5452 Betsy Ross Drive
Santa Clara, CA 95054-1184
(408) 727-5170
FAX (408) 727-6707
P/N 66107919001, Rev. F
LIMITED WARRANTY
Westinghouse Security Electronics (WSE) warrants to the original user the equipment manufactured by WSE as
described herein (the equipment) to be free from defects in material and workmanship for a period of one year from
the date of purchase by such user or fifteen (15) months from the date of shipment from the factory, whichever
is sooner, provided:
I WSE has been notified within such period by return of any alleged defective equipment, free and clear
of any liens and encumbrances to WSE or its authorized Dealer at the address specified, transportation
prepaid; and
II the equipment has not been abused, misused or improperly maintained and/or repaired during such
period; and
III such defect has not been caused by ordinary wear and tear; and
IV such defect is not a result of voltage surges/brownouts, lightning, water damage/flooding, fire, explosion,
earthquakes, tornadoes, acts of aggression/war or similar phenomena; and
V accessories used as an integral to WSE systems have been approved by WSE (e.g., coaxial cables,
batteries, etc.); and
VI the equipment has been installed, the installation supervised or installation tested by an authorized WSE
dealer.
WSE's Proximity Command Keys are warranted for 5 years. WSE shall at its option, either repair or replace, free
of charge, the equipment found, upon WSE's inspection to be so defective, or if agreed upon, refund the purchase
price, less a reasonable allowance for depreciation, in exchange for the equipment. Magnetic Stripe Cards are
warranted as described by the manufacturer's warranty.
WSE makes no other warranty, and all implied warranties including any warranty of merchantability or fitness for
a particular purpose are limited to the duration of the expressed warranty period as set forth above.
WSE's maximum liability hereunder is limited to the purchase price of the equipment. In no event shall WSE be
liable for any consequential, indirect, incidental or special damages of any nature arising from the sale or use of
the product.
Some states do not allow limitations on incidental or consequential damages or how long an implied warranty lasts,
so the above limitations may not apply. This warranty gives specific legal rights; however, other rights which vary
from state to state, may pertain.
IMPORTANT
The information provided in this manual is believed to be accurate and reliable. However, Westinghouse Security
Electronics (WSE) assumes no responsibility for any errors that may appear. Possession of this manual does not
imply the granting of licenses to make or sell equipment or software constructed according to descriptions
provide
This manual follows the order of the seven standard product items in the system main menu, with
the Key Inventory and Parking Stickers items merged into the System Administration section:
•Section 2: Monitor Security Activity
•Section 3: Security Management Reports
•Section 4: Master File Entry
•Section 5: Master File Reports
•Section 6: System Administration
System Main Menu
The system main menu is the departure point for accessing all other system screens (main menu
screens may vary according to options purchased).
1-2SECTION 1: INTRODUCTION
Documentation Methods
To avoid repetition and to reduce document size, detailed explanations for the system's principal
data items are given only in Section 4: Master File Entry, which is used when creating the system
database. For introductory information concerning the data items, see Definitions below.
Further, with the exception of the screens presented in Basic System Usage in this section, and
the introductory menu screens for Sections 2 through Section 5, all other screens throughout this
manual are limited to the particular screen area being discussed (i.e., full screens are not shown).
In some cases, screen presentations are unnecessary and are not used.
DEFINITIONS
General
Access Code. A group of readers and time codes assigned to keyholders indicating where and
when entry is permitted. Note that access codes can be associated with a down loadable device
ID for distributed processing or they can be associated with the host computer for central
processing.
Access Group. A group of access codes created to facilitate the assignment of similar access
privileges to a large number of keyholders.
Alarm Contact. A dry-contact switch, indicating input conditions for smoke detectors, heat /
moisture sensors, taut-wire fences, window bands, etc.
Company. Keyholder's employer.
Department. A particular group within a company to which a keyholder is assigned.
Device. A controlling element of the system which communicates with the computer and the
system points (see System Hardware in this section).
Event. Any defined transaction which requires action by an access control system. Examples:
keyholder entry request, activated alarm.
Job Category. A code assigned to a keyholder indicating the employee group category.
Key Number. Keyholder's security key number. Unlike the keyholder ID, this number may be
changed (e.g., if a key is lost) or removed (e.g., if an employee leaves the company).
Keyholder. Employee or visitor who holds a valid security card for an access control system.
