID). The unique ID number of a transaction. The system is pre-  
programmed to use specific transaction types for certain events at certain types of points.  
(See Appendix C: System Transactions for a complete list of standard transactions.)  
TransactionModifier. Requiredasapplicable. Enteratransactionmodifiercodetoindicate  
acustomizedversionofastandardtransaction. Thevaluesare:AthroughZ(alluppercase),  
a through z (all lowercase), 0 through 9.  
TransactionGroup. Forfutureuse. Willpermitthecategorizingoftransactionsintobroader  
groups for easier reporting and editing.  
Alarm Priority. Conditional. Used to declare that a particular transaction is an alarm  
transaction, and to indicate the alarm priority. The range is 1 through 9, with 1 being the  
highest priority and 9 the lowest. Enter 0 for a non-alarm transaction.  
Event/Task Activity. Conditional. Used if the system has been programmed to respond to  
a particular event via the event / task subsystem. Enter 1 to activate the task; enter 2 to  
deactivate the task.  
Time to Acknowledge. Enter a value in minutes to allow for alarm acknowledgment. If the  
alarm is not acknowledged by this time, an ALARM NOT ACKNOWLEDGED message is  
written to the log and repeats at the interval specified until acknowledged.  
Display Color. Determines the transaction display color in the monitor mode. The colors  
are:  
0
1
2
3
4
=
=
=
=
=
Black  
Red  
Green  
Cyan (light blue)  
Blue  
ClearTransaction. Conditional. Enterthealarmclearingtransactionnumber.Forexample,  
with transaction 92 (Alarm Active), enter 93 (Alarm Clear) as the clearing transaction. If a  
clearing transaction is specified, the alarm event cannot be removed from the pending  
alarms screen until the clearing transaction is received.  
MonitorGroup. Usedtoclassifytransactionsintogroups,sothatthedisplayoftransactions  
based on log-in name can be controlled. The default monitor group assignment when users  
are added to the system is * — All monitor groups displayed.  
Printer Color. Determines the color in which this transaction will display when printed on a  
color-capable log printer. The colors are:  
0
1
=
=
Black  
Red  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6-14  
SECTION 6: SYSTEM ADMINISTRATION  
2
3
4
=
=
=
Green  
Cyan (light blue)  
Blue  
Display Icon. For future use.  
PrinterGroup. Eachlogprintermustincludetheselectedprintergroupinitslistofavailable  
printergroups. Iftheselectedprintergroupisnotincluded, thetransactionwillnotbeprinted  
onthelogprinter. Printersarepresettoincludealltransactions(PrinterGroup=*). Toprevent  
a transaction from printing, assign it to a printer group other than 0, then change the printer  
to 0.  
Audible Alert. IndicateswithN(none), S(single), orC(continuous)thetypeofaudiblealert  
which this transaction should produce (applies only if a user is in the monitor mode). If you  
wish to have a terminal alerted whenever this transaction occurs, enter N in this field.  
TransactionLog. Y/Nfieldtoindicateifthistransactionistobestoredinthearchivehistory  
file on disk. The transaction history file is listed using the transaction history report.  
KeyholderLog. Y/Nfieldtoindicateifthistransactionistobestoredinthekeyholderhistory  
fileondisk. Thesystemkeepsasmallareaofdiskspaceavailabletostorethelast20events  
for all individual keyholders in the system. The keyholder history file is listed using the  
keyholder history report.  
Point Log. Y / N field to indicate if this transaction is to be stored in the point history file on  
disk. The system keeps a small area of disk space available to store the last 20 events for  
allindividualpointsinthesystem. Thepointhistoryfileislistedusingthepointhistoryreport.  
Description. Used to define the transaction description displayed on the monitor screen.  
DATABASE MAINTENANCE [db_menu]  
DISPLAY DATABASE STATISTICS [dbstats]  
Display this data regularly to control disk space usage. Note the PUBLIC.archist table size near  
theendofthereport. Thetablesizeindicatesthenumberoftransactionscurrentlystored. Perform  
an archive whenever the row count is roughly 80% of the expected number of rows.  
A message is displayed if the row count reaches the expected number of rows. If this happens,  
archive immediately. Two other tables should be checked regularly and purged if the expected  
number of rows exceeds 80%: PUBLIC.download; PUBLIC.alrmtran.  
PERFORM BACKUP [bkup]  
Two backup types are available — Database and Full Volume:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 6: SYSTEM ADMINISTRATION  
6-15  
DATABASE BACKUP. A database backup copies all information in the database (exceptions user and map  
information). If you make a number of changes to keyholder, hardware, and / or access  
information in a single day, then the database backup should be performed each day. For these  
purposes, use two alternating tapes (one for odd days, one for even) to guarantee that no  
information will be lost in the event of a hardware malfunction.  
FULL VOLUME BACKUP. A full volume backup copies all system data including programs, system  
configurationinformation, anduser/mapinformation. Thebackuptapecreatedisusedtorestore  
the system in the event of a hardware malfunction. A full volume backup should be performed  
immediatelyfollowingsysteminstallation,andthenonamonthlybasisorwhenevertherehasbeen  
a major system update or reconfiguration.  
DOWNLOAD CLEAN UP AND RETRY [downcln]  
Download records are data transferred from the database to computer memory or to intelligent  
remote devices. Each time information is entered and stored in the database, one or more  
download records are created and written to the download file. If the download transfers are  
unsuccessful, the number of records created can increase the download file size to a point where  
systemperformanceisaffected,andtheserecordsshouldbefirstretriedthendeleted. Ingeneral,  
perform a download cleanup when the PUBLIC.download table reaches 80% of the expected  
number of rows, or if it has been necessary to make a significant number of database changes.  
Monitor this table using Display Database Statistics [dbstats].  
If you use a large number of intelligent devices, then this table should be checked frequently. A  
typical time period for cleaning the download table is once per month. Download records are not  
automatically deleted upon successful transfer.  
ACCESS CONTROL TRANSACTION ARCHIVING [accsarch]  
Archiving transfers information from the system hard disk to tape, freeing up space on the hard  
disk for new data. Archiving should be performed regularly to ensure disk integrity. Perform an  
archive when the PUBLIC.archist table reaches 80% of the expected number of rows. Monitor  
this table using Display Database Statistics [dbstats]. Archiving is usually performed monthly or  
everytwomonths.Notethatunlessnecessaryforreportingpurposes,WSErecommendsthatyou  
archive system information when your transaction volume reaches 100,000 records.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6-16  
SECTION 6: SYSTEM ADMINISTRATION  
ALARM TRANSACTION CLEAN UP [alrmcln]  
Each time an alarm is triggered, a record is created and stored in a separate file along with the  
operator's alarm servicing response. This table is then available for reporting using the alarm  
servicing report. Over time, the size of this table grows and takes up excessive space on the hard  
disk. Cleanup this table when the PUBLIC.alrmtran table reaches 80% of the expected number  
of rows. Monitor this table using Display Database Statistics [dbstats].  
JOURNAL ARCHIVE [jourarch]  
Thisfunctioncopiesjournalrecordstotapeandthendeletesthemfromtheharddisk. Thejournal  
archiveprogramarchivesalljournalinformationexceptforthecurrentday. Archivingisperformed  
using the [jourarch] screen:  
JOURNAL REPORTING [jourrprt]  
This function reports all changes to the database. The report prints the column name and value  
for each field of each record that has been entered. With updates, the report shows the record  
before and after the change. Associated operator, and date and time are also reported. A sample  
report follows:  
04/02/96  
De Quincy Laboratories  
Page  
1
12:14  
Audit Trail Report  
Operator  
________________ ____________  
jon  
Table  
Date  
________  
04/02/96  
Time  
_____  
12:07  
Operation Type  
__________________  
Add  
cards  
upbzone:  
ppbzone:  
-1  
-1  
keyisalt: NULL  
priv: N  
SPECIAL JOURNAL REPORTING [josprprt]  
This function produces a formatted history report of all database changes to the keyholders and  
keyholder access assignment Information. Sample screens and reports follow:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 6: SYSTEM ADMINISTRATION  
6-17  
KEYHOLDER LOADING [loadmenu]  
This function copies keyholder IDs and names from an DOS ASCII file to a Unix then creates  
keyholder records. The format of records in the ASCII file must be as follows:  
Keyholder ID ^ALastname ^AFirstname (^A refers to a single control-A character)  
Keyholder ID 1 to 9 digits; both name fields 15 characters maximum  
ID SECURITY MAINTENANCE [ID_menu]  
The ID Security Maintenance function controls access to the information shared by the SE 6000  
and the Polaroid ID-4000 Identification System. It also controls access to selected fields in the  
keyholder record. Add/update functions within the key enter and key-1 enter screen can be  
regulated by user ID.  
ID SECURITY USER ENTRY [ID1_ entr]  
ID Security Maintenance data is created via the ID Security Maintenance menu:  
1
2
Required. Enter the user name.  
Required.Entertheuser'ssecuritygroupnumber.WiththeSE6000,IDsecuritygroupsmust  
exist (or be created via the ZOOM function) before the system administrator can complete  
user entry.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6-18  
SECTION 6: SYSTEM ADMINISTRATION  
ID SECURITY GROUP ENTRY [ID2_ entr]  
This function is used to create ID security groups. A sample screen follows:  
1
2
Required. Enter a unique security group number in the range 1—999.  
Optional. Enter a group description (30 characters maximum).  
ID SECURITY REPORT [ID1_ rprt]  
This function is used to prepare a report showing all users entered into the ID security feature,  
along with tenant and group definition information. A sample of a partial screen and report follow:  
06/26/96  
07:26  
Campbell Engineering  
ID Security Maintenance Report  
Page 1  
Login Name  
Tenant Tenant Name  
Group Group Name  
Add  
Del  
___  
______________ ______ ______________________ ______ ______________________ ___  
JERID  
0 All Encompassing  
1
Complete Record Access Y  
Y
Field  
View Modify  
____ ______  
______________________  
Keyholder ID  
Tenant Number  
Key Number  
Company  
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Dept  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 6: SYSTEM ADMINISTRATION  
6-19  
MISCELLANEOUS INFORMATION  
ADJUSTABLE BAUD RATE—708P / 800 POLLERS  
Multiple baud rates are supported for the diverse mix of communications equipment available for  
the SE 6000 system. The baud rate is set by changing the HOSTBAUD parameter in the  
$DATAPATH/NPOLLER.x filewherexistheassociatedpollernumber. Thebaudrateisentered  
during installation or changed as needed by the system administrator; operator action is not  
required. The baud rate options are:  
Parameter missing  
HOSTBAUD=4  
HOSTBAUD=3  
HOSTBAUD=2  
HOSTBAUD=1  
HOSTBAUD=0  
HOSTBAUD defaults to 4 (9600 bps)  
9600 bps  
4800 bps  
2400 bps  
1200 bps  
300 bps  
NOTE  
1. The baud rate set applies to all devices controlled by the poller.  
2. Thoughfunctional, the300bpsbaudrate(HOSTBAUD=0)isnotrecommendedforthe800-  
series devices. The amount of data downloaded to intelligent ACUs significantly impacts  
overall system performance when inefficient communication facilities are used.  
