Avigilon Access Control Manager User Manual Avigilon Workflow Guide

Access Control Manager

Application Configuration and Work Flow Guide

Ver si on 5.0/AV01-1213

Access Control Manager
Version 5.0 Copyright
Avigilon Inc. Box 378 #101-1001 West Broadway Vancouver, British Columbia V6H 4E4 Canada
Phone:888.281.5182 Web:www.avigilon.com
©
ii
Access Control Manager

Getting Help

If you encounter a problem that is not discussed in available Avigilon Access Control Manager user guides or online help files, and need technical support, please contact your local Value
Added Reseller (VAR) or Avigilon support (888.281.5182).
When contacting your VAR, please be sure to have your registration material, serial number, and software version number available.
For future reference, record these numbers here.
Serial Number: _________________________________
Version Number: ________________________________
VAR: __________________________________________
VAR Phone #: __________________________________
iii

Table of Contents

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Flowchart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Access Control Manager Workflow. . . . . . . . . . . . . . . . . . . . . . . . . 3
Connecting and Accessing the Access Control Manager
Appliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Required Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Configuration Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Panels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
Panel Add Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Areas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
Doors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
Schedules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Holidays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Card Formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Event Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Access Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51
Delegation Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Changing a Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Adding Pictures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Adding Database Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .61
Adding Text . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Adding Graphics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Badge Camera Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
User-Defined Fields and Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71
User-Defined Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71
User Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Collaboration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Identities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Adding Identities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Searching for Identities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Identity Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Adding Identity Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Maps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .91
Global Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Global Linkages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Elevator Access Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Appliance Back-Up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Monitoring Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Monitoring Alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Searching for Events and Alarms . . . . . . . . . . . . . . . . . . . . . . . . 105
Verifying Door and Identity Status . . . . . . . . . . . . . . . . . . . . . . . .107
Monitoring Hardware Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Monitoring Maps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
1

Overview

Thank you for your purchase of the Access Control Manager software.
This configuration and workflow guide will walk you through the steps required to connect and configure your new Access Control Manager system.
This is not a comprehensive guide of every feature and field in the system. For that, you can review the Access Control Manager online help files. This guide handles the initial setup of your system through the Access Control Manager appliance and bypasses some of the advanced features and tasks that you may want to use later but don’t really need initially.
To that end, we begin with a flowchart of the steps you should take to get your Access Control Manager system up and running.
We hope you enjoy your user experience with the Access Control Manager.
1
Flowchart
page 3
page 93
page 21
page 19
page 37
page 35
page 33
page 44
page 41
page 53
page 76
page 13
page 49
page 71
page 57
page 77
page 88
page 46
page 31
page 96
page 94
page 90
page 55
page 73
page 65
page 98
page 101
page 87
page 51
page 39
The flowchart below shows the basic steps you should follow to complete the setup process.
2