SECTION 1: INTRODUCTION1-3
Keyholder ID. Keyholder's ID number. The unique ID number is used by the computer to keep
track of all activity for that person. Once entered, the keyholder ID cannot be changed.
Location. Location of the office or branch of the company to which a keyholder is assigned.
Tenant. One of several distinct occupants of a facility with a single access control system. The
data for each tenant using the system appears separate from that of all other tenants.
Time Code. A definition of the time of day, and the days of the week, when events are to occur.
Used in assigning access privileges, performing scheduled tasks, and monitoring points.
Trace. A realtime (as it is happening) display of events for a specific keyholder or point.
Transactions. System responses to events are called transactions. The most frequently seen
is A
CCESS GRANTED, which means a valid key was presented to a reader at an approved door, at
an approved time, and that the keyholder was granted entry.
Zones. Selected locations and device types may be grouped into zones to facilitate system
control. For reporting purposes, zones may be grouped into areas. If zones are created, antipassback instructions or controls may be assigned (see Access Control Functions in this section).
System Hardware — Devices
The principal device is the host computer. The host controls all data maintained in the database,
records all system activity, and is the central point for all reporting activity. The host communicates
with all system devices, or may communicate via an LC or RLC computer (see Optional Features
in this section).
Various other devices are included in access control systems. Simple systems may use only
contact switches and a single reader type. More complex systems may use several reader types
and many other devices. Devices are classified as input or output units depending on their
particular function. Input devices are detectors and identifiers; output devices are alarms and
control units.
Devices — Microprocessor Units
Access Control Units (ACUs). In conjunction with the host or local computer, the ACUs are used
to control door access and maintain status. Example ACUs are: WSE NexSentry, 422, 708P,
and 8xx-series. The WSE 708P units are called simple devices because they do not make access
decisions (decisions are made by host). The NexSentry, 422, and 8xx-series units are called
intelligent devices because they can make access decisions independent of the host.
Biometric Hand Readers. Devices such as fingerprint analyzers, hand geometry analyzers,
retina scanners, and other devices which check body characteristics.
1-4SECTION 1: INTRODUCTION
Readers
Digital Key Reader. Reads the unique number of 1 to 5 digital command keys simultaneously
at a range of up to 36 inches.
Keypad Controllers. The keypad controllers, normally used in conjunction with an ACU, provide
additional security by requiring a personal identification number (PIN) entry.
Magnetic Card Readers. Reads the card number from information coded into the magnetic strip
on the card. Card must be moved physically through the reader to work.
Readers (also called Sensors). These units electronically read the security key presented and
transmit the data to the ACU. Three reader types are used: Proximity; Magnetic Stripe; Wiegand.
Inputs
Alarm Contacts. These devices monitor simple contact inputs, and control outputs and switches
with contact closures for alarm monitoring, elevator control, camera switching, and other tasks.
Contact Alarms. Simple dry-contact switches indicating if a contact is open or closed.
Door switches. The computer controls only the lock power to the door, and the door switches
are the contact points which inform the computer whether a specific door is open or closed. Each
door switch is assigned to a specific reader.
Fire Alarms / Heat Sensors. Data from smoke detectors and heat sensors can be sent to the
computer to alert it to alarm conditions. Although fire alarm systems are generally separate from
access control systems, the computer can be used to provide enhanced response capabilities.
Intrusion Devices. Taut wire fence, infrared detectors, field-disturbance detectors and other
device types can alert the computer to the presence of personnel in unauthorized areas.
Motion Sensors. Detect physical movement in an area. Can be used to tell the computer that
someone wants to exit (go through a door from the uncontrolled side), or to protect secure areas.
Video Monitor Switchers. The computer routes the signal from a particular video camera to a
specific monitor based on conditions in that area. For example, if the computer detects an open
rear door, it can display the camera output at that door on the terminal at the security desk.
SECTION 1: INTRODUCTION1-5
Multiple Switch Monitor (MSM). The MSM is a four-contact switch box that is connected to a
WSE ACU and the MSM provides four contact-closure inputs.
Points. A point is any basic element of an access control system, such as a door switch, an alarm
contact, an output switch. Point IDs uniquely identify all system elements.
Request-to-Exit (REX) Sensor. Used when both entry and exit control is required. REX points,
usually push-button devices, motion detectors, or push-bars, tell the computer that someone
inside a building wants to exit. The computer needs to know this to unlock the door, or to disregard
the door opening as being an alarm event.
