RISCO Group ProSYS 128 User Manual

Access Control
Module
User's Manual
For use with ProSYS 16, ProSYS 40,
Important Notice
This manual is delivered subject to the following conditions and restrictions:
x This manual contains proprietary information belonging to
RISCO Group. Such information is supplied solely for the purpose of assisting explicitly and properly authorized users of the system.
x No part of its contents may be used for any other purpose,
disclosed to any person or firm or reproduced by any means, electronic or mechanical, without the express prior written permission of RISCO Group.
x The text and graphics are for the purpose of illustration and
reference only. The specifications on which they are based are subject to change without notice.
x Information in this document is subject to change without
notice. Corporate and individual names and data used in examples herein are fictitious unless otherwise noted.
Copyright 2008 RISCO Group. All rights reserved.
2 Access Control User's Manual
Customer Information
RTTE COMPLIANCE STATEMENT Hereby, RISCO Group, declares that this equipment is in
compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC.
RADIO FREQUENCY INTERFERENCE (Ref.: FCC Part 15, Para.
15.105) This equipment has been tested and found to comply with the
limits for a Class B digital device pu rsuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or televi sion reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
1) Reorient or relocate the receiving antenna.
2) Increase the separation between the equipment and the
receiver.
3) Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
4) Consult the dealer or an experienced Radio/TV technician for help.
CHANGES OR MODIFICATIONS (Ref.: FCC Part 15, Para. 15.21 and
15.27)
Changes or modifications to this unit not expressly approved by RISCO Group, could void the user's authority to operate the equipment.
Access Control User's Manual 3
4 Access Control User's Manual
Table of Contents
CHAPTER 1: INTRODUCING THE ACCESS CONTROL
MODULE .........................................................................7
Access Control Terms and Definitions...........................8
Feature-Specific Limitations...........................................9
Access Control Workflow..............................................10
CHAPTER 2: USING THE ACCESS CONTROL MODULE 11
Entering/Exiting Doors...................................................11
Arming/Disarming the System .....................................11
Arming the System.............................................................12
Disarming the System ........................................................13
Duress Disarming ................................................................13
CHAPTER 3: PLANNING AND PREPARING THE ACCESS
CONTROL DATA...........................................................14
CHAPTER 4: PROGRAMMING THE ACCESS CONTROL
MODULE .......................................................................16
Accessing the Access Control Menu..........................17
Configuring Door and Reader Settings .......................17
Defining the Door Mode...................................................17
Defining the Reader Type.................................................19
Configuring Time Schedules.........................................20
Defining Time Windows .....................................................20
Defining Weekly Pro gr a ms................................................22
Configuring Access Groups .........................................24
Adding Users to the System..........................................25
When a Code Entry Fails...................................................25
Adding Arm/Disarm Users .................................................26
Adding Enter/Exit Users......................................................29
Access Control User's Manual 5
Configuring User Settings..............................................33
Assigning PIN (Personal Identification Number) Codes33
Assigning Users to Access Groups ...................................34
Deleting Users......................................................................35
Opening Doors...............................................................36
APPENDIX A: WHY YOUR SYSTEM DOES NOT ARM....37
APPENDIX B: PLANNING AND PREPARATION TABLES38
Table 1: Doors ................................................................38
Table 2: Readers............................................................39
Table 3: Time Windows..................................................40
Table 4: Weekly Programs............................................41
Table 5: Access Groups................................................42
Table 6: User Settings.....................................................43
6 Access Control User's Manual
Chapter 1: Introducing the Access Control Module
The Access Control module, which is integrated with your security system, is designed for use in small- to medium-size companies. This module is used wherever there is a need to control which users should have access to the different doors and areas on the premises. The doors can be equipped with devices such as readers, door contacts, door relays, and motion detectors.
The Access Control module enables you to define and control the access level and time definitions of the users in your security system, as well as determine the functions that each user can perform.
The Access Control module provides flexibility by enabling you to connect up to eig h t Ac cess Control mo d u le s to y o ur security system. In addition, each module supports two readers, enabling the security system to control up to 16 doors.
This manual explains the Access Control module programming options using the installed LCD keypad, as well as the data preparation process. Alternatively, the Access Control modul e can also be programmed using the Upload/Download application (refer to the Upload/Download User's Manual for further details).
