Westinghouse SE 6000 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Westinghouse SE 6000 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Westinghouse SE 6000, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Westinghouse SE 6000 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Westinghouse SE 6000. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung Westinghouse SE 6000 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Westinghouse SE 6000
- Den Namen des Produzenten und das Produktionsjahr des Geräts Westinghouse SE 6000
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Westinghouse SE 6000
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Westinghouse SE 6000 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Westinghouse SE 6000 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Westinghouse finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Westinghouse SE 6000 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Westinghouse SE 6000, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Westinghouse SE 6000 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    W estinghouse Security Electronics an ISO 9001 certified company 5452 Betsy Ross Drive Santa Clara, CA 95054-1184 (408) 727-5170 FAX (408) 727-6707 P/N 66107919001, Rev. F ST ANDARD PRODUCT MANUAL S ECURITY M ANAGEMENT S YSTEM SE 6000 SE 6000[...]

  • Seite 2

    LIMITED WARRANTY Westinghouse Security Electronics (WSE) warrants to the original user the equipment manufactured by WSE as described herein (the equipment) to be free from defects in material and workmanship for a period of one year from the date of purchase by such user or fifteen (15) months from the date of shipment from the factory, whichever [...]

  • Seite 3

    iii T ABLE OF C ONTENTS SECTION 1: INTRODUCTION .................................................... 1-1 MANUAL ORGANIZA TION ............................................................................... 1-1 System Main Menu ..................................................................................... 1-1 Documentation Methods ...........[...]

  • Seite 4

    iv Doors .......................................................................................................... 2-6 Select Zone ................................................................................................. 2-6 REVIEW TRANSACTIONS (FULL SCREEN) ................................................... 2-7 ALARM SERVICING ..........[...]

  • Seite 5

    v Keyholder Access Entry [empgentr] ............................................................ 4-5 Project Assignment [epj_entr] ..................................................................... 4-6 COPY KEYHOLDERS ....................................................................................... 4-7 Copy Keyholder Information ..........[...]

  • Seite 6

    vi Reader Access Assignment ........................................................................ 5-5 Reader Assignment — Sample Report ....................................................... 5-5 ACCESS DEFINITION ...................................................................................... 5-6 Access Code Master .....................[...]

  • Seite 7

    vii SECTION 6: SYSTEM ADMINISTRA TION ................................. 6-1 INTRODUCTION ............................................................................................... 6-1 SECTION ORGANIZA TION .............................................................................. 6-1 ADDITIONAL INFORMA TION ................................[...]

  • Seite 8

    S ECTION 1: I NTRODUCTION 1-1 S ECTION 1 INTRODUCTION MANUAL ORGANIZA TION This manual follows the order of the seven standard product items in the system main menu, with the Key Inventory and Parking Stickers items merged into the System Administration section: • Section 2: Monitor Security Activity • Section 3: Security Management Reports •[...]

  • Seite 9

    1-2 S ECTION 1: I NTRODUCTION Documentation Methods To avoid repetition and to reduce document size, detailed explanations for the system's principal data items are given only in Section 4: Master File Entry , which is used when creating the system database. For introductory information concerning the data items, see Definitions below. Further[...]

  • Seite 10

    S ECTION 1: I NTRODUCTION 1-3 Keyholder ID . Keyholder's ID number. The unique ID number is used by the computer to keep track of all activity for that person. Once entered, the keyholder ID cannot be changed. Location . Location of the office or branch of the company to which a keyholder is assigned. Tenant . One of several distinct occupants[...]

  • Seite 11

    1-4 S ECTION 1: I NTRODUCTION Readers Digital Key Reader . Reads the unique number of 1 to 5 digital command keys simultaneously at a range of up to 36 inches. Keypad Controllers . The keypad controllers, normally used in conjunction with an ACU, provide additional security by requiring a personal identification number (PIN) entry. Magnetic Card Re[...]

  • Seite 12

    S ECTION 1: I NTRODUCTION 1-5 Multiple Switch Monitor (MSM) . The MSM is a four-contact switch box that is connected to a WSE ACU and the MSM provides four contact-closure inputs. Points . A point is any basic element of an access control system, such as a door switch, an alarm contact, an output switch. Point IDs uniquely identify all system eleme[...]

  • Seite 13

    1-6 S ECTION 1: I NTRODUCTION Response Time . The SE 6000 is capable of fast response times in both single and multiple site configurations. Fast response times are important for security personnel who monitor alarms and are always appreciated by keyholders wishing to enter locked doors. Principal System Functions Access Control Anti-Passback Contr[...]

  • Seite 14

    S ECTION 1: I NTRODUCTION 1-7 Multiple Occupancy Feature. Similar to the two-man rule except that it requires that two keyholders enter and leave a specified zone together; refer to Section 4 for details. File Maintenance To perform its access control functions, the system must know the unique ID numbers of all keyholders and the doors and times th[...]

  • Seite 15

    1-8 S ECTION 1: I NTRODUCTION CREA TING THE DA T ABASE Once the system is in place, first obtain the following from the system installer: System Interconnect Diagram . This shows all wiring and connections in the system, and provides information needed for entering pollers, devices, readers, and points. Poller Initialization Parameters Information [...]

  • Seite 16

    S ECTION 1: I NTRODUCTION 1-9 1. Following the System Interconnect Diagram , number each element in turn with a four-digit number, including numbers for devices, pollers, and readers. 2. Use the following ID groupings for average-sized system: 0001-0010 — Computers 2000-2999 — Door switches 0011-0099 — Pollers 3000-3999 — REX contacts 0100-[...]

  • Seite 17

    1-10 S ECTION 1: I NTRODUCTION System Screens There are two basic screen types: Menu and Application : Menu Screens Menu screens list application selections by group according to function (exception Monitor Security Activity — see Section 2). All menu screen IDs end in menu (example: [fmntmenu] — Master File Entry). The menu screens have three [...]

  • Seite 18

    S ECTION 1: I NTRODUCTION 1-11 Indicates replace or insert mode. With replace , entries overwrite existing data. With insert , entries push existing data to the right. Toggle between the modes by pressing insert . Indicates if the information displaying is stored. Indicates the current screen mode (see Finding, Adding, and Storing Data in this sect[...]

  • Seite 19

    1-12 S ECTION 1: I NTRODUCTION USING SCREENS AND FIELDS Selecting Screens There are three screen selection methods: 1. Use the arrow keys to select the menu choice. Press Enter to place it in the Enter Selection field, and press Enter again to display the selection. 2. Use the arrow keys to select the menu choice, and press F2 to display the select[...]

  • Seite 20

    S ECTION 1: I NTRODUCTION 1-13 Moving to Prior Screens Press F1 to return to the previous screen displayed. If required, continue to press F1 to return to the system main menu. FINDING, ADDING, AND STORING DA T A Finding Data Use the find mode to locate and select data. A specific record (a single keyholder ID, for example) or a group of records (a[...]

  • Seite 21

    1-14 S ECTION 1: I NTRODUCTION The computer automatically changes to the update mode when a search completes, and the records selected can be updated if required. To start another search, press F4 to clear the screen and begin again. Adding / Changing Data The add mode is used to input new records. Once a record is found using the search mode, upda[...]

  • Seite 22

    S ECTION 1: I NTRODUCTION 1-15 ZOOM FEA TURE The zoom feature provides a fast method for accessing linked or dependent application screens and for copying data from these screens to other application screens. When the feature is available, zoom displays in the status bar. For example, you are entering keyholder data (keyholder entry screen) but don[...]

  • Seite 23

    1-16 S ECTION 1: I NTRODUCTION I MPORTANT Log off the SE 6000 system formally before you leave the terminal. If you do not log off, any action taken by the next person at the terminal will appear under your name. SHUTTING DOWN Always use the following procedures, in the order given, when powering off the SE 6000: 1. Go to the main system terminal ([...]

  • Seite 24

    S ECTION 1: I NTRODUCTION 1-17 3. The computer displays Enter new time ([yymmdd]hhmm). Change the date and time values as required (do not enter the parentheses or brackets); press Enter when completed. To keep the displayed date and time, press Enter. 4. The computer continues its startup procedures, and the login prompt displays after a brief pau[...]

  • Seite 25

    1-18 S ECTION 1: I NTRODUCTION Controller Systems . Controller systems are computers running the SE 6000 local (LC) or remote location controller (RLC) software. The LC system is a computer attached via dedicated lines to the host. The RLC system is a computer attached via dial-up telephone lines to the host. Elevator Control . Permits floor-by-flo[...]