Access Control Manager Workflow

1
Express
Enterprise
The following workflow is divided into sections and subsections representing the steps you will take in configuring the Access Control Manager system.
Connecting and Accessing the Access Control Manager Appliance
Required Items
This is a list of items you will need to configure your new Access Control Manager appliance:
Access Control Manager Appliance (or Access Control Manager Virtual Appliance DVD with License)
Power Cable
Crossover Cable (not included)
Static IP address
Domain Name Server that will be responsible for resolving the static IP address to a name.
Configuration Procedure
1. Connect the power cord to the power connector on the Access Control Manager
appliance then plug the other end into an available electrical outlet.
If this is a Access Control Manager virtual appliance, skip Steps 1 and 2.
3
2. Connect the Access Control Manager appliance to a computer using the crossover
Express
Enterprise
Crossover Cable
(sold separately through third-party retailers)
Connect to Port 2
Crossover Cable
(sold separately through third-party retailers)
Connect to Port 2
cable to Port 2 of the appliance.
3. On your connected computer, open a web browser and type the appropriate address
into the address bar.
For the express and enterprise appliance, enter this address:
https://169.254.1.250
For the virtual appliance, enter this address:
https://169.254.1.201
4
At this point, you will probably see a message indicating that you are trying to reach an
If this is Internet Explorer:
If this is Safari:
If this is Firefox:
If this is Chrome:
Enter admin in each field
unknown or insecure site, like these examples:
4. Do one of these things:
5. Enter these default values in the corresponding fields:
If this is Firefox, click the “Or you can add an exception...” or “I understand the risks” link, click the Add Exception button, click Get Certificate, then click Confirm Security Exception button.
If this is Windows Explorer, click the “Continue to this website (not recommended)” link.
If this is Safari, click the Continue button.
If this is Chrome, click the Proceed Anyway button.
This brings you to the login screen like this example:
5
Login: admin Password: admin
NOTE: We highly recommend that you change the login and password for the
system administrator account as part of the configuring of your new appliance.
6. Press Sign in.
The home page appears like this example:
7. From the Setup section in the upper right corner, click Settings then System Settings.
8. Make changes as required to the language displayed as well as the token expiration time and the password strength, as required.
9. From the Setup section, click Appliance.
The Appliance page appears like this example:
10. Enter a Name, Host Name, Domain Name, and any other values you need to set.
If you need to change any other fields, they include:
Name Enter a descriptive name for this appliance.
System Name This read-only field designates the name of the entire Access
Control Manager system.
6
Host Name This is the DNS name for this appliance and is identified as
such under the 'DNS Name' field on the Appliance Listing page.
Domain Name Enter the domain name where this appliance resides.
Name Server Enter the name of the domain server.
Time Server Enter the time server connected to this appliance.
Time zone From the drop-down pick list, specify the time zone where this
appliance resides.
Use Daylight Savings Time
Enable Remote TCP/ IP Management
Enable SNMP Click this box to enable SNMP functionality for this appliance.
SNMP Version From the pick list, select the version of SNMP being used for
SNMP Contact Enter the name of a contact that will oversee and collect
SNMP Location Enter the location where the SNMP server resides.
Splunk URL Enter the URL where the Splunk application resides, if
Stored Transactions Enter the maximum number of transactions that can be stored
Check this box to indicate that this appliance uses Daylight Savings Time, when appropriate.
Check this box to indicate that this appliance can use remote TCP/IP management. By default this feature is checked and enabled, since the configuration or operator often needs to access this appliance via the internet.
this appliance.
SNMP data.
appropriate.
on the appliance.
When the number of transactions exceeds this limit, new transactions will start overwriting previously stored transactions.
The default is 1,000,000 transactions.
Hardware Type From the drop-down pick list, select the Access Control
Manager Appliance model. Available options are: Express,
Enterprise, and Virtual.
Web Server Port Specify the port number that is used to connect the web
server to this appliance.
Service Port Specify the port number that is used to access diagnostics
and service for this appliance.
Edge Listen Port Specify the port number that accesses the listening feature on
this appliance for HID Edge panel communication.
Ldap Connect Port Specify the port number that enables communications
between this appliance and other IP network-attached entities using LDAP information service protocol.
This field is only applicable for LDAP devices.
Transactions Connect Port
Specify the port number used for connecting to the Postgres transaction database for ODBC connections.
7
Mercury Client Port Specify the port number used to set the port you wish this
appliance to use in order to listen for IP client panel connections.
Note: This must be the same port configured on all of the IP Client panels that will connect to this appliance.
Mercury-Require TLS Check this box, if required, to encrypt connections between
the appliance and the Mercury Panel.
Note: All IP client panels connecting to this appliance must be configured for 'TLS Required' if this option is checked
SMTP Server Enter the mailbox server for this system. This is the name of
