Napco CARD ACCESS 3000 SPECIFICATION

ARCHITECTURAL AND ENGINEERING SPECIFICATION, v 2.7
1
CardAccess®"3000
Version 2.7
Continental Access
A Division of the Napco Security Group
355 Bayview Avenue Amityville, New York 11701 Phone (631) 842-9400 Fax (631) 842-9135
www.continentalaccess.net
ARCHITECTURAL AND ENGINEERING SPECIFICATION, v 2.7
2
PREFACE
The Continental Access CardAccess 3000 Architectural & Engineering Specification is designed to
serve as a guide for specifying a Continental Access state of the art integrated Access control, alarm, security, video management system. This document is available free of charge in both printed
form and electronic media.
CardAccess 3000
CardAccess 3000 will be a full-featured enterprise class access control solution, providing a
scalable solution from stand-alone entry level through networked world class enterprise systems. This multi-tiered systems approach will provide for modular expansion and growth as required, and is designed to provide cost-effective system with expansion and functional enhancements.
Key Features
A seamless integrated interface for Access Control, Alarm Monitoring, DVR/NVR Interface, Visitor Management Control, Time and Attendance/Payroll Functions, Photo Badging, Import/Export Utilities, Email/SMS Notification, Threat Level Management, Napco Security/Fire Interface and Open API support.
26 to 200 bit card formats plus FIPS 201-1 and NIST 800-116 compliancy.
Secure MSDE/MSSQL technology and open database information sharing with CA
ExchangeDB Import and Export features.
Scalable, flexible architecture of robust enterprise-class software provides an easy to use and easy to install solution for any size facility with unsurpassed down load speeds.
Interoperability for all the functions required in today's increasingly stringent security environment in one easy-to-use graphical workstation interface.
More Information
Continental Access reserves the right to modify these specifications at any time. Changes and updates to this document will be made available as they are released. For the latest release of this document, check the Continental Access web site www.continentalaccess.net, or call Continental Access at (631) 842-9400 to talk to a sales representative for information on the latest release. Technical Assistance on preparing specific project applications is available by calling (631) 842-9400.
ARCHITECTURAL AND ENGINEERING SPECIFICATION, v 2.7
3
CONTENTS
1. GENERAL
1.1. SUMMARY
1.2. SYSTEM REQUIREMENTS
1.3. FUNCTIONS
1.4. CARDACCESS HOST PC/SERVER COMPUTER
1.5. CARDACCESS WORKSTATION
1.6. SECURITY KEY
1.7. DATABASE PARTITIONING
1.8. ACCESS CONTROL PANEL
1.9. ALTERNATES
1.10. DEALERS
1.11. CONTRACTOR
1.12. DEFINITIONS
1.13. MERITS AND FUTURE GROWTH
1.14. SUBMITTALS
1.15. QUALITY ASSURANCE
1.16. WARRANTY
2. PRODUCT
2.1. PC REQIREMENTS
2.2. SYSTEM DESCRIPTION
2.3. SYSTEM SPECIFICATIONS
2.4. SOFTWARE CAPACITIES
2.5. SYSTEM SECURITY
2.6. SOFTWARE SPECIFICATIONS
2.7. SYSTEM SOFTWARE FEATURES
3. EXECUTION
3.1. SECURITY MANAGEMENT SYSTEM – INSTALLATIONS
3.2. TRAINING
3.3. TESTING
3.4. WARRANTY, MAINTENANCE, AND SERVICE
ARCHITECTURAL AND ENGINEERING SPECIFICATION, v 2.7
4
1.1. SUMMARY
Section Includes:
A general description, functional requirements, characteristics, and criteria present in the CardAccess 3000 Access Control, Alarm Monitoring & Video Surveillance System. The specification provides all necessary information to produce a complete proposal for a sophisticated, easy to-use, multi-tasking, multi-user Access Control System (ACS) with features that include, but are not limited to, Alarm Monitoring, Photo-ID Badging Management, Visitor Management, CCTV Integrated Management, DVR Integration and NAPCO Alarm panel Integration. Continental Access manufactures CardAccess 3000 (Version 2.x) Security & Management Software which includes all Computer Hardware and Software, Intelligent Control Panels, Communication Devices, Card Readers/Keypads, Access Cards, Key Tags, Key Fobs, I/O Boards & Power Supplies as specified herein. All material will be listed in Continental Access’ catalogs.