  • Seite 26

    S ECTION 2: M ONITOR S ECURITY A CTIVITY 2-1 S ECTION 2 MONIT OR SECURITY ACTIVITY INTRODUCTION System monitoring and control is performed via the monitor menu, the first selection in the system main menu. The monitor menu screen is shown below. Notice this is a split screen, with the lower half constantly updated as transactions (any system event)[...]

  • Seite 27

    2-2 S ECTION 2: M ONITOR S ECURITY A CTIVITY FUNCTION KEYS Beneath the transactions display are the applicable function keys for each screen, with the key actions shown next to the key numbers. For most function key actions, the system displays messages confirming that the action has been completed, e.g., POLLER STOPPED. In general, F1 is used to e[...]

  • Seite 28

    S ECTION 2: M ONITOR S ECURITY A CTIVITY 2-3 When F4 is pressed, a second screen displays showing the connections between the host and the devices of the particular poller selected: Poller-device communication should be one of the first items checked whenever there is an apparent problem with the system. Devices The Control Devices screen displays [...]

  • Seite 29

    2-4 S ECTION 2: M ONITOR S ECURITY A CTIVITY F4 KEY RSET . Key Reset—Used when setting up new ACUs or reestablishing repaired ACUs, or when the integrity of the data currently resident in the ACU is suspected. Downloads all host key data to the ACU. F5 SHUNT . Shunt a device. F6 UNSHUNT . Unshunt a device previously shunted. Locks The Control Loc[...]

  • Seite 30

    S ECTION 2: M ONITOR S ECURITY A CTIVITY 2-5 F6 UNSHUNT . Unshunt a door previously shunted. Input Points The Control Inputs screen displays point ID, description, point status, tamper, shunt. Control Inputs Function Keys F5 SHUNT . Shunt a selected input point. If no input point is selected, F5 shunts all input points in the zone. F6 UNSHUNT . Uns[...]

  • Seite 31

    2-6 S ECTION 2: M ONITOR S ECURITY A CTIVITY F6 UNSHUNT . Unshunt a selected output point previously shunted. If no output point is selected, F6 unshunts all output points in the zone. Doors The Control Doors screen displays point ID, description, status, and shunt of the door switches. Control Doors Function Keys F5 SHUNT . Shunt a selected door. [...]

  • Seite 32

    S ECTION 2: M ONITOR S ECURITY A CTIVITY 2-7 Count — Number of keyholders currently in the zone. PBarea — Passback zone type—personal, vehicle, none. PBtype — Passback type —hard, soft, none. PBlevel — Passback control—global (host), local (ACU), none. Note that zone count is automatically reset whenever a zone is selected. Multi-user[...]

  • Seite 33

    2-8 S ECTION 2: M ONITOR S ECURITY A CTIVITY Review Transactions Function Keys F2 BACKWARD . Page backward through the transactions. F3 FORWARD . Page forward through the transactions. F4 OLDEST . Go to first transaction. F5 LATEST . Go to last transaction. ALARM SERVICING The system emits beeps when an alarm occurs, and displays the number of pend[...]

  • Seite 34

    S ECTION 2: M ONITOR S ECURITY A CTIVITY 2-9 CONTROL PROJECTS The Control Projects screen (not controllable on LC systems—host only) displays project, status, description, start, end. The control projects screen permits operator override of doors assigned to projects which directly affects keyholder access. Control Projects Function Keys F2 ACTIV[...]

  • Seite 35

    2-10 S ECTION 2: M ONITOR S ECURITY A CTIVITY F5 PRNT ON . Switch printer #1 on or off depending on current state (used to control log printer only). F6 PRNT ON . Switch printer #2 on or off depending on current state. Forgive Passback A passback violation occurs when a keyholder uses their key to reenter a door without first using their key to exi[...]

  • Seite 36

    S ECTION 2: M ONITOR S ECURITY A CTIVITY 2-11 When requested, enter the number of the table to be downloaded and press Enter. The system requests confirmation — press F1. REPACK OK displays when transfer completes. Remote Devices This function is used to establish a telephone connection to a remote device to perform certain actions, for example, [...]

  • Seite 37

    2-12 S ECTION 2: M ONITOR S ECURITY A CTIVITY F3 LIMITED . Change current building mode to limited. F4 CLOSED . Change current building mode to closed (takes approximately one minute to complete). If a device input point configured to prevent building closure is active, the building will remain in the limited mode until the point is cleared. Full S[...]

  • Seite 38

    S ECTION 2: M ONITOR S ECURITY A CTIVITY 2-13 Status Screen Function T imeout Some system functions temporarily disable the realtime display until the sub-menu is exited. The status screen function Timeout feature provides a user-defined method for controlling the length of time that the realtime display is disabled. If the system does not detect a[...]

  • Seite 39

    2-14 S ECTION 2: M ONITOR S ECURITY A CTIVITY N OTE 1. The control parameter is read by the alarm servicing program at log-on time and remains in effect as long as the alarm program is active. A change to the Timeout value does not take effect until the user logs off, and then logs back on to the system (reboots). 2. Timeout is deactivated when res[...]

  • Seite 40

    S ECTION 2: M ONITOR S ECURITY A CTIVITY 2-15 N OTE 1. If your system has been upgraded, and users created on a previous release have been saved, their user profiles must be updated with the new monitor security privileges. To do this, log on as addusers with the correct password, select system administration, and then select add users. Update the [...]

  • Seite 41

    2-16 S ECTION 2: M ONITOR S ECURITY A CTIVITY 1. This feature affects the following displays and reports: - Monitor screen, both full- and half-screen displays - Review transactions screen - Point history report - Keyholder history report - Transaction history report - all sort options - Archive history report - all sort options 2. Log records are [...]

  • Seite 42

    S ECTION 3 SECURITY REPORTS INTRODUCTION Security management reports provide a permanent record of transactions, and are also used to examine specific events. The reports are accessed through the security management reports menu screen, [accsmenu], via the main menu. In this section, the reports are documented following the security management repo[...]

  • Seite 43

    3-2 S ECTION 3: S ECURITY M ANAGEMENTS R EPORTS N OTE 1. Some reports are over-wide (132 characters instead of the standard 80 characters), and have been formatted to use a smaller print size not available with some terminals (HP printers can handle the smaller print). These reports can be displayed but will 'wrap'; that is, some lines co[...]

  • Seite 44

    S ECTION 3: S ECURITY M ANAGEMENT R EPORTS 3-3 Keyholder History — Sample Report 06/27/96 Packlett Industries PAGE 1 14:36 Point History Point Point Description Date Time Access Type _____ ____________________ ________ ________ __________________ Keyholder 2771 Dale, Deborah 0225 RDI-8082-SEN2 06/27/96 09:32:52 ACCESS GRANTED 0221 RDI-8082-SEN1 0[...]

  • Seite 45

    3-4 S ECTION 3: S ECURITY M ANAGEMENTS R EPORTS Transaction History — Sample Report ACCESS CONTROL ARCHIVE REPORT The access control archive report, [acrtrprt], is identical to the transaction history report (previous report) except that it reads data from an archive tape rather than from the system database. ALARM SER VICING REPORT The alarm ser[...]

  • Seite 46

    S ECTION 3: S ECURITY M ANAGEMENT R EPORTS 3-5 Alarm Servicing — Sample Report PASSBACK ZONE REPORT The passback zone report, [whowhere], lists keyholders currently present in passback zones. The summary selection provides totals by zone, while the detailed report lists specific keyholders. The source for the information is the keyholder file. A [...]

  • Seite 47

    3-6 S ECTION 3: S ECURITY M ANAGEMENTS R EPORTS Passback Zone — Sample Report 04/05/96 Easthaven Manufacturing Page 1 14:43 Passback Zone Report Keyholder Key No Keyholder Name Tenant Pzone Vzone _________ _____ __________________________ ______ _____ _____ 1055699 83383 MAITLING, JACK 0 -1 -1 1061128 84128 LYONS, CINDY 0 -1 -1 1086201 83361 DENE[...]

  • Seite 48

    S ECTION 3: S ECURITY M ANAGEMENT R EPORTS 3-7 Possible system messages for this report are: Unprocessed — Information changed in the database, but has not yet been sent to the communications program module. Before Transmit — Information has been sent to the communications program module, but has not yet been sent to target device. Transmitted [...]

  • Seite 49

    3-8 S ECTION 3: S ECURITY M ANAGEMENTS R EPORTS KEYHOLDER ZONE REPORT The report lists the most recent zone information for all keyholders that meet the search criteria; however, information is not necessarily current. A sample [kyznrprt] screen follows: Keyholder Zone — Sample Report 05/12/96 Vogler Vineyards Page 1 14:41 Keyholder Zone Report K[...]

