Home

CDVI Centaur v5.1 User Manual Click here to the CDVI

image

Contents

1. i T Bean P Door DOL Green LED city Bai Devon 00L Rad LED Lid on i i DET ias OR fC re L ia Og i ei t 01 02 ed LED Ones pene bomma Sana ed E iiir P Dear Ob oe Grien LED iis On Desis w paat EEN F Do OLS Poad LET LIS E Progertues i Controters 7 h Door OOO Durie ba of l E FL oes Right click the TE l a4 desired output then pe aevioee Visual display and text select the desired action aisa description of current live output status EE Operators 1 E OCI Commande 1 Manufacturing Access Control Since 1985 Displaying Guard Tour Live Rounds When you click on the Guard Tour Live Rounds icon from the menu bar Centaur will display the current live status of the rounds in the system If you wish to start end or view round details right click the desired round and select one of the following actions from the list Also refer to Guard Tour on page 177 ff Start Round Starts the selected guard tour round and displays its check point details End Round Ends the selected guard tour round View Round Details Displays check point details of the selected round Figure 40 View Round Details fia Was Opters Modem hine PRS rie ese esi ee ee ee H t 7 tih 3 a erm esh 7 p il ie cre D Cee Gi mir b Cee OLS Cor i Dem i Eb tajn bama hile Extend Time If you wish extend the time of a check point right click on the desired check point select Extend Time an
2. INTEGRATED ACCESS CONTROL Chapter 28 Centaur Wave Player What Will Find Starting Centaur Wave Playeri 2 2 sed4s e00 s idrok 455 4 ee deed bee es a aa eke 08 e pee bees b4e8e bbe eX 242 ASSIGNING a WAV PICs 24 444005 ohee Boo eeRe eee es r HONOR DER e 6 hehe de Eeh Shae eedeaadne aA 242 This utility was designed to enable a wav file to be played on the computer when an event that requires acknowledgement occurs The sound can replay at programmed intervals until the alarm is acknowledged Manufacturing Access Control Since 1985 Centaur Wave Player This utility was designed to enable a wav file to be played on the computer when an event that requires acknowledgement occurs see Alarm Acknowledgement on page 166 The sound can replay at programmed intervals until the alarm is acknowledged Starting Centaur Wave Player 1 Make sure that Centaur is running Click Start Programs CDV Americas Centaur Administration Console and click WavePlayer 2 From the Wave Player Login window type the appropriate Login ID and Password Centaur Wave player uses the same Login ID and Password as Centaur If you are trying to log in to a Centaur Server that is on a network type the computer s network name or IP address in the Computer text field 3 Click OK Assigning a WAV File When an event that requires acknowledgement occurs and it has been assigned a wav file as detailed below the associated sound w
3. INTEGRATED ACCESS CONTROL Chapter 18 G uard Tou r What Will I Find Adong Data COUCCIOlS 6 034222 te corse onus erered ne eee ee sees oa Beek r ee oe ee eE aE ae ees 178 Modilyng a Data CONlCCION ore eeeeceeeeea ct eesee eye sek on Geet eh aeee had toe ee wks eee Sao ROR 178 Addin Check PON aasar p eee oes bee oe SE ee ne een ok ee be ee eae heen che ee ee eee ee eee oad Sek 179 Modifying a Check Point 1 naana anaana eee ee eee eee ee 179 POGING TRO 6 acd tea dene ee see ea oe Soe eee Oe ed oe eee eee ea ee ee eee eae ee 181 Modifying a ROUNG 2 lt 462545244 6 500 5 00 85 KEEA eee ea aaa oka eRe ee See bene da ee bad do ee hes ooo se eee eee eae 181 The live interactive guard tour allows check point validation using card readers input points Motion sensors key switches or push buttons or data collectors The guard tour provides option to create and configure data collectors check points and rounds Manufacturing Access Control Since 1985 Adding Data Collectors From the Database Tree View window right click the Data Collectors from the Guard Tour branch and click New Data Collector You can also click on Data Collectors and press the keyboard Insert key See Modifying a Data Collector for more information Modifying a Data Collector From the desired Site branch in the Database Tree View window right click the data collector you wish to modify and click Properties from the drop down list You ca
4. S ee ee RG ees b Set the available options as required for each controller and click Next For more information on these options refer to Controller Configuration on page 91 To change the name of a controller double click on the name of the controller that you want to edit and type the new name Num Doors fields allow selecting the number of doors to be created for each controller Custom Controller Setup Active Input Config Num Doors Iv Active N C 2 V Active N C 2 M Active N C 2 Controller Name Address Controller 001 001 Controller 002 002 Controller 003 003 Note Double click on the name of the controller that you want to edit lt Back Cancel c Set the available options which includes Door name Reader Protocol Custom Door Setup Controller Name DoorName Doordddress DoorType ReaderProtocol Lock Cti Unlock Time Door Contact Rex Inp Lock Ctrl and Unlock Time as required for each door For more information on these options refer to Door Settings on page 107 To change the name of a door double click on the name of the door that you want to edit and type the new name To change the Unlock Time double click on the value to be changed and enter the Controller 001 Controller 001 Controller 002 Controller 002 Controller 003 Controller 003 Door 001 01 Door 001 02 Door 002 01 Door 002 02 Door 003 01 Door 003 02 01 02 01 02 01
5. f Administrator e8Centaur fii cert Publishe fi 0nsAdmins TEE pSecurity Gr Move Send Mail Gecurity Gri Security Cort bes ets F7 DnsUpdateFr All Tasks F Security Gri Domain Adrnit Gecurity Gri Cut fi Domain Comp iF Becurity a i Delete Pii Domain CONT eee Security Gr Rename fii Domain GUES Becurity Gri fji Domain User ecu ee enterprise Ac SOC S S S Pii Group Policy Ea Guest Centaur Properties 2 Security Cort Security fart Help ecurity tr User General Members Member Of Managed By Members Active Directory Folder Remove CA t REFERENCE MANUAL UR5 1 figuration 7 Inthe Select Users Contacts Computers or Groups window type the domain s user name in the Enter the Object Names to Select 8 Click on the Check Names button to validate the user s name and click OK to add the user into the group 9 Redo the step 6 for all the authorized users Select Users Contacts Computers or Groups Select Users Contacts Computers or Groups Select this object tyne Enter the object names to select examples Select this object type Users Groups or Uther objects From this location test Locations Enter the object names to select examples fdug Check Names Users Groups or Other objects Erom this locatio n test2
6. A Centaur Integrated Access Control Version 5 1 REFERENCE MANUAL J H CS REFERENCE MANUAL JR 5 1 Copyright C 2006 2010 CDVI All rights reserved Centaur integrated access control system software is protected by copyright law and international treaties Unauthorized reproduction or distribution of this program or any portion of it may result in severe civil and criminal penalties and will be prosecuted to the maximum extent possible under law All other brand and product names are trademarks or registered trademarks of their respective companies The information contained in this publication is subject to change without notice Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control La PA m Table Of Contents INSTALLING AND USING CENTAUR nssssssssssssnnnunnnnnunnnnnunnnnnunennnunnnnnunennnunnnnnunnnnnnunnnnnunennnunnnnnunnnnnunnnnnnunennnunennnunennnunnnnnnnnnnnnnnnnnan mennan 1 EI E IONS aeae E E A T E E 2 AS TAINATIOMMOIVOEVICWY N E E E A E A E A E tit oeutaceaeies ceed eesencadeeee 3 CMa OE ee r E E E E E edie ecldecagetoonanenee ance coeeeaieent os 3 Centaur Administration Console Workstation ccccccseccececneeeeeeseeeeeeeseeeeeeeeaeeeeeeeeeeeeeeeseeeeeeseeeeeeeeseeeeessseeeeeessaeeeeesaaeeeeessaeeeeees 7 Setting Centaur as a Service Under WINdOWS ccccceeccccceseeeeeeeeeeeeeee ee eeeeeeeeeeeeaeeeeeeeseeeeeeeeaeeeeeesaaeeeee
7. Properties Cancel Apply Manufacturing Access Control Since 1985 4 The SpxSvr Properties window pops z z up In the Authentication Level drop SpxSvt Properties 2 x down list choose None Tae are ie F eee General Location Security Identity Endpoints General properties of this DEOM application Application name SpxSwvr Application type local server Authentication Level CAPROGRA 1 CDVAME 1 CentaurkCENTAL Local path Apply Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration 5 Click on the Location tab and select the Run 2 x application on this computer check box NB The Run application on this computer aan Location Secutty Identity Endpoints check box is selected by default om The following settings allow DCOM to locate the corect computer for this application If you make more than one selection then DCOM uses the first applicable one Client applications may overide VOUT selections Perr ererrrrrrrrererrrrrrrrrrrererertr errr rerrrrrrterreerererrrrrtrrrirrrrrrerererrrir rrr erie rrrrertrrerererrrrr rier rere rtrrrer rr errre rs M Run application on this computer C Run application on the following computer Browse Cancel Apply Manufacturing Access Control Since 1985 REF 6 Click on the Identity tab and select The 2 x interactive
8. ccc cartes Bauda machine aiiin paccwed charset oe impia tenet og veure chaste Late aw metr Teta peg we eee ca Creer Garvie ieber Dept ay ager ure Chand ala eet priate Mamia lcci MDE Bc coun parece be Bimani Reut sons eck SO oe Later eee lor Hedirter actrees logon Cho mot cheplay last user name Balinteracties lagan Da cnt regure CTELAALT HOL tek defines Fite ctr logon Mevoge teed for ulari stempi aj Ei kog on na 2 The Local Security Settings window will pop up Expand the Local Policies filed to Security Options an click on this folder Double click on the DCOM Machine Access Restrictions in Security Descriptor Definition Language SDDL syntax 3 In the new window click on the Edit Security button DEUM Machine Access Heclrclion in Security Desert hey DCOM Machine Access Pestinctions in Secunty Deacnpter 3 Daran Largue JDEL rias Ii ia cecuniy darcigia e bell bark alei delre the pokop welling m tha temigis the poia aring wi not be rnin Manufacturing Access Control Since 1985 AN H b G r REFERENCE MANUAL figuration 4 Click on the Add button and select the Centaur group JaccessPermission zjx that has been created before Under Permissions for 7 Centaur check if the two Allow check boxes are Security selected and click OK aii Group or user names Redo the step 2 to step 4 for DCOM Machine Launch 8 Centaur TEST Centaur Permissions in
9. r ao Ha REFERENCE MANUAL Deleting an Input To delete an existing input right click the input from the appropriate controller s branch in the Database Tree View window left hand portion of your screen and click Delete from the list You can also select the desired input and press the keyboard Delete key A dialogue box will appear requesting confirmation Display Input Status and Manual Controls When you click on the Input Status icon from the toolbar Centaur will display the current live status of the inputs in the system If you wish to manually change the status of an input right click the desired input You can also use the Shift or Ctrl keys to select multiple inputs if you wish to modify several inputs in the same manner at once and then right click on any of the selected intputs A drop down list will appear Select one of the actions from the list For more information refer to Displaying and Controlling the Status of an Input on page 222 Manufacturing Access Control Since 1985 i 4 REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control ar INTEGRATED ACCESS CONTROL Chapter 15 Outputs What Will Find Overview of Output ProgramiminG lt i2s44624 oFeteoda es oSi bees bee eb bed obs oh done bo eee bees 4e84 44684 b66 4 154 POCO OUS geen sds oc a oe eta eae oe Cohes ded Gan enees hese aoge eh E heat essen nn E O 155 MOGIVING Gi OUNNUL 12 eeeonete we cee eda So vee dese
10. Administrators CDVI VISTA Administrators Re Centaur Group CDOVI VISTA Centaur Group Pennissions for Centaur Group Allow Deny BISHE m a o Leam about access control and permissions 26 Under Access Permissions click the Edit button 27 The Access Permissions window will appear Click the Add button to add The Centaur group amp 2 SYSTEM A Administrators CDVI VISTA Administrators Leam about access control and permissions Manufacturing Access Control Since 1985 28 Check if the Object Types and Locations are properly set then click on the Find Now button Select from the list the Centaur Group previously created For a multiple selection keep pressed the Ctrl key while selecting the names from the list Click OK 29 The Centaur Group appear in the Select Users under the Enter the object names to select examples section Click OK Users Groups or Builtin security principals From this location CDVI VISTA Enter the object names to select examples CDVI VISTA Centaur Group Manufacturing Access Control Since 1985 j REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration 30 Check the check box Allow to Local Access and Remote Access Click OK 31 Click OK to close the SPXSVR exe properties and close the Component services window Pa ee eee eres amp SYSTEM Administrators CDVI VISTA Administrators Pennissions for Centaur Group Leam
11. Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control aaa G A pe INTEGRATED ACCESS CONTROL Chapter 12 Elevator Control What Will I Find Overview of Elevator Control Using the Centaur software you can control the access of up to 64 floors per site Each of the CA A480 A Elevator Controllers can control up to 16 floors and up to eight elevator controllers can be supported by each controller You can interface the elevator cart s floor buttons with the elevator controllers relays and program them to follow a public access schedule no card required or to limit access to individuals with a valid card Only the floors that have been assigned to the elevator cart s public access schedule or to a floor group assigned to a card will be active Manufacturing Access Control Since 1985 Overview of Elevator Control Elevator control allows you to define when certain floors from an elevator cart can be accessed and by whom these can be accessed e Each site can control up to 64 floors e Each CA A480 A Elevator Controller controls up to 16 floors e Each controller supports up to eight CA A480 A Elevator Controllers e Each door supports four elevator controllers for up to 64 floors e Each door in a site represents an elevator cart and each one controls the same floors defined by the site Figure 20 Basic Overview of Elevator Controllers iaar ait 1 i
12. E Bus To other CT V900 A ait controller Button S582 for floor Nol used RS 485 Button S61 for floor 2 Button S681 for floor 2 Button G for floor 3 Button G for foor 3 Buon 17 for loar 4 Button 1 for floor 4 Button 2 for floor 5 Button 7 for floor 5 Bution 3 for floor 6 Button 3 for floor 6 Buton 4 for floor 7 Nol used o Buton 5 for floor amp Hoi used Logies Fior s G General Floor SB1 Parking Level 1 SB2 Parking Level 2 Logical Floor 1 Elevator Car 1 Logical Floors 1 to 8 i i l l Elevator Car 2 Logical Floors 2 io 6 Manufacturing Access Control Since 1985 r a i Lp REFERENCE MANUAL Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control ar What Will Find POCO IRGlAyS a E ote epee E eis wh hed ORE eh os oh Oe ee ew hon ee oe he ee be ee oe 138 Wein INO GIRCIAY 24253 20 cehatta5s bene canes eos ao R bee Ghee eter eee AAS eee ehh see ne eee eae 138 B aeie RClAy sckn cadena T ce one eee dae bade eee eho Deed Eee ee eee eee hee ee 141 Display Relay Status and Manual Controls 1 0 0 0 aaa aaea eee eee eens 141 The CA A460 P Relay Expansion Module adds seven additional relays to the CT V900 A controller Up to two relay expansion modules can be added to each controller for a total of 16 relays per controller Typically the relays are used to activate ala
13. Open Too Long on page 112 Also when using this event the output can be latched Door unlocked The output can be activated whenever an access control door is unlocked Also when using this event the output can be latched Setting a Flashing Output s On Off Timers If any of the output s selected events have been set to Flashing see Setting the Output Activation Events on page 156 you must define the rate of the output s flashing for each event The Output Output Timing Properties Timings Miliseconds Timings are programmed for each event and not per output On Of On off therefore affecting all outputs To do so Anti passback status EmN 400 Keypad time out 050 oso 1 4 Wrong code on keypad f 00 f 00 Door open 000 000 Right click Output Timings from the Database Tree View ooo ma window and click Properties from the drop down list to display Door timeout pre alam 100 250 the Output Timing Properties window You can also select Door open too long ooo ooo Output Timings from the Database Tree View window and Door unlocked 000 o00 press the keyboard Enter key Reset to factory defaut esel to factory derau In the Timings tab you will find the same events that are found pean in the Events tab of the Output Properties window see Setting the Output Activation Events on page 156 Cancel In the On and Off text fields type a value from 0 to 999 millisecond
14. Typing the Message for the Selected Event In the Message text field type the content of the E Mail message that you wish to send to the operator This message will be sent to all the operator s defined in the To Cc and Bcc field E Mail addresses when the event occurs and the schedule is valid For this feature to work Microsot Outlook 2003 must be installed and configured on the Centaur server Only one E Mail per field is allowed not possible to use to separate E Mail addresses If Centaur Service Manager is set as a service under Windows refer to Setting Centaur as a Service Under Windows on A page 9 you must do the following Click Start Control Panel double click Administrative Tools Services and Centaur From the Centaur Properties window select This account from the Log On tab enter Administrator for this account or any Windows administrator user enter the Windows user s password in the Password and Confirm password fields click Apply and click OK Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Events Event Activated Video Control After selecting an event as described in Event Definition Overview on page 162 click the Settings for Defaut Card Holders Default General Alarms E Mail Video Macro amp Headcount Video tab in the event s properties Access denied Card expired i Front Door OFrank Smith Default Compary Send ASCII Command
15. an error message and or veer on 3 Actions cannot access this branch of pi i Corant z A NEA COM Apphestians components you must repair a E My Computer Explor Dead Lett Rone dr tice DCOM see below L COM gt Application g E Ss ER CAM Corni i i Funes Precesses C hla Syrte Dibibuted Tarcection Cocedinsior hiiti Application al Evni iewer Lecall Senee Leet al If your DCOM configuration is found corrupted then follow the steps below if not skip the next section and go directly to Setting the firewall section Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration Reparing DCOM Perform the following steps to repair your DCOM configuration 1 From the taskbar click Window Icon gt in the Search field type cmd in the text box and then press Enter 2 The E C Windows systern32 cmd exe C WINDOWS System32 cmd exe Microsoft Windows version 6 6 66011 window will appear Type Copyright tc 2666 Microsoft Corporation All rights reserved cd systemroot system32 and iC2 Users Thecnical support cd systemroot system32 press the keyboard Enter key Then C2 WindowsSystem32 gt msdtc uninstall_ type msdtc uninstall and press the keyboard Enter key 3 Reboot your computer 4 From the taskbar click Start gt Run The Run window will appear Enter cmd in the text box and then press Enter 2 Me E C Windows system32 cmd exe C
16. nput address 23 4 Input address 24 21 Input address 25 22 Input address 26 Z3 Input address 27 24 nput address 28 The settings of the DIP switches of each CA 4470 A determinent the assignation of the terminal reader or keypad Typing the Input Name Use the Name text field in the Input tab to identify the input s use We recommend using a name that is representative of the device that it is controlling such as REX Input Front Door Also refer to Typing Names and Notes on page 23 Typing the Input Notes Use the Notes text field in the Input tab to record any additional notes that may be required We recommend that you keep a log of when and what settings were changed Also refer to Typing Names and Notes on page 23 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Inputs Input Properties From the Input Properties window select the Details tab The Details tab will allow you to configure the input s timers normal state schedule and whether a triggered a Input etalls input will bypass an input or activate a relay Input Properties Configuration Normally Closed Selecting the Input Normal State N C N O Enabling Schedule Always x Input response time foo600 ms Input restore time 00600 ms Bypass delay 00005 This input activates relay None o This input bypasses input None o o Activates relay group
17. Computer Requirements Centaur Server The Centaur software is designed to operate with IBM or IBM compatible computers running a suitable Windows operating system as detailed in the Operating System Requirements Centaur Server It is recommended to use a dedicated computer to install CENTAUR server e Dual Core 2 2 Ghz e 2GB RAM 4GB for superior performance e RS 232 serial port or USB port depending on the installation more than one may be required e For dial up sites the Cen taur Server and each dial up site requires a US Robo tics Sportster 56k baud modem exte rnal internal Other modems can be used but we recommend the above mentioned modem and USB modems WinModems are not supported Operating System Requirements Centaur Server The Centaur Server has been tested on the following operating systems e Windows Vista Home Basic Home Premium Business and Ultimate e Windows XP Home or Professional Edition English and French Service Pack 3 e Windows 2003 Server Edition English and French e Windows 2000 Professional Edition English French and Spanish e Windows 2000 Server Edition English French and Dutch Other software requirements available on the CD e DCOM e MDAC 2 8 e Microsoft Database Engine MSDE 2000 e Microsoft Internet Explorer version 6 0 or higher e Acrobat Reader 6 0 or higher e XML 3 0 Parser Manufacturing Access Control Since 1985 r a i Lp REFERENCE MANUAL JR 5
18. Configuring DCOM on Windows Vista Follow these steps to enable the Network discovery and File sharing on the server and the workstation 1 Click on the Windows icon right click on Network and select Properties Explore Bap Network Bowe Deconmegi beak Ure Preperties 2 Set the Network discovery and File Sharing are ON Click on the arrow to set to ON n TELG T te I Tenn P Coaraci MU Tacks Wira tamane endl ienr T Shanng ard Diecwern Cine lo a teeth Mebagrk droir fin aa Set up BOG oe eae Fite sh E i i blinige fittest naai a ms Dia and repels Publi foider shang o OF w Prinber sanma amp Caf Ae Fae aug E hidhi Shairp OH a Internet Opti Adwnulinacd Firewall Show me all the f 3 From the taskbar click Windows icon then right click on Computer and select Manage Explore Planie Blap Aetercer ke Ore Disconnect Netecek Orne Show on Desktop Ferg Pre Pippis Manufacturing Access Control Since 1985 4 The Computer Management window will appear Expand System Tools and expand Local Users and Groups 5 Right click on the Groups and select New Group to created the Centaur group that will be used for DCOM 6 Inthe Group Name field type Centaur Group Click on the Add button gt Compete Management fon Ele cban Waw Heip ee ol 88 BB Corputer Management Loca Petom LF coco m Fy Tent Viewer af Shared Folders a Local Ue and Group
19. Date and Time Set the date time and time zone for you SA Display Change the appearance of your desktop C Folder Options Customize the display of Files and folders 2 Fromhere double click on Active Directory Users and Computers h Administrative Tools File Edit View Favorites Tools Help O bd E F pa J Search gt Folders EH x 9 m Address 4a Administrative Tools 88 active Directory Domains and Trusts 1KB Shortcut SA active Directory Sites and Services 1KB Shortcut E Active Directory Users and Computers 1 KB Shortcut E Certification Authority 2KB Shortcut zE Cluster Administrator 2EB Shortcut 3 Component Services 2KB Shortcut m Computer Management ZKE Shortcut Manufacturing Access Control Since 1985 AM REFERENCE MANUAL UR 5 1 E ri guration 3 Here right click on Users point to New and choose Group 4 Inthe New Object Group window type a name in the Name field and click OK Ss Active Directory Users and Computers le Action View Window Help gt Am e eeaeee ml eTa Users 15 objects H E Saved Queries Py beste f Administrator E E Builtin H E Computers 72 Centaur Security Group Dome ee Domain Controllers fji cert Publishers cies alice mani E ForeignSecurityPrincipals 7iDnsAdmins Security Group Dome g Users f DnsUpdateProxy Security Group Globe Delegate Control omain Admins Sec
20. Francis Duge fduqrecatest2 Advanced Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration 7 Mi 10 In the new group s properties the Member of tab i click on the Add button Centaur Properties paca eas General Members Member Of Managed By Active Directory Folder Remove This list displays only groups fram the local domain 11 In the Select Groups window type the pa modai eucers inthe Enter the Object Uz Names to Select Select this object type Groups or Built in security principals Object Types Erom this location test Locations Enter the object names to select exa mples distrib Check Names Advanced Manufacturing Access Control Since 1985 AM REFERENCE MANUAL iQ 5 5 1 E x guration 12 Click on the Check Names button to validate the group s name and click OK Bibs Select this object type Groups or Built in security principals _Dbiect Types From this location testa Locations Enter the object nam es to select examples Distributed COM Users Check Names Advanced 13 Click on Start in Windows type dcomcnfg and click OK Run Type the name of a program Folder document or Triera retouca and Winker wlll opens E fer you ck O caei armees 14 From Console R
21. None o a Bypass input group None o From the Configuration drop down list select the inputs normal state e g Normally Closed or Normally Open Typically a Normally Closed configuration is used for devices that open upon activation such as door contacts and request for exit detectors Normally Open configurations are used for devices that close upon activation such as smoke detectors and water level sensors Selecting the Input Enabling Schedule From the Enabling Schedule drop down list select the schedule that will determine when the controller will take into account the input s status i e alarm restore etc The controller will ignore the state of the input when the selected schedule is invalid For more information on schedules refer to Schedules on page 79 OK Cancel o Setting the Input Response Time The Input Response Time zone speed defines how quickly the controller will respond to the triggering of an input If the input remains triggered for the period defined by the Input Response Time the controller will log the Input in alarm event and react according to its programming This prevents any momentary glitch from causing unnecessary alarms After adding an input see Modifying an Input on page 147 the Input Properties window can be opened to configure the input In the Input response time text field type a value from 0 to 65535 ms 65 5 seconds Please note that once an input is in alar
22. REFERENCE MANUAL CENTAUR 5 1 Assets You can associate a picture to an asset Use one of the following methods to associate a picture to the asset Browse your computer for an existing picture Acquire a picture via a camera Crop the picture Delete the picture from the database Browse your computer for an existing picture Allows selecting a picture on disk Click on this button and select the picture file and click on Open Acquire a picture via the camera Allows acquiring a picture from a camera or a scanner Click on this button and select either Video Direct Show or Scan Twain Crop the picture Allows cropping the picture proportionally Click on this button and click and drag the appropriate corner s to reduce the picture Delete the picture from the database Allows removing the user s picture from the database Click on this button to remove the user s picture and replace it by the default picture Deleting an Asset In the Database Tree View window right click the desired asset and click Delete from the drop down list You can also select the desired asset and press the keyboard Delete key A dialogue box will appear requesting confirmation Manufacturing Access Control Since 1985 r ao Ha REFERENCE MANUAL Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control ar INTEGRATED ACCESS CONTROL Chapter 22 DVR What Will
23. on page 29 Depending on network traffic you may need to increase this value to improve communication speed between the Centaur Server and the controllers In the Poll Timeout text field type a value between 500 and 5000 milliseconds Active When the Active check box is selected communication between the Centaur Server and the controller is possible Clear the Active check box to cancel any communication between the controller and the Centaur Server Controller Timeout Enter the length of time the controller will wait for a response from the Centaur Server before generating a Communication Failure locally at the controller Log Com Failure When the Log Com Failure check box is selected Communication Failures between the controller and the Centaur Server are logged Controller Response Delay In the Controller response delay text field type the amount of time 1 to 255 milliseconds that the controller will wait before responding to a command from the Centaur Server Fast Event Request When the Fast Event Request check box is selected the event upload rate is increased in order to prevent lost of events Manufacturing Access Control Since 1985 Controller Anti passback Settings You can use local anti passback to closely monitor the movements of the users and prevent any tailgating Tailgating occurs when a user does not use a card at the reader and enters through the door opened by another user who has already used their car
24. r Card Traced Access Level 4 Mone x Extended Access r r r Cancel Batch Adding Cards Maximum of cards you can create poar ooo How many cards you want to create Eoo What would be the Family number ooo What is the starting card number oon What type of FLM you want Mone Access Level 1 Nowe Access Level 2 Nowe Access Level 3 Nowe Access Level 4 Nowe Floor Group Nowe Status Wad Start Date zaz xj End Date Paz x l Use Keypad Extended Access Antipassback Override Card Traced Interlock Override Cancel Modifying a Card From the desired Site branch in the Database Tree View window right click the card you wish to modify and click Properties from the drop down list You can also select the desired card and press the keyboard Enter key Description LCD Display Mame Access Level 1 Card Number HEX 0000960002 P Fami Number 00150 Mone Card Number 00002 Card Identification Access Level 2 Mone FLN oo000000 gt _ i i Access Level 3 N Uze Keypad Use the Description and LCD Display Name fields to identify me aN the card Aere laeg el Extended Access _ Floor Group Mone Interlock Override D tae Unknown SSsS SCY Antipassback Override Description Localize Unknown z Guard Tour D fososr0 fososri0 Enable Card Traced so Days Before End Date Enable Counter fo Masinun 255 Disable Card After fo
25. window to program the CCTV and Froduction Entrance m Ea e gt Never r DVR settings for that event To RED ES activate CCTV control for a site ee refer to Site CCTV Port Settings Protocol Pelco z on page 40 To program CCTV Link To DYR commands refer to CCTV DVR Name None Commands on page 191 Channel Display video fis Seconds before event time z Display video 15 Seconds after event time Enabling CCTV Control sia for an Event Select the Send ASCII Command check box to send a CCTV command to the connected video switcher whenever the selected event occurs When selected all lists become available Selecting the CCTV Control Schedule for an Event Select the schedule from the Schedule drop down list which determines when Centaur can send the programmed CCTV command If the selected schedule is not valid when the event occurs Centaur does not send the associated CCTV command The Schedule list is only available if the Send ASCII Command check box is selected For more information on schedules see Schedules on page 79 Selecting the CCTV Command for an Event From the Command list select the CCTV command that you want to send to the connected video switcher whenever the selected event occurs The Command list is only available if the Send ASCII Command check box is selected For more information on how to program CCTV commands refer to CCTV Commands on page 191 Selectin
26. 02 Access Access Access Access Access Access Note Double click on the name of the door that you want to edit Standard 26 Bit Standard 26 Bit Standard 26 Bit Standard 26 Bit Standard 26 Bit Standard 26 Bit De energize De energize De enerqize De energize De enerqize De energize 01 03 0g 11 01 03 03 11 01 03 0g 11 lt Back Cancel new value in seconds To change the Reader Protocol and or the Lock Ctrl click on the desired controller and select the new settings from the drop lists Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Sites Modifying a Site To modify an existing site from the Database Tree View window right click the desired site from the Sites branch and click Properties You can also select the desired site and press the keyboard Enter key The Site Properties window will appear allowing you to se B al anaE configure the site Site Properties Site 1 General Site Properties g Select the Site tab from the Site Properties window The Site tab will allow you to view the site address as well as record the site name and any additional notes Changing the Site Name Use the Site text field to identify the site location We recommend using a name that is representative of the site such as Manufacturing Plant Montreal Also refer to Typing Names and Notes on page 23 Typing the Site Notes Use the Notes text field to record any additi
27. 1 User 2 User 2 Add Show Users Members Add Names Search Type of Access Allow Access 11 The selected users will appear in the Registry Value Permissions window Click OK Registry Yalue Permissions Registry Yale Access Permission 12 Click Apply and OK Daner Account Unknown Mame John Doe John Doe Allow Access E User 1 User 1 Allow Access i User 2 User 2 Allow Access Type of Access Allow Access Cancel Add Remove Help Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control 7 ae INTEGRATED ACCESS CONTROL Appendix B Warranty CDVI Americas Ltd Seller warrants its products to be free from defects in materials and workmanship under normal use for the period of one year Except as specifically stated herein all express or implied warranties whatsoever statutory or otherwise including without limitation any implied warranty of merchantability and fitness for a particular purpose are expressly excluded Because Seller does not install or connect the products and because the products may be used in conjunction with products not manufactured by Seller Seller cannot guarantee the performance of the security system and shall not be responsible for circumstances resulting from the product s inability to operate Seller obligation and liability under this warranty
28. 5920259 5886632 Canadian and international patents may also apply Centaur is a trademark or registered trademark of CDV Americas Ltd or its affiliates in Canada the United States and or other countries Manufacturing Access Control Since 1985 r a i Lp REFERENCE MANUAL Manufacturing Access Control Since 1985 INDEX Symbols wav Player 190 241 Numerics 2R Connection 145 3R Connection 146 A Abnormal Events 278 Abnormal events 17 Access Denied Output Activation Events 157 Access Events 278 Access events 17 Access Granted Output Activation Events 157 Access Level 44 Access Level Active 122 Access Level Assignment Cards 129 Access Level Programming 127 Access Level Properties Access Level Tab 122 186 Doors amp Schedules Tab 123 Access Rights Operator 188 Access Time out Output Activation Events 157 Access Door Type 107 Acknowledged Events 166 218 Acknowledged events 17 Acknowledging Alarms 167 Acquire a picture via the camera 197 Action 164 Activate a Relay Group 176 Activate Output 223 Manufacturing Access Control Since 1985 INTEGRATED ACCESS CONTROL i REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control ar Activate Output Timed 223 Activate Relay on Dual Badge 110 Activate Relay Anti passback 96 Activating Devices via Events 164 Inputs Manually 152 Outputs Manually 159 223 Relay Groups 151 Relays Manually 220 Activating Outputs Door Programm
29. As soon as you click OK the card can no longer be used until the status is changed Temporary You can use this status level to create a card prior to the date the card becomes valid or for personnel on contract which would require a card to be active for a specific period of time When you select Temporary from the Status drop down list the Start Date End Date Enable Card Traced and Days Before End Date options become available Use the Start Date and End Date drop down lists to select the day month and year the card becomes valid and the day month and year the card expires The card becomes active at 00 00 of the selected Start Date and expires at 24 00 of the selected End Date When the Enable Card Traced check box is selected a card traced event will be generated when the card is presented within the defined number of days Days Before End Date before the End Date Typing the Card Notes Use the Notes text field to record any additional notes that may be required We recommend that you keep a log of what settings were changed and when they were changed Also refer to Typing Names and Notes on page 23 Deleting a Card In the Database Tree View window right click the desired card and click Delete from the drop down list You can also select the desired card and press the keyboard Delete key A dialogue box will appear requesting confirmation Manufacturing Access Control Since 1985 r ao Ha REFERENCE MANUAL
30. Assigning Floors to a Floor Group on page 174 The door input and relay groups enable you to create groups of devices such as relays that can be activated or deactivated together when a specified event occurs Table 4 Where are the Groups Used eROUPTyPE USEDIN crossreFeRENcE General User Properties on page 47 and Properties General Visitor Properties on page 67 Floor Groups Card Properties Assigning Access to a Card on page 129 Risk Levels Refer to Centaur s Locator online help Event Definitions Action on page 164 Input Groups Input Properties Bypassing Inputs with an Input on page 149 Event Definitions Action on page 164 Relay Groups Input Properties Activating Relays with an Input on page 151 Event Definitions Action on page 164 Adding a Group In order to program a floor door input or relay group you must first program the Floor Group Properti x site see Sites on page 25 and the schedules see Schedules on page 79 In See x the Database Tree View window expand the Groups branch from the desired Site Floor Group Floats branch right click the desired type of group Companies Departments Job Site 1 Floor Group 1 Titles Floors Risk Levels Doors Inputs or Relays and select New from the Aare Management Fior Grou S i Y drop down list You can also select the desired group and press the keyboard
31. Click OK Log File Centaur can automatically save a xml log file of events to your hard drive This is convenient in the event Me filewptiom that you require assistance from our technical support team and a log of recent events is required Log file limit 00 entries 1 From Centaur s main menu select the Options menu and select Log File Boones Cancel 2 The Log file options window will appear Select the Enable Log check box This feature is disabled when the check box is cleared 3 Inthe Log file limit text field type a value in amount of entries from 10 to 1000 4 Click OK Manufacturing Access Control Since 1985 r ao Ha REFERENCE MANUAL Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control ar What Will Find Quick Start Programming Using the Centaur software you can control the access to the parking The access to the parking may be assigned to specific users and to members of user and visitor group A relay may be activated to indicate that the parking is full Manufacturing Access Control Since 1985 REF Overview of Parking Management Parking management allows you to define the parking capacity select a relay that will be activated when the parking is full and whom will have access to the parking Quick Start Programming To properly set up Centaur for parking management several different elements must be progra
32. Find POCO OVI vega lececeeeewe pt ose eet r oka Sek ae bot oe e508 bed eb oe ee lobed eat et eee eeeee bese ae ees 200 Moding DYR SCUnGs 24 cedateans beer caewe yes ein tae fee eeehewd ones tens Eee thoes ee de sae ROR 200 Deleting a DVR This section allows to add and configure DVR settings It also covers how to access archive or live video and how to use the search video feature Manufacturing Access Control Since 1985 r a i Lp REFERENCE MANUAL Accessing the Available DVRs From the Centaur toolbar click on the Display DVR Setting icon The available DVR s window will Name Description Manufacturer Channels IPAddress Port appear listing all configured DVR Amines for this site Each DVR will be listed with the following information Name Description Manufacturer Channels IP Address Port Search Port and Database Path Available DYRS RREA aa Thine Add Modify Delete eA Adding a DVR From the available DVR s window click on the Add button The DVR settings window will appear see Modifying DVR Settings allowing you to configure the DVR settings Modifying DVR Settings To modify the DVR settings from the Available DVR s window select a DVR from the list by clicking on it then click on the Modify button ii Rene Cam vid Description Name Use the Name text field to identify the DVR We recommend using a name Manufacturer ninawa that is represe
33. Flashing gt M latched Access time out jor Door open too long jon x IV latched Waiting for keypad Flashing v Door unlocked o x F latched Keypad time out Flashing e If you select Off the selected event will never activate the output e If you select On the output will activate for the amount of time defined by the Activation Time see step 4 when the corresponding event occurs e If you select Flashing the output will activate for the amount of time defined by the Activation Time see step 4 and will flash according to the rate defined by the programmed Output Timings see Setting a Flashing Output s On Off Timers on page 158 when the corresponding event occurs Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Outputs F 3 Six of these events also have a latched check box If the latched check box is selected the output will ignore the Activation Time and instead will follow the event that activated it This means the output will deactivate when the event is restored 4 Inthe Activation time text field type a value from 0 to 999 seconds If an event is set to On or Flashing see step 2 and the event occurs the output will activate for the amount of time defined here unless the latched check box is selected 5 Selecting the Inverted check box will reverse the output s normal condition to ON Therefore when activated the output will turn OFF and when the ou
34. If you do not set these properties you will not be able to exit the Site Properties window All other settings will be unavailable Figure 1 Dial up Site REMOTE SITE CT V900 A 2 Door Controller First controller of a site LAT EGRATES ACESS COSTE SERVER To next controller apil DB25 to DBS cable gt T 6mM 25 ft Max or REMOTE SITE CT V900 A Heeli 2 Door Controller ee First controller of a site 7 6m 25 ft MAN P CA A360 USBRS z USB or RS 247 to Y RS 485 converter To oier remote siig Start point of the RS 485 contallar n twoark Furthest Gonirciiars Gan ie up ia 1220m 4000 ft from stant point To next controller LY Using the Dialup connection method limits the amount of controllers to 64 Manufacturing Access Control Since 1985 En in k T REFERENCE MANUAL UR 3 1 TCP IP LAN WAN Select this method to have a site that communicate over a TCP IP network To do so you must connect one or more TCP IP converter CA ETHR A as shown in Figure 2 The CA ETHR A converts the RS 232 communication protocol into the TCP IP protocol After selecting TCP IP LAN WAN you are required to further set the site properties See Selecting the Site Speed on page 33 Selecting the Site Communication Schedule on page 33 and you must also set the TCP IP communication settings of each controller as detailed in Configuring the Controller Communication
35. L L Le O O JO JO JO O JO O JO O JO JO JO W L W W L L L W W u W L Le L L Le L L Le L Le Le Le L L O jO O O O jO O jO O O O O O O LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL LL O O O O O O O O O O O O O O O Ge LO jo IN jo o o N LO lo IN jo o O OFF OFF OFF OFF OFF 34 ON OFF OFF OFF OFF ON FF Controller Dip Switches OEE ee ee ORE OEE Ol ee one pe Coe Oren TK SE Ke 65 33 Ke O ae Cont Manufacturing Access Control Since 1985 REFERENCE MANUAL UR5 1 r Figure 9 Overview of Controller Programming Centaur All Events Err see 4 SER VER RABS Convertor io AP Uraasigned Carde i w AM Accent Levels 4 BD idea ee E Sehi 3 BP cortrcters 2 x i Conie Dij J E aE a i 2 Address Wi EF Outputs Dig d Corola 000 Aa aalo p Setuhes A ti 4 pti G rT oli Security Leret 2 D Gipi timing Doors Relays 8 Perrinicrs 2 inputs amp Outputs Inputs amp Chuttets Typing the Controller Name Use the Name text field in the Controller tab to identify the controller s use or location We recommend using name that is representative of the controller such as Main Entrance Also refer to Typing Names and Notes on page 23 Typing the Controller Notes Use the Notes text field in the Controller tab to record any a
36. Last Access on page 56 for more information History List event s history for the current visitors The Events Name Host Operator and Time information are displayed Personal Information Custom Fields Badge Cards Door Access Rights Last Access History Assets Notes View Details Refresh Assets Le Refer to Assets on page 58 for more information Notes LY Refer to Notes on page 58 for more information Manufacturing Access Control Since 1985 Deleting a Visitor In the Database Tree View window right click the desired visitor and click Delete from the drop down list You can also select the desired visitor and press the keyboard Delete key A dialogue box will appear requesting confirmation Adding a Visitor Group In the Database Tree View window right click Visitors from the desired Site branch and click New Visitor Group The visitor group properties window will appear allowing you to configure the visitor group properties Refer to Modifying a Visitor Visitor Group Default Access Levels Options Parking Visitors below for more information Site 1 Visitor Group 2 Name Suppliers gt Visitor Group Properties i OF Cancel Apply Modifying a Visitor Group From the desired Site branch in the Database Tree View window right click the visitor group you wish to modify and click Properties from the drop down list You can also select the desired vi
37. None In this example when input 3 is triggered it will bypass Door 001 03 Contact Door 001 04 Contact and Door 001 05 Contact for the period defined by their respective Bypass Delay timers 30 seconds for Door 001 03 Contact Door 001 04 Contact and 125 seconds for Door 001 05 Contact Input 3 Input Group 1 Input Properties Input Details Configuration Normally Closed Enabling Schedule Always Input response time 00500 ms Bypass Delay Timer setto 36 Input restore time 00500 ms Bypass delay F This input activates relay Noe o YS Bypass Delay Timer set to 125 This input bypasses input Noe s iS Activates relay group None s i Bypass input group Bypass Delay Timer set to 30 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Inputs Activating Relays with an Input When an input is triggered the controller can be programmed to activate one relay or a group of relays The relay s will remain activated for the amount of time defined by the relays Activation Time see Setting the Relay Activation Timer on page 140 Also refer to the example demonstrated in Figure 29 on page 151 1 From the This input activates relay drop down list select the relay that will be activated upon triggering of the input 2 From the Activates relay group drop down list select the relay group that will be activated by the input Figure 29 Example of Activating Rela
38. Otherwise click Run from the Start menu type the appropriate drive indicator x followed by setup exe or click Browse to search for the setup exe file Click OK 3 The Centaur 5 1 Setup window will appear If this is a new installation of the Centaur software click Next and go to the next step To update previously installed Centaur software select Update click Next follow the on screen instructions and click Finish 4 The License Agreement window will appear To install the Centaur software select accept the terms of the license agreement and click Next 5 The Type of installation window will appear To install the Centaur Server select System management and communication with control panels Server and Workstation If you wish to select a different folder destination for the Centaur or MSDE software click the appropriate Browse button choose the folder destination and click OK Click Next The Administration Console is installed with the Centaur Server by default The Centaur software is installed by default to C Program Files CDV Americas Centaur The MSDE software is installed by default to C Program Files Microsoft SQL Server 6 The Selecting Languages window will appear The Centaur Server supports three languages English is automatically supported by default Select two other languages and click Next 7 The Centaur Pre Requisites window will appear Setup automatically detects and lists which prerequisites have
39. See Toolbar on page 19 to select what you want to display in the Real Time Events Status window When All events Access events Abnormal events or Acknowledged events is selected the Real Time Events Status window displays the following Event Name Description User Card Field Time date and time and Logged Time When Door Relay Input Output Visitor Parking status is selected the Real Time Events Status window displays the following Door Relay Input Output Name Address and Status When Controller status is selected the Real Time Events Status window displays the following Controller Name Address Status Number of Cards and Number of Errors Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Understanding the Centaur User Interface Alarms Window The Alarms window lists all the alarms related to all sites The Alarms window displays the following Site Alarm Name Instructions Description and Field Time date and time Status Bar The status bar is located at the bottom of your screen displays the following e Status Indicates the status of the Administration Console e System Operator Displays the current system operator login name e Server name Indicates the name of the server e Communication Indicates the site communication status Refer to Communicating with a Site on page 42 for more information e Keyboard Indicates the status of your computer keyboard Caps Lo
40. Starting the Centaur Server and Software on page 11 2 Click Start point to Programs CDV Americas Centaur and click Centaur Database Manager 3 From the SPXDBase Logon window type the appropriate Logon ID and Password Centaur s database file management utility uses the same Logon ID and Password as Centaur Manufacturing Access Control Since 1985 Backing Up Databases Performing a backup will save all information in the selected database s into a file with a bak extension These files can later be restored to the SQL Server application used by Centaur see Restoring Databases on page 233 Also refer to What are the Centaur Databases on page 230 We highly recommend that you back up your databases regularly and that these backup files are saved on a form of removable media i e tape backup zip disk etc as well as on your computer s hard drive This safety precaution is an important part of keeping your data safe If for any reason a database becomes corrupt you will be able to restore a backed up file Creating a backup is also useful for keeping a log of events especially if the size of the Event database is limited see Limiting the Event Database s Size on page 234 or to save as a default programming database for future applications 1 LY Spaces are note supported in the path or in the file names After starting the Database Management Module as described in Starting the Database
41. k access Remotely accessible registry paths and sub pa k access k access Shares that can be accessed anonymously k access Sharing and security model for local accounts k security k security Force logoff when logon hours expire LAN Manager authentication level LDAP client signing requirements B Ain tines ee eerie eer Foe BITIRA CEN Lae Manufacturing Access Control Since 1985 Do not allow storage of credentials or NET Pa Let Everyone permissions apply to anonymou Named Pipes that can be accessed anonymou Restrict anonymous access to Named Pipes a Do not store LAN Manager hash value on ne Disabled Enabled Disabled Disabled Disabled netlogon lsarpc sa System CurrentCo System CurrentCo Enabled Not Defined Classic local user Enabled Disabled Send NTLMv2 resp Negotiate Ala ee signing F REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration oF 36 The Network Access Sharing and security model for local account window will appear From the drop down list click on Nana eT Classic local users authenticate as themselves and then click Local Securty Sanno Epinin Ok Mehik pochi Shang and secuity model for bocal accounts Network accece Sharing and cecutty model fer local accounts P 0 E am h S Clita Lael i Manufacturing Access Control Since 1985 REFERENCE MANUAL figuration UR 5 1 F DCOM Configur
42. 3 Sites What Will Find POGING A ONG fer eaa e eo oeee cea tose pet oe ee beta Seok ae eh hee od eet he eee e tee ew et eer ue eet seed epoca 26 MOP ING ASN 5 oe ee oe Ce en Beha eed aee ete d ease eee berate ee eee heehee bbe eee esate A ees eens 29 DelCUNG 4 DIC eacdatcetacnavecs eens eee Shweta emeeeeandes Hebe ee teehee eee ee ee oaedaeeeee EEE EEST 42 Communicating with a Site 2 eee eee eee eee 42 Using SAP MEAO sc cacao ee ea oe eed eee pate ee cee tan eee eee en eee seen tee eee sees Da a E scene 43 Each site can monitor and operate a specific number of cards controllers inputs relays and multi function outputs depending on the Centaur software edition being used The first step in setting up your system is creating and defining your sites Once your sites have been defined you can begin programming the remaining items such as controllers users visitors schedules and doors In the Sites branch local sites will be represented by a traffic light icon remote dial up sites will be represented by a telephone icon and TCP IP sites will be represented by a network icon depicting five computers Manufacturing Access Control Since 1985 r ao Ha REFERENCE MANUAL Adding a Site Perform the following to add a site 1 From the Database Tree View window left hand portion of your screen right click the Sites branch and click Add Site You can also click the Sites branch and press the keyboard Insert key
43. Add Port Windows Firewall Windows Firewall is tumed off Your computer is at risk of attacks and intrusions from outside sources such as the Intemet We recommend that you click the General tab and select On Programs and Services Intemet Explorer Java TM 2 Platform Standard Edition binary Microsoft Management Console Remote Assistance LI Remote Desktop Skype O UPnP Framework Windows Live Messenger 8 0 Phone Windows Live Messenger 8 1 Windows Live Messenger 2 1 Phone k aii Display a notification when Windows Firewall blocks a program What are the risks of allowing exceptions 4 The Add a Port window will appear In the Name field enter i DCOM In the Port number field enter 135 Select TCP as your ph oP communication type and click OK Lee thee setings lo open a ped frugh Windsws Frewall To lind the parl IG ao Nama DCOM Paarden 135 si TC CDP What are the aros of opening a cot Change seepe Lak c i Manufacturing Access Control Since 1985 5 The Windows Firewall window will re appear From the Exceptions tab make sure that the DCOM check box below the Programs and Services heading is selected If you are configuring repairing the firewall settings on a workstation connected to the Centaur Server computer click OK and your done with this computer If you are repairing your firewall settings on the Centaur Server computer go to the next step 6 From the Excepti
44. April 25 10 ad T Check 1 Check 2 T Check 3 T Check 4 Badge The badge is used to define what will be printed directly on the front and back sides of the user access card 1 From the user properties window select the Badge tab Permon invcemation Custom Beds Badge Cards Door Access Fiyin Last Access Vistar Aasaia Motes Launch the badge template editor Print the selected badge 2 Select a Template from the list or use the Launch the badge template editor button to create a new template see Badge on page 50 3 Select the language to be used from the Language of user defined text drop list 4 Select the front or back side preview to be displayed using the Front Side or Back Side radio buttons Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Users and User Groups Buttons Launch the badge template editor Allows defining the front and back side of the badge See Badge on page 50 for more information Print the selected badge Allows printing the defined user s badge layout Manufacturing Access Control Since 1985 REF Launching the Centaur Badge Editor The Centaur Card Template Designer allows defining the front and back side of the badge 1 To launch the editor click on the Launch Editor button Select Template Select a template and click Load to open the selected template Template Click New to create a new template enter t