1.2. SYSTEM REQUIREMENTS
A. Acceptable Manufacturers: Shall Be, (with no alternatives)
a. Continental Access, LLC b. Napco Security Group c. Salient d. CA View e. Que Accounting f. StopWare g. Fargo h. Episoft i. Code Bench
B. Computer Hardware: For optimal performance, CardAccess 3000 software shall operate
on a high-quality IBM compatible Intel processor PC as specified in Article 2.01 under Part-2.
C. Controller Hardware: Shall be manufactured by a manufacturer of Access Control
equipment for not less than 25 years
D. Operating System: The PC operating system shall be required to be Microsoft
Windows®"2000 Pro, Server, Advanced Server, XP Professional, Win2003 or Vista certified by the manufacturer.
1.3. FUNCTIONS
A. Card Access shall perform a wide variety of features-rich functions. These functions are
categorized into ‘system modules’, (integration of products), which include, but are not limited to:
1. Access Control Management
ARCHITECTURAL AND ENGINEERING SPECIFICATION, v 2.7
5
2. Alarm monitoring Management
3. Burglar Alarms Panel Integration
4. Photo Imaging/Badging Management
5. CCTV and Digital/Network Video Recorder (DVR/NVR) Integration
6. Full Audit Trail Management report
7. Muster Reporting
8. Personnel Tracking Management Report
9. Visitor Management
10. Advanced Scripting (linking) Interface
11. Building Lock Down
12. Vehicle Tracking & Reporting
13. Graphical Dynamic Maps: Import & Viewing & Executable
14. Automated Data Import and Data Export
15. Full Time & Attendance
B. Controller Hardware shall be of a distributed architecture nature so that in the event of a
server failure the local controller will make all decision utilizing both the Facility code and the unique ID and be capable of:
1. 2 to 16 card readers per panel
2. 1,000,000 card holders per panel
3. Card formats ranging from 26 bit to 256 bits
4. Processing data at 52 MIBS, (million instructions per second)
5. Down load speeds to the controller not to exceed 6 minutes for 100,000 card records utilizing the 200 bit format
6. IPV IV and IPV VI Ethernet communications
7. Support AES 128/256 encryption
8. Time zone offsets
9. Reporting alarms to a central monitoring station via Ethernet without the assistance of an integrated alarm panel
10. Changing addresses of inputs and outputs for door control
11. Global I/O functions
12. Communications of Ethernet TCP/IP, RS 232, RS 422 or a combination thereof
1.4. ACS HOST PC/SERVER COMPUTER
A. This Host PC shall contain the ACS software GUI, Data Server, SQL database and the
Host communications software module. The SQL database shall be able to be located on a remote server, for improved performance. The communications software module shall be able to be located on a remote server/s, for improved performance.
B. The Host communications software shall be required to be fully compliant with Microsoft
Windows ®"2000 Pro, Server, Advanced Server, XP Professional, Win2003 or Vista systems and operate as a true 32-bit system.
C. The Host PC shall communicate with the Access Control Panels using Communication
protocols such as TCP/IP, RS-422 and RS-232.
D. The ACS shall be able to support both a Database server and a Communication server
either as one computer or multiple computers.
ARCHITECTURAL AND ENGINEERING SPECIFICATION, v 2.7
6
E. The Card Access shall be capable of supporting a Primary server and a Secondary
server for disaster recovery systems and shall not be limited by distance from Primary to Secondary.
1.5. ACS WORKSTATION
A. The ACS workstation PC shall contain the software, the GUI, and integration executables
only.
B. The ACS workstation shall have the ability to enroll card data automatically
1.6. SECURITY KEY
A. Security key will be required on all Host communication server PCs in order for the
system to operate. Lack of security key on the Host PC will cause the communication software and the GUI to shutdown. The user will be notified of the missing security key by means of a popup message.
B. The Security key shall be available as either a hardware or software key.
C. Security key will not be required at workstations.
D. The Security key will determine both hardware and software limitations.
1. Hardware License Limitations: The key will determine the number of workstations that will be able to connect to the system simultaneously.