Access Control User's Manual 7
Access Control Terms and Definitions
The following is a list of terms and definitions that relate to the Access Control module:
x Arm/Disarm Users: Users assigned access rights that enable
them to arm and disarm the system. There can be up to 99 arm/disarm users in the system. It is recommended to assign the same PIN code in the Access Control module as the one assigned to the user in the security system.
x Enter/Exit Users: Users assigned access rights that enable
them to only open and close doors; not arm/disarm the system. There can be up to 999 enter/exit users in the system.
x Time Scheduling: Defining specific time windows that
determine when users can access the system.
x Access Group: A group of users that can access the system
only through specific doors during specific time periods. There can be up to 16 access groups configured in the system.
x Card Code: An 8-digit code on an access card that is
entered into the system in order to assign access rights to a user.
x PIN Code (Personal Identification Number): A 4-digit code
that is assigned to a user in order to enable a user to access the system using an installed keypad. The PIN code can be used instead of a card or in addition to a card.
x RTE (Request to Exit): A push button or automa tic motion
detector that, when activated, opens a specific door by sending a signal to the door's relay.
x Reader: The Access Control module supports four reader
types: Card only, keypad only, card + keypad, and card/keypad.
x Partition: A subsystem within the security system that can be
controlled as a separate system.
x Event Log: Each Access Control module supports up to 1,000
events. The events can be printed from a local printer or uploaded from the Upload/Download application, according to specified criteria.
8 Access Control User's Manual
Feature-Specific Limitations
Feature ProSYS 16 ProSYS 40 ProSYS 128
The following table contains the feature-specific limitations of the system, depending on the installed ProSYS model.
NOTE:
The information and examples in this manual are written from the viewpoint of the ProSYS 128 model. If you have the ProSYS 16 or the ProSYS 40 model installed, then the feature-specific limitations in the table below are relevant.
Access Control
2 4 8
Modules Readers 4 8 16 Partitions 4 4 8 Arm/Disarm Users 00-29 00-59 00-98 Enter/Exit Users 100-349 100-999 100-999 Time Windows 15 25 25 Weekly Programs 10 25 25 Access Groups 8 16 16 Total No. of Inputs 8 16 32 Total No. of Relays 6 12 24
Access Control User's Manual 9
Access Control Workflow
The following workflow illustrates the recommended method for working with the Access Control module:
Plan and Prepare the
Plan and Prepare the
Access Control Da ta
Access Control Da ta
(Chapter 3)
(Chapter 3)
Create a
Create a
Doors Table
Doors Table
Create a
Create a
Readers Table
Readers Table
Create a Time
Create a Time
Windows Table
Windows Table
Create a Weekly
Create a Weekly
Programs Table
Programs Table
Create an Access
Create an Access
Groups Table
Groups Table
Program the Access
Program the Access
Control Module
Control Module
(Chapter 4)
(Chapter 4)
Access the Access
Access the Access
Control Menu
Control Menu
Configure Door
Configure Door
and Reader
and Reader
Sett ings
Sett ings
Configure Time
Configure Time
S che dules
S che dules
Configure
Configure
Access Groups
Access Groups
Add Users to
Add Users to
the System
the System
Create a User
Create a User Settings Table
Settings Table
Configure User
Configure User
Settings
Settings
10 Access Control User's Manual
Chapter 2: Using the Access Control Module
Entering/Exiting Doors
To enter/exit the system:
Arming/Disarming the System
The Access Control module can be used to allow entering/exiting doors and for arming/disarming the security system.
Doors that are defined to operate in automatic mode can be entered/exited by all users with access cards or access codes. The access card or code must:
x Used only during its assigned time windows. x Used only with its assigned doors.
In addition, doors can be programmed to have a fixed status (Always Open or Always Closed) or can be programmed to open when a motion detector detects movement. In this case, users can enter/exit normally without using their access card or code.
¾
x Present your card or code to the reader, using the required
method (depending on the reader type). The system verifies the card or code (indicated by a confirmation LED and beep) and opens the door.
NOTES:
If a wrong code or an unknown card is entered five times, a false code announcement is sent to the monitoring station.
Users with Entrance Only cards cannot enter a door if all the door partitions are armed (refer to Adding Enter/Exit Users, page 29).