45. Browse button choose the folder destination and click OK Click Next LY The Centaur software is installed by default to C Program Files CDV Americas Centaur 6 The Centaur Pre Requisites window will appear Setup automatically detects and lists which prerequisites have and have not been installed on your computer To install the required software components click Next and follow the on screen instructions If you already have all prerequisites Setup will skip this step continue with next step 7 When Setup has completed the installation of the Centaur software the InstallShield Wizard Complete window will appear Select if you wish to restart your computer now or later Click Finish A Before you can use the Centaur software you must restart your computer LY An icon for the Administration Console Workstation is automatically added to your computer desktop The Centaur software manuals are automatically installed on your computer To locate a software manual click Start Programs CDV Americas Centaur Administration Console and Manuals The Centaur hardware manuals must be manually installed on your computer To locate the hardware manuals on the CD open Windows Explorer Click on the appropriate drive indicator x from which the Centaur CD is running Double click the Manuals folder Double click the Hardware Manuals folder Copy and paste the manual s to the computer drive and folder of your choice Manufacturing Acce
46. Centaur Administration Console Workstation Software 1 From the Centaur server computer or from a networked workstation click Start Programs CDV Americas gt Centaur gt Administration Console Administration Console The Centaur Logon window will appear If you are starting a software module click Start gt Programs gt CDV Americas Centaur Administration Console gt the appropriate software 2 From the Centaur Logon window type the appropriate Logon ID and Password The default Logon ID is Admin and the default Password is Admin If you are trying to log on to a Centaur Server that is on a network type the Server computer s network name or IP address in the Computer text box From the Language drop down list select the desired language Click OK To allow access from remote workstations DCOM must be configured on the Centaur Server computer refer to DCOM Configuration on page 243 When starting Centaur for the first time a dialogue box appears asking if you would like to use the site configuration wizard Refer Adding a Site on page 26 for more information Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Installing and Using Centaur ey Software Modules All software modules listed below unless are automatically installed with the Centaur Server or Workstation software FrontDesk This module provides an easy to use interface to program user properties and includes an
47. Command from the drop down list You can also select CCTV Commands and press the keyboard Insert key The CCTV Command Properties window will appear see Modifying a CCTV Command allowing you to configure the CCTV Command Modifying a CCTV Command Right click the desired CCTV Command from the CCTV Commands branch in the i CCTV Command Properties Database Tree View window and select Properties from the drop down list You can also select the desired CCTV Command from the CCTV Commands branch in the General Details Database Tree View window and press the keyboard Enter key The CCTV CCT Commanc O01 Command Properties window will appear allowing you to configure the CCTV PER Cmi Command Notes General CCTV Command Properties From the CCTV Command Properties window select the General tab to record the CCTV Command s name and any additional notes Typing a CCTV Command s Name Use the Name text field in the General tab to identify the CCTV Command We recommend using a name that is representative of the CCTV Command such as Cam1 Vid3 Also refer to Typing Names and Notes on page 23 Typing a CCTV Command s Notes Use the Notes text field in the General tab to record any additional notes that may be required We recommend that you keep a log of what settings were changed and when they were changed Also refer to Typing Names and Notes on page 23 CCTV Command Settings A CCTV Command an
48. Database The Pro Report database Pro Report contains all Pro Report configuration such as predefined report schedule report etc Tracker Database The Tracker database Tracker contains all tracker time and attendance configuration punches modification access events copied from the event database Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Database Management Database Management Module The Centaur Database Management Module is automatically installed with Centaur and can only be run on the Server This database utility was designed to control and manage the often large and complex database files of the Centaur software You can back up and restore database files purge events from selected sites during specific periods limit the size of database files and delete entire database files Starting the Database Management Module The Database Management Module can be started using one of two methods To start the module from within Centaur click the Open Database Management Module icon from the main menu bar If you open the Database Management Module from within Centaur the Restore Attach Detach and Remove database options will not be available To access all database options run the Database Management Module as described below 1 Make sure the SQL Server is running and that the Centaur Administration Console isn t running and the Centaur Service Manager is stopped and exit refer to
49. Daye Not Used i Cancel Status Use the Description text field to identify the card We recommend using a name that is representative of the card Also refer to Typing Names and Notes on page 23 Start Date End Date LCD Display Name Use the LCD Display Name text filed to enter the name of the user that will be displayed on the Tracker LCD when the user punch needs firmware R2 G3 70 in order to work Family Number The family number can be found printed directly on the card or written on a cross reference sheet The family number is always the first part of the number and is usually followed by a colon e g 247 1234 If you cannot locate the family number you can present the card to any reader in the system and its family and card number will appear in the User Card field of the Real Time Events Status window see Figure 19 When you have located the correct number type it into the Family Number text box This text box will not be available if the maximum family number is set to 0 see Selecting the Cards Maximum Family Number on page 36 Card Number and Card Number HEX The card number can be found printed directly on the card or written on a cross reference sheet The card number is always the second part of the number and is usually preceded by a colon e g 247 1234 If you cannot locate the card number you can present the card to any reader in the system and its family and card number will appe
50. Door Input El Centaur Sites 1 Input REX Input Front Door Manufacturing Plant Montreal Haak Disabled d DAL j Users 2 nfe Visitors 1 REX Input He Unassigned Cards 2 i Input Door 001 01 REX Re Access Levels 3 ea Holidays 1 Relock Door opening H E Schedules 4 lAweys td Controllers 13 O 7 Controller 001 Assign which output s can be I Unlock on REX Normal Door Properties Doors Foe Door 001 01 L Door 001 02 activated by each door l Unlock on REX Regardless of Door Status Interlock Input a Relays Bb Cutouts Schedule Never lt Door 001 01 Buzzer Door 001 01 Green LED lt Door 001 01 Red LED ve Door 001 02 Buzzer Door 001 02 Green LED N Door 001 02 Red LED w Events he Macro Hg Groups Security Levels 3 _ D Output Timings EE E P m Output Activation Define what event s will cause 71 Fa Ta la Ps Fe each output to activate Output Properties Output Events Activation time oos seconds 0 to 999 l Inverted Anti passback status jor Wrong code on keypad on x Access granted Off z Door open lof x ered Access denied jon x Door forced open lof latched REX granted Off Reader disabled Of Output Timing Properties REX denied Off Door open pre alarm Of gt Timings Milliseco
51. Expander tab two Reader and two Keypad Poll Door Expander Status Non Stop Front View drop down lists appear for each 2 Door Expansion Module Use these fields to configure the readers and or keypads connected to the 2 Door Expansion fpesesacala Modules In the Expander tab each Reader and Keypad drop down list is Reader 1 Standard 266 z Keypad 1 None Fi associated with a predetermined input on a specific 2 Door Expansion Reader 2 Standard 26Bit Keypad 2 None Module which is determined by its DIP switch settings as shown in Figure T Poll Door Expander Status Non Stop Front View 12 on page 98 Door expander 3 Reader Reader 1 Standard 2661 v Keypad 1 None gt From the Reader drop down list select the type of reader used If no Reader 2 Standard 26Bt v Keypad 2 None reader is being used on the selected door input select None Pol Door Expander Status Non Stop Front View Cancel Keypad From the Keypad drop down list select the type of keypad used If the door is not using a keypad select None When both a reader and a keypad are used only users with the Use Keypad option enabled see Use Keypad on page 130 have to use both to gain access Poll Door Expander Status Non Stop By enabling the Poll Door Expander Status Non Stop Front View check box Centaur will poll the selected 2 Door Expansion Module every time it polls the controller Select this feature when using Ce
52. From the taskbar click Start gt Run The Run window will appear Enter cmd in the text box and click OK ko o ales H Type the name of a program Folder document or Internet resource and Windows will open it For you Open cmd ha Cancel Browse The C WINDOWS System32 cmd exe window will appear Type cd systemroot system32 and press the keyboard Enter key Type msdtc install and press the keyboard Enter key ce Select C WINDOWS system32 cmd exe Microsoft Windows KP Version 5 1 2688 CC Copyright 1985 2081 Microsoft Corp C Documents and Settings Technical Support cd Msystemroot systems2 C WINDOWS systems gt msdtc install Manufacturing Access Control Since 1985 r a i Lp REFERENCE MANUAL figuration Verifying if the DCOM has been repaired Perform the following steps to verify that DCOM has been repaired 1 From the taskbar click Start gt Run The Run window will appear Enter dcomcnfg exe in the text box and click OK Type the name of a program Folder document or a Tobeorest neie ated Yaira wall coer E few yom 2 The Component Services window will appear In the Console Root folder left side of your screen expand the Component Services branch the Computers eee branch and the My Computer branch If there is a red arrow next to any of the components of this folder DCOM has not been successfully repaired and you must repeat
53. Holidays in the desired Site branch and click New Holiday You can also click Holidays and press the keyboard Insert key to add a new holiday After adding a holiday the Holiday Properties window will appear allowing you to configure the holiday see Holiday Settings on page 76 Up to 128 holidays can be created in the system Modifying a Holiday From the desired Site branch in the Database Tree View window right click on the holiday you wish to modify and click Properties You can also click the desired holiday and press the keyboard Enter key The Holiday Properties window will appear allowing you to configure the holiday General Holiday Properties From the Holiday Properties window select the Holiday tab This allows you to D Holiday Properties view the holiday s name and any additional notes Holiday Details Site 1 Holiday 1 Name New Years Dap 000 gt Typing the Holiday Name Use the Name text field in the Holiday tab to identify the holiday We recommend using a name that is representative of the holiday such as New Year s Day Also refer to Typing Names and Notes on page 23 Typing the Holiday Notes Use the Notes text field in the Holiday tab to record any additional notes that may be required We recommend that you keep a log of which schedules have oar this holiday selected Also refer to Typing Names and Notes on page 23 _Cencel Holiday Settings You can
54. L al Firewall settings need to be altered on the Centaur Server computer and on any workstation connecting to the Centaur Server computer through DCOM In your firewall you need to Open the port 135 DCOM port Allow access in Inbound and Outbound for the program SPXSVR exe found on C Program Files CDV Americas Centaur Centaur Server on BOTH workstation and server On the server only you need to allow access in Inbound and Outbound for the program sqlsevr exe found on C Program Files Microsoft SQL ServerMSSQL Binn Please refer to your firewall documentation if you need help If you are using the Windows firewall follow these steps to alter your settings 1 From the taskbar click Windows icon gt Control Panel Manufacturing Access Control Since 1985 REFERENCE MANUAL 2 The Control Panel window will appear Double click r Te on the Allow a program RE ER Control Panel through Windows Firewall E Feorh P z Como Panel Home User Accounts Change account type System and Mairitenarnvce Get started wrth Windows Classic View Hark up Sur EnA E Appearance and Personalization Change decktop background Security for ude Cheri e Sy a preg Ahreugh 1 la i Eh m jha paber ok F Winda Firewall Range the cole scheme Aur rerna si lulur Network and Internet View netevork status amd tasis Clock Language and Cot iy n File ch Hng i L a Region Chan
55. Mail Video Macro amp Headcount in the list When you select Front Door Frank Smith CD Laval Canada schedule Devices from the Settings for Froduction Entrance S creer lAways and or Card Holders drop down RED z O list See step 2 in Event Definition Overview on page 162 the Device Activation definitions that you program in the Action None General Alarms E Mail Video Time 0 65535 ms max and Macro amp Headcount tabs will Device RelayO0l01 gt apply to the highlighted devices In Schedule Neve a this case Front Door and John Dole Reset Event s Definition to Default To reset an event s definition to default right click the desired event from the Events branch in the Database Tree View window and select Reset Settings You can also select the desired event and press the keyboard Delete key Setting the event s definition to default will e Always show the event in the Real Time Events Status window see Screen on page 164 e Always log the event in the Event database see Disk on page 164 e Disable alarm acknowledgement see Enabling Alarm Acknowledgement on page 166 e Disable CCTV control see Enabling CCTV Control for an Event on page 169 Manufacturing Access Control Since 1985 REFERENCE MANUAL Event Schedules and Device Activation Once an event has been selected as described in Event Definition Overview on page 162 click the Setting
56. Manufacturing Access Control Since 1985 General Schedule Properties From the Schedule Properties window select the Schedule tab This will allow you to view the schedule name and any additional notes Active Select the Active check box to enable the schedule allowing you to assign the schedule as required Clear the Active check box to disable the schedule without having to remove it from the database this will disable any system device or card assigned to this schedule Schedule Name Use the Name text field in the Schedule tab to identify the schedule We recommend using a name that is representative of the schedule such as Production Schedule Also refer to Typing Names and Notes on page 23 Schedule Notes REFERENCE MANUAL CENTAUR 5 1 Schedules Schedule Properties Schedule Details Site 2 Name Schedule 5 IV Active Production Schedule gt Cancel In the Notes text box record any important explanations of the schedule and its use Try to keep an up to date record of where the schedules are used This will help you understand how disabling the schedule will affect the system Also refer to Typing Names and Notes on page 23 Schedule Periods Each schedule consists of up to eight periods and each period defines when the schedule will be valid Each period can be programmed with a different start and end time Use the check boxes to define which days of the week and w
57. OUTS Add 3 OUT3 Add 9 OUTS Add 15 OUTS Add 21 OUT4 Add 4 OUT4 Add 10 OUT4 Add 16 OUT4 Add 22 OUTS Add 5 OUTS Add 11 OUTS Add 17 OUTS Add 23 OUT6 Add 6 OUT6 Add 12 OUT6 Add 18 OUTS Add 24 Manufacturing Access Control Since 1985 REF Typing the Output Name Use the Name text field to identify the output and its use We recommend using a name that is representative of the device that it is controlling such as Door 1 Buzzer Also refer to Typing Names and Notes on page 23 Typing the Output Notes Use the Notes text field in the Output tab to record any additional notes that may be required We recommend that you keep a log of when and what settings were changed Also refer to Typing Names and Notes on page 23 Output Settings Each controller includes six multi function outputs Each controller also supports up to three 2 Door Expansion Modules CA A470 A which provide an additional 6 outputs each Therefore each controller can monitor the state of up to 24 outputs Typically the controller s outputs are used to control the built in LEDs and buzzers of the card readers and keypads in the system You can individually program each output to follow a specific event as well as determine whether the output will be timed pulsed or latched Also refer to Overview of Output Programming on page 154 Determine how the six outputs will be used Typically they are set up as
58. Options 17 209 Alarm Acknowledgement 210 Events 211 Status Display 211 Options Cards 130 Outbox 35 Output Activation 115 Output Programming 154 Output Properties Activation Time 156 Events Tab 156 Inverted 156 Output Tab 155 Output Status 152 159 223 Output status 17 Output Timing Properties Timings 158 Outputs 153 Override Anti passback 130 Override Interlock 130 Overview of Output Programming 154 Owner 196 P P I N 130 Generate Unique 35 Parking 215 Parking Global Entry Exit 109 Password Setting the Operator s Access Rights 188 Pending Cards 131 Periods 81 Photo 197 Poll Door Expander Status Non Stop 97 Poll Timeout 95 Port Number 93 Pre alarm Time 112 Preset CCTV Command 193 Print Card Information Centaur s Card Management feature 64 Programming Rights Security Levels 186 Pro Report 13 18 Protocol CCTV 169 Purging Databases 237 R Reader 109 Reader Disabled Output Activation Events 158 Reader Format Custumization 99 Reader Type 92 Reader Type Door Expansion Module 97 Reader Controllers 91 Manufacturing Access Control Since 1985 Reading Device 109 Reading Type Options 117 Real Time Events Status Window 22 Refresh 17 Relay Activation Time 140 Relay Groups Activate or Deactivate 176 also see Groups 174 Assigning Relays to a Relay Group 174 Relay Properties Activation Tab 139 Relay Tab 138 Relay State 147 Relay status 17 Relay Tab 138 Relay Activate with Anti Passback 96 Relays 137
59. REFERENCE MANUAL CENTAUR 5 1 Elevator Control 3 Define when each floor of a door elevator cart is accessible to the general public no access card required In the Door Properties window of the desired door select the Elevator Control tab and assign a schedule to each floor see Floor Public Access Schedule on page 117 4 To access a floor when its schedule is invalid you must create a floor group and assign the floor group to the desired cards Expand the Groups branch within the Database Tree View window right click on Floor Groups and click New Floor Group from the drop down list You can also select Floor Groups and press the keyboard Insert key In the Floor Group Properties window select the Floors tab and assign specific floors to the floor group and then assign a schedule and an alternate schedule to the floor group see Floor Group s Floors and Schedules on page 174 5 Access the Card Properties window of a desired user by right clicking on the desired user select Properties select the Card tab select the card from the list then click on Modify Assign a floor group to the card see Modifying a Card on page 128 Figure 21 Example of Elevator Control Door 1 for Door 2 for Elevator Car 4 Elevator Car 2 DIP switch settings on elevator controller i P determine floor assignment of its relays CT VJ00 A Controller amp Door 1 Elovator Car 1 Door 2 Elovator Car 2 s Floors 1 to 16 Floors 1 to 16
60. Repeat Sound Every 242 Requires Acknowledgment 166 Reset Anti passback 36 Reset Anti passback Status 96 Reset Anti Passback Scheduled 96 Reset Controller 101 Reset Event s Definition to Default 163 Reset Parking Count for Selected Group 226 Response Delay Controller 95 Response Time Inputs 149 Restore Time 149 Restoring Databases 233 REX Denied Output Activation Events 157 REX Granted Output Activation Events 157 REX Input 174 Round 187 Round Check Points 187 Rounds 180 Running the wav Player 242 Running the Database Management Module 237 S Save Changes Centaur s Card Management feature 63 Saving Events to Disk 164 Schedule 87 181 Activating Relays 140 Alarm Acknowledgement 166 Anti Passback 96 Anti passback Reset 96 CCTV Control 169 Communications 33 Event Definitions 164 165 Floor Groups 174 Floors 117 Inputs 149 Keypad 110 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Timed Activation Relays 139 Unlock 110 Schedule Database Backups 238 Schedule Properties Details 81 Schedule Tab 81 Schedule Tab 81 Schedules 79 Schedules and Doors Access Levels 123 Schedules Can Be Used Where 80 Screen 164 Search for a Card in Centaur s Card Management feature 64 Security Level Properties Operations Tab 187 Security Level Tab 185 Security Levels 186 Selecting Events 162 Send ASCII Command 169 Serial Number 179 Serial Port Connection 30 Server name 23 Setting Centaur as a servic
61. S S S S 8 Of of co ae G oe em I Oo Oo oOo Oo m o Period Period 8 Ze E E ai Bee E ai Behe a E as Behe E E H lt E E E E G E ii E E E E G E gi Program the Access Levels by assigning a 3 schedule to each selected door Here we programmed the Production access level Pom Access Level Properties Card Properties Access Level Doors and Schedules Users Description 150 8 Card Number HEX 0000960002 d LCD Display Name Family Number oor 50 Door Schedule CI FrontDoor Access Level 1 Production Entrance v Card Number 00002 a n Entrance Access Level 2 None P N 00000000 Access Level 3 None X Use Keypad T Card Traced Access Level 4 None AOT ONA Floor Group None v Interlock Override Antipassback Override Location Unknown v Guard Tour Status invada a Start Date 04 05 2010 End Date 04 05 2010 Z 7 Enable Card Traced 30 Days Before End Date l Enable Counter fo Maximum 255 Disable Card After fo Days Not Used Assign the desired Access Levels and program the required Card properties Notes Cancel Programming a card allows you to define the card s specific privileges Cards can be added individually or in batches You can also add cards within the User Properties Cards window refer to Cards on page 55 Manufacturing Access Control Since 1985 Adding Cards In the Database Tree View window ri
62. Security Descriptor Definition Language SDDL syntax Remove Deny Permissions for Centaur Local Access CL Remote Access Cancel Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration DCOM Configuration for Windows 2000 Pro and Server To be able to configure the DCOM on Windows 2000 operating system you have to be logged in as Administrator 1 From the taskbar click Start gt Run y Run OO O O ee zjx 2 In the RUN window type dcomcnfg exe Click OK or press the keyboard Enter key Type the name of a program Folder document or Internet resource and Windows will open it For you Open deomenfi Cancel Browse 3 The Distributed COM Configuration Properties window pops up Highlight SpxSvr from the list and click on Properties Distributed COM Configuration Properties Applications Default Properties Default Security Default Protocals Applications SENS Logon Events SENS Network Events SENS OnNow Everts SENS Subscriber for EventSystem EventO bjectthange events Sound Recorder SpeCard Application SP Coram SFUI Tints vr Voice Dictation Manager Windows Management Instrumentation Windows Media Player Windows Update Agent Remote Access Windows Update Agent 1 Windows Update Agent 2 Windows Update Agent User Interface for Published Applications WordPad Document Ww SHAR emote
63. Selecting a Computer COM Port for CCTV From the COM Port drop down list select the computer COM port used to communicate the CCTV commands to the video switcher Connect the video switcher to the selected COM port The selected COM port will use the communication settings defined by the Baudrate Data Bits Parity Stop Bits and Flow Control lists Selecting a Video Switcher Baudrate In the Baudrate list select a baudrate that is compatible with the video switcher connected to the selected COM port Setting the COM Port Communication Parameters Select the required data bits parity stop bits and flow control settings to communicate with the video switcher connected to the selected COM port Set the following parameters as required Data Bits From the Data Bits drop down list select the number of data bits required to communicate with the video switcher connected to the selected COM port This value is the number of bits used to represent one character of data Most forms of data require eight bits Parity From the Parity drop down list select a parity value that is required to communicate with the video switcher connected to the selected COM port Parity check is an error detection technique that tests the integrity of digital data within the computer system or over a network Each time a byte is transferred or transmitted the parity bit is tested Stop Bits From the Stop Bits drop down list select the number of stop bits req
64. This may be useful when somebody from another workstation did some modifications recently Set Time The Set Time button allows to manually set the time of the DVR Click the Set Time button to establish the communication with the DVR Once the communication is established enter the new time Manufacturing Access Control Since 1985 gt F A a Fi 7 REFERENCE MANUAL Deleting a DVR From the Available DVR s window select a DVR from the list by clicking on it then click on the Delete button A dialogue box appears requesting confirmation Viewing Archived or Live Video When an event defined to use DVR occurred refer to Link to DVR on page 169 an event is ee fees See ay 5 coco l ET a i added to the Real Time Events Status Window aa i y p i A camera icon to the left of the event name ipp indicates that this event is a DVR video capture aye event Gotan sais tate bel HO Right click on the camera icon and select either fine are eaten Sal ene Show Archived Video see Show Archived a irenka AEM Video on page 203 to watch recorded video or ve Show Live Video see Display Live Video on mares page 204 to watch a live video dese Right click on the icon to show Archived Video or Show Live Video Manufacturing Access Control Since 1985 Show Archived Video The Centaur DVR allows to watch a saved archived video j REFERENCE MANUAL CENTAUR 5 1 DVR To watch an a
65. User Group In the Database Tree View window right click the desired user group and click Delete from the drop down list You can also select the desired user group and press the keyboard Delete key A dialogue box will appear requesting confirmation Manufacturing Access Control Since 1985 r a g REFERENCE MANUAL UR 5 1 User Groups FrontDesk FrontDesk is a module that is automatically installed with the Centaur software It provides an easy to use interface to program the user properties see General User Properties on page 47 and includes an advanced search engine You can run FrontDesk without having to run Centaur Starting FrontDesk FrontDesk can be started using one of two methods To start FrontDesk from within Centaur click the Open FrontDesk icon from the toolbar refer to Toolbar on page 19 or click the Modules menu and click FrontDesk You can also simultaneously press the Ctrl and F1 keys The FrontDesk User Management window appears In the tree view select the site whose users you want to view or modify To start FrontDesk without Centaur running 1 From Windows click Start Programs CDV Americas Centaur Administration Console and click FrontDesk 2 From the Logon window type the appropriate Logon ID and Password FrontDesk uses the same logon IDs and passwords as Centaur If you are logging on from a networked workstation type the Centaur Server computer s network name or IP ad
66. View window right click the input you wish to modify and click Properties from the drop down list You can also select the desired input and press the keyboard Enter key General Input Properties From the Input Properties window select the Input tab The Input tab will allow you to view the component addresses as well as record the input name and any additional notes Viewing the Input Address At the top of the Input tab Centaur will display the input address as well as the address of the input controller and site Please note that the DIP switch settings on each CA A470 A 2 Door Expansion Module determines the address Pesis assignment of its input terminals as demonstrated in Figure 27 on page 148 Site 1 Controller 1 Input 1 Name R EX Input Front Door gt Notes Manufacturing Access Control Since 1985 REFERENCE MANUAL 4 at 5 1 Figure 27 Overview of the inputs address assignation Controller GT ias CA A4T70 A Eo nE CA A4T0 A EE A470 A AATO A En nO Z1 2 input address 1 amp 2 Z4 input address 3 amp 4 25 6 Inputaddress 5 amp 6 Z 7 B Inputaddress 7 amp 6 9 10 Input address 9 amp 10 211 12 Input address 11 amp 12 213 14 Input address 13 amp 14 15 16 Input address 15 amp 16 Input address 17 72 input address 18 Z3 Input address 19 Z4 Input address 20 Z1 Input address 21 Z2 Input address 22 23
67. advanced search engine For more information refer to FrontDesk on page 62 Import Export Application This module imports or exports user infromation into from Centaur Supported file formats are XML and CSV fo rthe import a nd XML forthe exp ort T he access evel are notexpo rtednorimpo rted Se e the CSVReadme txt file for more in formation onthe CSV fiel ds for the import The CSVReadme txt file is located in the C Program Files x86 CDVI Group Centaur Administration Console folder Database Management Server only This feature allows you to control and manage the large and complex database files of the Centaur software You can back up and restore database files purge events from selected sites during specific periods limit the size of database files and delete entire database files For more information refer to Database Management on page 229 Database Backup Scheduler Server only Centaur s database backup scheduler enables you to schedule regular backups of the Centaur databases You can back up the Main database and the Event database separately specify the location of the backup files and select how often daily weekly or monthly the backup will occur For more information refer to Database Backup Scheduler on page 238 FrontGuard This module uses events generated in Centaur to retrieve a picture and or video feed to help you identify users or to view the location where an event has occurred For more in
68. and have not been installed on your computer To install the required software components click Next and follow the on screen instructions If all prerequisites are already installed the setup will skip this step go to the next step 8 When Setup has completed the installation of the Centaur software the InstallShield Wizard Complete window will appear Select if you wish to restart your computer now or later Click Finish Manufacturing Access Control Since 1985 REFERENCE MANUAL J R 5 1 ind Using Centaur A Before you can use the Centaur software you must restart your computer LY An icon for the Administration Console is automatically added to your computer desktop The Centaur software manuals are automatically installed on your computer To locate a software manual click Start Programs gt CDV Americas gt Centaur gt Administration Console gt Manuals The Centaur hardware manuals must be manually installed on your computer To locate the hardware manuals on the CD open Windows Explorer Click on the appropriate drive indicator x from which the Centaur CD is inserted Double click the Manuals folder Double click the Hardware Manuals folder Copy and paste the manual s to the computer drive and folder of your choice In installations where remote workstations will access the Server through a network DCOM must be configured on the Centaur Server computer refer to DCOM Configuration on page
69. arai arkir wall oper E few yous if Open SENET Lomponent Services E IF E re ener vale e Boe al Coraz Rent E E Carrere An 2 Computers Bh My Comouter i E COM Apoientions i Gl OCOM Config n 5 Burning Processes ig Evert Wewer Local Cormporant Serve ot Gre amon vew lender nep Dml seg Dns g COMH Apea E ET U E E COM OC Lepore LMS La D 2 2 DOMU HE Sa bame teem Seder Ce aol E Surbvced Transaction Coordin F LU rng Pa j vent fewer Local Jerie lows Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration Reparing DCOM Perform the following steps to repair your DCOM configuration ie From the taskbar click Start gt Run The Run window will appear Enter cmd in the text box and click OK Rn O O O 2 x Type the name of a program folder document or maf Internet resource and Windows will open it For you IC en cmd fist The C WINDOWS System32 cmd exe window will appear Type cd systemroot system32 and press the keyboard We Sec Sa Enter key Type msdtc uninstall and press the keyboard Enter key ce Select C WINDOWS system3 cmd exe Microsoft Windows KP Version 5 i 2600 CG Copyright 1985 26801 Microsoft Corp C 5 Documents and Settings Technical Support cd systemrootz systems2 iC SWINDOWS system32 gt msdtc unistall Reboot your computer
70. currently selected user click the Save button l Cancel the changes made to the current user To undo any changes made to the currently selected user click the Cancel button Enroll a new card using the CMPP module To load or add a card using a CMPP card enrollment station click the CMPP button Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Users and User Groups Cancel CMPP Search Print bs l Le e v r a i Lp REFERENCE MANUAL UR5 1 User Groups Search for a user a card or an unassigned card To search for a user card using specific criteria Click the Search button binoculars The Search window appears From the drop down lists or fields select the Site Field desired criteria Stet FirstName o T Exact Match In the Enter the text to search for below Category Enter the text to search for below Blank ALL Blank ALL text field type the text to search juserssti i lt i sCSG for The text should be representative of the aan criteria selected in the Field drop list If you want the search to match exactly the selected criteria select the Exact match check box Click the Search button From the Results list highlight the desired user card and click the desired action Print Modify Card or Modify User Print the current user Print Modify Card Modify User Exit To print the card information on paper click
71. define which days in a year are holidays and then the holidays can be f Holiday Properties assigned to a holiday group If you assign the holiday to one or more holiday groups schedules are valid or invalid depending on how the holiday group is Holiday Detail assigned to a schedule s period see Schedule Periods on page 81 If you do not assign a holiday to a holiday group schedules are invalid access denied on that Day M day Month January Year 2008 v WV Holiday Group 1 M Holiday Group 2 Holiday Group 3 l Holiday Group 4 Holiday group allows to group several holidays in one type Example Christmas New Year s Day and Labour Day are all days where the site is closed and users are denied access all day These can be grouped as Holiday Group 1 Half days such as Christmas Eve and New Year s Eve would be grouped as Holiday Group 2 Religious days would be grouped as Holiday Group 3 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Holidays Creating a Holiday and Assigning it to a Holiday Group Perform the following to define the day month and year of the desired holiday 1 2 From the Holiday Properties window select the Details tab From the Day drop down list select a day from 1 to 31 From the Month drop down list select a month from January to December From the Year drop down list select the desired year If it is a holiday
72. directly to our technical support team in the event that you require assistance This tool is also helpful in assessing which prerequisites your computer may require when upgrading to the latest version of the Centaur software Manufacturing Access Control Since 1985 r a i Lp REFERENCE MANUAL J R E 1 f nd Using Centaur Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control ar INTEGRATED ACCESS CONTROL Chapter 2 Understanding the Centaur User Interface What Will Find User Interface Overview 23a 2 53 pou S bine eb eg ohn Se eat ese ara ee se ae wee oe oes Gh eu eek Oe ee er re be eae eee eS 16 MeQU Bal scone aeons ne eae eee E eo Ee Oe hoe eee ee ee eee Ae Eee ae eae arse ene 17 prse la e a eo oe ee ee a oe ee ee ee ee eee ee eee eee eee ee eh eee ee eee esas eeeeeee eee weees 19 Database Tree View Window 0 0 00 0c ee ee eee eee eee 22 Real Time Events Status Window aaa aaa eee eee ee ee eee ees 22 Alarms Window 0 0 0 0 cc ee ee ee ee ee eee ee 23 DIGS lr 2 aie eae Soc eas oe gw See E ee ee ce ee i eee eee eee eee eee 23 Typing Names and Notes a0 156 baie tacha xded dice 5 he eee w pore heads So eS OEMS SEAS Od DE ee ee eae 23 PENOUAGE Ss noe Pod Oded Oe eA he OO Rh Oe eee eee bie de he ed E a ho OD God R ed eae ces 23 The following chapter presents the structure of the Administration Console main window including the differen
73. e aves k Users 2 Properties o wolf John E E User Group 001 a E Test amp visitors 2 lf John Doe o B B i John Smith a Unassigned Cards 1 TE a a Alarm Mame Instructions Description Field Time E AQ Schedules 2 a Controllers 1 FI J Events sso Macra c z Groups Z El H Companies 2 l s Company 002 wo Default Company eae Departments 1 wo Default Departme gy Jobtitles 1 2 a Default JobTitle aM E E gt Ready Administrator Local Comms OFF NUM Manufacturing Access Control Since 1985 r a i Lp REFERENCE MANUAL Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control ar INTEGRATED ACCESS CONTROL Chapter 27 Database Management What Will Find What are the Centaur Databases 1 0 0 ee eee ee eee ee ee eee 230 Database Management Module 0 ccc ee eee ee eee ee eee nent eens 231 Database Backup Schedule cc see ede enede ce One Sees Ook eee been oe ees Bebe ek dees ESE ae ee See eee de eh ees ose REDER 238 Centaur s database file management feature is automatically installed with Centaur Server This database utility was designed to control and manage the often large and complex database files of the Centaur software You can back up and restore database files purge events from selected sites during specific periods limit the size of database files and delete entire databas
74. file containing user and card data into Centaur s card database Database Management Centaur s database file management feature server only allows you to control and manage the often large and complex database files of the Centaur software You can back up and restore database files purge events from selected sites during specific periods limit the size of database files and delete entire database files For more information refer to Database Management on page 229 Database Backup Scheduler Centaur s database backup scheduler server only enables you to schedule regular backups of the Centaur databases You can back up the Main database and the Event database separately specify the location of the backup files and select how often daily weekly or monthly the backup will occur For more information refer to Database Backup Scheduler on page 238 Front Guard Visual Authentication Centaur s visual authentication feature uses events generated in Centaur to retrieve a picture and or video feed to help you identify users or to view the location where an event has occurred For more information refer to Centaur s Visual Authentication Software Operator s Manual Locator User Location Designed to function with the system s Global Anti Passback feature Centaur s Anti Passback Monitoring feature allows you to monitor when users enter and exit designated doors in real time retrieve user card information and pr
75. following to run Centaur s database backup scheduler and create scheduled job 1 Make sure the SQL Server is running see Starting the Centaur Server and Software on page 11 a ee oy ana Americas Centaur Fle View Hel Administration Console and click GOl eel MSDE Management Console or Gy Server Job name Next run date and time Databases directly from within Centaur click Schedule the Open Database Backup backup Scheduler icon from the main one menu bar Choose the language from the pop up window click OK and the MSDE Management Console window will appear fg Centaur3Main fg Centaur3Events Management E SQLServer Agent 3 Click the Schedule backup button from the main menu bar The Create Database Backup Wizard window will appear 4 Click Next 5 From the Database drop down list select the database you would like to backup For more information refer to What are the Centaur Databases on page 230 Click Next 6 Inthe Name text box type the job name of the scheduled backup In the Description text box type the description of the backup Click Next 7 Inthe Select backup file text field type the full path location where you would like to save the backup and the desired file name You can also click the button to browse for the desired path and or file Click Next 8 Select Create a scheduled job to be performed periodically A text field will appear ind
76. i Lp REFERENCE MANUAL UR5 1 ling the Centaur User Interface e The Modules menu gives access to the following e FontDesk Refer to FrontDesk on page 62 for more information e Import Export Application e Database Management Refer to Database Management Module on page 231 for more information e Database Backup Scheduler Refer to Database Backup Scheduler on page 238 for more information e FrontGuard e Locator e WavePlayer Refer to Centaur Wave Player on page 241 for more information e Pro Report e FrontView e Diagnostic Tool e CMPP card enrollement utility e The Help menu gives access to either the Centaur help file or the about Centaur page The help window is always on top of the application Manufacturing Access Control Since 1985 Toolbar REFERENCE MANUAL CENTAUR 5 1 Understanding the Centaur User Interface The Toolbar is divided in different categories as described in the following example Events Selected Site DVR Video System Software Modules About JE IA IE M EB oa bP AA APlet so aS 2 FF SOVAMBA ale Selected Site Component Status Select which site to view and or act upon Toolbar Buttons The following table describes each Toolbar button KEYBOARD Events All events Refer to Display All Events on page 218 for View gt All more information Access events Refer to Display Access Events on page 218 View gt Access events for
77. inses o Lat Nare Doe Unknown te a_a E Compa Dema Congar o aie aa l nat Linsamagreed 7 Denatun time Oa r Fed 1 j Personal Infcemation Cuatom Fikia Badge Cada Door Accesa Fights Lant Acenaa Hislory Assets Hatea Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Visitors and Visitor Groups Modifying a Visitor From the desired Site branch in the Database Tree View window right click the visitor you wish to modify and click Properties from the drop down list You can also select the desired visitor and press the keyboard Enter key General Visitor Properties First Name and Last Name Vredor Pooper The First Name and Last Name are used to panse fam OC iai identify the visitor and will be used in the jvc Ties aaa pecan Visitors branch of the Database Tree View il k cli eae TF window for visitor identification a iat ol deme lore a Host Linsenignad Dormer IZ Tse Title E Tied 1 ee Allows the selection of the visitor title Penonal formation Custer Fielda Badoe Cards Door Access Fights Last Access History Ananta Notes Initial Allows to enter the visitor initials Company Allows the selection of the visitor company group Refer to Groups on page 171 for more information i l le e e Host Allows the selection of the user that will be responsible of the visitor Pa o a
78. its location on the badge e Add Photo Allows to add the photo to the badge template e Add Card Info Allows to add predefined card fields from the General User Properties on page 47 and Personal Information on page 48 Select a field from the Card Data drop list and click OK e Add Static Text Allows to add static text to the badge template e Add Barcode Allows to add a barcode e The Card Settings menu gives access to the following e Background Image Allows to add a background image to the badge template Select the background image for the Front and or the Back of the badge and click OK Default Font Allows the selection of the font that will be used for the card fields inserted after the font selection The Default Font does not affect the fields that are already inserted to the badge template e Flip Portrait Landscape Allows to switch the editor layout from portrait to landscape or vice versa e The View menu gives access to the following e Toolbar Allows to show or hide the Toolbar e Status Bar Allows to show or hide the Status Bar e Show Hide Front Side Allows to show or hide the card badge front side e Show Hide Back Side Allows to show or hide the card badge back side e Tile Horizontally Allows to display the front side of the badge on top of the back side e Tile Vertically Allows to display the front side of the badge beside the back side e 1 Front Side and 2 Back Side Allows the
79. located next to Access Level O T Risk Levels T PO T Access Levels is selected the operator assigned with this Floor Groups F P T Outputs P DO E Schedules D D Timings Of security level will be able to view all the programmed access ito Bo no Geiticc N levels in the site Evert Definition ff D Macros D D User Defined Fields CCT Command D D Modif PLNS I y i i All None If you select the Modify check box the operator assigned with this security level will be able to view add and edit any elements of the associated characteristic For example if the Edit check box located next to Controllers is selected the operator assigned with this security level will be able to view add and edit the site s controllers Delete If you select the Delete check box the operator assigned with this security level will be able to view and delete elements of the associated characteristic For example if the Delete check box located next to Cards is selected the operator assigned with this security level will be able to view and delete any of the site s cards All Click the All button to select all the View Modify and Delete check boxes of every system characteristic None Click the None button to clear all the View Modify and Delete check boxes of every system characteristic Manufacturing Access Control Since 1985 Setting the Security Level s Manual Operation From the Security Level properties windo
80. more information Abnormal events Refer to Display Abnormal Events on View gt Abnormal events page 218 for more information Acknowledged events Refer to Display Acknowledged Events on View Acknowledged events page 218 for more information Guard Tour Events Refer to Display Guard Tour Events on page 218 for more information Manufacturing Access Control Since 1985 Door status Refer to Displaying and Controlling the Status of a Door on page 219 for more information Relay status Refer to Displaying and Controlling the Status of a Relay on page 220 for more information Controller status Refer to Displaying Controller Status on page 221 for more information Input Status Refer to Displaying and Controlling the Status of an Input on page 222 for more information Output Status Refer to Displaying and Controlling the Status of an Output on page 223 for more information Guard Tour Live Rounds Refer to Displaying Guard Tour Live Rounds on page 224 for more information Display Visitor Status Refer to Displaying Visitor Status on page 225 for more information Display Global Parking Status Refer to Displaying Global Parking Status on page 226 for more information Display DVR Settings Refer to Modifying DVR Settings on page 200 for more information Display Live Video Refer to Display Live Video on page 204 for more informat
81. relay that will be activated when the parking is full See Defining Parking Rules for the User Group on page 60 and Defining Parking Rules for the Visitor Group on page 74 Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control ar INTEGRATED ACCESS CONTROL Chapter 26 Manual Controls What Will Find EVGACWIGDAy eer ee Oa Leeda eee eee Oden ek eed Eahet i ota ea oh oe ee ba ee ee oes 218 Manual CONOIS 223 4 5 6 h cate fsa amp hea ke had Ore ds bake Bees be Oe eae 6S hE hE we oe ee eR 219 Centaur includes an intuitive toolbar that you can be use to display the status of specific output and input devices as well as control the activation and deactivation of those devices In each site you can view and control the status of the controllers doors inputs outputs and relays Manufacturing Access Control Since 1985 Event Display The following sections describe how an operator can view some or all of the events in the system For details on how they are displayed refer to Events on page 161 Make sure you select the appropriate site from the desired site branch in the Database Tree View window Appropriate operator permissions and security levels must be enabled see Operators on page 183 Display All Events When you click on the All events icon the last 1000 events that occurred in the selected site will appear along with its j det
82. s mof atide eIn RR aA Aie a o o IO atar E saes 1 i knmi miia kal jure ELE B tor omae i2 Deed and locked seure Leers 5 ipia Ca pii AV ee i Lok uor pen B tos oa T id ee z OP Uried Cards 03 A ies mias is Offs daik bod Tina a MB Acilar 4 A Door 004208 Ls oiie Unk ras era E Hiini Bi boo 01 i7 offing 2 E Schedules ii E a 07 08 La Mifin Ratum Selected Cors to the Programmed Schedules E ciroen i Fl Door 002 01 hi affine enasie Doce hs plac amp Groups Comte a Ey Security Leenks 2 Paget i 7 e a 0 FN Pareisse 2 E orros 1 a GP COTY Co 1 Manufacturing Access Control Since 1985 r ao Ha REFERENCE MANUAL Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control ar INTEGRATED ACCESS CONTROL Chapter 10 Access Levels What Will Find POCING Al ACCESS LOVE isesi biewctdeadtiedted yy dutah heer erode bs COS oe eRe bd eee ee bee ee oes 122 Modifying an Access Level icceecensetetu sv iu seb eeae chee cede ee eb eed eesds ee chews ehebiogsen ae cebdorieeee ead 122 DIEING ali ACCESS LEVO sess sesira ee aed yo Oa eae ee Sheen eee eee oe Reade RO eee Oe eee 124 Access levels determine which doors in the system a user will have access to and during which periods This is done by enabling the desired doors in an access level then assigning a schedule to each selected door and assigning the access level to the desi
83. selection of either the front side or the back for edition e The Help menu gives access to About Centaur Badge Editor window Manufacturing Access Control Since 1985 REF Toolbar The Toolbar is divided in different categories as described in the following picture File Edit E e a T T Ge fe Card Settings CATEGORY BUTTON DESCRIPTION sah aad MENU File Template Ctrl L File gt Template Allows selecting a template Save Ctrl S File gt Save E Allows saving the template Print File gt Print Allows printing the template layout Exit File gt Exit Allows to quit the Centaur Card Template Designer Edit a Add Photo Ctrl P Edit gt Add Photo Add Card Info Ctrl I Edit gt Add Card Info T B Add Static Text Ctrl T Edit gt Add Static Text e Add Barcode Ctrl B Edit Add Barcode Card Background Image Ctrl G Card Settings gt Background Image Settings oe Default Font Ctrl D Card Settings gt Default Font i Flip Portrait Landscape Ctrl F Card Settings gt Flip Portrait Landscape Status Bar The status bar is located at the bottom portion of your screen and allows to display the Centaur Card Template Designer status Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Users and User Groups es y Cards The Cards tab allows to assign card s to the user From the user properties window select the Cards tab The card s associated to the u
84. the Centaur software from a networked workstation the Centaur Service Manager must be started Starting the Centaur Server You must have the hardlock key plugged in the Centaur server port before starting the Centaur Service Manager otherwise the software will only communicate with 1 CTV 900 A door controller with a maximum of 2 doors Starter Pack version 1 From the Centaur server computer click Start gt Programs CDV Americas Centaur Centaur Service Manager The Centaur Service Manager window will appear 2 From the Centaur Service Manager window click the Start Continue button Once the Centaur Service Manager is running you can close the Centaur Service Manager window Centaur Service MSDE SQL Server Manager f Service Manager Dio The Auto start service when OS starts and Auto restart service when stopped check boxes in the Centaur Service Manager window are only available when Centaur is set as a service under Windows refer Setting Centaur as a Service Under Windows on page 9 To stop the Centaur Service Manager click Stop If the Operator Rights Validation window appears enter your Centaur Logon ID and Password and click OK The Operator Rights Validation window will not appear if Centaur is a service under Windows refer to Setting Centaur as a Service Under Windows on page 9 Manufacturing Access Control Since 1985 REFERENCE MANUAL J R 5 1 ind Using Centaur Starting the
85. the accese of global system objects B Audit Aucit the use of Backup and Restore oriviege 28 Audit Shut down system mmediately iF unable to log reaurity audite TEEDCOM Machine Access Restrictions in Security Descriptor Definition Language SDL syntax DCOM Machine Launch Restrictions in Security Descriptor Definition Language SDDL syntax itil Devices Allow undock without having to log on He Devices Allowed to format and eject rerovable media iia Devices Prevent users from instaling printer drivers Hi Devices Restrict CD ROM access bo localy logged on user onby ll 5 24 The DCOM Machine Access COM Machine Access Restrictions in Security Beseri a Restrictions window will appear Click Edit Security DCOM Machine Access Restrictions in Security Desc 7 R Temoiate acuity Policy Gaming i ey Detintion Language S001 yria F the meny eaii a leh ini after dedining the paiiey setting i the termite lhe pokey wet end rot be oe ante duint Case Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration E 25 The Access Permission window will appear Beneath the Group or user names heading select the desired users who will be granted access to the Centaur Server computer through DCOM and click Add Acceds Permminian 26 Beneath the Centaur Group heading ensure all Allow check boxes are select
86. the repairing process 3 E Geribvted Transactem Coordinator E Ruming Processes eg Evert Viewer Local Manufacturing Access Control Since 1985 r T REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration Setting the Firewall Firewall settings need to be altered on the Centaur Server computer and on any workstation connecting to the Centaur Server computer through DCOM In your firewall you have to Open the port 135 DCOM port Allow access in entry and exit for the program SPXSVR exe found on C Program Files CDV Americas Centaur Centaur Server on BOTH workstation and server On the server only you need to allow access in entry and exit for the program sqlsevr exe found on C Program Files Microsoft SQL ServerMSSQL Binn Please refer to your firewall documentation if you need help If you are using the Windows firewall follow these steps to alter your settings 1 From the taskbar click Start gt Control Panel Control Pare 2 The Control Panel window will appear Double click on the Windows Firewall icon E Sath fo Cosby y Were Ciit Taila L See Also a G Uia ey SuGMAN founda ond a Lay gt g Urls E Auda Saree Trokien ee Ube Airiai fel Pra ii Hel and inert Manufacturing Access Control Since 1985 REFERENCE MANUAL UR 5 1 E figuration 3 The Windows Firewall window will appear From the Exceptions tab click
87. time 1 From the Database Tree View window right click Controllers from the desired Site and select New Controllers from the drop down list You can also click Controllers and press the keyboard Insert key A dialogue box appears providing you with the option to automatically create and link the default doors inputs and outputs to the new controller s To use the Controller Configuration Wizard click Yes and follow the steps detailed in Controller Configuration Wizard below Otherwise click No and continue with step 3 Select the desired controller address es and click OK For more information on controller addresses refer to Viewing the Controller Address on page 88 After adding the controller s you will have to program each controller individually within the Controller Properties window see Modifying a Controller on page 88 Controller Configuration Wizard The Controller Configuration Wizard guides you through the minimum required settings to set up the default doors inputs and outputs for the controller s Check the Create check box for each controller you want to create To change the controller s name double click on the name of the controller and type the new name To automatically activate the controller once created select its Active check box Select the controller input configuration See Controller Configuration on page 91 for more information Click Next Co
88. time and within a selected site or within all sites The purge feature will not affect the Main database only the Event database Perform the following to purge events from the Event database Ly Do not use the purge feature to reduce the size of the database or to delete large numbers of events Instead use the Truncate feature see Truncating Events on page 234 Also any alarms that require acknowledgement see Alarm Acknowledgement on page 166 that have not been acknowledged will not be deleted After starting the Database Management Module as described in Starting the Database Management Module on page 231 the SoxDBase Centaur Database Utility window will appear From this window select the Advanced tab and click the Purge Events button i REFERENCE MANUAL CENTAUR 5 1 Database Management m ar Za i SPXDBase Centaur Database Utility Backup Size Advanced Attach Register the database files with SQL Server Please make sure that the files you wish to attach Centaur3E vents mdf and Centaur3M ain mdf are located in the same directory as this application Detach Unregister the database files from SQL Server Remove Unregister the databases from SQL Server and remove the files completely Purge Events Delete events from the event database by Date Please do not use this for reducing the size of the database or purging large numbers of events If the even
89. to a door the door will remain unlocked for the period defined by the door s Unlock Time see page 112 When the Extended Access check box is selected the door will remain unlocked for the duration of the door s Extended Access see page 113 in addition to its Unlock Time This option is particularly useful for individuals that may require more time to access the door Example A user is granted access to the front door with an Unlock Time of 15 seconds and an Extended Access time of 30 seconds If the option is enabled the door will remain unlocked for 45 seconds instead of only 15 seconds Interlock Override An interlock installation consists of two doors each controlled by a reader Access will not be granted to a door in this configuration if the other door is already open or unlock With the Interlock Override feature enabled the user does not have to wait for both doors to be closed in order to access a door using the interlock feature When using this option and access is granted the controller will generate an Access Granted Interlock Override event Also refer to Assigning an Interlock Input on page 114 Anti passback Override When the Anti passback Override check box is selected all the controllers in the site will ignore the anti passback status of the card see Enabling Controller Anti passback on page 96 Guard Tour When the Guard Tour check box is selected the card can be used for guard tour che