3. On 708P ACUs, the host port speed on the device is set with dipswitches. Both the device  
and the poller must be set for the same speed.  
708P REX SHUNT TIME RESET  
ThenormaloperationofaREXswitchistoshuntanassociateddoorswitchwhenopeningthedoor  
from the nonreader controlled side, or —and in addition— to automatically unlock the door. Once  
the door switch is toggled, a DOOR HELD OPEN message is generated if the door is not closed  
within the time defined in the door switch point record.  
Designed for high-traffic areas, this feature enhances the REX / Door switch functionality by  
providing a method to reset the door switch timer while the door is being held open. While  
employees continue to present valid keys and to pass through the door (causing the REX point  
to continually change state), the door switch timer is reset each time to the number of seconds in  
the door switch point record, thus preventing a DOOR HELD OPEN message from being  
generated. (The message is generated if the time between key presentation exceeds the time  
value in the record.)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6-20  
SECTION 6: SYSTEM ADMINISTRATION  
This feature is enabled / disabled using the REXEXTEND parameter in the $DATAPATH/  
NPOLLER.x file where x is the associated 708P poller number. The feature is enabled / disabled  
during installation, or may be changed as needed by the system administrator. If changed, the  
pollermustbehaltedandrestartedfortheparameterstotakeeffect. TherecognizedREXEXTEND  
values are:  
Parameter missing  
REXEXTEND=0  
REXEXTEND=1  
REXEXTEND defaults to 0 (feature disabled)  
Feature disabled  
Feature enabled  
NOTE  
The enable / disable condition as set applies to all devices controlled by the poller.  
KEY INVENTORY [invtmenu]  
This feature is used to control system keys. This is an optional feature and does not effect  
operation. The menu screen is accessed from the main menu:  
INVENTORY STATUS CODE MENU [statentr]  
Key codes and descriptions are selected by the user (Code 1=Key in use is frequently set). Other  
code descriptions could be: Key available, Key damaged, Key issued, Key lost, Key reported  
stolen. In most cases, from four to ten (maximum) are set. The key codes and descriptions are  
entered using the key inventory status code entry screen:  
KEY INVENTORY STATUS CODE REPORT [statrprt]  
This report lists established key codes (for a current key status report, see Key Inventory Report  
(following subsection). A sample screen and report follow:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 6: SYSTEM ADMINISTRATION  
6-21  
03/25/96  
15:52  
Ataraxia Electronics  
Inventory Status Code Report  
Page 1  
Code  
____  
1
Code Description  
________________  
AVAILABLE  
ASSIGNED  
2
3
LOST  
4
UNUSABLE  
5
DAMAGED  
6
7
TERMINATED  
REISSUED  
8
9
10  
RECOVERED  
PREVIOUS OWNER  
RESERVED  
KEY INVENTORY ENTRY [cdinentr]  
This function is used to add/change key inventory information (to delete a key record, use the  
system delete record feature — Esc, d, r):  
KEY INVENTORY REPORT [cdinrprt]  
A sample screen and report follow:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6-22  
SECTION 6: SYSTEM ADMINISTRATION  
03/25/96  
15:55  
Alpha Systems  
Key Inventory Report  
Page 1  
Keyholder  
_________  
Keyholder Name  
____________________ ______ ________ _____  
Key No Date  
Time  
Status Descrip  
___________________ ________  
Remarks  
29205  
31408  
33244  
36427  
37441  
THORPE JAMES  
ROSS MICHAEL  
DESJARDINS ROBERT  
JERRY TIMOTHY  
JUDD AL  
29606 06/23/96 13:15  
31409 06/23/96 13:22  
33249 06/23/96 13:25  
36426 06/23/96 13:44  
37444 06/23/96 13:51  
ASSIGNED  
ASSIGNED  
ASSIGNED  
ASSIGNED  
ASSIGNED  
PARKING STICKERS [stkrmenu]  
Thisfeatureisusedtocontrolparkingstickersissuedtokeyholders. Theinitialscreenisaccessed  
from the main menu:  
PARKING STICKER ENTRY [stkrentr]  
Enter the required information; the second parking entry screen automatically displays:  
PARKING STICKER INTERACTIVE DISPLAY [stkrrprt1]  
This function is used to determine keyholder location. Enter the keyholder ID; the location data  
displaysautomatically:  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SECTION 6: SYSTEM ADMINISTRATION  
6-23  
PARKING STICKER MASTER REPORT [stkrprt]  
The report lists assigned parking stickers. A sample screen and report follow:  
06/25/96  
16:00  
Security Electronics  
Parking Sticker Report  
Page 1  
Keyholder Keyholder Name  
_________ _______________________________  
Sticker License  
_______ _______  
28870 TERRY VALE  
500003 2MJK239  
500031 4B03048  
500032 4888308  
500001 2PQS707  
28977 JESS WHITTINGTON  
28993 CHERYL ROBERTS  
29001 PETER VAUGHAN  
Download from Www.Somanuals.com. All Manuals Search And Download.  
APPENDIX A: SYSTEM SCREEN TREES  
A-1  
mainmenu  
monitor  
ctrlmenu  
dispmap  
revtran  
alrmserv  
othrmenu  
ctrlpoll  
ctrldev  
viewmap  
ctrlprnt  
devcomm  
devstat  
insrtns  
psbkfrgv  
manacc  
ctrllock  
ctrlinp  
response  
download  
ctrlout  
rem_dev  
bld_mod  
ctrldoor  
selzone  
monitor  
(Full Screen)  
Screen Location Tree — Monitor Security Activity  
Download from Www.Somanuals.com. All Manuals Search And Download.  
A-2  
APPENDIX A: SYSTEM SCREEN TREES  
mainmenu  
accsmenu  
chstrprt  
acrtrprt  
phstrprt  
excprprt  
almarprt  
whowhere  
ky2nrprt  
rpasrprt  
downrprt  
evptrprt  
Screen Location Tree — Security Management Reports  
Download from Www.Somanuals.com. All Manuals Search And Download.  
APPENDIX A: SYSTEM SCREEN TREES  
A-3  
mainmenu  
fmntmenu  
key_entr  
key1entr  
tmcdentr  
hol_entr  
tententr  
epj_entr  
keycopy  
empgentr  
acc_menu  
prj_entr  
fs_entr  
acoventr  
agdsentr  
acdsentr  
acodentr  
agrpentr  
egrpcopy  
confmenu  
eleventr  
instentr  
zoneentr  
pol_entr  
dev_entr  
areaentr  
usrdmenu  
nexsentr  
areaentr1  
d422entr  
compentr  
deptentr  
d808entr  
rdr_entr  
loc_entr  
usraentr  
job_entr  
usrbentr  
d818entr  
rdr3entr  
rdr1entr  
rdr4entr  
rdr2entr  
autoentr  
pnt_entr  
rdefentr  
nodeentr  
drawmaps  
egrpentr  
pndfentr  
dialentr  
siteentr  
egrpentr1  
abacentr  
dkrcentr  
Screen Location Tree — Master File Entry  
Download from Www.Somanuals.com. All Manuals Search And Download.  
A-4  
APPENDIX A: SYSTEM SCREEN TREES  
mainmenu  
rprtmenu  
key_rprt  
aassmenu  
emrdrprt  
accrmenu  
egrprprt  
acodrprt  
acovrprt  
prj_rprt  
fs_rprt  
instrprt  
agrprprt  
hol_rprt  
epj_rprt  
pro_rprt  
comprprt  
tmcdrprt  
tentrprt  
deptrprt  
loc_rprt  
con_menu  
zonerprt  
dev_rprt  
pnt_rprt  
pol_rprt  
rdr_rprt  
autorprt  
job_rprt  
maprprt  
dconrprt  
siterprt  
rdefrprt  
dialrprt  
abacrprt  
p422rprt  
dkrcrprt  
Screen Location Tree — Master File Reports  
Download from Www.Somanuals.com. All Manuals Search And Download.  
APPENDIX A: SYSTEM SCREEN TREES  
A-5  
Screen Location Tree — Key Inventory  
mainmenu  
invtmenu  
statmenu  
statrprt  
statentr  
cdientr  
cdinrpt  
Screen Location Tree — Parking Stickers  
mainmenu  
stkrmenu  
stkrentr  
stk1entr  
stkrrprt  
stkrprt1  
stkrprt  
Download from Www.Somanuals.com. All Manuals Search And Download.  
A-6  
APPENDIX A: SYSTEM SCREEN TREES  
mainmenu  
sys_menu  
addusers  
Custom  
Security  
Screens  
mod_pass  
showuser  
showdate  
showwho  
"
.
.
.
sec_menu  
mnaccopy  
purgrprt  
accsarch  
beepentr  
db_menu  
pgacentr  
pgacrprt  
syclmenu  
pg1_entr  
tranentr  
ctrlentr  
taskentr  
evenentr  
dbstats  
bkup  
downcln  
taskrprt  
loadmenu  
accsarch  
jourarch  
josprprt  
alrmcln  
jourrprt  
ID_menu  
ID1_entr  
ID2_entr  
ID3_entr  
ID1_rprt  
Screen Location Tree — System Administration  
Download from Www.Somanuals.com. All Manuals Search And Download.  
APPENDIX B: SYSTEM SCREEN HIERARCHIES  
MONITOR SECURITY ACTIVITY  
B-1  
SCREEN TITLE  
monitor  
FUNCTION  
Watch events and activities as they occur; menu to other monitoring and control screens.  
Menu to control functions. Zone selection stays in effect until this screen is exited.  
Select pollers to halt or restart, and to check device communication.  
ctrlmenu  
ctrlpoll  
devcomm Check communication between computer and attached devices.  
ctrldev  
devstat  
ctrllock  
Select devices to reset / shunt / unshunt, and to check status.  
Check point status for a particular device.  
Select locks to open, lock, time open, shunt, unshunt.  
ctrlinp  
Select input points to shunt, unshunt.  
ctrlout  
ctrldoor  
selzone  
Select output points to activate, deactivate, shunt, unshunt.  