the server that handles the transfer of email. This field and the next four are required before email alerts can be sent automatically in case of an alarm or event occurs.
SMTP Port Enter the name of the port that the Host uses to connect to the
SMTP Server.
SMTP Host Name Enter the name of the host used for SMTP traffic.
Use Start TLS Check this box to indicate that this appliance uses Start TLS
cryptography to communicate with the SMTP server.
Use TLS Check this box to indicate that this appliance uses generic
TLS cryptography to communicate with the SMTP server.
SMTP From Enter the email address of the person or organization that
email will be from.
SMTP User Enter the email addresses of persons or organizations to
which email alerts are sent in case of alarms.
SMTP Password Enter the password required to use the email server.
Partitions From the window, click to highlight one or more partitions that
are assigned to this appliance.
Only those partitions previously defined for this system appear in this window. If no partitions are defined for this system, this field does not appear.
11. Click the button to save changes.
8
12. Click the button.
First click the Save button then click the Reboot Appliance button.
EULA must be completed before you can install the hardware
13. Once the appliance reboots, click the About tab.
The About page appears like the following example.
The essential information about this appliance, including the appliance license string and key are displayed.
14. For initial setup, click the “View End User License Agreement Terms and Conditions” link.
9
The Software Terms and Conditions form appears like this example:
15. Review the terms then enter the name of this company, the name of the administrator or owner, and the title of the person whose name appears here, then click Back.
16. Reboot the appliance as explained in Step 10, then click Logout at the top of the page to log out of the appliance.
17. Log in and click on Appliance.
The Appliance property sheet appears.
18. Click on the Ports tab.
The Ports page appears like this example:
19. Click on the Port-1 name.
The Port-1 edit page appears like this example:
20.At the ‘IP Address’ field, enter the selected static IP address.
This IP address should be in the range of your LAN. If needed, consult your IT administrator for an appropriate address.
10
If you need to change any other values, they include:
Check the appropriate boxes
All changes must be saved by pressing this button before exiting a screen or changes will be lost
Name This field contains the name of the Ethernet port. Initially, the name that
appears is the current or default name of the port; however, you can enter a new name if you require.
Link Status This read-only field indicates whether the connection is currently up or
down.
IP Address Enter the IP address for this port. If you aren't sure what the address is,
consult your IT administrator.
If you assign or change an IP address, make sure that any switches or routers on the appliance's network recognize the changed address. To do this, either reboot the appliance, or unplug the Ethernet cable, wait a few seconds, then plug it back in
Netmask Select from the drop-down list the netmask required for addressing this
connection. The values are 0 - 32 bits where a 24-bit netmask is the default value.
Network Gateway
MAC Address This read-only field displays the MAC address for this field.
Installed Check this box to indicate that this Ethernet port is already connected to
Data rate This read-only field specifies the current data rate detected for this
Enter the gateway address of this appliance.
a panel.
connection.
21. Save your changes, reboot the appliance, and log out.
22.Log into the appliance again and click on the Appliance link.
23.From the property sheet, click the Access tab.
The Access page appears like this example:
24.Place a check mark in each box you need under the ‘Installed’ column.
At present this means checking Mercury Security. This enables the appliance to allow for the configuration of the Mercury Field hardware devices.
25.Click to save your changes.
26.Connect the appliance to the network in this manner:
11
a. Remove the crossover cable and move the appliance to its required position in the
Express
Enterprise
system.
b. Using a standard Ethernet cable, connect one end of the RJ-45 to an available RJ-
45 port on the appliance.
c. Connect the other end of the Ethernet cable to the network.
If this is a Virtual appliance, ignored this step.
NOTE: Access Control Manager only supports connectivity to Mercury controllers through IP.
Serial connectivity to these panels is not currently supported.
12
Panels
2
After setting up the appliance, your next step is to configure the panels to which this appliance is connected. For this document, we are only interested in Mercury Security panels.
To configure Mercury Security panels:
1. From the icon task bar of the home page, click on Physical Access then click on Panels.
2. Click the button to add a panel.
The Panel Add page appears like this example:
3. Assign the new panel a name, choose an appliance, and select Mercury for vendor type.
New fields appear like this example:
4. Place a check mark in the ‘Installed’ checkbox.
5. At the ‘Model’ pick list, select your panel model then choose your time zone.
While Mercury panels appear in this list, you can also configure Lenel panels. A table of equivalency is shown below:
Lenel Mercury
LNL-500 SCP-C
LNL-1000 SCP-2
LNL-2000 SCP-E
LNL-2200 EP1502
LNL-3300 EP2500
LNL-2210 EP1501
LNL-1100 MR16in
LNL-1200 MR16out
13
Lenel Mercury
LNL-1300 MR50
LNL-1320 MR52
—MR51e
6. Leave the rest of the fields at their default settings and click to save your settings.
The Sub-panels page appears like this example:
7. Choose the appropriate quantity of downstream panels attached to this master panel.
8. Click to save your settings.
The Panel Configure page appears like this example:
9. Make changes, if required, and click to save your settings.
The fields on this page include:
Name Enter a unique name that identifies the panel.Duplicate
names are not allowed.
Physical Location
Appliance This read-only field displays the panel model to which the
Vendor The read-only field has the Mercury Security option selected
Installed Check this box to indicate that this panel is communicating
Enter a description of the location of this panel.
subpanel is connected.
from the drop-down list.
with the appliance.
14
Partitions From the window, select one or more partitions to which this
panel will be assigned.
Only those partitions presently defined by this system appear in this list.
Model This read-only field displays the Panel model to which the sub
panel is connected.
Time zone Identifies which time zone applicable to the panel.Select the
time zone from the drop-down list. Only those time zones previously defined for this system can appear in this list.
Allocate space for:
Credentials Defines the amount of credentials that can be in the
panel.Enter a number between 0 and 100,000 where the default value is 10,000.
The more credentials you designate, the less room there will be for events.
Events Defines how many events to buffer in the panel.Enter a
number between 0 and 5,000 where the default value is 5,000.
The more events you designate, the less room there will be for credentials.
DB Version This read-only field indicates the version of the Access Control
Manager database currently used by this panel.
10. Click on the Host tab and configure the host communication settings.
11. Enter the primary IP address for the panel.
Leave the rest of the settings as default. However, if you need to change any of them, the fields on this page include:
Name Identities the name of the present panel.
Appliance Read-only field that Identities the name of the selected
appliance.
Installed Check this box to indicate that the panel is currently running
and the application can begin to poll it.
15
Partitions From the window, select one or more partitions to which this
Click this button
panel will be assigned.
Only those partitions presently defined by this system appear in this list.
IP Address Enter the IP address of this panel.
Reply Timeout From the list, select the number of milliseconds this panel is
allowed to wait for a reply from the primary Access Control Manager host.
Offline Timeout From the list, select the number of milliseconds this panel can
remain offline (disconnected from the host) before the panel attempts to contact an alternative host, if one exists.
Retries From the list, select the number of retries allowed before this
panel stops polling the host and attempts to connect the alternative host, if one is configured.
Poll Delay Defines the number of milliseconds it is required for the panel
to wait between polls.
12. Click to save your settings.
Once the previous settings have been saved, the system returns to the Panels Listing page. You should see that the panel you created is online.
13. Click on the Panel name to get to Panel Edit screen with the Panel Status page displays.
14. On the Status page, click on the Firmware button like this example:
16
The Firmware listing like this example:
Click this button
15. Locate the firmware for the panel you installed and configured, then click the green check mark to download the firmware to the panel.
NOTE: For instructions on copying firmware to your host computer, refer to the
Access Control Manager online help.
The system asks you to confirm that you want to download the firmware to the panel.
16. Click Ye s .
The firmware is installed. This takes approximately five minutes.
17. Once the firmware is installed, click the Reset/Download button and allow one minute for the panel to reset and an additional two minutes for the parameters and tokens to download.
Panel Add Summary
To summarize the panel configuration process:
1. Add the Panel and configure required settings
2. Once installed go to the status screen for the panel and install the latest firmware (approximately five minutes).
3. Once the firmware is installed click the reset button and allow 1 minute for the panel to reset.
4. After the panel has completed resetting, click the download parameters button and allow the parameters to download which takes approximately two minutes.
5. After the parameters are completed downloading click the download tokens button.
17
6. Proceed to add Areas (page 19).
If you do not require areas in order to define the doors, you can skip Areas and go directly to Doors (page 21).
18
Areas
3
Areas are zones the Access Control Manager assigns to define a physical area within a secured location. This area can be relatively small, like a lab or a store room, or large, like a collection of buildings. Areas often incorporate one or more doors with their attached inputs and outputs. Once an area is defined, it can be assigned to a role or policy indicating that portion of a facility or company to which assigned users are limited.
For example, a scientist works in an area designated as Laboratory A. As long as he accesses doors leading into or exiting that area, he is granted access. But if he attempts to enter an area designated as Administrative A, he is denied access.
To define an area:
1. From the icon task bar on the home page, click or mouse-over Physical Access.
The Physical Access main page appears.
2. Click the Areas submenu option.
The Areas Listing page appears like this example:
3. Click the button.
The Area Add page appears like this example:
4. Fill in the fields as required.
19
These fields include:
Appliance From the drop-down pick list, select one of the existing
appliances in which this area appears.
Only those appliances currently defined for this system appear in this list.
Name Enter the name of this area
Maximum Occupancy
Log Min Reached Record a transaction when the minimum count for this area is