  • Seite 50

    S ECTION 3: S ECURITY M ANAGEMENT R EPORTS 3-9 Event / Point — Sample Report 03/17/96 Security Electronics Page 1 09:15 Event/Point Report Point Point Description Tran. Tran. Description Occurrences ______________________________________________________________ ___________ 1 HOST 231 PROJECT DEACTIVATED 2 1 HOST 242 DISK ALMOST FULL 5 2 DATA BASE[...]

  • Seite 51

    3-10 S ECTION 3: S ECURITY M ANAGEMENTS R EPORTS REAL TIME PASSBACK DET AIL — SAMPLE REPORT 03/14/96 McPowell-Angus Aviation Page 1 15:18 Realtime Passback Detail Report Keyholder Key No Keyholder Name Tenant Pzone Vzone _________ ________ _________________________ ______ _____ _____ 223141 188954 McDaniels, Jeff 0 -1 -1 237473 140226 Wellington,[...]

  • Seite 52

    S ECTION 4: M ASTER F ILE E NTRY 4-1 S ECTION 4 MASTER FILE ENTR Y INTRODUCTION The master file entry procedures are used to create and maintain the database. All initial system data is entered following the methods detailed in this section. The data item menu screens are accessed via the master file entry menu [fmntmenu], displayed via the main me[...]

  • Seite 53

    4-2 S ECTION 4: M ASTER F ILE E NTRY KEYHOLDERS Four data entry screens are used to add new keyholders to the system, and to change or delete existing keyholder information: 1. Keyholder Entry - Page 1, [key_entr]. Used to enter primary keyholder information. 2. Keyholder Entry - Page 2, [key1entr]. Used to enter optional keyholder information. 3. [...]

  • Seite 54

    S ECTION 4: M ASTER F ILE E NTRY 4-3 Keyholder ID . Required in the Add mode (the system denies further screen access until this field is entered). Enter a unique nine-digit maximum keyholder ID number (alphabetical letters are not supported). Last Name . Optional. Enter the keyholder’s last name. First Name . Optional. Enter the keyholder’s fi[...]

  • Seite 55

    4-4 S ECTION 4: M ASTER F ILE E NTRY Issue Date . Optional. Enter the date that the access control card for the keyholder will become valid. Default is current system date. Note that a future date will not permit access until that date is reached. Issue Time . Optional. Enter the time that the access control card for the keyholder will become valid[...]

  • Seite 56

    S ECTION 4: M ASTER F ILE E NTRY 4-5 Keyholder Access Entry [empgentr] Access Code . Optional. Enter an access code number that applies to this keyholder (the system automatically enters the access code description). Default is 0—No access code. N OTE There is no limit to the number of access codes that can be assigned, with the following two exc[...]

  • Seite 57

    4-6 S ECTION 4: M ASTER F ILE E NTRY Y if the downloaded access code is to be sent to the ACU as a smart failsoft access code. Default is N. Note that this is used only in conjunction with the host access codes. N OTE The smart failsoft option is not supported with any keys used in conjunction with 708P and 718P ACUs, but a function is built in to [...]

  • Seite 58

    S ECTION 4: M ASTER F ILE E NTRY 4-7 A sample [epj_entr] screen follows. Enter the project number ( zoom available) then press Enter; the project description displays automatically. If multiple projects are to be assigned, enter and store each one separately. COPY KEYHOLDERS Copy Keyholder Information Used when creating new keyholders who share dat[...]

  • Seite 59

    4-8 S ECTION 4: M ASTER F ILE E NTRY ACCESS ASSIGNMENT Keyholder Access Assignment [egrpentr] The [egrpentr] and [egrpentr1] screens, accessed from Access Assignment (third item in the [fmntmenu] menu), are used as a fast way to make access assignments without using the keyholder data entry screens. Data entry is the same as for the keyholder acces[...]

  • Seite 60

    S ECTION 4: M ASTER F ILE E NTRY 4-9 ACCESS DEFINITION The access definition selection in the master file entry menu displays the access definition menu: • Access Code Entry, Access Code Definition, Elevator Definition • Access Group Entry, Access Group Definition • Access Override Entry • Fail Soft Entry • Project Definition A CCESS C OD[...]

  • Seite 61

    4-10 S ECTION 4: M ASTER F ILE E NTRY Access Code ID . Required. Enter a four-digit maximum access code number. Tenant . Required ( zoom available). Enter a four-digit maximum tenant code number. Default is tenant 0. Download Device ID . Optional ( zoom available). This field must be used if the access code being created is to be downloaded to an A[...]

  • Seite 62

    S ECTION 4: M ASTER F ILE E NTRY 4-11 Reader ID . Required. Enter the reader number to be linked to this access code (the reader description is automatically displayed). The reader numbers can be entered in any order. Time Code . Optional. Enter up to four time codes, in any order, that apply to this access code (the time code parameters are displa[...]

  • Seite 63

    4-12 S ECTION 4: M ASTER F ILE E NTRY Group Description . Required. Enter a 30-character maximum description of the access group. When screen entry is completed press F6 to store the data, at which point the Access Group Definition screen displays automatically. This screen permits you to enter the access codes that will apply to this access group.[...]

  • Seite 64

    S ECTION 4: M ASTER F ILE E NTRY 4-13 W ARNING 1. Access codes that include the same reader(s) should not be included in the same group unless one code is a downloaded code, and it has been set up with the SFS (smart failsoft) flag set to Y. Mixing codes that include common readers with different time codes may cause unpredictable results. 2. Do no[...]

  • Seite 65

    4-14 S ECTION 4: M ASTER F ILE E NTRY F AILSOFT E NTRY 708P ACUs can be programmed to recognize up to 25 keyholders (based on key numbers) for use when communication with the host computer is temporarily unavailable. Known as failsoft, the feature becomes active (access is granted) for these keyholders after 15 seconds following the occurrence of t[...]

  • Seite 66

    S ECTION 4: M ASTER F ILE E NTRY 4-15 Project ID . Required. Enter a four-character maximum project ID code. Description . Optional. Enter a 40-character maximum description of the project. Starting Date and Time . Enter the project's starting date and time in the formats MM/DD/ YY and HH:MM.  Ending Date and Time . Enter the project's[...]

  • Seite 67

    4-16 S ECTION 4: M ASTER F ILE E NTRY TIME CODES [tmcdentr] Time codes are normally used to define when points and readers are active. The codes are also used to automatically lock / unlock doors, activate / deactivate output relays, and to initiate recurring tasks. When combined with readers into access codes, the time codes define when access is [...]

  • Seite 68

    S ECTION 4: M ASTER F ILE E NTRY 4-17 Holiday Name . Optional. Enter a 20-character maximum holiday name. TENANTS [tententr] Two or more companies or groups can operate a single SE 6000 system, and they are referred to as tenants. (If required, the system can also be configured to allow individual tenants to share components.) T enants may be unrel[...]

  • Seite 69

    4-18 S ECTION 4: M ASTER F ILE E NTRY Point ID . Required ( zoom available). Enter the point ID to which this instruction applies. Tenant . The tenant number entered when this point was created is automatically entered into this field. Instructions . Eight 40-character lines are provided for detailed instruction entry. Refer to the sample screen fo[...]

  • Seite 70

    S ECTION 4: M ASTER F ILE E NTRY 4-19 Passback Area . Optional. This field is used to indicate if passback is in effect for this zone. Enter P if personnel passback is used, V if vehicle passback is used, N if passback is not used. The default is N.  Passback Type . Required if passback (field #3) is either P (personnel) or V (vehicle) for this [...]

  • Seite 71

    4-20 S ECTION 4: M ASTER F ILE E NTRY The SE 6000 can run different pollers or multiple copies of the same poller concurrently but, with the exception of the NexSentry, 8xx-series, and 422 ACUs, the pollers can be run with one device type only. Poller parameter files are read when the poller programs start. The parameters define the poller type, th[...]

  • Seite 72

    S ECTION 4: M ASTER F ILE E NTRY 4-21 Tenant . Optional ( zoom available). Enter a four-digit maximum tenant code number. Default is 0.  Computer ID. Required. Enter the ID of the computer on which this poller is to run. Default is 0—host computer.  Poller Number . Required. Enter the number of the corresponding poller-parameter file. Refer[...]

  • Seite 73

    4-22 S ECTION 4: M ASTER F ILE E NTRY controlled exclusively by the SE 6000 ( deferred mode ), to operate entirely independently of the SE 6000 ( local mode ), or a combination of both. D EVICE E NTRY S CREENS The following screens are used when setting up device types: • 8xx-series ACUs — [dev_entr], [d808entr] • NexSentry — [dev_entr], [n[...]