The system can be armed/disarmed only by users who have been assigned with arm/disarm rights. To arm/disarm the system, the following criteria must be met:
Access Control User's Manual 11
x The reader must be authorized for the arming/disarming
Arming the System
To arm the system:
Disarming the System
operations.
x The access card/code must be programmed as an
Arm/Disarm user.
x The access card/code must be used only during its assigned
time windows.
x The access card/code must be used only with its assigned
doors.
x The access card/code must be assigned to the partitions that
are assigned to the door and to the user partition definitions in the security panel.
NOTES:
Users can perform regular arming or instant arming, depending on the arm code. Ask your Installer for the appropriate code. The system will arm only the partitions that are common to the door, user security, and the arm user definitions.
Arming the system can be performed only from readers that have a keypad and have been authorized for the arming operation.
¾
x If the reader is defined as a Keypad Only type, enter your
arm code followed by your PIN code:
ARM CODE + [#] + PIN CODE + [#]
-OR-
x If the reader is defined as a Keypad + Card type (for higher
security), enter your arm code using the keypad, pass your access card in the reader, and then enter your PIN code using the keypad:
ARM CODE + [#] + PASS CARD + PIN CODE + [#]
IMPORTANT:
If you do not succeed in arming the system, refer to the checklist in Appendix A, Why Your System Does Not Arm, page 37.
Disarming the system can be performed from any type of reader that has been authorized for the disarming operation.
12 Access Control User's Manual
¾
To disarm the system:
Duress Disarming
To perform duress disarming:
x If the reader is defined as a Keypad Only or Card Only or
Keypad/Card type, enter your PIN code using the keypad OR pass your access card in the reader, as required:
PIN CODE + [#] or PASS CARD
-OR-
x If the reader is defined as a Keypad + Card type, pass your
access card in the reader AND then enter your PIN code using the keypad:
PASS CARD + PIN CODE + [#]
You can also use the Access Control readers (Keypad Only, Keypad/Card, and Keypad + Card types) for duress disarming. This type o f disarmin g sends a quiet alarm to the monitoring station while you disarm the system under coerciveness.
The duress code is automatically the number following the user's PIN code (for example: PIN code = 1234; duress code = 1235). Refer to the ProSYS User's Manual for additional details.
¾
x If the reader is defined as a Keypad Only or a Keypad/Card
type, enter the next sequential number after your PIN code:
[PIN CODE + 1] + [#]
-OR-
x If the reader is defined as a Keypad + Card type, pass your
access card in the reader and then enter the next sequential number after your PIN code:
PASS CARD + [PIN CODE + 1] + [#]
Access Control User's Manual 13
Chapter 3: Planning and Preparing the Access Control Data
To plan and prepare the Access Control data:
Before programming the Access Control module, you must plan how you want the system to function, such as which hours entry will be permitted through the main entrance, who should have access to specific areas of the premises, and so on. As part of the planning, it is recommended to prepare the data that will be used during programming in tables, as described in this section.
¾
1) Create a table that includes the following door data for each door: number, name, location, mode, and partition. The table should be based on information from your Installer. (Refer to the table provided in Table 1: Doors, page 38.)
2) Create a table that includes the following reader data for each reader: number, associated door, name, type, and arm/disarm capabilities. The table should be based on information from your Installer. (Refer to the table provided in Table 2: Readers, page 39.)
3) Create two time schedule tables, as described below. The purpose of creating time schedules is to give different
users access to doors at different hours. This consists of identifying the different types of working hours or other time divisions in the premises and then deciding what time schedule will be used.
NOTE:
When you program the time schedules, you must program the time windows first, and then you can program the weekly programs for each access group.
Create a table that includes the following time window
data: number, program name, and one or two start and stop times, as required. (Refer to the table provided in Table 3: Time Windows, page 40.)
14 Access Control User's Manual
Create a table that includes the following weekly
program data: number, program name, and assigned
Time Window numbers for each day of the week and for a holiday. (Refer to the table provided in Table 4: Weekly Programs, page 41.)
4) Create a table that includes the following access group data for each group: number, name, allowed doors, and assigned weekly program. The purpose of creating access groups is to identify the different departments or sections in the company and decide which group can enter which department at what time. (Refer to the table provided in Table 5: Access Groups, page 42.)
5) Create a table that includes the following user data for each user: number, name, access card code number, PIN code, and assigned access group. This table enables you to easily keep track of your user information. (Refer to the table provided in Table 6: User Settings, page 43.)
Access Control User's Manual 15
Loading...
+ 33 hidden pages