2. Software License Limitations: The key will determine the additional software features that a user can activate. The features will include:
i. Max # of Secondary Communication Servers ii. Max # of CCTV DVR/NVR Servers iii. Time & Attendance iv. Visitor Management Integration workstations v. Max # of Scripting servers & Script editing capability vi. Max # of Napco Integration Servers vii. API Interface
1.7. DATABASE PARTITIONING
A. ACS shall support MSDE/MSSQL database, and shall allow virtually unlimited database
partitioning.
B. Database Partitioning shall support the ability to assign the following to individual
partitions:
1. Card holders
2. Controllers
ARCHITECTURAL AND ENGINEERING SPECIFICATION, v 2.7
7
3. Workstations
4. Card Readers
5. I/O points
6. Alarm Panels
7. Access Levels
8. Time Zones
9. Communications Servers
10. Dynamic Maps
11. System Operators
1.8. ACCESS CONTROL PANELS
A. The Access Control System (ACS) panels shall support, through firmware updates, full
system integration, providing full system integration to standard burglary Alarm Panels with 32, 96, and 255 Zone Control. This shall allow reporting to Police, Fire Department, and to the ACS.
B. The following latest panels shall be available:
1. Two 2 Door Intelligent Reader Control Panel
2. Four Door Intelligent Reader Control Panel
3. Eight Door Intelligent Reader Control Panel
4. Expansion Modules:
i. The ACS panels shall provide for full Supervised Alarm Input Expansion
Modules (16 Supervised Alarm Inputs).
ii. The ACS panels shall support Relay Control Expansion Module (16 Form
C Relay Outputs, and 8 Non-Supervised Inputs).
iii. The ACS I/O Board shall support up to 3 expansion boards, each
provides 16 Supervised Inputs and 16 Relay Outputs, for a total of 48 each.
C. Additional Devices:
The ACS Access Panels shall support the following Add-On devices:
1. Personnel Identification Devices, including, but not limited to:
i. Prox-Cards
ii. Smart-Cards,
iii. Key Fobs,
iv. CHUID card
v. CAC card
vi. TWIC
vii. FIPS 201-1 card
viii. Barcode
ARCHITECTURAL AND ENGINEERING SPECIFICATION, v 2.7
8
ix. Mag-Stripe Cards
x. Access Authorization Devices, including, but not limited to:
a. Keypads, b. Prox-Readers, c. Smart-Card-Readers and d. Biometric Identification devices
1.9. ALTERNATES
A. Only the manufacturer’s equipment that is explicitly mentioned in this specification are
supplied. Substitutes are not allowed.
B. Equivalence: No item shall be substituted without the prior written and approved
documentation that assures that the substituted part/parts are exactly the same, technically and aesthetically speaking. The substituted parts must provide the same or significantly improved performance.
1.10. DEALERS
A. All bidders must be a Certified Access Control Integrator by the manufacturer.
B. All technicians and engineers involved in the project must be trained and certified on the
ACS software and associated interfaces by the manufacturer prior to the bid.
C. All bidders must have 5 years installation experience on the ACS product lines.
D. The Integrators of the ACS products shall have been in the Access Control business for a
minimum of 15 years, and have supplied access control systems/components of similar configuration, size and complexity.
E. All bidders must maintain a technical support group for providing round the clock
technical assistance.
1.11. CONTRACTOR
A. The contractor of the access control system will meet the following requirements:
1. He will have had a minimum of 5 years of experience in installing, commissioning and supporting access control systems of similar size, configuration and complexity.
2. He will have at least two technical staff members who have been trained and certified by the manufacturer to install and support this system.
3. He will maintain an adequate supply of replacement parts for all system components installed, as recommended by manufacturer.
B. The installing contractor shall be responsible for the following:
1. Determining operational requirements and planning/designing the system.
ARCHITECTURAL AND ENGINEERING SPECIFICATION, v 2.7
9
2. Installing and integrating Access Control, Alarm Monitoring, Alarm Systems, DVR/NVR, Time and Attendance, Visitor Management interfaces and related security and door hardware.
3. Configuring local access panels and ACS host communications.
4. Installing proper communication connections between the host system, access panels, and the related hardware.
5. Testing the security management system communication and operation.
6. Training system operators.
1.12. DEFINITIONS
A. Entry/Exit points: Entry and Exit points are typically doors, turnstiles or portals, which
are controlled by having a reader at the point of entry or exit to which the badge holders presents their access cards.