Select door switch points to view status, shunt, unshunt.  
Select zone to which the control and monitoring will be limited.  
Page forwards / backwards through the last 5,000 system transactions.  
Display currently pending alarms; provides response instructions, map.  
Display user-created map showing alarm locations.  
revtran  
alrmserv  
viewmap  
insrtns  
Display user-created list of actions to be taken when an alarm occurs at a specific point.  
View copy of alarm instructions; enter actions taken in response to the alarm.  
Display user-created system maps showing alarms, door status, lock status, etc.  
Menu to several system control functions.  
response  
dispmap  
othrmenu  
ctrlprnt  
Reset, turn on, turn off system log printers.  
psbkfrgv  
manacc  
download  
rem_dev  
bld_mod  
monitor  
Restore passback status for a single keyholder, or for all keyholders in the system.  
Allow entry for keyholder who does not have a key (operator and keyholder data logged).  
Extract database information, then update memory for host and attached devices.  
Establish connection with a remotely connected device.  
View and control building modes for individual ACUs or all ACUs in a zone.  
Provides a full-screen display (22 lines) of real-time transactions.  
SECURITY MANAGEMENT REPORTS  
SCREEN TITLE  
accsmenu  
phstrprt  
chstrprt  
excprprt  
acrtrprt  
FUNCTION  
Menu to the security management reporting functions.  
Report last twenty activities which took place at a specific point.  
Report last twenty activities which took place for a specific keyholder.  
Report transactions currently stored on the hard disk.  
Report transactions currently stored on tape.  
almarprt  
whowhere  
downrprt  
k2nrprt  
Report of operator responses to alarms.  
Report number of keyholders in each passback level.  
Report database changes. Serves also as an audit trail of operator activity.  
Report last zone entered (summary or detail). Uses keyholder history as source.  
Report system events — totals for each event within a selected date range.  
Report real-time zone passback activity showing how many and / or who is currently in  
which zone. Uses shared memory data as source.  
evptrprt  
rpasrprt  
MASTER FILE ENTRY  
SCREEN TITLE  
FUNCTION  
key_entr  
Enter primary keyholder information: keyholder ID, key number, name, tenant, etc.  
Enter keyholder personal information: address, phone, title, floor, remarks, etc.  
key1entr  
empgentr Assign access privileges to a keyholder.  
epj_entr Assign projects to a keyholder.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
B-2  
APPENDIX B: SYSTEM SCREEN HIERARCHIES  
Create new keyholder record by copying from an existing keyholder record.  
key_copy  
egrpentr  
Select a keyholder for access privilege assignment. Can also be reached from key1entr.  
Assign access privileges to a keyholder.  
egrpentr1  
egrpcopy  
acc_menu  
Copy one keyholder's information to another keyholder.  
Menu to reach the access definition functions.  
acdsentr  
acodentr  
Enter / modify access code information.  
Add key readers to an access code.  
eleventr Enter elevator output contact information for a specific reader in a specific access code.  
acoventr  
agdsentr  
agrpentr  
Temporarily override keyholder or keyholder group access.  
Enter / modify access groups.  
Add access codes to an access group.  
Enter / modify fail-soft access capabilities for a 708P.  
Define projects, start / stop dates and times.  
Enter / modify time code information.  
Enter / modify holiday information.  
fs_entr  
prj_entr  
tmcdentr  
hol_entr  
tententr  
Enter / modify tenant information.  
instentr  
Enter / modify alarm point information  
Menu to the system configuration functions.  
Enter / modify zone information.  
confmenu  
zoneentr  
areaentr  
Enter / modify areas.  
areaentr1Enter / modify zones in areas.  
pol_entr  
dev_entr  
Enter / modify poller information.  
Enter / modify device information .  
nexsentr  
Enter / modify information specific to NexSentry.  
Enter / modify information specific to 808S.  
d808entr  
d818entr  
d422entr  
Enter / modify information specific to 818x.  
Enter / modify information specific to SE 422.  
Enter / modify reader / key pad information.  
rdr_entr  
rdr1entr  
rdr2entr  
rdr3entr  
rdr4entr  
Enter / modify reader information specific to 808S.  
Enter / modify reader information specific to SE 422.  
Enter / modify reader information specific to 818x.  
Enter / modify reader information specific to NexSentry.  
Enter / modify point information.  
pnt_entr  
autoentr  
rdefentr  
pndfentr  
nodeentr  
Enter auto-activation / auto-opening times for points / readers.  
Define 808S action reports.  
Define default number of digits and seed the PIN (SE 422).  
Enter / modify sub-device information for SE 422.  
Enter / modify remotely connected device information.  
Define site configuration for SE 422.  
dialentr  
siteentr  
abacentr  
dkrcentr  
usrdmenu  
compentr  
deptentr  
loc_entr  
job_entr  
usraentr  
usrbentr  
drawmaps  
Define ABA (magnetic stripe card) configuration.  
Define digital key reader configuration.  
Menu to the user-defined field entry screens.  
Enter / modify user-defined field A (appears on key_entr).  
Enter / modify user-defined field B (appears on key_entr).  
Enter / modify user-defined field C (appears on key_entr).  
Enter / modify user-defined field D (appears on key_entr).  
Enter / modify user-defined field E (appears on key_entr).  
Enter / modify user-defined field F (appears on key_entr).  
Create real-time control maps / alarm location maps.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
APPENDIX B: SYSTEM SCREEN HIERARCHIES  
MASTER FILE REPORTS  
B-3  
SCREEN TITLE  
rprtmenu  
key_rprt  
FUNCTION  
Menu to database reporting functions.  
Report keyholder information.  
aassmenu  
egrprprt  
emrdrprt  
accrmenu  
acodrprt  
agrprprt  
acovrprt  
fs_rprt  
Menu to the access assignment reporting functions.  
Report access codes / access groups assigned to keyholders.  
Report specific readers assigned to keyholders.  
Menu to the access definition reporting functions.  
Report readers and time codes for the access codes.  
Report access assignments for access groups.  
Report access override data.  
Report fail-soft access privileges for 708P.  
Report all projects.  
prj_rprt  
epj_rprt  
pro_rprt  
tmcdrprt  
hol_rprt  
tentrprt  
Report all keyholders assigned to projects.  
Report all projects / readers included in individual projects.  
Report all time codes.  
Report all defined holidays.  
Report all defined tenants.  
comprprt  
deptrprt  
loc_rprt  
job_rprt  
instrprt  
Report all user-defined field A information.  
Report all user-defined field B information.  
Report all user-defined field C information.  
Report all user-defined field D information.  
Report all alarm instructions.  
map_rprt  
con_menu  
zonerprt  
pol_rprt  
dev_rprt  
rdr_rprt  
pnt_rprt  
autorprt  
rdefrprt  
dconrprt  
dialrprt  
Report all map names for specific point IDs.  
Menu to the system configuration reporting functions.  
Report all defined zones.  
Report all defined pollers.  
Report all defined device information.  
Report all defined readers.  
Report all point information  
Report all point / reader auto-activate / auto-open information  
Report all defined 808S action report information.  
Report all remotely connected devices.  
Report all remote site information.  
siterprt  
Report all defined ABA sites  
abacrprt  
dkrcrprt  
p422rprt  
Report all defined ABA configurations.  
Report all digital key reader information.  
Report all keyholders for SE 422 (detailed or summary).  
KEY INVENTORY  
SCREEN TITLE  
invtmenu  
statmenu  
statentr  
FUNCTION  
Menu to key Inventory functions.  
Menu to the status definition functions.  
Enter key inventory status codes.  
Report all inventory status codes.  
Enter key data.  
statrprt  
cdinentr  
cdinrprt  
Report inventory information for all keys.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
B-4  
APPENDIX B: SYSTEM SCREEN HIERARCHIES  
PARKING STICKERS  
SCREEN TITLE  
stkrmenu  
stkrentr  
stk1entr  
stkrrprt  
FUNCTION  
Menu to parking sticker and license plate management functions.  
Select keyholder for parking sticker and / or license plate information entry.  
Enter parking sticker or license plate information for keyholder.  
Locate keyholder by license plate or parking sticker.  
stkrrprt1  
stkrprt  
Display keyholder location information by license plate or parking sticker number.  
Report all parking sticker / license plate information.  
SYSTEM ADMINISTRATION  
SCREEN TITLE  
sys_menu  
addusers  
mod_pass  
sec_menu  
pgacentr  
FUNCTION  
Menu to the system administration functions.  
Add operator to system.  
Change operator passwords.  
Menu to the security level definition functions.  
Create / modify security levels.  
pg1_entr  
Add / modify screen information for a particular security level.  
Create new security level by copying existing security level then modifying.  
Report all defined security levels.  
mnacopy  
pgacrprt  
showuser  
showdate  
showwho  
purgrprt  
beepentr  
syclmenu  
ctrlentr  
Display all system operators.  
Display current system date and time.  
Display operators currently using the system.  
Cancel submitted reports.  
Define terminals for alarm response (beep) regardless of system area where operating.  
Menu to system configuration functions  
Change report titles / user-defined fields. Define terminal for automatic alarm response.  
Enter / modify event information.  
evenentr  
taskentr  
taskrprt  
tranentr  
dbmenu  
dbstats  
Enter / modify task information.  
Report all tasks / events.  
Enter / modify transaction information (controls data display and storage).  
Menu to the database administration functions.  
Display size of database tables (determines if archiving is required).  
Backup database to tape.  
bkup  
downcln  
accsarch  
alrmcln  
Remove unwanted records from the download file.  
Transfer records from disk to tape to free up disk space.  
Remove operator responses to alarms from disk to free up disk space.  
Copy journal records to tape and remove from disk.  
Report history of all database changes.  
jourarch  
jourrprt  
josrprt  
Report history of all changes to keyholder and keyholder access assignment information.  
Load keyholder information from ASCII files.  
ID security maintenance menu for WSE ID-4000 interface option.  
Enter users, passwords, and privileges for WSE ID-4000 operators.  
Define security groups for WSE ID-4000 operators.  
Define specific operator privileges for a security group.  
loadmenu  
ID_menu  
ID1_entr  
ID2_entr  
ID3_entr  
Download from Www.Somanuals.com. All Manuals Search And Download.  
APPENDIX C: SYSTEM TRANSACTIONS — NUMERICAL SEQUENCE  
C-1  
#
0
1
2
3
4
5
6
7
8
9
10  
Message  
Explanation  
Negative Acknowledge  
Access Granted  
Key Trace  
708P unable to understand message from host.  
Card or keypad entry granted access by ACU or host.  
Card flagged as TRACE has been read.  
A card has been read by a sensor flagged as TRACE.  