90. to define the card s specific privileges When setting up the users in the system you must define WHO has access to WHERE and WHEN they have access In order to program the cards you must first program the site see Sites on page 25 doors see Doors on page 103 holidays see Holidays on page 75 schedules see Schedules on page 79 access levels see Access Levels on page 121 and users see Users and User Groups on page 45 Please note that the number of cards your system can support is also limited by your Centaur edition refer to Centaur Editions on page 2 Manufacturing Access Control Since 1985 REF Example In Figure 18 the card will give access to the Production Entrance from 8 00AM to 5 00PM Monday to Friday including New Year s Day and 9 00AM to 13 00PM Sunday and Saturday Figure 18 Overview of Card Programming Program the Holidays and assign each Program the periods and assign the desired 1 holiday to one or more Holiday Groups 2 Holiday Groups for each desired Schedule Holiday Details Schedule Details Schedule Properties Holiday Properties Start End SunMon Tue Wed Thu Fri Sat Holl Hol2 Hol3 Hold Vv iw co o o Day fi x Period 1 Month January Period 2 Period 3 Year 2008 Period 4 V Holiday Group 1 Period 5 M Holiday Group 2 Period 6 Holiday Group 3 l Holiday Group 4 k m PEELE
91. to select examples field Click OK Click Close From the taskbar click Start gt Run In the Run window type dcomcnfg exe Click OK or press the keyboard Enter key Se Chee Canipubere mer Cat aig Cin Durer Hama San ih Descrmon slic wih mai ae Ld Pa i Fi ek pas T 4 Len Hane AER E Flad Mulch ee A harea Abbaas Balnai f Ara Hai E irdi Enh are Siete E ie inp E Cet Pabeko Darii Duik ertr ORF Ums Dratini a T _ gue loc E 2x Type the name of a program Folder document or LJ Internet resource and Windows will open it For you Open deomenfgl Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration A 11 The Component Services window will appear oo Expand the Component Services Computers amp Component Services and MyComputer branches and click DCOM ee et oe eee Config am X eM 2 P E E Console Root j El D Component Services Ea Computers g riy N TES AccStore Class Acrobat Acrobatvvri COM Applications WebCapture H E DCOM Config E Distributed Transaction Coordinator i Running Processes H 4 Event Viewer Local AcroDistY AcroExch P AcroPDF Sy Services Local Adobe Adobe rican Acroba 12 Right click the SpxSvr file and click E Cor TER Properties siis E Console Root Bj B Component Services B E
92. unique employee number for each user visitor Field containing Emp Num Select the field that will be used to contain the employee number Emp Num as Key Available when the Emp Num as Key check box is selected Create Cards Select the Create Cards check box to automatically create a card number for the user visitor Field containing card number Select the field that will be used to contain the employee card number Available when the Create Cards check box is selected Access Level Select the field that will be used to contain the employee card access level Available when the Create Cards check box is selected Notes Use the Notes text field to record any additional notes that may be required We recommend that you keep a log of what settings were changed and when they were changed Also refer to Typing Names and Notes on page 23 Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control ar INTEGRATED ACCESS CONTROL chapter a USers and User Groups What Will Find Adding Users jue Saas eee ween be oe eee wee oho ewe bee ete et eet et eet ce eghoteut tect aeceeeeoetsoeeese eee 46 WOGIVINGO a USE shin 25865 E es bees eee dees oe Oe eae oe eee eee heehee bee eee en ate oases eee 47 DEICING USE oacukhae tan behus ga dees eee eee ae h EEA ed RRR OA DE ERO EE a a eee eee os ae 59 Adding a User Group 2 0 en ee ene eee ene ene eee eee eee ete 59 Moding a Us
93. user check box z General Location Security Identity Endpoints Which user account do you want to use to run this application The interactive user The launching user C This user User Browse Password Lontiim Fessiord gt he System Account senices only Apply Manufacturing Access Control Since 1985 7 REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration 7 Click the Security tab to configure the user s that have s the right to access the Centaur Server computer Select the following check boxes General Location Security Identity Endpoints SpxSvr Properties i x e Use custom access permissions Use default access permissions Pere eer eet rere rere rrr reer eter e ree eee ere errr e eee unsunnsunnnnsansnnnunnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn T e Use default launch permissions 2 Use custom access permissions i You may edit who can access this application e Use custom configuration permissions Use default launch permissions Use custom launch permissions You may edit who can launch this application Edit Use default configuration permissions Use custom configuration permissions fou may edit who can change the configuration information for this application 8 Under Use custom access permissions click the Edit button NB The Use default launch permissions
94. view the status of the devices in the system and how they can remotely control these devices i e enable or disable a relay etc Make sure you select the appropriate site from the desired site branch in the Database Tree View window Appropriate operator permissions and security levels must be enabled see Operators on page 183 Displaying and Controlling the Status of a Door to manually change the status of a door right click the desired door You can also select multiple doors to manually change in the same way by clicking on the doors while holding down the Shift or Ctrl keys and right clicking on one of the selected doors A drop down list will appear Select one of the following actions from the list Also refer to Figure 35 on page 220 E When you click on the Door status icon Centaur will display the current live status of the doors in the system If you wish Lock Door Locks the selected door if it was unlocked on schedule manually or by an operator Unlock Door Unlocks the selected door for the period specified by the door s Unlock Time see Setting the Door Timers on page 112 Unlock Door Timed Unlocks the selected door for a programmed period of time When you select this action the Activation Time window will appear In the text box type a value from 1 second to 65535 seconds and click OK Unlock Door Latched Unlocks the selected door until an operator re locks the door using the Lock Door m
95. 1 nd Using Centaur Controller Requirements CT V900 A Rev 200 210 220 230 260 require firmware R2 C3 70 or higher e CI V900 A Rev 100 110 require firmware R1 01 79 or higher For more information on how to update the controllers refer to Online Controller Firmware Upgrades on page 99 or Online Help Free Technical Support For technical support in Canada or the U S call 1 866 610 0102 Monday to Friday from 8 00 a m to 8 00 p m EST For technical support outside Canada and the U S call 00 1 450 682 7945 Monday to Friday from 8 00 a m to 8 00 p m EST Please feel free to visit our website at www cdvi ca Manufacturing Access Control Since 1985 REFERENCE MANU CENTAUR 5 1 Installing and Using Centaur ae Installing Updating the Centaur Server It is recommended to use a dedicated computer to install CENTAUR server The Centaur Server software must be installed on the computer where all controllers are or will be connected For new installations of the Centaur software or when upgrading to the Centaur 5 1 software from a previous version you need to upgrade the controller firmware version to R2 C3 70 or higher and use a new 5 0 hardlock key AN To install the Centaur 5 1 software on Windows 2000 2003 XP Vista operating systems you must be logged on as Administrator 1 Insert the Centaur 5 1 CD into the computer s CD ROM drive 2 If the auto run feature is enabled go to the step 3
96. 105 Using the Door Configuration Wizard The Door Configuration Wizard guides you through the minimum required settings to set up your doors 1 When adding a door a dialog box appears asking if you would like to use the Create Name Controller Address Contact REX GreenLED RedLED Buzzer C Door 002 05 002 05 21 22 13 14 17 Door Configuration Wizard If B Door 002 06 002 06 23 24 15 16 18 Door 002 07 002 07 25 26 19 20 23 you click Yes the Door C Door 00208 002 08 27 28 21 22 24 Defaults window appears 2 Under the Create heading select the check box next to the door address you would like to add 3 From the Contact drop down list select the contacts zone input address If there is no contact associated with the door select None 4 From the REX drop down list select the REX s zone Cancel input address If there is no REX associated with the door select None 5 From the Green LED drop down list select the green LED s PGM output address If there is no green LED associated with the door select None 6 From the Red LED drop down list select the red LED s PGM output address If there is no red LED associated with the door select None Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Doors 7 From the Buzzer drop down list select the buzzer s PGM output address If there is no buzzer associated with the door select None 8 To
97. 105 Deleng A DOOF secsec nense N ae re aae a EAr i ie Reri eier aE a EEA ranas Rares 118 Dipa DOr S E E O E E N ee eee 119 ACCESS TEVELS orrein E E E E 121 Adding an Access Level sxsincacsnaxeicaxtvaareseccavienedsenmeianniveassbicesunisteiamlaaanuiaedoisadesina ea wienbieaeernissasrncmalmaandaexecsersiaeaeninniesneasnnes 122 M diiying an Access Level sisirin aei aaea ariiraa aeea a iaia aare aeia edain 122 Deleting an Access Level nea caeananaicanes sandinneniidntacena saat aesneinendoraceaeiuanatansicindon raceme siwinnitesyeienoeumearacaevnavenssanesaneiidetaaaasatualiwstnieneeinns 124 CARDS A E E ENA AOA EEEE EE E E EEA AAEE E E a 125 PAn e aE ra E E E E A E E ees 127 KO N ANG ae EE E E E E E a 128 Baeke EOE 6 E A E E E E E A 131 FLE VATOR CONTROL siriani a E E S E A 133 Overview or Elevator COU 22 sccsnceesssvesesecteccersacae te tr iE Ear AE Nri EEEE TEN NE TEENE EEEE AIEEE ri i EE E iE SEELE IS AEEA Ena TET 134 RELATS aa E EA E E E E A 137 Adding Relays serenat sanaceniinsanetesarsanasisnasseninnonsatenaaeinauscrantucseasiianinscrenianabtenssncnataacsnrisaiuaadsencasenanstsarsaiepameteaneacsEnnsasnentiess 138 Modin a REIIY Forss aE E E E E E E EEEE ee eee E EE 138 Pee RE eaa E E E E E E E 141 Display Relay Status and Manual Controls cccccesscccccsseceecceeseeeceeeucececseuucecseaasececseseeecsauseeesseasecesseeeeeesseeceessageseessegseness 141 INPUT eiA E E E E A A E EE A EEE EE EE S AS EE 143 COnN UI MDA earne En E a A A NE AA A
98. 2 Timings Period 3 Activation time 10 seconds 0 to 65535 Papin a Delay time before activation Bo seconds 0 to 65535 Period 5 l Period 6 Non activated state De energize M Period 7 Period 8 Stat End SunMon Tue Wed Thu Fri Sat Holl Hol Hol3 Hol4 xI lt l lt I lt l a xl x x xI xl xl U i U i U i At the Start of every period in the selected schedule the relay will activate for the amount of time specified in the Activation Time text box regardless of the period s End time Relay activation can be delayed by the value programmed in the Delay time before activation text box Selecting a Relay Activation Schedule From the Activating drop down list box under the Schedules heading select the schedule that will activate the relay for the period s defined by the selected schedule This feature will ignore the values programmed under the Timings heading and will follow the selected schedule only Setting the Relay Activation Timer In the Activation Time text field under the Timings heading type a value between 0 and 65535 seconds Default 5 seconds This value represents the amount of time the relay will remain activated when enabled by a timed activation schedule see Selecting a Time Relay Activation Schedule on page 139 or when activated manually see Displaying and Controlling the Status of a Relay on page 220 Setting the Relay Delay Time Before Ac
99. 2 A dialogue box appears requesting if you would like to use the site configuration wizard The site configuration wizard guides you through the minimum required settings to get the site communicating with its controllers If you want to use the site configuration wizard click Yes and follow the steps detailed in Using the Site Configuration Wizard Recommended If you do not want to use the site configuration wizard click No and go to step 3 If you do not want to add a site click Cancel 3 Inthe New Site window type the desired site name We recommend using a name that is representative of the site such as Manufacturing Plant Montreal 4 Click OK Using the Site Configuration Wizard Recommended The site configuration wizard guides you through the minimum required settings to get the site communicating with its controllers When starting She E Communication Seiup f Fiii ete the Sate rare od ai the deed Coan ee Centaur s Administration Console for Eite Name Martacha Parl Manbeal the first time or when adding a site a aa Seri Seating dialogue box appears asking if you Commrscatentipe Deect senaPath x at Spe pepe TE would like to use the site configuration Have Hane 1100 x wizard If you click Yes the Site amp t n Poata ie Ciigkup Sotiri Communication Setup window enal appears T COH Paa ICTL 12H fi lt lt COM Poe CTL 1h25 es 1 Inthe Site Name text field type the desi
100. 243 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Installing and Using Centaur Centaur Administration Console Workstation This section describes how to install a Centaur Administration Console on a networked workstation The Centaur Administration Console is installed on a networked workstation computer using the Centaur 5 1 CD The Centaur Administration Console allows operators to monitor and manage the integrated access control system remotely by accessing the Centaur Server s databases and its controllers through a network In order for a remote workstation to access the Server DCOM must be configured on the Centaur Server computer refer to DCOM Configuration on page 243 Computer Requirements Workstation The Centaur software is designed to operate with IBM or IBM compatible computers running a suitable Microsoft Windows operating system as detailed in the Operating System Requirements below e Pentium 4 e 1GB RAM 2GB for superior performance e 300MB free disk space Operating System Requirements Workstation The Centaur Administration Console has been tested on the following operating systems e Windows Vista Home Basic Home Premium Business or Ultimate e Windows XP Home or Professional Edition English and French Service Pack 2 e Windows 2003 Server Edition English and French e Windows 2000 Professional Edition English French and Spanish e Windows 2000 S
101. 2532 dcene boner dus sooo ged on Seas e ced ee Sees oe ee oe Een oo eh eh eek dt pees bores esos 172 Adding a GOURD 243 o ees 4e oe eee Ee hee ese Beh eae eee weed Phe A bee ee eee eee OER 172 WOGiIVING 4 OUP see occetarnet atten eeead mata Sa ee eek e eta deeds daeeae he eeee Hebe eae ea eon ss oheee eee 173 Adding Details and Assigning Users to Company and Department Group 2 0 0 0 eee 175 Deleting a Group 242 6 ieres eh Ste da teed a a ai a E oeedbhenes eee dean a a teddies then dead ndeeee ed obecee ese ea 175 Manual Control of Door and Relay Groups In the Centaur Integrated Access Control System you are often required to select one specific device i e door or relay Centaur provides you with the added option of creating a group A group consists of more than one device Therefore instead of just selecting one device you can select a group which would represent for example relays 3 4 and 5 There are eight types of groups Companies Departments Job Titles Floors Risk Levels Doors Inputs and Relays Manufacturing Access Control Since 1985 REF What Are Groups When a card is presented to a reader programmed for elevator control Centaur ignores the card s assigned access levels and instead verifies the card s assigned floor group If the floor group s assigned schedule see Selecting a Floor Group Schedule on page 174 is valid Centaur will allow access to the floor group s assigned floors see
102. 3 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Access Levels e ae Access Level Doors and Schedules Access levels determine which doors in the system a card will have access to and during which periods This is done by enabling the desired doors in an access level then assigning a schedule to each selected door and assigning Access Level Doors and Schedules Users the access level to the desired cards Access Level Properties Schedule M O Dov 001 01 Always For information on how to create doors see Doors on page 103 For C Door 001 02 iaaa information on how to create schedules see Schedules on page 79 For information on how to assign an access level to a card see Cards on page 125 Assigning Doors and Schedules to an Access Level Perform the following to define the access level 1 Select the Doors and Schedules tab A list of all doors that have been created in the site will appear with a check box on the left of each one 2 To assign a door to the access level select the check box associated with the desired door A Schedule drop down list will become active 3 From the Schedule drop down list select the schedule you would like to assign to the selected door 4 Repeat steps step 2 3 to assign another door and schedule or click OK to save and exit Example In Figure 17 the Back Door is enabled and has been assigned the General schedule
103. 39 Connecting Inputs 144 Manufacturing Access Control Since 1985 Control Input Status 222 Control Output Status 752 159 223 Controller Addresses Dip Switches 89 Controller Configuration Wizard 86 Controller Properties Anti passback Tab 96 Configuration Tab 91 97 Controller Tab 88 Controller Reset 107 Controller Response Delay 95 Controller Status 101 221 Controller status 17 Controller Time Out 95 Controllers 85 Controlling Database Sizes 234 Counter 111 Create Cards 44 Crop the picture 197 Crossover Periods 82 Custom CCTV Command 193 Custom Reader Format 99 Customizing Event Colours 212 D Database Backup Scheduler 13 18 189 238 Database File Management 189 Database Management 13 18 229 Database Management Module 237 Database Size 234 Database Tab Security Levels 186 Database Tree View Window 22 Databases description 230 Days Before End Date 131 DCOM Configuration for Windows 2000 Pro and Server 307 DCOM Configuration for Windows 2003 Server 282 DCOM Configuration for Windows XP 264 Deactivate a Relay Group 176 Deactivate Output 223 Deactivate Relays Manually 220 De energized Lock Control 170 De energized Relay State 147 Default Event Definition 163 Default Logon ID and Password 17 Default System Event Colours 272 Defining Holidays 77 Delay Controller Response 95 Delete A Card Centaur s Card Management feature 63 Delete the picture from the database 197 Delete Security Levels 186 Deleting Access Le
104. 985 REF Badge The badge is used to define what will be printed directly on the front and back sides of the visitor access card 1 From the visitor properties window select the Badge tab Personal informer Custom Felts Badge Cans Doce Access Figs Last Access Matoey Assets Notes Launch the badge template editor Print the selected badge 2 Select a Template from the list or use the Launch the badge template editor button to create a new template see Launching the Centaur Badge Editor on page 70 3 Select the language to be used from the Language drop list The language selected will affect the fields included in the template 4 Select the front or back side preview to be displayed using the Front Side or Back Side radio buttons Buttons Launch the badge template editor Allows defining the front and back side of the badge See Launching the Centaur Badge Editor on page 70 for more information Print the selected badge Allows printing the defined visitor s badge layout Launching the Centaur Badge Editor L Refer to Launching the Centaur Badge Editor on page 52 for more information Cards LY Refer to Cards on page 55 for more information Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Visitors and Visitor Groups Door Access Rights LY Refer to Door Access Rights on page 56 for more information Last Access LY Refer to
105. AV file assignment 242 Events Colours 17 Events Output Activation 156 Exit Door Type 107 Exit Global 108 109 Extend Time 224 Extended Access 130 Extended Access Levels Levels 3 4 35 Extended Access Time 113 F Family Number 128 Family Number Maximum 36 Fast Event Request 95 Field containing card number 44 Field containing Emp Num 44 Fie 17 43 Finish Check Point 180 Firmware Update 99 First row contains field names 43 Floor Group Properties Floors 174 Floor Group Alternate 174 Floor Groups Assigning Floors 174 Selecting a Schedule 174 Setting an Alternate Floor Group 174 Floors 174 Name 39 Number of 39 Schedules foreach 117 FontCard 18 FrontCard 13 189 FrontDesk 62 FrontGuard 13 18 FrontView 13 18 G General Centaur Options 210 General Controller Properties 88 General Door Properties 105 Manufacturing Access Control Since 1985 General Holiday Properties 76 General Properties Schedules 81 General Properties for Security Levels Permissions and Opera tors 185 General Tab Door Programming 107 Generate Unique PIN 35 Global Entry Validation 109 Global Entry Exit 108 Global Exit Validation 109 Groups 171 172 Floors 129 Groups Are Used Where 172 Groups Holiday 77 Guard Tour 130 177 Guard Tour Events 278 H Hardlock key 10 Hard passback 96 Help 18 Hexadecimal Card Numbers 35 Holiday Groups in Schedules 83 Holiday Properties Details Tab 76 Holiday Tab 76 Holiday Tab 76 Holidays 75 Holidays a
106. Access Control Since 1985 CDVI Headquarters Si ge social FRANCE Phone 33 0 1 48 91 01 02 Fax 33 0 1 48 91 21 21 CDV AMERICAS CANADA Phone 1 450 682 7945 Fax 1 450 682 9590 CDV BENELUX BELGIUM Phone 32 0 5 662 02 50 Fax 32 0 5 662 02 55 CDV CH SWITZERLAND Phone 41 0 21 882 18 41 Fax 41 0 21 882 18 42 i a 7 is Manufacturing Access Control since 1985 CDV CHINA CHINA Phone 86 0 10 87664065 Fax 86 0 10 87664165 CDV IB RICA SPAIN Phone 34 936 916 551 Fax 34 935 801 278 CDV ITALIA ITALIA Phone 39 0331 97 38 08 Fak EES 0331797 39 70 CDV MAROC MOROCCO Phone 212 0 22 48 09 40 Fax 212 0 22 48 34 69 CDV SWEDEN SWEDEN Phone 46 0 33 20 55 50 Fax 46 0 33 2055 51 CDV UK Ltd UNITED KINGDOM Phone 44 0 1628 531300 Fax 44 0 1628 531003 DIGIT FRANCE Phone 33 0 1 41 71 06185 Fax 33 0 1 41 71 06 86 LA GACHE ELECTRIQUE FRANCE Phone 33 0 3 88 77 32 82 Fax 33 0 3 88 77 85 02 www cdvgroup com SDV reserves the right to change any of its products and specifications at anytime without prior notice PROCOFI FRANCE Phone 33 0 1 41 83 04 90 Fax 33 0 1 41 83 04 91 TECHNO EM FRANCE Phone 33 0 4 42 96 58 73 Fax 33 0 4 42 96 45 77
107. Activation Door Properties Door General Inputs and Outputs Users Elevator Control Door Input Input Door 001 01 Contact Relock Disabled v REX Input F Unlock on REX Regardless of Door Status Input Door 001 02 Contact VY es ly S E A door contact must be installed above the door and it must be connected to an input on the controller see the appropriate controller s Installation Manual Manufacturing Access Control Since 1985 The input must be programmed as detailed in Inputs on page 143 Under the Door Input heading select the desired input from the Input drop down list Select a relock option from the Relock drop down list under the Door Input heading After a valid access through the use of a card the control panel can relock the door as soon as it opens Door opening when the door closes Door closing or if you select Disabled it will relock when the Unlock Time has elapsed see Unlock Time on page 112 Also refer to Lock Control on page 110 Assigning a REX Input Request for Exit A request for exit REX input is required if you have selected the Access controlled entry configuration see Door Type on page 107 If you do not use a REX input the controller will not be able to distinguish between a valid exit and a forced exit The controller will always generate a Door Forced
108. Bosc m m desired action opa Trees Visual display and text description E E Fenaaa 2 of current live input status Operators 1 Oty Commarea 1 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Manual Controls Displaying and Controlling the Status of an Output When you click on the Output Status icon from the menu bar Centaur will display the current live status of the outputs in p the system If you wish to manually change the status of an output right click the desired output You can also select multiple outputs to manually change in the same way by clicking on the outputs while holding down the keyboard Shift or Ctrl keys and right clicking on one of the selected outputs A drop down list will appear Select one of the following actions from the list Also refer to Outputs on page 153 Activate Output Activates the selected output for the period specified by the output s Activation Time see Setting the Output Activation Events on page 156 7 Activate Output Timed Activates the selected output for a programmed period of time When you select this action the Activation Time window will appear In the text box type a value from 1 to 99999 seconds and click OK Deactivate Output Deactivates the selected output Figure 39 Display Output Status Click the Output Status icon H Centaur Output Statun Tei hv 8 9 o 4 O Pim jJooPoetTr SOVARR nr
109. Ca unsesadnenee an jecaaion 218 Manuae ONOS eera ee eeeeaa deca ccavane se seeeetand E E E E 219 Manufacturing Access Control Since 1985 r ao Ha REFERENCE MANUAL DATABASE MANAGEMENT sissicosrnscna aia a te otaanstentuleemonsaaseneotatameadodetesenmuprawactecswstssiedeinbnnecdtatetastahenmenecnencetesn 229 What are the Centaur Databases nnnnnenneseennnetrrtnrtrtrrertrttttrrttttrn trta r rt aes eeeesaseeeesaaaeeeeeaaaeeeesaaeeeeessaaeeeesaeaeeeeesaaeeeeesaaaees 230 Database Management Module ccccccsscccsesceceesececseeceeseseeseseceessseeensueceusueeeesaesessecensueeeeseeensancessanseeteneeeteuscensensensensensonss 231 Database Backup SCNECGUICE M 238 CENTAUR WAVE PLAYER mormonin N AA A a E AA 241 Centaur Wave Player act cesccasgecnecscaiessschc sarnnbtecesavanh edaegnniebe ccd sogonncanetedeetenctinodebdeemantanbaaniencachaddaiadbanubeebt andes cob banmnncneapuansasenencceaaaceeeen 242 DCOM CONFIGURATION sacisassciesicitecercaceucocticencuabassincacssivnacautciessccisenssinsctisnesdisoasehneslciasusion E A a a a 243 DCOM Configuration for Windows Vista ccccccccseeeeeeeeeeeeeeeeeeeeeeeeaeeeeeeeeeeeeeeeseaeeeeeeseeeeeeeeaaeeeeesaaaeeeeeeeesaeeeeesseneeeessaeeeesaeeeeess 244 DCOM Configuration for Windows XP ccccccceecececeeeeeeeee ee eeeeeeeeeeeeeaeeeeeeeeaeeeeeese ee eeeeeseaeeeesaeseeeeesaeaeeeeeeeesaeeeeeeseeeeessaeeeeeaeeeeens 264 DCOM Configuration for Windows 2003 Server c
110. Computers El 4 My Computer H E COM Applications a DCOM Config H E Distributed Transaction Coordinator i ar Running Processes Ta Event Viewer Local Symdlbrg SymLTCOM SymProtect SymSHAX 4 Services Local 4 Systranso SystranDMa Class SPxComms Manufacturing Access Control Since 1985 REF 13 The SpxSvr Properties window will appear From the xi Authentication Level drop down list click None General Location Security Endpoints Identity 14 Click the Location tab and select the Run application on this Eee erates he SEO paig aign computer check box NB The Run application on this computer check box is selected by default Application Name SpxSvr Application ID 2199D32 D198 11D2 46F9 001 054133541 Application Type Local Server Authentication Level Local Fath Cancel Apply 15 Click the Identity tab and select the The interactive user check SSS ax box pry Gama Loca Security Erpes lelontiy Thich uae areari deen wani inar ia nan thie appien onem peiri E The en scenrt pervices ool Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration a S 16 Click the Security tab to configure the user s that have s the ajaj enema Location Secmiy Endpoins identity right to access the Centaur Server computer a Under Launch Permissions click Customize b Under A
111. Controller Address on page 88 for additional information on controller DIP switches and addresses This setting will only be available if the selected communication type is Direct Serial Port and an Enterprise hardlock key edition is detected Manufacturing Access Control Since 1985 En kn T REFERENCE MANUAL Figure 3 Example of COM Port Assignment COM Pot 1 CTL 1 GA one a Used by another i re Sse Up To 04 Conroe CT V900 Al RS 485 CT Va00 A INTERRED ACCNES CONTECE al piia network up t pf leaned cna idress Depa ress E 1 220m 40008 64 SERVER piii Server COM Ports Does not require RS 495 Converter CAA 390 USB Null Madem Gable Up to 8m 25ft cou Pezet Gta come Up To 64 Controllers CT VB00 A RS 403 Controller network up to Addrass 1 220m 4000 128 a Does not require R5485 Canverter C4 A360 US6 Null Modem Gable Up to 8m 25ft Assigning Dial up Site Telephone Number If the selected communication type is Dialup Modem type the dial up site telephone number in the Phone Number text box When attempting to connect the Centaur Server computer will dial the number recorded here and will try to communicate with the remote site through a modem Figure 4 Example of Dial up Site Evista a BCH cer SERVER f me site telephone Remote es number 555 1234 This Dial up Site l is he number you would ral
112. E Digita Unique PIN Numbers Hexadecimal Card Numbers When the Hexadecimal Card Numbers check box is selected the card numbers are entered using the hexadecimal format When this check box is cleared the Eoo decimal format is used This setting will also be used when displaying the card Extended Access Levels Levels 3 4 numbers in the Real Time Events Status window From the list beside the Max Family Number 65535 Hexadecimal Card Numbers select the type of the card 26 Bits 6 Digits or 30 Global Anti Passback Reset Schedule Bits 7 Digits that will be used by the controller Never Reset Ant passback Enabling the Use of Unique PIN Numbers PGE ERRNO Rare When you select the Unique PIN Numbers check box Centaur will not allow you O E il to create a duplicate PIN If you wish to use duplicate PINs clear the Unique PIN Noe S Numbers check box Also refer to P I N on page 130 Po ec E E E Hever r Enabling Distributed Card Programming Select the Distributed Card Programming check box if you want Centaur to download only the cards that are required by each controller which is determined by each card s assigned access level This increases the number of cards available in your controllers since less data is being stored in the database For example if your system has 50 controllers and a card s assigned access level contains only two doors both from the same controller then Centaur only downloads that card t
113. E EE E E A E A E a r 144 AOI I o a a E r E E E 147 Modin Moan INPUT gresis ene E EE EEE E E E EGE E E 147 STS TG AMIDA e E E a E 152 Display Input Status and Manual Controls cccccccccccceeececeecceceeeeeeeeeeeaeeeeseeeeeeseeeeesaeeeeseeeeeeseeeeseaeeeeseueeeseueceseaecesseeeessneessaees 152 OUTPUTS rari atin a crate erence attention ee satan ape E A E REE EEE E 153 Overview of Output Programming ccccccceeeececeeeeeececeaeeeeeeeeeeeeeeaeeeeeeeeaeeeeeeseaeeeeeeseaeeeeeseeeeeeeseeeeeeeesaeeeessaeeesseeneeeesseeeeeesaaeees 154 POCONO OOS sax eE EE E ecactaadie gcse accuies accicapiennsqntesoecaenesusetnscesessenaeicaccbasectiesceaentsussneeaceentne nsec 155 Moci ying an 0 e U daememe meena eer ter A net meen re ene ee eee ee ee eee eee 155 Berung A COUNOUG sais saeehecapenametcanesaseeseacan ected E sacmuoeecetecdusaesanaccusaeaoneceeacecnaesacas 159 Display Output Status and Manual Controls s c5csecxsccdecnis cieatenesdendesiesieedatucesdctcnseedsesenntacacicaduestdageesehacebatacceediuateatseceesteausidedentieaes 159 EVENTS cocoa shes caee nea teocee steer E A S E T saquaue T A cueuneucavenesaevanvesacseereenscaiut 161 Event Definition OVCIVIGW 6 sesstchsnacoscni sient ocavensecticersenedseets i anae A iiaiai iia arado aatend aapakan birdier 162 Event Schedules and Device Activation ccccccsccccccessecceceeececcceeuececseeucecessuseeeeseseeeesseuseeessugecesssausecessseeeeessaseeecssageeeessnsenens 164 Alarm Acknowl
114. Insert key The appropriate properties window will appear see Modifying a Group Notes on page 173 OK Cancel OK Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Groups Lane ys Modifying a Group From the desired Site branch in the Database Tree View window expand the Groups branch expand the desired group branch Companies Departments Job Titles Floors Risk Levels Doors Inputs or Relays right click the desired group you wish to modify and click Properties from the drop down list You can also select the desired group and press the keyboard Enter key The appropriate Properties window will appear allowing you to configure the group General Group Properties From this window select the appropriate Company Department Floor Group Risk Level Door Group Input Group or Relay Group tab For Job Titles there is no tab to select This will allow you to view the site s address as well as record the group s name and any additional notes Addresses At the top of the Group tab Centaur will display the group s address as well as the address of the site to which it belongs The first group created is assigned Group 3 as its address for groups that already have the predefined All and None groups The first group address for Floor Groups will be Group 1 For all other groups the first group address will be Group 1 Every time a group is added Centaur incre
115. L CENTAUR 5 1 Doors Extended Access When a user is granted access the controller will unlock the door for the period defined by the Unlock Time see page 112 However if the card has been programmed with the Extended option see Setting Card Options on page 130 the controller will unlock the door for the duration of the Unlock Time in addition to the value programmed in the Extended access timer In the Extended access text field type a value between 1 and 999 seconds Default 15 seconds This option is particularly useful for individuals that may require more time to access the door Example A card that has the Extended access option enabled is granted access to the Front Door This door s Unlock Time is 15 seconds and its Extended access timer is 30 seconds This means the do or will remain unlocked for 45 seconds instead of only 15 seconds Two card rule delay When two users are mandatory to access a specific door see Two Card Rule on page 109 the Two card rule delay determines the delay within which the two users have to present their cards in order to grant access to the door In the Two card rule delay text field type a value between 1 and 999 seconds Default 5 seconds User badge activation time When a card must be presented twice to the door s reader see Activate Relay on Dual Badge on page 110 the User badge activation time determines the time within which the card has to presented twice t
116. L CENTAUR 5 1 Integrated Access Control ar INTEGRATED ACCESS CONTROL Chapter 19 Operators What Will Find Oveniew OF DpelalOls 244 22 s6556c4 bce ete eee cheek ot 54 bee ote oR ee e oe oe ee oe oe er oe ot bees tees 184 Adding a Security Level Permission or Operator 0 nanana anaana aaea ne eee eee eens 184 Modifying a Security Level Permission or Operator 0 0 ee ee ee eee eee eens 185 Deleting a Security Level Permission or Operator 20 0 ee eee eee eee 190 Operators are personnel authorized to program and or monitor the Centaur Integrated Access Control System through the Centaur software Each operator authorized to access the Centaur system can be defined with different permissions and security levels Security levels determine whether an operator can view modify and or delete system characteristics The system characteristics consist of all the elements found in the Database Tree View window such as controllers doors and events After creating a security level the security level is assigned to a permission and the permission is assigned to an operator Manufacturing Access Control Since 1985 REF Overview of Operators Operators are personnel authorized to interact with the Centaur Integrated Access Control System through the Centaur software Each operator can File view Options Modules Help be defined with different permissions and security levels To create an operat
117. MANUAL oN ri guration 11 From the computer management window under Groups double click on the group named Distributed COM Users 12 Click on the Add button then add the Centaur group 13 Click OK 14 From the taskbar click Window icon gt in the Search field type dcomcnfg exe in the text box and then press Enter Compute Management ike Athen Yew hip ee 57 Xo 4 Be BP Computer Management iLocal tame E en armen ease a mic ened Groiapij Bi rert Log Readers 3 Groups Sp Guit Rekabiley and Performs E BJUSRS Bh Diri a Manager a pa Slenage I Peefeermance Log Lituart inf Cet Management i Peclcoermance Monitor Users By Services and Applications W Power lhon dB Remote Desktop Users i kepka Be Distributed COM Users Description amp Network Confiqueimen Oper dren ators hit complete an Dackup Operator cin cvenrede tia Members are authorized to peor hiamh ire diced to lor A Members of the group can read e Duri hirr ihr timit at erin aiii Duikt in group uiad by internet Inf MAereibers a ihi greup tan het g hiamberi tf thri qouup may the hhembern of ths geoup cen acer Poveri Useri are ost bodied fee hee ke heemibers a this grew ar grart Suppers Tile replcetenn m a dem Laer ane prevented froen makang Members are allowed to launch activate and use Distributed COM objects on this machine Members Changes to a user s gro
118. MPP Flow Contrat From the COM Port drop down list select the computer COM port used to communicate the CMPP commands to the card enrollment unit Connect the card enrollment unit to the selected COM port The selected COM port will use the communication settings defined by the Baudrate Data Bits Parity Stop Bits and Flow Control lists Selecting a card enrollment unit Baudrate In the Baudrate list select a baudrate that is compatible with the card enrollment unit connected to the selected COM port Setting the COM Port Communication Parameters Select the required data bits parity stop bits and flow control settings to communicate with the card enrollment unit connected to the selected COM port Set the following parameters as required Data Bits From the Data Bits drop down list select the number of data bits required to communicate with the card enrollment unit connected to the selected COM port This value is the number of bits used to represent one character of data Most forms of data require eight bits Parity From the Parity drop down list select a parity value that is required to communicate with the card enrollment unit connected to the selected COM port Parity check is an error detection technique that tests the integrity of digital data within the computer system or over a network Each time a byte is transferred or transmitted the parity bit is tested Stop Bits From the Stop Bits drop down list select the nu
119. Management Module on page 231 the SoxDBase Centaur Database Utility window will appear From this window select the Backup tab Select the databases you wish to back up by clicking the Main Database Event Database Pro Report Database and or Tracker Database check boxes For more information refer to What are the Centaur Databases on page 230 In the text field corresponding to the selected database s type the full path location where you would like to save the backup and desired file name You can also click the button to browse for the desired file Click the Backup button 7 SPXDBase Centaur Database Utility BERL Backup Size Advanced Backup Make a backup of the current Centaur databases as selected below Restore Restore previously made backups of the current Centaur databases as selected below Please close the Centaur server before restoring Verity Yernes previously made backups Thie checks only that the backup set is complete and that all volumes are readable However it does not attempt to verly the structure of the data contained in the backup volumes Main Database Backup Path Je main bak TA W Main Database Event Database Backup Path Je event bak ae V Event Database Pro Report Database Backup Path Je ProReport prb se W Pro Report Database Tracker Database Backup Path Je Tracker tb ne m racker Database NOTE Spaces are not supported in the path
120. Path CAProgram Files Microsot SQL ServerMSSQL Windows Firewall Windows Firewall is tumed off Your computer is at isk of attacks and intrusions from outside sources such as the Intemet We recommend that you click the General tab and select On Programs and Services i DCOM File and Printer Sharing Intemet Explorer Java TM 2 Platform Standard Edition binary Microsoft Management Console O Remote Assistance town O Remote Desktop Skype spx Svr exe sqlservr exe 2 Enk a Display a notification when Windows Firewall blocks a program What are the isks of allowing exceptions Manufacturing Access Control Since 1985 REFERENCE MANUAL ENABLING NETWORK ACCESS ON WINDOWS XP In order to be able to setup the DCOM on computers running on Windows XP the network access must be enabled 1 From the taskbar click roa a Start gt Settings gt teiros Pen Ol Control Panel Me poe s pe E D jmn D res fi 2 Double click Address Control Panel Administrative Tools estat kik Har thie Bret aw Depay Fodder Opora Farti L 7 Wicke parka iy Peto ane Support Fie nn Lal Mice nae hibesi MATIA diem Phone end Foner Taka Q 9 3 Chii Taree eral Cerifigure kiari abne setarge for pour computer Manufacturing Access Control Since 1985 REFERENCE MANUAL guration 3 Double click Local Security Policy Aciministrative Tools Q
121. Settings on page 93 All other settings will be unavailable ve The CA ETHR A converter is recommended as it has been tested with our products Visit our website at www cdvi ca for more information Figure 2 TCP IP Connection REMOTE SITE CA ETHR A CT V900 A TORI Converter Door Controller First controller of a site LAN WAN SERVER To mexi f controller or RS 232 CABLE 7 6rm 250 mar REMOTE SITE CA ETHR A ET VO00 A TEPIP Canvert er 2 Door Controler First controler of a site i m T m 25h MEAN CA A360 USBRS RS 232RS 485 Convertor To next controller Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Sites a y Selecting the Site Baud Rate It is important that the baud rate be set to the same value that is defined by the dip switch settings 7 of the controllers the controller default setting is 19200 baud in the site Click the Baud Rate drop down list and then select the appropriate baud rate from the list This setting will only be available if the selected communication type is Direct Serial Port and the site is not connected Selecting the Site Speed Click the Speed drop down list then select the appropriate speed from the list This setting defines the speed of data transfer between the Centaur Server computer and the site controllers During normal operation the speed should b
122. These inputs can be used to monitor devices such as magnetic contacts motion detectors and temperature sensors Under Input Configuration select one of the three following input configuration radio buttons The selected input configuration applies to the controller s inputs and the inputs located on the controller s 2 Door Expansion Modules NC Inputs This setup will not support tamper and wire fault short circuit recognition but will generate an alarm condition when the state of the input is breached All inputs on the selected controller and its 2 Door Expansion Modules must be connected using the NC Input Connection Method described in NC Input Connection on page 144 ATZ 2R 16 Inputs This setup will not support wire fault short circuit recognition but will generate an alarm condition when the state of the input is breached This method also requires the connection of two devices to each controller s input for a total of 16 inputs The 2 Door Expansion Modules do not support input doubling All inputs on the selected controller and its 2 Door Expansion Modules must be connected using the ATZ 2R Input Connection Methods described in ATZ 2R Connection on page 145 ATZ 3R 16 Inputs This setup generates an alarm condition when the state of the input is breached An alarm condition is also generated when a wire fault short circuit occurs This method requires the connection of two devices to each controller s input for a
123. This means any card assigned with this access level will be granted access to the back door only when the General schedule is valid Figure 17 Example of Access Level Programming Door Schedule V Back Door General Front Door Always Manufacturing Access Control Since 1985 r a i Lp REFERENCE MANUAL User s access level The Users tab displays the list of users having this access level Each user is displayed using its first name last name and the user group he belongs to nn mena Access Level Doors and Schedules Users Deleting an Access Level In the Database Tree View window left hand portion of your screen right click the desired access level and click Delete from the drop down list You can also select the desired access level and press the keyboard Delete key A dialogue box will appear requesting confirmation You cannot delete the default All and None access levels Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control ar INTEGRATED ACCESS CONTROL Chapter 11 Cards What Will Find POGING Calis sacstetn ote set at eek oes ee oho bet oho ba yet oe 5 oe cor a oe oe See eee dees ae ees 127 MOJN DOA Cad coi 2o34n rE eee eee gous ch eneteesa tees R ee get teesen ae sacle eames 128 BELUT aA Cad oo ecaceeen see E EEEE seas eee ee ene ee cheese be eee ene eke eete eae e seas teen eee 131 Programming a card allows you
124. W ze 10 Address 11 Address 12 1 Ohm IE Ohm 2 2K Ohm Address 13 Address 14 1K Ghm 22K Ghri i a E EOL Address 15 Address 16 1 Ohm IK Ohm 22K Ohm ATZ 3R CONNECTIONS FOR CA A470 A 2 Door Exp 1K Ohm EOL inputs Zi COM fe ea COM z4 Tel ea iK 1K Ohmi Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Inputs Adding Inputs In order to add one or more inputs at least one site and one controller must be created If you have not created a site please refer to Sites on page 25 For more information on setting up a controller refer to Controllers on page 85 When adding inputs using the methods described in the following sections you will be required to select an address for each input These addresses represent a specific input on the selected controller as described in Connecting Inputs on page 144 To add one input or multiple inputs at one time right click Inputs from the desired controller in the Database Tree View window and select New Inputs from the drop down list You can also select Inputs and press the keyboard Insert key Select the desired input address es and 3 a click OK After adding the input s you will have to configure them within the Input Properties Cancel window see Modifying an Input on page 147 Add Devices Modifying an Input From the desired controller s branch in the Database Tree
125. WINDOWS System32 cmd exe Microsoft Windows LUersion 6 8 6001 window will appear Type Copyright tc 2006 Microsoft Corporation All rights reserved cd systemroot system32 and C NUserssThecnical support gt cd systemrootx system32 press the keyboard Enter key Then iC oNWindowssSystem32 gt msdtc installa type msdtc install and press the keyboard Enter key Manufacturing Access Control Since 1985 AN a b G r REFERENCE MANUAL UR51 figuration Verifying if the DCOM has been repaired Perform the following steps to verify that DCOM has been repaired 1 1 From the taskbar click Window Icon gt in the Search field type dcomcnfg in the text box and then press Enter 2 2 The Component Services window will appear In the Console Root folder left side of your screen expand the Component Services branch the Computers branch and then the My Computer branch If there is a red arrow next to any of the components of this folder DCOM has not been successfully repaired and you must repeat the repairing process Setting the Firewall a Fy E Compenent iaria e Action yew indyw Hep uA G Conacle Root a Compong Senaces 9 Computers a Ky Computer al lbs apple ai 3 Foo Conky T Runny Precerpes i Mame Component Cera Conie Foct aaa al Evera Viewer Local More Arioni tenies iLocal 3 Distributed Transaction Cocedinstor ja Givens Viewer Local Sen m
126. about access control and permissions 32 From the taskbar click Window icon gt in the Search field type administrative tools in the text box and then press Enter i 33 The administrative tools window appear Double click on the Local security policies 73st tee setter LER Piarre e madii Typ tie F nn A Computer Management 20 0 1416 Sherttut ZEB Eh Cate Sources 0060 MOOG 11 020852 Shortcut 2EB a 7 Sa Event imar ROOG 11 070052 Ghewtcut 2 KR BP Music 48 S09 ritato M 10 Shortcut 28D j Pecemthy Changed Fa Local Seuutdy Pokey AO A An Sherle ul 2 KH A searcher AL Memory Deagnestics Tot 206 111 0205 Sheet ZKE f Pubic ija Pont Managrenent Ai Ai Shewteut 2B GP Rehabilty and Performance Monitor 20 0 3146 Sheeteut ZKE Pe Erpes Agg Shortcut 2ER G Syatern Configuration OG 61 013 tea Shevtcut 2h AP Tast Scheduler 2006 11 0705 Shortcut 2 KD dP Wordows Freel eth Advanced Securty 20 0 AG Sherteut 2 KH Foldert m lora Sequrity Policy Das meocitied 2008409 20 1A Sheric ul wer 14 ER Drie crete 28 43 22 Manufacturing Access Control Since 1985 REFERENCE MANUAL UR 5 1 E ri guration 34 The Local Security Settings window will appear Double Click on Local policies then select Security options Sa Local Security Policy File Action View Help es AM sa Es Security Settings b Ca Account Policies a EA Local Policies t EA Audit Policy t i User Rights Assignment b Ca Se
127. ac sack sed cede tein cents doesent EE ee ences bar sosee Gish cee EE A 179 M diymga Check POINT sereisas e Ser en ne ee oe ee ee ee ee eee eee 179 PAG ONG aA ROUN aitetceatsene cia ect vance secence E E E E nen eancicewstdsaiasussremetaabeeistes 181 Modifying a Round eee 181 OPERATORS daren E E A E E eee ee 183 COV wor CONS eera E A E EE ER E A E S 184 Adding a Security Level Permission or Operator c cccccccsecccceeceeceeceeceeeeeseeeeeseeecesseeeesseeeesseaeeeseeeeeseaeeeseaeeesseeeesseeesseeenes 184 Modifying a Security Level Permission or Operator cccceeeccceceeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeseeeeeeeseeceeeesaeaaeeeeessageeeessaeeeeesseeeeessaes 185 Deleting a Security Level Permission or Operator cccccccssececccesseecceaeeceesceusececaueueeeecsuseeeesauseecessuueeeessusecesssaeesessanseesssags 190 CT COMMANDS oiar AEE a NRE E E a E A E 191 Addio et 3G TY C Ona aa e E E T E tases eaoeteateaeenet 192 Modifying a CCTV COMA sce chis cs ces sbce ccs etencececeesbedceicaraieedt E a Ee ie EEE S EE O E 192 Deleting a CCIT Command srsrsrsssisrrgii erin E ra iie doar iE i ar a Eear 193 PS SS aE AA E EE EE EA E EAE E EE E E E EEEE E E E E EER 195 PCI AUN SSS E E A E E E 196 MOCE IRO A PS SOU aa E E E E E cae teense eeeccet oes ces 196 DECIDO ANS SOU aa O A AA E E EAEE E E 197 DYR ana a EA E E E E E E EE E 199 Accessing the Avallable DVRS sesisssiiiiesiisossseirer naan i aeaee ea adua iaaiiai iaa EE 200 Viewing Arc
128. ach door can be accessed For more information refer to Access Levels on page 121 If two or more access levels are assigned to a user group access is Access Level 3 Nons E granted as long as one of the defined access levels is valid Access Level 4 Mone E coed toch Defining Parking Rules for the User Group The parking options allow to enable the tracking of the number of cars present in the parking The maximum parking capacity is configurable as well as the selection of the relay that will be activated when the capacity of the parking is reached User Group Default Access Levels Parking Users User Group Properties Parking Options Activate Parking Counter Masinnurm Capacity fi Activate relay when capacity iz reached None OF Cancel Apply Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Users and User Groups Assigning Users to User Group All users associated to the user group will be listed in the Users Tab To Add users SESS to the group click the Add button and all the users defined for this site will be listed Sa ana ae at the exception of users already assigned to this group or to another group Select User Group Default Access Levels Parking Users all the users to be assigned to this group and click OK to confirm To remove a user from the group click on the desired user and click Remove Add Remove coed too Deleting a
129. acking Appl Cancel 18 Click on Start in Windows type dcomecnfg and click OK Manufacturing Access Control Since 1985 Type the name of 4 program Polder document or Internet nca and Virdee val open E fee yo Gmi ura ck canst trove REFERENCE MANUAL UR 5 1 E figuration 19 The Component Services window will appear Expand the Component Services Component Services fae Fie Acton View Window Help Computers and My Computer TS gt a branches and click DCOM e Eaj a EB Config iJ Console Root i D Component Services H E Computers E My Computer COM Applications DCOM Config H Running Processes DOM Config 215 objectis AccStore Class Acrobat Acrobatwri WebCapture E Distributed Transaction Coordinator S2 n Event Viewer Local 84 Services Local 20 Right click the SpxSvr file and click Properties PE File Acton View Window Help amx enle e I Console Root E D Component Services B Computers My Computer H E COM Applications DCOM Config E Distributed Transaction Coordinator E Running Processes q Event Viewer Local H S Services Local AcroDist AcroExch F AcroPDF e Adobe Adobe Document Aroba InDesig y Symdlbrg SymLTCOM SymProtect SymSHAx SymLndo SyncMian Systranso SystranDMaA SyncStatus Class r sll Manufacturing Acc
130. ackup Size Advanced Attach Register the database files with SQL Server Please make sure that the files you wish to attach Centaur3E vents mdf and Centaur3M ain mdf are located in the same directory as this application Detach Unregister the database files from SOL Server Remove Unregister the databases from SQL Server and remove the files completely Purge Events Delete events from the event database by Date Please do not use this for reducing the size of the database or purging large numbers of events If the event database is too large then use the Truncate option in the size tab Attach progress T SPXDBase Centaur Database Utility Backup Size Advanced Attach Register the database files with SQL Server Please make sure that the files you wish to attach Centaur3E vents mdf and Centaur3M ain mdf are located in the same directory as this application Detach Unregister the database files from SOL Server Remove Unregister the databases from SOL Server and remove the files completely Purge Events Delete events from the event database by Date Please do not use this for reducing the size of the database or purging large numbers of events If the event database is too large then use the Truncate option in the size tab Attach progress Manufacturing Access Control Since 1985 Purging Databases Using this feature you can delete events that occurred between a specified period of
131. add another door repeat steps 2 to 7 9 Click OK Modifying a Door Right click the desired door from the Doors found within the appropriate controller s branch and click Properties from the drop down list You can also select the desired door and press the keyboard Enter key The Door Properties window will appear allowing you to configure the door General Door Properties The Door tab will allow you to view some of the system component addresses as well as record the door name and any additional notes Viewing the Door Address At the top of the Door tab Centaur will display the door address as well as the address of the controller and site to which it is connected The door addresses are represented by which input the door reader and or keypad is connected to see Figure 13 Manufacturing Access Control Since 1985 Door Properties Door General Inputs and Outputs Users Elevator Control Site 1 Controller 1 Door 1 Name Front Dood gt Notes 44 REFERENCE MANUAL WUR 5 1 Figure 13 Controller s Door Address Assignment Typing the Door Name Use the Name text field to identify the door and its location We recommend using a name that is representative of the door such as Front Door Also refer to Typing Names and Notes on page 23 Typing the Door Notes Use the Notes text field in the Door tab to record any additional notes that may be required We recomm
132. ails in the Real Time Events Status window Display Access Events When you click on the Access events icon any of the last 1000 events generated that is linked to the status of the doors IE in the selected site i e Access Granted Card Traced etc will appear along with its details i e company name and information about the user in the Real Time Events Status window Display Abnormal Events operation i e Door Left Open Relay Activated by Operator troubles etc will appear along with its details in the Real JZ When you click on the Abnormal events icon any of the last 1000 events generated that is uncommon to normal site Time Events Status window Display Acknowledged Events Acknowledgement on page 166 When you click on the Acknowledged events icon any event that requires acknowledgement and has been acknowledged by an operator will appear along with its details in the Real Time Events Status window Iv Any of the last 1000 events in the site can be programmed to require operator acknowledgement see Alarm Display Guard Tour Events When you click on the Guard Tour Events icon the last 1000 guard tour events that occurred in the selected site will aa appear along with its details in the Real Time Events Status window Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Manual Controls Manual Controls The following sections describe how an operator can
133. al Number 178 Typing Names and Notes 23 U Understanding the Centaur User Interface 15 Undo Changes Centaur s Card Management feature 63 Unique PIN Numbers 35 Unlock a Door Group 176 Unlock Both Doors 97 Unlock Door 219 Unlock Door Latched 279 Unlock Door Timed 219 Unlock on Late to Open Reading Type 177 Unlock Schedule 110 Unlock Time 112 Unlocked Reading Type 177 Update Controller Every Fifteen Minutes 35 Update events 211 Update Firmware 99 Update Time 107 Use Keypad 130 Use System Colours 212 User badge activation time 173 User Interface Overview 16 User validation interval 173 Using Centaur 1 Using Centaur s Card Management feature 63 Using SAP Integration 43 V Valid Cards 48 131 Validate Check Point 224 Video control 169 Video Switcher Protocol for an Event 169 View 17 View Controller Status 101 View Round Details 224 View Security Levels 186 Viewing Events on Screen 164 Visitors amp Parking 38 W Waiting for Keypad Output Activation Events 157 WAV File Assignment 242 WavePlayer 13 18 What Are Groups 172 What are the Centaur Databases 230 Where Are the Groups Used 172 Where Schedules Can Be Used 80 Wizard Controller Configuration 86 Door Configuration 104 Site Configuration 26 Wrong Code on Keypad Output Activation Events 157 Z Zone Speed 149 Zones Input Speed 149 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Manufacturing
