Home

B.A.S.I.S.® Online User Guide

image

Contents

1. Address i Title City Department State Zip code Division No Last Access Phone Birth date Location Badge ID Issue code E mail Building Floor rt rx TEBERI Prints Record last changed Office phone Extension Activate Deactivate Click Add to start entering Search add Print 4 cardholder FT n general infor ma ti on Cardholders 2 Click Add on the Cardholder tab Complete all appropriate fields on the form 3 Click the Badge tab Chapter 2 Managing Access Notes i i Figure 2 9 The cardholder badge information screen x System Administration System Account Cardholders Adding All Application Edit View Cardholder Administration Access Control Monitoring Video Additional Hardware Window Help la x j at EI a b L OLER ERK Baws Oh l1 5B a F R Cardholder BE Badge Access Levels Biometrics bs Visits al Assets f Directoy Accounts ZE Guard Tours Reports Last name First name Middle name Carter jJ enny G h oose th e Badge type badge type Emoe UH HH Employee is Badge ID Issue code Activate Deactivate not the only Ec eoo badge type you i Ma could choose TEEN PIN Use limit _ Enter the FK APB exempt Embossed Bad ge ID if the 7 Use extended strike held times FR i i Badg
2. m Using the menus usually requires first selecting an item in one of the monitoring windows The following table identifies the Alarm Monitoring menu items Use this menu To File Open or close the application or Change the password Edit Select delete or acknowledge events View Open windows duplicates the function of the toolbar Trace Trace a badge or component Configure Filter alarms Control Manipulate the functionality of items Options Control the operational behavior of various windows Window Control the interaction of multiple windows Help Get information 3 13 Notes Chapter 3 Monitoring Alarms Notes The following graphic identifies each button on the Alarm Monitoring toolbar Figure 3 14 Alarm Monitoring toolbar S amp Oe Traces a badge or event Opens a selected door for the strike time a Acknowledges a selected event Initiates configured guard tour Opens the Scheduler Allows you to retrieve report Displays a list of configured maps Displays a cardholder screen Provides a separate window for high priority events Displays the System Hardware Tree in the foreground Displays the Main Alarm Moni toring Window in the foreground Opens closes the application 3 14 Glossary of Terms Use this glossary as a reference and whenever you see a word in Italic type like this timezone Appendix A Glossary of Terms Notes Terms ac
3. than one Prints access level Activate MV Show unassigned levels 1 levels assigned Deactivate Cancel Clear Clear All Capture Person type Cardholder ts Cardholders Adding All Ready NUM Y 7 Select the appropriate access levels for the cardholder Only the access levels accompanied by a checkmark are selected for assignment 8 Click OK to save the record 2 11 Chapter 2 Managing Access Notes 2 12 Monitoring Alarms The Alarm Monitoring application permits you to perform many real time functions to the access control system hardware The application per mits you to m view hardware and system events as they occur m view the current status of each system com ponent control functionality of components through out the installed system The combined real time functionality that the Alarm Monitoring application allows provides you with a valuable tool for monitoring control ling and troubleshooting a B A S I S system The Alarm Monitoring application ts like all B A S I S applications in that you may navigate through choices of menus and a toolbar The fol lowing instructions will use a combination of both navigation methods Chapter 3 Monitoring Alarms Notes Click on any column to sort by that field More fields are available for sorting than are displayed here Alarm monitoring tab Click to display the Alarm Moni toring Wind
4. An B A S I S on board relay or switch that is config urable to follow the status of an input system con dition or a time zone Personal Digital Assistant An alarm that requires acknowledgment A circuit board that acts as the integration point for access activity at a particular opening The RIM inte grates Card Reader Door Position Request to Exit and Lock Control activity with the ISC Appendix A Glossary of Terms Notes request to exit strike time System Hardware Tree tracing events time interval timezone unlock duration use limit A sensor usually installed on the non secure side of the door that will mask the door position switch upon activation See unlock duration The screen that displays all hardware devices allow Ing you to directly control them To track down when a system event occurred or to trace the activity of a badge ID either in real time or historically A specific range of time which corresponds to a particular day or days of the week A time zone can be comprised of several individual intervals A defined range of time for assignment to various access control activities A time zone may be applied to a reader or readers when creating an access level to a reader to change the mode of operation to a relay to activate and deactivate to an input to mask and unmask and a host of other oper ations The time that the lock momentarily unlocks A configuration limiti