Outputs
Audible Alarms. The computer can trigger bells, buzzers and other types of audible alarms.
Remote Alarms. The computer can dial police and / or fire departments, or any other agency,
as part of an alarm response plan.
System Software
The system software links all input and output elements. The software collects and reports data
from input devices, and controls the output devices based on this information. The software also
detects and reports any hardware problems that may occur.
Complete Portability. A specific computer type is not required, although Hewlett-Packard
computers are preferred because of performance and worldwide service. Application programs
run under an SCO / UNIX operating system.
Installation Flexibility. The SE 6000 can control many hardware setups, including remote site
networks. The system can be programmed to control data flow between central and remote
computers to create a large-size security system controlled from a central point.
Integrated Software Support. The SE 6000 communicates with a variety of access control and
alarm monitoring devices. Currently, the system interfaces with WSE ACUs and their peripheral
devices, alarm multiplexers produced by Stellar Systems and Optomux, magnetic stripe readers,
CCTV camera switchers made by Burle, Pacom, American Dynamics, and Vicon, Radionics
alarm panels, and Recognition Systems hand geometry readers. In addition, the system supports
communication with the WSE 8xx-series ACUs over dial-up telephone lines using a remote dialup interface (RDI) device. The ID-4000 badging system includes options for badge designs on film
or on PVC.
Open System Design. There are few restrictions on the number of security keys, key readers,
or other system elements used with the SE 6000. Increasing system capacity only involves
upgrading the computer power by adding more memory or disk space, or installing a faster
processor. This means that, as a company grows, it cannot outgrow the SE 6000.
1-6SECTION 1: INTRODUCTION
Response Time. The SE 6000 is capable of fast response times in both single and multiple site
configurations. Fast response times are important for security personnel who monitor alarms and
are always appreciated by keyholders wishing to enter locked doors.
Principal System Functions
Access Control
Anti-Passback Control. The SE 6000 has anti-passback features (applies to zones only) to
prevent tailgating or unauthorized key use. Anti-passback is possible across multiple access
control devices, and can be hard (denies access) or soft (allows access, but displays and logs a
message). The software handles vehicle and personal passback separately.
Automatic Access Control. Permits employees or visitors with assigned access codes to pass
through only those doors assigned to them and only during the proper days and hours.
Automatic Activate / Deactivate. Permits the automatic activation of specific output points to
control lighting, status indicators, or other electrically controlled functions.
Automatic Unlock / Lock. Allows doors to be opened automatically only during specified time
periods, then re-locked automatically at a later time.
Communications Monitor. Permits security personnel to check all wiring and communications
to all hardware elements and displays raw data exchange between the host computer and a
connected device.
Event Monitoring. Displays events as they occur and monitors the door status and other access
points. Allows security personnel to watch events at all doors in the system from one location.
Flexible Event Handling. Flexible event handling automatically activates outputs, displays
special messages, and enables / disables devices. Anything which can be done manually on the
SE 6000 can also be performed automatically using this feature.
Independent PIN Entry. Access control can be enhanced using personal identification numbers
(PINs). PINs are entered via keypad devices assigned to readers. Also, high-security independent
devices (hand geometry readers, e.g.) can identify the user.
Manual Access Control. Allows security personnel to manually open any door in response to an
access request. May be used with closed-circuit TV to verify and admit people, or to track
keyholders who have forgotten their keys. Includes the capability to record keyholder IDs if keys
are not available. All manual actions are logged as events.
Two-Man Rule. The SE 6000 can be programmed to grant access only after two valid key
presentations have been made at the same reader within a predefined period of time.
SECTION 1: INTRODUCTION1-7
Multiple Occupancy Feature. Similar to the two-man rule except that it requires that two
keyholders enter and leave a specified zone together; refer to Section 4 for details.
File Maintenance
To perform its access control functions, the system must know the unique ID numbers of all
keyholders and the doors and times they can enter. Further, the SE 6000 maintains other
keyholder data to facilitate scheduling and reporting.
The system also needs to know details of the location of input devices and other security hardware.
File maintenance functions allow users to enter, modify, or delete employee, company, physical
connection and time information, as required.
Reporting
The SE 6000 produces a comprehensive selection of reports for display at the system terminal
or for hard-copy output from the system printer:
Alarms and Responses. A history report of alarms which occurred at a specific time and location,
and the responses taken by the security staff.