Access denied — card not valid at that time.  
Access denied — card not valid that day.  
Access denied — card not valid at that sensor.  
Access denied — card presented prior to issue date.  
Access denied — card presented after return date.  
Access denied — sensor disabled.  
Point Trace  
Invalid Time  
Invalid Day  
Invalid Reader  
Key Not Active Yet  
Key Terminated  
Point Disabled  
Point Not On File  
Sensor or point not defined in the host computer.  
11  
12  
13  
14  
15  
16  
17  
18  
19  
20  
Key Not On File  
Invalid Facility Code  
Manual Unlock  
Manual Lock  
Access denied — key not in ACU or host memory.  
Access denied — wrong facility code (1030/1040 keys only).  
Reader / door manually unlocked.  
Reader / door manually locked.  
Auto Unlock  
Reader / door auto-unlocked by host or ACU.  
Reader / door auto-locked by host or ACU.  
Door with status switch opened without card or REX.  
Door with status switch remains open beyond set time.  
Forced door has now been closed.  
Auto Lock  
Door Forced Open  
Door Held Open  
Door Closed (Forced)  
Door Closed (Held)  
Door held open too long has now been closed.  
21  
22  
23  
24  
25  
26  
Access Requested  
Poller Died  
Valid key presented; host waiting for corresponding keypad entry  
Software poller has failed.  
Poller Can't Open Port  
Poller Started  
Hardware poller has failed (poller device open error).  
Poller started.  
Poller Stopped  
Poller stopped.  
Host Comm. Started  
Communication initiated between host and LC / RLC.  
27  
28  
Host Comm. Stopped  
Printer Off  
Communication ended between host and LC / RLC.  
Log printer switched off.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
C-2  
APPENDIX C: SYSTEM TRANSACTIONS — NUMERICAL SEQUENCE  
#
Message  
Explanation  
29  
30  
Printer On  
Log printer switched on.  
Device Reset  
708P / 8xx-series powered up / re-initialized.  
31  
32  
33  
34  
35  
36  
Return From Failsoft  
Power Failed  
708P communication restored — no longer in failsoft mode.  
708P / 8xx-series with 3708 UPS has lost AC power.  
708P / 8xx-series with 3708 UPS has regained AC power.  
708P / 8xx-series tamper input active.  
Power Restored  
Tamper Active  
Tamper Clear  
708P / 8xx-series active tamper input now cleared.  
Coax cable from ACU to reader shorted.  
COAX Failure  
37  
38  
39  
40  
COAX OK  
Coax cable from ACU to reader repaired.  
Sensor Failure  
Sensor OK  
Printer Error  
ACU has lost communication with reader (open coax).  
Previously failed reader (or open coax) repaired.  
Log printer is not functioning properly.  
41  
42  
43  
Poller Params Reloaded  
Still Held Open  
Host has initialized a poller.  
DOOR HELD OPEN — Second alert message.  
A GENERAL input has been activated.  
Input Point Active  
44  
45  
Input Point Normal  
Timeout Device  
Previously activated GENERAL input point has been cleared.  
Response from polled ACU by host not received within allotted time  
(usually 2 seconds).  
46  
Unable to Lock Door  
Host unable to implement automatic or manual command to lock a  
door (error on lock).  
47  
48  
Unable to Unlock Door  
Unable to Clear Output  
Host unable to implement automatic or manual command to unlock  
a door (error on unlock).  
Host unable to restore output contact to normal (error on output  
clear).  
49  
Unable to Act. Output  
Hostunabletorestoreoutputcontacttoactive(erroronoutput  
clear).  
50  
51  
52  
53  
Not Used  
Reserved for future applications.  
Reserved for future applications.  
Timed unlock command entered.  
Manual access command issued.  
Not Used  
Manual Unlock Timed  
Manual Access Granted  
Download from Www.Somanuals.com. All Manuals Search And Download.  
APPENDIX C: SYSTEM TRANSACTIONS — NUMERICAL SEQUENCE  
C-3  
#
Message  
Explanation  
54  
55  
56  
58  
59  
60  
Device Online  
ACU communicating with host.  
Request Manual Access  
(Building Closed Trace)  
Repack OK  
Manual access command entered.  
Obsolete message  
Host has loaded new database information.  
Building mode command unsuccessful.  
Key presented to activate reader — activate card enabled.  
Error Setting Bldg. Mode  
Key Activated  
61  
62  
63  
64  
65  
66  
67  
68  
69  
70  
71  
72  
73  
74  
75  
76  
Key Deactivated  
Key Not Active  
Key presented to deactivate reader — deactivate card enabled.  
Access denied — key applies to activate reader.  
Host rebooted or clock has crossed 00:00.  
Dial-up device transmission received by host.  
Host has called a dial-up device.  
New Day  
Remote Trans Received  
Host Dial OK  
Error Dialing Remote  
Output Activated  
Output Deactivated  
Invalid PIN Entered  
Redundancy On  
Redundancy Off  
Host Poller Down  
Acknowledge DB Xfer  
Failed DB Xfer  
Download errors to remote dial-up device encountered.  
Output contact manually or automatically activated.  
Output contact manually or automatically deactivated.  
PIN entered incorrect.  
Not used at this time.  
Not used at this time.  
Not used at this time.  
Data successfully downloaded to target device.  
Data download attempt to target device failed.  
PIN entered without valid key presentation.  
No Key Set for PIN  
Keyholder Duress  
PIN entered in reverse sequence indicating a duress situation. If  
valid, access is granted.  
77  
Controller Comm Error  
Host to local controller communication failed.  
78  
79  
80  
81  
82  
RDI Dialed In  
RDI unit has dialed host and is logged in.  
Optional parking function.  
Optional parking function.  
Alarm event resolved.  
Lot Full  
Max Tenant In Lot  
Alarm Resolved  
Enter Attended Mode  
Optional parking function.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
C-4  
APPENDIX C: SYSTEM TRANSACTIONS — NUMERICAL SEQUENCE  
#
Message  
Explanation  
83  
84  
85  
86  
Enter Unattended Mode  
Batch Request Received  
Remote Comm Ended  
Global Silence Request  
Optional parking function.  
Not used at this time.  
Not used at this time.  
Silence global beeping command issued.  
89  
90  
Ticket Serviced  
Parking application has completed ticket update/storage activities.  
Difference exists between host and ACU system data.  
Chksum Err In Sys DB  
91  
92  
93  
94  
Chksum Err In Key DB  
Alarm Active  
Difference exists between host and ACU key data.  
Alarm input active.  
Alarm Clear  
Previously active alarm input cleared.  
Device / point shunt command issued.  
Shunt Point  
95  
96  
97  
98  
Unshunt Point  
Device / point unshunt command issued.  
Reserved for future applications.  
Not Used  
Parameter Load Error  
Tran File Almost Full  
Host poller initialization failed.  
Archive history file approaching capacity. Archive immediately.  
99  
Database Error  
Data to database failed. There may be many possible causes.  
Access denied — passback status.  
100 Passback Violation  
103 Building Open  
808-series — ACU in open mode.  
104 Building Open Limited  
105 Building Closed  
808-series — ACU in limited mode.  
808-series — ACU in closed mode.  
106 Tamper Report Shunted  
8xx-series ACUs — device tamper report is shunted.  
107 Tamper Report Unshunt  
108 Request To Exit  
109 REX Denied  
8xx-series ACUs — device tamper report is unshunted.  
REX contact activated during valid REX time.  
REX contact activated during invalid REX time.  
MSM failed.  
110 MSM Fail  
111 MSM Okay  
Previously failed MSM repaired.  
112 Door Report Shunted  
113 Door Report Unshunted  
114 Power Report Shunted  
Door forced report shunted.  
Door forced report unshunted.  
Device power fail report shunted.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
APPENDIX C: SYSTEM TRANSACTIONS — NUMERICAL SEQUENCE  
C-5  
#
Message  
Explanation  
115 Power Report Unshunted  
116 COAX Report Shunted  
117 COAX Report Unshunted  
118 Sensor Report Shunted  
119 Sensor Report Unshunted  
120 MSM Report Shunted  
Device power fail report unshunted.  
Reader coax fail report shunted.  
Reader coax fail report unshunted.  
Sensor / reader fail report shunted.  
Sensor / reader fail report unshunted.  
8xx-series ACU MSM fail report shunted.  
121 MSM Report Unshunted  
122 Power Report Shunted  
8xx-series ACU MSM fail report unshunted.  
8xx-series ACU MSM power fail report shunted.  
123 Power Report Unshunted  
124 Bldg Opened  
8xx-series ACU MSM power fail report unshunted.  
8xx-series ACU MSM power fail report shunted.  
8xx-series ACU placed in limited mode.  
125 Bldg Opened Limited  
126 Bldg Closed  
8xx-series ACU placed in closed mode.  
127 Bldg Should be Closed  
128 Can't Close Bldg (Key)  
8xx-series ACU in time period where it should be closed.  
8xx-series ACU cannot be placed in closed mode because proper  
key not presented.  
129 Can't Close Bldg - User  
8xx-series ACU cannot be placed in closed mode because of user  
actions.  
130 Terminal Buffer Full  
131 Device Cannot Connect  
132 Alarm Silenced  
8xx-series host port log buffer at capacity.  
8xx-series ACU unable to communicate with host / dial-up interface.  
8xx-series ACU silenced by a user connected through the ACU  
terminal port.  
133 Forgive Passback  
Passback status on card / card group set to unknown.  
No longer used.  
134 Invalid T & A Request  
135 Time & Attendance Clock  
136 Meal Counter - Excp.  
137 Meal Counter - Valid  
138 and 139  
Key presented at a valid time and attendance reader.  
Keyholder over meal limit.  
Key presented at valid meal counter reader.  
Reserved for future applications.  
140 User Logged Into Term  
141 User Logged Off Term  
User logged on to 8xx-series ACU via the terminal port.  
User logged off an 8xx-series ACU via the terminal port.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
C-6  
APPENDIX C: SYSTEM TRANSACTIONS — NUMERICAL SEQUENCE  
#
Message  
Explanation  
142 Host Dial Start  
143 Carrier Off  
Remote device dialing host.  
SE 422—Incoming phone line or host port has lost DTR.  
SE 422 — Incoming phone line or host port DTR high.  
SE 422 — Log buffer purged.  
144 Carrier On  
145 Logs Purged  
146 Threshold Met  
147 Deferred Key  
148 Auto Forgive  
149 Zone Count Reset  
SE 422 — Logs have met user-defined threshold.  
Key referred to host for access decisions.  
Automatic forgive passback issued.  
