Our Commitment to service is continually demonstrated through our Training Programs and Technical Support
Department. DSX stands behind its products and customers and constantly strives for excellence.
Our technical staff consists of engineers with field installation and service experience that are always ready to
answer any question. By providing a staff with years of security experience, DSX is able to offer valuable
insight into the complex issues that face the security contractor installing DSX equipment. DSX commitment to
service is unmatched in the security industry.
Information contained in this document was known to be true at the time of printing. This information is subject
to change at any time without notice. This document is a Team effort by the Technical Support Group at DSX.
Intent of this User Guide is to assist the actual user of the system in their daily operations. This Guide is a
supplement to the extensive Help system integrated into the software. Help is available by pressing F1.
DSX is a registered trademark of DSX Access Systems Inc; WinDSX is a trademark of DSX Access Systems
Inc.
The use of or reference to the term's Eltron, Fargo, Nisca, Pentium, Penware, Windows and Windows NT may
or may not be the registered trademarks of the respective companies.
Compliance
You must consult your local fire codes before installing any locking device on doors, gates, or barriers. A
construction and fire approval permit may be required before installing any equipment. Call your local Fire
Marshall for building code requirements in your area.
For UL installations, you must install the DSX System according to the UL Installation Manual and in
accordance with the National Electric Code, ANSI / NFPA 70 regulations and recommendations for US
Installations. Canadian installations must be in accordance with the Canadian Electric Code C22.1.
The DSX-1022, DSX-1040CDM, DSX-1040PDM, DSX-1042, DSX-1043, DSX-1044, DSX-CKI-C, DSXCKI-K, DSX-DP485 and DSX-FRB8 have been tested and found to conform to the requirements of UL 294.
The DSX-1022, DSX-1040CDM, DSX-1040PDM, DSX-1042, DSX-1043, DSX-1044, DSX-1040-PE-B, DSXMCI, DSX-LAN, DSX-SPS and DSX-2PC have been tested and found to conform to the requirements of UL
1076.
Camera and DVR integration was not tested by UL.
DSX Access Systems, Inc.
10731 Rockwall Road
Dallas, Texas 75238
888-419-8353 Sales, Shipping and Accounting
800-346-5288 Technical Support
214-553-6147 FAX
www.dsxinc.com
The Database program is the very core of the system. It is where the system is defined and
configured. Database manages all of the system data and provides the user with an easy but
dynamic graphical user interface. The database program not only houses the data entry
mechanism but also contains all system management utilities including Photo ID Badging.
Workstation
The Workstation program is the actual user interface for all communications and controller
interaction in the system. There are four interactive windows within the workstation program.
These four windows are all sizeable with scroll bars to allow customizing of the desktop for
ease of use. The four Windows are Alarm, Event, Selection, and Control.
Page 2
Page 92
Comm Server
The Comm Server program is a multi-tasking, communication application that runs as a
Process or Service and is located on the PC that has the physical and/or virtual connection to
the DSX Controllers. The Comm Server has no user interface, it simply communicates with
the DSX Controllers, downloading new data, uploading panel history, and logging all
transactions to the hard disk. The Workstation program interrogates the Comm Server
program through the network using the Comm Servers TCP/IP address. The Comm Server
Program responds to the Workstation requests and routes all alarm, input/output control and
system events to the Workstation Program.
Comm Server is started and closed
by the Workstation program
Press F1 for Help Help can be received by pressing the F1 key from any Menu and
Data-Entry Screen in the DataBase program and from any location in the Workstation Program.
DataBase
2
Login
Double Click on the
DataBase ICON to
start the program.
The Login Screen below is displayed when the program
is started. Enter your User Name and Password. The
Default User Name is master, the default Password is
master both entered in all lower case.
ToolBar & Menus
3
File
–
Double Click on System
Double Click on Locations
Copy
Delete
User Name
Menu Window
List Window
Operator Log Off
System Date and Time
Add
Who Is In Report
Change Operator Password – Used to change password.