5. Managing Access l Notes Figure 2 4 1 System Administration System Account Holidays Timezones fa Application Edit View Administration Access Control Monitoring Video Additional Hardware Window Help x ja YA ee JB l EB E m i a B amp El Roe amp Be E a amp BH a H 0 i d ay ta b Holidays Timezones Timezone Reader Modes Holiday Type s sd Type 1 _ type 2 _ Type 3 lType 4 zl Start date Sun Mon Tue Wed Thu Fri 27 28 29 30 1 2 3 4 5 6 7 8 9 10 11 12 gt 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 1 2 3 4 5 G Click Add to of selected create a holi a olidays Timezones day Ready NUM 2 Click the Holiday tab 3 Click Add Figure 2 5 Adding the Spring Break holiday a System Administration System Account Holidays Timezones ost Application Edit View Administration Access Control Monitoring Video Additional Hardware Window Help j x Ja bo t a E Bl eo amp DT N 88a BH Holidays Timezones Timezone Reader Modes 4 Name Date _ Days Type1 Type2 Type3 Type Type5 Types Name Name the holi 2 Sing bre day descrip T Holiday Typets O A tively _ Type3 Select the holi _ _ Z lt Z Tiype4 zl day type Sun Mon Tue Wed Thu Fri S
6. be active Cancel Clear Help Add Mode Close Ca Holidays Timezones Ready NUM A Chapter 2 Managing Access Notes 4 Choose a name for the timezone and enter the choice in the Name field Choosing a name that actually represents the period of time for the timezone allows you to more effi ciently retrieve a timezone from a long list The timezone list can include up to 255 different time zones 5 Enter the desired start and end times for each desired interval time must be entered in a 24 hour format Indicate by checking the check box on each day that you want the interval to be active 6 Click OK The new timezone has been added to the list Notice the Timezones tab has additional headings for some thing other than standard days of the week These H1 through H8 headings represent holidays that allow for the exceptions to each interval These holidays or exception days are con figured on the Holiday tab B A S I S organizes these exception days into one of eight types Those exception days that are to be treated the same would be organized into one of the eight types A holiday type can contain more than one configured exception period Holidays can be defined as one 24 hour period or a series of uninterrupted days To add a holiday 1 If not already on the Holidays Timezones window from System Administration click Access Control gt Timezones The Holidays Timezones window displays Chapter 2
7. alarms cannot be deleted message Alarm Monitoring x a i Some alarms cannot be deleted until you acknowledge them These events have been configured by the System Adminis trator to require an action other than deletion for proper man Notes Chapter 3 Monitoring Alarms Notes agement of the event This action is usually referred to as acknowledging an event Like deleting an event an event can be acknowledged several ways To acknowledge an alarm event Do one of the following m Click on the event and then click on the menu Edit gt Acknowledge OR m Click on the event and then click on the yellow check mark button from the toolbar OR m Double click on the event OR m Right click on the event and then select Acknowledge Any of these methods may remove the event from the Main Alarm Monitoring window or may display Figure 3 3 Figure 3 3 Acknowledging an alarm Alarm Acknowledgment gt Alarm information Description Time date Door Forced Open fat BAM 7 22 2004 Controller Device Administration Building Front Door Input output Card None Acknowledgment Original notes Call 911 and dispatch the security guard Type the appro priate note into this section Click DS SS eee lt Previous Next gt l Acknowledge and then Close If this screen is displayed the acknowledgement transaction has been configured by the System Administrator to require not
8. filter selected alarm types 1 Make sure that the Main Alarm Monitoring window is active not behind another window or inactive by clicking on the title bar 2 Click on Configure gt Alarm Filter The Alarm Filter for Main Alarm Monitor window displays 3 11 Chapter 3 Monitoring Alarms Notes Figure 3 13 Selecting some alarm event types to filter out Alarm Filter for Main Alarm Monitor Ea Event types to monitor gpAcoess Denied KK FR O Access Granted UA Area APB DA Asset L Biometric LA Burglary LA ca00 Clear the alarm events that you do not want to display on the alarm monitor Ing window All the alarm events that niz have a check mark will dis ie m play 3 Clear the check mark on the event type s that you do not want to display in the Main Alarm Monitoring window The event type s left unchecked will not display until the check mark is re entered by the selec tion s 3 12 Chapter 3 Monitoring Alarms Other Features The toolbar and menus of the Alarm Monitoring application provide much more functionality than is discussed in detail in this document Constant use and exploration of the applica tion will reveal many more options and multiple ways to per form the same operation Here are some guidelines to use as you navigate through the application m Right clicking on an event or object will usually reveal options available for the selected item