Count for a particular zone or all zones reset.  
150 Req. Passback Forgive  
151 Timer Started  
Forgive passback command issued.  
Not used at this time.  
152 Timer Cancelled  
Not used at this time.  
153 Timer Expired  
Not used at this time.  
154 Request Reset Device  
155 Request Reset Keys  
Operator initiated device reset from devices menu.  
Operator initiated key reset from devices menu.  
156 Reset Device Okay  
Affirmative response following device reset command.  
157 Reset Key Okay  
158 Error on Device Reset  
159 Error on Key Reset  
160 Open Cash Drawer  
161 Invalid Card Type  
162 Line Cut  
Key information successfully reset in 8xx-series ACU.  
Unable reset memory / system data for 8xx-series ACU.  
Unable reset key data for 8xx-series ACU.  
Parking attendant cash drawer opened improperly.  
Wrong type magnetic stripe card presented.  
SE 422 input line cut.  
163 Line Short  
SE 422 input line shorted.  
164 through 169  
Reserved for future applications.  
170 Over Device Limit  
171 Invalid Site Code  
172 ABA Card Expired  
System configuration has exceeded specified limits.  
Site code not on file or invalid.  
ABA card presented has expired.  
173 ABA Card Data 1  
174 ABA Card Data 2  
175 ABA Card Data 3  
176 ABA Card Data 4  
177 ABA Card Data 5  
Five 40-character lines (maximum) encoded on ABA cards.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
APPENDIX C: SYSTEM TRANSACTIONS — NUMERICAL SEQUENCE  
C-7  
#
Message  
Explanation  
178 VIP Failure  
VIP keypad not responding.  
VIP keypad returned from failed status.  
VIP tamper fail reported.  
VIP tamper switch OK.  
179 VIP Okay  
180 VIP Tamper Fail  
181 VIP Tamper Okay  
182 VIP Shunted  
VIP shunted.  
183 VIP Unshunted  
184 VIP Tamper Shunted  
185 VIP Tamper Unshunted  
VIP unshunted.  
VIP tamper switch shunted.  
VIP tamper switch unshunted.  
200 Radionics Unit Test  
201 General Trouble  
202 Zone Trouble  
For Radionics systems (for future use).  
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
203 Line Card Trouble  
204 General Restoral Report  
205 Zone Restoral  
206 Line Card Restored  
207 General Opening Report  
208 Zone Opening Report  
209 General Closing Report  
210 Zone Closed  
211 General Cancel Report  
212 Zone Cancel Report  
213 Radionics Unit Power Fail  
214 Radionics Unit Restore  
215 Listen-In Report  
216 Listen Done  
217 Communicator Power Fail  
218 Was Forced Armed  
219 Status Report  
220 Busy Seconds  
221 Error  
222 Power Up Message  
223 Radionics Alarm  
230 Project Activated  
231 Project Deactivated  
232 Project Normalized  
233 Invalid Project  
Project activated.  
Active project deactivated.  
Project normalized.  
Access denied to a project-controlled door (no access privileges).  
240 Alarm Not Acknowledged  
No alarm response within time specified in transaction description  
record.  
241 Alarm Acknowledged  
Alarm acknowledged.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
C-8  
APPENDIX C: SYSTEM TRANSACTIONS — NUMERICAL SEQUENCE  
#
Message  
Explanation  
242 Disk Almost Full  
Disk space at value of DISKWARN parameter (usually 90% full).  
Attempt made to download more keys than the device will hold.  
250 Over Max Key Limit  
300 RDI Full  
RDI transaction buffer full.  
301 RDI Too Hot  
RDI upper temperature limit exceeded.  
RDI lower temperature limit exceeded.  
RDI unable to communicate with 808S.  
RDI has detected an error with its operating hardware.  
RDI has detected a modem error.  
RDI alarm table full or unusable.  
RDI unable to dial out.  
302 RDI Too Cold  
303 RDI Timeout Problem  
304 RDI Hardware Problem  
305 RDI Modem Problem  
306 RDI Alarm Table Error  
307 RDI Comm Error  
308 RDI Host Comm Error  
309 RDI Can't Close 808 DB  
RDI unable to receive.  
RDI unable to complete data transfer to 808S; device left in  
incomplete state.  
500 Debug 0 Transaction  
501 Debug 1 Transaction  
502 Debug 2 Transaction  
503 Debug 3 Transaction  
504 Debug 4 Transaction  
505 Debug 5 Transaction  
WSE development use only.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
APPENDIX C: SYSTEM TRANSACTIONS — ALPHABETICAL SEQUENCE  
C-9  
Message  
#
Message  
#
ABA Card Data 1 ........................................ 173  
ABA Card Data 2 ........................................ 174  
ABA Card Data 3 ........................................ 175  
ABA Card Data 4 ........................................ 176  
ABA Card Data 5 ........................................ 177  
ABA Card Expired ...................................... 172  
Access Granted .............................................. 1  
Access Requested ....................................... 21  
Acknowledge DB Xfer .................................. 73  
Alarm Acknowledged ................................. 241  
Alarm Active ................................................. 92  
Alarm Clear .................................................. 93  
Alarm Not Acknowledged ........................... 240  
Alarm Resolved ............................................ 81  
Alarm Silenced ........................................... 132  
Auto Forgive ............................................... 148  
Auto Lock ..................................................... 16  
Auto Unlock .................................................. 15  
Door Report Shunted ................................. 112  
Door Report Unshunted ............................. 113  
Enter Attended Mode ................................... 82  
Enter Unattended Mode ............................... 83  
Error ........................................................... 221  
Error Dialing Remote .................................... 66  
Error on Device Reset ................................ 158  
Error on Key Reset ..................................... 159  
Error Setting Bldg. Mode .............................. 59  
Failed DB Xfer .............................................. 74  
Forgive Passback....................................... 133  
General Cancel Report .............................. 211  
General Closing Report.............................. 209  
General Opening Report ............................ 207  
General Restoral Report ............................ 204  
General Trouble ......................................... 201  
Global Silence Request................................ 86  
Batch Request Received.............................. 84  
Below Lot Limit ............................................. 88  
Below Tenant Limit ....................................... 87  
Bldg Closed ................................................ 126  
Bldg Opened .............................................. 124  
Bldg Opened Limited.................................. 125  
Bldg Should be Closed............................... 127  
Building Closed .......................................... 105  
Building Open ............................................. 103  
Building Open Limited ................................ 104  
Busy Seconds ............................................ 220  
Host Comm. Started ..................................... 26  
Host Comm. Stopped ................................... 27  
Host Dial OK................................................. 65  
Host Dial Start ............................................ 142  
Host Poller Down.......................................... 72  
Input Point Active ......................................... 43  
Input Point Normal........................................ 44  
Invalid Card Type ....................................... 161  
Invalid Day..................................................... .5  
Invalid Facility Code ..................................... 12  
Invalid PIN Entered ...................................... 69  
Invalid Project............................................ 233  
Invalid Reader ................................................ 6  
Invalid Site Code ........................................ 171  
Invalid T & A Request ................................ 134  
Invalid Time .................................................... 4  
Can’t Close Bldg (Key) ............................... 128  
Can’t Close Bldg - User.............................. 129  
Carrier Off................................................... 143  
Carrier On................................................... 144  
Chksum Err In Key DB ................................. 91  
Chksum Err In Sys DB ................................. 90  
COAX Failure ............................................... 36  
COAX OK ..................................................... 37  
COAX Report Shunted ............................... 116  
COAX Report Unshunted ........................... 117  
Communicator Power Fail .......................... 217  
Key Activated ............................................... 60  
Key Deactivated ........................................... 61  
Key Not Active .............................................. 62  
Key Not Active Yet ......................................... 7  
Key Not On File ............................................ 11  
Key Terminated .............................................. 8  
Key Trace ....................................................... 2  
Keyholder Duress......................................... 76  
Database Error ............................................. 99  
Debug 0 Transaction .................................. 500  
Debug 1 Transaction .................................. 501  
Debug 2 Transaction .................................. 502  
Debug 3 Transaction .................................. 503  
Debug 4 Transaction .................................. 504  
Debug 5 Transaction .................................. 505  
Deferred Key .............................................. 147  
Device Cannot Connect ............................. 131  
Device Online ............................................... 54  
Device Reset ................................................ 30  
Disk Almost Full.......................................... 242  
Door Closed (Forced) ................................... 19  
Door Closed (Held) ...................................... 20  
Door Forced Open........................................ 17  
Door Held Open ........................................... 18  
Line Card Restored .................................... 206  
Line Card Trouble ...................................... 203  
Line Cut ...................................................... 162  
Line Short ................................................... 163  
Listen Done ................................................ 216  
Listen-In Report .......................................... 215  
Logs Purged ............................................... 145  
Lot Full.......................................................... 79  
Manual Access Granted ............................... 53  
Manual Unlock.............................................. 13  
Manual Unlock Timed .................................. 52  
Download from Www.Somanuals.com. All Manuals Search And Download.  