  • Seite 74

    S ECTION 4: M ASTER F ILE E NTRY 4-23  Address . Required. Enter the address of the device. Since each poller can poll a number of devices, the Address field is necessary to tell the host which device to poll. The address ranges are included in the Device Type table (see following field). Note that the system will not allow duplicate device addr[...]

  • Seite 75

    4-24 S ECTION 4: M ASTER F ILE E NTRY SE 8 XX -S ERIES D EVICE C ONFIGURATION E NTRY [d808entr] The [d808entr] screen must be completed for all 8 xx -series ACUs (use F2 to display the screen after the previous screen has been stored). A sample screen follows: Level, Name, Password . Required. These first three fields are entered to identify up to [...]

  • Seite 76

    S ECTION 4: M ASTER F ILE E NTRY 4-25 Power Fail . Optional. Enter the power fail report number if a report has been created (see applicable ACU manual). The report states the actions that will be taken by the ACU should a power failure occur. Default is 0.  Override . Optional. Enter the operator override report number if a report has been crea[...]

  • Seite 77

    4-26 S ECTION 4: M ASTER F ILE E NTRY  Building Closed Time Codes . Optional. Provides up to four time intervals during which the building should be closed. Default is 0.  Building Open Reminder . Optional. If the building should be closed (indicated by the time codes entered in the previous field), a reminder message is logged and repe[...]

  • Seite 78

    S ECTION 4: M ASTER F ILE E NTRY 4-27 N OTE The Level , Name and Password fields are specific to the NexSentry and applies only to operators logging in directly via the ACU's terminal port. The fields are not part of the SE 6000 control parameters. Tamper . Optional. Enter the tamper report number if a report has been created (see applicable A[...]

  • Seite 79

    4-28 S ECTION 4: M ASTER F ILE E NTRY SE 818 D EVICE C ONFIGURATION E NTRY [d818entr] Complete the [d818entr] screen for all 818-series and NexSentry ACUs (use F2 to display the screen after the previous screen, [d808entr] or [nexsentr], have been stored). A sample screen follows: PIN Seed . Optional. Enter the base seed number for generating PINs.[...]

  • Seite 80

    S ECTION 4: M ASTER F ILE E NTRY 4-29 Level, Name, Password . Required. These first three fields are entered to identify up to eight operators who will be permitted to set / change system parameters for this particular ACU. User 1 must be established (defaults to operator 1); operators 2 through 7 are optional. Enter the operator's security co[...]

  • Seite 81

    4-30 S ECTION 4: M ASTER F ILE E NTRY  PIN Timeout . Optional. The maximum amount of time, in seconds, which can pass between the presentation of a key and the entry of a verification PIN. Default is 10.  Max Inv. PINs . Optional. The maximum number of invalid PIN entry attempts to permit before cancelling the key presentation. Default is 4. [...]

  • Seite 82

    S ECTION 4: M ASTER F ILE E NTRY 4-31  Duress Enable . Indicates with a Y or an N whether the PIN duress feature of the SE 422 is turned on or not.  Show PIN . Indicates with a Y or an N whether the PIN number should be displayed on a local terminal connected to the SE 422 after it has been calculated. Building Closed Times . Enter up t[...]

  • Seite 83

    4-32 S ECTION 4: M ASTER F ILE E NTRY R EADER E NTR Y [rdr_entr] Reader ID . Required ( zoom available). Enter a maximum four-digit reader ID number. Reader Description . Optional. Enter a maximum 20-character description of the reader. Default is the reader ID number. Device ID . Required ( zoom available). Enter the number of the device which con[...]

  • Seite 84

    S ECTION 4: M ASTER F ILE E NTRY 4-33  Reader Type . Required. Enter the reader type number in the ranges 1 through 12 as described above.  Assoc Reader ID (Associated Reader). Required if the reader is used in conjunction with a keypad. Enter the ID number of the Reader used with the keypad. Default is 0.  Door Switch ID . Required. Enter[...]

  • Seite 85

    4-34 S ECTION 4: M ASTER F ILE E NTRY active. For Mod , enter a transaction modifier code (A, B, etc.) to customize log messages and system actions (see Section 6: System Administration for details). The default for Mod is 0 (zero); use the standard log message. A UTO K EY E NTRY AND R EADER The Auto Key Entry feature allows you to capture the key [...]

  • Seite 86

    S ECTION 4: M ASTER F ILE E NTRY 4-35 configured for a specific zone and includes the passback feature. In addition, the MOR and the SE 6000 keep track of the people that are in a specified zone. E NTERING A M ULTIPLE O CCUPANCY Z ONE When a multiple occupancy zone is vacant, two keyholders are required to present their keys to the reader to unlock[...]

  • Seite 87

    4-36 S ECTION 4: M ASTER F ILE E NTRY in response to various events occurring within the system. (The field titles indicate the event types.) See Device Report Definition in the section and the applicable ACU manual for detailed information. SE 422 R EADER R EPORT D EFINITION [rdr2entr] Reader Mode . Optional. Enter the appropriate reader mode numb[...]

  • Seite 88

    S ECTION 4: M ASTER F ILE E NTRY 4-37  —  The following ten fields, Forced Open through Exit Granted , require the entry of a report number. The word report in this context identifies a user-defined action or series of actions that the ACU is to take in response to various events occurring within the system. (The field titles indicate th[...]

  • Seite 89

    4-38 S ECTION 4: M ASTER F ILE E NTRY Proximity Type . Enter the proximity type: 0 = Sensor interface, 1 = DigiKey reader. The following thirteen fields, DKR/SCR Fail through VIP tamper , require the entry of a report number. The word report in this context identifies a user-defined action or series of actions that the ACU is to take in response to[...]

  • Seite 90

    S ECTION 4: M ASTER F ILE E NTRY 4-39 The following eleven fields, DKR/SCR Fail through Device Tamper, require the entry of a report number. The report in this context identifies a user-defined action or series of actions that the ACU is to take in response to various events occurring within the system. (The field titles indicate the event types.) [...]

  • Seite 91

    4-40 Section 4: Master File Entry Point ID . Required. Enter a four-digit maximum point ID number. Point Description . Optional. Enter a 20-character maximum description of the point. If omitted, the system enters the point ID number into this field. Device ID . Required ( zoom available). Enter a four-digit maximum device ID number that is attache[...]

  • Seite 92

    Section 4: Master File Entry 4-41  Time . Required for point type 2 (door switch) and 6 (general, when used with an OPTO 22); disregard for all other types. For type 2, enter the number of seconds before the door is to be considered held open. The range is 1 through 240 (the default is 15 seconds and this is the recommended value for normal usag[...]

  • Seite 93

    4-42 Section 4: Master File Entry  Zone number . Required ( zoom available). Enter the zone number applicable for this point. The system enters the default value of 0 (zero) if this field does not apply.  Tenant . Required ( zoom available). Enter the tenant number applicable for this point. The system enters the default value of 0 (zer[...]

  • Seite 94

    Section 4: Master File Entry 4-43 Serial # . A nine-digit maximum control number automatically generated and displayed by the system when a new auto open / activate code is added. This information is not entered by the user. Reader ID or Point ID . Required. Enter the applicable reader or output point ID number. Timecode . Required. Enter the appli[...]

  • Seite 95

    4-44 Section 4: Master File Entry Assigned PIN numbers can be printed out (see Section 3 , SE 422 PIN Master Report ). A ls o , i t is possible, but not recommended, to override the system-wide default values entered here (see Device Entry , SE 422, in this section). A sample data entry screen follows: PIN Digits . Optional. Enter 4 or 5. Default i[...]

  • Seite 96

    Section 4: Master File Entry 4-45  Dev Failure Rpt . Optional. Enter a device failure report number in the range 1 — 32. Default is 0 — No report.  Serial Number . Required. Enter the device serial number (imprinted on a rotary switch). D IALER E NTRY An optional, factory-set remote dial-up poller must be established to enable the remote [...]

  • Seite 97

    4-46 Section 4: Master File Entry  Host2 . Required, if applicable. Enter alternate host #2 phone number. For RDI units only, enter login string and password.  Host3 . Required, if applicable. Enter alternate host #3 phone number. For RDI units only, enter login string and password.  No Activity Disconnect Seconds . Optional. Enter the num[...]

  • Seite 98

    Section 4: Master File Entry 4-47 Group ID . Enter a four-character maximum group ID number. Code . Enter a four-character maximum site code. Enter x in any position to act as a wild card; all characters in that position are matched. With the first 'x entry' in the sample screen, for example, the range 1230 through 1239 would be matched. [...]