9. 1 Select the group of alarm events 2 Do one of the following m Right click on the selection and then left click on Fast Group Acknowledge OR m Click on the events and then click on the menu Edit gt Fast Group Acknowledge OR Click on the yellow check mark from the toolbar Any one of these actions should display Figure 3 5 Figure 3 5 Acknowledge Selected Alarms window Acknowledge selected alarms Ea Clic k he re to Some alarms require acknowledgment notes Please enter acknowledgment notes to be used for all alarms select the note s that are E appropriate for Select Notes the selected alarms OR Type the note _ that is appropri ate p Click OK 3 Type in or select the desired notes to complete the acknowledgement transaction 4 Click OK System Hardware Tree The Main Alarm Monitoring screen provides some useful information but other screens are available that may present a more complete picture of the exact operating status of the system One screen that is especially helpful in monitoring the status of a B A S I S system is the System Hardware Tree To launch the System Hardware Tree Click on the tool just to the right of the yellow bells Figure 3 6 Clicking on the System Hardware Tree button Click on System ____ Tree button Click 0n the e ar Administration Building Firmware Revision 3 059 sign to col lapse the tree Click on t
10. B A S I S Online User Guide Copyright 2004 Stanley Security Solutions Inc and Stanley Logistics Inc All rights reserved Printed in the United States of America Information in this document is subject to change without notice and does not represent a commitment on the part of Stanley Security Solutions Inc The software described in this document are furnished under a license agreement or nondisclosure agreement This publication is intended to be an accurate description and set of instructions pertaining to its subject matter However as with any publica tion of this complexity errors or omissions are possible Please call your Stanley Security Solutions Inc distributor or Best Access Systems at 317 849 2250 if you see any errors or have any questions No part of this man ual and or databases may be reproduced or transmitted in any form or by any means electronic or mechanical including photocopying recording or Information storage and retrieval systems for any purpose without the express written permission of Stanley Security Solutions Inc This document is distributed as is without warranty of any kind either express or implied respecting the contents of this book including but not limited to implied warranties for the publication s quality performance merchantability or fitness for any particular purpose Neither Stanley Security Solutions Inc nor its dealers or distributors shall be liable to the us
11. Introduction l Notes Figure 1 1 Toolbars vs the menu a System Administration System Account Application Edit view Administration Access Control Monitoring Video Additional Hardware Window Help Toolbars om ud f a Be amp amp oF Z Fe RBG se mila BH a Reports The Card Formats Administration azi a ses Menu Directories Certification Authorities Users Workstations System Options Cardholder Options Segments List Builder Mobileveriry OpenlT Message Queues Text Library Archives Scheduler Action Group Library Global Output Devices Download Entire System a Z The following instructions will use menus for navigation and all of the configuration will be performed through the Admin istration and Access Control menu lists Once a particular screen has been chosen the Administrator has the choice of buttons in dark typeface at the bottom of the page Chapter 1 Introduction Sample buttons The following list represents most of the choices that are available m Add means to create a new record m Modify means to edit an existing record m Cancel means to abort the current operation m Delete means to remove the record from programming and m OK means to save the record Additionally every configuration screen has a Help option that will take the Administrator directly to a graphic of the sele