Enable Multiple Selections – For multiple card holder selections to be used
with the Activate/De-activate buttons and Bulk Modify Access Levels.
Bulk Modify Access Levels – Used to make group access level changes.
Exit – Exits the Program.
Select File to access the following:
– Click
here to Log Off and Return
to the Login Screen.
–
Click here
to add new
record.
– Click here after selecting a
data record that you wish to copy.
– Click here after selecting a
data record you wish to delete.
receive a detailed report as to who
is in the facility and where they
last used their card. Card Holders
are listed by IN reader. Each list
shows a total number IN location
wide and a subtotal of those IN at
that reader.
The Who is In Report can be
configured to run from an Input
Alarm. For more Information
press “F1” for Help.
DataBase
– Click here to
expand the menu to display all
locations defined in the system
expand the menu to display
Passwords, Reports, and Setup.
to
to
The
.
Logged onto the System is
displayed here.
of the Operator
DataBase
4
Add button
Operator Passwords
and Configuration,
Page 6
DataBase and
History Backup
Utilities, Page 23
Card Holder
Management,
Page 34
Location History
Report Generator,
Page 81
Menus Map
Double Click on: System,
Reports, Setup, and
Locations to expand their
menus.
Click on the Menu Item,
then click on the Add
button in the Toolbar at
the top.
Access Level – Page 53
Time Zone – Page 60
Company – Page 63
Holiday – Page 64
UDFs – Page 65
Guard Tour – Page 68
Badge Temp – Page 75
Keys / Skills – Page 80
Operator Comments
5
Operator Comments
Operator Comment
Edit
Name
comments can be made and stored in history for future retrieval. The comments can be in response to
an alarm or restoral or any other incident. Predefined statements or comments can be described here
and later used by the operator. Free format comments can also be used instead of or in conjunction
with the predefined comments. Predefined Operator Comments can be used for consistent recording
of a common or recurring situation.
Click on
Menu then on Add.
are notes or text that can be recorded by the operator at any time. These
in the
Double Click here to
existing Operator Comment.
an
DataBase
1. Enter the
2. Enter the Comment to be displayed and recorded.
3. Enter the Display Order, which determines its order in the comment pick list.
of the Comment as it will be referred to and selected by.
DataBase
6
Operator Passwords
Operator Name
Operator Password
Operator Password
is the mechanism that secures the system from unauthorized use. The
Operator Passwords are unique to each operator providing the operators the same use of the
system regardless of which workstation they are at. Each operator has a Password Profile that
determines what privileges the operator has in the software. Each operator can have their own
Password Profile or multiple operators can share a profile. The Operator must enter their
Password when starting the system and must log off when leaving the workstation.
This method of password protection allows the manager to add the operator into the system and
assign them the appropriate password profile, and an initial password. The operator is given their
login name and password profile at which time they can change their password to one they only
know. Once this is done the manager can go back and modify the login name and profile without
viewing or changing the password.
Double Click here to Edit an Operator.
Click on
the Menu and then on Add.
in
1. Enter the
2. Enter up a minimum of 6 and up to 10
alphanumeric characters for a Password. The
user name and password must be entered in all
upper case letters for them to be case sensitive.
3. Enter the same password again in the Confirm
Password field.
4. Select a Password Profile from the drop down
selection box.
5. Enter Notes about this Operator if applicable.
Note /// When using AD Authentication, Enter the
Operator Name and select the PassWord Profile
without clicking on the password fields.
.
Password Profiles
7
Click on the checkbox
to the
operator to manage visitors.
Password Profiles
Password Profiles
Password Profile
Menu and then on
Add.
Edit
a Profile
- Double Click on the selected
Profile
is valid for. Custom profiles can be created for each Operator or can be shared by more
then one Operator.
Click on
are the describing elements of where a password is valid and what it
DataBase
in the
New
have rights to nothing by default, indicated by no checkmarks in
the column of selection boxes below. By clicking in the box you place a checkmark and
provide full rights to that selection. By clicking on the checkmark you take it away which
takes you to the selection menus and break down for that listing.
left of each description to
view the breakdown of, and
restrict privileges in, each
category.