  • Seite 99

    4-48 Section 4: Master File Entry Key B . Start position and length of second part of key.  Key C . Start position and length of third part of key.  Expiration Date Start . Expiration date start position.  Site Code . Site code start position.  ABA Card Data Action . The report number (ID) that will execute in response to an ABA card sw[...]

  • Seite 100

    Section 4: Master File Entry 4-49 Read Range . Controls the maximum read range available with the particular digital reader. The range is 0—255; default is 255.  Number of Reads . Controls the number of additional verification reads of a single key within the sensor’s range before declaring the key valid. The range is 0—255; default is 1. [...]

  • Seite 101

    4-50 Section 4: Master File Entry MAPS The DRAWMAPS function is used by the event monitoring function to display the location of doors, points, alarms, etc. To use this feature on an SE 6200 and above, it must be operating under the Reflection 4 terminal emulation software (mouse required). You can also use this feature on an SE 6100 or below from [...]

  • Seite 102

    Section 4: Master File Entry 4-51 ReDraw Redraws screen. Use if graphics appear incorrect. Rectify Makes all lines close to horizontal or vertical exactly horizontal or vertical. Lines nearly 45° are drawn at exactly 45°. Rescale Rescale (resize) map. Lines and curves change; text and icons do not change. Curve Draw curved lines. Circle Draw circ[...]

  • Seite 103

    4-52 Section 4: Master File Entry SE 422 Input Table 01 23 4 5 6 ACU (2-state) 0: 1 2 3 4 5 6 7 M16 /RO1 1: 8 9 10 11 12 13 14 (4-state input) 2: 15 16 17 1 8 19 20 21 3: 22 23 24 25 26 27 28 4: 29 30 31 32 33 34 35 5: 36 37 38 39 40 41 42 6: 43 44 45 46 47 48 49 7: 50 51 52 53 54 55 56 8: 57 58 59 60 61 62 63 RO4 (4-state) 9: 64 10: 65 Input point[...]

  • Seite 104

    S ECTION 5 MASTER FILE REPORTS INTRODUCTION The master file reports list comprehensive database information. The report menu screens are accessed via the master file reports menu [rprtmenu], displayed via the main menu. In this section, the reports are documented following the reports menu sequence (see section table of contents). A sample [rprtmen[...]

  • Seite 105

    5-2 S ECTION 5: M ASTER F ILE R EPORTS ADDITIONAL INFORMA TION An additional report feature not accessed via the reports menu, 132-xx Column Report Display , is detailed at the end of this section. KEYS MASTER Two versions of the keyholder master report are available — Keyholder Quick List and Keyholder Master List (extended). The quick report in[...]

  • Seite 106

    S ECTION 5: M ASTER F ILE R EPORTS 5-3 06/02/96 BAYOU INDUSTRIES Page 1 14:45 Key Quick List KeyholderKey No Keyholder Name Dept. Pos. Phone Title Bldg ___________________________________________________________________________________________________________ 220774 409 JENSEN STEVE 11 6 18 221922 811 KREBS SCOTT 11 6 18 222172 512 DUNN JEFF 11 7 1[...]

  • Seite 107

    5-4 S ECTION 5: M ASTER F ILE R EPORTS ACCESS ASSIGNMENTS K EYHOLDER A CCESS A SSIGNMENT This report prints the access codes and access groups assigned to keyholders. Regular and extended versions of the report are available. The regular report lists keyholder numbers and names, access code / group numbers and descriptions, and access override code[...]

  • Seite 108

    S ECTION 5: M ASTER F ILE R EPORTS 5-5 K EYHOLDER A CCESS A SSIGNMENT : E XTENDED — S AMPLE R EPORT R EADER A CCESS A SSIGNMENT This report prints keyholder access permissions at a specific reader and applicable time codes. A sample screen follows: R EADER A SSIGNMENT — S AMPLE R EPORT 06/09/96 Nova Systems, Inc. Page 1 12:30 Keyholder Access A[...]

  • Seite 109

    5-6 S ECTION 5: M ASTER F ILE R EPORTS ACCESS DEFINITION A CCESS C ODE M ASTER This report details all access codes defined in the system (the report can be limited to a single code or a range of codes, as required). A sample screen follows: A CCESS C ODE M ASTER L IST — S AMPLE R EPORT A CCESS G ROUP M ASTER This report details all access groups[...]

  • Seite 110

    S ECTION 5: M ASTER F ILE R EPORTS 5-7 A CCESS G ROUP M ASTER L IST — S AMPLE R EPORT A CCESS O VERRIDE The report lists access override codes in the database, with descriptions, start / end dates, and permissions (allow / deny access). A sample screen follows: A CCESS O VERRIDE — S AMPLE R EPORT 03/25/96 Security Electronics Page 1 08:21 Acces[...]

  • Seite 111

    5-8 S ECTION 5: M ASTER F ILE R EPORTS I NTELLIGENT F AIL S OFT — S AMPLE R EPORT 03/25/96 Soames Industries Page 1 08:24 Intelligent Fail Soft Report Keyholder Keyholder Name 7110 7120 7130 7140 7150 7160 7170 7180 _________ ______________________ ____ ____ ____ ____ ____ ____ ____ ____ 67100 708P PARKING CNTR 63455 DIGI FI-GI Y Y Y Y Y Y Y Y 61[...]

  • Seite 112

    S ECTION 5: M ASTER F ILE R EPORTS 5-9 P ROJECT R EPORT — S AMPLE R EPORT 03/25/96 Security Electronics Page 1 08:29 Project Report Project Project Description S.Date S.Time E.Date E.Time Schedule _______ ___________________________ ________ ______ ________ ______ ________ 1 TEST PROJECT #1 06/01/96 15:52 06/01/96 15:56 Active 2 TEST PROJECT #2 0[...]

  • Seite 113

    5-10 S ECTION 5: M ASTER F ILE R EPORTS R EADER P ROJECT R EPORT The Reader Project Report lists project number, description, readers assigned, current status. N OTE This report gives reader project status based on start / stop dates defined by the project entry function compared to the current system date and time. Since the selection criteria and[...]

  • Seite 114

    S ECTION 5: M ASTER F ILE R EPORTS 5-11 T IME C ODES — S AMPLE R EPORT 03/25/96 Security Electronics Page 1 08:36 Timecode Report Tmcd Description Start End Mon Tue Wed Thu Fri Sat Sun Hol ____ ________________________ _____ _____ ___ ___ ___ ___ ___ ___ ___ ___ 0 NEVER ACTIVE 00:00 00:00 N NNNNNNN 1 7-DAYS, 24-HOURS & HOLS 00:00 23:59 Y YYYY[...]

  • Seite 115

    5-12 S ECTION 5: M ASTER F ILE R EPORTS T ENANTS — S AMPLE R EPORT 05/04/96 TRADE CENTER MAIN Page 1 09:07 Tenant Report Number Description ______ ___________ 1 WESTWOOD SECURITY SYSTEMS 2 SOS PUBLISHING (CALIFORNIA) 3 BETA SOFTWARE 4 WALKINS PRODUCTS, INC COMP ANY , DEPT , LOCA TION, JOB CA T These reports list user-defined company, department, [...]

  • Seite 116

    S ECTION 5: M ASTER F ILE R EPORTS 5-13 S AMPLE I NSTRUCTIONS 03/25/96 General Electronics Co Page 1 08:45 Instruction Master List Point Point Description Zone Instructions _____ ______________________________ ____ ________________________________________ 7114 PRIORITY 10 ALARM 4 EVACUATE LAB AREA NOTIFY BUILDING MANAGER PAGER #12345 DIRECT FIRE CR[...]

  • Seite 117

    5-14 S ECTION 5: M ASTER F ILE R EPORTS Z ONES — S AMPLE R EPORT 03/25/96 Leigh-Haffner Enterprises Page 1 08:47 Zone Report Zone Description Area Prim Level ____ _______________________________ ____ ____ _____ 1 ALPHA LAB ZONE P H G 2 HARD PASSBACK ZONE 2 P H L 3 HARD PASSBACK ZONE 3 P H L 4 HARD ANTI PASSBACK V H G P OLLERS The report lists all[...]

  • Seite 118

    S ECTION 5: M ASTER F ILE R EPORTS 5-15 D EVICES — S AMPLE R EPORT R EADERS This report lists all readers defined in the system. A sample screen follows: 03/25/96 McCartney Foundation Page 1 08:50 Device Master Report Device Device Desc Comp # Poll # Address Prim Device Type Desc Disabled Zone Zone Description ____________________________________[...]