12. at 27 28 29 30 31 1 2 Select the day er y l H that the holiday 17 18 19 20 21 2 23 starts and then 24 25 26 27 28 29 30 1 2 3 4 a a r enterthe number l of days th at it 4 gt Duration days E 4 lasts Cancel Clear Help Add Mode Close Holidays Timezones Ready NUM Z 4 Enter a unique and descriptive name for the holiday 5 Select the holiday type by selecting one of the check boxes Chapter 2 Managing Access Notes 6 From the calendar select the day that you want the exception period to start 7 Enter a duration in days if the holiday lasts more than one day 8 Click OK to save the record 9 Click the Timezones tab and select Modify 10 Determine which exceptions days the timezone will be active by checking the appropriate check boxes The holiday type selection will take priority over a day of the week that is or is not checked 11 Click OK to save the record Chapter 2 Managing Access Access Levels Notes Creating access levels satisfies the where element of the access control equation An access level is nothing more than a reader timezone combination E To add access levels e 1 From System Administration click Access Control gt Access T Levels Where i The Access levels window displays o yr Figure 2 6 w System Administration System Account Access Levels Bb Application Edit View Administration Access Co
13. be performed from the Main Alarm Monitoring window as well as by selecting an event from the displayed list and right clicking and making a selection from the displayed choices or by selecting event an using the Control option from the menu Chapter 3 Monitoring Alarms Tiling displaying multiple two screens Notes Many times you may want to display both the alarm monitor ing screen and the system hardware tree at the same time This type of display enables you to enjoy the advantages of both screens The process of displaying multiple screens is called tiling To tile two alarm windows m Clicking Window gt Tile Horizontally or Vertically Figure 3 8 The Alarm Monitoring window and System Hardware Tree tiled vertically amp Alarm Monitoring System Account i Ed File Edit Yiew Trace Configure Control Options Window Help Main Alarm Monitor Alarm Description Controller Device z 8 Default Zone Alarm Active 10 04 AM Administration Building Administratic G n Administration Building Firmware Revision 3 059 Al arm _ _ Alarm Restored 10 04 AM Administration Building Administratic Administration Alarm Panel Door Forced Open 10 04 AM Administration Building Front Door ui i i M on ito r n g Q Granted Access 10 01 AM Administration Building Front Door 8 Motion pecector activated Alarm Restored 10 04 AM Administration Building Adminis
14. cess level access panel Intelli gent System Control ler ISC acknowledge activation deactiva tion date badge badge ID badge type card format cardholder communication server credential cylindrical An access control relationship made between a reader or readers and a time zone or time zones An access level is assigned to a badge ID for the pur pose of granting access through a reader or readers during a specified time A circuit board with on board memory that is responsible for making most of the decisions in an access control system The act of taking note of an event and taking any action required The date that a credential becomes active or expires The credential or token that carries a cardholder s data Part of the access control information that is encoded to a token This information usually numerical is unique to a particular credential holder Used in B A S I S to determine a number of param eters for a particular badge ID These parameters include the activation and deactivation dates default access groups the applied badge design the printer used to print the badge the required data fields for cardholder entry and a range of badge ID s to be used for a specific group of badges The way that data is arranged and ordered on the card An individual who is issued a particular credential The server application designed to provide network services to access panels reade
15. cted screen This online help follows typical Windows search conventions Finally when multiple screens are opened at one time tabs will appear at the bottom of the page to assist in the selection of a single screen from the dis played group Figure 1 2 Sample buttons and tabs located at the bottom of the window Add Mody Delte Hep Sample tabs e i ra Holidays Timezones E Access Panel Ti Alam Configuration Ready How to use this guide This manual is intended for use as a training guide and a ref erence in the day to day operation of a B A S I S online sys tem Chapter 2 Managing Access This chapter provides step by step procedures to set up timezones holidays access levels and on the adding modifying deleting and searching card holders Chapter 3 Alarm Monitoring This chapter provides com plete step by step instructions to set up the user interface for efficient alarm monitoring Appendix A Glossary This appendix provides a list of terms that are specifically used in the B A S I S software Terms that appear in the glossary are set in italics when they are first used Managing Access Determining a person s ability to use his or her card to gain access through a door is really a matter of solving the equation Who can go where when Reversing this formula we can see that permit ting access contains the following in the order of process 1 time when eleme