All Transactions. A report detailing all system activity. The items reported can be limited to
specific information items.
Database Changes. A report of database change activity, which includes the name of the
operator who made the changes. Note that this requires that the journaling feature be enabled.
Invalid Access Attempts. A report detailing events which were not valid accesses during specific
time periods at particular doors.
Keyholder History. A report of the last twenty uses from a particular keyholder.
Point History. A report of the last twenty events at any door or point. Designed as a quick way
to view a limited number of events. Additionally, reports can be created which provide information
about the keyholders in the system, access privilege definitions, company information, input
devices, and other subjects.
SAMPLE SYSTEM
An illustration of a basic SE 6000 system follows:
1-8SECTION 1: INTRODUCTION
SE 6000
Multiple Switch
Monitor—MSM
Contacts
1 2 3 4
REX
(Point)
Pollers
12345678
Access Control Unit—
ACU
(Up to 16 per poller)
Sensor Connections
1 2 3 4 5 6 7 8
Reader
Alarm
Monitoring
Device
(Up to 16 per poller)
Contact Relays
(1—16)
Contact
Switch
(Point)
Switcher
CCTV
Camera
Door Switch
(Point)
One Complete Door
CREATING THE DATABASE
Once the system is in place, first obtain the following from the system installer:
System Interconnect Diagram. This shows all wiring and connections in the system, and
provides information needed for entering pollers, devices, readers, and points.
Poller Initialization Parameters Information. The information shows how the pollers were
initialized, including poller type, physical port connection, and other poller-specific information.
Because all system activity is based on four-digit ID numbers, you need to decide before data entry
how these numbers are to be assigned to the system hardware elements. Although the numbering
system is entirely the choice of the SE 6000 owner, we recommend one of the two following
methods:
B
ASIC
SE 6000 S
YSTEM
SECTION 1: INTRODUCTION1-9
1.Following the System Interconnect Diagram, number each element in turn with a four-digit
number, including numbers for devices, pollers, and readers.
2.Use the following ID groupings for average-sized system:
Note that although the zoom feature (described later in this section) permits faster data entry, WSE
recommends the following sequence for most efficient data entry when you are creating your
database (data entry is detailed in Section 4: Master File Entry):
1. Time Codes9. Access Groups17. Tasks
2. Tenants10. User-Defined Fields18. Events
3. Zones / Areas11. Keyholders19. Enable Terminals for Global Alert
4. Pollers12. Access Privileges20. Program Security Levels
5. Devices13. Holidays21. Add Users
6. Points14. Alarm Instructions22. Passwords
7. Readers15. Maps23. System Owner Name
8. Access Codes16. Transactions24. Terminals for Alarm Auto-Switch
NOTE
Consult the system installer if you have questions concerning numbering. In any case, keep track
of your numbering method and advise each operator of the method selected
BASIC SYSTEM USAGE
This subsection gives introductory information for using the SE 6000 system, and includes related
miscellaneous information.
Logging On
Power on the system terminal. The screen displays a brief welcome message followed by the login
and password prompts. Enter the login ID and password in lowercase letters. If uppercase letters
are entered by mistake, log off using uppercase letters then log on again with lowercase letters.
If the login and password are not valid or if one or both were not entered correctly, the computer
responds with login incorrect then displays login again. Reenter the login ID and password making
sure that each letter is correctly typed. If the login incorrect message continues, consult the system
administrator. When logged in correctly, the system displays the SE 6000 title page, sets the
terminal environment, then displays the main menu. Call WSE Customer Service if you have a
login problem.
1-10SECTION 1: INTRODUCTION
System Screens
There are two basic screen types: Menu and Application:
Menu Screens
Menu screens list application selections by group according to function (exception Monitor
Security Activity — see Section 2). All menu screen IDs end in menu (example: [fmntmenu] —
Master File Entry).
The menu screens have three elements: the list of choices, the highlight bar, and the EnterSelection field. The highlight bar, controlled by the arrow keys, is used to make a selection to be
placed into the Enter Selection field. Screen access descriptions are given in Moving BetweenScreens and Fields in this section.
A sample menu screen follows:
Application Screens
Application screens use status windows and various fields for entering new data or displaying
existing data. The screen title is in brackets and on the same line and to the left of the screen title.