134. and Use custom configuration permissions check boxes are selected by default Registry Yalue Permissions x Registry Value AccessPermission Owner Account Unknown Name 9 The Registry Value Permissions window pops up John Doe John Doe Allow Access To add users click on the Add button User 1 User 1 Allow Access E User He User 2 Allow Access The Use default launch permissions and Use custom configuration permissions check boxes are selected by default The Registry Value Permissions window may be empty depending on the previous DCOM Type of Access Allow Access Cancel Add Remove Help configurations Manufacturing Access Control Since 1985 r a i Lp REFERENCE MANUAL figuration wg its tae a dabaen up From the List Names From drop down Add Users an x list select the computer or domain To view ae Eeo i i i H pi F er x the list of users either click Show Users or if eee ies 1a EE the user is part of a user group select the Names group and click Members Select the CD RESTRICTED Pesticted code desired user from the list Hold down the je SYSTEM The operating system keyboard Ctrl key while left clicking to select mel e Users are prevented from making accide multiple users Click Add and OK E Administrator Built in account for administering the con Built in account for guest access to the John Doe John Doel er
135. anual command see Lock Door on page 219 or until locked by the door s schedule see Unlock Schedule on page 110 Enable Door When an operator manually bypasses a door see Disable Door below this command will reinstate the active state of the selected door Disable Door Allows the operator to manually bypass the selected door The active state of the door is reinstated when the operator uses the Enable Door command see above or when enabled by the door s enabling schedule see Unlock Schedule on page 110 Manufacturing Access Control Since 1985 REFERENCE MANUAL J y ri rols x Figure 35 Door Status and Manual Controls Click the Door Status icon 1 Comaur Door Sia ua B oeer 001 09 iz Eia a B baiiia 1 gia Bi Bow 001 8 1 5 Si Aiea H fice fh et det Coin B peer ono a Orrin ESTE 1 8 Safin B icon fe ha oa Aiie B tecr aro t Gii visual display and text description of current live door status Pp coerce 2 a f Teie Ti tiee 3 t rari a Ay arty Lowel 7 tpn Temes a 9 Penia 2 earma 1 GS o Comers 1 Displaying and Controlling the Status of a Relay Dirka arad ia aan inm rel i ice tre i inet fice iiia fier Lirica Dear Tire Lirica Door 1 iT Eenum Seded Cag oiha Pry rae erect Eraka ia ERA tee Dajah Propertie Right click the desired door s then select the desi
136. ar in the User Card field of the Real Time Events Status window see Figure 19 When you have located the correct number type it into the Card Number text box Alternatively enter the card number in hexadecimal in the Card Number Hex field when the Hexadecimal Card Numbers check box on page 35 is selected Entering the Card Number in decimal format will affect the Card Number HEX field and vice versa Figure 19 Using the Real Time Events Status window to Find Out the Card Number Centaur All Events File View Options Modules Help ee ie coperto taa mE s Centa Te User Card Field Time Paul Smith 150 3 Flea 2008 20 17 John Edwards 150 4 Fl e3fe008 20 17 Logged Time 7 25 2008 20 17 7 23 2008 20 171 Description Administrator Event Mame Card modified Card modified E E sites 1 SB Site 1 Ese p Users 1 a MGS visitors 1 Unassigned Cards 2 John Edwards B Paul Smith Click on the button to load or add a card using a CMPP card enrollment station This button is only available when the Administrator Family Number Card Number Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Cards Activate CMPP check box is selected refer to Activating CMPP for a Site on page 41 Assigning Access to a Card The Floor Group Access Level 1 to Access Level 4 drop down lists identify
137. are Use the View Controller Status command see page 101 to verify the application version currently used by the controller LY Each site must be updated separately We recommend one controller at a time Updating Controller Firmware Once the firmware files have been downloaded from our website the controller s can be updated within Centaur Perform the following to update the controller s firmware 1 Ensure that you are connected communicating with the controllers in Centaur The Centaur software must be running 2 Within Centaur expand the desired Site in the Database Tree View window and expand the Controllers branch 3 From the expanded Controllers branch right click on a controller whose firmware you would like to update and click Update Firmware 4 Under the Firmware Files heading browse and select the required HXH file 5 Click Update 6 Wait for the process to be completed 7 Click Close then wait for the download to be completed Manufacturing Access Control Since 1985 r ao Ha REFERENCE MANUAL Download The Centaur software can download the following system characteristics to one or all controllers in a site access levels cards controllers doors holidays inputs input groups outputs output timings relays relay groups and schedules If any system characteristics are set when a controller is online Centaur will automatically download the information to all controllers in the site Wh
138. arta 7 WI Up to 4 Elevator Controllers Elevator Controllers r CA A480 A per door CA A480 4 DIP Switch Ly Floors Fios a3 io 44 0 io 64 To other a0 cT veo0 a controller RS485 Flown Addressable DIP Switch Quick Start Programming To properly set up Centaur for elevator control several different elements must be programmed as defined here 1 Access the Site Properties window by right clicking on the desired site from the Database Tree View window and selecting Properties from the drop down list You can also select the desired site and press the keyboard Enter key In the Site Properties window select the Floors tab and define the names and numbers of the site s logical floors see Site Floor Settings on page 39 2 Program the door s reader for elevator control and install it inside the elevator cart The door cannot be used for any other purpose other than elevator control Access the Door Properties window by right clicking on the desired door from the desired controller s branch within the selected site and clicking Properties from the drop down list You can also select the desired door and press the keyboard Enter key In the Door Properties window of the desired door select the General tab and set the Door Type to Elevator see Door Settings on page 107 Please note that you cannot use any doors from the 2 Door Expansion Modules for elevator control Manufacturing Access Control Since 1985
139. ation for Windows XP To be able to configure the DCOM on Windows XP operating system you have to be logged in as Administrator Verifying DCOM Before going on with the DCOM configuration you can perform the following steps to verify the integrity of your DCOM 1 From the taskbar click Start gt Run The Run window will appear Enter dcomcnfg exe in the text box and click OK 2 The Component Services window will appear Within the Console Root folder left side of your screen expand the Component Services branch the Computers branch and the My Computer branch Ensure that the Running Processes folder appears in the My Computer branch If it does not appear you must repair DCOM If your DCOM configuration is found corrupted then follow the steps in Reparing DCOM on page 265 if not skip the next section and go directly to Setting the Firewall on page 267 Click the COM Applications branch The components of this branch will appear on the right side of your screen If you get an error message and or cannot access this branch of components you must repair DCOM If your DCOM configuration is found corrupted then follow the steps in Reparing DCOM on page 265 if not skip the next section and go directly to Setting the Firewall on page 267 Type the name of a program folder document or sim Internet resource and Windows will open it For you Open deomenfal Cancel Browse zj
140. aur3Events mdf and the soxDBase exe files are located in the above mentioned path Please note that before attaching the database the database files currently used by Centaur need to be detached or removed see Detaching Databases on page 236 or Removing Databases on page 236 Verify that Centaur and the Centaur Service Manager applications are closed and that the SQL Server is running Perform the following to attach the database 1 After starting the Database Management Module as described in Starting the Database Management Module on page 231 the SoxDBase Centaur Database Utility window will appear 2 From this window select the Advanced tab 3 Click the Attach button Manufacturing Access Control Since 1985 i 4 REFERENCE MANUAL CENTAUR 5 1 Database Management i ar i SPXDBase Centaur Database Utility Backup Size Advanced Attach Register the database files with SQL Server Please make sure that the files you wish to attach Centaur3E vents mdf and Centaur3M ain mdf are located in the same directory as this application Detach Unregister the database files from SQL Server Remove Unregister the databases from SQL Server and remove the files completely Purge Events Delete events from the event database by Date Please do not use this for reducing the size of the database or purging large numbers of events If the event database is too large then use the Truncate opt
141. be able to exit through either door 1 Global Exit or door 2 Global Exit but not through door 3 since it is not defined as a Global Exit meaning that the user would still be considered as in Figure 14 Global Entry Exit Door 2 Global Entry Exit Door 1 Global Entry Exit Door 3 Entry Exit Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Doors laan A Pi Parking Global Entry or Parking Global Exit These door types allow you to use global anti passback which functions independently and provides more versatility than the local anti passback feature When using Entry and Exit door types see above users must enter and exit through a door on the same controller When using the Parking Global Entry and Parking Global Exit door types a user can enter through a parking door defined as global entry and then the user can exit through any parking door defined as global exit You can also reset the global anti passback status of all users For more information refer to Selecting a Site s Global Anti Passback Reset Schedule on page 36 Global Entry Exit Validation Select the Global Entry Validation or Global Exit Validation to invalidate a user to proceed to a validation after a pre defined number of access see User validation interval on page 113 Two Card Rule Select the Two Card Rule door type when two user credentials are mandatory to access the doo
142. by default in C Program Files Microsoft SQL ServerMSSQL Binn and then click OK Add a Program betel Seles the progiam you want to adel or ciel Srm to Gral one that a net ished anal for che Ok internet Explores F E locate Piraji T MSDE Management Cores FD ieee Geperts grl LUD Pro Breet TH Purba Pimp 3 E Ee Path Crogan Fira ermal 50 ServeMS rowe 11 The Windows Firewall settings window will re appear From the Exceptions tab make sure that the sqlsevr exe checkbox below the Programs or Port heading is check Exceptions control how programs communicate through Windows Firewall Add a program or port exception to allow communications through the firewall 12 Click OK Windows Firewall is currently using settings for the domain network location What are the risks of unblocking a program To enable an exception select its check box Program or port C Remote Scheduled Tasks Management Cl Remote Service Management C Remote Volume Management C Routing and Remote Access C Secure Socket Tunneling Protocol SNMP Trap W spxSwr O Windows Collaboration Computer Name Registration Service O Windows Firewall Remote Management C Windows Management Instrumentation WMI O Windows Media Pla V Notify me when Windows Firewall blocks a new program Manufacturing Access Control Since 1985 wll REFERENCE MANUAL DCOM Configuration
143. cccccccccsseeeeeeceeeeeeeeeeeeeeeeseeeeeeesaeeeeeeseeeeeeesaeeeeeeseaeeeeeesaaeeeesseeseeessaeeeeesaeeeeens 282 DCOM Configuration for Windows 2000 Pro and Server cccccceccccceceeeeeeeeeeeeeeeeeaeeeeeeseeeeeeeeaeeeeeseeaeeeeeeseeeeeessaeeeeessaeeeeeaeeeeees 307 WARRANTY asco etic penser eee cs A A A needa atme dence enaaemeemneesine 313 Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control ar INTEGRATED ACCESS CONTROL Chapter 1 Installing and Using Centaur What Will Find Cenilaur BGinOns oi22 c lt e e seca Countess e608 bot E E eee ee bees E oes ae eee see he eeeteesehe aoe ee 2 instalation OVEWICW cc ccc4eecemseeoeaee eee Boe ee hee eG Lee eee cena ee sees eure peewee AREE CHEESE 3 Sce Sea ete E E eet eee eee oe eked taceeeebeteueende EE EEEE EE TAE ETTA ETE be ees Sees 3 Centaur Administration Console Workstation 0 0 0 0 ee eee eee eee 7 Setting Centaur as a Service Under WindoOWS 2 0 0 ee eee ee eee eee nee 9 Plugging the Hardlock Key 1 0 0 0 anaa 10 Starting the Centaur Server and Software 1 6 ee ee ee eens 11 Software Modules 2 4 44 46 e6 4 Gh ads dha bb eee deed Bd6 04 es ok aoe Boeke Shwe doe eb eee Seo eee eee eed es 13 Centaur is an advanced and powerful integrated access control management software The following chapter contains important information concerning the installation and use of this software Manufactu
144. ccess Permissions click Customize c Under Configuration Permissions click Use Default 17 Under Launch Permissions click the Edit button 18 The Launch Permission window will appear Click the Add button to add users 19 The Select Users or Groups window will appear Verify that the Object Type and the Location is correct and click Find Now Select the desired user from the list Hold down the keyboard Ctrl key to select multiple users Click OK Manufacturing Access Control Since 1985 REFERENCE MANUAL lf C E ri guration 20 The Centaur Group appears now in the Select Users or Groups window Click OK Select Users or Groups 21 Click OK From this location i 22 From the taskbar click Start gt Control Panel gt XP PRO ENG Administrative Tools gt Local Security Policy Enter the object names to select examples check Names 23 The Local Security Settings window will appear Double click DCOM Machine Access Restrictions in Security Descriptor Definition Language SDDL syntax Ak A Account Polices l4S8 Local Policies EEJ Audit Policy i User Rights Assigarent 29 Security Options E Public Key Policies F E Software Restriction Poldes E IP Security Poles on Local C A Accounts Limit local eccountuse of blank passwords to console logon only iia Accounts Rename acminisiratar account Fa Acoounis Rename guest account ia Audit Aucit
145. ck Num Lock and Scroll Lock keys Administrator Local Status System Operator Server name Communication Keyboard Typing Names and Notes 1 When changing the name of a system component in the Database Tree View window i e controllers events doors etc Centaur will immediately refresh the screen Press F5 to manually refresh the screen 2 Please note that Centaur does not support more than 50 characters for Name fields and 255 characters for Notes fields 3 Use the drop down list on the right of certain text fields to type the text in more than one language see Languages below for more information Languages The Centaur software is a trilingual software Many of the text fields in the property windows when programming sites doors etc will have a drop down list available Use these drop down lists on the right of certain text fields to enter item names and notes in more than one language When a Centaur Administration Console is installed on a workstation computer you will be asked to select one language The Administrator Console will display the item names and notes in the language selected from the Administrator Console s login window Manufacturing Access Control Since 1985 r a i Lp REFERENCE MANUAL UR5 1 ling the Centaur User Interface Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control ar INTEGRATED ACCESS CONTROL Chapter
146. ck Activate Controller To deactivate a controller right click a controller from the desired site s Controllers and click Deactivate Controller Manufacturing Access Control Since 1985 r ao Ha REFERENCE MANUAL Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control ar INTEGRATED ACCESS CONTROL Chapter 9 Doo rs What Will Find PONG OOS ti sn0ee ote epee Oba oe od he eed dot hd bao Saeed Shh eo oe eed ba ee ee ek 104 Modin MO a DOO sh 4 2o8en Cohan a tod suse eb oeneae ee Ghee eben eee sauce oe te A eee eee eae 105 DARMO a WOOF pasukkae va peeueaedeeeeee es Ci wemeee eee hehe ed eee Bek ee ea bee eee ade eka ee eee ee ee 118 Display Door Status 1 ne ee eee eee eee ee 119 Each controller includes 2 reader and or 2 keypad inputs which can monitor the state of up to 2 doors Each controller also supports up to three 2 Door Expansion Modules CA A470 A which provide an additional 2 reader and or 2 keypad inputs each Therefore each controller can monitor the state of up to 8 doors The term door refers to any access point controlled by a reader and or keypad such as a door turnstile gate cabinet etc To control entry and exit to an access point a reader and or keypad can be used on both sides of the door This also provides the ability to set up Interlock mantrap or Anti passback applications The use of door contacts on all controlled doo
147. ck Outputs from the desired controller in the Database Tree View window From the drop down list select New Outputs You can also click the desired output and press the keyboard Insert key Select the desired output address es and click OK After adding the output s you will have to configure them within the Output Properties window see Modifying an Output Modifying an Output From the desired controller branch in the Database Tree View window right click the output you wish to modify click Properties from the drop down list You can also click the desired output and press the keyboard Enter key General Output Properties From the Output Properties window select the Output tab The Output tab will allow you to view the component addresses as well as record the output s name and any additional notes a Output Properties Output Events Site 1 Controller 1 Output 5 Viewing the Output Address Name boort Buz a At the top of the Output tab Centaur will display the outputs T address as well as the address of the output s controller and site Please note that the DIP switch settings on each 2 Door Expansion Module determine the address assignment of its output terminals Figure 31 Output Addresses CA A4TO A CA ASTO A CA A470 A EO Om m0 wee wee f OUT1 Add 1 OUT1 Add 7 OUT1 Add 13 OUT1 Add 19 OUT2 Add 2 OUT2 Add 8 OUT2 Add 14 OUT2 Add 20
148. ck point validation Refer to Guard Tour on page 177 for more information Enable Counter When the Enable Counter check box is selected the number of times this card can be used on a door that has its Counter option enabled refer to Counter on page 111 will be limited to the number specified up to 255 times Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Cards ys Disable Card After When the Disabled Card After check box is selected the card will be automatically disabled unassigned after the specified number of days of inactivity up to 365 days Selecting the card location The Location drop list is used to indicate or change the global anti passback status of a user card In Out or Unknown All user s card location is set to Unknown after a reset of the global anti passback Refer to Global Anti Passback Reset Schedule on page 36 for more information Selecting Card Status Each card can be tagged with one of five status levels These status levels will determine when a user s access card is valid Click the Status drop down list to select one of the following status levels Valid As soon as you click OK the card s programmed access privileges are valid and the user can begin using their card until the status is changed Stolen Invalid or Lost These status levels allow you to indefinitely revoke a card s privileges without having to remove it from the database
149. cmd exe window will appear Cancel By ae Type cd systemroot system32 and press the keyboard Enter key Type msdtc install and press the keyboard Enter key ce Select C WINDOWS system32 cmd exe Microsoft Windows AF Version 5 1 2600 mC Copyright 1985 2001 Microsoft Corp C Documents and SettingssSTechnical Support cd xsystemrootx Ssystem32 Co WINDOWS system32 gt msdtc install Manufacturing Access Control Since 1985 Verifying if the DCOM has been repaired Perform the following steps to verify that DCOM has been repaired 1 From the taskbar click Start gt Run The Run window will appear Enter dcomcnfg exe in the text box and click OK 2 The Component Services window will appear In the Console Root folder left side of your screen expand the Component Services branch the Computers branch and the My Computer branch If there is a red arrow next to any of the components of this folder DCOM has not been successfully repaired and you must repeat the repairing process Run 8 8 2x Type the name of a program folder document or imj Internet resource i and Windows will open it For you Open deomen gl Manufacturing Access Control Since 1985 ll REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration Setting the Firewall Firewall settings need to be altered on the Centaur Server computer and on any workstation connecting to the Centaur Server computer thro
150. counter freeing up the used places View Detailed View Displays the list of all users currently present in the parking for the selected group Figure 42 Display Global Parking Status fai Centaur Global Parking Status File View Options Modules Help sma oa GPie Hooro StH S008 NR ed Centaur Ss Sites 1 sited E i e Site 1 ocate Parking Space Li Users 2 be f John ee p User Group 001 5 F Test is visitors 2 1 1 view Detailed view ooi John Smith ee Unassigned Cards 1 SE Access Levels 2 Site Alarm Mame Instructions Description Field Time H 0 Schedules 2 Ee Controllers 1 ce Events oe i Macro B Sroups I ee Companies 2 f vets Company O02 Po Default Company Been Departments 1 a Default Departme Bh Jobtitles 1 Le Default JobTitle s r gt gt x jii Ready Administrator Local Comms OFF NUM Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Manual Controls Free Parking Space To free parking space for a specific user double on the site or user group right click the desired user visitor and select Free Parking Space Figure 43 Display Global Parking Status fai Centaur Detailed Parking Status kef File view Options Modules Help IIE wW Bev ox GPhe deorap Sova RH dep Centaur 4 g 3 a f earn wee Default Company 10 5 2008 9 03 09 PM 00 13 01 Be E Site 1 Oe
151. ctivate Relay Deactivates the selected relay Manufacturing Access Control Since 1985 wll REFERENCE MANUAL CENTAUR 5 1 Manual Controls Figure 36 Display Relay Status Click the Relay Status icon E Lanla Hekiy Fleur TE TETA Bete 0 8 z ate Caaatorabe Rali Serr OL A pa carn ML feel Bry ime a creek Coch 1 Peso i3 jaa Batre r rire B haf s i Lior mai fe D eaters s ithinn Carine r Brijiya bekei ef es Ly He Prap eed eh Ps m e teens Visual display and text _ r ig ead description of current Right click the ete relay status live desired relay s then select the desired action oe Coenen Displaying Controller Status f When you click on the Controller status icon from the menu bar Centaur will display the current live status of the Lp controllers in the selected site Figure 37 Display Controller Status Click the Controller Status icon B ceolar L enirir Hallas e ram Visual display and lag peed text description a 2 aain of current live eR eee piate controller status Right click the desired oe controller s then select E the desired action Manufacturing Access Control Since 1985 REFERENCE MANUAL UR 5 1 y rols x Displaying and Controlling the Status of an Input system If you wish to manually enable disable an input right click the desired input You can also select multiple i
152. ctivate the auto start service when the OS starts for the Centaur Service Manager Re open the SpxSvr Properties window see step 19 and from the Identity tab select The interactive user option and click OK To reactivate the auto start service when the OS starts for the Centaur Service Manager run the service bat application from the Program Files CDV Americas Centaur Centaur Server folder lt a Gima Location Security Endpores dently tx eres I The launch wen This per Uig Lire Barrera F Cae pence E The gfe sccar peices oo Manufacturing Access Control Since 1985 j REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration Enabling the Network Access 1 From the task bar click on Start gt Settings gt Configuration Panel gt Administrative Tools gt Local Security Policy E Local Security Settings ja Fie Action View Help f e 0 98 P Securily eing E D aco Pri OF Local Potes n GD Aye Pokey 0 Lk tage Aer e C Pbk ey okes Sabhara Perel Pcie TP lay Boke on Local Canpa EAs Link lacal Account uta SF Bland pubis difil Kept aly Unable Apic Ket horde ato acco fulton aii Hea gi iii tue Apt kher wee of Backup and Peshore phie vite Altes udik athak Baji ta beg on wane Abeer fo fort al ope erian rami Sane Pree une from a panier dress Eii erit COR OM acess bo k beapgedean user onty J ae Plestrict Fiopey WpeRF to eai kon user ony
153. curity Options t Windows Firewall with Advanced Seci 4 Network List Manager Policies t O Public Key Policies t C Software Restriction Policies b a IP Security Policies on Local Compute 35 Double click Network Access Sharing and security model gt Local Security Policy File Action View Help Eg FE o or unts Administrator account status io Accounts Guest account status ie Accounts Rename administrator account bis Accounts Rename guest account T Audit A E Audit A or E 10 plg Ez ap E Ea AS p Devices o Devices 1 Devices Devices Devices Domain SSE Ez E E T Ep BP 2 or i Domain gt E3 E E Domain Ez E ap ey lki Domai udit the access of global system objects udit the use of Backup and Restore privilege Allow undock without hawing to log on Allowed to format and eject removable media Prevent users from installing printer drivers Restrict CD ROM access to locally logged on user only Restrict floppy access to locally logged on user only controller Allow server operators to schedule tasks controller LDAP server signing requirements controller Refuse machine account password changes IT bie Accounts Limit local account use of blank passwords to console logon only bie Audit Force audit policy subcategory settings Windows Vista or later to o Audit Shut down system
154. d Require signature upon departure Cancel Apnly Visitors must electronically sign out when leaving returning visitor card Default Host Allows the selection of the user that will be assigned as the default host for all visitors that will be created Manufacturing Access Control Since 1985 Defining Parking Rules for the Visitor Group The parking options allow to enable the tracking of the number of cars present in the parking The maximum parking capacity is configurable as well as the selection of the relay that will be activated when the capacity of the parking is reached Visitor Group Properties Visitor Group Default Access Levels Options Parking Visitors Parking Options Activate Parkin g Counter W Activate Parking Counter Allows to keep track of the number of cars present in the parking Maximum Capaciy i Activate relay when capacity iz reached Maximum Capacity Nme O CS SY Allows to limit the number of cars present in the parking Activate relay when capacity is reached Allows the selection of the relay that will be activated when the capacity of the parking is reached OF Cancel Apply Assigning Visitors to Visitor Group All visitors associated to the visitor group will be listed in the Visitors Tab To Add visitors to the group click the Add button and all the visitors defined for this site will Padibialbsubsaduadd elise be listed at the exception of visitors alread
155. d To use this feature the controller must have its doors configured as Entry and Exit doors For more information refer to Doors on page 103 When a card is presented to an Entry reader the controller labels the card as in The next time the card is used it must be presented to an Exit reader in which case it will be labeled as out Please note that the user must exit from an Exit door associated to the same controller Two subsequent Entries or two subsequent Exits will cause the controller to generate the appropriate Access Denied Anti passback violation event Centaur also supports Global Anti Passback which functions independently of the local anti passback settings defined in the following sections For more information refer to Global Entry or Global Exit on page 108 Enabling Controller Anti passback Select the Anti passback tab and select the Anti passback check box to activate the anti passback feature Controller Properties Controller Configuration Anti passback Expander Selecting the Anti Passback Schedule Antipassback Settings Anti passback Schedule Meve From the Schedule drop down list select the schedule during which the anti passback status of cards will be monitored Note that the Anti acacia i Gi passback check box must be selected For more information on schedules eset on Inp Input None z refer to Schedules on page 79 Activate Relay When Area is Emp
156. d enter the new time Validate Check Point To manually validate a check point right click on the desired check point and select Validate Check Point Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Manual Controls Displaying Visitor Status currently live signed in If you wish to manually change the status of a visitor right click the desired visitor s name A drop f When you click on the Displaying Visitor Status icon from the menu bar Centaur will display the list of visitors that are down list will appear Select one of the following actions from the list Also refer to Visitors and Visitor Groups on page 65 View Current Visit Details Displays the visitor s picture reference signature and notes Sign Out Signs out the selected visitor The operator will be prompted to ask for a signature and the visitor will be erased from the list if the option Require signature upon departure is checked The visitor s card s will be disabled when the option Disable visitor s card s upon departure is checked The visitors s card s will be unassigned when the option Unassign visitor s card s upon departure is checked Refer to Options on page 73 for more information Properties Displays the Visitor Properties window with the History tab selected displaying the event s history for the current visitor Figure 41 Display Visitor Status W Centaur Visitor Status File Vi
157. d its programmed settings are assigned to one or more system event refer to Selecting the CCTV Command for an Event on page 169 and when that event occurs within its assigned schedule refer to Selecting the CCTV Control Schedule for an Event on page 169 Centaur sends the assigned command to the video switcher connected to the COM port selected in the site properties refer to Selecting a Computer COM Port for CCTV on page 40 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 CCTV Commands Defining a CCTV Command Perform the following to program a CCTV Command s settings aw omnipo General Details 1 From the CCTV Command Properties window select the Details tab Select Preset Select Camera jor ts Select Monitor 001 2 If you want to use the preset CCTV commands offered by Centaur follow step 3 to step 6 If you want to send a CCTV command that is not offered by Centaur select the Custom Command check box type the desired command in the text field below the check box and go to step 6 When you Tit Pan Zoom select the Custom Command check box all other options are disabled None C Up C Down None C Left C Right None C In C Out 3 From the Select Preset drop down list select one of the video switcher s preset definitions to be activated when the selected event occurs When you select a preset definition the radio buttons un
158. d the name of the file from which you want to restore the database You can also click the button to browse for the desired file Click the Restore button Wait until you get the restore successful message Manufacturing Access Control Since 1985 T SPXDBase Centaur Database Utility Backup Size Advanced Backup Make a backup of the current Centaur databases as selected below Restore Restore previously made backups of the curent Centaur databases as selected below Please close the Centaur server before restoring Verify Verifies previously made backups This checks only that the backup set is complete and that all volumes are readable However it does not attempt to verify the structure of the data contained in the backup volumes Main Database Backup Path fc main bak ee MV Main Database Event Database Backup Path c event bak 7 MV Event Database Pro Report Database Backup Path fc ProReport prb ae V Pro Report Database Tracker Database Backup Path fc Tracker trb oA Mv NOTE Spaces are not supported in the path or in the file names REF Limiting the Event Database s Size With this feature you can define the maximum size of the Event database This feature will not affect the Main database only the Event database see What are the Centaur Databases on page 230 When the Event database has reached its maximum size each subsequent event will be followed by a Fai
159. dditional notes that may be required We recommend that you keep a log of when and what settings were changed Also refer to Typing Names and Notes on page 23 Manufacturing Access Control Since 1985 i 4 REFERENCE MANUAL CENTAUR 5 1 Controllers 27 a Controller Configuration From the Controller Properties window select the Configuration tab The yep yor oe EJ Configuration tab will allow you to program some of the communication settings as well as select the door and input configurations that will be used with the Controler Configuration Antipassback Expander Door 1 selected controller nsa e Door 2 SS Reader Standard 26 Bt Keypad None gt For more information on how to set up doors located on the 2 Door Expansion Modules please refer to Door Expansion Module poe Sa Configuration on page 97 N C inputs ATZ2R 16 Inputs ATZ 3R 16 Inputs Communication IP Address 0 0 0 0 DNS Selecting the Door Reader and Keypad Configuration Port Number 10001 From the Controller Properties window select the Configuration tab ao aae Notice that when you click the Configuration tab a Reader and a Keypad Controller time out 05000 ms Log Com Failure I drop down list appears for each door Use these fields to configure the Controller response delay 000 ms Fast Event Request controller to function with the readers and or keypads connected to the control
160. der the Tilt Pan and Zoom headings are unavailable If you do not want to use a preset definition select None and use the radio buttons under the Tilt Pan and Zoom headings to select the tilt pan and zoom commands you wish to send to the video switcher s camera selected in the next step M Custom Command m 4 From the Select Camera drop down list select which camera will be activated when the selected event occurs 5 From the Select Monitor drop down list select which monitor will be activated when the selected event occurs 6 Click OK Deleting a CCTV Command Right click the desired CCTV Command from the CCTV Commands branch in the Database Tree View window and select Delete from the drop down list You can also select the desired CCTV Command from the CCTV Commands branch in the Database Tree View window and press the keyboard Delete key A dialogue box appears requesting confirmation Manufacturing Access Control Since 1985 r a i Lp REFERENCE MANUAL Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control ar INTEGRATED ACCESS CONTROL Chapter 21 Assets What Will I Find Adding an Asset PC piwe eek See E ess Gaus eels eed ee oe Sea ee et heh oe tase es ioe et eaten seu yeeee eee a eee 196 MOANING AM ASSCl ou toce0 Gehat eas bee Bee r on Ed eee Ghee ete eee Ae oleh ee hes ee de See eae 196 DEICUNG ANNSCCE kkios E Er E daar ee e
161. dress in the Computer text field Select the desired language from the Language list 3 The FrontDesk User Management window appears In the Site list select the site whose users you want to view or modify Manufacturing Access Control Since 1985 Using FrontDesk After starting FrontDesk all actions are performed using the icon toolbar at the top of the FrontDesk window For more information on the settings available in these tabs refer to General User Properties on page 47 From the Database Tree View window of FrontDesk select a site to access its users user groups and unassigned cards The Database Tree View window of FrontDesk offers the same user card management as the Database Tree View window of the Administration Console To modify a user or a user group select it from the list and apply changes as required See Modifying a User on page 47 for more information Users and Cards are sorted according to the site settings refer to Selecting the User Ordering criteria on page 36 Buttons Add a New User To create a new user click the Add button program the users settings and click the Save button W Delete the current user LICL e ro Eie a SE bes i iF Lees 15 6 A Umea Ce Z Save Delete Add To delete the currently selected user click the Delete button Save the changes made to the current user To save any changes made to the
162. e a Group Allows the selection of the group the visitor belongs to Refer to Groups on page 171 for more information Location The Location field is used to indicate or change the global anti passback status of a visitor In Out or Unknown All visitor s location is set to Unknown after a reset of the anti passback Refer to Controller Anti passback Settings on page 96 for more information Status Indicates the status of the visitor Signed In or Signed Out Scheduled Departure Activates the departure time fields Manufacturing Access Control Since 1985 REF Arrival Time and Departure Time Use the Arrival Time and Departure Time drop down lists to select the date and time the visitor arrives on site and the date and time the visitor expires When the visitor time expires the visitor s complete line under visitor status will become highlighted in red Text 1 Use the Text 1 field to display one of the custom fields see Custom Fields on page 69 that you would like to see in the general section of the visitor properties window Once selected the field name Text 1 will be replaced by the selected field name it content will appear at the right Personal Information From the Visitor Properties window select the Personal Information tab and use these fields to record any personal information about the visitor Panona infomation Custom Reidy Badge Cords Door Access Aghia Leet Acce
163. e 130 the user will have to type the P I N Personal Identification Number recorded in the P I N text box on the system keypad The P I N can be from four to eight digits in length and each digit can be any numerical value from zero to nine The P I N length is also a function of the keypad hardware being used If desired Centaur can automatically generate a unique P I N for you To do so click the drop down arrow to the right of the P I N text field and select the desired P I N length Use Keypad This option is used when a user presents their card to a reader that is accompanied by a keypad on the same side of the door If the Use Keypad check box is selected the user will have to enter a P I N see page 130 on the keypad after presenting their card to the reader before being granted access Card Traced Track a user s movements by generating a Card Traced event in addition to the Access Granted or Access Denied event every time the card is used To enable this feature select the Card Traced check box You can use Centaur s report generation feature to generate a report of all the Card Traced events The Card Traced event can also be used to activate a device such as a relay The relay can be connected to a signalling device warning the operator that a card with the Card Traced feature enabled has been presented to a reader For more information refer to Events on page 161 Extended Access When a user is granted access
164. e eee ee ee eae eae Be REE eee ee eee eee 197 Each asset can be defined using a name and a picture and then be assigned to a user Manufacturing Access Control Since 1985 REF Adding an Asset In the Database Tree View window right click Assets from the desired Site branch and click New Asset You can also select Assets and press the keyboard Insert key The asset properties window will appear allowing you to configure the asset properties See Modifying an Asset for more information Modifying an Asset From the desired Site branch in the Database Tree View window right click the asset you wish to modify and click Properties from the drop down list You can also select the desired asset and press the keyboard Enter key Asset Properties Asset Properties Asset Details Photo Asset 2 Name jassetO020 C0 C t H Owner Not Assigned i Name In the asset Name text field type the desired asset name We recommend using a name that is representative of the asset Owner Indicates either the name of the owner of this asset or Not Assigned when the asset is not assigned To assign an asset to a user visitor refer to Assets on page 58 Notes Use the Notes text field in the Asset tab to record any additional notes that may be required Also refer to Typing Names and Notes on page 23 Details This tab is not supported Manufacturing Access Control Since 1985
165. e files Manufacturing Access Control Since 1985 REF What are the Centaur Databases Before starting you need to understand how the Centaur databases are used and what information is saved in them These databases are attached to the SQL Server application used by Centaur Whenever something is programmed or an event occurs in the system the information is downloaded to the SQL Server and saved in the Main and or Event databases The Main and Event databases are saved on your hard drive in the following default path C Program Files CDV Americas Centaur Centaur Server Data while the Pro Report and Tracker databases are save in the path c Program Files Microsoft SQL ServerMSSQL Data Only databases currently used by SQL and Centaur will be saved in the above mentioned directory path The backup files can be saved wherever you wish Main Database The Main database Centaur3Main contains all the system characteristics of the Centaur software i e sites controllers schedules cards etc The more sites cards and controllers you have programmed the bigger this file will be Event Database The Event database Centaur3Events contains all events that have occurred in the system i e Access Granted Door Forced alarms etc For more information on how you can manage the size of the Event database please refer to Limiting the Event Database s Size on page 234 Also refer to Disk on page 164 Pro Report
166. e number of times a card can access this door is limited by the time defined in the card properties window refer to Enable Counter on page 130 Bioscrypt When the Bioscrypt check box is selected the use of biometric Bioscrypt L1 technology reader is allowed Click on the Setup button to select the Bioscrypt reader Enter the IP address of the Bioscrypt reader or click Find to select from the detected list The Serial Number Unit Type and Wiegand Format of the selected Bioscrypt are displayed Teleaccess Intercom When the Teleaccess Intercom check box is selected the use of teleaccess intercom is allowed Manufacturing Access Control Since 1985 gt F Ga REFERENCE MANUAL Setting the Door Timers Under the Timings heading you can set four different door timers as detailed below Unlock Time In the Unlock time text field enter a value between 001 and 999 seconds Default 5 seconds This value represents the amount of time the door will remain unlocked when an Access Granted or Unlock event is generated from the door The door will only remain unlocked for the entire Unlock Time if the Door Input Relock schedule and REX Input Relock schedule are disabled or if no door input has been programmed For more information refer to Door Inputs and Outputs on page 113 Pre alarm Time Before generating an Open Too Long event see Open Too Long on page 112 the controller can be programmed to gen
167. e schedule s periods see Schedule Periods on page 81 select the Hol1 Hol2 Hol3 and Hol4 check boxes to assign any of the site holiday groups to one or more periods within the schedule For more information on holidays refer to Creating a Holiday and Assigning it to a Holiday Group on page 77 Holiday groups function as follows e When you clear a holiday group check box the schedule s period is invalid during holidays assigned to that holiday group e When you select a holiday group check box the schedule s period is valid between its start and end time on any holidays assigned to that holiday group even if the holiday falls on a day that is not enabled in the schedule s period e To create a different start and end time period for holidays only a holiday schedule assign the holiday group to a separate new period Set the start and end time but do not select any of the day check boxes Sun to Sat Deleting a Schedule To delete an existing schedule right click the schedule from the Schedules and click Delete You can also click the desired schedule from the Schedules and press the keyboard Delete key A dialogue box will appear requesting confirmation You cannot delete the default Always and Never schedules You cannot delete a schedule assigned used in other parts of the system such as access levels door schedules etc Manufacturing Access Control Since 1985 r ao Ha REFERENCE MANUAL Ma
168. e set to Fast Selecting the Site Communication Schedule A site can be programmed to automatically communicate with the controllers go online according to a schedule When the schedule becomes valid the Centaur Server computer will automatically connect with the site until the schedule expires Click the Schedule drop down list and select the desired schedule from the list For more information refer to Schedule Periods on page 81 Assigning COM Ports to Controller Addresses Each site can support up to 256 controllers Enterprise edition The 256 controllers are divided into four controller loops of up to 64 controllers each Each of these loops must be assigned to a specific COM port e From the COM Port 1 CTL 1 64 list select a COM port Controllers connected to the selected COM port will be assigned addresses 1 to 64 controller s DIP switch setting e From the COM Port 2 CTL 65 128 list select a COM port Controllers connected to the selected COM port will be assigned addresses 65 to 128 controller s DIP switch setting 64 e From the COM Port 3 CTL 129 192 list select a COM port Controllers connected to the selected COM port will be assigned addresses 129 to 192 controller s DIP switch setting 128 e From the COM Port 4 CTL 193 256 list select a COM port Controllers connected to the selected COM port will be assigned addresses 193 to 256 controller s DIP switch setting 192 Refer to Viewing the
169. e under Windows 9 Sign Out Reader 111 Site Configuration Wizard 26 Site Name 26 Site Programming 25 Site Properties Cards Tab 35 Communications Tab 29 Site Tab 29 Size of Event Database 234 Software Modules 13 189 Speed 33 SpxDBase see Database Management Module 231 Start Check Point 180 Start Date 48 131 Start Round 224 Start Time 82 Starting Centaur s wav Player 242 Starting Centaur s Card Management feature 62 Starting the Centaur Software 11 Starting the Database Managment Module 237 State Relays 141 Status 23 Status Bar 17 23 Status Options 211 Status Cards 137 Status Controllers 227 Status Global Parking 226 Status Input 752 Status Inputs 222 Status Output 759 223 Status Video 225 r ao Ha REFERENCE MANUAL Stolen Cards 131 System Operator 23 T TCP IP 32 Teleaccess Intercom 111 Telephone Number 34 Temporary 48 Text Colour 173 This input activates relay 157 This input bypasses input 149 Time and Attendance 177 Time Out Poll 95 Time Update Controller 101 Timed Event Definition 164 Timed Activation Schedule 139 Timed Relay Activation Manually 220 Timeout 273 Time Out Controller 95 Timers Delay Before Relay Activation 140 Extended Access 113 Open Too Long 112 Pre alarm 112 Relay Activation 140 Unlock 112 Toolbar 17 19 Trace Cards 130 Tracker LCD Display Option 97 Tracket Time amp Attendance 190 Truncating Events 234 Two Card Rule 109 Type 29 179 Type and Seri
170. ed 27 Click OK Manufacturing Access Control Since 1985 REFERENCE MANUAL UR 5 1 E figuration DCOM Configuration for Windows 2003 Server To be able to configure the DCOM on Windows 2003 operating system you have to be logged in as Administrator Verifying DCOM Before going on with the DCOM configuration you can perform the following steps to verify the integrity of your DCOM 1 From the taskbar click Start gt Run The Run window will appear Enter dcomcnfg exe in the text box and click OK 2 The Component Services window will appear Within the Console Root folder left side of your screen expand the Component Services branch the Computers branch and the My Computer branch Ensure that the Running Processes folder appears in the My Computer branch If it does not appear you must repair DCOM If your DCOM configuration is found corrupted then follow the steps in Reparing DCOM on page 283 if not go directly to Setting the Firewall on page 285 3 Click the COM Applications branch The components of this branch will appear on the right of your screen If you get an error message and or cannot access this branch of components you must repair DCOM If your DCOM configuration is found corrupted then follow the steps in Reparing DCOM on page 283 if not go directly to Setting the Firewall on page 285 Type the name of a program Polder document or Theoret reece
171. ed Events icon right click the desired event in the Real Time Events Status window and click View Comments Manufacturing Access Control Since 1985 REF E Mail Activation After selecting an event as described in Event Definition Overview on page 162 click the E Mail tab in the event s properties window to program the E Mail settings for that event Enabling Sending E Mail for an Event Select the Send E Mail check box to send E Mail whenever the selected event occurs When selected all fields become available Selecting the E Mail Schedule for an Event Access denied Card expired Settings for Defaut Card Holders Default Front Door Frank Smith Default Company Production Entrance John Cole Default Company ORD General Alarms E Mail video Macro amp Headcount Send E Mail schedule To Ce Bce Message Select the schedule from the Schedule drop down list which determines when Centaur can send the programmed E Mail If the selected schedule is not valid when the event occurs Centaur does not send the associated E Mail The Schedule list is only available if the Send E Mail check box is selected For more information on schedules see Schedules on page 79 Typing the Operator E Mail Addresse s In the To Cc and Bcc text fields type the E Mail address es of the user s that you wish to send the E Mail to Only one E mail address per field is supported
172. ed by default in C Program Files CDV Americas Centaur Centaur Server and then click OK 8 The Windows Firewall settings window will re appear From the Exceptions tab make sure that the spxsvr exe checkbox below the Programs or Port heading is check 9 From the Exceptions tab click Add Program Manufacturing Access Control Since 1985 Judd a Program detest the progiam you want to adel or cick Grover to Gel one that H not kaind and hon chet CK Exceptions control how programs communicate through Windows Firewall Add a program or port exception to allow communications through the firewall Windows Firewall is currently using settings for the domain network location What are the risks of unblocking a program To enable an exception select its check bow Program or port Cl Remote Event Log Management C Remote Scheduled Tasks Management C Remote Service Management Cl Remote Volume Management C Routing and Remote Access C Secure Socket Tunneling Protocol LI SNMP Trap T O Windows Collaboration Computer Name Registration Service O Windows Firewall Remote Management C Windows Management Instrumentation WMI F ae eee IM Notify me when Windows Firewall blocks a new program REFERENCE MANUAL UR 5 1 E figuration 10 The Add a Program window will appear Click Browse and select the sqlsevr exe file located
173. edgement scccdsiecainceadsswcdinataeetiadanduvsanctinssaudsudendgund tacoma daa duiiwaahenivanavanecisiieeiuedaiinseianiiiduiantausiatabenldeinaaenadganudncsaauas 166 Event Activated Vid o COMMMO sccicssccecvecessavecezencideccneyaxede sce vecsndawesisitadaseneenveeuase dense ocsausee cca desasseueacecneeeeteveusvasvavenesseeatverexeieese 169 Macro amp HEACCOUNL GE 170 PS east aaa earned occa ca cetera ge ape a wwe tases twa EEEE AEEA E E TSE 171 I eat PS ONS Faces E A E E E E E meted eee A E 172 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control Adding a TOU een amen ere et ee E E ee ee E ee ee oe ee eee 172 LOTO LLALA i i100 0 o nett eee 173 Adding Details and Assigning Users to Company and Department Group ccccceccceeceeeeeeeeseeeeeeeeseeeeeeeeeeseeessaeeeeeeaaeeeeeeeaees 175 Dolcung a OrOUD sere eE a EA E ere eee eee eee 175 Manual Control of Door and Relay Groups ccccssccccccceseecceeeecececesececseuseeeecseseeessuseeeessaueeeesseeeeeessaseeessaeeeesseusesesseeseeessass 176 Guard TOUT soeken tecctdecceneasen ences aasecacc biases E E E a see saeees 177 Adding B 221m 76 2 e 0 f aoee iier E E E E ner ee E E OA eee eee 178 Modifying a Data Collector sc ccccscsseroceyecnsctee neacnncseenebces extdaqtinndesdeenbheddsdaeckonagiientd netabbeitsebiameted bacdeGdabhtedaenisddesebaonenebensboadwetheeanaiaetSees 178 Adding Check POINTS sccetec ce cccescszsec
174. ee cent eee 59 Modiiying a User Group ee ect se sneecect te nec in S a EE EE aes ana eaoin EN semen a ar iei 59 Deleting a User GrOUD sorusrssisieianineri ie ie ena E Eia aE EOE a C E eE EEOSE iai 61 FPrONDOS E ae E E E A EE 62 VISITORS AND VISITOR GROUPS cic aercecpts reste esieteec nese atocene nares ecrcantanceaevcoteaainacocenadnnascanseccneasasworasuanance enteedaren sane eanuaneoeseaeneutovens 65 PIU SIRO er aR taeastas casey ueie taxa o iui deauden cae cesuneietaenasesdatucusanessiic sured san A E 66 ModIA SUC cca ech a sc cere ree we ne Sg eam see ncn ee veces ark et angie mete a cece screen ee se eect ga 67 Biin eke VISION aiiecansepaccncecassatsidaccmanapnsanadie tenia E E T A E E E E E TT 72 PAT a Batts 10 ag 010 e eee er eo nee ae am oP ne vee ae eee ee ee eee ee ee eee eer ene eee 72 Modifying a VISHOF GOUD cccscisccevstechcoscandiscres cozcgecscheoindaqesdeocseenteneoscudbeteeoniasetelenenid datececsebanenats ewbandoadaiindeuwaientad dase bedabindedeentahtebess 72 STS Tie VISTEON NOU sessen a ooaess wean eases tt et cates aa ea a a a i ae ees 74 PLO EAD AVS prea onein O E scaniaigocessviedtesantnsstdocerewsesasteuuswabeudoesiemeuadinencenvegoest 75 AGANI A TIONG e E E E E E sided nineailitncanian ugunaeusetpalndnteseaniedeenaiel 76 Modin aT OM sssr esee EE E E E E E Dene eais ose see e nec eee eee 76 Deleting a Holiday xacisunacesecaneneveceanssuaaarnsanssandessanaeheshaaandndadicsaedsenes cate aetetan ies tarauenewsaishanaennsalersimaa
175. ee kee eee eee secede here ee 147 Deleting an Input te econ te ae oc See amp aye oe a Ss9h ah eam em epee Ok a eas ee ae ee ee eh Eee ee Se 152 Display Input Status and Manual Controls 0 0 ee ne eee ee eens 152 Each controller includes eight inputs which can be connected using ATZ Zone Doubling to monitor up to 16 input devices Each controller also supports up to three 2 Door Expansion Modules CA A470 A which provide an additional 4 inputs each Therefore each controller can monitor the state of up to 28 inputs Typically the inputs are used to monitor and control the status of door contacts and request for exit devices installed on the controlled door The inputs can be programmed to follow a schedule or to activate relays and or bypass other inputs when triggered For additional information on how inputs can be used refer to Door Inputs and Outputs on page 113 Manufacturing Access Control Since 1985 REFERENCE MANUAL WUR 5 1 Connecting Inputs Each controller and its assigned 2 Door Expansion Modules can monitor the state of up to 28 inputs such as magnetic contacts motion detectors temperature sensors or other devices Inputs can be installed to a maximum distance of 1000m 3300ft from the controller when using AWG 22 wire The controller and its assigned 2 Door Expansion Modules can only use one of the following input connection methods NC Input Connection When this option is selected see S
176. eee teeta teededateedeateeeest poate seeee cease hese E 155 Deleting an Output 1 ee eee eee ee een e eee eee teens 159 Display Output Status and Manual Controls Each controller includes six multi function outputs Each controller also supports up to three 2 Door Expansion Modules CA A470 A which provide an additional 6 outputs each Therefore each controller can monitor the state of up to 24 outputs Typically the controller s outputs are used to control the built in LEDs and buzzers of the card readers and keypads in the system For example a red green indicator on the reader will inform the user that access has been granted changes from red to green or the reader buzzer will inform the card user that the door has been left open or the door has been forced open You can individually program each output to follow a specific event as well as determine whether the output will be timed pulsed or latched Manufacturing Access Control Since 1985 REF Overview of Output Programming Each controller includes six on board multi purpose outputs and each door can be assigned to activate one or more of these outputs Each controller also supports up to three 2 Door Expansion Modules CA A470 A which provide an additional 6 outputs each Figure 30 Overview of Output Programming Centaur All Events File View Options Modules Help l JB Iv AEA amp A ob f Door General Inputs and Outputs Users Elevator Control r
177. emnawadia ate seael cy anicioeaciuewsiennedentosenyiae Tf SCHEDULE S Steere ene ene nee cee ee a eee E ee ee ee eee S 79 AANO a o o 216 0 gt Samenmeee teen nreMres tenn A ee eee ene ee eee ene eee 80 Modi as Bee dem NCO UE ae ee ree eee a nner ne eee ee a ee ee ee en eee ee eee 80 SISTING SC ae sce hata eh are E E E E A E assesses sscenencensesaetscesecacneeaentess 83 CONIROLLERS orones ine E neat S E EE EEE A E cen EE EEA E 85 PAGING COMM ONC S arcs a a a A E O E E E E a A a 86 Modifying Ee Controller ccccccccsseccccsesececceeueececseseecceusececsceaeeeecsuueecesaueeeeeseseeessaueeeecsasseuseeesseuseeeessuecesssaueeeessauseeessuaeseesssneees 88 Manufacturing Access Control Since 1985 r ao Ha REFERENCE MANUAL Delen A CONTO seyrede mre ee EE EEA Oe ee iie E EE eee eee ee 98 Online Controller Firmware Upgrades ccccccseccccceeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeseeeeeeeseeeeeeseaeeeeeeseeeeeesseeeeeesaaaeeeesseeeeessegeeeessgaeees 99 DONO E E E E anne avd cease tieusit teeeviaineudantenIecedatncsliuvei vans a tanaentuvinteeiods 100 Other Controller Management Options ccceececcccessseecceueeececeueececauececeseueeeecaueuseeeceaseeecsuaaeeeesecsseuueeeesssecesssaaeeeessuseeessaaaess 101 DOORS aiiai ane ete EE E ian ce aamekeueieaseennety E 103 AONO DOOS meetai pitta vararorainenansa scence nauhebduaitpeaieh ons edaindeitsnataehondasasans saute A E A E E 104 PVCU Ne OCI aee a E E E E E E E A teok