B. Application Software: This is the software application that manages the entire system. It
consists of a user interface (GUI), database interface (CIC DataServer) and a communications module (Host COM).
C. Database: This is where all the system data is stored.
D. Archive Database: This is where all the system data is backed up.
E. Workstations: This is a PC running ACS software. Here, an operator can program and
monitor the security system operations.
F. Access Control Panels: These are the fully distributed hardware devices that store all
data necessary to control the badge/biometric readers and make the access grant/ access denied decisions, lock/unlock the doors and monitor the alarm points.
1.13. MERITS AND FUTURE GROWTH
A. The ACS shall be designed to grow as the project needs grow to virtually an unlimited
size and not be restricted by distance or continent.
B. The security system shall be simple and economical to support a single site, but is yet
powerful enough to manage a worldwide, multi-site network.
C. The Access Control System shall be designed with a scalable Client/Server System
Architecture.
D. The Access software package shall be fully integrated so that the software additions and
upgrades are simply layered in incremental modules. There should be no need to relocate or jeopardize your database and/or uninstall/reinstall the software.
E. The Access Control System shall be designed to support the manufacturer’s full line of
distributed processing based controllers, system & components including products which are supplied, installed and commissioned. Each of these products may be supplied in one or more units.
ARCHITECTURAL AND ENGINEERING SPECIFICATION, v 2.7
10
F. The system shall have true 32-bit multi-tasking and multi-user capability.
G. Independent activities and monitoring shall be able to occur simultaneously at different
locations.
H. The system must allow for Time Zone offsetting.
I. The Host system shall be user friendly with a minimum learning curve (1 day on
average). It shall employ Microsoft Windows ®"user interface characteristics such as pull down menus.
1.14. SUBMITTALS
A. Shop Drawings: Provide complete shop drawings which shall include the following:
1. Indicate all system device locations on architectural floor plans. No other system(s) shall be included on these plans.
2. Include full schematic wiring information on these drawings for all devices. Wiring information shall include conductor routing, quantities, and connection details at devices.
3. Include a complete access control system one-line, block diagram.
4. Include a statement of the system sequence of operation.
B. Product Data: Provide complete product data which shall include the following:
1. Manufacturer’s data for all material and equipment, including controllers, local processors, computer equipment, access cards and any other equipment provided as part of the ACS.
2. A system description, including analyses and calculations used in sizing equipment required by the ACS. Description to show how the equipment will operate as a system to meet the performance requirements of the ACS. The following information shall be supplied as a minimum:
i. Central processor configuration and memory size ii. Description of site equipment and its configuration iii. Protocol description iv. Hard disk system size and configuration v. Backup/archive system size and configuration vi. Start up operations vii. System expansion capability and method of implementation viii. System power requirements and UPS sizing
3. A description of the operating system and application software.
C. Functional Design Manual: The functional design manual shall identify the operational
requirements for the system and explain the theory of operation, design philosophy, and specific functions. A description of hardware and software functions, interfaces, and requirements shall be included for all system operating modes.
ARCHITECTURAL AND ENGINEERING SPECIFICATION, v 2.7
11
D. Hardware Manual: The manual shall describe all equipment furnished including:
1. General description and specifications
2. Installation and check out procedures
3. System layout drawings
4. Manufacturer’s repair parts list indicating sources of supply
E. Software Manual: The software manual shall describe the functions of all software and
shall include all other information necessary to enable proper loading, testing, and operation. The manual shall include:
1. Definition of terms and functions
2. Use of system and applications software
3. Initialization, start up, and shut down
4. Alarm reports
5. Reports generation
6. Data base format and data entry requirements
F. Operator’s Manual: The operator’s manual shall fully explain all procedures and
instructions for the operation of the system. The document shall be available on CD in electronic format and include:
1. Computers and peripherals
2. System start up and shut down procedures
3. Use of system, command, and applications software
4. Recovery and restart procedures
5. Graphic alarm presentation
6. Use of report generator and generation of reports
7. Data entry
8. Operator commands
9. Alarm messages and reprinting formats
10. System access requirements
G. Maintenance Manual: The maintenance manual shall include descriptions of
maintenance for all equipment including inspection, periodic preventive maintenance, fault diagnosis, and repair or replacement of defective components.