16. e Installation amp Setup User Guide Chapter 1 Introduction Notes MapDesigner User Guide system Administration User Guide Universal Interface Server User Guide Replicator User Guide View Edit Only Workstation User Guide Alternative Wiring Configurations Guide Legato Co StandbyServer User Guide Hardware Installation Guide Visitor Management User Guide Area Access Manager User Guide Digital Video User Guide Video Archive Server User Guide Replication Administration User Guide Digital Video Hardware User Guide B A S I S Interface User Guide Getting technical support Best Access Systems Representatives provide telephone technical support for all B A S I S products You may locate the representative nearest you by calling 317 849 2250 Mon day through Friday between 7 00 am and 4 00 pm eastern standard time or visit us on the web at www bestaccess com Navigation of the software The B A S 1 S application follows normal Windows conven tions and several methods are available to the operator for navigation These methods include using both menus and toolbars Many first time operators indicate that using menus rather than toolbars for navigation gives a more intuitive experi ence Moreover the menus provide access to all configura tion options whereas the toolbars provide access to only the most commonly used configurations The following graphic shows the menu and toolbar Chapter 1
17. e ID field will accept adge the data Allow access to Last changed Issue code ET Ti v Prints T7 Passage mode Last printed Activate IF Deadbolt override Deactivate Cancel Clear Clear All Capture Person type Cardholder ne Cardholders Adding All Adding All m 2 4 Selectthe appropriate Badge Type from the drop down list 5 Enter a Badge ID for the corresponding badge only if the field will accept data Sometimes a system is set to automatically generate badge ID s and manual entry will not be required Complete the rest of Badge tab as required by your organization 6 Clickthe Access Level tab 2 10 Chapter 2 Managing Access l l l Notes Figure 2 10 The cardholder access level information screen x System Administration System Account Cardholders Adding All Application Edit View Cardholder Administration Access Control Monitoring Video Additional Hardware Window Help 5j x x R 2 B a a mb amp El amp ii TELERITE 2 Cardholder BE Badge Me Access Levels Biometrics B Visits l Assets Directory Accounts 42 Guard Tours E Reports Last name First name Middle name Carter Jenny Cardholder ID Badge type Employee Activate Dates Access Groups Choose the access level for this card holder You en may need to choose more Issue code
18. e strike time Using the system hardware tree window you can open unlock a door for the amount of time that is programmed for the lock or strike This is called the strike time To open a door for the strike time Do one of the following m Click on the reader and then click on the blue door button from the toolbar OR m Right click on the reader from the tree and then click on Open Door s OR m Click on the reader from the tree then from the menu Control gt name of the reader gt Open Door s Chapter 3 Monitoring Alarms Notes Changing the mode of the reader A reader can be in any one of the following modes DI Card and PIN Card only PIN or card Facility code only Locked Unlocked 00 00 0O To change the mode of the reader Do one of the following m Right click on the reader from the tree then click on Reader Access Modes and then the new reader mode OR m Click on the reader from the tree then from the menu click Control gt the name of the reader gt Reader Access Modes gt the new reader mode Masking an alarm input Alarms can be masked selectively ignored under certain conditions To mask an alarm input Do one of the following m Right click on the alarm input from the tree then click on Mask gt Alarm Input s OR m Click on the input from the tree then from the menu click Control gt the name of the input gt Mask gt Alarm Input s Most of these same functions can
19. eover the more events left to accumulate on the Main Alarm Monitoring screen the slower the screen will respond to opening closing and general manipulation of the window Events on this screen can be sorted by many methods and these methods are represented by clicking on the various col umn headings as shown in Figure 3 1 Additionally these methods may be customized through the Options menu Chapter 3 Monitoring Alarms Deleting events Events can be deleted by several different methods any method chosen is acceptable and will accomplish the same thing To delete an event Do any one of the following m Click on the event and then press the keyboard delete button m Click on the event and then click on the menu Edit gt Delete m Right click on the event and then select Delete from the provided choices The same methods for deleting single events can be used for deleting several events at one time To delete all alarm events at one time 1 From the Alarm Monitoring Application click Edit gt Select All 2 Perform one of the following m Press the delete button on the keyboard OR m Right click on the selection and left click on the delete selection OR Select Edit gt Delete from the menu OR O Click Edit gt Delete All Acknowledging Events Occasionally not all of the alarms will be deleted with a delete command If this is the case you will get a message like Figure 3 2 Figure 3 2 The Some