View the following pages
for a breakdown of all 6
categories.
Select Visitors only if this
profile should only allow the
DataBase
8
Location List
Select All
Profiles – All Locations
Use the
profile will be valid for. Select the Locations this Password should work at.
Select a Location and press the Space Bar or Double Right Click to
include or exclude a location.
below to determine which locations this password
Click on one of the
selections to the left to view
All Locations or to only
view the Locations selected
for this profile.
Click on the
checkbox to automatically
select all locations.
Click on the Clear All Selections button to
deselect all locations.
Profiles – All Menus
9
All Menus
File, Edit
Click on View, Add, Edit, and/or
Reports
Profile will be valid, are selected. Items selected here are accessible to a
password with this profile. This answers the question of what functions this
Password is allowed to perform. Select the items from the list corresponding
to what this profile should be valid for and have access to.
is where menu items and functions, for which this Password
DataBase
Click on one of these to
Select All or Clear All
Selections.
Double Click on:
and System to expand their
menus.
Select a Menu Item then
Delete to provide the respective privileges for the menu
selection.
Double Right Click on the Menu Item to provide full rights.
Double Click on
expand the menu to display all
of the system reports available.
Select all reports this profile
should have access to.
to
DataBase
10
Set Card Status
Add
allows
controlled.
Menu Items
View, Add, Edit,
Profiles – All Menus
Double Click to expand the
Locations Menu. Select
the appropriate Locations
followed by Workstation,
DataBase, and Cardholder
Menus and set the level of
access for each item.
Under
the operator to Activate Cards, and selecting
Delete allows the operator to Deactivate Cards.
These two functions can now be separately
– selecting
Select the
assign the
and/or Delete privileges by
checking the appropriate
box to the right and then
Click OK at the bottom.
Double Right Click on the
Menu Item to provide full
rights.
and
I/O, Device, & Camera Control
11
Input, Output, and Device
Overrides and
Double Click on the Location
Device, Input, Output and/or
Camera
Cameras
– Live / Recorded
Camera Control are assigned to a profile here. Select the devices, inputs,
outputs, and cameras an operator with this profile will be allowed to
manipulate and have manual control over. Select the point then select one or
all of the override commands in the lower right corner. These overrides also
apply to Scheduled Overrides.
Double Click on each Device to expand the menu to display all of the inputs
and outputs associated with that device.
Double Click on Cameras to expand the menu to display all of the cameras.
(card readers and/or keypads)
to expand the menu and display all devices.
Click on one of these to
Select All or Clear All
Selections.
DataBase
A right double click on the title item will
select/de-select all items below it.
Select the
click on the Override(s) appropriate for the point and the profile.
Devices – Disable / Time Zone
Inputs – Arm / Bypass / Time Zone
Outputs – Secure / Open / Time Zone / Grant Access
above and then
DataBase
12
Companies
Double click on the Location or Location Group
Selections.
All Companies
are the different organizations, businesses, departments, or other
groups of card holders. By Selecting a Company here, the operator with this
profile will only have access to the card holder data for that company as well
as the history that pertains to that company.
below to expand the
menu to display all of the Companies defined for the location or locations.
Click on one of these to
Select All or Clear All
Select the company you wish to give this operator access to and
then click here on Show Card Holders. This gives the operator
access to all company data such as the card holders assigned to the
company and their associated history.
All Card Fields
13
Card Data Fields
Selections.
Select the
to be able to view and/or edit in the DataBase program under Card Holder /
Cards.
Double click on the Location or Location Group and then click on Cards
to expand the menu to display the list of card data fields.
Select the Card Fields from the list above then click on View Data and/or
Edit Data to determine which of these fields a user with this password
profile will be allowed to view and edit.
you wish an operator with this password profile
DataBase
Click on one of these to
Select All or Clear All
DataBase
14
Devices
Double click on the Location or Location Group
Selections.