Log Max Reached Record a transaction when the maximum count for this area is
Enable Area Check this box to enable use of this area definition.
2-Person Control Check this box to indicate a two-person rule is imposed for this
Partitions Select one or more partitions from the partitions list. This includes
Enter the maximum number of cardholders allowed in this area at a specified time.
reached.
reached.
area.
When checked, two or more people must be in the area at times when occupied. When the area is empty, two valid cardholders must present their credentials to the entry reader before entry is granted. Once occupied by two or more people, individual access can be granted. The same rules apply for exit until two cardholders are left in the area; at this point, both cardholders must present their credentials and exit the area together.
those partitions in this area definition.
Only those partitions currently defined for this system appear in this list.
5. Click to save these values.
A message appears “Area was successfully created” and the Areas Listing page reappears with the newly added area on the list.
20
Doors
4
After you have configured both the appliance and the panels it controls, it is time to create and configure each door associated with the created panels.
To create and configure doors:
1. From the icon task bar on the home page, click Physical Access.
2. Click Doors.
The Doors Listing page appears like this example:
3. Click the button.
The Door Add screen appears like this example:
4. Enter the following information:
• Door Name
• An Alternate name (optional)
• Location (optional)
5. From the ‘Appliance’ pick list, select the appliance to which this door is connected.
6. From the ‘Vendor’ pick list, select the vendor.
In this case, you should select Mercury Security.
21
The Door Add page expands to include basic door configuration values, like the following example:
The fields on this page include:
Name Enter the name of this panel.
Partitions From the window, select the partitions to which this door
should be added.
Only those partitions currently defined by the system appear in this window.
Alt Name Enter a description of this panel, such as 'front door' or 'lab
door'.
Address This is a display-only field that is generated by the Access
Control Manager.
Location Enter the location of this door.
Appliance From the drop-down pick list, select a appliance to which this
door is connected.Only those appliances previously defined by this system appear on this list.
Panel Specifies the panel to which the door is to be assigned. Select
one of the previously defined panel from the drop-down list.
Ven dor Select the appropriate door manufacturer from the drop-down
list.
Currently, the only option is Mercury Security.
Installed Check this box to indicate that this door is communicating with
the panel.
Access Type Select the Access Type from the drop-down list.
Note: If the access type is a paired door (paired master or paired
slave), the Door Add page re-displays with the additional field, Paired Door. Select the Paired Door option from the drop-down list.
Door Mode Specifies the entry mode for the door when online with the
host. Select the Door Mode option from the drop-down list.
22
Offline Mode Specifies the entry mode used for the door if the door
controller is no longer communicating with the panel.
Note: In many cases, the limited memory of most readers in offline
mode requires a very simple solution to entry or exit, such as use of a facility code.
Select the Offline Mode option from the drop-down list.
Custom mode From the drop-down list, select the special mode to use during
a time zone specified in the 'Custom Schedule' field. For example, during normal working hours, it might only be necessary to use a card only entry at a particular door, whereas after midnight, you would enforce PIN code and card.
Custom Schedule
Mask Forced During
Mask Held During
Always Mask Forced
Always Mask Held
Door Processing Attributes
Log Grants Right Away
From the drop-down list, select the interval during which the custom mode specified above is activated. Only those time zones previously defined for this system appear in this list.
From the drop-down list, select the time during which this door is masked even when a forced open condition is detected. Only those schedules previously defined for this system appear in this list.
From the drop-down list, select the time during which Door Held Open alarms from this door will be masked. Only those schedules previously defined for this system appear in this list.
From the drop-down box, select TRUE to specify that Door Forced Open alarms at this door are always masked. Normally, this box is blank.
From the drop-down box, select TRUE to specify that Door Held Open alarms at this door are always masked. Normally, this box is blank.
When this box is checked, the system logs an extra event as soon as there is a grant (that is, before entry / no entry is determined). This event is not turned into a Access Control Manager event. Check this box in order to initiate local I/O in the panel using the panel triggers.
Certain customers may have a trigger they want to fire (to execute a macro) as soon as there is a grant, but before entry / no entry is determined.
Deny Duress If a user indicates duress at a door, checking this box denies
access.
Don't Pulse Door Strike on REX
Require Two Card Control
Check this box to disable the pulse of the door strike output when the request-to-exit button is pressed.This can be used to effect a 'quiet' exit. If this box is not checked, the output is pulsed.
Check this box to specify that two tokens are required to open this door. This enforces two-person rule at a specified door.
23
Door Forced Filter
Check this box to enable the filter feature for door forced alarms. There are instances when a door is either slow to close or is slammed shut and bounces open for a few seconds. With this filter, the monitor allows three seconds for a door to close before issuing an alarm.