20. er or any other person or entity with respect to any liability loss or damage caused or alleged to be caused directly or indirectly by this publi cation The Best Access Systems logo and B A S I S are registered trademarks of Stanley Security Solutions Inc Microsoft Windows CE and ActiveSync are registered trademarks of Microsoft Corporation T81148 Rev ER 7991 40 Aug 2004 Contents 1 Introduction Related documents 1 1 Getting technical support 1 2 Navigation of the software 1 2 How to use this guide 1 4 2 Managing Access Holidays and Timezones 2 2 Access Levels 2 7 Cardholder Management 2 9 3 Monitoring Alarms Deleting events 3 3 Acknowledging Events 3 3 System Hardware Tree 3 6 Pending alarms 3 10 Tracing alarms 3 10 Filtering alarms 3 11 Other Features 3 13 A Glossary of Terms Terms 2 Introduction Thank you for choosing B A S 1 S the world s leading combination online and offline access control system Use this guide to make sure that you set up and use your system in the most efficient way and to get the most out of it Related documents The following documents are available to help you install maintain or operate other related systems See your BEST Representative for more information m Electronic Stand Alone Lock Service Manual Alarm Monitoring User Guide BadgeDesigner User Guide FormsDesigner User Guide ID CredentialCenter User Guide Basic Import Utility User Guid
21. es to be included before the event can be removed from the Main Alarm Monitoring window You can include notes in one of two ways Chapter 3 Monitoring Alarms To acknowledge an alarm by including notes Notes 1 Type the desired response directly into the Notes section 2 Click Acknowledge 3 Click Close OR 1 Click Select A list of predefined acknowledgement notes is dis played These predefined acknowledgement notes would have been configured by the System Admin istrator Figure 3 4 The Select Acknowledgment notes window displays After making 4 Door Forced Ack Mote sure to do what the acknowl edgment note calls for click the name of the acknowledg ment note so Acknowledgment notes that a check mark appears next to It Called 911 dispatched the security guard Everything checked OK This section lists the text of the acknowl edgment note that spells out exactly what was done 2 Click Acknowledge 3 Click Close Note The System Administrator may have configured other aids for alarm event management You could use these aids by read ing the requirements for event response in the Instruction window or by playing a sound instruction file by clicking on the Audio button Events can be acknowledged also in groups Once the events have been selected the events can be acknowledged in one of several ways Chapter 3 Monitoring Alarms Notes To acknowledge a group of alarm events
22. he sign to expand the tree Red Xs show ing that the device is off line Chapter 3 Monitoring Alarms Notes Figure 3 7 The System Hardware Tree Alarm Monitoring System Account System Status Tree all devices HSE File Edit view Trace rn a Default Zone Qptions Window Help Configure Control B Motion Detector activated n f Reception Release j Cl Roof Hatch j t Side Door oe Siren soft Strobe W EE Front Door faccess mode card only A video Server Viewing all Active count 1 Offline count 2 Mask count T Main Alarm Monitor in Pending Alarms f System Status Tree all devices BREAKTHROUGH DISABLED Connection errors Offline controllers 1 E 4 I Ready Expand the tree by clicking on the plus symbols You can now observe the system in real time status tree format This for mat is useful to determine whether the installed equipment is operating properly and the exact status of each component Components failing to communicate status are indicated with a red x Notice that this screen is represented in the lower left corner by a tab containing the corresponding toolbar icon The operator can assume control of the functionality for the various components In many ways Like the Main Alarm Mon itoring window there are various methods is to do this Some examples include the following Opening a door for th
23. isplays Figure 3 11 Entering the badge ID to trace Trace Badge Ei Enter the badge _ ID number to be Badge ID 351200 traced omei tee 2 Type inthe badge ID to be traced 3 Click OK 3 10 Determine whether to trace the badge ID in the past and or in realtime lf you only want to find out where someone was within a certain time period click the per form historical trace and then select the start and end times Chapter 3 Monitoring Alarms The Trace Configuration window displays Notes Figure 3 12 Determining whether the trace should be live and or historical Trace Configuration E Today FP Perform historical trace Start Thursday July 22 2004 1200 4M End Thursday July Z22 2004 11 59 PM Apply start and end time to each day Use restored transactions d Uu au a u au au l wad aa U du daa a a u dwa da u a Wa waa FP Show only those alarms which have marked video Alarm Filter Cancel Help 4 Determine the type of trace desired by choosing from Historical Live or both 5 Select the appropriate trace criteria 6 Press OK All of the activity associated with the trace request will dis play on its own window in the Alarm Monitoring display Filtering alarms The alarm filter provides an on the fly method for you to pre vent certain events from reporting in the Main Alarm Monitor ing window To