  • Seite 119

    5-16 S ECTION 5: M ASTER F ILE R EPORTS R EADERS — S AMPLE R EPORT P OINTS This report lists all points defined in the system. A sample screen follows: P OINTS — S AMPLE R EPORT 06/03/96 LOVELL-WATKINS INC. Page 1 12:57 Reader Master Report Reader Reader Description Comp # Poll Dev Sen Point Type Zone Dir Disd Dsid Desc Rex Rex Desc ______ ____[...]

  • Seite 120

    S ECTION 5: M ASTER F ILE R EPORTS 5-17 A UTO O PENS / A CTIVATES This report lists system points and readers which have auto-open or auto-activate times. A sample screen follows: A UTO O PEN / A CTIVATE — S AMPLE R EPORT 808 R EPORT D EFINITION This report lists all action reports defined for the system 800-series ACUs. A sample screen follows: [...]

  • Seite 121

    5-18 S ECTION 5: M ASTER F ILE R EPORTS 808 D EVICE C ONFIGURATION This report lists configuration information for the system 800-series ACUs. A sample screen follows: 808 D EVICE C ONFIGURATION — S AMPLE R EPORT 06/05/96 Simms Oil Corporation 15:25 808 Device Configuration 100 DIAL-UP 808 #1 Level Name Password Reports Key Definition A OPERATOR [...]

  • Seite 122

    S ECTION 5: M ASTER F ILE R EPORTS 5-19 S ITE D EFINITION — S AMPLE R EPORT 03/25/96 Security Electronics Page 1 09:02 Site Code Master Report Group Code _____ ____ 1 0000 100 1000 101 1001 6016 7279 ABA C ONFIGURATION This report lists all the ABA configurations defined for the system, and gives the configuration parameters. A sample screen foll[...]

  • Seite 123

    5-20 S ECTION 5: M ASTER F ILE R EPORTS DKR C ONFIGURATION The reports lists the system default DKR parameters. A sample screen follows: DKR C ONFIGURATION — S AMPLE R EPORT SE 422 PIN M ASTER R EPORT This report lists keyholders having system-calculated SE 422 PIN numbers. A sample screen follows: 06/12/96 Lotus Refineries Page 1 15:21 DKR Confi[...]

  • Seite 124

    S ECTION 5: M ASTER F ILE R EPORTS 5-21 SE 422 PIN M ASTER R EPORT — S AMPLE 132-COLUMN REPORT DISPLA Y The local print program was originally written to accommodate an 80-character terminal display. Some terminals now use up to 132 characters, and the new 132-Column Report Display feature allows for this. The terminals are: HP700/44; HP700/92; C[...]

  • Seite 125

    S ECTION 6 SYSTEM ADMINISTRA TION INTRODUCTION The administration functions are used to control and maintain the system. These functions are accessed from the system administration menu, [sys_menu], via the main menu. (Depending on the operator's program security level, some or all of these functions may not be available.) A sample screen foll[...]

  • Seite 126

    6-2 S ECTION 6: S YSTEM A DMINISTRATION ADDITIONAL INFORMA TION Additional system administration-related information is provided at the conclusion of this section. ADD USERS [addusers] The add users screen, [addusers], is entered to add, change, or delete system users / operators. I MPORTANT The administration log-on and password must be used to ac[...]

  • Seite 127

    S ECTION 6: S YSTEM A DMINISTRATION 6-3 Program Security Level . Optional (range 1—9999). Code number indicating the specific screens the user can access. Default is 1 (complete access).  Tenant . Optional. Enter tenant number (if applicable). Default is tenant 0.  Monitoring Group . Optional. System code indicating transaction types availa[...]

  • Seite 128

    6-4 S ECTION 6: S YSTEM A DMINISTRATION  Jump Timer Servicing . Y / N field indicating if the user has the authority to automatically jump to timer servicing from monitor when an timer event occurs.  Language . The code number entered will determine what language the system will use for this user. Valid choices are 1=English, 2=French. Rea[...]

  • Seite 129

    S ECTION 6: S YSTEM A DMINISTRATION 6-5 PROGRAM SECURITY [sec_menu] P ROGRAM S ECURITY L EVEL E NTRY [pgacentr] Begin creating program security level types by first displaying the program security level entry screen [pgacentr]: Enter the security level number (four digits maximum). Enter a description (30 characters maximum). Press F6 Store, then p[...]

  • Seite 130

    6-6 S ECTION 6: S YSTEM A DMINISTRATION Enter Y or N in the add/update/delete fields to give or deny access to these functions on the selected screen. If you do not make any Y/N selection in the Add, Update, and delete fields, the keyholder will not have access to the screen. Press F6 Store and then, before any other action is taken, press F5 to re[...]

  • Seite 131

    S ECTION 6: S YSTEM A DMINISTRATION 6-7 DISPLA Y ALL VALID LOGINS [showuser] Use the [showuser] screen to identify — by hard copy printout or report display at the system terminal — all operators who have access to the system (use the [showwho] (Display All Valid Logins) screen to display operators currently logged on. Follow prompts when the s[...]

  • Seite 132

    6-8 S ECTION 6: S YSTEM A DMINISTRATION PURGE A PENDING REPORT [purgrprt] Use this feature to halt a report currently being printed (applies only to reports created under your ID). The feature can also be used to display reports. Note that if you log on using addusers you will have complete printer control. ENABLE TERMINALS FOR GLOBAL BEEPING [beep[...]

  • Seite 133

    S ECTION 6: S YSTEM A DMINISTRATION 6-9 E VENTS [evenentr] The task / event subsystem is used to program one or more tasks to be automatically performed in response to the occurrence of a user-defined event. Tasks and events are linked, and the task must be entered and stored before the system allows the creation of a related event. Events can init[...]

  • Seite 134

    6-10 S ECTION 6: S YSTEM A DMINISTRATION Modifier . Optional. If applicable, the transaction modifier which defines the event if the message is user-defined. Event Date . Optional. If the task referenced by this event is to be system-initiated, enter the applicable date. Event Time . Optional. If the task referenced by this event is to be system-in[...]

  • Seite 135

    S ECTION 6: S YSTEM A DMINISTRATION 6-11 Activate Code , Extension . Required. System code number for the type of action to be performed. The extension applies to camera presets for pan and tilt, or image verification when used with a Polaroid ID-4000 system. See table following this field description list. Deactivate Code , Extension . Optional. I[...]

  • Seite 136

    6-12 S ECTION 6: S YSTEM A DMINISTRATION 100 ACTIVATE PROJECT Activate an inactive project. 101 DEACTIVATE PROJECT Deactivate an active project. 102 NORMALIZE or Change project status to its normal condition (clears an override CLEAR PROJECT condition). T ASK E VENT / M ASTER R EPORT [taskrprt] This report shows all tasks / events established in th[...]

  • Seite 137

    S ECTION 6: S YSTEM A DMINISTRATION 6-13 Transaction Type (ID) . The unique ID number of a transaction. The system is pre- programmed to use specific transaction types for certain events at certain types of points. (See Appendix C: System Transactions for a complete list of standard transactions.) Transaction Modifier . Required as applicable. Ente[...]

  • Seite 138

    6-14 S ECTION 6: S YSTEM A DMINISTRATION 2 = Green 3 = Cyan (light blue) 4 = Blue Display Icon . For future use. Printer Group . Each log printer must include the selected printer group in its list of available printer groups. If the selected printer group is not included, the transaction will not be printed on the log printer. Printers are preset [...]

  • Seite 139

    S ECTION 6: S YSTEM A DMINISTRATION 6-15 D ATABASE B ACKUP . A database backup copies all information in the database (exceptions user and map information). If you make a number of changes to keyholder, hardware, and / or access information in a single day, then the database backup should be performed each day. For these purposes, use two alternati[...]

  • Seite 140

    6-16 S ECTION 6: S YSTEM A DMINISTRATION A LARM T RANSACTION C LEAN U P [alrmcln] Each time an alarm is triggered, a record is created and stored in a separate file along with the operator's alarm servicing response. This table is then available for reporting using the alarm servicing report. Over time, the size of this table grows and takes u[...]

  • Seite 141

    S ECTION 6: S YSTEM A DMINISTRATION 6-17 KEYHOLDER LOADING [loadmenu] This function copies keyholder IDs and names from an DOS ASCII file to a Unix then creates keyholder records. The format of records in the ASCII file must be as follows: • Keyholder ID ^ALastname ^AFirstname (^A refers to a single control-A character) • Keyholder ID 1 to 9 di[...]