Log All Access as Used
Detailed Events Check this box to generate detailed events of all hardware at
Enable Cipher Mode
Use Shunt Relay Check this box to enable the use of a shunt relay for this door.
Do Not Log Rex Tra nsactions
Check this box to log all access grant transactions as if the person used the door. If this box is not checked, the door determines if it was opened and will distinguish if the door was used or not used for grant.
the door including door position masking, timer expirations and output status. Typically, five to ten detailed transactions will be generated for each grant transactions. During the normal course of operation, most guards don't need to see extensive reports on events; however, after hours, it is often useful to see every detail.
Check this box to enable cipher mode. Cipher mode allows the operator to enter card number digits at the door’s keypad.
Check this box to indicate that return-to-exit transactions are not logged by the system.
7. Choose the following for basic door configurations values:
• Access Type: Single
• Door Mode: Card Only
• Offline Mode: Facility Code Only
• Unlock During: Never Active
8. In the ‘Door Processing Attributes’ section, choose the appropriate settings.
9. Click to save your settings.
The Operations page appears like this example:
The fields on this page include:
Name Identifies the door.Enter a unique name that identifies the door.
24
Alt Name Identifies an alternate name for the door. If there is an additional
name the door is identified by, enter this alternate name.
Location Identifies the location of the door.Enter a description of the door’s
location.
Appliance Identifies the appliance of the door.This is a display only field when
in edit mode.
Vendor Identifies the vendor of the door.This is a display only field when in
edit mode.
Installed Check this box to indicate that this door is currently connected and
communicating with the panel and appliance.
Partitions From the window, select the partitions to which this door should be
added.
Only those partitions currently defined by the system appear in this window.
Panel Specifies the panel the door is assigned to. This is a display only
field when editing the hardware (the panel can be changed when editing the door operations).
APB Mode Indicates the anti-passback mode for the door. Select the APB
Mode from the drop-down list. The available options are:
No Selection – The specified door is not involved in APB at all. Grants do not take APB into consideration at all.
Soft area APB – The specified door should have an area entering and area leaving configured for it.
Hard area APB – The specified door should have an area entering and area leaving configured for it.
Door-based timed APB – The specified door should not have an area entering or area leaving configured for it. There should be a timeout value configured for the door (a value entered in the 'APB Delay' field).
Token-based timed APB – The specified door should not have an area entering or area leaving configured for it. There should be a timeout value configured for the door (a value entered in the 'APB Delay' field).
Timed area APB – The specified door should have an area entering, area leaving, and timeout configured for it.
APB Delay Specifies the number of seconds before another entry is allowed.
Enter the number of seconds.
Area Entering Identifies the area the user enters when entering through the door.
If no area is specified, any location is valid. Select the area from the drop-down list. Only those areas currently defined for this system appear in this list.
Area Leaving Identifies the area the user moves into when exiting the door.
Select the area from the drop-down list.In addition to the Don't Care option, only those areas currently defined for this system appear in this list.
25
Strike Mode Defines when a door should unlock. Specifies if the strike is
deactivated when the door is opened, when the door is closed, or when the strike timer expires. Select the strike mode from the drop-down list.
Cut short when open – the strike is deactivated on open
Turn off on close – the strike is deactivated on close.
LED Mode Specifies how the reader LEDs are to be displayed. Select the LED
mode from the drop-down list.
Your choice is 1, 2, or 3.
Held Pre-Alarm Specifies the number of seconds before the held open alarm is
generated. Once the number of seconds is reached, a transaction will be generated which can be used to activate a warning signal. Enter the number of seconds.
Access time when open
Standard Access time
Held Open Specifies the number of seconds before the held open door event
Extended Access
Extended Held Specifies the number of seconds before the held open door event
Card Formats Specifies card formats compatible with the reader at the door.
Specifies the minimum number of seconds the strike will be activated. Enter the number of seconds.
Specifies the standard number of seconds the strike will be activated. Enter the number of seconds. If the door is not opened within this interval, the door is automatically locked.
is generated. Enter the number of seconds.
Specifies the strike time for a door configured for persons that require more time to enter. For example, persons covered under the Americans with Disabilities Act may require extended access. Enter the number of seconds.
is generated for tokens marked with extended access. Enter the number of seconds.
10. Configure these door attributes as required:
•Anti-passback settings
• PIN attributes
•Strike Mode
• Access times
• Card format settings
Other fields on this screen, such as the ‘Simple Macros’ section, represent advanced functions and should be consulted in the Access Control Manager Online Help.
11. Click to save these values.
26
Loading...
+ 89 hidden pages