24. me Executive access Fm Command authority for users Download to intelligent readers First card unlock authority Timezone Elevator Ctrl Access Panel Assign gt lt Remove Add Mode mf 4 3 Choose a name for the access level and enter the choice in the Name area 4 Select the reader s and timezone configuration s to be included in the access level Remember that a selection is not made unless a checkmark is observed 5 Click Assign to move the reader and timezone selections to the right side of the form Click OK to save the record Chapter 2 Managing Access Cardholder Management Notes Adding cardholders satisfies the final element of who for the access control equation To add cardholder records 1 Open System Administration and go to Administration Cardholders A page with several tabs will be displayed We are only concerned with the first three tabs of Card holder Badge and Access Levels for common day to day entry Who Figure 2 8 The cardholder general information screen 1 System Administration System Account Cardholders Application Edit View Cardholder Administration Access Control Monitoring Video Additional Hardware Window Help Ja amp v tbe Gs amp E al RR BOS J i1 Bi a amp 8 eeeooooceeoooooseoooosoosoooeeen Last name First name Middle name Cardholder ID Badge type
25. ng a credential to a defined number of uses Appendix A Glossary of Terms Notes
26. nt 2 location where element 3 person who element The following diagram represents this formula and will be used throughout this guide to help you remember it Chapter 2 Managing Access Notes Figure 2 1 Pictorial of the basic access control formula EL When Where Who Access Once all of these elements have been satisfied a card is ready for use in the system These instructions will refer first to the time element of the access control equation Holidays and Timezones A timezone is a block of time that a particular activity or func tionality is allowed to occur These blocks of time are repre sented by intervals A holiday represents a special period of time where the timezone is to behave differently Or to put it another way a When holiday is an exception to the normal workings of a timezone To add a timezone 1 From System Administration click Access Control gt Timezones The Holidays Timezones window displays Chapter 2 Managing Access l l l l Notes Figure 2 2 The Timezone window showing the Always schedule u System Administration System Account Holidays Timezones a Application Edit wiew Administration Access Control Monitoring Video Additional Hardware Window Help m a x x R B a a a El Mi Hi 5 a amp BE 4 Timezones tab Holidays Timezones Timezone Reader Modes I
27. ntervals Start End Sun Mon Tue Wed Thu Fr Sat HI H2 H3 H4 H5 H H H The default 1 00 00 22 53 Vv Vv Vv Vv Vv Vv Vv Vv Vv Vv iV Vv Vv IV iv Always TET TE N RE N cd UM a SS NE SR VR SE Y SE NE NI E DP ch schedule EWJ EEE s3 zil s B z k 2 s32 chee le oct ri B zil che 4 mz fom ee ep TT YET eh eR Wel Glee Gib DE ZINE YO EF ISE TINE BA BIREN HE ER E we lS TV ele le lee icles la A je SE TE lle ol JE TE EE EN Naaa Pi en E TERE fai ol R DE re ae ef ee hc et A ya i i Add Modify Delete Help 1 of 2 selected Close cee dlm zan f Holidays Timezones timezone Ready 2 Click the Timezones tab A list of the existing timezones will be displayed 3 Click Add to create a new timezone to the list Figure 2 3 Adding a timezone w System Administration System Account Holidays Timezones a Application Edit view Administration Access Control Monitoring Video Additional Hardware Window Help _ j x J amp amp S t ma Ss Be 4 fof E Tla BH a Enter the time zone name Intervals Mon Fri 8am 5pm Start End Sun Mon Tue Wed Thu Fri Sat H1 H2 H3 H4 H5 H6 H H8 Emerita a 1 Io8 00 17 00 _ rr NIK inter BE EB val s start BE BB BR ER BRE ER BR BR ER ER RR BR ER ER ER EN BN end and days BE BB BR ERB BR ER BR BR ER BR ER BR ER ER ER EN EN 0f the week EN EB o BRE ER BR EN EN BR EN BR BR EB BN EN ER when it is to BE BB
28. ntrol Monitoring Video Additional Hardware Window Help l8 x xR 2 a ma Ss amp EB e e ER Roos Oh VOB BR Access Levels Elevator Control Access Groups Access Levels Access Level Command authority for users Fi Download to intelligent readers Fm First card unlock authority Timezone Elevator Ctr Elevator Add Modify Delete Help Close fo Access Levels I 2 Click Add to create an access level Chapter 2 Managing Access Notes Choose the name of the access level Choose the readers that Will define the where of the access level Choose the time zones that will define the when of the access level Figure 2 7 1 System Administration System Account Access Levels Bb Application Edit View Administration Access Control Monitoring Video Additional Hardware Window Help x 2 Y t a 5 amp EB Bote B Access Levels I Access Levels Elevator Control Access Groups Assign To Access Level Administration Bui Manufacturing Bui Administration Bui Manufacturing Bui Manufacturing Bui Administration Bui wh Back Door No Memployee Entrance No Mirront Door No Ffi Maintenance Entrance Mo Receiving Dock No Zi Side Door No Jf Timezones Always A Mon Fri 8am 5pm A Never Cancel Clear Help Ready Na