Most screen title IDs indicate screen function, e.g., entr (enter data), rprt (report). A sample
screen follows:
SECTION 1: INTRODUCTION1-11
Indicates replace or insert mode. With replace, entries overwrite existing data. With insert,
entries push existing data to the right. Toggle between the modes by pressing insert.
Indicates if the information displaying is stored.
Indicates the current screen mode (see Finding, Adding, and Storing Data in this section).
In some systems, this window is in reverse video.
Indicates if the zoom feature exists for a field (see Zoom Feature in this section).
Displays the number of records found as a result of a find request (see Finding, Adding, andStoring Data in this section).
SCREEN EXAMPLES
SE 6000 screen displays show the path used to access the screen. For example, the final screen
used when setting up keyholders, [epj_entr], is accessed via three preceding keyholder setup
screens: [key_entr], [key1entr], [empgentr]. This useful feature considerably assists the new SE
6000 user when becoming familiar with the system. A sample [epj_entr] screen follows:
1-12SECTION 1: INTRODUCTION
USING SCREENS AND FIELDS
Selecting Screens
There are three screen selection methods:
1.Use the arrow keys to select the menu choice. Press Enter to place it in the Enter Selection
field, and press Enter again to display the selection.
2.Use the arrow keys to select the menu choice, and press F2 to display the selection.
3.Press Enter anywhere in the list of choices to move the highlight bar to the Enter Selection
field. Press Ctrl + y to clear the field and type the title of the screen required and then press
Enter.
Moving Between Data Fields
Move between the application screen data fields as follows:
•To move forward through the fields, press Enter.
•To move backward through the fields, press Ctrl + u.
•To move between characters within a single field, use the left and right arrow keys.
SECTION 1: INTRODUCTION1-13
Moving to Prior Screens
Press F1 to return to the previous screen displayed. If required, continue to press F1 to return
to the system main menu.
FINDING, ADDING, AND STORING DATA
Finding Data
Use the find mode to locate and select data. A specific record (a single keyholder ID, for example)
or a group of records (all keyholders in a particular job category, for example) can be found.
For example, assume we need to find all keyholders assigned to tenant 2 who began work after
May 1, 1995. First, select the keyholder entry screen, [key_entr]:
NOTE
The keyholders are the object of the search, which is why we begin at the keyholder entry screen.
Tenant 2 and issue date are the search criteria.
1.Press F4 to clear fields and to enter the find mode. The third status field at the top of the
screen displays find.
2.Press Enter to advance the highlight bar until you reach the first search item, Tenant, and
type 2.
3.Press Enter to advance the highlight bar until you reach the second search item, Issue Date,
and type 05/01/96. (Note: Enter the date according to the format for your system, that is, either
MM/DD/YY or DD/MM/YY.)
4.Press F3 to begin the search process; the sixth status field displays finding. The length of
the search process will depend upon the size of the data base.
5.When the search completes, the system displays the first record found and shows the
number of records found in the fifth status window (Record 1 of n). (If the system doesn't
find any records matching the search criteria, the message No Records Found displays.)
Use the down arrow key to display other records found in the search process. Use the up
arrow key to go back to previous records.
Searching With Partial Information
Records can be found using partial information. For example, to find all keyholders whose last
name begins with T, enter T in the Last Name field. The system also searches for several criteria.
For example, to find all keyholders who work for tenants 1 and 5, enter 1,5 in the tenant field. In
addition, you can enter less than (<) and greater than (>) symbols to narrow a search.
1-14SECTION 1: INTRODUCTION
The computer automatically changes to the update mode when a search completes, and the
records selected can be updated if required. To start another search, press F4 to clear the screen
and begin again.
Adding / Changing Data
The add mode is used to input new records. Once a record is found using the search mode, update
is automatically selected which allows the user to change the existing data.
If not already in the add mode, press F5 to clear fields and to begin adding. Press Enter to move
the highlight bar to the next field and type the data. (If a typing mistake is made, press Ctrl + y to
clear a field, Ctrl + f to delete characters in a field, Ctrl + u to move back through the fields.)
Many fields have default values, which are used if a field entry is not made. Default values are
used to simplify the entry process by automatically setting certain fields to commonly used values.
For example, many yes or no type fields, (Y / N), have Y as the default.
Storing Data
Store all additions and changes when completed — Press F6. If F1 is used to return to the previous
screen without first storing the new / changed information, all the new data is lost.