  • Seite 142

    6-18 S ECTION 6: S YSTEM A DMINISTRATION ID S ECURITY G ROUP E NTRY [ID2_ entr] This function is used to create ID security groups. A sample screen follows: Required. Enter a unique security group number in the range 1—999. Optional. Enter a group description (30 characters maximum). ID S ECURITY R EPORT [ID1_ rprt] This function is used to prepa[...]

  • Seite 143

    S ECTION 6: S YSTEM A DMINISTRATION 6-19 MISCELLANEOUS INFORMA TION A DJUSTABLE B AUD R ATE —708P / 800 P OLLERS Multiple baud rates are supported for the diverse mix of communications equipment available for the SE 6000 system. The baud rate is set by changing the HOSTBAUD parameter in the $DATAPATH/NPOLLER. x file where x is the associated poll[...]

  • Seite 144

    6-20 S ECTION 6: S YSTEM A DMINISTRATION This feature is enabled / disabled using the REXEXTEND parameter in the $DATAPATH/ NPOLLER. x file where x is the associated 708P poller number. The feature is enabled / disabled during installation, or may be changed as needed by the system administrator. If changed, the poller must be halted and restarted [...]

  • Seite 145

    S ECTION 6: S YSTEM A DMINISTRATION 6-21 03/25/96 Ataraxia Electronics Page 1 15:52 Inventory Status Code Report Code Code Description ____ ________________ 1 AVAILABLE 2 ASSIGNED 3 LOST 4 UNUSABLE 5 DAMAGED 6 TERMINATED 7 REISSUED 8 RECOVERED 9 PREVIOUS OWNER 10 RESERVED K EY I NVENTORY E NTRY [cdinentr] This function is used to add/change key inv[...]

  • Seite 146

    6-22 S ECTION 6: S YSTEM A DMINISTRATION 03/25/96 Alpha Systems Page 1 15:55 Key Inventory Report Keyholder Keyholder Name Key No Date Time Status Descrip Remarks _________ ____________________ ______ ________ _____ ___________________ ________ 29205 THORPE JAMES 29606 06/23/96 13:15 ASSIGNED 31408 ROSS MICHAEL 31409 06/23/96 13:22 ASSIGNED 33244 D[...]

  • Seite 147

    S ECTION 6: S YSTEM A DMINISTRATION 6-23 P ARKING S TICKER M ASTER R EPORT [stkrprt] The report lists assigned parking stickers. A sample screen and report follow: 06/25/96 Security Electronics Page 1 16:00 Parking Sticker Report Keyholder Keyholder Name Sticker License _________ _______________________________ _______ _______ 28870 TERRY VALE 5000[...]

  • Seite 148

    A PPENDIX A: S YSTEM S CREEN T REES A-1 monitor ctrlpoll ctrllock ctrlprnt ctrlinp ctrldoor selzone ctrlout ctrldev devstat viewmap insrtns response download psbkfrgv manacc devcomm ctrlmenu dispmap othrmenu mainmenu alrmserv revtran monitor (Full Screen) rem_dev bld_mod Screen Location Tree — Monitor Security Activity[...]

  • Seite 149

    A-2 A PPENDIX A: S YSTEM S CREEN T REES acrtrprt almarprt whowhere excprprt phstrprt chstrprt accsmenu mainmenu ky2nrprt evptrprt rpasrprt downrprt Screen Location Tree — Security Management Reports[...]

  • Seite 150

    A PPENDIX A: S YSTEM S CREEN T REES A-3 empgentr egrpentr1 key_entr tmcdentr hol_entr tententr pol_entr d422entr zoneentr dev_entr rdr1entr rdr_entr dialentr abacentr d808entr fmntmenu acodentr eleventr agrpentr instentr usrdmenu compentr loc_entr usraentr usrbentr job_entr deptentr d818entr autoentr pnt_entr rdefentr siteentr nodeentr pndfentr rdr[...]

  • Seite 151

    A-4 A PPENDIX A: S YSTEM S CREEN T REES rprtmenu hol_rprt key_rprt deptrprt job_rprt maprprt instrprt pol_rprt zonerprt dev_rprt rdr_rprt pnt_rprt autorprt mainmenu accrmenu siterprt dconrprt rdefrprt con_menu egrprprt emrdrprt aassmenu p422rprt tentrprt loc_rprt comprprt tmcdrprt acodrprt fs_rprt agrprprt acovrprt epj_rprt prj_rprt pro_rprt Screen[...]

  • Seite 152

    A PPENDIX A: S YSTEM S CREEN T REES A-5 Screen Location Tree — Key Inventory invtmenu statentr cdinrpt statmenu statrprt cdientr mainmenu stkrentr stkrprt stkrprt1 stk1entr stkrrprt stkrmenu mainmenu Screen Location Tree — Parking Stickers[...]

  • Seite 153

    A-6 A PPENDIX A: S YSTEM S CREEN T REES loadmenu purgrprt pgacrprt showwho sec_menu syclmenu accsarch beepentr mnaccopy pgacentr evenentr tranentr db_menu showuser mod_pass addusers mainmenu sys_menu josprprt jourrprt alrmcln accsarch jourarch bkup downcln dbstats ctrlentr taskentr pg1_entr showdate . . . Screen Location Tree — System Administrat[...]

  • Seite 154

    A PPENDIX B: S YSTEM S CREEN H IERARCHIES B-1 M ONITOR S ECURITY A CTIVITY S CREEN T ITLE F UNCTION monitor Watch events and activities as they occur; menu to other monitoring and control screens. ctrlmenu Menu to control functions. Zone selection stays in effect until this screen is exited. ctrlpoll Select pollers to halt or restart, and to check [...]

  • Seite 155

    B-2 A PPENDIX B: S YSTEM S CREEN H IERARCHIES key_copy Create new keyholder record by copying from an existing keyholder record. egrpentr Select a keyholder for access privilege assignment. Can also be reached from key1entr. egrpentr1 Assign access privileges to a keyholder. egrpcopy Copy one keyholder's information to another keyholder. acc_m[...]

  • Seite 156

    A PPENDIX B: S YSTEM S CREEN H IERARCHIES B-3 M ASTER F ILE R EPORTS S CREEN T ITLE F UNCTION rprtmenu Menu to database reporting functions. key_rprt Report keyholder information. aassmenu Menu to the access assignment reporting functions. egrprprt Report access codes / access groups assigned to keyholders. emrdrprt Report specific readers assigned[...]

  • Seite 157

    B-4 A PPENDIX B: S YSTEM S CREEN H IERARCHIES P ARKING S TICKERS S CREEN T ITLE F UNCTION stkrmenu Menu to parking sticker and license plate management functions. stkrentr Select keyholder for parking sticker and / or license plate information entry. stk1entr Enter parking sticker or license plate information for keyholder. stkrrprt Locate keyholde[...]

  • Seite 158

    # Message Explanation A PPENDIX C: S YSTEM T RANSACTIONS — N UMERICAL S EQUENCE C-1 0 Negative Acknowledge 708P unable to understand message from host. 1 Access Granted Card or keypad entry granted access by ACU or host. 2 Key Trace Card flagged as TRACE has been read. 3 Point Trace A card has been read by a sensor flagged as TRACE. 4 Invalid Tim[...]

  • Seite 159

    # Message Explanation C-2 A PPENDIX C: S YSTEM T RANSACTIONS — N UMERICAL S EQUENCE 29 Printer On Log printer switched on. 30 Device Reset 708P / 8xx-series powered up / re-initialized. 31 Return From Failsoft 708P communication restored — no longer in failsoft mode. 32 Power Failed 708P / 8xx-series with 3708 UPS has lost AC power. 33 Power Re[...]

  • Seite 160

    # Message Explanation A PPENDIX C: S YSTEM T RANSACTIONS — N UMERICAL S EQUENCE C-3 54 Device Online ACU communicating with host. 55 Request Manual Access Manual access command entered. 56 (Building Closed Trace) Obsolete message 58 Repack OK Host has loaded new database information. 59 Error Setting Bldg. Mode Building mode command unsuccessful.[...]

  • Seite 161

    # Message Explanation C-4 A PPENDIX C: S YSTEM T RANSACTIONS — N UMERICAL S EQUENCE 83 Enter Unattended Mode Optional parking function. 84 Batch Request Received Not used at this time. 85 Remote Comm Ended Not used at this time. 86 Global Silence Request Silence global beeping command issued. 89 Ticket Serviced Parking application has completed t[...]

  • Seite 162

    # Message Explanation A PPENDIX C: S YSTEM T RANSACTIONS — N UMERICAL S EQUENCE C-5 115 Power Report Unshunted Device power fail report unshunted. 116 COAX Report Shunted Reader coax fail report shunted. 117 COAX Report Unshunted Reader coax fail report unshunted. 118 Sensor Report Shunted Sensor / reader fail report shunted. 119 Sensor Report Un[...]