29. ow amp Main Alarm Monitor 32 System Status Tree all devices Upon logging into the Alarm Monitoring application you are usually greeted with the Main Alarm Monitoring screen This screen is identified with a tab containing yellow bells that is located in the lower left portion of the screen See Figure 3 1 Figure 3 1 Main alarm monitoring window Alarm Monitoring System Account Main Alarm Monitor Hr File Edit view Trace Configure Control Options Window Help ag Uae oa l EB TEBA oT Aw D SWE Live lt Alarm Description Controller Input Output f Card Granted Access 10 11 AM 8 4 2004 Administration Building Front Door None David Herin 351200 50 Ready BREAKTHROUGH DISABLED Connection errors Offline controllers 1 Offline readers Offline ale You can view this screen anytime in the forefront of the appli cation by clicking on the tool containing the yellow bells This screen presents events in a line by line textual format as they occur in the system and is used to manage these events by deleting or acknowledging them after the appropriate action has been taken Take care to not allow an excessive number of events to accu mulate on this screen Events will scroll off of the screen once the screen is filled Allowing these events to scroll off of the page can create some confusion for the operator when look ing for a specific event Mor
30. rs PCs and PDAs A physical token usually a card or fob encoded with access control information Lock chassis that installs into a circular bore in the door deadbolt override encoder extended unlock facility code filtering alarms holiday input intelligent system controller ISC mask mortise output PDA pending alarm reader interface mod ule RIM Appendix A Glossary of Terms The ability for an authorized credential to retract Notes both the spring latch and the deadbolt when the deadbolt is engaged The device connected to a PC running B A S I S used to encode magnetic stripe cards or smart cards The extra period of time the lock will unlock when an authorized credential with extended unlock privi leges is presented Part of the access control information that can be encoded to a credential This information usually numerical is unique to a group of credentials Usually this feature is used to authenticate a creden tial to a particular organization The act of refining specifically what alarms ned to be displayed on the Alarm Monitoring window A special period of time where the timezone is to behave differently An exception to the normal workings of a timezone A hardware connection point used for status report ing of a particular sensor See access panel Hiding or ignoring an event A lock chassis that installs into a mortised cavity in the edge of a door
31. tratic Reception Release screen amp Roof Hatch t Side Door A Siren Strobe System sss i y 0 Front Door access mode card only Tre e RRE Video Server screen 34 Camera 1 a Selected alarm Sort criteria Input Output Pending 2 Total 5 _4 Viewing all Active count 1 Offline count 2 Mask count O Z S System Status Tree all devices amp Main Alarm Monitor BREAKTHROUGH DISABLED Connection errors 0 Offline controllers 1 Offline readers 0 Offline alarr Note Whichever screen is active at the time will go to the top or to the left Chapter 3 Monitoring Alarms Notes Pending alarms The Pending Alarms screen can be launched by clicking on the toolbar button represented by the red bells This screen provides an option to sort higher priority alarms to a window separate from the Main Alarm Monitoring window To display all pending alarms m Click on button with the red bells Figure 3 9 Clicking on the pending alarms button Click on Pend Ing alarms button Tracing alarms Tracing is a function of the alarm monitoring application It allows you to Isolate a system component or badge ID and trace it in either real time or in the past You can trace only within predetermined limits To trace a badge ID 1 Select the trace badge button from the toolbar Figure 3 10 Clicking on the trace badge ID button Click on Trace Badge ID button The Trace Badge window d

Download Pdf Manuals

image

Related Search

Related Contents

Infotainment Navigazione Amundsen Istruzioni per l`uso  Acoustic Radiator1-2  Lettre ComCom Sullias N°3 Octobre 2015 - ville-saint-florent  Whirlpool WGD94HEXL1 User's Manual  Toshiba Satellite L50D-B  Home Theater 5.1 com DVD / FM / USB  Descargar manual  取扱説明書 - psn  

Copyright © All rights reserved.
Failed to retrieve file