Access Security Integrator

Size: px
Start display at page:

Download "Access Security Integrator"

Transcription

1 Access Security Integrator Security Management System Engineering Specification Release 2.0 Revision C Access Specialties makes no representations or warranties with respect to the contents hereof and specifically disclaims any implied warranties of merchantability or fitness for any particular purpose. Access Specialties reserves the right to revise this specification from time to time in the content hereof without obligation to notify any person of any such revision or changes.

2 Table of Contents 1.0 Introduction & Response Instructions Page Offeror & Manufacturer Qualifications Page Server & Client System Requirements Page Intelligent Field Panel Requirements Page ASI 2000 Software & Database Requirements Page Device & Card Reader Definitions Page Access Groups Page Cardholder Records Page System Operators Page Commands Page Graphic Map Files Page Alarms Page Transaction Events Page Reports Page Help Page Digital Photo ID Badging Page Event Management Page Offeror Provided Services Page Manufacturer Provided Services Page Spares, Warranty, & Equipment Compatibility Page Installation Execution Page 42 ASI Specifications 2

3 Introduction 1.0 Introduction This document has been prepared to provide information necessary to produce a complete proposal for a Security Management System (hereafter referred to as SMS ). The system supplier (hereafter referred to as the Offeror ) shall furnish a standard, field-proven integrated hardware & software system. This system shall provide the performance, reliability, and expansion capabilities specified in this document. 1.1 Required Response Format A response is required to each paragraph of Section X through Section X of this specification. The response to each paragraph shall be in the following format: Comply Partial Offeror s product complies with the requirement. Offeror s product partially satisfies the requirement. Details are included in the proposal. Non-Comply Offeror cannot comply with the paragraph s requirements. Alternate A functional alternative to the paragraph s requirements is offered in the proposal. Clarification Offeror s proposal provides a clarification to requirement satisfaction. Exception Offeror takes exception to a requirement for technical reasons. 1.2 Instructions To Offerors Specific sections of this document are prefaced with a [Mandatory Requirement] designator. All paragraphs that state Mandatory Requirement require a detailed response or that paragraph will be deemed to be non-compliant. If Offeror s proposal does not indicate explicitly that the Offeror-supplied system satisfies all requirements of any such paragraph; Offeror s proposal shall be deemed to be non-responsive to this specification. Offeror may indicate non-compliance to any requirement, offer a functional alternative to that specific requirement, or clarify compliance criteria as necessary. The degree of compliance to nominal requirements will be a proposal evaluation consideration. ASI Specifications 3

4 1.3 Information & Submittals Required Certain paragraphs of this specification state that Offeror shall provide information in sufficient detail in the proposal to demonstrate compliance with the requirement. If Offeror fails to provide detailed response to a paragraph, the proposal will be deemed to be non-compliant to the paragraph s stated requirements. The following information shall be provided at a minimum: A. Shop Drawings Provide complete shop drawings which include the following: - Indicate all system device locations on architectural floor plans. No other system(s) shall be included on these plans. - Include full schematic wiring information on these drawings for all devices. Wiring information shall include cable type, conductor routings, quantities, and connection details at devices. - Include a complete SMS one-line block diagram. - Include a statement of the system sequence of operation. B. Product Data Provide complete product data which includes the following: - Manufacturer s data for all material and equipment, including terminal devices, local processors, computer equipment, access cards, and any other equipment provided as part of the SMS. - A system description, including analysis and calculations used in sizing equipment required by the SMS. Description to show how the equipment will operate as a system to meet the performance requirements of the SMS. The following information shall be supplied as a minimum: - Central processor configuration and memory size. - Description of site equipment and its configuration. - Protocol description - Rigid disk system size and configuration - Backup / Archive system size and configuration. - Start up operations - System expansion capability and method of implementation. - System power requirements and UPS sizing. - Description of the operating system and application software. ASI Specifications 4