  • Seite 163

    # Message Explanation C-6 A PPENDIX C: S YSTEM T RANSACTIONS — N UMERICAL S EQUENCE 142 Host Dial Start Remote device dialing host. 143 Carrier Off SE 422—Incoming phone line or host port has lost DTR. 144 Carrier On SE 422 — Incoming phone line or host port DTR high. 145 Logs Purged SE 422 — Log buffer purged. 146 Threshold Met SE 422 — [...]

  • Seite 164

    # Message Explanation A PPENDIX C: S YSTEM T RANSACTIONS — N UMERICAL S EQUENCE C-7 178 VIP Failure VIP keypad not responding. 179 VIP Okay VIP keypad returned from failed status. 180 VIP Tamper Fail VIP tamper fail reported. 181 VIP Tamper Okay VIP tamper switch OK. 182 VIP Shunted VIP shunted. 183 VIP Unshunted VIP unshunted. 184 VIP Tamper Shu[...]

  • Seite 165

    # Message Explanation C-8 A PPENDIX C: S YSTEM T RANSACTIONS — N UMERICAL S EQUENCE 242 Disk Almost Full Disk space at value of DISKWARN parameter (usually 90% full). 250 Over Max Key Limit Attempt made to download more keys than the device will hold. 300 RDI Full RDI transaction buffer full. 301 RDI Too Hot RDI upper temperature limit exceeded. [...]

  • Seite 166

    Message # Message # A PPENDIX C: S YSTEM T RANSACTIONS — A LPHABETICAL S EQUENCE C-9 ABA Card Data 1 ........................................ 173 ABA Card Data 2 ........................................ 174 ABA Card Data 3 ........................................ 175 ABA Card Data 4 ........................................ 176 ABA Card Data 5 ...[...]

  • Seite 167

    Message # Message # C-10 A PPENDIX C: S YSTEM T RANSACTIONS — A LPHABETICAL S EQUENCE Max Tenant In Lot ........................................ 8 0 Meal Counter - Excp. .................................. 136 Meal Counter - Valid .................................. 1 37 MSM Fail .................................................... 11 0 MSM Okay ..[...]

  • Seite 168

    A PPENDIX D: P ROGRAM S ECURITY M ASTER L IST D-1 Level 1 = COMPLETE SYSTEM ACCESS ID1_entr ID Security User Entry Y Y Y ID1_rprt ID Security Report N N N ID2_entr ID Security Group Entry Y Y Y ID_menu ID Security Report N N N aassmenu Access Assignments N N N abacentr ABA Configuration Entry Y Y Y abacrprt ABA Configuration N N N acc_menu Access D[...]

  • Seite 169

    D-2 A PPENDIX D: P ROGRAM S ECURITY M ASTER L IST outsrprt Outstanding Tickets N N N overrprt Tenant Overage N N N p422rprt SE/422 PIN Report N N N padmmenu Parking Administration N N N parkmenu Parking Control N N N pgacentr Security Entry Y Y Y pgacrprt Security Master List N N N phstrprt Point History N N N plotentr Point/Lot Association Y Y Y p[...]

  • Seite 170

    INDEX-1 I NDEX A Access Assignment, 4-8, 5-4 Keyholder Access, 5-4 Keyholder Access Assignment, 4-8 Readers, 5-5 Access Code, 1-2 Access Code Entry , 4-9 Distributed Access codes, 4-9 Host, 4-9 Smart Failsoft, 4-9 Access Control Archive Report, 3-4 Access Control T ransaction Archiving [accsarch], 6-15 Access Control Units (ACUs), 1-3 Access Defini[...]

  • Seite 171

    INDEX-2 Auto Opens/Activates, 4-42 Automatic Access Control, 1-6 Automatic Activate / Deactivate, 1-6 Automatic Restart, 1-16 Automatic Unlock/Lock, 1-6 B Basic System Usage, 1-16 Logging Off, 1-15 Biometric Identifiers, 1-3 Building Modes, 2-1 1 C CCTV , 1-17 Clearing a Field, 1-14 Communications Monitor , 1-6 Company , 1-2 Complete Portability , [...]

  • Seite 172

    INDEX-3 D Data Entry Sequence, 1-9 Data Item Selection, 2-2 Database Changes, 1-7 Database Maintenance [db_menu], 6-14 Definition, General T race, 1-3 T ransactions, 1-3 Definition, Inputs Fire Alarms/Heat Sensors, 1-4 Definition, Principal System Functions Auto Unlock/Lock, 1-6 Definitions Access Control, 1-6 Definitions, Basic System Usage, 1-9 A[...]

  • Seite 173

    INDEX-4 Definitions, Principal System Functions, 1-6 Auto Activate/Deactivate, 1-6 Automatic Access Control, 1-6 Communications Monitor , 1-6 Flexible Event Handling, 1-6 Independent PIN Entry , 1-6 Manual Access Control, 1-6 T wo-Man Rule, 1-6 Definitions, Readers, 1-4 Digital Key Reader , 1-4 Magnetic Card Reader , 1-4 Readers, Sensors, 1-4 Defin[...]

  • Seite 174

    INDEX-5 NexSentry Reader Report Defined, 4-38 Reader Entry , 4-32 Reader Report, 4-35 Readers, 4-31 Devices Configuration Reports Devices, 5-14 Readers, 5-15 Digital Key Reader , 1-4 Disk Almost Full W arning, 2-12 Display All Users Logged In [showwho], 6-7 Display All V alid Logins [showuser], 6-7 Display Current Date and Time [showdate], 6-7 Disp[...]

  • Seite 175

    INDEX-6 Forgive Passback, 2-10 Full Screen Monitoring, 2-12 Function Keys, 2-2 G General Definitions Keyholder , 1-2 Guard T our , 1-18 H Hardware Configuation 422 Hardware Definition, 4-44 Hardware Configuration 422, 4-28 422 Pin Definition, 4-43 818, 4-28 8xx Series, 4-24 ABA Configuration, 4-47 Areas, 4-19 Device Report, 4-43 Devices, 4-21 Diale[...]

  • Seite 176

    INDEX-7 J Job Category , 1-2 Journal Archive [jourarch], 6-16 Journal Reporting [jourrprt], 6-16 K Key Inventory [invtmenu], 6-20 Key Inventory Entry [cdinentr], 6-21 Key Inventory Report [cdinrprt], 6-21 Key Inventory Status Code Report [statrprt], 6-20 Key Number , 1-2 Keyholder , 1-2 Access Assignment, 4-8 Keyholder Access Entry , 4-5 Keyholder [...]

  • Seite 177

    INDEX-8 Microprocessor Access Control Units, 1-3 Biometric Hand Reader , 1-3 Miscellaneous Information, 1-15, 2-12 Modified Usage of Invalid Facility Code Log, 2-15 Modify Passwords [mod_pass], 6-4 Monitor Security Activity , 2-1 Monitoring Security - Passwords, 2-14 Motion Sensors, 1-4 Moving Backwards in a Field, 1-14 Moving Between Data Fields, [...]

  • Seite 178

    INDEX-9 Program Security Entry Definition [pg1_entr], 6-5 Purge a Pending Report [purgrprt], 6-8 R Reader Entry , 4-32 Reader Report, 4-35 818, 4-37 NexSentry , 4-38 Reader Report, 422, 4-36 Readers, 1-4 Real T ime Control Maps, 2-8 Realtime Passback Zone Report, 3-9 Remote Alarms, 1-5 Remote Devices, 2-1 1 Remote Dial-Up Interface, 1-18 Reporting,[...]

  • Seite 179

    INDEX-10 Review T ransactions Full Screen, 2-7 Review T ransactions Function Keys, 2-8 REX, 1-5 S Sample System, 1-7 Screen Access, 4-1 Screen Examples, 1-1 1 Searching With Partial Information, 1-13 Section Organization, 2-1 Security Master List [pgacrprt], 6-6 Security Reports, 3-1 Select Zone, 2-6 Select Zone Function Keys, 2-6 Selecting Screens[...]

  • Seite 180

    INDEX-11 T enant, 1-3 T enants, 4-17, 5-1 1 T ime and Attendance, 1-18 T ime Code, 1-3 T ime Codes, 4-16, 5-10 T race, 1-3 T ransaction History Report, 3-3 Sample Report, 3-4 T ransactions, 1-3 T ransactions [tranentr], 6-12 T wo-Man Rule, 1-6 U User Defined Information, 4-49 Using Screens and Fields, 1-12 Moving Between Data Fields, 1-12 Moving to[...]