C-10  
APPENDIX C: SYSTEM TRANSACTIONS — ALPHABETICAL SEQUENCE  
Message  
#
Message  
#
Max Tenant In Lot ........................................ 80  
Meal Counter - Excp................................... 136  
Meal Counter - Valid .................................. 137  
MSM Fail .................................................... 110  
MSM Okay.................................................. 111  
MSM Report Shunted ................................. 120  
MSM Report Unshunted ............................. 121  
Remote Comm Ended .................................. 85  
Remote Trans Received .............................. 64  
Repack OK ................................................... 58  
Req. Passback Forgive .............................. 150  
Request Manual Access .............................. 55  
Request Reset Device ............................... 154  
Request Reset Keys .................................. 155  
Request To Exit .......................................... 108  
Reset Device Okay .................................... 156  
Reset Key Okay ......................................... 157  
Return From Failsoft..................................... 31  
REX Denied................................................ 109  
Negative Acknowledge................................... 0  
New Day ....................................................... 63  
No Key Set for PIN ....................................... 75  
Not Used ...................................................... 50  
Not Used ...................................................... 51  
Not Used ...................................................... 96  
Sensor Failure .............................................. 38  
Sensor OK .................................................... 39  
Sensor Report Shunted.............................. 118  
Sensor Report Unshunted.......................... 119  
Shunt Point ................................................... 94  
Status Report ............................................. 219  
Still Held Open ............................................. 42  
Open Cash Drawer..................................... 160  
Output Activated ........................................... 67  
Output Deactivated ...................................... 68  
Over Device Limit ....................................... 170  
Over Max Key Limit .................................... 250  
Parameter Load Error................................... 97  
Passback Violation ..................................... 100  
Point Disabled ................................................ 9  
Point Not On File .......................................... 10  
Point Trace ..................................................... 3  
Poller Can’t Open Port ................................. 23  
Poller Died .................................................... 22  
Poller Params Reloaded .............................. 41  
Poller Started................................................ 24  
Poller Stopped .............................................. 25  
Power Failed ................................................ 32  
Power Report Shunted ............................... 114  
Power Report Shunted ............................... 122  
Power Report Unshunted ........................... 115  
Power Report Unshunted ........................... 123  
Power Restored............................................ 33  
Power Up Message .................................... 222  
Printer Error .................................................. 40  
Printer Off ..................................................... 28  
Printer On ..................................................... 29  
Project Activated ........................................ 230  
Project Deactivated .................................... 231  
Project Normalized ..................................... 232  
Tamper Active .............................................. 34  
Tamper Clear ............................................... 35  
Tamper Report Shunted ............................. 106  
Tamper Report Unshunt ............................. 107  
Terminal Buffer Full .................................... 130  
Threshold Met ............................................ 146  
Ticket Serviced............................................. 89  
Time & Attendance Clock........................... 135  
Timeout Device ............................................ 45  
Timer Cancelled ......................................... 152  
Timer Expired ............................................. 153  
Timer Started.............................................. 151  
Tran File Almost Full .................................... 98  
Unable to Act. Output ................................... 49  
Unable to Clear Output ................................ 48  
Unable to Lock Door .................................... 46  
Unable to Unlock Door ................................. 47  
Unshunt Point ............................................... 95  
User Logged Into Term .............................. 140  
User Logged Off Term................................ 141  
VIP Failure.................................................. 178  
VIP Okay .................................................... 179  
VIP Shunted ............................................... 182  
VIP Tamper Fail ......................................... 180  
VIP Tamper Okay ....................................... 181  
VIP Tamper Shunted .................................. 184  
VIP Tamper Unshunted .............................. 185  
VIP Unshunted ........................................... 183  
Radionics Unit Power Fail .......................... 213  
Radionics Unit Restore .............................. 214  
Radionics Unit Test .................................... 200  
RDI Alarm Table Error ................................ 306  
RDI Can’t Close 808 DB ............................ 309  
RDI Comm Error ......................................... 307  
RDI Dialed In ................................................ 78  
RDI Hardware Problem .............................. 304  
RDI Host Comm Error ................................ 308  
RDI Is Full................................................... 300  
RDI Is Too Cold .......................................... 302  
RDI Is Too Hot............................................ 301  
RDI Modem Problem .................................. 305  
RDI Timeout Problem ................................. 303  
Redundancy Off ........................................... 71  
Redundancy On ........................................... 70  
Was Forced Armed .................................... 218  
Zone Cancel Report ................................... 212  
Zone Closed ............................................... 210  
Zone Count Reset ...................................... 149  
Zone Opening Report................................. 208  
Zone Restoral ............................................. 205  
Zone Trouble .............................................. 202  
Download from Www.Somanuals.com. All Manuals Search And Download.  
APPENDIX D: PROGRAM SECURITY MASTER LIST  
Level 1 = COMPLETE SYSTEM ACCESS  
D-1  
dkrcrprt  
downcln  
downrprt  
DKR Configuration  
Download Clean Up & Retry  
Download Status  
N
N
N
N
N
N
N
N
N
N
N
N
ID1_entr  
ID1_rprt  
ID2_entr  
ID Security User Entry  
ID Security Report  
ID Security Group Entry  
Y
N
Y
N
Y
N
Y
N
Y
N
Y
N
drawmaps Maps  
egrpcopy Copy Keyholder Access  
egrpentr  
egrprprt  
N
Y
N
N
N
N
Y
N
N
N
N
Y
N
N
N
N
Y
N
N
N
N
Y
N
N
N
N
Y
N
N
N
ID_menu ID Security Report  
Access Assignment  
Keyholder Access Assign  
aassmenu Access Assignments  
N
Y
N
N
N
N
N
Y
N
Y
N
N
N
Y
N
N
Y
N
Y
Y
N
N
Y
N
N
N
N
N
Y
N
Y
N
N
N
Y
N
N
Y
N
Y
Y
N
N
Y
N
N
N
N
N
Y
N
Y
N
N
N
Y
N
N
Y
N
Y
Y
N
emp_dnld Keyholder Transfer  
abacentr  
abacrprt  
ABA Configuration Entry  
ABA Configuration  
emrdrprt  
epj_rprt  
evenentr  
evptrprt  
excprprt  
exit  
Reader Access Assignment  
Employee Project Report  
Events  
Event / Point Report  
Selective Transaction  
Exit SE / SMS Application  
acc_menu Access Definition  
accrmenu Access Definition  
accsarch Access Ctrl Trans Arch  
accsmenu Security Management Rpts  
acdsentr  
acodrprt  
acoventr  
acovrprt  
acrtrprt  
Access Code Entry  
Access Code Master Rpt  
Access Override Entry  
Access Override Report  
Access Control Archive  
fmntmenu Master File Entry  
fs_entr  
fs_rprt  
N
Y
N
N
Y
N
N
Y
N
Fail Soft Entry  
Fail Soft Report  
addusers Addusers  
hol_entr  
hol_rprt  
Holidays  
Holidays  
Y
N
Y
N
Y
N
agdsentr  
agrprprt  
almarprt  
alotentr  
alrmcln  
areaentr  
autoentr  
autorprt  
Access Group Entry  
Access Group Master Rpt  
Alarm Servicing  
Tenant Allotment  
Alarm Trans Clean Up  
Areas  
instentr  
instrprt  
invtmenu Key Inventory  
Instructions  
Instructions  
Y
N
N
Y
N
N
Y
N
N
Auto Opens / Activates  
Auto Opens / Activates  
job_entr  
job_rprt  
josprprt  
jourarch  
jourrprt  
Jobcat  
Jobcat  
Special Journal Reporting  
Journal Archive  
Journal Reporting  
Y
N
N
N
N
Y
N
N
N
N
Y
N
N
N
N
badgarch Badge Archiving  
N
Y
N
N
N
Y
N
N
Y
N
N
N
Y
N
N
Y
N
N
N
Y
N
badgentr  
badgrprt  
badtrprt  
bdg1rprt  
beepentr  
bkup  
Badge Entry  
Print Badges  
Offline Badge Reporting  
Badge Report  
Enable Global Beeping  
Perform Backup  
key_copy Copy Keyholders  
key_entr  
key_rprt  
keyload1 Keyholder Loading Prog 1  
ktimentr  
kyznrprt  
N
Y
N
N
Y
N
N
Y
N
N
Y
N
N
Y
N
N
Y
N
Keyholders  
Keys Master  
Keyholder Timer Entry  
Keyholder Zone  
calliq  
AccellIq (Custom Reports)  
Cash Summary  
Key Inventory Entry  
Key Inventory Report  
Keyholder History Report  
N
N
Y
N
N
Y
N
N
N
N
N
Y
N
N
Y
N
N
N
N
N
Y
N
N
Y
N
N
N
casmrprt  
cdinentr  
cdinrprt  
chstrprt  
compentr Company  
comprprt Company  
loadmenu Key Holder Loading  
N
Y
N
N
Y
N
N
Y
N
N
Y
N
N
Y
N
N
Y
N
loc_entr  
loc_rprt  
lsumdel  
lsumentr  
lsumrprt  
Location  
Location  
Delete Lot Sum Records  
Daily Lot Summary  
Daily Lot Summary  
con_menu Device Configuration Rpts  
confmenu Hardware Configuration  
mainmenu SE / SMS Main Menu  
mangrprt Daily Manager’s  
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
N
ctrlentr  
Control File Maintenance  
Y
N
N
N
Y
N
Y
N
Y
N
Y
Y
N
N
N
Y
N
Y
N
Y
N
Y
Y
N
N
N
Y
N
Y
N
Y
N
Y
db_menu Database Maintenance  
maprprt  
mealrprt  
mlwkrprt  
Maps  
Meal Report  
Hours vs. Meals Taken  
dbstats  
dconrprt  
deptentr  
deptrprt  
dev_entr  
dev_rprt  
dialentr  
dialrprt  
Display Data Base Stats  
808 Device Configuration  
Dept  
Dept  
Devices  
Devices  
Dialer Entry  
Dialers  
DKR Configuration Entry  
mnaccopy Copy Security  
mod_pass Modify Passwords  
monitor  
Monitor Security Activity  
nodeentr  
SE 422 Hardware Def  
Y
Y
Y
dkrcentr  
Download from Www.Somanuals.com. All Manuals Search And Download.  