178. en Windom Frewall blocks a poogen Hh ripe i ang Y 6 From the Exceptions tab click Add Program Add a Program 7 The Add a Program window will appear Click Browse and select sects progam orc Bom spore oe Se the spxsvr exe file located by default in C Program Files CDV aa Americas Centaur Centaur Server and click OK Ay a PQBoot for Windows amp Pro Report 8 The Windows Firewall window will re appear From the Exceptions aaa Player tab make sure that the spxsvr exe check box below the Programs and Services heading is selected 9 From the Exceptions tab click Add Program 3 EN Spider Solitaire P spxSwr exe m Stats Reader 2 1 Manufacturing Access Control Since 1985 10 The Add a Program window will appear Click Browse and select the sqlsevr exe file located by default in C Program Files Microsoft SQL ServerMSSQL Binn and click OK 11 The Windows Firewall window will re appear From the Exceptions tab make sure that the sqlsevr exe check box below the Programs and Services heading is selected 12 Click OK Add a Program To allow communications with a program by adding it to the Exceptions list select the program or click Browse to search for one that is not listed Programs PQBoot i PQBoot for Windows Pro Report Ci QuickTime Player Quick Tour ETE Set Configuration B Skype ia Solitaire A SoloBug amp Spider Solitaire mii sqlservr exe z BALES
179. en to Use the Download Function e When you update the controller firmware see Online Controller Firmware Upgrades on page 99 the controller memory will be erased The Centaur database is automatically downloaded after the firmware update e You can do the following when the Enable Offline Buffering Outbox check box is not selected refer to Enabling Offline Buffering Outbox on page 35 e If you wish to program any items without connecting to the site you must download the system characteristics to the controllers the next time you connect e If you wish to download a particular characteristic to a specific controller in a site program the desired characteristic without connecting then connect and download to the desired controller Downloading to One Controllers 1 To download to one controller in a site from the desired Site right click a controller from the Controllers list 2 From the drop down list select Download 3 Click All or only the specific programming item you wish to download i e doors Please note that download time depends on the size of the database Downloading 20 cards will take less time than 3 500 cards Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Controllers Other Controller Management Options The following controller management options are also available when you right click a controller within the Controllers of a desired site Updating the Cont
180. end that you keep a log of what settings were changed and when they were changed Also refer to Typing Names and Notes on page 23 Manufacturing Access Control Since 1985 Door Settings REFERENCE MANUAL CENTAUR 5 1 Doors oa Each controller includes 2 reader and or 2 keypad inputs which can monitor the state of up to 2 doors Each controller also supports up to three 2 Door Expansion Modules CA A470 A which provide an additional 2 reader and or 2 keypad inputs each Therefore each controller can monitor the state of up to 8 doors The term door refers to any access point controlled by a reader and or keypad such as a door turnstile gate cabinet etc To control entry and exit to an access point a reader and or keypad can be used on both sides of the door This also provides the ability to set up Interlock mantrap or Anti passback applications Centaur enables you to define a specific configuration for each door as well as set the door s various timers Door Type Depending on the hardware configuration being used for the selected door you must select the appropriate door type for the selected door From the Door Properties window select the General tab From the Door Type drop down list select the required door type Access Select the Access door type if you plan to use the controlled entry one reader access configuration This means the reader will be located on one side of a door wi
181. ep on all events check box under the Events heading is selected your computer will beep every time an event appears in the Real Time Events Status window Make a Beep on All Access Events When the Make a beep on all Access events check box is selected your computer will beep every time an Access event appears in the Real Time Events Status window Access events consist of any event generated that is linked to the status of the doors in the system such as Access Granted and Access Denied Make a Beep on All Abnormal Events When the Make a beep on all Abnormal events check box is selected your computer will beep every time an abnormal event appears in the Real Time Events Status window Abnormal events consist of any event generated that is uncommon to normal site operation such as Door Left Open Door Forced Open Relay Activated by Operator and any troubles Update events every This option determines at what intervals the Centaur integrated access control software will refresh the Real Time Events Status window From the Update events every drop down list select the desired interval of time Setting the Event Status Refresh Rate This option determines at what intervals the Centaur integrated access control software will refresh the Real Time Events Status window when displaying the status of devices in the system such as doors and controllers For information on displaying the status of devices in the syste
182. er Group streset vee s seks cae eee aner ede E ea Es dbenede ce eee Sees ese ee ee we decent eee eee eee seen ee 59 Deleting a User Group 1 ee ee ee eee eee ene eee teen n eens 61 PONDO R ee tae ace cee ee ee Pe Re Eos eas eee thee Geese wee as eneaaeee 62 Programming a user allows you to define the details pertaining to the user Any individual that needs to access a door must be defined in the system as a user Once defined a card can be assigned to a user Manufacturing Access Control Since 1985 r a HL REFERENCE MANUAL UR 5 1 User Groups Adding Users In the Database Tree View window right click Users from the desired Site branch and click New User You can also select Users and press the keyboard Insert key The user properties window will appear allowing you to configure the user properties Refer to Modifying a User on page 47 for more information Also refer to FrontDesk on page 62 Uber Paperrtiors Fintan fics Gap Last Marne Serath Lucite iie m l eee ceay kom e Derwen Deia Deane o Erda Jaik Deia Jobe r T es Personal Information Catam Finks Hedge Cards Doer Access Flights Lunt Acces Wakara Jerami Motes Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Users and User Groups Modifying a User From the desired Site branch in the Database Tree View window right click the user you wish to modif
183. er and protocol consult the documentation for the program or What are the risks of opening a port 5 The Windows Firewall settings window will re appear From the Exceptions tab make sure that the DCOM checkbox below the Program or port section is check Exceptions control how programs communicate through Windows Firewall Add a oe i r t exception to allow communications thr the firewall If you are configuring repairing the firewall settings on a PE ee en workstation connected to the Centaur Server computer click OK Windows Firewall is currently using settings for the domain network location What are the risks of unblocking a program To enable an exception select its check bow If you are repairing your firewall settings on the Centaur Server computer go to the next step Program or port a LI BITS Peercaching C Connect to a Network Projector Core Networking O Distributed Transaction Coordinator File and Printer Sharing O SCSI Service C Media Center Extenders CI Netogon Service Network Discovery L Performance Logs and Alerts Cl Remote Administration ee eee nd on Notify me when Windows Firewall blocks a new program a Manufacturing Access Control Since 1985 7 REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration a 6 From the Exceptions tab click Add Program 7 The Add a Program window will appear Click Browse and select the spxsvr exe file locat
184. er the object names to select examples a Check Names Advanced Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration 24 Click on the Check Names button to validate the name of the group and click OK Select this object type Users Groups or Other objects ua Select Users Contacts Computers or Groups _Dbject Types Er ori this location Locations Enter the object names to select EN amp les Centaur Group Check Names 25 Select the four check boxes in the zjx Permisions for Centaur window and click OK Advanced Security Pup er User NEES 8 Administrators TEST WAadrministrators EF Centaur TEST Centaur i INTERACTIVE Remove Permissions for Centaur Allow Deny Local Launch Remote Launch Local Activation Remote Activation Cancel Manufacturing Access Control Since 1985 REF figuration ape elas A a rail Atal 2 x n x change the Access Permisions section aprovr Prope s 2 x General Location Security Endpoints Identity Launch and Activation Permissions c Use Default eee eee eee eee Access Permissions 2 Use Default ene rrr er errr Configuration Permissions f Use Default C Customize Cancel 27 Inthe Select Users Contacts Computers or Groups window type the group s na
185. erate a pre alarm as a warning of the upcoming alarm In the Pre alarm time text field type a value between 001 and 999 seconds Default 45 seconds This value represents the amount of time a door can remain open after an Access Granted or Door Unlock event before generating a Door Left Open event The Pre alarm time should always be less than the Open too long time see Figure 15 The controller can also be programmed to activate an output when a Door Left Open event is generated see Outputs on page 153 Open Too Long In the Open too long text field enter a value between 1 and 999 seconds Default 60 seconds This value represents the amount of time a door can remain open after an Access Granted or Door Unlock event before generating a Door Open Too Long event see Figure 15 The controller can also be programmed to activate an output when a Door Open Too Long event is generated see Outputs on page 153 Also refer to Pre alarm Time on page 112 Figure 15 Example of Pre Alarm and Open Too Long Timers l Door is still open After 60 seconds the Door is opened after 45 seconds door has never closed 45 sec Timer stars Generate Door Left Generate Door Left Generate Door Open event Open event Open Too Long event Generate Input in Alarm event Pre alarm timer 45 seconds Open too long timer 60 seconds Manufacturing Access Control Since 1985 REFERENCE MANUA
186. eriod 4 Period 5 Period 6 Period 7 Period 8 Setting the Period Start and End Time When defining the schedule period see Schedule Periods on page 81 the Start and End text fields define when the schedule is valid The start and end times apply only to the selected days of the week Note that you must use the 24Hr clock to program the times i e 6 00PM 1800 If you want the period to be valid 24 hours a day type 0000 into the Start text field and 2400 into the End text field A Stat End SunMon Tue Wed Thu Fri Sat Holl Hol2 Hol3 Hol4 jor00 2100 I osoo 1300 foooo foooo r ooo0 foooo M 0000 M 0000 B ooo0 foooo M o000 foooo M U U a O a a The start and end time of a single period cannot cross over into another day You must use separate periods For example 23h 11 PM Sunday night to 7h AM Friday morning must be programmed as follows Period 1 Sunday 2300 to 2400 Period 2 Friday 0000 to 0700 Figure 8 Programming Crossover Periods Schedule Properties Schedule Details Period 4 Period 5 Period 6 Period 7 Period 8 Start End SunMon Tue Wed Thu Fri Sat Holl Hol2 Hol3 Hol4 Period 1 2300 2400 Period 2 0000 0700 Period 3 0000 0000 0o00 0000 0000 ooo 0000 ooo 0o00 foo00 0000 0000 seeeeeee U a a a a a Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Schedules Assigning Holiday Groups to a Schedule Period When defining th
187. erver Edition English French and Dutch Other software requirements available on the CD e DCOM e MDAC 2 8 e Microsoft Internet Explorer version 6 0 or higher e Acrobat Reader 6 0 or higher e XML 3 0 Parser Manufacturing Access Control Since 1985 REFERENCE MANUAL J R 5 1 ind Using Centaur Installing Updating the Administration Console Workstation This section describes how to install or update the Centaur Administration Console Workstation 1 Insert the Centaur 5 1 CD into the computer s CD ROM drive 2 Ifthe auto run feature is enabled go to the next step Otherwise click Run from the Start menu type the appropriate drive indicator x followed by setup exe or click Browse to search for the setup exe file Click OK 3 The Centaur Setup window will appear If this is a new installation of the Centaur software click Next and go to the step 4 To update previously installed Centaur software select Update click Next follow the on screen instructions and click Finish 4 The License Agreement window will appear To install the Centaur software select accept the terms of the license agreement and click Next 5 The Type of installation window will appear To install the Administration Console Workstation select System management only will not communicate with control panels Workstation only If you wish to select a different folder destination for the Centaur software click the appropriate
188. ess Control Since 1985 21 The SpxSvr Properties window will appear From the Authentication Level drop down list in the General tab click None Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration SpxSrr Properties 2 x General Location Security Endpoints Identity General properties of this DCOM application Application Name SpxSvr Application ID 4E2199032 D199 11D2 A6F9 001 054133541 Application Type Local Server Authentication Level l Local Path Cancel 22 Click the Security tab to configure the j E J user s that have s the right to access the babble SUSU 2 x Centaur Server computer EE REE rR EEN j General Location Security Endpoints Identity e Under Launch Permissions click Customize Launch and Activation Permissions e Under Access Permissions click Use Default Customize e Under Configuration Permissions rt click Use Default Access Permissions C Use Default Configuration Permissions f Use Default C Customize Edit Bile Velie iets nn Aue ae tooo 2x Computers or Groups window type the ni o a a _ a group s name you have created in the Select this object type Enter the Object Names to Select I Object Types Users Groups or Uther objects From this locations test Locations Ent
189. et 5 fo Text gt Text 5 City gt Text E Zip gt Text 7 gt Tet 8 o y Text T Fhone Mumber Text amp Cel Humber Tet 9 nn Text 10 fo Text 9 Fas Humber Text 10 Title gt Teel a Tei 12 o H Text 11 E mail Test 12 E mail 2 Date 1 Apii 2510 Date 2 April 25 10 Date 1 Hired On gt Date 2 Birth Date gt Date 3 April 25 10 r Date 4 April 25 10 ea Date 3 Date 3 gt Date 4 Date 4 gt r r Check 1 Check 2 TF1 Full Time gt TF 2 Day Shift gt A Check 3 I Check 4 T F 3 Night Shift gt T F 4 Contractor gt Cancel Manufacturing Access Control Since 1985 REF Visitors amp Parking The Visitors amp Parking tab allows to set the default site visitor sign out rules and i Site Properties parking capacity rules Site Comme Users Cards Custom Fields Visitor Options Visitors amp Parking Floors cctv CMPP Visitor Options Disable visitor s card s u pon departu re Disable visitor s card s upon departure l Unassign visitor s card s upon departure Visitor s cards will be denied access upon departure Visitor s cards must be re enabled to grant access upon the next sign in The card remains with the visitor Require signature upon departure Default Host when he leaves lUnassigned sts Unassign visitor s card s upon departure ao Activate Parking Counter Visitor s cards will become available to new visitors A card mu
190. etting the Controller Input Configuration on page 93 the controller will generate an alarm condition when the state of an input is toggled opened This set up will not support tamper or wire fault short circuit recognition Connect one device to each input For address assignment of the 2 Door Expansion Module s inputs refer to Viewing the Input Address on page 147 Figure 24 N C Input Connection Methods NC CONNECTIONS FOR NC CONNECTIONS FOR CT V900 A CONTROLLER CA A470 A Controller 2 Door Exp Address 1 Inputs Inputs Z1 2 Fa COM COM i Z3 7 Addrose J z3 COM 766 24 COM El B Address 9 29 10 COM 211 12 12 14 COM 215 16 Manufacturing Access Control Since 1985 j REFERENCE MANUAL CENTAUR 5 1 Inputs ATZ 2R Connection When this option is selected see Setting the Controller Input Configuration on page 93 the controller will generate an alarm condition when the state of an input is toggled opened An alarm condition will also be generated when a cut in the line occurs but will not recognize a wire fault short circuit Connect two devices to each controller s input but only one device to each 2 Door Expansion Module s input For address assignment of the 2 Door Expansion Module s inputs refer to Viewing the Input Address on page 147 Figure 25 ATZ 2R Input Connection Method ATZ 2R CONNECTIONS FOR CT V900 A CONTROLLER Address 1 Address 2 Controller 1K Ohm 22K Ohm
191. evels in the selected site will appear Select Visitor Group Properties IW Apply access levels to the members of the group the access level s you wish to assign to the visitor group This will determine which cove doors in the site the visitors of this group will have access to and during which time vic m periods each door can be accessed For more information refer to Access Levels on page 121 If two or more access levels are assigned to a visitor group access is AccessLevel3 None x granted as long as one of the defined access levels is valid Access Level 4 None Options When the Apply visitor options to the members of the group check box is selected the following parameters will apply to all users part of the visitor group Visitor Group Properties Visitor Group Default Access Levels Options Parking Visitors Disable visitor s card s upon departure M Apply visitor options to the members the group Visitor s cards will be denied access upon departure Visitor s cards must be re Disable visitor s card s upon departure enabled to grant access upon the next sign in The card remains with the visitor Unassign visitor s card s upon departure when he leaves Require signature upon departure Default Host Unassign visitor s card s upon departure Visitor s cards will become available to new visitors A card must be assigned at next sign in The card is returned to the host or security guar
192. event Perform the following to set up a REX input 1 A vertical motion detector must be installed above the door and it must be connected to an input on the controller refer to the appropriate controller s Installation Manual The input must be programmed as detailed in Inputs on page 143 Under the REX Input heading select the desired input from the Input drop down list From the Schedule drop down list under the REX Input heading select the schedule which will define when the REX can be used Select a relock option from the Relock drop down list under the REX Input heading After a valid Request for Exit access the control panel can relock the door as soon as it opens Door opening when the door closes Door closing or if you select Disabled it will relock when the Unlock Time has elapsed see Unlock Time on page 112 Also refer to Lock Control on page 110 Select the Unlock on REX Normal check box if you wish the controller to unlock the door when the controller receives a valid Request for Exit the door must be closed and locked To unlock the door regardless of its current status i e Door forced Door open too long etc select the Unlock on Rex Regardless of Door Status check box Assigning an Interlock Input This feature allows you to set up the doors for use with Interlock Mantrap applications A mantrap consists of two doors each controlled by a card reader and or keypad When one o
193. ew Options Modules Help JE JB 1E W E amp 4 b P sitet Ja oga pideen AE centaur 2 sites John Doe NjA Default Company Test 9 20 2008 6 39 50 PM NJA SB Site 1 siJohn Smith N a Da T E QS0 2008 7 21 50 PM NjA i Users 1 View Current Visit Details rt Sign Qut f Test f Visitors 2 Properties lf John Doe l col John Smith GP Unassigned Card ie Access Levels 2 ae Schedules 2 Al 2 Saril 2 Alarm Mame Instructions Description Field Time _ ontrollers w f Events ke Macro a Groups ey Security Levels iz cP Permissions 2 a Operators 1 COTY Commands 1 Reo kina ce tt Manufacturing Access Control Since 1985 Displaying Global Parking Status When you click on the Display Global Parking Status icon from the menu bar Centaur will display the list of sites and user groups that have the Parking Counter option enabled If you wish to manually allocate or free parking spaces right click the desired site user group s name A drop down list will appear Select one of the following actions from the list Allocate Parking Space Allocates parking for a specific user for a specific period Select a user from the list and select the allowed parking period date and time Click OK to confirm Allocate Parking Space Group Site 1 Date Time fio 5 2008 09 55PM Reset Parking Count for Selected Group P OK Cancel Resets the parking
194. f the two doors is open or unlock it is impossible to open the other door until both doors are closed Please note that the selected doors must be from the same controller An interlock input is required if the door will be used in a mantrap configuration or to generate Access Denied Interlock Active and Interlock Enabled Disabled by Schedule events A The Interlock Inputs feature cannot be used with doors located on a 2 Door Expansion Module doors 3 to 8 Only the controller s doors can use Interlock Inputs Perform these steps for each of the two doors being used in the mantrap configuration 1 Make sure the door inputs have been programmed see Assigning a Door Input on page 113 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Doors 2 From the Input drop down list under the Interlock Input heading select the same input that is assigned to the door input of the other door in the mantrap configuration 3 From the Schedule drop down list under the Interlock Input heading select the schedule which will define when the Interlock mantrap configuration can be used Notice how the input selected for the Interlock Input is the same input used for the opposite door s Door Input This is how the controller determines which two doors are used for the Interlock Mantrap application Door Properties Door Properties Door General Inputs and Outputs Users Elevator Cont
195. follows e Output 1 Access Granted for Door 1 green LED e Output 2 Access Denied for Door 1 red LED e Output 3 Access Granted for Door 2 green LED e Output 4 Access Denied for Door 2 red LED e Output 5 Beeper for Door 1 buzzer e Output 6 Beeper for Door 2 buzzer Setting the Output Activation Events You can program the output to activate upon the occurrence of one or more selected events After setting the activation events for all required outputs you must determine which outputs can be activated by each door see Assigning Outputs to a Door on page 115 For example if the Access Granted event is set to On for output 2 but output 2 has not been assigned to a door the output will never activate To set the output s activation events perform the following 1 From the Output Properties window select the Events tab 2 In the Events tab you will find 15 events which are described in the following sections Each event has a drop down list allowing you to select Off On or Flashing Select the desired setting for each event Output Properties Output Events Activation time a seconds 0 to 999 Inverted Anti passback status Flashing hd Wrong code on keypad Flashing hd Access granted or Door open or 7 latched Access denied Flashing Door forced open On V latched REX granted jor x Reader disabled lof x latched REX denied Flashing z Door open pre alarm
196. formation refer to Centaur s FrontGuard manual Locator Designed to function with the Global Anti Passback this allows you to monitor when users enter and exit designated doors in real time retrieve user information and print customizable user access reports For more information refer to Centaur s Locator online help WavePlayer This Centaur feature is designed to enable a wav file to be played on the computer when an event that requires acknowledgement occurs The sound can replay at programmed intervals until the alarm is acknowledged For more information refer to Centaur Wave Player on page 241 Pro Report This module features a user friendly wizard for generating system reports Generate quick one time pre defined and scheduled reports for up to 14 different report types You can also search group and sort your reports For more information refer to Centaur s Pro Report online help FrontView The real time graphic interface gives you point and click control over doors relays inputs outputs and controllers through a graphical floor plan For more information refer to Centaur s FrontView manual Diagnostic Tool The Diagnostic Tool allows you to view your system information to ensure all of the components required to run the Centaur software have been installed Within the Diagnostic Tool s menu you may save or copy your system information to a specific folder on your computer or send it
197. g a Relay To delete an existing relay right click the relay from the appropriate controller s branch in the Database Tree View window and click Delete from the list You can also select the desired relay and press the keyboard Delete key A dialogue box will appear requesting confirmation Display Relay Status and Manual Controls When you click on the Relay Status icon from the tool bar Centaur will display the current live status of the relays in the system If you wish to manually change the status of a relay right click the desired relay You can also use the Shift or Ctrl keys to select multiple relays if you wish to modify several relays in the same manner at once and then right click on any of the selected relays A drop down list will appear Select one of the actions from the list For more information refer to Displaying and Controlling the Status of a Relay on page 220 Manufacturing Access Control Since 1985 r ao Ha REFERENCE MANUAL Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control ar INTEGRATED ACCESS CONTROL Chapter 14 Inputs What Will Find COMNCCUNO INDUS 4222 4ceetteenct feet ecedes coe gc ota e heheh ote ot oe Meee tote eet Je eu eeos bees bee 144 POCO S294 Catan oka Oe ROOK doe MRE eRe Ree Rol PE ee Adee he ee sata eeedeanerawesad 147 MOCIVING Gn WNOUUeent sete ou etet ea he ks ehaseernee eee eaee sacecaeeea sheesh eee
198. g describe how you can remotely control a group of doors or relays Lock or Unlock a Door Group To lock or unlock all doors in a door group expand the Door Groups branch within the Database Tree View window right click the desired door group and select the desired Lock Door Group or Unlock Door Group command from the drop down list For more information on the available commands refer to Displaying and Controlling the Status of a Door on page 219 Enable or Disable a Door Group To enable or disable a door group expand the Door Groups branch within the Database Tree View window right click the desired door group and select the desired Enable Door Group or Disable Door Group command from the drop down list When enabled the door group functions normally When disabled the door group will be deactivated and will not be recognized by the system Activate or Deactivate a Relay Group To activate or deactivate all relays in a relay group expand the Relay Groups branch within the Database Tree View window right click the desired relay group and select the desired Activate Relay Group or Deactivate Relay Group command from the drop down list When activated each relay in the selected relay group will activate for the period specified by the relay s activation timer see Setting the Relay Activation Timer on page 140 Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control ar
199. g the Video Switcher Protocol for an Event From the Protocol list select the protocol used by the video switcher connected to the computer s COM port refer to Site CCTV Port Settings on page 40 The Protocol list is only available if the Send ASCII Command check box is selected Link to DVR Allows the use of a DVR video when the event occurs A camera icon will appear in front of the DVR event in the Real Time Events Status Window DVR Name Select a DVR from the list you want to associate to the event Refer to Adding a DVR on page 200 to add new DVR in the list Channel Select the DVR camera channel from the list you want to associate to the event Manufacturing Access Control Since 1985 REF Display Video Before and After Event Time Allows to view up to 60 seconds of video preceding and following the event When an event occurs the video associated to the event will contain a video length corresponding to the configured duration before and after the event Macro amp Headcount After selecting an event as z f a D ccess arante described in Event Definition Overview on page 162 click the Settings for Defaut Card Holders Default General Alarms E Mail Video Macro amp Headcount Macro amp Headcount tab in the OFront Door OfFrank Smith Default Company Execute Macro event s properties window to C Production Entrance Cohn Dole Default Company ORD Schedule Newer pro
200. ge betort or other input Hardware and Sound mehes Change display lirgutge Play CDi ct other media E Ti oe PAam tialh Ease of Access kel eaei li Jart Peeing 2 m F E JCD nine Wa displ Pnrde pisuar Racent Tari Ki Programe ERA Oa a acan 1 Additional Options p Aia 2 program threwal kE NEEN Pre 4 Up piia Change strup pograrns x mr 3 The Windows Firewall settings window will appear From the Exceptions tab click Add Port Exceptions control how programs communicate through Windows Firewall Add a program or port exception to alow communications through the firewall What are the risks of unblocking a program To enable an exception select its check box Program or port CI BITS Peercaching C Connect to a Network Projector Core Networking C Distributed Transaction Coordinator File and Printer Sharin C Media Center Extenders C Netlogon Service Network Discovery I Performance Logs and Alerts Cl Remote Administration L Remote Assistance Cl naman Fiaaleben W Notify me when Windows Firewall blocks a new program cancel aov Manufacturing Access Control Since 1985 aw g REFERENCE MANUAL figuration 4 The Add a Port window will appear In the Name field enter DCOM In the Port number field enter 135 Select TCP as your Protocol type and then click OK Use these settings to open a port through Windows Firewall To find the Add a Port x port numb
201. ght click Unassigned Cards from the desired Site branch and click New Card You can also REFERENCE MANUAL CENTAUR 5 1 Cards select Unassigned Cards and press the keyboard Insert key The meee inten Card Number HEX o0 Card window will appear allowing you to configure the card cDDewayNere FamibNunme foo properties Refer to Modifying a Card on page 128 for more information Access Level 1 Mone Card Number 00002 Access Level 2 Mone FLM o0000000 Access Level 3 Mone r Use keypad Floor Group Nowe Interlock Overnide ee Unknow H Bon Override uard Tour Status fva o Start Date somn a End Date 0405 201 0 Z l Enable Card Traced so Days Before End Date Enable Counter fo Masinun 255 T Disable Card After 0 Days Not Used You can also add a batch of new cards all at once rather than adding each card individually In the Database Tree View window right click Unassigned Cards from the desired Site branch and select New Cards Within the Batch Adding Cards window specify how many cards you would like to create as well as any common card information you would like to specify for all cards and click OK Centaur adds the specified amount of cards to your database and auto increments the card numbers If you wish to modify the cards you will have to modify them individually within the Card window see Modifying a Card on page 128 Manufacturing Access Control Since 1985
202. gram the macro and headcount settings for that event Maco fone Start Headcount Stop Headcount Execute Macro Select the Execute Macro check box to execute a macro action whenever the selected event occurs When selected all lists become available Selecting the Macro Schedule for an Event Select the schedule from the Schedule drop down list which determines when Centaur can execute the programmed macro If the selected schedule is not valid when the event occurs Centaur does not execute the associated macro The Schedule list is only available if the Execute Macro check box is selected For more information on schedules see Schedules on page 79 Selecting the Macro for an Event From the Macro list select the macro action that you want to execute whenever the selected event occurs The Macro list is only available if the Execute Macro check box is selected For more information on how to program macro actions refer to Macro on page 205 Start Headcount and Stop Headcount Enable start headcount by selecting the Start Headcount check box if you want to start the headcount process when the selected event occurs Select the Stop Headcount check box to stop the headcount when the selected event occurs Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control ar INTEGRATED ACCESS CONTROL Chapter 17 Groups What Will Find WWihtan Ale ClOUDS 2
203. he Administrative Tools gt Computer Management 2 Open Local Users and Groups Computer Manaperndit 3 Ifthe computers belong to a workgroup you have to create the users locally before starting if the computers belong to a domain go to step 4 a Create the users locally on the server For this right click on Users and choose New User In this new window type the information about that user and click OK Pay special attention to the user name and password that you are using to open the Windows session b Repeat the previous step for all the users you want to add then go to the next step Manufacturing Access Control Since 1985 10 AM REFERENCE MANUAL UR 5 1 i guration f To create the group to be used for DCOM you have to click on the Groups and select New Group In the field Name type Centaur Group Click on the Add button to add the users that you want to have access to the Centaur Server The window Select Users Computers or Groups pops up Click on the Advanced button and check if the Object Types and Locations are properly set and click on the Find Now button Select from the list the users you want to access the Server For a multiple selection keep pressed the keyboard Ctrl key while selecting the names from the list Click OK The selected users will appear in the Select Users Computers or Groups and the Enter the object names
204. he door is already unlocked This option is commonly used in conjunction with the Controller Anti passback Settings see page 96 when the door may be unlocked by a schedule This prevents Anti passback errors from occurring due to a user presenting a card to a reader of a door that has already been unlocked by a schedule Selecting the Door options Under the Options heading select one or more of the following check boxes These check boxes determine how and when a controller will read log the presentation of a card to the door s reader Unlock on Late Open When Unlock Schedule see page 110 select Unlock on Late Open to prevent the door from unlocking automatically until the first user with valid access presents their card at the door Example The feature is enabled and the front door of an establishment has been programmed to unlock via schedule between 8AM and 5PM If by 8 15 no one has presented their card to the front door s reader it will not unlock When the first person arrives at 8 30AM and presents a valid card the door will remain unlocked until 5PM Time and Attendance When the Time and Attendance check box is selected the time and attendance from the punch device become available for the Pro Report module Sign Out Reader When the Sign Out Reader check box is selected a visitor is automatically signed out when presenting his card to the door s reader Counter When the Counter check box is selected th
205. he name of the _ New Rename Delete Cancel template and click OK Import Export Select a template and click Rename to rename the selected template Select a template and click Delete to delete the selected template Click Cancel to quit the editor Click Import Export to import or export a card template to or from the Centaur s database Click the Import Export button select Export or Import and click Next For export select the file name to export to press Next select the template and click Finish For import select the file name to import from press Next select the template and click Finish The Centaur Card Template Designer editor is displayed when you have selected to Load the selected template Front Side Badge Status Bar Menu Centaur Card Template Designer BAX a a File Edit Card Settings View Help BS aentes 4 Back Sid Toolbar Front Side ole ack Side First name Last name Back Side Badge Company Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Users and User Groups a E Menu The menu gives access to the File Edit Card Settings View and Help menus e The File menu gives access to the Template selection Save Print and Exit e The Edit menu gives access to the following to add items to the template For each item selected click on the screen where the field needs to be located Click and drag the inserted field to change
206. hentication software can display the user s picture Use one of the following methods to associate a picture to the user Browse your computer for an existing picture Allows selecting a picture on disk Click on this button and select the picture file and click on Open Acquire the user s picture via the camera Allows acquiring a picture from a camera or a scanner Click on this button and select either Video Direct Show or Scan Twain Crop the user s picture Allows cropping the picture proportionally Click on this button and click and drag the appropriate corner s to reduce the picture Delete the user s picture from the database Allows removing the user s picture from the database Click on this button to remove the user s picture and replace it by the default picture Manufacturing Access Control Since 1985 r a HL REFERENCE MANUAL UR 5 1 User Groups Custom Fields From the User Properties window select the Custom Fields tab and use these fields to record any additional information about the user For information on how to customize the titles of these fields refer to Custom Fields on page 37 Personal Information Custom Fields Badge Cards Door Access Rights Last Access Visitors Assets Notes Text 1 fo Tet 2 fo Text 3 fo Tet fo rs Pf es e Text 7 po Tet 8 Po Text 9 fo Tet 10 fo Text 11 o Tet 12 Po Date 1 api 2510 r Dae ai 25 10 Date 3 April 25 10 Date 4
207. hich holiday groups will be used for each period To define a schedule period 1 From the Schedule Properties window select the Details tab 2 Inthe desired period Start and End text fields type the period start and end time using the 24Hr clock For more information refer to Setting the Period Start and End Time on page 82 3 Select the check box es corresponding to the day s of the week you wish to assign to the schedule The schedule will only be valid during the days of the week that have been selected and only at the times specified by the start and end times Schedule Properties Schedule Period 1 Period 2 Period 3 Period 4 Period 5 Period 6 Period 7 Period 8 Details Start End SunMon Tue Wed Thu Fri Sat Holl Hol2 Hol3 Hol4 jo000 ooo0 fooo0 joo00 foooo 0000 foooo 0o00 ooo 0000 po00 ooo 0000 0000 4 To assign the period to a holiday group select the check box es corresponding to the desired holiday groups For more information refer to Assigning Holiday Groups to a Schedule Period on page 83 5 Click OK Example In Figure 7 the schedule will be valid from Monday to Friday between 7 00AM and 9 00PM and from Saturday to Sunday between 9 00AM and 1 00PM The schedule will not be valid on any programmed holidays Manufacturing Access Control Since 1985 Figure 7 Schedule example Schedule Properties Schedule Details Period 1 Period 2 Period 3 P
208. his user except for cards that are lost or stolen the new status takes effect when clicking on the Apply button Valid The user is valid and the user can begin using their card until the status is changed Invalid This status allows you to indefinitely disable the user without having to delete the user from the database As soon as you click OK the user is no longer valid until their status is changed Temporary You can use this status level to create a user prior to the date the user becomes valid or for personnel on contract which would require an access for a specific period of time When you select Temporary from the Status drop down list the Start Date End Date options become available Use the Start Date and End Date drop down lists to select the day month and year the user becomes valid and the day month and year the user expires The user becomes active at 00 00 of the selected Start Date and expires at 24 00 of the selected End Date Start Date and End Date See Temporary above for more information Text 1 Use the Text 1 field to display one of the custom fields see Custom Fields on page 50 that you would like to see in the general section of the user properties window Once selected the field name Text 1 will be replaced by the selected field name The information contained in the selected text field will be displayed here Personal Information From the User Properties window select the Personal Info
209. hived or Live Video sicisciiss iecuasstecsscenccerhectsseteabesands senkeondoubatnrensvavnuetuiexaliabisba usbecedaebeubentednawtonaveiendenccilivancdasscetbeaenacaurs 202 OME PI CIMIN CO VideO preissii e E e E E EEEE E A E O EE N 203 ISLAY ALIVE YI TEO e E E E E E N 204 MACRO oerna O E A A A E E sunt eavaaucenneae s 205 PROGING aA Mao asine E a aE ET E N A A E E EAA EEA a EE 206 Modifying Macro Settings cee 206 Belino AN GTO eea aa E E A E E N EE EE E E E E EEE 207 OPTION teat astm ctl ere alan era cae elem cesar ERA AEA AAEE EEEE EEA EN 209 Genera Ce incall CUO NS assisted sce cataracts ies eeencacac ance sates ace abeccisacse nei I enon suse ncecateedenatansaaiesds oe aqdeedeaeccmencenacete 210 Veit Colour Definitions segeceeeeecipessntecesseaietacecehcaeheesstavosanhie ekin irinin EDEA Ean Ane EE nA iarrainn i roind eisdinn in 212 ODEFA E pol entee senate gece enters 213 BAO FE rate sapere onec eden teners nd E E duusuaratnusuaideuatoaderanasltyibensdeniaauen E anid iaeaanasaennes 213 PARKING iraae stare sree wastes A E 215 Overview of Parking Management cccccccsseeeeccseseeececeusececsausececsseseeeceuscecessueeeesseseeessauaseceeecessaeeeeeseuseressaueessssusesessaaaeees 216 MANUAL CONTROLS recat sates tere ac beet arenes sie niecie tan aioeeicanina do eeadeteaneajesta enwamendemewedcnaicaeeatas neketdetneasbacsebaocuyssmeueuneteatagenentesdsees 217 SIN IG OY eect aa ate areca a Seana an tpnase rien chape scene a daahlea E aaeanaa te
210. hts 188 Lost Cards 131 M Main Database 230 Make a Beep on All Abnormal Events 211 Make a Beep on All Access Events 211 Make a Beep on all Events 211 Mantrap Inputs 114 Manual Control of Door and Relay Groups 176 Manual Controls 217 219 Manual Controls Security Levels 187 Maximum Family Number 36 Menu 17 r ao Ha REFERENCE MANUAL Modem 34 Modify Security Levels 186 Modifying Access Levels 122 Cards 47 67 128 CCTV Commands 192 200 206 Controllers 88 Doors 105 Groups 173 Holidays 76 Inputs 147 Outputs 155 Relays 138 Schedules 80 Security Levels Permissions or Operators 185 Modifying a Site 29 Modules 78 Modules Tab see Software Modules 789 Monitor CCTV Command 193 MSDE Management See also Database Backup Scheduler N Name 178 179 181 196 Access Level 122 Controllers 90 Doors 106 Holidays 76 Outputs 156 Relays 139 Schedules 81 Security Level Permission or Operator 185 User Group 59 72 NC Input Connection 144 NC Inputs 93 Non activated Status Relays 147 None Security Levels 186 Normal State NO NC Inputs 149 Notes 44 178 180 182 196 Access Level 122 Controller 90 Doors 106 Holidays 76 Outputs 156 Relays 139 Schedules 81 206 Security Level Permission or Operator 185 User Group 59 72 O Offline Buffering 35 Open Too Long Time 112 Opened Reading Type 111 Operating system requirements 7 Operations Tab Security Levels 187 Operator Timeout 17 Operators 183 188
211. i D User O Greups fi ReSabilty and Peformance ay Device Naneger Ei tope Sf Dnk Management D SOnstes and Apehcabens Compute Management Fie Ache Ves help rf lina A a umm E Shared Folders Lezal User and Genugs ED Users Groups GP Rehabilty Mew Group dh eaa Mia a E Stesage San 4 ef Unk Mana Refreth b fey Severe anda Etik Help Ema Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration EG 7 The window Select Users pops up Click on Advanced button initia Users or Builtin secunty principals From this location cOVIVSTA Enter the object names to select amp xamples 8 Check if the Object Types and Locations are properly set then click on the Find Now button Select from the list the users you want to access the Server For a multiple selection keep pressed the Ctrl key while selecting the names from the list Click OK CREATOR OWNER OAL et RAASTA amp HTERACTIVE 9 The selected users will appear in the Select Users under the Enter the object names to select examples section Click OK Select this object type Users or Builtin security principals 10 Click Close From this location CDVI VISTA Enter the object names to select examples CDOVLVISTA Centaur User CDVI VISTA John Doe Manufacturing Access Control Since 1985 REFERENCE
212. iar t rk enter in the Phone Controller Network Modem Hombar test Gox Assigning the Dial up Site Modem Type If the selected communication type is Dialup Modem from the Modem drop down list select the Centaur Server computer modem that will be used to communicate with the controller network We recommend to use US Robotics 56k hardware modems WIN modem are not supported Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Sites Updating the Controller Time Automatically Select the Update CTL time automatically every 15 minutes check box to download the date and time from the PC to all controllers in the site every 15 minutes Clear the check box if you wish to disable automatic date and time update This check box is selected by default Enabling Offline Buffering Outbox Select the Enable Offline Buffering Outbox check box if you want Centaur to automatically store any system modifications performed while disconnected from the site controllers offline to an outbox table Stored modifications are automatically downloaded to the controller s wnen communication is established with the site controllers online Site User Card Settings Select the Users Cards tab from the Site Properties window Each site can be programmed with different user card settings Site Properties Visitors amp Parking Floors CCT Y CMPP Site Comms Users Cards Custom Fields Hexadecimal Cards 26 Bits
213. icating the current schedule Click the Change button to change the schedule and click OK After changing the schedule and click Next 9 Click Finish Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Database Management Editing a Scheduled Database Backup You cannot edit a scheduled job If you need to change the scheduled job s settings you must delete the existing job see Deleting a Scheduled Database Backup on page 239 and then re create a new one see Creating a Scheduled Database Backup on page 238 Deleting a Scheduled Database Backup Perform the following to delete a scheduled job 1 Make sure the SQL Server is running see Starting the Centaur Server and Software on page 11 2 Click Start Programs CDV Americas Centaur and click MSDE Management Console or directly from within Centaur click the Open Database Backup Scheduler icon from the main menu bar The MSDE Management Console window will appear 3 From the Database Tree View window left hand portion of your screen double click the Jobs branch 4 From the Details window right hand portion of your screen right click the desired job and click Delete job A dialogue box will appear requesting confirmation Manufacturing Access Control Since 1985 r a i Lp REFERENCE MANUAL Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control aaa G A pe
214. ill be automatically assigned when a new access level is added to this site See Access Levels on page 121 for more information The default setting is Never Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Sites Custom Fields Defining the User Custom Fields Customize the text field headings that appear in the Custom Fields tab of the User Properties window Refer to Custom Fields on page 50 for more information e The text you type in the Text 1 to Text 12 text fields will appear next to the first twelve text fields respectively in the Custom Fields tab of a user e The text you type in the Date 1 to Date 4 text fields will appear next to the four date fields respectively in the Custom Fields tab of a selected user e The text you type in the T F 1 to T F 4 text fields will appear next to the four check boxes respectively in the Custom Fields tab of a selected user Example The Figure 5 shows the results of the defined User Definable Card Fields on the User Properties Custom Fields window Figure 5 User Custom Fields Site Properties Visitors amp Parking Floors cctv CMPP E Field nz Conme Ureia ER Personal Information Custom Fields Badge Cards Door Access Rights Last Access Visitors Assets Notes Text 1 fo T fo Text 1 Name gt Text z Address gt Text 3 rT gt Text 4 rT gt cit Add Text 3 ity gt Text 4 e45 T
215. ill play The event that occurs will also appear in Centaur Wave player Real Time Events Status window until the alarm is acknowledged refer to Alarm Acknowledgement on page 166 for more information If the alarm event is not acknowledged the sound will replay every 1 to 60 minutes depending on the set value The wav file will only play if the selected event has been set as an alarm in Centaur The event s alarm acknowledgement feature must be enabled refer to Alarm Acknowledgement on page 166 for more information 1 Start Centaur Wave player as detailed in Starting Centaur Wave Player Settings Wave Player General 2 From the main menu bar select File and click Settings Repeat soundevery iE mins The Wave Player Settings window appears Event Definition 3 Inthe Repeat Sound Every text field type a value ed Card valid between 1 and 60 minutes This value applies to all events arama with an associated wav file ied Card stolen ied Door manu Access denied Interlock ac er i s f A denied Invalid acc 4 Inthe Event Definition list double click the event you wish porate ihe eet i j j i Access denied Passback v to assign a wav file to The Select Wav file path window e ales Sina oe ag appears Access denied Schedule in PP Access denied Wrong floor Access denied two card tule Access denied two card tule 5 Click the button and select the wav file and locat
216. ime Select how long 0 to 65535 ms the action will be effective The Time field is only available with action name ending with timed like Activate Relay timed Device Select the device on which the selected action will take effect Deleting an Action To delete an Action click on the desired action from the list and click on the Delete button Modifying an Action To modify an Action click on the desired action from the list and click on the Modify button See Adding a New Action above for more information Deleting a Macro To delete an existing macro right click the macro and click Delete You can also click the desired macro and press the keyboard Delete key A dialogue box will appear requesting confirmation You cannot delete a macro assigned used in other parts of the system such as event definition Manufacturing Access Control Since 1985 r ao Ha REFERENCE MANUAL Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control ar INTEGRATED ACCESS CONTROL Chapter 24 Options What Will Find General Centaur OouOnS lt 26453d000b dre tbe seus ob4 o4 oho eee ee Shh ooh oboe boo ord 45 46S bed E EEDE pE 210 Event Colour DeINMONS 2d crteavoacacasoe eee ee ueeee RA r tee ae eens teen ER EAEE ASEENA 212 Operaor TIMeCOUl cc se5ews eo ees ee hese cece on eee nese ees eee ee eee eee Gee ee eee eee bee eee eee ete ec oe 213 LOO INS 52 064 ada
217. immediately if unable to log security audits io DOOM Machine Access Restrictions in Security Descriptor Definition Lang DCOM Machine Launch Restrictions in Security Descriptor Definition Lang Domain member Digitally encrypt or sign secure channel data always 19 Domain member Digitally encrypt secure channel data when possible n member Digitally sign secure channel data when possible Security Setting Disabled Disabled Enabled Administrator Guest Disabled Disabled Not Defined Disabled Q BAG BAD Am Q BAG BAD Am Enabled Not Defined Disabled fined fined fined fined fined Enabled Enabled Enabled for local account es AXE 4 Security Settings b Ca Account Policies a Ca Local Policies t EA Audit Policy t EA User Rights Assignment b CA Security Options t 0 Windows Firewall with Advanced Seci 4 Network List Manager Policies t C Public Key Policies t C1 Software Restriction Policies t 3 IP Security Policies on Local Compute Policy So Networ 2 Networ oo Networ bo Networ so Networ ia Networ 20 Networ bio Networ So Networ 219 Networ Networ Netwer H Networ ou Network security rk security ai Le eee erbs o k access Allow anonymous SID Name translation k access Do not allow anonymous enumeration of 54 k access Do not allow anonymous enumeration of 54 k access k access k access k access Remotely accessible registry paths
218. indows Firewall window will re appear From the Exceptions tab make sure that the sqlsevr exe check box below the Programs and Services heading is selected 12 Click OK Windows Firewall Exceptions Advanced Windows Firewall is tumed off Your computer is at isk of attacks and intrusions from outside sources such as the Intemet We recommend that you click the General tab and select On Programs and Services chat DCOM File and Printer Sharing Intemet Explorer Java TM 2 Platform Standard Edition binary Microsoft Management Console O Remote Assistance O Remote Desktop Skype spcSvr exe sqlservr exe TIP P Framewnrke base Display a notification when Windows Firewall blocks a program What are the risks of allowing exceptions Manufacturing Access Control Since 1985 j REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration DCOM Configuration 1 Go to Start gt Settings gt Control Panel and double click on Administrative Tools File Edit view Favorites Tools Help CI Back EQ f Search gt Folders ees x ie mez Address E Control Panel S Accessibility Options Adjust your computer settings For vision S Add Hardware Installs and troubleshoots hardware Add or Remove Programs Install or remove programs and Windows a Administrative Tools Configure administrative settings For your a Automatic Updates Set up Windows to automatically deliver i
219. ing 115 Activating Schedule Relays 140 Timed Relays 139 Activation Tab Relays 139 Activation Time Outputs 156 Activation Timer for Relays 140 Active Access Level 122 Controller Communications 95 Add a New Card Centaur s Card Management feature 63 Adding Batch of Cards 46 59 66 72 127 Card s 46 66 127 CCTV Commands 192 Controllers 86 Doors 104 Groups 172 Inputs 147 Outputs 155 Relays 138 Security Levels Permissions and Operators 184 Adding a holiday 76 r ao Ha REFERENCE MANUAL Address Access Level 122 Controller 88 Doors 105 Groups 173 Inputs 147 Operator 185 Outputs 155 Relays 138 Security Level 185 Alarm Acknowledgement 166 Alarm Acknowledgement Options 210 Alarm Acknowledgment Enabling 166 Schedule 166 Alarms Window 23 All events 17 All Events Displaying 218 All Security Levels 186 Alternate Floor Group 174 Anti passback Override 130 Anti passback Reset Input 96 Anti passback Reset Schedule 96 Anti passback Schedule 96 Anti passback Status Output Activation Events 157 Anti passback Tab 96 ASCII Command 169 Asset Properties 196 Assets 58 71 195 Assigning a wav File to an Event 242 Assigning Access Levels Cards 129 Assigning Controller Addresses 89 Assigning Floor Groups Cards 129 Attaching Databases 235 ATZ2R 93 ATZ 2R Connection 145 ATZ 3R 93 ATZ 3R Connection 146 Available Fields and Selected Fields 43 B Backgrond Colour 173 Backing up Database
220. inputs 1 2 COM 23 4 Address 3 Addrosa 4 1K Ohm 22K Ohm Address 5 Addross 6 1K Ohm 2 2 Ohm Address 7 Address 8 1K Ohm 23K Ohm Address 9 Addraas 10 1K Ohri 22K Ohm 79 10 COM 711 12 Address 11 Address 127 1K Ohm 22K Ohm Address 13 Addreas 14 1K Otwn 7K Ohm HR Address 15 Addr sa 16 1K Ohm 2 2K Ohm Manufacturing Access Control Since 1985 ATZ 2R CONNECTIONS FOR CA A470 A 2 Door Exp 1K Ohm inputs Zi COM REFERENCE MANUAL h ATZ 3R Connection Method When this option is selected see Setting the Controller Input Configuration on page 93 the controller will generate an alarm condition when the state of an input is toggled opened An alarm condition will also be generated when a wire fault short circuit or a cut in the line occurs Connect two devices to each controller s input but only one device to each 2 Door Expansion Module s input For address assignment of the 2 Door Expansion Module s inputs refer to Viewing the Input Address on page 147 Figure 26 ATZ 3R Input Connection Method ATZ 3R CONNECTIONS FOR CT V900 A CONTROLLER Address 1 Address 2 Controller 1K Ohm 22K Ohm a Inputs IK Ohm fi 2 COM faa nee ETTE EOL Address 3 Addresa a 1 Om 1K Ohm 22K Ohm Address 5 Address 6 IK Ohm 2 2K Ohm Address 7 Address 1 Ohm IK Ohm 2 2K Ohm Address 9 Address 10 1K Ohm 228 Ohm 1K Ohm Ww
221. int custumizable user card access reports For more information refer to Centaur s Anti Passback Monitoring Software Online Help Manufacturing Access Control Since 1985 REF WavePlayer Event Driven Sounds Player This utility was designed to enable a wav file to be played on the computer when an event that requires acknowledgement occurs The sound can replay at programmed intervals until the alarm is acknowledged For more information refer to Centaur Wave Player on page 241 Pro Report Report Generation Centaur s Report Generation feature provides a user friendly wizard for generating system and Time and Attendance reports Generate quick one time pre defined and scheduled reports for up to 8 different report types You can also search group and sort your reports For more information refer to Centaur s Report Generation Software Operator s Manual Tracker Time amp Attendance When the Tracker Time amp Attendance check box is selected the time and attendance from the punch device become available for the Pro Report module For more information refer to Centaur s Report Generation Software Op erator s Manual FrontView Real Time Graphic Centaur s real time graphic interface gives you point and click control over doors relays inputs outputs and controllers through a graphical floor plan For more information refer to Centaur s Real Time Graphic Interface Online Help Centaur Service Ma