DELETING RECORDS
From time to time, it may be necessary to delete records from the database. The delete record
function is easy to perform, although some cautions are involved. To remove a record from the
database, first display the record using the find mode, then press Esc, followed by d (lowercase),
then r (lowercase). If the operation can be performed, the computer displays deleted.
It may not be possible to delete records in some cases. For example, the system would not allow
a reader to be deleted without first deleting its associated access codes. Display the access code
records and delete the reader data appearing on them, then delete the reader record itself again.
CAUTION
Be careful when deleting certain records. For example, it is unwise to be hasty when deleting
keyholder records. Consider Employee A who occasionally entered a certain room where
valuable material is stored. The employee then abruptly left the company, and the keyholder
record is deleted. A theft is then discovered from the room, and from shipping and receiving
records it is determined that the theft occurred within a particular time frame. But with the
keyholder information now erased for Employee A, there is no way to link the transaction history
to a particular keyholder.
SECTION 1: INTRODUCTION1-15
ZOOM FEATURE
The zoom feature provides a fast method for accessing linked or dependent application screens
and for copying data from these screens to other application screens. When the feature is
available, zoom displays in the status bar.
For example, you are entering keyholder data (keyholder entry screen) but don’t know the tenant
code for the keyholder. When in the tenant field, press F7 to zoom to the tenant entry screen. Once
there, use the find mode to see the tenant codes defined and to select the one you need or enter
a new one. Then press F1, and the system automatically returns you to the keyholder entry screen
and enters the keyholder's tenant code in the tenant field.
Cancel Zoom
If you don't need data from the zoom screen, press Esc, then Ctrl + z to return to the previous
screen, or simply return using F1 and key over the returned data.
MISCELLANEOUS INFORMATION
•If you need help in any field in the system, check the instructions on the information line at
the bottom of the screen.
•If the computer beeps and displays a message, or if you see the symbol '---' in the information
area at the bottom of the screen, press Enter to let the computer know you've read the
message. The computer will not allow further action, and will beep each time you press a
key until you press Enter to acknowledge.
•Occasionally, a screen will not display properly. This can occur when accessing the system
from a remote dial-in terminal via a modem or when the system administrator sends a
message. If this happens, try using Ctrl + r to redraw the screen. To completely clear the
problem, log off the system and log on again.
•To save time when moving around the SE 6000 system, it pays to learn the screen titles of
the most commonly used application screens (see the screen location trees and the table
at the end of this section). For fast screen access, type a screen title in the Enter Selection
field (press Enter in any menu screen), then press Enter and the system immediately displays
the screen. Note that you should delete any characters remaining in the Enter Selection field
before you select Enter.
LOGGING OFF
When the SE 6000 session is completed, press F1 until you reach the main menu screen. From
here, press F1 again; the computer asks for log off confirmation. Enter yes (full word) and press
Enter to leave the system. (You can also type exit in any Enter Selection field to leave the system.)
After log off, the computer displays the login prompt again.
1-16SECTION 1: INTRODUCTION
IMPORTANT
Log off the SE 6000 system formally before you leave the terminal. If you do not log off, any action
taken by the next person at the terminal will appear under your name.
SHUTTING DOWN
Always use the following procedures, in the order given, when powering off the SE 6000:
1.Go to the main system terminal (system console). This terminal has overall computer control
and displays all system messages.
2.Log off the system using the procedures given in the previous subsection.
3.Log in using the SHUTDOWN login. Your system administrator will provide you with the
password. If other users are still logged on, you may have to press Enter to continue the shut
down process which will forcibly log off other users.
Step 3 automatically shuts down the SE 6000 system in an orderly way. The last message
displayed when the internal shutdown procedures have completed is Safe to Power Off or Pressany Key to Reboot. It is now safe to power off the computer. To restart the computer, press any
key and follow the instructions in the following subsection.
RESTARTING
Use one of the following methods, Automatic or Manual, when powering on the SE 6000 (the
shutdown / restart process is also known as rebooting the computer).
Automatic Restart
The SE 6000 has an automatic restart capability that reboots the system in the event of a power
interruption. If unattended, the Boot prompt displays for 30 seconds, then the auto-boot function
reloads the operating system and restarts the application including the pollers.
Manual Restart
1.Turn the power on; the computer displays Boot. Press Enter to continue.
2.After various messages, the computer displays Type Control-d to Proceed with NormalStartup (or give root password for system maintenance). Press and hold the Ctrl key, and
press the d key (lowercase).