D-2  
APPENDIX D: PROGRAM SECURITY MASTER LIST  
outsrprt  
overrprt  
Outstanding Tickets  
Tenant Overage  
N
N
N
N
N
N
taskrprt  
tatransf  
tbleentr  
tbllrprt  
tententr  
tentrprt  
termentr  
thstrprt  
tickentr  
tickpost  
tickrprt  
timemenu Time & Attendance  
tkeyrprt  
tlogrprt  
tmcdentr  
tmcdrprt  
tourmenu Guard Tour  
tranentr  
trdsentr  
trdsrprt  
trptmenu  
trshentr  
trshrprt  
tsumrprt  
Task / Event Master Report  
Record Transfer  
Rate Tables  
Tenant Billing  
Tenants  
N
N
Y
N
Y
N
Y
N
Y
N
N
N
N
N
Y
N
N
Y
Y
N
N
Y
N
N
N
N
Y
N
Y
N
Y
N
Y
N
N
N
N
N
Y
N
N
Y
Y
N
N
Y
N
N
N
N
Y
N
Y
N
Y
N
Y
N
N
N
N
N
Y
N
N
Y
Y
N
N
Y
N
N
p422rprt  
SE/422 PIN Report  
N
N
N
Y
N
N
Y
Y
Y
N
Y
N
N
Y
N
N
N
N
N
N
Y
N
N
Y
Y
Y
N
Y
N
N
Y
N
N
N
N
N
N
Y
N
N
Y
Y
Y
N
Y
N
N
Y
N
N
N
padmmenu Parking Administration  
parkmenu Parking Control  
Tenants  
pgacentr  
pgacrprt  
phstrprt  
plotentr  
pndfentr  
pnt_entr  
pnt_rprt  
pol_entr  
pol_rprt  
prd_rprt  
prj_entr  
prj_rprt  
Security Entry  
Security Master List  
Point History  
Point/Lot Association  
SE422 PIN Definition  
Points  
Points  
Pollers  
Pollers  
Terminal / Point Xref  
Tour Schedule vs Access  
Ticket Editing  
Post Serviced Tickets  
Ticket Transaction Report  
Keyholder Tour History  
Ticket Log  
Time Codes  
Project Reader Report  
Project Definition  
Project Report  
Time Codes  
Transactions  
psetmenu Parking Setup  
Tour Definition  
Tour Definition  
Ticket Reports  
Tour Scheduling  
Tour Schedule  
Daily Ticket Summary  
purgrprt  
quckrprt  
Purge A Pending Report  
Quick Ticket Search  
N
N
N
rdefentr  
rdefrprt  
rdr_entr  
rdr_rprt  
rpasrprt  
Device Report Definition  
808 Report Definition  
Readers  
Readers  
Passback Zone Report  
Y
N
Y
N
N
N
Y
N
Y
N
N
N
Y
N
Y
N
N
N
usraentr  
usrbentr  
Shift  
Emp Stat  
Y
Y
N
Y
Y
N
Y
Y
N
usrdmenu User Defined Information  
rprtmenu Master File Reports  
vctlentr  
vistentr  
vistmenu Visitors  
Badge Color Entry  
Visitor Entry  
Y
Y
N
N
Y
Y
N
N
Y
Y
N
N
sec_menu Program Security  
N
Y
N
N
N
N
Y
N
Y
Y
N
N
Y
N
N
N
N
N
N
N
Y
N
N
N
N
Y
N
Y
Y
N
N
Y
N
N
N
N
N
N
N
Y
N
N
N
N
Y
N
Y
Y
N
N
Y
N
N
N
N
N
N
sel_entr  
service  
Selection Table  
Ticket Servicing  
vistrprt  
Visitor Report  
showdate Display Date & Time  
showuser Display All Valid Logins  
showwho Display All Users Logged In  
weekentr Week Ending Dates  
whowhere Passback Zone  
Y
N
Y
N
Y
N
siteentr  
siterprt  
spitentr  
statentr  
Site Entry Definition  
Site Definition  
Ticket Spitter Synch  
Status Code Entry  
zoneentr  
zonerprt  
Zones  
Zones  
Y
N
Y
N
Y
N
statmenu Inventory Stat Code Menu  
Level 2 = MONITOR ONLY  
statrprt  
stkrentr  
Status Code Report  
Parking Sticker Entry  
exit  
Exit SE / SMS Application  
N
N
N
N
N
N
N
N
N
stkrmenu Parking Stickers  
mainmenu SE / SMS Main Menu  
monitor  
stkrprt  
stkrrprt  
Parking Sticker Master Rpt  
Parking Sticker Display  
Monitor Security Activity  
summdel Delete Ticket Records  
syclmenu System Configuration  
sys_menu System Administration  
taarch  
tacfentr  
taentr  
taexentr  
tainrprt  
tarprprt  
tartrprt  
taskentr  
Transaction Archiving  
Conf Early / Late Hours  
Editing  
T & A Exceptions  
Keyholder Inquiry  
Detail / Summary Report  
Offline Reporting  
Tasks  
N
Y
Y
Y
N
N
N
Y
N
Y
Y
Y
N
N
N
Y
N
Y
Y
Y
N
N
N
Y
Download from Www.Somanuals.com. All Manuals Search And Download.  
INDEX-1  
INDEX  
A
Access Assignment, 4-8, 5-4  
Keyholder Access, 5-4  
Keyholder Access Assignment, 4-8  
Readers, 5-5  
Access Code, 1-2  
Access Code Entry, 4-9  
Distributed Access codes, 4-9  
Host, 4-9  
Smart Failsoft, 4-9  
Access Control Archive Report, 3-4  
Access Control Transaction Archiving [accsarch], 6-15  
Access Control Units (ACUs), 1-3  
Access Definition, 4-9, 5-6  
Access Code Master, 5-6  
Access Group Master, 5-6  
Access Override, 5-7  
Intelligent Failsoft, 5-7  
Keyholder Projects, 5-9  
Project Report, 5-8  
Reader Projects, 5-10  
Access Group, 1-2  
Access Group Entry, 4-11  
Access Override Entry, 4-13  
Activate / Deactivate Codes, 6-11  
ACUs, 1-3  
Add Users [addusers], 6-2  
Adding / Changing Data, 1-14  
Adjustable Baud Rate—708P/800 Pollers, 6-19  
Alarm Contact, 1-2  
Alarm Contacts, 1-4  
Alarm Servicing, 2-8  
Alarm Servicing Function Keys, 2-8  
No Activity Timeout, 2-13  
Alarm Servicing Archive Report  
Sample Report, 3-5  
Alarm Servicing Function Keys, 2-8  
Alarm Servicing Report, 3-4  
Alarm Transaction Clean Up [alrmcln], 6-16  
Alarms and Responses, 1-7  
All Transactions, 1-7  
Anti-Passback Control, 1-6  
Application Screens, 1-10  
Audible Alarms, 1-5  
Auto Key Entry, 4-34  
Automatically Entering Card Numbers, 4-34  
Configuring the Reader, 4-34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
INDEX-2  
Auto Opens/Activates, 4-42  
Automatic Access Control, 1-6  
Automatic Activate / Deactivate, 1-6  
Automatic Restart, 1-16  
Automatic Unlock/Lock, 1-6  
B
Basic System Usage, 1-16  
Logging Off, 1-15  
Biometric Identifiers, 1-3  
Building Modes, 2-11  
C
CCTV, 1-17  
Clearing a Field, 1-14  
Communications Monitor, 1-6  
Company, 1-2  
Complete Portability, 1-5  
Contact Alarms, 1-4  
Control Building Modes Function Keys, 2-11  
Control Devices Function Keys, 2-3  
Control Devices screen, 2-3  
Control Doors Function Keys, 2-6  
Control File Maintenance [ctrlentr], 6-8  
Control Function Keys  
Control Doors Function Keys, 2-6  
Control Input Function Keys, 2-5  
Control Locks Function Keys, 2-4  
Control Output Function Keys, 2-5  
Control Zone Function Keys, 2-6  
Locks, 2-4  
Control Function Menu  
Devices, 2-3  
Control Functions Menu, 2-2  
Poller Function Keys, 2-2  
Pollers, 2-2  
Control Inputs Function Keys, 2-5  
Control Locks Function Keys, 2-4  
Control Outputs Function Keys, 2-5  
Control Pollers Function Keys, 2-2  
Control Printers Function Keys, 2-9  
Control Projects, 2-9  
Control Projects Function Keys, 2-9  
Control Remote Devices Function Keys, 2-11  
Controller Systems, 1-18  
Copy Keyholder Access, 4-8  
Copy Keyholders, 4-7  
Copy Security [mnaccopy], 6-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
INDEX-3  
D
Data Entry Sequence, 1-9  
Data Item Selection, 2-2  
Database Changes, 1-7  
Database Maintenance [db_menu], 6-14  
Definition, General  
Trace, 1-3  
Transactions, 1-3  
Definition, Inputs  
Fire Alarms/Heat Sensors, 1-4  
Definition, Principal System Functions  
Auto Unlock/Lock, 1-6  
Definitions  
Access Control, 1-6  
Definitions, Basic System Usage, 1-9  
Applications Screens, 1-10  
Logging On, 1-9  
System Screens, 1-10  
Definitions, Creating the Database, 1-8  
Poller Initializatin, 1-8  
Definitions, File Maintenance, 1-7  
Definitions, General, 1-2  
Access Code, 1-2  
Access Group, 1-2  
Alarm Contract, 1-2  
Company, 1-2  
Department, 1-2  
Device, 1-2  
Event, 1-2  
Job Category, 1-2  
Key Number, 1-2  
Keyholder ID, 1-3  
Location, 1-3  
Time Code, 1-3  
Zones, 1-3  
Definitions, Hardware  
Devices, 1-3  
Microprocessor, 1-3  
Definitions, Inputs, 1-4  
Alarm Contacts, 1-4  
Contact Alarms, 1-4  
Door Switches, 1-4  
Intrusion Devices, 1-4  
Motion Sensors, 1-4  
Multiple Switch Monitor, 1-5  
Points, 1-5  
Request-to-Exit, 1-5  
Video Monitor Switchers, 1-4  
Definitions, Outputs, 1-5  
Audible Alarms, 1-5  
Remote Alarms, 1-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
INDEX-4  
Definitions, Principal System Functions, 1-6  
Auto Activate/Deactivate, 1-6  
Automatic Access Control, 1-6  
Communications Monitor, 1-6  
Flexible Event Handling, 1-6  
Independent PIN Entry, 1-6  
Manual Access Control, 1-6  
Two-Man Rule, 1-6  
Definitions, Readers, 1-4  
Digital Key Reader, 1-4  
Magnetic Card Reader, 1-4  
Readers, Sensors, 1-4  
Definitions, Reporting, 1-7  
Alarms and Responses, 1-7  
All Transactions, 1-7  
Database Changes, 1-7  
Invalid Access Attempts, 1-7  
Keyholder History, 1-7  
Point History, 1-7  
Definitions, System Function  
Anti-Passback Control, 1-6  
Definitions, System Software, 1-5  
Installation Flexibility, 1-5  
Integrated Software, 1-5  
Open System Design, 1-5  
Portability, 1-5  
Response Time, 1-6  
Definitions, Tenant, 1-3  
Deleting a Character in a Field, 1-14  
Deleting Records, 1-14  
Department, 1-2  
Device, 1-2  
Device Configuration Reports, 5-13  
422 PIN Master, 5-20  
808, 5-17  
808 Configuration, 5-18  
ABA Configuration, 5-19  
Auto Opens/Activates, 5-17  
Dialers, 5-18  
DKR Configuration, 5-20  
Points, 5-16  
Pollers, 5-14  
Site Definition, 5-18  
Zones, 5-13  
Devices  
422 Device Configuration Entry, 4-28  
422 Reader Report Defined, 4-36  
818 Device Configuration Entry, 4-28  
818 Reader Report Defined, 4-37  
8xx-Series Reader Report, 4-35  
Auto Key Entry, 4-34  