222. ion Search Video Refer to Show Archived Video on page 203 for more information View gt Door status View gt Relay status View gt Controller status View gt Input status View gt Output status Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Understanding the Centaur User Interface KEYBOARD Modules Open Badge Editor N A N A Refer to Badge on page 50 for more information Open FrontDesk Refer to FrontDesk on page 62 for more Ctrl F 1 Module gt FrontDesk information Open Import Export Application Ctrl F2 Module gt Import Export Application Open Database Management Module Refer to Database Management Module on Ctrl F3 Module gt Database Management page 231 for more information Open Database Backup Scheduler Refer to Database Backup Scheduler on Ctrl F4 Module gt Database Backup Scheduler page 238 for more information Open FrontGuard Ctrl F5 Module gt Front Guard Open Locator Ctrl F6 Module gt Locator Open WavePlayer Refer to Centaur Wave Player on page 241 for Ctrl F7 Module gt WavePlayer more information Open Pro Report Ctrl F8 Module gt Pro Report Open FrontView Ctrl F9 Module gt FrontView Open Diagnostic Tool Ctrl F10 Module gt Diagnostic Tool Open CMPP Allows loading or adding a card using a CMPP Ctrl F12 Module gt CMPP card enrollment station Search Allows to perfor
223. ion Access daitied to cond nu Click OK Access granted Access granted Antipassba Access granted Floor open Access granted Floor selec 6 Repeat these steps to assign further wav files to events Click Apply Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control ar INTEGRATED ACCESS CONTROL Appendix A DCOM Configuration What Will Find DCOM Configuration for Windows Vista 0 0 eee eee eens 244 DCOM Configuration for Windows XP 1 0 ee eee ee eee eens 264 DCOM Configuration for Windows 2003 Server nananana anaa naaa 282 DCOM Configuration for Windows 2000 Pro and Server 1 0 eee eee eee ees 307 Centaur uses Distributed Component Object Model DCOM to communicate between its software components DCOM is a protocol that enables software components to communicate directly across multiple network transports including Internet protocols such as HTTP in a reliable secure and efficient manner It is necessary to configure the DCOM only when operators need to access the Centaur Server computer from remote computers DCOM configuration is performed on the Centaur Server computer only and sets Windows to allow access from remote workstations creating Windows user accounts Before configuring the DCOM the Centaur Server must be installed refer to Installation Overview on page 3 and the users that will access the Centaur Serve
224. ion Console Administration Console Plugging the Hardlock Key A hardlock key is required to enable communication with Centaur s controller Centaur s software will run in Starter Pack version when no hardlock key is detected The hardlock key is available in two different configurations one for parallel port and one for USB port e The blue hardlock key is designed to be plugged into your computer USB port e The black hardlock key is designed to be plugged into your computer parallel port Plug the parallel or USB hardlock key identified as Server to the port of the computer used as the Centaur Server Centaur Service Manager Plug the parallel or USB hardlock key identified as Workstation to the port of the computer used as a workstation The hardlock key is required on the computer used as the Centaur Server as well as on each workstation You must have the hardlock key plugged in the Centaur server workstation port before starting the Centaur Service Manager otherwise the software will run in Starter Pack version AN The hardlock key version 4 2 will not work with the Centaur Integrated Access Control software version 5 0 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Installing and Using Centaur Starting the Centaur Server and Software This section describes how to start the Centaur software from the Centaur Server computer or a networked workstation Note that before starting
225. ion Permission click Custom andini eee eae ee ize 6 Use Default e Under Access Permissions click Customize Customize e Under Configuration Permissions click Use Default Access Permissions Use Default aca Use Default Customize Edt Manufacturing Access Control Since 1985 21 Under Launch and Activation Permission click the Edit button 22 The Launch and Activation Permission window will appear Click the Add button to add the Centaur Group 23 Check if the Object Types and Locations are properly set then click on the Find Now button Select from the list the Centaur Group previously created For a multiple selection keep pressed the Ctrl key while selecting the names from the list Click OK TI SYSTEM amp 2 Administrators CDVI VISTA Administrators amp 2 INTERACTIVE Pennissions for SYSTEM Allow Deny S SS Boo Leam about access control and permissions Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration 7 Mi 24 The Centaur Group appear in the Select Users under the Enter the object names to select examples section Click From this location CDVI VISTA Select Users or Groups Enter the object names to select examples COVI VISTA Centaur Group 25 Select Centaur group then check the check box Allow to Local Launch Remote Launch Local Activations and Remote Activations Click OK amp SYSTEM
226. ion in the size tab REF Detaching Databases This feature is for advanced users only and should not be used frequently Before attaching a database see Attaching Databases on page 235 you must tell the SQL Server application used by Centaur to stop using the current databases by detaching them Detaching the database will allow you to keep a manual backup of the current databases If you perform a detachment the databases will be detached from SQL but will still exist You must move them from the current path C Program Files CDV Americas Centaur Centaur Server Data to another path Perform the following to detach the database 1 After starting the Database Management Module as described in Starting the Database Management Module on page 231 the SoxDBase Centaur Database Utility window will appear 2 From this window select the Advanced tab 3 Click the Detach button Removing Databases If you remove the databases it will detach the database and delete it completely You will not be able to restore or re attach databases that have been removed Perform the following to remove the database 1 After starting the Database Management Module as described in Starting the Database Management Module on page 231 the SoxDBase Centaur Database Utility window will appear 2 From this window select the Advanced tab 3 Click the Remove button T SPXDBase Centaur Database Utility B
227. is expressly limited to repairing or replacing at Seller s option any product not meeting the specifications Returns must include proof of purchase and be within the warranty period In no event shall the Seller be liable to the buyer or any other person for any loss or damages whether direct or indirect or consequential or incidental including without limitation any damages for lost profits stolen goods or claims by any other party caused by defective goods or otherwise arising from the improper incorrect or otherwise faulty installation or use of the merchandise sold Notwithstanding the preceding paragraph the Seller s maximum liability will be strictly limited to the purchase price of the defective product Your use of this product signifies your acceptance of this warranty BEWARE Dealers installers and or others selling the product are not authorized to modify this warranty or make additional warranties that are binding on the Seller For technical support in Canada or the U S call 1 866 610 0102 Monday to Friday from 8 00 a m to 8 00 p m EST For technical support outside Canada and the U S call 00 1 450 682 7945 Monday to Friday from 8 00 a m to 8 00 p m EST Please feel free to visit our website at www cdvi ca 2006 2008 CDVI Americas Ltd All rights reserved Specifications may change without prior notice One or more of the following US patents may apply 6215399 6111256 5751803 5721542 5287111 5119069 5077549
228. k a door select Energize from the Lock Control drop down list This means the lock output on the controller will remain activated When an Access Granted or Door Unlocked event occurs the controller will remove power from the lock output If an electric door strike or an electromagnetic lock is used this mode will unlock the door during a total power loss Keypad Schedule From the Keypad Schedule drop down list select the schedule that will determine when both a reader and a keypad must be used in order to gain access When the selected schedule is valid the user must present a valid card to the reader and then a valid P I N must be entered on the keypad before access is granted Only cards with the Use Keypad option enabled must enter a valid keypad P I N see Use Keypad on page 130 For more information on schedules refer to Schedules on page 79 Unlock Schedule From the Unlock Schedule drop down list select the schedule during which a controlled door will automatically unlock For example you may want a door to remain open unlocked from 9 a m to 5 p m Monday to Friday To do so create the appropriate schedule and select it from the Unlock Schedule drop down list For more information on schedules refer to Schedules on page 79 Also refer to Unlock on Late Open on page 111 Extended Access Relay From the Extended Access Relay drop down list select the relay that will be activated when a card with the exte
229. kground Therefore if you are working in another program such as Microsoft Word or if the Centaur integrated access control software is minimized a pop up window will Options Alarms Display a notification message l Make a beep Play alarm wave non stop Wave p Events 7 Make a beep on all events Make a beep on all Access events Make a beep on all Abnormal events Update events every fas seconds Status p Update status display every fos seconds Cancel appear asking you if you would like to view the alarm now If you click Yes it will maximize return to the Centaur integrated access control software If you choose to ignore the alarm click No Make a Beep When the Make a beep check box is selected your computer will beep every time an alarm requiring acknowledgement occurs Play Alarm Wave Non Stop When the Play Alarm Wave Non Stop check is selected your computer will play the selected Wave file continuously when an alarm requiring acknowledgement occurs The computer will stop playing the wave file only when the alarm is acknowledged Wave When the Play Alarm Wave Non Stop check is selected select a wave file Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Options Setting General System Event Options The following options are available under the Events heading Make a Beep on all Events When the Make a be
230. l coordinator Pe eee err ere rrr ry Select Log Information Currently owned by 2K3RZSP2AVIRT Location C AWINDOWS spstem2 MSDte Browse Capacity MB Reset log Client Network Protocol Configuration Service Contral Status for MSDTC version 5 2 3790 2925 Stat tus Started at 14 15 AG 2007 10 15 S tart r Transaction Configuration E Security Configuration Tracing Options Cancel Apply Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration 17 In the Default Properties tab check if the Enable Distributed COM on this computer check box is selected My Computer Properties lt n 2 x Default Protocols MSDTC COM Security General a Default Properties OC eee ee re er eer ir er errr re E nable Ci COM lineare Services on this ree Default Distributed COM Communication Properties The Authentication Level specifies security at the packet level Default Authentication Level Connect The impersonation level specifies whether applications can determine who is calling them and whether the application can do operations using the client s identity Default Impersonation Level Identity ha Security for reference tracking can be provided if authentication i is used and that the default impersonation leveli Is not anonymous gl Provide additional security for idiemnce tr
231. l tab This will allow you to view Access Level Properties some of the system component addresses as well record the access level name and any additional notes Access Level Doors and Schedules Users Site 1 Access Level 3 IY Active Viewing the Access Level Address ae 7 ame Managemen tt iCS At the top of the Access Level tab Centaur displays the selected site s address as well as the address of the access level The first access level created is assigned Access Level 3 as its address Every time an access level is added Centaur increments the access level s address by one Addresses 1 and 2 are reserved for the All and None access levels Enabling the Access Level Select the Active check box to enable the access level allowing you to Cancel assign the access level as required Clear the Active check box to disable the access level without having to remove it from the database this access level will not work for any card but the cards having other access level will continue to work Typing the Access Level Name In the Name text field type a descriptive name for the access level e g Management Also refer to Typing Names and Notes on page 23 Typing the Access Level Notes Record any important explanations regarding the access level and its use Use the Notes text field to keep a record of how an access level was changed and when it was changed Also refer to Typing Names and Notes on page 2
232. lay the visitor s picture Use one of the following methods to associate a picture to the visitor Browse your computer for an existing picture Allows selecting a picture on disk Click on this button and select the photo file and click on Open Acquire the visitor s picture via the camera Allows acquiring a picture from a camera or a scanner Click on this button and select either Video Direct Show or Scan Twain Crop the visitor s picture Allows cropping the picture proportionally Click on this button and click and drag the appropriate corner to reduce the picture Delete the visitor s picture from the database Allows removing the visitor s picture from the database Click on this button to remove the visitor s picture and replace it by the default picture Custom Fields From the Visitor Properties window select the Custom Fields tab and use these fields to record any additional information about the visitor For information on how to customize the titles of these fields refer to Custom Fields on page 37 Personal Information Custom Fields Badge Cards Door Access Rights Last Access History Assets Notes Text 1 Po Tet 2 Po Text 3 Po Tet Po Test 5 fT ooo H Text 7 po Tet 8 Po Text 9 Text 10 o Text 11 O eg G Date 1 December 07 09 Date2 December 07 09 x Date 3 December 07 09 Dated December 070 x Check 1 Check 2 Check 3 Check 4 Manufacturing Access Control Since 1
233. led to Process Event event which will appear in the Real Time Events Status window At this point events will not be saved because the database has exceeded its maximum size You should perform a backup of the Event database see Backing Up Databases on page 232 and then truncate see Truncating Events on page 234 the database to reduce its size Perform the following to define the size of the Event database 1 After starting the Database Management Module as described in Starting the Database Management Module on page 231 the SpoxDBase Centaur Database Utility window will appear 2 From this window select the Size tab and click the Size button 3 Inthe Restrict growth of Event database to text field type the maximum size of the Event database in MB or select the Unlimited Growth check box If using MSDE growth is limited to 2GB Do not select the Unlimited Growth check box unless the full version of SQL server is installed Do not enter more than 1800MB when using MSDE 4 Click OK Truncating Events When the Event database has reached its maximum size see Limiting the Event Database s Size on page 234 each subsequent T SPXDBase Centaur Database Utility event will be followed by a Failed to Process Event event which will Backup Size Advanced appear in the Real Time Events Status window At this point events will not be saved because the database has exceeded its maximum Co
234. ler In the Configuration tab the doors will be labeled Door 1 and Door 2 These are directly linked to where on the controller the readers and ok Cancel or keypads are connected as shown in Figure 10 on page 92 Manufacturing Access Control Since 1985 ff REFERENCE MANUAL UR 5 1 f Figure 10 Controller s Door Configuration CT V900 A Partial View i onk ruler Meret ies am fear Reader and or keypad for Door 1 F CAZA Gin 7 ATE SALE inputs Pade 0 0 m Pot Humber 00T Pal Timeout 7 ome Active FF es ot a koypad Conte responte delay D00 ms Fast Evert Reguit I Reader Type From the Reader drop down list select the protocol of reader used If no reader is being used on the selected door select None Keypad Type From the Keypad drop down list select the protocol of keypad used If the controller s door is not using a keypad select None When both a reader and a keypad are used only users with the Use Keypad option enabled see Use Keypad on page 130 have to use both to gain access Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Controllers A Setting the Controller Input Configuration Each controller has eight inputs that can be doubled to 16 and each 2 Door Expansion Module CA A470 A has four inputs This means that the controller can monitor the state of up to 28 input devices
235. ller Address Name gt At the top of the Controller tab Centaur will display the site s address as TPR well as the controller s address Each controller in a site is assigned to an A address by setting the dip switches located on the controller see Table 3 on page 89 Also refer to Figure 9 on page 90 The controller addresses are greatly affected by the controller s COM port assignment Please refer to Assigning COM Ports to Controller Addresses on page 33 for more information Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 2 2 G O O Table 3 Assigning Controller Addresses Via Dip Switches OFF Or ON ON EA LON ON EA ONT Dace on feb ORE Orr ON pen pucale eS oe PONCE ere Controller Dip Switches Cre ON CON ON CSF 2 ON ON TON ON ON ONTON a CONTON ON Me ON eM ON ONT CON OM O E een ON ON LL LL 5 LL LL 5 Cea A eeuk CAERA OR OEF Or S ON ON OFF OFF ON MCE Ke ON OFT OFF Moor OE ON OFE ONJO OT ON OE ON OE ONO O O ON OE ON OFT ONO Or a ON ON OT ON OEE ON E ote OFF ON ON 1 OFF CON OEE O E E OON ON ORF ONO O RL OT ON OT 86a OT ON Or ee O E OF ON ON OON O ee OON ON GEE ON OG ee ON O ere ON EON CEFL ON Or ON OTON ON Cee CEEA OF ON OT E ON LON OFF ON ON OTL ON OT o ON ON OF ONTON ONON OT O OEF ON ONON DON ON ORF E ON O F ORE ONTON ON CON ON ON Me E ON oer ONT ONON W u u W u i W u
236. located on the entry side of the door and select the Exit door type for the exit reader located on the other side of the door This configuration must be used to implement the local Anti passback feature see Enabling Controller Anti passback on page 96 Manufacturing Access Control Since 1985 r ao Ha REFERENCE MANUAL Global Entry or Global Exit These door types allow you to use global anti passback which functions independently and provides more versatility than the local anti passback feature see Enabling Controller Anti passback on page 96 When using Entry and Exit door types see above users must enter and exit through a door on the same controller When using the Global Entry and Global Exit door types a user can enter through a door defined as global entry and then the user can exit through any door defined as global exit You can also reset the global anti passback status of all users For more information refer to Selecting a Site s Global Anti Passback Reset Schedule on page 36 Global Entry and Exit will only function when the Centaur Server is online connected Please note that when using Global Entry and Exit the Centaur system will also generate a Waiting for Host event with every Access Granted event generated from a door defined with Global Entry or Exit Example As demonstrated in Figure 14 if a user were to enter through door 1 Global Entry the user would
237. m input is triggered for the duration of Input Response Time another alarm won t be generated until the system registers the input as normal or restored see Setting the Input Restore Time on page 149 Example The Input Response Time is set for 600 ms and an input is triggered but doesn t stay in that state for at least 600 ms The controller will not consider the input change state i e no event generation no alarm etc Setting the Input Restore Time The Input Restore Time defines how quickly the controller will respond to the restoring of an input in alarm If the input remains restored in its normal state for the period defined by the Input Restore Time the controller will log the Input restore normal event and react according to its programming This only occurs if the input has already generated an alarm see Setting the Input Response Time on page 149 In the Input restore time text field type a value from 0 to 65535 ms 65 5 seconds Bypassing Inputs with an Input When an input is triggered the controller can be programmed to bypass another input or a selected group of inputs Also refer to the example demonstrated in Figure 28 on page 150 1 From the This input bypasses input drop down list select which input will be bypassed upon triggering of the input 2 From the Bypass input group drop down list select the input group that will be bypassed upon triggering of the programmed input For more inf
238. m refer to Manual Controls on page 217 From the Update status display every drop down list under the Status heading select the desired interval of time Manufacturing Access Control Since 1985 a ao REFERENCE M ANUAL Event Colour Definitions Centaur provides the ability to customize the text and background colour of each event logged in the system You can set events to use its default colours or a custom colour definition When an event occurs it will appear in the Real Time Events Status window with its defined colours default or custom ied Card lost Card number unknown ied Card stolen ied Door manually disabled ied Interlock active Using Default System Event Colours jod Invalid access righi ied Invalid floor group schedule Access denied Passback violation in Perform the following to use an event s default system colours Access denied Passback violation out Event Colours Access denied Schedule invalid Nifeewe lane aalantad 1 From Centaur s main menu select the Options menu and Event Colours Text Colour L Background Colour i 2 From the Event Colours window highlight the desired event lien 3 Select the Use System Colours check box Cancel 4 Repeat steps 2 and 3 until the desired events are set 5 Click OK Customizing Event Colours Perform the following to set an event to use a custom set of colours 1 From Centaur s main menu select the Opti
239. m advanced search Refer to Ctrl F N A page 64 for more information About Gives information about the Centaur N A N A Administration software and CDVI contact information EIDBOOO0O000Oo Manufacturing Access Control Since 1985 r a Hd REFERENCE MANUAL UR 5 1 i ling the Centaur User Interface Database Tree View Window The Database Tree View window located in the left hand portion of your screen allows to create and configure a site including all its objects From the Database Tree View window you can create and or modify e Sites on page 25 e Users and User Groups on page 45 e Visitors and Visitor Groups on page 65 e Holidays on page 75 e Schedules on page 79 e Controllers on page 85 e Doors on page 103 e Access Levels on page 121 e Cards on page 125 e Elevator Control on page 133 e Relays on page 137 e Inputs on page 143 e Outputs on page 153 e Events on page 161 e Groups on page 171 e Security Levels on page 186 e Permissions on page 187 e Operators on page 188 e CCTV Commands on page 191 e Macro on page 205 Real Time Events Status Window The Real Time Events Status window lists all the events or device status for the selected site see Selected Site on page 19 Use the View menu See the View menu on page Menu Bar on page 17 or the Toolbar button
240. m sea oe ee ee Oe PE eel ence ee eee ase en aes eee a ae pee ee Ee ee E EE A 213 The Centaur software can be programmed to provide visual and or auditory feedback when specific events or alarms occur in the system You can also determine at what frequency in seconds that Centaur will update the Real Time Events Status window The colours of each event that appear in the Real Time Events Status window can be customized to your needs You can also set the Centaur administration consoles to automatically log off if no action has occurred after a specified amount of time Manufacturing Access Control Since 1985 General Centaur Options From Centaur s main menu bar select the Options menu and select Options from the drop down list The Options window will appear allowing you to set Centaur s visual and or auditory feedback options as well as determine how often Centaur will update the Real Time Events Status window The options are detailed below Setting Alarm Acknowledgement Options The following options are available under the Alarms heading These options only apply if alarm acknowledgement is enabled see Enabling Alarm Acknowledgement on page 166 Display a Notification Message When the Display a notification message check box is selected a pop up window will appear to notify you that an alarm requiring acknowledgement has occurred when your Centaur integrated access control software is minimized or running in the bac
241. m the drop down list You can also select the desired relay and press the keyboard Enter key General Relay Properties From Relay Properties window select the Relay tab The Relay tab will allow you to view the component addresses as well as record the relay s name and any additional notes Viewing the Relay Address At the top of the Relay tab Centaur will display the relay s address as well as the address of the controller and site to which it is connected For details on relay addresses refer to Figure 22 on page 139 For details on controller addresses refer to Viewing the Controller Address on page 88 Manufacturing Access Control Since 1985 A REFERENCE MANUAL Figure 22 Relay Address Assignment for Each Controller Relays 1 and 2 are found on the controller Relays 3 16 are found on the relay expansion modules A maximum of two relay expansion modules can be connected to the controller RELAY EXPANSION MODULE 4 RELAY EXPANSION MODULE 2 Relay Relay Relay Relay Relay Relay Add 4 Add 6 Add B Add 11 Add 13 Add 15 Relay Relay Relay Relay Relay Relay Relay Relay Add 3 Add Add f Add 9 Add 10 Add i2 Add 14 Add 16 Typing the Relay Name Use the Name text field to identify the relay s use or location We recommend using a name that is representative of the device that it is controlling such as Alarm Sounder Relay Also refer to Typing Names and Notes on page 23 Typing
242. ma iT J mearch Hy res FR Aiea gy Acheariatrative Tooke z ok corneren re Fide and Folder Tavks x oie Mareen W Ferme Wen fie Cot Howe then fir Oy Copy thes fle gj Pubteh that fie ty the Wied Emal thm fe x Deir Hiri ile ther Places Ge Compal Panel heal He Desa gf Hy Computes My My Me heork Places View Bnd modify kca security pobty Such bs user nghi 1 36 eB Manufacturing Access Control Since 1985 FE j EY cs 7 REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration 4 Expand the Local Policies branch and click Security Options Local Security Settings Fl PE A e HAXER a Security Settings 19 Account Policies zl Local Policies E Audit Policy O9 User Rights Assignment L Security Options nol Accounts Guest account status Rd Accounts Limit local account use of blank passwords to console logon only Re Accounts Rename administrator account Ba Accounts Rename quest account a Public Key Polides Be Audit Audit the access of global system objects a Software Restriction Policies p Audit the use of Backup and Restore privilege H a IP Security Policies on Local BB shut che en slain di to log senya i age Machine pani Restrictions i in i Security Se Definition ngage sag syntax fa Devices Allow undock without having to log on Rel Devices Allowed to format and eject removable media Rel Devices Prevent users from installing printer drivers Devices Re
243. mber of stop bits required to communicate with the card enrollment unit connected to the selected COM port The stop bit is transmitted after each character Flow Control From the Flow Control drop down list select the flow control type required to communicate with the card enrollment unit connected to the selected COM port Flow control determines the timing of signals and enables slower speed devices to communicate with higher speed devices There are various techniques but all are designed to ensure that the receiving station is able to accept the next block of data before the sending station sends it Manufacturing Access Control Since 1985 REF Deleting a Site To delete an existing site from the Database Tree View window right click the desired site from the Sites branch and select Delete You can also select the desired site and press the keyboard Delete key Communicating with a Site In order to communicate with a site you must first successfully connect to the site go online To do so successfully the appropriate connections between the controllers and the Centaur Server computer must be completed Also the site s communication settings must be programmed appropriately as described in Site Communication Settings on page 29 The communication settings of each controller in the site must also be programmed appropriately as detailed in Configuring the Controller Communication Settings on page 93 Connecting
244. me you have created in the Select this object type Enter the Object Names to Select Select Users Contacts Computers or Groups 3 a x Object Types Users Groups or Other objects From this location test Locations Enter the object names to select examples Cent Check Names Advanced Cancel Manufacturing Access Control Since 1985 i 4 REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration 4 7 28 Click on the Check Names button to validate the name of the group and click OK Select this object tupe Select Users Contacts Computers or Groups Object Types Users Groups or Uther objects Erom this location test Enter the object names to select examples Centaur Group Locations Check Names Advanced 29 Select the two Allow check boxes in the z sa issi 7 x Permissions for Centaur window lands EUS pa Fa Secu Group or user names 8 Centaur TEST Centaur Remove Permissions for Centaur Allow Deny Local Access Remote Access Manufacturing Access Control Since 1985 r a i Lp REFERENCE MANUAL figuration 30 Click the Identity tab and select The interactive user check box If the option is grayed out close the SpxSvr Properties window and go to Program Files CDV Americas Centaur Centaur Server folder and run the Reg Centaur bat file This command will dea
245. ments the group s address by one Addresses 1 and 2 are reserved for the All and None groups Name Use the Name text field in the Group tab to identify your groups We recommend using a name that is representative of the group such as Management Floor Group Also refer to Typing Names and Notes on page 23 Notes Use the Notes text field in the Group tab to record any additional notes that may be required We recommend that you keep a log of what settings were changed and when they were changed Also refer to Typing Names and Notes on page 23 Text and Background Colour Risk Levels For Risk Levels Centaur provides the ability to customize the text and background colour of each event logged in Locator Use the Text Colour and Background Colour drop lists to make the selection When an event occurs it will appear in the Locator with its defined colours default or custom Manufacturing Access Control Since 1985 REF Floor Group s Floors and Schedules From the Floor Group Properties window select the Floors tab This will allow you to define which floors in a site that a user has access to and when access can be granted to these floors The floor groups are then assigned to cards in the cee a system see Floor Group on page 129 For more information on elevator control refer to Elevator Control on page 133 Floor Group Properties Assigning Floors to a Floor Group All the floors that ha
246. mmed as defined here 1 Access the Site Properties window by right clicking on the desired site from the Database Tree View window and selecting Properties from the drop down list You can also select the desired site and press the keyboard Enter key In the Site Properties window select the Visitors amp Parking tab activate the parking counter set the parking capacity and select a relay that will be activated when the parking is full See Visitors amp Parking on page 38 2 Program the door s reader for parking global entry or global exit The door cannot be used for any other purpose other than parking management Access the Door Properties window by right clicking on the desired door from the desired controller s branch within the selected site and clicking Properties from the drop down list You can also select the desired door and press the keyboard Enter key In the Door Properties window of the desired door select the General tab and set the Door Type to Parking Global Entry or Parking Global Exit see Door Settings on page 107 Please note that you cannot use any doors from the 2 Door Expansion Modules for parking management 3 You must create a user visitor group that will have access to the parking Expand the Users or Visitors branch within the Database Tree View window right click on the desired user or visitor group and click Properties Select the Parking tab set the parking capacity for this group and select a
247. n also select the desired data collector and press the keyboard Enter key Data Collector Properties Data Collector Properties Site 1 Data Collector 2 Cancel Name In the data collector Name text field type the desired data collector name We recommend using a name that is representative of the data collector Type and Serial Number Select the type of data collector and enter its serial number in the S N field Notes Use the Notes text field in the data collector tab to record any additional notes that may be required Also refer to Typing Names and Notes on page 23 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Guard Tour Adding Check Points From the Database Tree View window right click the Check Points from the Guard Tour branch and click New Check Point You can also click on Check Points and press the keyboard Insert key See Modifying a Check Point for more information Modifying a Check Point From the desired Site branch in the Database Tree View window right click the check point you wish to modify and click Properties from the drop down list You can also select the desired check point and press the keyboard Enter key Check Point Check Point Properties Site 1 Check Paint 1 Name SEs ana Type Dallas Chip Button S N fo Start Check Point Finish Check Point Name In the check point Name text field type the desired check point
248. n doors are set up for Entry and Exit see Door Type on page 107 the controller can be programmed to unlock both doors upon valid access Under the Lock Control Entry Exit Doors heading select one or more of the following check boxes Unlock Door 1 and 2 Unlock Door 3 and 4 Unlock Door 5 and 6 and Unlock Door 7 and 8 This feature is typically used when an entry and exit reader are set up on the same door and the door is using both a magnetic lock and an electromagnetic lock Enabling the Tracker LCD Display Option Each Tracker LCD is assigned to a specific door When this feature is disabled the Tracker LCD keypad will only display messages that occur on the assigned door Select the Tracker LCD Display Option When selected Tracker LCD keypad can be used to display the messages for both doors on the controller or 2 Door Expansion Module For example a Tracker LCD keypad assigned to door 1 will display messages occurring on doors 1 and 2 Door Expansion Module Configuration Select the Expander tab to program door and keypad configurations that will be used with the selected controller s 2 Door Expansion Modules CA A470 A A maximum of three 2 Door Expansion Modules can be used with each controller Controller Properties Controller Configuration Antipassback Expander Door expander 1 Reader 1 Standard 26 Bit Keypad 1 None Door Expander s Configuration az lO Notice that when you click the
249. nager The Centaur Service Manager allows operators to start and access the Centaur Integrated Access Control System A valid operator login ID and password are required to start Centaur For more information on how to use the Centaur Service Manager refer to Starting the Centaur Server and Software on page 11 Diagnostic Tool Centaur s new Diagnostic Tool allows you to view your system information to ensure all of the components required to run the Centaur software have been installed Within the Diagnostic Tool s menu you may save or copy your system information to a specific folder on your computer or send it directly to our technical support team in the event that you require assistance This tool is also helpful in assessing which prerequisites your computer may require when upgrading to the latest version of the Centaur software Badge Editor When the Badge Editor check box is selected the badge designer become available for the User Properties window allowing to design and print user badges For more information refer to Badge on page 50 Deleting a Security Level Permission or Operator To delete a security level or permission right click the security level or permission you wish to delete and click Delete from the drop down list You can also select the desired security level or permission and press the keyboard Delete key A dialogue box appears requesting confirmation You cannot delete the default All and None secu
250. name We recommend using a name that is representative of the check point Type Select the type of check point Choices are Dallas Chip iButton Input and Reader Serial Number When the selected Type is Dallas Chip iButton enter its serial number in the S N field Door When the selected Type is Reader select the door from the list Input When the selected Type is Input select an input from the list Manufacturing Access Control Since 1985 r ao Ha REFERENCE MANUAL Start Check Point Select the Start Check Point check box to automatically start a round when using this check point Finish Check Point Select the Finish Check Point check box to automatically end a round when using this check point Notes Use the Notes text field in the check point tab to record any additional notes that may be required Also refer to Typing Names and Notes on page 23 Rounds Indicates the rounds using this check point See Round Check Points on page 181 for more information Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Guard Tour Adding a Round From the Database Tree View window right click the Rounds from the Guard Tour branch and click New Round You can also click on Rounds and press the keyboard Insert key See Modifying a Round for more information Modifying a Round From the desired Site branch in the Database Tree View window right click the r
251. nd Holiday Groups 77 I Import Export 13 Import Export Application 78 Input 179 Input Configuration 93 Input Configuration for Anti passback Reset 96 Doors 113 Interlock 114 Mantrap 114 REX 114 Input Connections 144 Input Groups also see Groups 174 Assigning Inputs to an Input Group 174 Input Properties Bypassing Inputs 149 Details Tab 149 Input Configuration 149 Input Enabling Schedule 149 Input Response Time 149 Input Tab 147 Input Speed 149 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Input status 17 Input Status Display 222 Input Tab 147 Inputs 143 Inputs and Outputs Tab 113 Installation amp Use 1 Installation Centaur Administration Console Workstation 7 Installing updating the Administration Console 8 Installing Updating the Centaur Software 5 Instructions 166 Interlock Inputs 114 Interlock Override 130 Invalid Cards 48 131 Inverted Output 156 IP Address 93 K Keyboard 23 Keypad Schedule 110 Keypad Time out Output Activation Events 157 Keypad Type 92 Keypad Type Door Expansion Module 97 Keypad Controllers 91 L LAN 32 Languages 23 Latched Relay Activation Manually 220 Late to Open Unlock On 111 Launching Centaur 11 Limiting the Event Database s Size 234 Locator 13 18 Lock a Door Group 176 Lock Control 110 Lock Control Entry Exit Doors 97 Lock Door 219 Log Com Failure 95 Log File 17 Logon ID Setting the Operator s Access Rig
252. nded option checked is granted on the door Door Forced Open Relay From the Door Forced Open Relay drop down list select the relay that will be activated when the door if forced open Door Open Too Long Relay From the Door Open Too Long drop down list select the relay that will be activated when the door is open too long Activate Relay on Dual Badge From the Activate Relay on Dual Badge drop down list select the relay that will be activated when a user access this door by presenting his card twice to the door s reader within the defined dual badge activation time Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Doors laan A Pi Setting the Reading Options Under the Reading heading select one or more of the following check boxes These check boxes determine how and when a controller will read log the presentation of a card to the door s reader Opened When the Opened check box is selected the controller will continue to read cards presented to the door reader when the door is already opened This option is commonly used in conjunction with the Controller Anti passback Settings see page 96 in high traffic areas This prevents Anti passback errors from occurring due to users forgetting to wait until the door is closed before presenting their card Unlocked When the Unlocked check box is selected the controller will continue to read cards presented to the door s reader when t
253. nds Access time out Oft gt Door open too long Flashing v Waiting for keypad or Door unlocked On Anti passback status Keypad time out orf Access granted Access denied ermissions 3 Operators 2 COTY Command 13 Keypad time out 050 Wrong code on keypad fi 00 Door open 000 Door forced open 000 Door time out pre alarm 100 250 Door open too long 000 000 Door unlocked 000 000 If an output event is programmed with Flashing these Reset to factory defaut settings will determine the output flashing rate BELLE DELE Request to Exit granted Oo Le k Oo o Request to Exit denied Eg o o o Access time out Waiting for keypad NM on oOo Nm on Oo Cancel Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Outputs a aan Adding Outputs In order to add one or more outputs at least one site and one controller must be created If you have not created a site please refer to Sites on page 25 For more information on setting up a controller refer to Controllers on page 85 When adding outputs using the methods described in the following sections you will be required to select an address for each output These addresses represent a specific output on the selected controller as described in Figure 31 If you wish to add one output or multiple outputs at one time right cli
254. nfirm Password Fermissions 3 Inthe Password text field under Centaur Settings type the DVR Settings password that the operator will use when logging on to the Centaur DYF server see Starting the Centaur Server and Software on page 11 Logon ID Password 4 Inthe Confirm Password text field under Centaur Settings retype the Password text field to confirm the use of that password Confirm Password 5 Select the permission you wish to assign to the operator from the Permissions drop down list under Centaur Settings This determines which system characteristics can be viewed modified and or deleted and which manual controls can be performed Also refer to Permissions See page 187 6 In the DVR drop down list under DVR Settings select a DVR from the list DVRs must be created first from the Available DVR s window on page 200 7 Inthe Logon ID text field under DVR Settings type the name configured in the DVR device that will be used when viewing live video see Display Live Video on page 204 or when searching for video See Show Archived Video on page 203 8 Inthe Password text field under DVR Settings type the password configured in the DVR device that the operator will use when viewing live video see Display Live Video on page 204 or when searching for video see Show Archived Video on page 203 9 Inthe Confirm Password text field under DVR Settings retype the Pass
255. ng a Security Level Permission or Operator on page 185 allowing you to configure the selected item Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Operators Modifying a Security Level Permission or Operator To modify a security level or permission right click the security level or permission you wish to modify and click Properties from the drop down list You can also select the security level or permission you wish to modify and press the keyboard Enter key You cannot modify the default All and None security levels and permissions To modify an operator right click the operator you wish to modify from the Database Tree View window and click Properties from the drop down list You can also select the desired operator and press the keyboard Enter key You cannot modify the default Administrator General Properties for Security Levels Permissions and Operators From this window select the Security Level Permission or Operator tab This will allow you to view some of the system s component addresses as well record the name and any additional notes Viewing the Security Level Permission or Operator s Address At the top of the Security Level tab Centaur will display the selected site s address as well as the address of the selected security level The first security level created is assigned Security Level 3 as its address Every time a security level is added Centaur inc
256. nputs to manually enable disable in the same way by clicking on the inputs while holding down the keyboard Shift or Ctrl keys and right clicking on one of the selected inputs A drop down list will appear Select one of the two following actions from the list Also refer to Inputs on page 143 M When you click on the Input Status icon from the menu bar Centaur will display the current live status of the inputs in the Enable Input When an operator manually bypasses disables an input this command will reinstate the active state of the selected input Disable Input Allows the operator to manually bypass the selected input The active state of the input is reinstated when the operator uses the Enable Input command or when enabled by the inpu s enabling schedule see Selecting the Input Enabling Schedule on page 149 Figure 38 Display Input Status Click the Input Status icon P T 2 Ceniaur input Status View Be ed r Opn Jooo GSOCVOSR Ae Ej aeit ai Doa 00001 Contact i i Saket ET aj Door DOL REX Ls hlin AA uci fey Oo OO D2 Contact i Sanat Dp Waters 7 af Desr DOi i REK Alar s dP Unaengned Cards 0 Door 00103 Contact Sat aed 4 iF Acces Lavaki 4 41 Door DOL 07 REX sealed E oiis l iar GILDO Cantat Tadej a p Sedi 3 i Ds 00 08 AEX bie Cat hid mE coreroters z i Doo DOCS Contact ny orire Right click the aft ig i desired input p oan then select the p Bp Securty Loves 2
257. ntative of the DVR such as Cam1 Vid3 Also refer to Typing Member of channels 16 Names and Notes on page 23 IPAddress o 4 Fort 00000 Search Fort ooon Description DB Path a Use the Description text field to record a description for the DVR Also refer to Typing Names and Notes on page 23 Cancel Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 DVR Manufacturer From the Manufacturer drop list select the DVR manufacturer name corresponding to the physical DVR device Centaur supports the following manufacturers e Capture e Dahua e Dedicated Micros e Digiop e Digital WatchDog e Eneo e Everfocus e HIK i on Infinova e Microcom e Milestone e NUUO e Samsung e Sphere e ViewGate e Vivotek IP Camera e Vivotek LY Consult our website at www cdvi ca for the complete list of supported DVR Number of channels Select the number of channel available on the selected DVR Choices are from 1 to 64 IP Address Port and Search Port From the IP Address field enter the IP address of the DVR from the Port field enter its port number and from the Search Port field enter the port number that will be used to search for the specified IP address DB Path When Vivotek IP Camera is selected as the Manufacturer select the folder where the Vivotek database is located Refresh The refresh button is used to refresh the list of available DVRs
258. ntaur s FrontView If it is not selected Centaur s FrontView might display the 2 Door Expansion module as offline If you are not using Centaur s FrontView clear this feature check box Manufacturing Access Control Since 1985 Figure 12 2 Door Expansion Module s Door Configuration SERVER Deleting a Controller To delete an existing controller right click the desired controller from the Controllers and click Delete You can also click the desired controller and press the keyboard Delete key A dialogue box will appear requesting confirmation Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Controllers Online Controller Firmware Upgrades With the Centaur software there s no need to change the microchips of each controller Centaur can download the new firmware to the controllers in your installation in just a few easy steps When updating the controllers the controllers cannot control access or perform any other monitoring functions Therefore we recommend that firmware updates are performed when traffic is at a minimum and advise users of any interruptions that may occur The latest version of the controller firmware can be downloaded from our website at www cdvi ca Please note that the controller firmware consists of two files one with a HXL extension and the other with a HXH extension Also the file name will indicate the version and release number of the firmw
259. ntrol the maximum size that the event database can grow size When the Event database becomes too large you Can use the ene Purge all records from the event database and shrink the files to their Truncate feature to delete all records including events and alarms Bice ll op i gaa from the Event database This will reduce the database file to its If you wish to keep the events in the database for future reference make a backup before using this feature original size The Truncate feature will not affect the Main database only the Event database Perform the following to truncate events from the Event database We recommend you make a backup of the database before truncating it For more information see Backing Up Databases on page 232 1 After starting the Database Management Module as described in Starting the Database Management Module on page 231 the SoxDBase Centaur Database Utility window will appear 2 From this window select the Size tab 3 Click the Truncate button 4 Click Yes to confirm the truncate action or click No to cancel the truncate operation Manufacturing Access Control Since 1985 Attaching Databases This feature is for advanced users only and should not be used frequently Attaching a database will tell the SQL Server application used by Centaur to begin using the databases located in C Program Files CDV Americas Centaur Centaur Server Data Make sure that the Centaur3Main mdf Cent
260. ntrollers details Address Active Input config Cancel Create OOOO OOOOOOOOOOOOOOOOCCICC TS Controller 001 Controller 002 Controller 003 Controller 004 Controller 005 Controller 006 Controller 007 Controller 008 Controller 009 Controller 010 Controller 011 Controller 012 Controller 013 Controller 014 Controller 015 Controller 016 Controller 017 Controller 018 Controller 019 Controller 020 Controller 021 Controller 022 Controller 023 Controller 024 Controller 025 Controller 026 Controller 027 Controller 028 001 002 003 004 005 006 007 008 003 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 VII I KI KIKI KI KI KI KI KI KI KI KI KI KI KI KI KI KI KIKIKI KT KIKIKI NC NC NC NC NC NC NC NC NC NC NC NC NC NC NC NC N C NC N C NC N C NC N C NC NC NC NC NC Back v Next Cancel Manufacturing Access Control Since 1985 Under the Create label select the check box next to each door address you would like to add for each controller To change the door s name double click on the name of the door and type the new name From the Contact drop down list select the contact s zone input address If there is no contact associated with the door select None From the REX drop down list select the REX s zone input address If there is no REX associated with the door select None Door default
261. nufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control ar INTEGRATED ACCESS CONTROL Chapter 8 Controllers What Will Find POGiING CONWONCTS 22050 32cuebe gener eubecedes ded nb oca g soar ewe eek oe oe weet et et ew het eerteeet oesee se ose 86 WOeGiiVvina a COMMOICR 2 lt 4 5 ac4 6am abr es ode dade oe eo es ae ee we ls we ee hares a Fae Se 88 DeLa CONTO aaiae oie ee eee ew eRe es ewe eee eee E eee eee eh eee Sees eee eee eee eee ee 98 Online Controller Firmware Upgrades 0 0 ce eee ee ee eee eee eee 99 DOWMCAG is riuaende wed hth eee ee eee ea een eee Cae eee eee bed E eae e hes ee et ae a 100 Other Controller Management Options 0 aaaea ee ee eee eee ees 101 Controllers are the heart of the Centaur integrated access control system The database is distributed to all controllers allowing them to make decisions in a fraction of a second whether or not the managing computer is online These controllers also feature online upgradable firmware and a real time clock Program each controller individually by defining its door input and output configuration as well as setting its anti passback options For additional communication settings refer to Sites on page 25 Each site can support up to 256 controllers Manufacturing Access Control Since 1985 REF Adding Controllers Perform the following to add one controller or multiple controllers at one
262. o one controller instead of all 50 controllers If you Clear the Distributed Card Programming check box Centaur sends all cards to all controllers in the system Extended Access Levels Levels 3 4 By default up to two access levels can be assigned to each card If two access levels are assigned to a card access is granted as long as one of the two access levels is valid when the card is presented refer to Access Level on page 129 Selecting Extended Access Levels Levels 3 4 check box will allow up to four access levels The extended access levels feature requires firmware R2 C3 70 and higher in order to function correctly Manufacturing Access Control Since 1985 REF Selecting the Cards Maximum Family Number Each access card has a unique number consisting of two parts The Family Number is always the first part of the number and is usually followed by a colon e g 247 1234 and the card number The family number can be found printed directly on the card or written on the box label From the Maximum Family Number drop down list select the appropriate value as detailed below Table 1 Selection of the cards maximum family number MAXIMUM FAMILY NUMBER VALUE LENGTH OF THE FAMILY CODE 65 535 Family code at 2 Octets 16 777 215 Family code at 3 Octets 4 294 967 295 Family code at 4 Octets Selecting a Site s Global Anti Passback Reset Schedule In the Global Anti passback reset schedule list select the schedule
263. o the card reader in order to grant access to the door In the User badge activation time text field type a value between 1 and 999 seconds Default 0 second User validation interval When a user validation must be made enter the number of access frequency that will be used to invalidate a user and proceed to the validation This field is only available when Global Exit Validation or Global Entry validation has been selected as the door type see Door Type on page 107 Enter a value between 1 and 999 access Default is 0 Door Inputs and Outputs The Inputs and Outputs tab will allow you to specify the configuration for the door input REX input and its interlock mantrap input as well as select which output s can be activated for the selected door Assigning a Door Input After installing a door contact use the Door Input settings to enable the controller to supervise the status of a door open closed A door input is used 20 To generate Door Open and Door Forced events Relock Disabled 5 To generate Open Too Long and Door Left Open events see Setting the Schedule Always z Door Timers on page 112 I Unlock on REX Normal To effectively use the Anti passback feature see Controller Anti passback Settings on page 96 Interlock Input For Interlock mantrap applications see Assigning an Interlock Input on page 114 Schedule Always 7 Perform the following to set up a door input Output
264. ograms Accessories Command Prompt a The Command Prompt window will appear Type cd program files cdv americas centaur centaur server and press Enter b Type spxsvr exe service and press Enter Close the Command Prompt window LY Ensure that there is a space between spxsvr exe and the front slash cy Command Prompt Microsoft Windows KP Version 5 1 2668 LC Copyright 1985 26601 Microsoft Corp C Documents and Settings fdugrescds program files cdyv americas centaur centaur server C2 Program Files CDU Americas CentaurCentaur Server spxsuplexe service C Program Files CDU A mericas Centaur Centaur Server Manufacturing Access Control Since 1985 REFERENCE MANUAL J R 5 1 ind Using Centaur 7 Click Start gt Programs CDV Americas Centaur Centaur Service Manager 8 The Centaur Service Manager window will appear Select the Auto start service when A Centaur Service Manager ABE amp Start Continue OS starts check box 9 If you want the Service Manager to verify every 5 minutes if the service is running or not and then start it if it is not running select the Auto restart service when stopped check box Close the window IV Auto start service when OS starts 10 Restart your computer The Centaur Service Manager will now start automatically To run T Auto restart service when stopped Centaur you will only need to click Start gt Programs CDV Americas Centaur Status Running Administrat