Select a Device then click on Display in Access Level
Access Level All Devices
Select the
profile will be able to view and assign when creating and issuing access
levels to Card Holders.
and view the list of all Card Readers/Keypads in the system.
be displayed in the list of devices to choose from when an Operator with
this Profile is creating an Access Level.
(Card Reader/Keypad Locations) the operator with this
to expand the menu
for that device to
Click on one of these to
Select All or Clear All
15
Reports
Card Holder Repo
rt
2. Select the Report desired
then click on the Add Button.
1. Double Clicking on
reports expands the
Reports selection menu.
The
can be accessed by clicking
on Card Holder Report in
the menu and then clicking
on the Add Button. Page 17
viewed and printed. Card Holders can be searched, sorted, viewed and
printed. All reports except Keys, Who is In, History, and Time &
Attendance are exclusively run from this menu.
Reports
is the location that all system programming can be selected,
DataBase
Press F1 for Help
anywhere in the DataBase
and Workstation programs.
DataBase
16
Location Reports
List All Locations
Printer
Number of Copies
Print Preview
View Screen as
Location
Reports / Example
include all location information such as which
features are enabled, address information and phone numbers.
Use this example for all reports except Card Holder.
Select the
report if there is more than one
Location.
Select
all locations in the database.
Select
Windows Default Printer.
Click here to incorporate custom
Notes in the report if desired.
desired in the
to show
if different than the
Set the
for the printing of this Report.
required
Click here to
screen prior to printing. The Report can be
exported to file from the Prewell as printed to the selected printer.
the report on
Reports / Card Holder
17
Card Holder Report
or
Location
The
this screen to select the Card Data to be included in the Report and whether or not it should be in the
condensed or full format. Each Tab represents different reports available such as List by Reader
Access or List by Access Level. These Tabs represent separate reports and do not interact.
3. After selecting a Location, Click
here for a report which contains Card
Holders that have access to a specific Reader/Keypad that are listed here.
2. Select the
this Card Holder Report
should be pulled from.
can include all card holder information as well as all code / card data. Use
3. After selecting a Location, Click
here for a report which contains Card
Holders that have a particular Access Level or Linking Level listed here.
4. Answer the column of
questions to the left using
the following page.
that
5. Before using the
Print Roster Option,
be sure the correct
Template has been
defined. See page 74.
DataBase
1. The Full Format contains all Card Holder data and prints approximately 5 Card
Holders per page. The Condensed Format prints the most common data and can print
approximately 53 Card Holders per page. The condensed format consists of Code,
Imprinted Card Number, Access Level, Output Linking Level, and Company.
For additional report
information access the Help
Screen by pressing F1.
DataBase
18
Print Car
d Data
-
Include All Card Holders
Reports / Card Holder
5.
including the state in any or all of the 4 Anti-Passback Zones, then click on Print.
and the subsequent configuration questions and optionally
Click here, remove the
checkmark and jump to the
Card Holder Search Engine to
select the card holders to be in
the report. See next page.
Separate Report for each
Company - The Card Holder
Report can be sorted by
Company or printed without
regard to the company
identifier. For a report that is
sorted by company select this
option. If selected, Card Holders
will be listed by name or code
but separated by company.
Select any or all of the additional data
to be included in the report.
Print Phone Number
Print User Defined Data
Print Notes
Print Keys
Sort the Card Holder Report in one of
the three ways listed by clicking on
one of the three radial buttons.
List by Name
List by Card Number
List by Imprinted Card Number
List by UDF
6. Click on OK and proceed
to page 22.
When selected this
option includes Card data such as name,
code, access levels, number of uses,
activate and de-activate dates, visitor and
trace options. Click on this field one time
to select or deselect this option. A check
mark indicates the report will include the
data. Data included also depends on the
condensed format selection.
Include Where Passback Status is:
Select one or all of the four anti-passback
zones and set the status selection to In /
Out or Either.