5 C. Contract Close-Out Submittals: Provide three (3) bound sets of manuals including operating instructions, maintenance recommendations and parts lists, including wiring and connection diagrams, modified to reflect as-built conditions. D. Manuals: Final copies of the manuals as specified bound in hardback, loose-leaf binders shall be delivered within thirty (30) days after completing the installation test. Each manual s contents shall be identified on the cover. The manual shall include names, addresses, and telephone numbers of each security system integrator installing equipment and systems and the nearest service representatives for each item of equipment for each system. The manuals shall have a table of contents and tab sheets. Tab sheets shall be placed at the beginning of each chapter or section and at the beginning of each appendix. The final copies delivered after completion of the installation test shall include all modifications made during installation, checkout, and acceptance. The manuals shall contain the following: 1. Functional Design Manual: - The functional design manual shall identify the operational requirements for the system and explain the theory of operation, design philosophy, and specific functions. A description of hardware and software functions, interfaces, and requirements shall be included for all system operating modes. 2. Hardware Manual: The manual shall describe all equipment furnished including: - General description and specifications - Installation and check out procedures - System layout drawings - Alignment and calibration procedures - Manufacturer s repair parts list 3. Software Manual: The software manual shall describe the functions of all software and shall include all other information necessary to enable proper loading, testing, and operation. The manual shall include: - Definition of terms and functions - Use of system and applications software - Initialization, start up, and shut down - Alarm reports - Reports generation - Data base format and data entry requirements - Directory of all disk files ASI Specifications 5

6 4. Operator s Manuals: The operator s manual shall fully explain all procedures and instructions for the operation of the system including: - Computers and peripherals, aspects pertinent to application - System start up and shut down procedures - Use of system, command, and applications software - Recovery and restart procedures - Graphic alarm presentation - Use of report generator and generation of reports - Data entry - Operator commands - Alarm messages and reprinting formats - System access requirements 5. Maintenance Manuals: The maintenance manual shall include descriptions of maintenance for all equipment including inspection, periodic preventative maintenance, fault diagnosis, and repair or replacement of defective components. E. As-Built Drawings: During system installation, the Offeror shall maintain a separate hard copy set of drawings, elementary diagrams, and wiring diagrams of the SMS to be used for record drawings. This set shall be accurately kept up to date by the Offeror with all changes and additions to the SMS. In addition to being complete and accurate, this set of drawings shall be kept neat and shall not be used for installation purposes. Copies of the final as-built drawings shall be provided to the end user in an appropriate format. 1.4 Scope of Document Section 2 details Offeror and Manufacturer qualifications. Section 3 details host and client hardware / software requirements. Section 4 details intelligent field panel requirements. Section 5 details software and database features and requirements. Section 6 details Offeror provided services. Section 7 details Manufacturer provided services. Section 8 details documentation. Section 9 details spare parts. Section 10 details warranty. Section 11 details equipment compatibility and support. Section 12 details installation and execution. ASI Specifications 6

7 1.5 Description of Work The Security Management System (SMS) shall manage the security operations for a single site or for multiple sites. Installing the SMS and bringing it to operational status requires the following major steps: - Determine operational requirements and plan system to implement them. - Select host computer site. - Install and configure, where necessary, the communications network providing communications between the client and the server computer workstation. - Install and integrate access control, alarm monitoring and related security hardware. - Configure local access panels and SMS server computer system to communicate with one another. - Enter security system database. - Connect between host system, access panels, and related hardware. - Test security system communication and operation. - Train personnel. ASI Specifications 7

8 Offeror and Manufacturer Qualifications 2.0 Offeror, Manufacturer and System Qualifications The paragraphs below describe the qualifications of both the Offeror and the Manufacturer Offeror Financial Stability [Mandatory Requirement] The Offeror shall provide sufficient financial information to indicate to the customer their financial status Offeror Resources [Mandatory Requirement] The Offeror shall maintain a fully staffed local office including service center. The Offeror also shall provide their support and training structure, including the number of personnel that have been trained and certified by the manufacturer. The training includes both installation and operator training. The service center shall be equipped to provide emergency service within four (4) hours after being called, 24 hours per day, whether or not the owner purchases a maintenance contract with the Offeror. Offeror personnel that have not been certified by the Manufacturer will not be acceptable for installation and training Offeror Spare Parts [Mandatory Requirement] The Offeror shall maintain a local inventory of spare parts and other items critical to system operation Offeror Proposed Security Management System [Mandatory Requirement] Assuming that the Offeror meets the attached specification and that most Security Management Systems are 85% the same, explain in no more than three (3) pages, the 15% difference that makes your proposed solution a better investment to solve the customers present and future requirements. 2.2 Manufacturer Qualifications The paragraphs below describe the specific qualifications associated with the Manufacturer of the SMS Proven Track Record In Integrated Security Management Systems [Mandatory Requirement] The Manufacturer s supplied system shall be a fully integrated security management system, standard off the shelf package utilizing the latest hardware and software technology. Major system development efforts to meet the requirements of this specification are unacceptable. The Offeror shall demonstrate compliance with these qualifications by providing a minimum of three (3) applicable customer names for reference. ASI Specifications 8