H. As Built Drawings: The Contractor shall maintain a separate set of drawings,
elementary diagrams, and wiring diagrams of the ACS to be used for record drawings. This set shall be accurately kept up to date by the Contractor with all changes and additions to the ACS. In addition to being complete and accurate, this set of drawings shall be kept neat and shall not be used for installation purposes.
1.15. QUALITY ASSURANCE
A. The manufacturers of all hardware and software components employed in ACS shall be
established vendors to the access control/security monitoring industry for no less than ten (10) years.
ARCHITECTURAL AND ENGINEERING SPECIFICATION, v 2.7
12
B. The subcontractor shall have been regularly engaged in the installation and maintenance
of integrated access control systems similar in size and scope to that is outlined herein for a period of no less than five (5) years.
C. The subcontractor shall supply manufacturer’s documentation attesting to the fact that
his/her firm is a competent factory trained service branch capable of maintaining the system with reasonable service time.
D. The subcontractor shall provide a minimum of three (3) references whose systems are of
similar complexity and have been installed and maintained by the subcontractor in the last five (5) years.
E. There shall be a local representative and factory authorized local service organization,
which will carry a complete stock of parts and provide maintenance for these systems. Local shall be defined as an area in a _____ mile radius of ___________ with a response time of ____ hours.
1.16. WARRANTY
A. The Access Control System shall be warranted for at least 12 months from the date of
system acceptance.
B. Extended warranty terms at reasonable rates shall be available from the installing dealer.
C. The system integrator shall be the focal point of all service issues or questions (with the
manufacturer's full support). The system integrator shall directly support software for the selected system product family.
D. Technical support from the manufacturer to the system integrator will not be reliant on a
software maintenance agreement between the system integrator, end user to the manufacturer.
ARCHITECTURAL AND ENGINEERING SPECIFICATION, v 2.7
13
2. PRODUCT
2.1. PC REQUIREMENTS
A. Server PC Requirements: Server PC requirements shall be as specified in the table
below:
Server (1-5 Workstations)
Server (6-20 Workstations)
Server (21-50 Workstations)
Processor
Pentium 4 2.8Ghz or higher
Intel Xeon 3.20Ghz (Dual Core
only)
Dual Intel Xeon 3.60Ghz
Ram
512MB
1.5 GB DDR2 SDRAM
2GB (4GB Recommended)
Hard Drive
80 GB (SCSI recommended)
160GB Serial ATA or SCSI
Raid 5 - 3 drives minimum
USB Ports 2 2
2
Serial Ports
1 expandable to 64
1 expandable to 128
1 expandable to 128
Parallel Ports
1 1 1
Mouse
2 Button PS2
2 Button PS2
2 Button PS2
Monitor
17" SVGA (1024x768)
17" Flat Panel
17" Flat Panel
CD/DVDROM
48x/16x
48x/16x
48x/16x
CDRW/DVDR
24x/8x
24x/8x
24x/8x
Sound
Optional
Optional
Optional
Network Card
100 Mb NIC Ethernet
10/100/1000 Mb NIC Ethernet
10/100/1000 Mb NIC Ethernet
Operating System
Microsoft Windows 2000
Professional, Server or
Advanced Server w/SP4; Win
XP Pro w/SP2, or Win 2003
Microsoft Windows 2000
Professional, Server or
Advanced Server w/SP4; Win
XP Pro w/SP2, or Win 2003
Microsoft Windows 2000
Professional, Server or Advanced
Server w/SP4; Win XP Pro w/SP2,
or Win 2003
Database
MSDE Standard or MSSQL
Server 2000 for higher
Performance
MS SQL Server 2000 Required
MS SQL Server 2000 Required
Tape Backup
Suggested – SCSI
Suggested - SCSI
Suggested - SCSI
2.2. SYSTEM DESCRIPTION
A. The Access Control System (ACS) shall be capable of managing the security operations
for a single site or for multiple sites. It shall consist of all the software and hardware necessary to provide access control and alarm monitoring for all controlled entry/exit points within a single facility or multiple facilities. The system shall provide full access grant or deny access authorization capabilities without the need for real-time communications with the control panels. The system will monitor alarm events and display them to the system operator for processing.