This will further set the search criteria to
only find those card holders who currently
hold “In”, “Out”, or “Either” status in one
or all of the four zones.
Select Names List Criteria
19
Search Names Tab
The
shown below allows for card holders to be searched and
reported based on their First and/or Last Name, Company, Visitor and Trace status.
The Search UDF Tab allows for Card Holders to be searched by the custom User
Defined Field information.
The Search Cards Tab allows for the Card Holders to be Searched by any of the Card
data such as the encoded card number, the imprinted card number, the number of days
since the card had been used or pending start and stop dates.
The Search Skills Tab allows for the Card Holders to be Searched by any of the Skills
or Trades assigned to the Card Holders.
How to Use Card Holder Search
Any or all of the data fields on any of the Search Tabs can be used to search for Card
Holders. Enter complete or partial search criteria in any or all of the data fields on each
Search Tab and click on OK. The selections form an AND statement and can be used to
form very precise Card Holder Lists. The Card Holder must meet all of the criteria
entered in all search fields on all 3 Tabs in order to be shown in the Card Holder List
shown.
DataBase
Enter the specifying criteria for
the search on any or all-4 Search
Tabs and click on OK.
Search Include Where Company is:
Select one or more Companies from the list. To select more
than 1 company press and hold the Ctrl-Key while clicking on
each one desired. The selection “Any Company” instructs the
system that the company identifier is ignored and the search
will be based on name without regard to the card holder’s
company assignment.
DataBase
20
Search UDF Tab
If you are entering an
Email Address for Alar
Select UDFs List Criteria
The
searched by the custom User Defined Field information.
Any or all of the data fields on any of the Search Tabs can be used to search
for Card Holders. Enter complete or partial search criteria in any or all of the
data fields on each Search Tab and click on OK. The selections form an
AND statement and can be used to form very precise Card Holder Lists. The
Card Holder must meet all of the criteria entered in all search fields on all 3
Tabs in order to be shown in the Card Holder List shown.
allows for Card Holders to be
Email Notification be s
Page 81
Enter the specifying
criteria for the search
on any or all-4 Search
Tabs and click on
OK.
Select Card # List Criteria
21
Imprinted Card Number
Number of days
Card Holder search is complete
Search Cards
Tab
The
allows for the Card Holders to be Searched by any of the Card data
such as the encoded card number, the imprinted card number, the number of days since the
card had been used, or a pending start and stop date.
Enter the internal working or
Encoded Number of the card.
Enter the
that is found printed on the card.
Specify the
the card
would not have been used since.
DataBase
Include where Start and Stop
Date is Between. Use the drop
down calendar selection box to
set a range of dates to find
cardholders that have a Start
and/or Stop date within that
range. This search can be useful
to find Card Holders whose cards
have been set to turn on or off on
a certain date.
Specify if the code(s) to be
searched for must have the
Guard Tour feature enabled -
True, False, or Either.
Once the
to the location in the software that you requested the Card Holder Search from.
This could be Card Holder Reports, History, DataBase/Card Holder.
Include where status is:
Set the status of the Card Holder you
wish to include in the Search. Click on
Active, Inactive, or Either to set the
search status appropriately. Active are
those cards that are operational in the
system. Inactive is those cards that have
been turned off and no longer functional.
Select Either if the active status should
have no bearing on the search.
click on OK and you are returned
DataBase
22
Title for the
Print Pre
-
View
Report is printed
Report can be
or
binoculars at the top of the report.
Reports / Card Holder
Print PreView & Export
7. Enter a
Card Holder Report and
click on OK.
The
screen appears and
provides the ability to
change the print size for
larger and smaller
viewing.
8. The
exported to a File by
clicking on the Envelope
ICON and selecting the
file format of choice.
Use the RTF format to
best maintain the page
formatting.
8. The
by clicking on the
Printer ICON that in turn
sends the report to the
default or selected
Windows Printer.
To search for an item within the report click on the search
Loading...
+ 86 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.