9 2.2.2 Manufacturer Financial Stability [Mandatory Requirement] The Manufacturer shall provide sufficient financial information to indicate to the customer their financial status Manufacturer Technology Roadmap [Mandatory Requirement] The Manufacturer shall supply sufficient information to indicate that the SMS proposed is based on the latest hardware, software and computer technology available. The latest technology is defined as: application software in Visual Basic language, windows and icon based, relational data base, SQL reporting, TCP/IP interfacing capability, flash memory in the intelligent field panels, Hardware and Software Products [Mandatory Requirement] The Manufacturer shall indicate products in the proposed SMS that the Manufacturer has developed and that are currently being manufactured at their facility. The list should include, but not be limited to: SMS software, intelligent field panels, readers, and badges. If any of the products are not manufactured or assembled in the United States, indicate the country of manufacture Manufacturer Marketing & Technical Communications Detail the marketing and technical communications, user conferences in which the Manufacturer and its business partners are involved, providing a copy of an agenda when applicable. ASI Specifications 9

10 Server & Client System Requirements 3.0 SMS Requirements The following section describes specific host and client computer hardware and software requirements. The computer equipment referred to in this specification refers to the system s host and client computers, peripherals, and communications equipment installed. 3.1 Host Server Hardware & Software Requirements [Mandatory Requirement] The host server shall be a Pentium based PC and shall operate under a Windows operating system from Microsoft. The server shall be configured according to the following minimum requirements: - Pentium III or IV CPU (2.8GHz or higher) - 1.5GHz or higher MB RAM minimum - 512K CPU Cache - Ethernet Adapter - CD ROM Drive - 80 GB Hard Disk - PCI Hard Disk Controller Floppy Disk Drive - 64 Bit PCI VGA Adapter - 17 SVGA Monitor (1024 X 768 Resolution) - Serial Ports (as needed) utilizing UART s or newer - 1 Parallel Port - PS/2 Style Mouse Key Keyboard - Operating System: Windows 2000 Professional, Server, XP Server or Windows 2003 Server - Microsoft SQL Server 7.0, 2000 or 2005 ASI Specifications 10

11 3.2 Client Hardware & Software Requirements [Mandatory Requirement] The client workstation shall be a Pentium based PC and shall operate under a Windows operating system from Microsoft. The client workstation(s) shall be configured according to the following minimum requirements: - Pentium III CPU - 333MHz or higher MB RAM - 512K CPU Cache - Ethernet Adapter - CD ROM Drive - 20 GB Hard Disk - PCI Hard Disk Controller Floppy Disk Drive - 64 Bit PCI VGA Adapter - Compatible Sound Card - 17 SVGA Monitor (1024 X 768 Resolution) - Serial Ports (as needed) utilizing UART s or newer - 1 Parallel Port - PS/2 Style Mouse Key Keyboard - Operating System: Windows NT 4.0 or later, Windows 2000 Professional or XP Professional 3.3 Computer Peripherals The host and client workstation(s) shall support the following peripherals at a minimum: A. Printers The SMS shall support report printers. The report printers may be connected to the parallel port of the host or client computers. The Offeror shall provide one laser and one dot matrix printer, and all necessary cables and interface cards to connect to the host computer as needed. B. Communication Ports [Mandatory Requirement] The SMS shall be able to support multiple serial devices. In addition to COM1 and COM2, up to 32 additional ports may be configured through the use of a port expander. ASI Specifications 11

12 C. Archiving Media Devices [Mandatory Requirement] The Offeror shall supply software utilities to store various system data files and reports described elsewhere in this specification. The system software shall provide the ability to schedule backups that will automatically execute at the pre-defined date and time without any operator intervention. Offeror shall provide information in sufficient detail in the proposal to demonstrate compliance with this requirement. D. Battery Back Up Support Upon the loss of normal power the SMS computer(s) shall have an UPS system that provides for normal shutdown of the host computer system. The intelligent field panels, door hardware and associated devices shall be fully operational via a battery back up system. The back up system shall provide for twenty-four hours of continuous operation without degradation of the system. The host shall be notified if the system goes to battery back up mode. ASI Specifications 12