Device Entry Screen, 4-22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
INDEX-5  
NexSentry Reader Report Defined, 4-38  
Reader Entry, 4-32  
Reader Report, 4-35  
Readers, 4-31  
Devices Configuration Reports  
Devices, 5-14  
Readers, 5-15  
Digital Key Reader, 1-4  
Disk Almost Full Warning, 2-12  
Display All Users Logged In [showwho], 6-7  
Display All Valid Logins [showuser], 6-7  
Display Current Date and Time [showdate], 6-7  
Display Database Statistics [dbstats], 6-14  
Distributed Access Codes, 4-9  
Documentation Methods, 1-2  
Door switches, 1-4  
Doors, 2-6  
Download Clean Up and Retry [downcln], 6-15  
Download Status  
Before Transmission, 3-7  
Error in Receiving Data, 3-7  
Error in Transmitting Data, 3-7  
Received and Processed, 3-7  
Transmitted, 3-7  
Unprocessed, 3-7  
Download Status Report, 3-6  
Sample Report, 3-7  
E
Elevator Control, 1-18  
Elevator Definition, 4-11  
Enable Terminals for Global Beeping [beepentr], 6-8  
Event, 1-2  
Event Monitoring, 1-6  
Event/Point Report, 3-8  
Sample Report, 3-9  
Events [evenentr], 6-9  
F
Failsoft, 4-14  
File Maintenance, 1-7  
Finding, Adding, and Storing Data, 1-13  
Adding/Changing Data, 1-14  
Searching, Partial Information, 1-13  
Storing Data, 1-14  
Finding Data, 1-13  
Fire Alarms, 1-4  
Fire Alarms / Heat Sensors, 1-4  
Flexible Event Handling, 1-6  
Following the System Interconnect Diagram, number, 1-9  
Force Table Download, 2-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
INDEX-6  
Forgive Passback, 2-10  
Full Screen Monitoring, 2-12  
Function Keys, 2-2  
G
General Definitions  
Keyholder, 1-2  
Guard Tour, 1-18  
H
Hardware Configuation  
422 Hardware Definition, 4-44  
Hardware Configuration  
422, 4-28  
422 Pin Definition, 4-43  
818, 4-28  
8xx Series, 4-24  
ABA Configuration, 4-47  
Areas, 4-19  
Device Report, 4-43  
Devices, 4-21  
Dialer Entry, 4-45  
DKR Configuration, 4-48  
NexSentry, 4-26  
Points, 4-39  
Pollers, 4-19  
Readers, 4-31  
Site Entry Definition, 4-46  
Zones, 4-18  
Heat Sensors, 1-4  
Holidays, 4-16, 5-11  
I
ID Security Group Entry [ID2_ entr], 6-18  
ID Security Maintenance [ID_menu], 6-17  
ID Security Report [ID1_ rprt], 6-18  
ID Security User Entry [ID1_ entr], 6-17  
ID-4000 Interface, 1-18  
Independent PIN Entry, 1-6  
Input Points, 2-5  
Installation Flexibility, 1-5  
Integrated Software Support, 1-5  
Intelligent Devices, 4-21  
Intrusion Devices, 1-4  
Invalid Access Attempts, 1-7  
Inventory Status Code Menu [statentr], 6-20  
IQ, 1-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
INDEX-7  
J
Job Category, 1-2  
Journal Archive [jourarch], 6-16  
Journal Reporting [jourrprt], 6-16  
K
Key Inventory [invtmenu], 6-20  
Key Inventory Entry [cdinentr], 6-21  
Key Inventory Report [cdinrprt], 6-21  
Key Inventory Status Code Report [statrprt], 6-20  
Key Number, 1-2  
Keyholder, 1-2  
Access Assignment, 4-8  
Keyholder Access Entry, 4-5  
Keyholder Entry, Page 1, 4-2  
Keyholder Entry, Page 2, 4-4  
Master Reports, 5-2  
Project Assignment, 4-6  
Keyholder History, 1-7  
Keyholder History Report, 3-2  
Sample Report, 3-3  
Keyholder ID, 1-3  
Keyholder Loading [loadmenu], 6-17  
Keyholder Zone Report, 3-8  
Sample Report, 3-8  
Keyholders, 4-2  
Keypad Controllers, 1-4  
Keys Master, 5-2  
L
Location, 1-3  
Locks, 2-4  
Logging Off, 1-15  
Logging On, 1-9  
M
Magnetic Card Readers, 1-4  
Manual Access Control, 1-6  
Manual Access Granted, 2-10  
Manual Organization, 1-1  
Documentation Methods, 1-2  
System Main Menu, 1-1  
Manual Restart, 1-16  
Maps, 4-50, 5-13  
Map Drawing, 4-50  
Master File Entry, 4-1  
Master File Reports, 5-1  
Menu Screens, 1-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
INDEX-8  
Microprocessor  
Access Control Units, 1-3  
Biometric Hand Reader, 1-3  
Miscellaneous Information, 1-15, 2-12  
Modified Usage of Invalid Facility Code Log, 2-15  
Modify Passwords [mod_pass], 6-4  
Monitor Security Activity, 2-1  
Monitoring Security - Passwords, 2-14  
Motion Sensors, 1-4  
Moving Backwards in a Field, 1-14  
Moving Between Data Fields, 1-12  
Moving to Prior Screens, 1-13  
MSMs, 1-5  
Multiple Switch Monitors (MSMs), 1-5  
O
Open System Design, 1-5  
Optional Features, 1-17  
CCTV, 1-17  
Controller Systems, 1-18  
Elevator Control, 1-18  
Guard Tour, 1-18  
ID-4000, 1-18  
IQ, 1-17  
Parking Control, 1-18  
Remote RDI, 1-18  
Time and Attendence, 1-18  
Visitor Control, 1-18  
Other Functions, 2-9  
Printer Control, 2-9  
Output Points, 2-5  
P
Parking Control, 1-18  
Parking Sticker Entry [stkrentr], 6-22  
Parking Sticker Interactive Display [stkrrprt1], 6-22  
Parking Sticker Master Report [stkrprt], 6-23  
PARKING STICKERS [stkrmenu], 6-22  
Passback Zone Report, 3-5  
Sample Report, 3-6  
Perform Backup [bkup], 6-14  
Point History, 1-7  
Point History Report, 3-2  
Sample Report, 3-2  
Points, 1-5, 4-39  
Poller Initialization Parameters Information, 1-8  
Pollers, 2-2  
Pollers Function Keys, 2-2  
Powering On the System, 1-16  
Program Security [sec_menu], 6-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
INDEX-9  
Program Security Entry Definition [pg1_entr], 6-5  
Purge a Pending Report [purgrprt], 6-8  
R
Reader Entry, 4-32  
Reader Report, 4-35  
818, 4-37  
NexSentry, 4-38  
Reader Report, 422, 4-36  
Readers, 1-4  
Real Time Control Maps, 2-8  
Realtime Passback Zone Report, 3-9  
Remote Alarms, 1-5  
Remote Devices, 2-11  
Remote Dial-Up Interface, 1-18  
Reporting, 1-7  
Reports  
132-Column, 5-21  
ABA Configuration, 5-19  
Access Code Master List, 5-6  
Access Group Master List, 5-7  
Access Override, 5-7  
Auto Open/Activate, 5-17  
Company, Dept, 5-12  
Devices, 5-15  
Dialers, 5-18  
DKR Configuration, 5-20  
Holiday Codes, 5-11  
Intelligent Fail Soft, 5-8  
Keyholder Access Assignment, 5-4  
Keyholder Projects, 5-9  
Keys Master, 5-2  
Maps, 5-13  
Points, 5-16  
Pollers, 5-14  
Projects, 5-9  
Reader Assignment, 5-5  
Reader Project, 5-10  
Readers, 5-16  
SE 422 PIN, 5-21  
SE 808, 5-17  
Sites, 5-19  
Tenants, 5-12  
Time Codes, 5-11  
Zones, 5-14  
Request-to-Exit (REX) Sensor, 1-5  
Restarting The System  
Automatic Restart, 1-16  
Manual Restart, 1-16  
Restarting the System, 1-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
INDEX-10  
Review Transactions  
Full Screen, 2-7  
Review Transactions Function Keys, 2-8  
REX, 1-5  
S
Sample System, 1-7  
Screen Access, 4-1  
Screen Examples, 1-11  
Searching With Partial Information, 1-13  
Section Organization, 2-1  
Security Master List [pgacrprt], 6-6  
Security Reports, 3-1  
Select Zone, 2-6  
Select Zone Function Keys, 2-6  
Selecting Screens, 1-12  
Shutting Down, 1-16  
Signature Verify, 1-9  
Silence Beeps, 2-9  
Simple Devices, 4-21  
Smart Failsoft Access Codes, 4-9  
Special Journal Reporting [josprprt], 6-16  
Status Screen Function Timeout, 2-13  
Storing Data, 1-14  
System Administration  
Add Users, 6-2  
Database Maintenance, 6-14  
Display All Users Logged In, 6-7  
Display All Valid Logins, 6-7  
Display Current Date and Time, 6-7  
Enable Terminals for Global Beeping, 6-8  
ID Security Maintenance, 6-17  
Keyholder Loading, 6-17  
Miscellaneous Information, 6-19  
Modify Passwords, 6-4  
Program Security, 6-5  
Purge Pending Report, 6-8  
System Configuration, 6-8  
System Configuration (syclmenu), 6-8  
System Interconnect Diagram, 1-8  
System Main Menu, 1-1  
System Monitoring, 2-1  
System Screen Trees, 1-17  
See also Appendix A, 1-17  
See Also Appendix B, 1-17  
System Screens, 1-10  
System Software, 1-5  
T
Task Event / Master Report [taskrprt], 6-12  
Tasks, 6-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
INDEX-11  
Tenant, 1-3  
Tenants, 4-17, 5-11  
Time and Attendance, 1-18  
Time Code, 1-3  
Time Codes, 4-16, 5-10  
Trace, 1-3  
Transaction History Report, 3-3  
Sample Report, 3-4  
Transactions, 1-3  
Transactions [tranentr], 6-12  
Two-Man Rule, 1-6  
U
User Defined Information, 4-49  
Using Screens and Fields, 1-12  
Moving Between Data Fields, 1-12  
Moving to Prior Screens, 1-13  
Selecting Screens, 1-12  
V
Video Monitor Switchers, 1-4  
Visitor Control, 1-18  
W
Watch Dog Timer Count, 4-23  
Y
Y, 1-12  
Z
Zones, 1-3, 4-18  
Zoom  
Canceling Zoom, 1-15  
Zoom Feature, 1-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  

Whirlpool Air Conditioner ACXO82XZO User Manual
Whirlpool Range 9763003 User Manual
Whirlpool Refrigerator 2199009 User Manual
Woods Equipment Brush Cutter MAN0680 User Manual
Woodstock Sander W1737 User Manual
Xerox Printer PowerPlus Series User Manual
Yamaha Guitar AEX 500NS User Manual
Zanussi Range ZCG 611 User Manual
Zephyr Cooktop EBO E36ASX User Manual
Zhone Technologies Network Router 6411 A1 xxx User Manual