265. on e Access events Refer to Display Access Events on page 218 for more information e Abnormal events Refer to Display Abnormal Events on page 218 for more information e Acknowledged events Refer to Display Acknowledged Events on page 218 for more information The following sub menus allow to select what devices will be displayed in the Events Status window The following selections are also available from the Toolbar see Toolbar on page 19 e Door status Refer to Displaying and Controlling the Status of a Door on page 219 for more information e Relay status Refer to Displaying and Controlling the Status of a Relay on page 220 for more information e Controller status Refer to Displaying Controller Status on page 221 for more information e Input status Refer to Displaying and Controlling the Status of an Input on page 222 for more information e Output status Refer to Displaying and Controlling the Status of an Output on page 223 for more information e The Options menu gives access to the following e Options Refer to General Centaur Options on page 210 for more information e Events Colours Refer to Event Colour Definitions on page 212 for more information e Operator Timeout Refer to Operator Timeout on page 213 for more information e Log File Refer to Log File on page 213 for more information Manufacturing Access Control Since 1985 r a
266. onal notes that may be required We recommend that you keep a log of what settings were changed and when they were changed Also refer to Typing Names and Notes on page 23 Site Communication Settings Select the Comms Communications tab from the Site Properties window Each site i f Site Properties can be connected either locally remotely or through a TCP IP connection Visitors amp Parking Floors CCT CMPP Site Comms Users Cards Custom Fields When a site is communicating online with the Centaur Server computer you will not be able to modify the site communication settings This is to prevent any Type accidental disconnection from the Centaur Server computer Baud Fate Speed Schedule Selecting the Site Communication Type RCIA From the Type drop down list select the method of communication between the COM Port 2 CTL 65 128 None site controllers and the Centaur Server computer Use one of the following three COM Port 3 CTL 129 192 None methods COM Port 4 CTL 193 256 None Phone Number Modem None IM Update CTL time automatically every 15 minutes Enable Offline Buffering Outbox Manufacturing Access Control Since 1985 ns j is REFERENCE MANUAL F Hal i oO i E Fi Th n aA r Direct Serial Port Select this method if this is a local site that will communicate with the Centaur Server computer through the COM or USB port After selec
267. ons menu and select Event Colours 2 From the Event Colours window highlight the desired event 3 Clear the Use System Colours check box 4 Select the desired colours from the Text Colour and Background Colour drop down lists 5 Repeat steps 2 to 4 until the desired events are set 6 Click OK Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Options a aa Figure 34 Customizing Event Colours Event Colours U Cenir AE vrais Gia yis giiia Beib Hh ahea a i Stet Jerid SOG BEE FF K Eear Erdi F F Pend Pia Server Started bagri imm I i Kini ii A TAPI error cannot initialize modem TCP IP Communication Error TCP IP Incompatible WinSock Version TCP IP Invalid TCP IP Address Port Number elie DNR WOM Bld L N AA Unknown modem error Waiting for floor selection Waiting for keypad code Text Colour ls Background Colour i Use System Colours Cancel Operator Timeout The Centaur administration consoles can be programmed to log off automatically when no action has occurred within the software i e programming viewing system status etc for a specified amount of time Tineo OOD Operator Timeout Minutes 1 From Centaur s main menu select the Options menu and select Operator Timeout Cancel 2 The Operator Timeout window will appear In the Timeout text field type a value in minutes from 0 to 65536 To disable this feature type 00000 3
268. ons tab click Add Program 7 The Add a Program window will appear Click Browse and select the spxsvr exe file located by default in C Program Files CDV Americas Centaur Centaur Server and click OK 8 The Windows Firewall window will re appear From the Exceptions tab make sure that the spxsvr exe check box below the Programs and Services heading is selected 9 From the Exceptions tab click Add Program Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration Windows Firewall sources such as the hieme iie af you choke the Windows Firag g tuned of Tou computers of nek of attacks and inteusicns from culsede recommend thst General tab and eslect On Gi Fia and Pintar Shang H nee Eqpicrer E Java TM 2 Platform Standard Edtion binary Add a Program To allow communications with a program by adding itto the Exceptiors list select the program or click Browse to search for one that is not isted Programs cal PQBoot jor Windows amp Pro Report Ci QuickTime Player Quick Tour EEE Set Configuration E Skype Sse Sola Bug EN Spider Solitaire Cl spxSwr exe em StatsReader 2 1 Path C Program Files CDV Amercas Centaur Cent Change scope 10 The Add a Program window will appear Click Browse and select the sqlsevr exe file located by default in C Program Files Microsoft SQL ServerMSSQL Binn and click OK 11 The W
269. oot expand the Component Services Computers and My Computer E Component Services COM DCOM Config Distributed Running Applications Transacti Processes Component Services 9 Computers i m My Computer 4 H a Active Directory Users Stop MS DTC i J Event viewer Local H S Services Local Refresh all components View New Window From Here Properties Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration 15 In the Default Protocols tab check if the Connection oriented TCP IP exists in the DCOM Protocols window if not add it clicking the Add button ziz General Options Default Properties fl Oera MSDTC COM Security 7 DEOM Protocols SrETete eet tee tenetecnttaratceteseteertrerteretentaratecrttett crete Connection sete Te Fi if Hove Dowel Properties Description The set of network protocols available ta ECOM on this machine The ordering of the protocols reflects the priority in which they will be used with the top protocol having first priority O Manufacturing Access Control Since 1985 16 In the MSDTC tab check if the Service Control Status for MSDTC is running My Computer Properties i E A alx G eneral a Options D efault Properties Default Protocols MSOTC COM Security Def aut Coordinator 7 PoC eee Eee Eon g Use loca
270. or Input 113 Door Open Pre alarm Output Activation Events 158 Door Open Too Long Output Activation Events 158 Door Open Output Activation Events 157 Door Properties Door Tab 105 Elevator Control 117 General Tab 107 Inputs and Outputs 113 Door status 17 Door Tab 105 Door Timers 112 Door Type 107 Door Unlocked Output Activation Events 158 Doors 103 Doors amp Schedules Access Levels 123 Download 100 DVR Setting the Operator s Access Rights 188 E Editing a Scheduled Database Backup 239 Elevator Control 117 133 Elevator Door Type 107 E Mail Activation 168 Emp Num as Key 44 Enable a Door Group 176 Enable automatic user visitor import from SAP generated file 43 Enable Card Traced 131 Enable Door Manually 219 Enable Input 222 Enabling Schedule for Inputs 149 Enabling the Access Level 122 End Date 48 131 End Round 224 End Time 82 Energized Lock Control 110 Energized Relay State 141 Enroll 55 Entry Door Type 107 Entry Global 108 109 Entry Exit Unlock Both 97 Event Colour Definitions 212 Event Database 230 Event Database Size 234 Event Definition 161 Alarms Tab 166 Command 169 General Tab 164 Instructions 166 Requires Acknowledgement 166 Schedule 164 165 166 168 169 Selecting Events 162 Video Switcher Protocol 169 Event Display 218 Event Options 211 Event Request 95 Events Display Abnormal 218 Display Access 218 Display Acknowledged 218 Display All 218 Display Guard Tour Events 218 W
271. or in the file names Manufacturing Access Control Since 1985 Restoring Databases REFERENCE MANUAL CENTAUR 5 1 Database Management i ar Restoring databases will bring back all information saved in a backed up database file bak so it can be used with the Centaur software Performing a restoration will attach the back up files to the SQL Server application and save them in C Program Files CDV Americas Centaur Centaur Server Data This will overwrite any databases currently attached If you are having problems with a database or if you have experienced a loss of data or if your database is corrupted due to a computer hardware failure you can restore any database that you have backed up Please note that you will have to add any programming changes that were done since the last backup was created If events are also restored all events that have occurred since the last backup will be lost 1 After starting the Database Management Module as described in Starting the Database Management Module on page 231 the SoxDBase Centaur Database Utility window will appear From this window select the Backup tab Select the databases you wish to restore by clicking the Main Database Event Database Pro Report Database and or Tracker Database check boxes For more information refer to What are the Centaur Databases on page 230 In the text field corresponding to the selected database s type the full path an
272. or you must set up the following items in the order specified below etd BY ets 1 ites 1 e Security levels determine whether an operator can view modify tot i i F j and or delete system characteristics and whether the operator can 5 Ao di perform manual controls such as locking and unlocking doors aS Visitors 1 ae Unassigned Cards 2 Re Access Levels 3 c fii Holidays 1 H E Schedules 4 Controllers 1 remotely The system characteristics consist of all the elements found in the Database Tree View window such as controllers doors and events For more information refer to Security Levels on page 186 Security levels are then assigned to a permission e Permissions determine which sites the operator is authorized to E a access and the operator s security level for each site For more HQ Groups information refer to Permissions on page 187 Permissions are PS me then assigned to an operator J y one Program a security level and La Security Level 003 wm iia assign it to a permission o o amp Output Timings T Permissions 3 eal e Operators determine who can access the Centaur software to program and monitor the integrated access control system Define the login ID and password assign a permission and select which software modules will be accessible For more information refer to Operators on page 188 Program a permission and Sa route assign it to an operato
273. ormation on input groups refer to Groups on page 1771 Manufacturing Access Control Since 1985 REF 3 When an input is programmed to bypass other inputs the Bypass Delay determines how long the input s selected in step 1 and step 2 will remain bypassed The controller will use the Bypass Delay of the input being bypassed not the input Bypass Delay timer of the triggered input In the Bypass delay field type a value from 0 to 65535 seconds If you type a value of 0 second the controller no longer follows the timer and becomes latched This means that the input s will be bypassed until the selected input is triggered again Figure 28 Example of Bypassing Inputs In this example when input 1 is triggered it will bypass input 2 for the period defined by input 2 s Bypass Delay 25 seconds Input 1 Input 2 Input Properties Input Properties Input Details Input Details Configuration Normally Closed v Configuration Normally Closed ii Enabling Schedule Always x Enabling Schedule Always y Input response time 00500 ms Input response time 00500 ms Input restore time 00500 ms Input restore time 00500 ms Bypass delay F Bypass delay 00025 This input activates relay None This input activates relay None 7 This input bypasses input MEA v This input bypasses input None Activates relay group None Activates relay group None Bypass input group None Bypass input group
274. ound you wish to modify and click Properties from the drop down list You can also select the desired round and press the keyboard Enter key Round Round Site 1 Round 1 Name Found 001 gt Schedule Never Round Check Paints Check Paint Eaa SR OK Cancel Name In the round Name text field type the desired round name We recommend using a name that is representative of the round Schedule From the Schedule drop down list select the schedule that will determine when the round is valid When the selected schedule is valid the guard can start his round by going through the list of check points For more information on schedules refer to Schedules on page 79 Round Check Points Allows to set up and configure all the required check points for the round Manufacturing Access Control Since 1985 r ao f Lp REFERENCE MANUAL e User the sign to add a new check point to the list Add Check Point Check Point Minimum Time 0 00 30 HH MM SS Maximum time 00 01 00 HH MM 55 Canos e Use the sign to remove the selected check point from the list e Use the up or down arrow to move the selected check point into the list Notes Use the Notes text field in the check point tab to record any additional notes that may be required Also refer to Typing Names and Notes on page 23 Manufacturing Access Control Since 1985 REFERENCE MANUA
275. p Headcount Site branch in the Access granted i Front Door Frank Smith Default Company schedule Data base Tree View Production Entrance John Dole Default Company Screen Always window Right click the Else A Disk Always desired event and select Properties You can also Device Activation select the desired event Action None and press the keyboard Time E E5535 ms max Enter key The event s Devic i properties window will siete lo appear 2 A list of devices related to the selected event will appear in the event s properties window From the Settings for list select either Default see Programming a Default Event Definition on page 163 or Devices see Programming a Device Specific Event Definition on page 163 If necessary select one or more devices from the list 3 A list of users related to the selected event will appear in the event s properties window From the Users list select either Default see Programming a Default Event Definition on page 163 User or Visitor see Programming a Device Specific Event Definition on page 163 If necessary select one or more users from the list 4 Program the events definitions using the General tab see Event Schedules and Device Activation on page 164 the Alarms tab see Alarm Acknowledgement on page 166 the E Mail tab see E Mail Activation on page 168 the Video tab see Event Activated Video Con
276. puter More Actions p 2 COM Applicatio zs 2 2 t A DCOM Config t 2 Running Processe Sean sdchange sdclt SDRSVC oes Inning Pr Service Defaults t 2 Distributed Transi E s ShapeColle Share SharedAcc Sharing Shell Manager Elevat Chkdsk s F Shell Shell Shell Execute Shell FMIFS Shell Comput Comput Hardware Wrapper Hardwa s s F SLLUA SLUI PPSurrogate 17 The SpxSvr Properties window will appear From the Authentication Level drop down list select None Application Name SpxSvr Application ID E2199D32 D198 11D2 A6F9 00105A1335A1 Application Type Local Server Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration 18 Click the Location tab and select the Run application on this computer check box The following settings allow DCOM to locate the comect computer for this application f you make more than one selection then DCOM uses the first applicable one Client applications may overde your selections E Run application on the following computer Browse 19 Click the Identity tab and then select The interactive user check box pirea a Password Confirm password The system account services only 20 Click the Security tab to configure the user that will have the right to SpxSvr Properties Ex access the Centaur Server ae ew e Under Launch and Activat
277. r Operators 2 Administrator l amp Operator 002 Program an operator CCTY Commands 1 Centaur includes two default security levels and two default permissions All and None which cannot be modified or deleted The All security level and permission enable you to program view and delete any system characteristic The None security level and permission will deny any access to all system characteristics Unlike security levels the permissions are not programmed per site instead they apply to the entire integrated access control system Centaur includes one default operator Administrator which cannot be modified except for its logon ID and password or deleted The Administrator has full access to all system characteristics in all sites Adding a Security Level Permission or Operator To add a security level or a permission right click Permissions in the Database Tree View window or right click Security Levels from the desired Site branch in the Database Tree View window Select New Permission or New Security Level from the drop down list You can also select Permissions or Security Levels and press the keyboard Insert key To add an operator right click Operators in the Database Tree View window and select New Operator from the drop down list You can also select Operators and press the keyboard Insert key After adding a security level permission or operator the appropriate Properties window will appear see Modifyi
278. r Each controller s door elevator cart can be programmed with a general public access schedule by assigning a schedule to each of the door s assigned floors This defines for the selected door which floors are accessible to the general public no access card required and during which time period Please note that to program these schedules the door type must be set to Elevator see Door Settings on page 107 FAN 2 Door Expansion Module doors 3 to 8 Only the controller s doors can be set for elevator control Setting Up a Door Public Access Schedule Perform the following to assign a schedule to each floor 1 To assign a schedule to a floor select the check box associated with the desired floor The Schedule drop down list will become active 2 From the Schedule drop down list select the schedule you would like to The Elevator Floor Schedule cannot be used with doors located on a Door Properties REFERENCE MANUAL CENTAUR 5 1 Doors Cancel assign to the selected floor Although there is only one Schedule drop down list you can assign a different schedule to each selected floor The selected schedule will be assigned to the highlighted floor whose check box is selected 3 Return to step 2 to assign another floor and schedule or click OK to save and exit Example In Figure 16 the Parking Level 2 floor is enabled and has been assigned the Weekly General
279. r This means that the two users will have to present their cards one after the other within the defined delay as defined in the Two card rule delay on page 113 to unlock the door Reading Devices From the Reading device drop down list select the device that will be used to obtain access to the door either a keypad or a reader Reader If you are connecting a reader or a reader and a keypad select Reader from the drop down list The controller will recognize the use of a keypad if a keypad has been set up in the controller door configuration see Selecting the Door Reader and Keypad Configuration on page 91 Keypad If you are connecting only a keypad no reader to the door input select Keypad from the drop down list Manufacturing Access Control Since 1985 REF Lock Control From the Lock Control drop down list select the activation locking method that will be used by the door when an Access Granted or Unlock event occurs De energize To operate in fail secure mode apply power to unlock a door select De energize from the Lock Control drop down list This means the selected lock output on the controller will remain de activated When an Access Granted or Door Unlocked event occurs the controller will apply power to the lock output If an electric door strike is used this mode will keep the door locked during a total power loss Energize To operate in fail safe mode remove power to unloc
280. r must be programmed in the server The DCOM Configuration Utility is automatically installed with Windows 2000 2003 XP Vista operating systems We recommend this settings to be done by a network administrator Manufacturing Access Control Since 1985 r a i Lp REFERENCE MANUAL figuration DCOM Configuration for Windows Vista To be able to configure the DCOM on Windows Vista operating system you have to be logged in as Administrator Verifying DCOM Before going on with the DCOM configuration you can perform the following steps to verify the integrity of your DCOM 1 From the taskbar click Window icon gt in the Search field type dcomenfg exe in the text box and then click OK Fy Ti 2 The Component Services window will appear Within the Console Root folder left side of your screen expand the Component Services branch the Computers branch and then the My m m gt Computer branch Ensure that the Running g EEEE Processes folder appears in the My p Services Local Computer branch If it does not appear you must repair DCOM see below acca amp File Action View Window Help x e s AMB ali ABa a E H Component Services Computers More Actions D Component Sanica ol i D fue Anion yew Window Help x t ANAE z cl ea Ca E E 3 Click the COM Applications branch The components of this branch will appear on the right of your screen If you get
281. rchive video click on the Display Archived Video icon from the Centaur toolbar If more than one video is available a window is displayed allowing you to choose the desired DVR Select the DVR and click OK The DVR Video Display window appears The DVR Name displays the DVR selected Selecting an Archived Video For an archived video select the start and end time for the video you want to search for Note that the end time is only available when the DVR is supporting the end time feature Using DVR Command Buttons The DVR command buttons at the bottom of the DVR Video Display window allows to respectively play video play video frame by frame pause stop and capture frame Capture frame is only available when the DVR is supporting this feature Capturing and Saving a Frame To capture a frame press the frame capture button To save the captured frame select the Picture Folder and file name then press OK Manufacturing Access Control Since 1985 feet T eae Erai Tiree am Poke joj ujm s Poo o oo REFERENCE MANUAL Display Live Video The Centaur DVR allows to watch a live video from a specific camera To watch a live video click on the Display Live Video icon from the Centaur toolbar If more than one video is available a window is displayed allowing you to choose the desired DVR Select the DVR and click OK The DVR Video Displa
282. re required for access see Use Keypad on page 130 the output can be activated when the reader grants access but no P I N is entered on the keypad within 30 seconds Wrong code on keypad The output can be activated when an incorrect code is entered on a keypad after a valid access card is presented see Use Keypad on page 130 Door open The output can be activated whenever an access control door is opened see Assigning a Door Input on page 113 Also when using this event the output can be latched Manufacturing Access Control Since 1985 REF Door forced open The output can be activated whenever an access control door is forced opened see Assigning a Door Input on page 113 Also when using this event the output can be latched Reader disabled The output can be activated whenever a programmed door has been manually disabled see Displaying and Controlling the Status of a Door on page 219 Also when using this event the output can be latched Door open pre alarm The output can be activated whenever a Door Left Open event occurs This occurs when the door has been open for the duration of the Pre alarm timer see Pre alarm Time on page 112 Also when using this event the output can be latched Door open too long The output can be activated whenever a Door Open Too Long event occurs This occurs when the door has been open for the duration of the Open Too Long Timer see
283. red cards Please note that the 256 access levels include two default access levels All and None which cannot be modified or deleted The All access level provides access to any door that exists in the site 24 hours a day including any programmed holidays The None access level will deny all access at all times For information on how the access levels are used refer to Cards on page 125 A _ In order to program the access levels you must first program the Sites on page 25 the Doors on page 103 the Controllers on page 85 and Schedules on page 79 Manufacturing Access Control Since 1985 REF Adding an Access Level To add an access level right click Access Levels in the desired Site branch and click New Access Level from the drop down list You can also click Access Levels and press the keyboard Insert key to add an access level After adding an access level the Access Level Properties window will appear allowing you to configure the access level See Modifying an Access Level for more information Modifying an Access Level From the desired Site branch in the Database Tree View window right click the access level you wish to modify and click Properties from the drop down list You can also select the desired access level and press the keyboard Enter key You cannot modify the default All and None access levels General Access Level Properties From the this window select the Access Leve
284. red action system If you wish to manually change the status of a relay right click the desired relay You can also select multiple relays 9 When you click on the Relay status icon from the menu bar Centaur will display the current live status of the relays in the to manually change in the same way by clicking on the relays while holding down the Shift or Ctrl keys and right clicking on one of the selected relays A drop down list will appear Select one of the following actions from the list Also refer to Figure 36 on page 221 Activate Relay Activates toggles the selected relay for the period specified by the relay s Activation Time see Setting the Relay Activation Timer on page 140 If a relay s Delay on Activation Time is programmed see Setting the Relay Delay Time Before Activation on page 140 the relay will only activate after this delay has elapsed Activate Relay Timed Activates toggles the selected relay for a programmed period of time When you select this action the Activation Time window will appear In the Time Seconds text box type a value from 1 to 65535 seconds and click OK Activate Relay Latched Activates toggles the selected relay until an operator deactivates the relay using the Deactivate Relay manual command see Deactivate Relay on page 220 or until deactivated by the relay s schedule see Selecting a Time Relay Activation Schedule on page 139 Dea
285. red site name We recommend using a name that is representative of the site such as Manufacturing Plant Montreal 2 From the Communication Type drop down list select the desired connection method For more detailed information on the available types refer to Selecting the Site Communication Type on page 29 The site configuration wizard is dynamic therefore only options corresponding to the selected communication type will be available Other options will be unavailable Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Sites am y 3 Set the remaining available options as required and click Next For more information Controller A Door Setup EA on these options which Fisa pria lha numba ol Cerile sa raiak ika es be iy iha S z Bopi dalsi pafigi io all controler include Baud Rate Phone Nunber iet E f Wechecaly takap Abeh conici Number Modem and Serial Conhc n DOHA Saingi j r Disa Dalani Sittings Settings COM Port aceon E Assignment refer to Site IP Adeheae trick Tome OG Ste Communication Settings on Pint Murd T pem page 29 igat Corg NE Inet Reade Type Binda E Nun Doon o Lack Comino DAA 4 From the Number of Controllers drop down list select the number of a Tach Cancel controllers you would like to add to this site 5 If you would like to apply the same controller and door settings to all controllers select Apply default set
286. rements the item s address by one Addresses 1 and 2 are reserved for the All and None security levels At the top of the Permission and Operator tab Centaur displays the address of the selected permission or operator The first permission created is assigned Permission 3 as its address and the first operator created is assigned Operator 3 as its address Every time a permission or operator is added Centaur increments the item s address by one Permission addresses 1 and 2 are reserved for the All and None permissions and operator address 1 is reserved for the Administrator operator Typing the Security Level Permission or Operator s Name In the Name text field type a descriptive name for the security level e g Level 1 permission e g System Master or operator e g John Doe Also refer to Typing Names and Notes on page 23 Security Level Security Level Database Operations Site 1 Security Level 3 Name Leva o H Motes F Operator Permissions Permission Sites and Security Levels Permigsior 3 Name System Master Operator Properties Operator Operator Details Modules Operator 2 Hame lJ ohn Doe OK Cancel Typing the Security Level Permission or Operator s Notes In the Notes text field type any important explanations of the selected item and its use Also refer to Typing Names and Notes on page 23 Manufacturing Access Cont
287. ring Access Control Since 1985 REF ind Using Centaur Centaur Editions Centaur software is available in five editions N A 128 128 128 128 DVR N A Yes Yes Yes Yes N A Yes Yes Yes Yes N A Yes Yes Yes Yes N A Yes Yes Yes Yes N A Yes Yes Yes Yes Dial Up connection Yes Yes Yes Yes Yes TCP IP connection Yes Yes Yes Yes Yes Comes with one workstation license Centaur will run like the Starter Pack when no hardlock key is detected Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Installing and Using Centaur a G A ma Installation Overview This section details how to install the Centaur software including the Centaur Server and Administration Console Workstation available on the Centaur 5 1 CD Each edition of the Centaur software has two different applications the Server and the Administration Console Workstation Please note that the terms Administration Console and Workstation both refer to the same software User Interface and are used interchangeably Centaur Server The Centaur Server manages the controllers and maintains the integrated access control system s databases The Centaur 5 1 CD includes the Centaur Server the Administration Console several software features and the reference manuals for these software features which are all automatically installed together The reference manuals for Centaur hardware components are also available on the Centaur 5 1 CD
288. riods which determine when that schedule will be valid Each period in a schedule specifies the days and times the schedule will be valid For example when programming doors a schedule can be assigned to a specific door and the schedule will dictate when the door can be accessed without the use of a card Manufacturing Access Control Since 1985 Table 2 Where schedules can be used on o O meroon 1 Please note that Centaur includes two default schedules Always and Never which cannot be modified or deleted The Always schedule is valid 24 hours a day 365 days per year including any programmed Holidays The Never schedule is invalid at all times Adding a Schedule In order to add a schedule at least one site must be created If you have not created a site please refer to Sites on page 25 To add a schedule right click Schedules in the desired Site and click New Schedule from the drop down list You can also click Schedules in the desired Site and press the keyboard Insert key After adding a schedule the Schedule Properties window will appear allowing you to configure the schedule see General Schedule Properties on page 81 Modifying a Schedule From the desired Site in the Database Tree View window right click the desired schedule from the Schedules and click Properties You can also click the desired schedule and press the keyboard Enter key You cannot modify the default Always and Never schedules
289. rity levels and permissions To delete an operator right click the desired operator from the Database Tree View window and click Delete from the drop down list You can also select the desired operator and press the keyboard Delete key A dialogue box appears requesting confirmation You cannot delete the default Administrator Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control ar INTEGRATED ACCESS CONTROL Chapter 20 CCTV Commands What Will Find POGiNG a COM Command 2 204 ote tes ee thee iee ik ote s ood cc pce e eae ee ote Sees et eet ot eeu Ea beeee ae ee x 192 Modifying a CCTV Command Deleting a COTY COMMA s euceaereetecce cn tee teas IESE SEREDE es BU Eee eee uke ete eee seeds ete ee 193 When you activate CCTV control Centaur can send a detailed CCTV command to a video switcher whenever an event assigned with that command occurs The CCTV command will tell the video switcher to switch to a specific camera and monitor You can even set the cameras to tilt pan and or zoom Prior to assigning CCTV Commands to an event refer to Event Activated Video Control on page 169 you must program the CCTV commands which will define how the video switcher will react when selected system events occur Manufacturing Access Control Since 1985 REF Adding a CCTV Command Right click the CCTV Commands branch in the Database Tree View window and select New CCTV
290. rm sounders or other devices such as lighting control units and air conditioners The relays can be programmed to follow a schedule or to activate upon the validity of a schedule and disable after a programmed timer has elapsed In order to add or create one or more relays at least one site and one controller must be created If you have not created a site please refer to Sites on page 25 For more information on setting up a controller refer to Controllers on page 85 When adding relays using the methods described in the following sections you will be required to select an address for each relay These addresses represent a specific relay on the selected controller or on a Relay Expansion Module connected to the controller see Figure 22 on page 139 Manufacturing Access Control Since 1985 r ao Ha REFERENCE MANUAL Adding Relays If you wish to add one relay or multiple relays at one time right click Relays from the desired controller in the Database Tree View window and select New Relays You can also select Relays and press the keyboard Insert key Select the desired relay address es and click OK After adding the relay s you will have to configure them within the Relay Properties window Cancel see Modifying a Relay Add Devices Modifying a Relay From the desired controller s branch in the Database Tree View window right click the relay you wish to modify and click Properties fro
291. rmation tab and use these fields to record any personal information about the user Persona infcrrston Custeen Feta Bodge Cards Door Access Fights Last Accesa Vistom Asseta Motes Browse your computer for an existing picture Acquire the user s picture via a camera Crop the user s picture Delete the user s picture from the database Acquire the user s signature via a signature pad w e e o e u Delete the user s signature from the database Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Users and User Groups User s Personal Information Enter the user s Address City State Province Country Region ZIP Postal Code Phone and E mail information Up to three Phone and E Mail entries is available using the arrow at the right of the specific field These fields are optional User s Signature You can associate a signature to a user which can be used for visual verification Acquire the user s signature via a signature pad Click on this button to acquire the signature using a signature pad Compatible signature pads are Topaz Signature Gem and others Delete the user s signature from the database Click on this button to remove the signature from the database User s Picture You can associate a picture to a user which is commonly used with Centaur s visual authentication feature When a user card is presented to a reader Centaur s visual aut
292. rms tab 3 Enable the alarm acknowledgement by selecting the Requires acknowledgement check box For more information refer to Enabling Alarm Acknowledgement on page 166 4 Inthe Schedule drop down list select the desired schedule For more information refer to Selecting the Alarm Acknowledgement Schedule on page 166 5 Type the desired instructions and details that the operator will see on the screen into the Instructions text field For more information refer to Typing the Instructions for the Selected Alarm on page 166 Enabling Alarm Acknowledgement Select the Requires acknowledgement check box to enable the Alarm Acknowledgement feature If the check box is cleared the feature will be disabled and the Schedule drop down list and the Instructions text field will be unavailable If this feature is enabled you can also use Centaur Wave Player see page 241 to program Centaur to play a sound every time the selected event occurs Selecting the Alarm Acknowledgement Schedule Select a schedule from the Schedule drop down list The event will only appear in the alarm acknowledgement window when the selected schedule is valid Also refer to Schedules on page 79 For this feature to function you must enable alarm acknowledgement see Enabling Alarm Acknowledgement on page 166 Typing the Instructions for the Selected Alarm In the Instructions text field type the instructions or warnings that you wish
293. rol Door Input Input Door 001 01 Contact Relock Disabled REX Input Input Door 001 01 REX Relock Disabled T Schedule always Door General Inputs and Outputs Users Elevator Control Door Input Input Door 001 02 Contact Relock Disabled REX Input Input Door 001 02 REX Relock Disabled Schedule always V Unlock on REX Normal V Unlock on REX Normal Unlock on REX Regardless of Door Status F Unlock on REX Regardless of Door Status m Interlock Input Interlock Input Input Door 001 02 Contact Input Door 001 01 Contact Schedule Always Schedule Always Output Activation Output Activation v1 v EE 4 M5 6 1 2 M3 v e ff 5 Iv 6 Assigning Outputs to a Door Each controller has six multi function outputs Each controller also supports up to three 2 Door Expansion Modules CA A470 A which provide an additional 6 outputs each Therefore each controller can support a maximum of 24 outputs Up to 6 outputs can be assigned to the selected door Typically these outputs are used to indicate whether a card is granted access and or the status of the door by activating and controlling the LEDs and buzzers normally found on the readers and keypads Depending on the selected door the Output Activation check boxes will be numbered differently Each group of doors is assigned specific o
294. rol Since 1985 REF Security Levels Security levels determine whether an operator can view modify and or delete system characteristics and whether the operator can perform manual controls such as locking and unlocking doors remotely The system characteristics consist of all the elements found in the Database Tree View window such as controllers doors and events Security levels are then assigned to permissions see Permissions on page 187 Setting the Security Level s Programming Rights From the Security Level properties window select the Database tab i ba aie Security Level to define which system characteristics can be viewed programmed z and or deleted for the selected site The system characteristics Securty Level Database Operatione consist of all the elements found in the Database Tree View window va ety e wan kede Uae such as access levels cards and controllers Each system Ues O C Stes O T characteristic has three check boxes labeled View Modify and Visitors O Oo Controllers Do F Delete which are detailed below Cad FO T Doors O O T Companies D f D DoorGroups D D Departments f ff D Inputs O D D View Jobtile D r Input Groups Do D If you select the View check box the operator assigned with this User Group O Oo Redas C C r security level will be able to view the details of the associated Visitor Groups Oo Relay Groups C D I characteristic For example if the View check box
295. roller Time The Centaur software can update the date and time of one controller or all controllers in a site To do so right click a controller from the Controllers of the desired site and click Update Time In the Date Time window type the required date and time If you wish to update all controllers in the selected site select the Update all controllers on this site check box Click OK Also refer to Updating the Controller Time Automatically on page 35 Viewing Controller Status The View Controller Status command allows you to view the complete details of each controller The Centaur software will display the selected controller s site address status firmware version number of cards and errors that may have occurred and the controller s voltage status To view the controller status right click the desired controller from the Controllers and click View Controller Status Resetting the Controller To perform a controller reset right click a controller from the desired site s Controllers and click Reset Controller This will not affect any items you may have already programmed such as cards doors inputs etc If the DIP switch 8 on the controller is set to default left side performing a controller reset will reset all programming such as cards doors and inputs to default Activating Deactivating the Controller To activate a controller right click a controller from the desired site s Controllers and cli
296. roup s name and any additional notes User Group Default Access Levels Parking Users Site 1 User Group 1 Typing the User Group Name Name Production a H Use the Name text field in the User Group tab to identify the user group We recommend using a name that is representative of the user group such as Production Also refer to Typing Names and Notes on page 23 Typing the User Group Notes Use the Notes text field in the User Group tab to record any additional notes that may be required Also refer to Typing Names and Notes on page 23 Cancel Apply Manufacturing Access Control Since 1985 Defining the Access Level for all Users of the User Group The Access Level 1 to Access Level 4 drop down lists identify which doors i User Group Properties schedules the user can access Up to two access levels can be assigned to each Panin user group by default and up to four when the Extended Access Levels Levels 3 User Group Default Access Levels Parking Users 4 check box is selected refer to page 35 When you click one of the Access Level drop down lists all active access levels in the selected site will appear Select Bi yes otic Last te riskier ol His ta the access level s you wish to assign to the user group This will determine which Access Level 1 Mone doors in the site the users of this group will have access to and during which time i f i coess Level z None periods e
297. rs is highly recommended since it greatly enhances the level of security provided by an access control system Many of the door s programmable options can only be used if a door contact is installed Manufacturing Access Control Since 1985 REF Adding Doors In order to add one or more doors at least one site and one controller must be created If you have not created a site please refer to Sites on page 25 For more information on setting up a controller refer to Controllers on page 85 When adding doors you will be required to select an address for each door refer to Viewing the Door Address on page 105 Perform the following to add a door 1 From the Database Tree View window right click the Doors from the desired controller and click New Doors You can also click the Doors and press the keyboard Insert key 2 A dialogue box appears requesting if you would like to use the Door Configuration Wizard The Door Configuration Wizard guides you through the minimum required settings to set up your doors If you want to use the Door Configuration Wizard click Yes and follow the steps detailed in Using the Door Configuration Wizard If you do not want to use the Door Configuration Wizard click No and go to step 3 3 Inthe Add Devices window select the door address es and click OK After adding the door s you will have to configure them within the Door Properties window see Modifying a Door on page
298. rver is running connected Device activation will NOT function if the Centaur Server is offline or if the selected devices are from a remote dial up site This warning applies to the Centaur Server only Whenever the Server comes online again events that occurred in the last 15 minutes will activate a device Events older than 15 minutes will be ignored upon connection Action From the Action drop down list located below the Device Activation heading select the type of device or group of devices that will be activated when the event occurs You can activate deactivate outputs or relays lock unlock doors and enable disable door groups Also refer to Groups on page 1771 Timed If the device selected in the Action drop down list is labelled Timed you can type a value from 0 to 65535 seconds in the Timed text field The device will activate or deactivate for the period programmed in the Timed text field If the selected device is not Timed the Timed text field will be unavailable Manufacturing Access Control Since 1985 Device REFERENCE MANUAL CENTAUR 5 1 Events After selecting an Action use the Device drop down list to select which device or group of devices will be affected by the selected action Schedule The selected device s will only activate or deactivate when the schedule selected from the Schedule drop down list is active Also refer to Schedules on page 79 Example In Figure 32 an
299. s Controller REFERENCE MANUAL CENTAUR 5 1 Controllers TTT 1 114141 Door 001 01 Door 001 02 Door 001 03 Door 001 04 Door 001 05 Door 001 06 Door 001 07 Door 001 08 001 001 001 001 001 001 001 001 RedLED Buzzer 2 5 4 6 8 11 10 12 14 17 16 18 20 23 22 24 Cancel From the Green LED drop down list select the green LED s PGM output address If there is no green LED associated with the door select None From the Red LED drop down list select the red LED s PGM output address If there is no red LED associated with the door select None From the Buzzer drop down list select the buzzer s PGM output address If there is no buzzer associated with the door select None Click Finish Manufacturing Access Control Since 1985 Modifying a Controller To modify an existing controller right click the desired controller from the Controllers and click Properties from the drop down list You can also click the desired controller and press the keyboard Enter key The Controller Properties window will appear allowing you to configure the controller General Controller Properties From the Controller Properties window select the Controller tab to view the controller s address as well as record the controller s name and any additional notes Controller Properties Controller Configuration Anti passback Expander Site 2 Controller 1 Viewing the Contro
300. s This will set the rate of flashing for the output Click OK Use the Reset to factory default button to restore the default factory timing for each event Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Outputs Deleting an Output To delete an existing output right click the output from the appropriate controller branch in the Database Tree View window and click Delete You can also click the desired output and press the keyboard Delete key A dialogue box will appear requesting confirmation Display Output Status and Manual Controls When you click on the Output Status icon from the toolbar Centaur will display the current live status of the outputs in the system If you wish to manually change the status of an output right click the desired output You can also use the Shift or Ctrl keys to select multiple outputs if you wish to modify several outputs in the same manner at once and then right click on any of the selected outputs A drop down list will appear Select one of the actions from the list For more information refer to Displaying and Controlling the Status of an Output on page 223 Manufacturing Access Control Since 1985 r ao Ha REFERENCE MANUAL Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control ar INTEGRATED ACCESS CONTROL Chapter 16 Events What Will Find Event Definition Over
301. s 232 Backup Scheduler 238 Badge editor 52 70 Baud Rate 33 Beep On Alarms 210 On All Abnormal Events 211 On All Access Events 211 On All Events 211 Bioscrypt 111 bling 122 Browse your computer for an existing picture 197 Buffering Offline 35 Bypass input group 149 Bypassing Inputs 149 C Camera CCTV Command 193 Card Import Export 189 Card Number and Card Number HEX 128 Card Options 130 Card Status 131 Card Traced 130 Card Distributed Programming 35 Cards 125 CCTV Command Properties General Tab 192 201 CCTV Control Enabling for an Event 169 Protocol 169 Schedule for an Event 169 CCTV port settings 40 Centaur Database Management Tools 229 Centaur Databases 230 Centaur Editions 2 Centaur Service Manager 190 Centaur s Anti Passback Monitoring Software 189 Centaur s Real Time Graphic Interface Feature 190 Centaur s Report Generation feature 190 Centaur s Visual Authentication Software 189 Check Point 179 CMPP 18 CMPP card enrolment station 41 CMPP Module Centaur s Card Management feature 63 Colour Definitions Events 212 COM Port Assignment 33 Command CCTV 169 Communication 23 Baud Rate Setting 33 COM Port Assignment 33 Controller Options 93 Dialup 31 Direct serial port 30 Phone Number 34 Speed 33 TCPIP 32 Update CTL Every 15 Minutes 35 Communication Type 26 Computer requirements 7 Configuration Tab Controllers 91 Configuring Doors 97 97 Configuring Inputs 93 149 Connecting and Disconnecting
302. s for Defaut Card Holders Default General Alarms E Mail Video blaca amp Headcount General tab in the event s Access granted Front Door Frank Smith COWI Laval Canada schedule Properties window to prog ram its Production Entrance John Dole COWI Laval Canada S creer Always general properties URED Disk Always K Device Activati Selecting the Event Go Action Noe Schedules Time 7 65535 ms max Under the Schedule heading you Device Relay 001 01 can define when the selected Schedule Keve event will be displayed in Centaur s Real Time Events Status window as well as when the event will be logged in the Centaur database Screen From the Screen drop down list select the schedule that will define when the event will be displayed in the Real Time Events Status window If the event occurs when the schedule is valid the event will appear in the Real Time Events Status window Disk From the Disk drop down list select the schedule that will define when the event will be logged in Centaur s databases If the event occurs when the schedule is valid the event will be saved Selecting a Device and Setting its Properties Under the Device Activation heading you can define a specific device such as a relay or output to activate or deactivate when the selected event occurs Also refer to the example on page 165 AN Device activation will only function when the Centaur Se
303. schedule This means that access to that floor is unrestricted when the Weekly General schedule is valid Any user even those without access cards can access the Parking Level 2 floor Manufacturing Access Control Since 1985 REFE Figure 16 Example of Programming a Door s Floor Schedules Door Properties Door General Inputs and Outputs Users Elevator Control Floor Unlock Schedule Weekly General v Deleting a Door To delete an existing door right click the desired door from the Doors branch and click Delete from the drop down list You can also select the desired door and press the keyboard Delete key A dialogue box will appear requesting confirmation Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Doors oe Display Door Status When you click on the Door Status icon from the menu bar Centaur will display the current live status of the doors in the system If you wish to manually change the status of a door right click the desired door You can also use the keyboard Shift or Ctrl key to select multiple doors if you wish to modify several doors in the same manner at once and then right click on any of the selected doors A drop down list will appear Select one of the actions from the list For more information refer to Displaying and Controlling the Status of a Door on page 219 Door Status Be Centar Door Status emerjan oea opm
304. ser are listed in the Cards tab with its Description Family Number Card Number Status and Access Level When a card is added its status becomes the same as the one defined for the user see Status on page 48 Personal Information Custom Fields Badge Cards Door Access Rights Last Access Visitors Assets Notes Card Number New Allows to add a new card See Adding Cards on page 127 for more information Modify To modify the card information click on Modify and see Modifying a Card on page 128 for more information Delete To permanently delete the selected card from the database select a card from the list and click Delete Enroll Allows to select the bioscrypt reader and scan the use s finger print e To select the bioscrypt reader either enter its IP address or click Find to select from the detected list The Serial Number Unit Type and Wiegand Format of the selected Bioscrypt are displayed Click on OK e From the Finger drop list select which finger will be scanned e Click Enroll Assign To assign unassigned card s to the user click the Assign button select one or more cards that need to be assigned to the current user and click OK Unassign To unassign a card select a card from the list and click Unassign Manufacturing Access Control Since 1985 Door Access Rights Gives the list of all doors the user has access to The door s Access Level Schedules Description Sta
305. sitor group and press the keyboard Enter key General Visitor Group Properties From the visitor group properties window select the Visitor Group tab This allows i aje Visitor Group Properties you to view the visitor group s name and any additional notes Visitor Group Default Access Levels Options Parking Visitors Typing the Visitor Group Name Site 1 Visitor Group 2 Name Supid aa Use the Name text field in the Visitor Group tab to identify the visitor group We recommend using a name that is representative of the visitor group such as Suppliers Also refer to Typing Names and Notes on page 23 Typing the Visitor Group Notes Use the Notes text field in the Visitor Group tab to record any additional notes that may be required Also refer to Typing Names and Notes on page 23 f OF Cancel Apply Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Visitors and Visitor Groups Defining the Access Level for all Visitors of the Visitor Group The Access Level 1 to Access Level 4 drop down lists identify which doors schedules the visitor can access Up to two access levels can be assigned to each visitor group by default and up to four when the Extended Access Levels Levels 3 Visitor Group Default Access Levels Options Parking Visitors 4 check box is selected refer to page 35 When you click one of the Access Level drop down lists all active access l
306. ss Metory Angeta Moves sess PO Cy 0 Daae F ATYYTYTAYAAAIIIJAA APPa 00 st Tad Browse your computer for an existing picture Acquire the visitor s picture via the camera Crop the visitor s picture Delete the visitor s picture from the database Acquire the visitor s signature via a signature pad w le t e a e Delete the visitor s signature from the database Entering personal visitor s Information Enter the visitors Address City State Province Country Region ZIP Postal Code Phone and E mail information Up to three Phone and E Mail entries is available using the arrow at the right of the specific field Assigning visitor s signature You can associate a signature to a visitor which can be used for visual verification Acquire signature via a signature pad Allow acquiring the visitor s signature using a signature pad Click on this button to acquired the signature using a signature pad Delete signature from the database Allows deleting the signature from the database Click on this button to remove the signature from the database Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Visitors and Visitor Groups es y Adding a Picture of the Visitor You can associate a picture to a visitor which is commonly used with Centaur s visual authentication feature When a visitor card is presented to a reader Centaur s visual authentication software can disp
307. ss Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Installing and Using Centaur Setting Centaur as a Service Under Windows These instructions pertain to Windows 2000 2003 XP Vista operating systems and will enable the Auto start service when OS starts feature in the Centaur Service Manager This feature will automatically start the Centaur Server when you start the computer You will only need to start the Centaur Administration Console 1 If the Centaur Service Manager is already stopped and has been exited proceed to step 5 Otherwise click Start gt Programs CDV Americas Centaur Centaur Service Manager The Centaur Service Manager window will appear 2 Click Stop The Operator Logon window will appear LY The Operator Rights Validation window will not appear if Centaur is set as a service under Windows 3 Enter your Centaur Logon ID and Password and click OK The default Logon ID is Admin and the default Password is Admin 4 From the icon tray right click the Centaur Service Manager icon and click Exit r Centaur Service Manager icon 0 5 To manually set Centaur as a service under Command Prompt go directly to step 6 Otherwise open Windows Explorer and locate drive C Double click Program Files double click CDV Americas double click Centaur double click Centaur Server and double click Service bat Proceed to step 7 6 To manually set Centaur as a service under Command Prompt click Start Pr
308. ssaaeeeessaeeeeesaaaeeeessaneeeesaaes 9 FONG tne Hardock Key sey tewalevras unum icesrnarccurmiatanteast EEEa Ea aE EEA i EE NEEE OE EOAR E a 10 Starting the Centaur Server and Software cccceecccccseeececcessececaeeeceesceueeeecseeeeeessuceesseaecesseuceeessaseseesseusecessaaseeessesesessnaneseees 11 Soe IONS saesae E E EEE A E EE E A 13 UNDERSTANDING THE CENTAUR USER INTERFACE snaaassnnnnsssnnnnsnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn nnmnnn nnmnnn mennan nnnm 15 Uoer ien CE OVGIVICN noore E ES bes EE E N E T A 16 Typing Names and Notes ssiniecas sanccavirancdeasecbtinronseinaiencaaheranireunederkaintsibeboneaidasiwousaiidbelehebobdannertinetuaneiharmnooushentaancieeematsageibeaianteints 23 MES aan gam auaaval du uaiiedtebenmeneeuulaaeasoiesenasaus rouse arab eneseentuanvanteasenniveseusnvubaceueaneseesenuecsial 25 PONG AC cesses EA N T E AE eid ea E N A A A E ee dare ac babe E A A 26 WIOGIEV ING A SINC E EEEE E eesetadenawesceexsnteiensbns 29 DELUNA ae eee ee E en ee ne ee ee E EE en 42 Communicating with a Site 0 0 ee eecccsesecececeeeecccecesececsusseeecsauseeecesaueeeessaegeeecseuceesssauueeessuueeeeeessauuceeessasececsuaeeeessausessssaesessssueees 42 SERS FIND USER GROUPS iinan aE AN AAE SEE NAi a a AENA E aa a aaia Naa 45 POMO OU OT aa a E E E E 46 MOCHYN USET ce cet E A A A aos neg sue T A E A see eateace neem ecalereted 47 Dei a WISER eenige rena a E E E AE E a E E 59 Paang a U er OUN ane E E AA A E E E e