ARCHITECTURAL AND ENGINEERING SPECIFICATION, v 2.7
14
B. The system shall be designed such that entry/exit points may be added in one, two, four
or eight door increments.
C. The system shall provide full system integration to ACS, CCTV, third party DVR/NVR
Digital Video Management, Alarm panels, Time and Attendance, Visitor Management and Data Exchange services. The system shall allow reporting to Police, Fire Department, and to the ACS.
2.3. SYSTEM SPECIFICATIONS
A. High resolution graphics: The system shall support unlimited high resolution graphics
with Disk-Limited and user-programmable color dynamic graphic map display capable of showing floor plan, location of alarm device, and alarm instructions. The mapping software shall be able to run independent of the ACS software. The independent dynamic mapping software must utilize the same database as the ACS software. Floor plans shall be created in .JPG, .BMP, .emf, .wmf or .ico formats, and can be imported from other systems. All of the graphic maps will be displayed on the CPU monitor. Systems requiring separate display monitors or PC’s to display the floor plans will not be acceptable. The operators must be able to perform the falling functions without use of the ACS software:
1. Add and delete devices on the dynamic maps
2. Make custom icons as devices and add to the dynamic maps
3. Open up live video on the dynamic maps by right clicking and choosing live video
4. Unlock and lock doors from the dynamic maps
5. Turn on/off devices from the dynamic maps
6. Respond to alarms from the dynamic maps
7. Add and delete dynamic maps according to permissions by operator log on
8. Utilize a Log On that is identical as the Log On given by the system administrator for the ACS with all permissions that were assigned and all restriction that were assigned.
9. All events/action shall become part of the ACS transactional history database
B. Information Storage: All programmed information as well as transactional history will be
automatically stored onto a local or remote hard disk for later retrieval. The system will warn the operator when the database size approaches maximum capacity. The system shall be capable of using multiple ACS site databases as needed by the system users.
C. Information Archive/ Retrieval: The CPU shall be capable of transferring all
programmed data and transactional history to any removable media or logical disk drive. All programmed data can be restored from disk/CD, Tape Drive etc, in case of system hardware failure. As an option, the system shall be able to offer additional support by means of a redundant mirrored system backup retrieval, for virtually instantaneous switchover in an emergency. There shall be no distance limitation for the secondary server to the primary server.
D. Communication: The system shall be capable of supporting the following
communication types:
1. Serial Port type (RS232/RS422) connections
2. LAN/WAN (10/100/1000) Hard-wired & Wireless connections
ARCHITECTURAL AND ENGINEERING SPECIFICATION, v 2.7
15
3. Fiber Optics
4. TCP/IP IPV IV and IPV VI protocols
Note: A Host Server shall be able to employ any combination of the above communication types.
E. COM Port/Serial type (RS232/RS422) Connections:
1. The PC shall have a minimum of two serial ports.
2. The system (consisting of a Host and 7 Remote COM Servers) shall be able to support up to 2048 Com ports, each Com Server supporting 256 Ports. In case all of the 256 ports are to be used for serial communication, you need to employ Com Port expansion cards. Each expansion card will be able to provide expansion in increments of 32 Com Ports.
3. Each com port will be able to support hard wired direct connect or modem connections. An additional 256 ports per Host or Com Server can be used for modem specific ports, for up to 512 total ports.
4. Each COM port must be able to have password protection as an option.
a. The system operator will be able to enter a password for each COM port. b. When operating in this mode, the ACS door controllers will not accept
communications from any host PC, workstation or communications server that does not provide the correct password.
c. The system operator will be able to individually assign this password to
selected panels.
d. The COM port password will be encrypted both in the system database and
in the Access Control Panel.
F. LAN/WAN (10/100/1000) & Fiber Optics Communications:
1. The Host PC shall support LAN (local area connection).
2. The system (consisting of a Host and 7 Remote COM Servers) shall be able to support up to 2048 LAN ports, each Com Server supporting 256 LAN Ports.
3. Each port shall support typical Cat 5 LAN Connection or Fiber Optics LAN connections.
4. Each LAN port shall be able to have password protection.
5. The system operator will be able to enter a password for each LAN port.
6. When operating in this mode, the ACS door controllers will not accept communications from any host PC, workstation or communications server that does not provide the correct password.
7. The system operator will be able to individually assign this password to selected panels.
Loading...
+ 35 hidden pages