SECTION 1: INTRODUCTION1-17
3.The computer displays Enter new time ([yymmdd]hhmm). Change the date and time values
as required (do not enter the parentheses or brackets); press Enter when completed. To
keep the displayed date and time, press Enter.
4.The computer continues its startup procedures, and the login prompt displays after a brief
pause. If any other message displays apart from those noted here, just press Enter.
SYSTEM SCREEN TREES
The SE 6000 screens are arranged in tree structures, with hierarchies established from the
primary screen to the lowest level screens in each tree. Each screen has a unique title which
displays in the upper-left.
Appendix A: System Screen Trees
Tree structures for the first seven standard-product selections on the system main menu are given
in Appendix A:
•Monitor Security Activity
•Security Management Reports
•Master File Entry
•Master File Reports
•Key Inventory / Parking Stickers
•System Administration
Appendix B: System Screen Hierarchies
Appendix B lists all screens within their respective tree structures, along with a brief explanation
for each. Left column indentions show the relative position of each screen within the individual tree
structures. Indented screens can be accessed only from the previous level in the screen hierarchy.
OPTIONAL FEATURES
A variety of optional software packages are available with the SE 6000:
IQ. A report writer package that allows the user to select, sort, display and / or print database
information in a format specified by the user. It can be used for quick ad hoc enquiries or formal
reports. Once defined, report formats may be saved and rerun on demand.
CCTV Camera Switcher Control. Controls the actions of closed-circuit television system
switchers, allowing the system to switch video output from a particular camera to a specified
monitor. When used in conjunction with the system flexible event handling feature, this provides
an important method for monitoring system events.
1-18SECTION 1: INTRODUCTION
Controller Systems. Controller systems are computers running the SE 6000 local (LC) or remote
location controller (RLC) software. The LC system is a computer attached via dedicated lines to
the host. The RLC system is a computer attached via dial-up telephone lines to the host.
Elevator Control. Permits floor-by-floor control of elevator call buttons. When a keyholder
presents a key to a reader in the elevator, certain buttons, wired via computer-controlled output
contracts, can be enabled or disabled for use. The keyholder is able to select only those which
have been enabled for his / her specific access privileges.
Guard Tour. Schedules and monitors security personnel guard tour activities. Specifies certain
reader output points as guard tour points, and assigns the minimum and maximum times which
can pass between stops on the tour. The feature reports if tours have started too early or too late,
or if too little or too much time has passed between stations.
Parking Control. Controls and monitors a parking facility including employee and revenue
generating parking spaces. Includes keyholder and daily cash customer functions, tenant billing,
and overage features. Supported hardware includes point-of-sale terminals, automated ticket
dispensers, and gate control mechanisms. Produces detailed reports for keyholders, cash
customers, parking lot attendant activity, and keeps track of the number of cars in the lot on a
tenant-by-tenant basis.
Remote Dial-Up Interface (RDI). Permits communication with remotely-located 8xx-series
devices via dial-up telephone lines. The feature retains transaction information, and determines
when conditions at a remote site warrant a call to the host (alarm event occurring, log buffer
reaching a user-defined threshold, etc.). Frequency and call duration are determined by the user.
The host contacts remote sites in turn to access information and to transfer event logs.
Time and Attendance. Captures hours worked by each employee for transfer to a payroll or
accounting system. The feature can be programmed to:
•Generate specialized reports of time and attendance activity.
•Monitor the number of meals taken by a keyholder.
•Recognize early and late entrances and exits.
•All records can be edited and modified prior to transfer to another system.
Visitor Control. Tracks visitors, prints visitor badges (black and white or color), and creates
comprehensive reports of visitor activity. The feature also provides a record of who was visited
and the date. It provides the company name of the visitor if applicable.
WSE ID-4000 Interface. Integrates one or more Polaroid ID-4000 photobadging systems with the
SE 6000. Keyholder information and photo IDs created on the Polaroid system are transferred
via a LAN or serial connection to the SE 6000. Badges can be printed on film or on PVC. Keyholder
maintenance may be initiated on either system; all data is stored in a single database resident on
the SE 6000.
SECTION2: MONITORSECURITYACTIVITY2-1
SECTION 2
MONITOR SECURITY
ACTIVITY
INTRODUCTION
System monitoring and control is performed via the monitor menu, the first selection in the system
main menu. The monitor menu screen is shown below.