309. st be assigned at E ee a next sign in The card is returned to the host or security guard Activate relay when capacity iz reached None Require signature upon departure Visitors must electronically sign out when leaving returning visitor card Default Host Allows the selection of the user that will be assigned as the default host for all visitors that will be created Parking Options Activate Parking Counter Allows to keep track of the number of cars present in the parking Maximum Capacity Allows to limit the number of cars present in the parking Activate relay when capacity is reached Allows the selection of the relay that will be activated when the capacity of the parking is reached Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Sites Site Floor Settings Select the Floors tab from the Site Properties window The first step in setting up elevator control is to define the number of floors in each site and to give a name to each of these logical floors Up to 64 floors can be controlled per site Site Comms Users Cards Custom Fields Visitors amp Parking Floors CCTV CMPP Site Properties Number of Floors Number of floors E Define the number of floors that need to be controlled for the selected site by typing a value between 01 and 64 in the Number of floors text field Floor Humber Floor Name Right click the desired floor select Rename
310. strict CD ROM access to locally logged on user only Seamer peer ARGUE pride Te requred before sugpencing pean Bif Mecunalt network wren Pagtally age commune ators falar He ecr cect netk peer Dagialy pgn commurecetore If chert agree a G SoAhmare Aarin A utaka Po not alice anonymous rumm tan of SAM acomuts pi Z E there tarmene Pekon H atack acest Do nt alon araryan aruma aten of AM merout md shes Aiea atokee Do Aat alow saree af eden Sus AI PA for a a ben ie tee teok access Let Deerpone permesors aol to anonymous users ae Revo BESTS Named Pipes Put can be TERG UY Ri Meteor BETEN Sharing and soui model for k Stletcteecok eesuatigz p ngemprang Dp ie tere eerily Fa all ha an hee Caer en camo 88ers mw eene aoe eo Manufacturing Access Control Since 1985 6 The Network Access Sharing and security model for local account window will appear From the drop down list click on Classic local users authenticate as themselves and click OK Network access Sharing and security model for local les ej Netwotk access Sharing and security model for local accounts Classic local users authenticate as themselves x Classic local users authenmicate as themselves Guest only local users authenticate as Guest Manufacturing Access Control Since 1985 j REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration Configuring the DCOM on Windows XP 1 In Control Panel open t
311. t database is too large then use the Truncate option in the size tab Attach progress Purge Events Start Date Saturday February 02 2008 EndDate Sunday February 03 2008 Site l All Sites care From the Purge Events window use the Start Date and End Date drop down lists to select the period Select the site from the Site drop down list or click the All Sites check box Click OK Centaur will delete events that occurred in the selected site s during the selected period Manufacturing Access Control Since 1985 REF Database Backup Scheduler Centaur s database backup scheduler enables you to schedule regular backups of the Centaur databases You can back up the Main database and the Event database separately specify the location of the backup files and select how often daily weekly or monthly the backup will occur When the database backup scheduler saves the backup file it will overwrite the previous file If you want to create backup files that do not overwrite each other refer to the document from the c Program Files CDV Americas Centaur Administration Console MSDE Management MSDE_How to create a schedule task doc or contact technical support see Free Technical Support on page 4 Creating a Scheduled Database Backup Multiple scheduled jobs can be created to save database backups in different locations with different names and using different schedules Perform the
312. t windows menus and buttons Manufacturing Access Control Since 1985 aw REFERENCE MANUAL UR 5 1 Fi ng the Centaur User Interface User Interface Overview The following picture demonstrates the Centaur User Interface structure Menu W Ee Ga k Toolbar Ferre 8 eat AA OP Jeonrehrttd SOR 8M at z kim 7 Eh a ee Pee Fe eee hfe E A Shia E En a Beds ee Hee Ti alle 7 AF FLEE EE n Real Time to lt a Events Status 7 aites Window u ieam i E E ii Ti Dik j Database amp D inet 3 Tree View window Alarm Acknowledgement Window Status Bar Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Understanding the Centaur User Interface ys Menu Bar The menu bar gives access to the File View Options Modules and Help menus e The File menu gives access to the Exit sub menu allowing to close the Centaur Administration Console application e The View menu gives access to the following e Toolbar Allows to show or hide the Toolbar e Status Bar Allows to show or hide the Status Bar e Refresh Allows to refresh the Tree View and the Status windows The following sub menus allow to select what events will be displayed in the Events Status window The following selections are also available from the Toolbar see Toolbar on page 19 e All events Refer to Display All Events on page 218 for more informati
313. th no reader on the other side Elevator When using CA A480 A Elevator Controllers refer to Elevator Control on page 133 a reader can be installed inside an elevator When you select Elevator from the Door Type drop down list Centaur tells the controller that the selected door reader will be installed inside an elevator cart for elevator control The door cannot be used for any other purpose Also note that options and features located in the Elevator Control tab can only be set when the Door Type is set to Elevator see Floor Public Access Schedule on page 117 Each controller door can control up to 64 floors for one elevator cart Please note that the number of floors is defined per site and not per door see Site Floor Settings on page 39 For example if you define a site with 20 floors and set up four doors from the same site for elevator control each door will represent a different elevator cart for the same 20 floors Door Properties Door General inputs and Outputs Users Elevator Control r General Door Type Open too long Extended access Two Card Rule Delay Dual Badge Activation Time 000 User validation interval 000 A The Elevator door type cannot be selected for doors located on a 2 Door Expansion Module doors 3 to 8 Only the controller doors can be set with the Elevator door type Entry or Exit Select the Entry door type for the reader
314. that occurs on the same month and day every year e g New Year s Day select the Every Year option from the drop down list If required assign the holiday to the desired holiday group s by selecting the appropriate check box es Click OK Deleting a Holiday To delete an existing holiday right click the holiday from the appropriate Site branch in the Database Tree View window and click Delete You can also select the desired holiday and press the keyboard Delete key A dialogue box will appear requesting confirmation Manufacturing Access Control Since 1985 r ao Ha REFERENCE MANUAL Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control ar INTEGRATED ACCESS CONTROL Chapter 7 Schedules What Will Find POGING kge enei 32 4 54 63 co ot ott bee ee eet E eae E s Soe ne Seed eae E ec ats tet ew et eerteset taser he ES 80 WCGIVING 4A SONCOUIG 2 oc 22 Re hat s Eee os SEES RS oe eae oe ee des GAS Es owe aoe dae eee 80 Delong a Cedule 26 2tet ee ve ea cee te ee ee et ehe ese eee eeeen ws Peete es Poh dees eee a eae de neds eee anes 83 A schedule can be used to schedule tasks automate operations and to control access to doors elevator floors and much more Schedules play an important role in the operation of many Centaur functions and are widely used throughout the software see Table 2 on page 80 A schedule is made up of up to eight time pe
315. that will reset the global anti passback status of all users to unknown This applies only to doors set as Global Entry or Global Exit see Global Entry or Global Exit on page 108 and does not apply to the local anti passback status of the controller see Controller Anti passback Settings on page 96 The reset occurs at the start of every period in the selected schedule refer to Schedule Periods on page 81 or when clicking on the Reset Anti passback button Reset Anti passback The Reset Anti passback button is used to manually reset the global anti passback status of all users to unknown This applies only to doors set as Global Entry or Global Exit see Global Entry or Global Exit on page 108 and does not apply to the local anti passback status of the controller see Controller Anti passback Settings on page 96 Selecting the User Ordering criteria The Order by First Name Last Name and Order by Last Name First Name radio buttons are used to set how the users will be displayed in the Database Tree View window and in FrontDesk The default setting is Order by First Name Last Name Default Access Level The Default Access Level allows the selection of an access level that will be automatically assigned when a card is added to this site See Cards on page 125 for more information The default setting is None Default Access Level Schedule The Default Access Level Schedule allows to select the schedule that w
316. the Print button and click OK from the print window Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control ar INTEGRATED ACCESS CONTROL Chapter 5 Visitors and Visitor Groups What Will Find Adding Visitors ee ee ee en ee ee ee E ee ee er ee ee 66 WICGIRY ING a VISHORS 2 26 544 Garha 6s 6 be ecg e dios Aes Ce ee ah dk Sh er eh RS Es oe ee Saves ae T 67 DAMO a VISIO os cetaann teas vee dae ordeals RE E eR ER ee eae eae ae eae eed oe ea 72 Adding a Visitor Group 6 en eee ee eee eens 72 WOdINVING a Visitor GrOUD ss ssr see eae es dae tedeaueboewheheod E kapa de bedeuekeueh decacdewdeeeedes ae eeedeee seen es 72 Deleting a Visitor Group 2 en ee eee eee eee ee eee teen eee nnn 74 Programming a visitor allows you to define the details pertaining to the visitor Any individual that needs to access a door must be defined in the system as a visitor Once defined a card can be assigned to a visitor Manufacturing Access Control Since 1985 r a i Lp REFERENCE MANUAL Adding Visitors In the Database Tree View window right click Visitors from the desired Site branch and click New Visitor You can also select Visitors and press the keyboard Insert key The visitor properties window will appear allowing you to configure the visitor properties Refer to Modifying a Visitor on page 67 for more information Wrador Pigge mm FoiName fn O
317. the Relay Notes Use the Notes text field to record any additional notes that may be required We recommend that you keep a log of when and what settings were changed Also refer to Typing Names and Notes on page 23 Relay Activation Properties From the Relay Properties window select the Activation tab The Activation tab will allow you to program the relay s activation schedules and activation timers as well as select the relay s normal state i e de energized or energized Selecting a Time Relay Activation Schedule From the Timed activation drop down list under the Schedules heading select the schedule that will activate the relay for the period of time defined by the activation time see Setting the Relay Activation Timer on page 140 At the start time of every period in the selected schedule the relay will activate for the amount of time specified in the Activation time text box regardless of the schedule s end times Refer to Setting the Relay Delay Time Before Activation on page 140 Manufacturing Access Control Since 1985 REF Figure 23 Sample Time Activated Schedule Example If you wish a relay to activate a bell from Monday to Friday at 8 00AM 12 00PM 3 00PM and 6 00PM for 10 seconds each time you would program the relay and schedule as follows Relay Properties Schedule Properties Relay Activation Schedule Details Schedules Timed activation wa Period 1 Activating Never Period
318. ties From the Macro Properties window select the Macro tab This will allow you to f Macro Properties view some of the system component addresses as well as record the macro name and any additional notes Macro Actions site 1 Macro 1 Typing a Macro Name _ _ O Use the Name text field to identify the macro We recommend using a name that is representative of the macro Also refer to Typing Names and Notes on page 23 Typing the Macro Notes In the Notes text box record any important explanations of the macro and its use Try to keep an up to date record of where the macro is used This will help you understand how changing the macro will affect the system Also refer to OK Cancel Apply Typing Names and Notes on page 23 Defining the Macro Actions From the Macro Properties window select the Actions tab This will allow you to Macro Properties add delete modify the action s Macro Actions Up to 16 actions can be created All actions will be executed at the same time no order Action Device Time There are no items to show in this wiew Hew Delete Modity cad w Manufacturing Access Control Since 1985 i 4 REFERENCE MANUAL CENTAUR 5 1 Macro ey E Adding a New Action Click on the New button to add a new action Select the macro action parameters and i click OK Action Properties Action Select the macro action from the Action drop list T
319. ting Direct Serial Port you are required to further set the site properties See Selecting the Site Baud Rate on page 33 Selecting the Site Speed on page 33 Selecting the Site Communication Schedule on page 33 and Assigning COM Ports to Controller Addresses on page 33 All other settings will be unavailable LUSB cable e CT V900 A i 2 Door Controller WTEGRATED ACCESS CONTEC or DB9 cable included with converter First controller of a site SERVER Null Modem DB9 cable f 6m 25 ft max CA A360 USBRS _ USS or RS 232 to i RS 465 cowerter Siart point of tha RS 485 controlar network Furthes controllers can be up to 120m 4000 ft from start point To olher controllar CT V900 A 2 Door Controller First controller of a site re Start point of lhe RS 485 controller network Furthest controllers can be up to 1220m 4000 ft from start point Manufacturing Access Control Since 1985 j REFERENCE MANUAL CENTAUR 5 1 Sites Dialup Modem Select this method if this is a remote site that will communicate with the Centaur Server computer through a modem After selecting Dialup Modem you are required to further set the site properties See Selecting the Site Speed on page 33 Selecting the Site Communication Schedule on page 33 Assigning Dial up Site Telephone Number on page 34 and Assigning the Dial up Site Modem Type on page 34
320. tings to all controllers and go to step 6 If you would like to apply different controller and door settings to each controller select Individually setup each controller and go to step 7 6 If you have selected the Apply default settings to all controllers check box a Under Controller Default Settings set the available options as required For more information on these options which include IP Address Port Number and Input Config refer to Setting the Controller Input Configuration on page 93 and Configuring the Controller Communication Settings on page 93 Num Doors allow selecting the number of doors to be created for each controller b Under Door Default Settings set the available options as required For more information on these options refer to Unlock Time on page 112 Lock Control on page 110 and Reader Type on page 92 Please note that the Door Type option is not yet supported and therefore will be set to Access by default Refer to Door Type on page 107 for more information c Click Finish Manufacturing Access Control Since 1985 REF 7 If you have selected the Individually setup each controller check box Coniroller A Door Setup Fina aia they munie of Crinia s ranki a tes abel fe hee Site D pph deteuit sefing to al conie a Click Next Munter ol Corak 003 Fi raidhis oan each conia Cendindies Deiak Setteags Dina Delan Settings adie OU a Unik time TD S
321. tivation In the Delay time before activation text field under the Timings heading type a value between 0 and 65535 seconds Default 0 second This value represents the amount of time the controller will wait before activating the relay upon a valid time activation schedule or when activated manually see Displaying and Controlling the Status of a Relay on page 220 Example A Delay time before activation of 30 seconds has been programmed in the example shown in Figure 23 on page 140 If period 1 of the schedule becomes valid the relay would activate 30 seconds after 8 00AM Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Relays Setting the Relay s Non Activated State From the Non activated state drop down list select the appropriate normal state De energized The relay output is energized when activated This means the selected relay output on the controller will remain de energized until activated by a schedule or manually see Displaying and Controlling the Status of a Relay on page 220 When activated the controller will change the state from off to on Energized The relay output is de energized when activated This means the selected relay output on the controller will remain energized until activated by a schedule or manually see Displaying and Controlling the Status of a Relay on page 220 When activated the controller will change the state from on to off Deletin
322. to Typing Names and Notes on page 23 Personal Information Custom Fields Badge Cards Door Access Rights Last Access Visitors Assets Notes Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Users and User Groups Deleting a User In the Database Tree View window right click the desired user and click Delete from the drop down list You can also select the desired user and press the keyboard Delete key A dialogue box will appear requesting confirmation Also refer to FrontDesk on page 62 Adding a User Group In the Database Tree View window right click Users from the desired Site branch and click New User Group The user group properties window will appear allowing you to configure the user group properties Refer to Modifying a User Group below User Group Default Access Levels Parking Users for more information ee arini Hame Production User Group Properties i coed a Modifying a User Group From the desired Site branch in the Database Tree View window right click the user group you wish to modify and click Properties from the drop down list You can also select the desired user group and press the keyboard Enter key General User Group Properties From the user group properties window select the User Group tab This allows you j User Group Properties to view some of the system s component addresses as well as record the user eal g
323. to a Site or Disconnecting from a Site Perform the following to connect go online to a site or disconnect go offline from a site 1 From the Database Tree View window right click the desired site from the Sites branch and click Connect or Disconnect 2 Observe the communication status as demonstrated by the colour of the site Direct Dial Up or TCP IP icon in the Database Tree View window and the colour of the message in the status bar COMMUNICATION COLOUR ICON TREE VIEW WINDOW STATUS STATUS INDICATOR BAR Direct TCP IP Disconnected 5 ca j s s mm Communication ia r B ee Ge ee a Connected If you wish to connect to a site for continuous communication select the Always schedule in the Comms tab of the Site Properties window Refer to Selecting the Site Communication Schedule on page 33 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Sites Using SAP Integration Each site may be configured to use SAP integration which will allow automatic user visitor import from SAP generated file To enable and configure the use of SAP integration from the Database Tree View window right click the desired site from the Sites branch and select SAP Integration SAP Integration Settings V Enable automatic user yvisitor import from SAP generated file File PO Delimiter Comma Tab Semicolon D First row contains field names Available Fileds Selected Fields Ac
324. to provide to the operator These instructions will appear in the alarm acknowledgement window when the event occurs and the schedule is valid For this feature to function you must enable alarm acknowledgement see Enabling Alarm Acknowledgement on page 166 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Events Acknowledging Alarms The following details how an operator can acknowledge an alarm 1 If the event meets the programmed criteria see Alarm Acknowledgement on page 166 the event and its programmed instructions appear in the Alarms window To play a sound file every time the event occurs refer to Centaur Wave Player on page 241 The operator can acknowledge one event and type any comments or the operator can acknowledge all events without providing any comments To acknowledge one event right click the event in the alarm acknowledgement window and select Acknowledge from the list Go to step 3 To acknowledge all events right click any event in the alarm acknowledgement window and select Acknowledge all from the list Go to step 4 The Acknowledge alarm acknowledgement window appears Type any comments in the Comments text field and click Acknowledge The Operator Acknowledge event appears in the Real Time Events Status window View all acknowledged events by clicking the Acknowledged Events icon from the tool bar To view any recorded comments click the Acknowledg
325. ton O add 1 mod 2 Type O user 1 visitor E First Hame iti Add gt i o Remove lt lt emove o Remove lt lt lt ity State Province r l Emp Num as Key Field containing Emp Mum Nowe Create Cards Field containing card number None 3 Access Level None Notes Enable automatic user visitor import from SAP generated file Select the Enable automatic user visitor import from SAP generated file check box to enable the use of SAP integration File Select the CSV File that will contain the new user visitor informations Delimiter Select the delimiter format use to separate field within the CSV file Choices are Comma Tab or Semicolon First row contains field names Select the First row contains field names if the first row of the CSV file contain the name of the fields Available Fields and Selected Fields Select the desired fields from left column by either double clicking on each field or by clicking on each field then on the Add button to add the field to the selected fields column Only field appearing in the right column will use for user visitor import from SAP file To remove a field from the selected list click on the field from the selected field column then on the Remove Manufacturing Access Control Since 1985 r ao Ha REFERENCE MANUAL button Selected fields must be in the same order as in the SAP generated file Emp Num as Key Select the Emps Num as Key check box to assign a
326. total of 16 inputs The 2 Door Expansion Modules do not support input doubling All inputs on the selected controller and its 2 Door Expansion Modules must be connected as described in ATZ 3R Connection Method on page 146 Configuring the Controller Communication Settings Under Communication configure the controller s communication settings IP Address DNS and Port Number The IP Address DNS and Port Number text fields are available only if the selected communication type is TCP IP LAN WAN as described in Selecting the Site Communication Type on page 29 Before entering this data you need a static IP address or DNS name and port number for each CA ETHR A which should be provided by your Network Administrator You will then need to program each CA ETHR A with an IP address or DNS name and a port number In the IP Address or DNS name and Port Number text fields type the IP address or DNS name and port number programmed into the CA ETHR A device that is connected to the controller If there are several controllers wired to one CA ETHR A device then each controller on that loop must be programmed with the same IP address or DNS name as detailed in the example below The first time you program a CA ETHR A it will be done via a serial port using DB9 to RJ 11 cable included with the CA ETHR A To initiate a communication with the CA ETHR A press the reset button and type postech with in 5 seconds if you pass this delay yo
327. tput is deactivated the output will turn ON 6 Click OK Anti passback status If the Anti passback feature is enabled see Controller Anti passback Settings on page 96 and a controller registers two subsequent Entries or two subsequent Exits the appropriate Access Denied Anti passback violation event will be generated and the output will be activated Access granted The output can activate when access has been granted to the door following the presentation of a valid card or keypad code Access denied The output can be activated when access has been denied to the door following the presentation of an invalid card or keypad code REX granted The output can activate when a request for exit device vertical detector assigned to a door s REX input see Assigning a REX Input Request for Exit on page 114 has been triggered REX denied The output can be activated when a REX denied event occurs other than the REX Denied Schedule Invalid event i e interlock enabled Access time out The output can be activated when access has been granted but the door was never opened during the unlock period see Unlock Time on page 112 and Extended Access on page 113 Waiting for keypad When both a reader and a keypad are required for access see Use Keypad on page 130 the output can be activated as soon as the reader has granted access Keypad time out When both a reader and a keypad a
328. trol on page 169 or the Macro amp Headcount tab see Macro amp Headcount on page 170 5 Click Apply and click OK The selected event will appear in bold under Events in the Database Tree View window to indicate that changes were made Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Events Programming a Default Event Definition A default event definition enables you to program the same settings for more than one device and user Settings for Default Card Holders Defaut General Alarms E Mail Video Macro amp Headcount usually to apply to all devices and je F ront Door Fig Smith COWI Laval Canada X Schedule users in the list When you select ae Cohn Dole CDV Laval Canada Screen Always LOR D Access granted Default from the Settings for and c SC Users drop down list see step 2 and step 3 in Event Definition Device Activation Overview the definitions that you Action Mone E program in the General Alarms Time 0 65535 ms mas E Mail Video and Macro amp Device Rea 00mm gt Headcount tabs will apply to all Schedule Hever devices and users whose check boxes are cleared Programming a Device Specific Event Definition A device specific event definition Access granted enables you to program different settings for each device and user Settings for Devices Card Holders Devices I General Alarms E
329. tus Family Number and Card Number are also displayed Personal Information Custom Fields Badge Cards Door Access Rights Last Access Visitors Assets Notes Last Access Lists the user s last 25 access events The Events Field Time and Doors information are displayed Personal Information Custom Fields Badge Cards Door Access Rights Last Access Visitors Assets Notes Field Time Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Users and User Groups a E Visitors List the visitors for which the user is responsible that are still in the building The Visitor Name Company Arrival Time and Schedule Departure Time information are displayed Personal Information Custom Fields Badge Cards Door Access Rights Last Access Visitors Assets Notes Scheduled Departure Time Manufacturing Access Control Since 1985 Assets List the assets assigned to the user The Visitor Name Category Manufacturer Model and Serial Number information are displayed Refer to Assets on page 195 for more information Personal Information Custom Fields Badge Cards Door Access Rights Last Access Visitors Assets Notes Scheduled Departure Time Notes Use the Notes tab text field to record any additional notes that may be required We recommend that you keep a log of what settings were changed and when they were changed Also refer
330. ty None Enabling Hard passback m Lock Control Entry Exit Doors M Unlock Door 1 and 2 I Unlock Door 5 and 6 Select the Hard passback check box to deny access to the door when the Unock Door Jiend 4 Wrasck Door da Access Denied Anti passback violation event occurs Clear this check box to grant access to the door when the Access Denied Anti passback Tracker LCD Display Option violation event occurs Please note that to enable hard passback you must also enable the Anti Passback Selecting the Anti passback Reset Schedule From the Reset Schedule drop down list select the schedule that will reset the anti passback status of all cards to unknown This reset will occur at the start of every period in the selected schedule For more information on schedules refer to Schedules on page 79 Selecting the Anti passback Reset Input Select the Reset on Input check box and select an input from the Input drop down list Clear the check box to deactivate this feature Selecting the Anti passback Activation Relay From the Activate Relay When Area is Empty drop down list select the relay that will activate whenever there are no longer any cards in the controller labelled as in For example you can use the relay to arm a security system when everyone is out of the building Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Controllers 27 Setting Lock Control for Entry Exit Doors Whe
331. type the desired name and press the keyboard Enter key Please keep in mind that when setting up elevator control the floors always refer to a building s logical floors and not their named floors as shown in Figure 6 Figure 6 Building s logical floors Site Properties fx Logical Floor 8 6 Fifth Foor VEE Feat EE i 4 Fourth Floor 3 Third Floor Number of loors 2 Second Floor Floor Number 1 First Floor Parking i G General Floor Fatt SB1 Parking Level 1 Third Floor Logical Floor 1 SB2 Parking Level 2 Manufacturing Access Control Since 1985 Site CCTV Port Settings If a site requires CCTV control you must activate CCTV control to define through which COM port the CCTV commands will be sent and what communication settings the COM kidik port will use Select the CCTV tab from the Site Properties window Si p E a Visitors amp Parking Floors CCT CHIFF Activating CCTV Control for a Site Activate CCTV Control IA COM Pott None Select the Activate CCTV Control check box if you want Centaur to process ae CCTV commands Whenever an event occurs that is assigned a CCTV command 7 n refer to Selecting the CCTV Command for an Event on page 169 Centaur i pi E x transmits the CCTV command to the video switcher connected to the selected eae mi COM Port If you do not activate CCTV Control Centaur ignores any CCTV Stop Bits fi z command assigned to system events Flow Contro None
332. u won t be able to log in Once programmed you will be able to access the configurations easily by using a web browser and simply typing in the IP address or DNS name To program the Port the range is from 1 65535 however do not use 21 25 80 or 110 as they are reserved For further details please consult the CA ETHR A Installation Guide Manufacturing Access Control Since 1985 j is REFERENCE MANUAL I 71 1i f aA m Example In Figure 11 the IP Address for controller 1 and 2 would be 10 10 10 2 and the IP Address for controller 3 and 4 would be 10 10 10 3 The port number for controller 1 and 2 would be 10001 and the port number for controller 3 and 4 would be 10001 Figure 11 Example of TCP IP Controller Settings REMOTE SITE E E CT V900 A 1 CT V900 A 2 2 Door Controller 2 Door Controller IF Addr ss T 10 10 10 32 i LAN WAN Pori 10001 RS 2327 CABLE 6m 25 max RS 485 Up to 1220 m 4000 REMOTE SITE CA ETHR A TCP IP Converter CT V900 4 3 CT V900 A 4 2 Door Controller 2 Do0or Controller IP Address 10 10 10 3 LAN WAN Port 10007 RS 232 CABLE F 6m 25i max Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Controllers Poll Timeout The Poll Timeout text field appears only if the selected communication type is TCP IP LAN WAN as described in Selecting the Site Communication Type
333. ugh DCOM On the server you need to e Open the port 135 DCOM port e Allow access In bound and Out bound for the program SPXSVR exe found on C Program Files CDV Americas Centaur Centaur Server e Allow access In bound and Out bound for the program sqlsevr exe found on C Program Files Microsoft SQL ServerMSSQL Binn On the workstation you need to e Open the port 135 DCOM port LY Please make sure that all your network devices allow DCOM port 135 Please refer to your firewall documentation if you need help If you are using the Windows firewall follow these steps to alter your settings 1 From the taskbar click Start gt Control Panel 2 The Control Panel window will appear Double click on the Windows Firewall icon Manufacturing Access Control Since 1985 E Conte Fane Fe Ell Vew Emi Took Hep O O 8 Pm one E ahri Gr conta ranei See Alko Gh rdus Upale kh Peier Sunnert Tikim feel Lhe Aiaia Tope FEA A REFERENCE MANUAL R 5 1 a no ite guration x 3 The Windows Firewall window will appear From the Exceptions tab click Add Port Windows Firewall Windows Firewall is tumed off Your computer is at risk of attacks and intrusions from outside sources such as the Intemet We recommend that you click the General tab and select On Programs and Services _Name Intemet Explorer Java TM 2 Platform Standard Edition binar
334. uired to communicate with the video switcher connected to the selected COM port The stop bit is transmitted after each character Flow Control From the Flow Control drop down list select the flow control type required to communicate with the video switcher connected to the selected COM port Flow control determines the timing of signals and enables slower speed devices to communicate with higher speed devices There are various techniques but all are designed to ensure that the receiving station is able to accept the next block of data before the sending station sends it Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Sites Activating and Configuring CMPP Card Enrollment Station The CMPP feature allows using a card enrollment station that reads a card badge and automatically shows the card number Hexadecimal Card Numbers on page 35 If a site requires CMPP you must activate CMPP to define the card type and through which Site Comms Users Cards Custom Fields COM port the CMPP commands will be sent and what communication settings the vets fetes Maas eer H COM port will use Select the CMPP tab from the Site Properties window Site Properties Activate CMPP W a COM Fort CoM 1 Activating CMPP for a Site a z Select the Activate CMPP check box to allow Centaur to use CMPP card Data Bits enrollment station capability Parity Stop Bits Selecting a Computer COM Port for C
335. up met Remove are not effecti ae A user logs on Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration 7 Mi 15 The Component Services window will appear Expand the Component Services Computers and My Computer branches then click DCOM Config File Action View Window Help e HAXE os BADDE E Console Root a Component Services DCOM Config a Computers e FooystemR Accessibili Acc5tore acppage dll a jE My Computer Class t H COM Applicatio gt DcOMCcong rer F s S amp S gt E Running Processe ap Client appwiz cpl appwiz cpl Authentica Background t E Distributed Transi HxHelpPan Ul Termina Intelligent prin BitLocker Bitmap BRCpl BRCpl CElevateW Drive En Image SafeDocs D System Ima s s s F CLSID_CS CMLUAUTIL CMSTPLUA COM Event ComEvents System s s s ComeEvents COpenCo CTapiLuaLib CustReg Defrag FAT Class Class engine s s s F Defrag NTFS Detection dfrgifc DfsShlExdll DictationH engine Class s s s s More Actions Manufacturing Access Control Since 1985 REFERENCE MAN 16 Right click the SpxSvr file then click Properties Component Services File Action View Window Help e9 AM XE n BAHO Z Console Root a Component Services RegisterCo RemotePro orshxS2 dil rundlia2 exe SBEServer DCOM Config 4 Computers Class j a amp My Com
336. up of Devices Relay Group Properties Relay Group Relays Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Groups Lane ys Adding Details and Assigning Users to Company and Department Group From the Company Department Group Properties window select the Details tab Enter the company department contact information a Company Details Users First Hame Last Name Address City State Province Count A egion ZIP Postal Code Phone E Mail From the Company Department Group Properties window select the Users tab For a company group all users and visitors defined with this company will be listed For a department group all users defined with this department will be listed The list includes the first name and last name of the user or visitor and the user s group or visitor s group he belongs to Johnson Dole Smith User Group O01 Deleting a Group From the desired Site branch in the Database Tree View window expand the Groups branch expand the desired group branch Company Department Job Title Floor Risk Level Door Input or Relay Groups right click the desired group you wish to delete and click Delete from the drop down list You can also select the desired group and press the keyboard Delete key A dialogue box will appear requesting confirmation Manufacturing Access Control Since 1985 REF Manual Control of Door and Relay Groups The followin
337. urity Group Globe Find K omain Computers Security Group Globe rope Security Group Globe A Tasks 7 z t l Security Group Globe OO Security Group Globe LaF l Wie b TE Security Group Globe tee InebOrgPerson New Window From Here oak oe We E Security Group Globe SS EN sub ie eel MISMO Queue Alias Refresh Printer rae Cees a Security Group Dome Export List User Ee eat E Aa Security Group Dome Shared Folder Properties Security Group Globe UPPORT_ 38894530 User Help elnetclients Security Group Dore New Object Group 1 x Create in testz Users Group name Centaur Group Group name ore Windows 2000 Centaur Group Group scope Group type Domain local Global Universal f Security Distribution Manufacturing Access Control Since 1985 5 Inthe Active Directory Users and Computers window double click on Users In the right panel right click on the new created group and choose Properties 6 Inthe Members tab click on the Add button Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration amp Active Directory Users and Computers lt 1 File Action view Window Help e am B xee Bl On eiuree Active Directory Users and Computer mos Saved Queries agp beste E Builtin Bg Computers E E Domain Controllers 18 objects
338. utput addresses as demonstrated below e Outputs 1 to 6 belong to Doors 1 and 2 controller e Outputs 7 to 12 belong to Doors 3 and 4 CA A470 A DIP 1 off DIP 2 off e Outputs 13 to 18 belong to Doors 5 and 6 CA A470 A DIP 1 on DIP 2 off e Outputs 19 to 24 belong to Doors 7 and 8 CA A470 A DIP 1 off DIP 2 on The selected door and its selected outputs must be from the same controller or the same expansion module For example outputs 7 to 12 can only be used with doors 3 and 4 they cannot be used with doors 1 and 2 or 5 to 8 When a check mark is placed in the appropriate output check boxes under the Output Activation heading the selected output s will operate as defined by the output s programmed features refer to Outputs on page 153 Manufacturing Access Control Since 1985 gt F A a Fi 7 REFERENCE MANUAL Users The Users tab displays the list of users having access to this door The access to this door is granted by programming the card access level of the user s card s Refer to Modifying a Card on page 128 for more information Each user is displayed using its first name last name and the user group he belongs Door Properties Smith User Group O01 to Dole Johnson MA Manufacturing Access Control Since 1985 Floor Public Access Schedule When using CA A480 A Elevator Controllers refer to Elevator Control on page 133 a reader can be installed inside an elevato
339. ve 3 From the Security Level drop down list select the security level you would like to assign to the selected site When a site is selected only Security Level All security levels created for that site will appear in the drop down list Although there is only one Security Level drop down list you can assign a different security level to each selected site The selected Receptionist Security Guard security level will be assigned to the highlighted site whose check box is selected 4 Return to step 2 to assign another site and security level or click OK to save and exit Manufacturing Access Control Since 1985 REF Operators Operators enable you to determine which personnel are authorized to program control and or monitor the Centaur Integrated Access Control System through the Centaur software Define the login ID and password assign a permission and select which software modules will be accessible for each operator Setting the Operator s Access Rights Perform the following to define the operator s system privileges Operator Properties 1 From the Operator Properties window select the Operator Details Operator Operator Details Modules tab Centaur Settings Logon ID 2 Inthe Logon ID text field under Centaur Settings type the operator s user name that will be used when logging on to the Centaur server see Starting the Centaur Server and Software on page 11 Password Co
340. ve been assigned to a site will be listed see Site Floor Settings on page 39 Assign the desired floors to the floor group by selecting e cnedule Never their associated check box Schedule N Alternate Floor Group None Selecting a Floor Group Schedule Cancel Access to the floor group s assigned floors see Assigning Floors to a Floor Group on page 174 will be granted when the selected schedule is valid Select the desired schedule from the Schedule drop down list This schedule affects all floors in this floor group Also refer to Schedules on page 79 Setting an Alternate Floor Group If the selected schedule see Selecting a Floor Group Schedule on page 174 is not valid Centaur will verify the schedule selected as the alternate floor group If the alternate floor group s schedule is valid the user will have access to the floors assigned to the alternate floor group Select the desired floor group from the Alternate Floor Group drop down list Assigning Devices to a Door Input or Relay Group From the Door Input Relay Group Properties window select the Doors Inputs or Relays tab All the devices that have been programmed in the current site will be listed Assign the desired devices to the group by selecting their associated check box Example In the example below the selected relay group has been assigned relays 3 4 and 5 from controller 1 Figure 33 Example of Programming a Gro
341. vels 124 Cards 59 72 131 CCTV Commands 193 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Controllers 98 Doors 118 Groups 176 Holidays 77 Inputs 152 Outputs 159 Relays 141 Schedules 83 Security L evels Pe rmissions or Operators 178 190 196 Sites 42 Deleting Databases 234 236 Deleting Databases See also Purging Databases and Remov ing Databases Delimiter 43 Detaching Databases 236 Details 196 Details Tab Holiday Programming 76 Details Tab Schedule Programming 81 Device 165 Device Activation Events 164 Device Specific Event Definition 163 Diagnostic Tool 13 18 190 Dial up Number 34 Dialup Site 31 Dip Switches Controllers 89 Direct Serial Port Connection 30 Disable a Door Group 176 Disable Card After 131 Disable Door Manually 219 Disable Input Manually 222 Disconnecting 42 Disk Event Definitions 164 Display Abnormal Events 218 Access Events 218 Acknowledged Events 218 All Events 218 Controller Status 221 Door Status 119 Input Status 222 Output Status 223 Relay Status 141 220 Display Door Status 119 Display Notification Message 210 Displaying Events 218 Distributed Card Programming 35 Door 179 Door Configuration 91 Door Expander s Configuration 97 Door Forced Open Output Activation Events 158 Door Groups also see Groups 174 r ao Ha REFERENCE MANUAL Assigning Doors to a Door Group 174 Enable or Disable 176 Lock or Unlock 176 Do
342. view 2 6 2 nts odo oe bd a waa eo Oe eb oda ee ab we ee CE OE ark ot oh wee wee bee eS 162 Event Schedules and Device Activation 0 0 0 00 00 ee ee eee eee 164 MlalM ACKNOWICOGEMCN cus cue ee en iee Patek ee dad shee ERE PAE SPAMER PRR TEER ee eae eee 166 E Mail Activation 0 0 0 ee eee ee eee ees 168 Event Activated Video Control anaa aaa aaa ee eee ee ee ee eee 169 Macro amp Headcount 0 0 0 0 ee eee eee ees 170 Every event that occurs in the system can be programmed to perform a series of actions Schedules can be assigned to each event defining when the event will be displayed on the screen and when it will be saved in the database Select which device i e relay can be activated when it can be activated and the length of activation A schedule defines when an event will require operator acknowledgement while providing the operator with detailed instructions Manufacturing Access Control Since 1985 REF Event Definition Overview Every event that occurs in the system can be programmed to perform a series of actions The event definitions are programmed separately for each site in the system A default event definition for all devices and or users can be created as well as separate event definitions for each event related device user and visitor 1 To select the desired event double click Events from the desired Settings for Default Card Holders Default General Alarms E Mail Video Macro am
343. w select the Operations tab to define which manual actions see Manual Controls on page 217 that the operator can perform You can also define whether an operator can acknowledge alarms and whether they can acknowledge all alarms see Alarm Acknowledgement on page 166 To allow operators to perform actions detailed above select the check box associated with the desired operation Permissions Assigning Security Levels to a Permission Each site in the permission can be assigned with a different security level 1 From the Operator Permissions properties window select he Sites REFERENCE MANUAL CENTAUR 5 1 Operators Security Level Security Level Database Operations Controller Operations Door Operations Il Input Operations Output Operations Relay Operations Acknowledge Alarms T Acknowledge All DVR Operations Visitor Operators Permissions determine which sites the operator is authorized to access and the operator s security level for each site Permissions are then assigned to operators see Operators on page 188 Operator Permissions Permission Sites and Security Levels and Security Levels tab A list of all sites that have been created will Manufacturing Plant Montreal appear with a check box on the left of each one 2 To assign a site to the permission select the check box associated with the desired site The Security Level drop down list will become acti
344. which doors and floors the card can access Floor Group To obtain access to a door defined for elevator control the desired cards must be assigned a valid floor group If the selected site has been set up for elevator control a list of existing floor groups will appear in the Floor Group drop down list Select the floor group you wish to assign to the card This will determine which floors and during which schedule a card will have access For more information on floor groups refer to Groups on page 1771 Access Level Up to two access levels can be assigned to each card by default and up to four when the Extended Access Levels Levels 3 4 check box is selected refer to page 35 When you click one of the Access Level drop down lists all active access levels in the selected site will appear Select the access level s you wish to assign to the card This will determine which doors in the site the card will have access to and during which time periods each door can be accessed For information refer to Access Levels on page 121 If two or more access levels are assigned to a card access is granted as long as one of the defined access levels is valid when the card is presented Manufacturing Access Control Since 1985 REF Setting Card Options The following check boxes can be used to enable or disable the corresponding options or features P I N If the Use Keypad check box has been selected see Use Keypad on pag
345. word to confirm the user password 10 Click OK Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 Operators Assigning Which Software Applications Operators Can Use All of the software applications listed below are automatically installed with the Centaur software Perform the following to enable an operator to use one or more of the software modules automatically installed with Centaur Operator Operator Details Modules Operator Properties FrontDesk User Managment 1 From the Operator Properties window select the Modules tab By key Ee nE Database Management Database Backup Scheduler FrontGuard Visual Athentification Locator User Location 2 Select the check box es associated with the desired software module s to enable the operator to use the selected software module s WavePlayer Event Driven Sounds Player Pro Report Report Generation P Tracker Time amp Attendance 3 Click OK i O Frontview Real Time Graphic Centaur Service Manager FrontDesk User Management Diagnostics Too Centaur s FrontDesk provides an easy to use interface to program the z eae ae user properties and includes an advanced search engine For more information refer to FrontDesk on page 62 User amp Card Import Export Centaur s user and card import export feature server only enables you to export Centaur user and card data to a csv file or import a csv
346. x lomo See E fae Dt Bastet Traction Csiro E J Running Processes Evert ewer Local Cormorant Seenvbeas Bre acon Yew inde nem ce Dm ag 0 is Sate I Ciba hostel A 4 LJ Aung Processes pj Event fever Local Se eer Dia TOC a ees MU ee Hide Ce Deen oye les Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration Reparing DCOM Perform the following steps to repair your DCOM configuration 1 From the taskbar click Start gt Run The Run window will Run 2 x appear Enter cmd in the text box and click OK At Type the name of a program Folder document or jj Internet resource and Windows will open it For you Open cmd 2 The C WINDOWS System32 cmd exe window will appear Cancel See Type cd systemroot system32 and press the keyboard Enter key Type msdtc uninstall and press the keyboard Enter key ec Select C WINDOWS system37 cmd exe Microsoft Windows KP Version 5 1 2600 MC Copyright 19865 2061 Microsoft Corp C Documents and Settings Technical Supporticd systemroot system32 CNW TNDOWSsystems2 gt msdtc unistall 3 Reboot your computer 4 From the taskbar click Start gt Run The Run window will Run 2 x appear Enter cmd in the text box and click OK md Type the name of a program Folder document or Internet resource and Windows will open it For you 5 The C WINDOWS System32
347. y Microsoft Management Console Remote Assistance C Remote Desktop Skype CO UPnP Framework Windows Live Messenger 8 0 Phone Windows Live Messenger 8 1 Windows Live Messenger 8 1 Phone v Display a notification when Windows Firewall blocks a program What are the risks of allowing exceptions 4 The Add a Port window will appear In the Name field enter DCOM In the Port number field enter 135 Select TCP as your mes Bove icati i Use thoes seine lo Brough Wrens Frew Ta fd te pat communication type and click OK Er awen awat na om wand lo ute Name DOOM Pot rumba 115 TCR C u0 What are the arep of coerina a pat Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 5 1 DCOM Configuration 5 The Windows Firewall window will re appear From the Exceptions tab make sure that the DCOM check box Windows Firewall below the Programs and Services heading is selected Gener Exceptions Advanced bok sok Hcl EA AEOS A Oae a E A ath mic he ia If you are configuring the firewall settings on a workstation hom oulmde sources such as lhe namel We recommend that you cbo the connected to the Centaur Server computer click OK and General tab and select On your done with this computer If you are configuring your firewall settings on the Centaur Server computer go to the next step F Display a nottication wh
348. y and click Properties from the drop down list You can also select the desired user and press the keyboard Enter key Also refer to FrontDesk on page 62 General User Properties First Name and Last Name The First Name and Last Name are used to identify the user and will be used in the Users branch of the Database Tree View window for user identification Dap Liat Shure Sat Date Erai ihain Title Allows the selection of the user title Ted 1 Initial Allows to enter the user initials Company Allows the selection of the user company group Refer to Groups on page 171 for more information Department Allow the selection of the user department Refer to Groups on page 1 1 for more information Jobtitle Allows the selection of the user jobtitle Refer to Groups on page 171 for more information Group Allows the selection of the group the user belongs to Refer to Groups on page 171 for more information Location The Location drop list is used to indicate or change the global anti passback status of a user In Out or Unknown All user s location is set to Unknown after a reset of the anti passback Refer to Controller Anti passback Settings on page 96 for more information Manufacturing Access Control Since 1985 REF Status Allows the selection of the user status Changing the status of the user will change the status of all cards associated to t
349. y assigned to this group or to another group Select all the visitors to be assigned to this group and click OK to confirm To 3 remove a visitor from the group click on the desired visitor and click Remove Visitor Group Default Access Levels Options Parking visitors Add Remove OF Cancel Apply Deleting a Visitor Group In the Database Tree View window right click the desired visitor group and click Delete from the drop down list You can also select the desired visitor group and press the keyboard Delete key A dialogue box will appear requesting confirmation Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control ar What Will Find Ao e ekea e s r 64 3 okt esti eee hee ha awe ed he wees bee h eee eR oh ee oe ee be oe Pwo e gene orl ak oe a EE 76 WOGIVINGO TROA eee rra a a a a See ees wee r ERA ae eee AR 76 BD kea eer LETETTE E E ETE EET EEST EEE ae eee ae ee ee ead E E Tf You can define which days in a year are holidays and then the holidays can be assigned to a holiday group If you assign the holiday to one or more holiday groups schedules are valid or invalid depending on how the holiday group is assigned to a schedule s period see Schedule Periods on page 81 If you do not assign a holiday to a holiday group schedules are invalid access denied on that day Manufacturing Access Control Since 1985 Adding a Holiday Right click
350. y time 1 Front Door 2 is forced open 3 relay 001 03 4B will activate 4A for 30 seconds 5 Figure 32 Example of Activating a Device with an Event 3 Door forced open alarm Settings for Devices 2 il Front Door Production Entrance ORD Manufacturing Access Control Since 1985 Card Holders Devices General Alarms E Mail Video Macro amp Headcount Frank Smith COY Laval Canada Schedule John Dole COWI Laval Canada S creer Always Disk Always Device Activation Actors Activate Relay timed 4A Time 00030 85535 ms max 5 Device Fielay 001 03 4B schedule Aways 1 a REF Alarm Acknowledgement Alarm acknowledgement allows you to program an event to give operators a warning and or Settings for Defaut Card Holders Default General Alarms E Mail Video Macro amp Headcount instructions concerning the event Access denied Card expired Front Door Frank Smith Default Company D Requires acknowledgement that just occurred These Production Entrance Cohn Dole Default Company ao ws instructions will appear in the mii E ec alarm acknowledgement window Instructions The operator can then acknowledge the event and provide details concerning the event To program an event s alarm acknowledgement properties 1 Select the desired event as described in Event Definition Overview on page 162 2 Select the Ala
351. y window appears The DVR Name displays the DVR selected Select the Channel of the selected DVR and the live video will automatically be displayed Press OK to close the DVR Video Display window jojujaje ee i Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 5 1 Integrated Access Control ar INTEGRATED ACCESS CONTROL Chapter 23 Macro What Will Find PONG A WACO 4 2 ea ee coe ek ee enw eh Oe ee BER we sa See ee ed ew oh bd E ee a eee ee oe 206 Modifying Macro SCUINGS lt sesa raires Sic ecb iced bAwa teh desad eat ebewd ease tees ebeeseiaeses he a ee eeeeewe 206 BS ae Ee NAClIO wcke eats eee eee eee ee eee Ded ee ee ee Be ae Ce eee ee eee ee E 207 Macro is used to send actions up to 16 to a device whenever an event assigned with that macro occurs The macro will tell the device to do specified actions like Activate Relay timed Lock Door etc Centaur must be running to be able to use the macro s functionalities Manufacturing Access Control Since 1985 REF Adding a Macro In the Database Tree View window right click Macro from the desired Site branch and click on New Macro The macro properties window will appear see Modifying Macro Settings allowing you to configure the macro settings Modifying Macro Settings To modify a macro right click the macro you wish to modify and click Properties from the drop down list General Macro Proper
352. ys with an Input In this example when input 2 is triggered relay 4 will activate for the period defined by relay 4 s Activation Time 15 sec Input 2 Relay 4 Input Properties Relay Properties Input Details Relay Activation P y Schedules Configuration Normally Closed Timed activation General tt r Enabling Schedule Always Activating Never Input response time 00500 ms STERE Input restore time 00500 ms Activation time 015 seconds 0 to 65535 Bypass delay 00005 Delay time before activation oo seconds 0 to 65535 This input activates relay This input bypasses input Noe o Non activated state De energize Activates relay group None Bypass input group None In this example when input 4 is triggered it will activate relay 3 4 and 5 for the period defined by their respective Activation Time 15 seconds for relays 3 and 4 and 60 seconds for relay 5 Input 4 Relay Group 1 Input Properties Relay Group Properties Input Details Relay Group Relays Configuration Normally Closed Enabling Schedule Always Activation Time set to 15 Activation Time set to 15 Activation Time set to 60 Input response time 00500 ms Input restore time 00500 ms Bypass delay 00005 This input activates relay None This input bypasses input None o Activates relay group M Bypass input group None X Cancel Manufacturing Access Control Since 1985

Download Pdf Manuals

image

Related Search

Related Contents

SDメモリーカード SD-2GB  mode d`emploi - Chambre d`Agriculture de Haute  Sony DWZ-B70HL    Extron electronic DA2 User's Manual  Es-haikoo-00903435  Zenmuse Z15-5D III (HD)    vierling  

Copyright © All rights reserved.
Failed to retrieve file