Notice this is a split screen, with the lower half constantly updated as transactions (any system
event) occur. Most monitor screens are divided this way, and for user convenience the screen
examples from this point on are shown without the transaction listings. Also, other screens not
accessed from the monitor menu in this section are reduced to show the required data fields only.
SECTION ORGANIZATION
The procedures in this section are in the order shown in the monitor menu (above). The associated
subscreens also follow in order (the section table of contents reflects the hierarchies).
2-2SECTION 2: MONITOR SECURITY ACTIVITY
FUNCTION KEYS
Beneath the transactions display are the applicable function keys for each screen, with the key
actions shown next to the key numbers. For most function key actions, the system displays
messages confirming that the action has been completed, e.g., POLLER STOPPED.
In general, F1 is used to exit from the current screen, and F7 and F8 are used respectively to
display the previous screen and the next screen within the set of screens that apply to the particular
data item being controlled or when there are more items then will fit into a single screen.
DATA ITEM SELECTION
Use the up and down arrow keys to select the data item to be controlled, then press the applicable
function key for the system action to be taken.
CONTROL FUNCTIONS MENU
Pollers
The Control Pollers screen displays point ID, description, status.
Control Pollers Function Keys
F2 HALT. Stop a poller when work is to be performed on devices attached to the poller or to reload
a poller parameter following a change.
F3 RESTART. Restart the poller when work is completed (system displays messages announcing
each device attached to the poller as it comes back online). If there are devices with system or key
checksum errors, perform a reset to the device.
F4 DEV COMM. This function monitors communication between the pollers and the device pollers.
In normal operation, the devices are asked for information by the pollers many times a second,
and with a properly operating system the controller screen updates rapidly.
SECTION 2: MONITOR SECURITY ACTIVITY2-3
When F4 is pressed, a second screen displays showing the connections between the host and
the devices of the particular poller selected:
Poller-device communication should be one of the first items checked whenever there is an
apparent problem with the system.
Devices
The Control Devices screen displays point ID, description, status, tamper, shunt. Applies to
NexSentry, 422, and 8xx-series ACUs.
Control Devices Function Keys
F2 DEV STAT. Device Status—When F2 is pressed, a second screen displays showing the status
of the particular device selected:
F3 DEV RSET. Device Reset—Used when setting up new ACUs or reestablishing repaired ACUs,
or when the integrity of the data currently resident in the ACU is suspected. Downloads all host
device data to the ACU and silences a latched alarm.
2-4SECTION 2: MONITOR SECURITY ACTIVITY
F4 KEY RSET. Key Reset—Used when setting up new ACUs or reestablishing repaired ACUs,
or when the integrity of the data currently resident in the ACU is suspected. Downloads all host
key data to the ACU.
F5 SHUNT. Shunt a device.
F6 UNSHUNT. Unshunt a device previously shunted.
Locks
The Control Locks screen displays point ID, description, lock status, shunt, sensor, coax, door
status.
Control Locks Function Keys
F2 LOCK. Lock selected door. If no door is selected, F2 locks all doors in the zone.
F3 UNLOCK. Unlock selected door. If no is door selected, F3 unlocks all doors in the zone.
F4 TIME OPEN. Unlock selected door for the amount of time programmed at the ACU or on the
reader entry screen. If no door is selected in a zone, F4 unlocks all doors in the zone for the amount
of time programmed.
F5 SHUNT. Shunt a door.
SECTION 2: MONITOR SECURITY ACTIVITY2-5
F6 UNSHUNT. Unshunt a door previously shunted.
Input Points
The Control Inputs screen displays point ID, description, point status, tamper, shunt.
Control Inputs Function Keys
F5 SHUNT. Shunt a selected input point. If no input point is selected, F5 shunts all input points
in the zone.
F6 UNSHUNT. Unshunt a selected input point previously shunted. If no input point is selected,
F6 unshunts all input points in the zone.
Output Points
The Control Outputs screen displays point ID, description, status, shunt.
Control Outputs Function Keys
F2 ACTIVATE. Activate a selected output point. If no output point is selected, F2 shunts all output
points in the zone.
F3 NORMAL. Deactivate a selected output point. If no output point is selected, F3 deactivates all
output points in the zone.
F5 SHUNT. Shunt a selected output point. If no output point is selected, F5 shunts all output points
in the zone.
Loading...
+ 150 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.