13 Intelligent Field Panel Hardware & Software Capabilities 4.0 Intelligent Field Panel Definition The term intelligent field panel is used throughout this specification to designate those components that shall interface with card readers, portal devices, intrusion sensors, and communicate with the host computer system. Intelligent field panel requirements are presented in the paragraphs below. A sufficient quantity of intelligent field panels shall be provided to meet the requirements of all designated doors with card readers and alarm monitored points. The SMS shall support two types of panels: IC-1600 and UP Number of Intelligent Field Panels [Mandatory Requirement] The number of field panels that can be defined within the SMS shall be 255 per zone with a maximum of 255 zones. In excess of 10,000 panels can be defined on the system as a whole. 4.2 Real Time Database Updating [Mandatory Requirement] The intelligent field panels shall have the capability of updating the database and associated records in a real time fashion. They shall also have the capability of buffering in excess of 30,000 transactions (IC-1600) or 100,000 transactions (UP-2000), should communications with the host computer be lost. 4.3 Memory Expansion Capabilities [Mandatory Requirement] The intelligent field panels shall have at a minimum 128K RAM on board for database storage. The intelligent field panels shall be expandable up to 4 MB RAM by adding additional memory modules as needed. 4.4 Device / Door Capacities [Mandatory Requirement] The intelligent field panels shall have the ability to configure up to 256 devices/doors on an individual IC-1600 panel. Depending on the physical layout of the building(s) it may be more suitable to use a panel capable of handling fewer devices than the maximum stated for distributed database applications. The UP-2000 shall have the capability of supporting up to 8 doors/devices. ASI Specifications 13

14 4.5 Cardholder & Transaction Buffering Capacities [Mandatory Requirement] The IC-1600 intelligent field panels shall have the ability to store in excess of 20,000 cardholder records and/or buffer in excess of 20,000 transactions per panel per zone. Intelligent field panel memory allocation is primarily a combination of Cardholder and Transaction data. The UP-2000 field panels shall have the ability to store in excess of 100,000 cardholder records and buffer in excess of 100,000 transactions per panel per zone. 4.6 Communication Capabilities [Mandatory Requirement] The intelligent field panels shall have the ability to communicate with the following methods at a minimum: A. RS-232 Direct B. RS-232 Dial Up C. TCP/IP The host computer and the intelligent field panels shall work with bi-directional communications. The bi-directional communications feature shall be software driven in the intelligent field panel and not require additional hardware. The intelligent field panels must function correctly without the presence of the bidirectional communications. The intelligent field panel will record its activities, which occur while it cannot communicate with the host computer. When the host computer communications are re-established the intelligent field panel will upload the stored activity. The stored activity shall be divided into two priority classes. The high priority class alarms shall consist of alarm messages that are sent first to the operator when communications are restored. 4.7 Intelligent Field Panel Dial Up Capabilities [Mandatory Requirement] The intelligent field panel shall be capable of operating via dial-up communications so the host computer. The host computer shall have the ability to store different phone numbers to send to dial-up intelligent field panels. The intelligent field panels use a dedicated modem pair for communication purposes. This will reduce competition between intelligent field panels attempting to call the host computer by the same modem. If the host modem line is in use, the intelligent field panel will automatically retry until communication is made. Both the host and the intelligent filed panel shall have the capability of required callback. Required callback allows the receiving unit (Host or Intelligent Field Panel) the capability to hang up and immediately call the initiating unit back. ASI Specifications 14

15 4.8 Host Dial-Up Capabilities [Mandatory Requirement] The SMS software shall have the following capabilities in reference to record changes in dial-up intelligent field panels: A. Always dial the intelligent field panel for any record changes that affect it. B. Never dial the intelligent field panel for any record changes that affect it. C. Ask the operator with a prompt on the console to see if it should call the intelligent field panel on the record change. D. 4.9 Modular Board Options [Mandatory Requirement] The intelligent field panels shall have the capability of communicating directly with the following devices: A. Reader Interface board and/or Dual Wiegand Module B. Input Point monitoring board C. Output Relay Control board D. I/O combination board E. Elevator Control Module 4.10 Power Requirements The intelligent field panel shall be classified as a low voltage panel. The intelligent shall have power requirements of VDC linear, 4.0 Amp minimum. The AC power outlet for the power supply shall be 110 VAC, single phase, 60 Hz Panel Enclosure Specifications The panel enclosure shall be 12 1/4" x 14 1/4" x 4 1/4". The panel s operating environment shall be +35 F. to +122 F. Humidity 5% to 95% non-condensing, and power dissipation of a fully loaded intelligent field panel not to exceed 20 watts Reader Types Supported [Mandatory Requirement] The intelligent field panels shall have the ability to support the following card reader types in any combination: A. Barium Ferrite Readers B. Proximity Readers C. Mag Stripe Readers D. Biometric Readers E. Bar Code Readers F. Wiegand Readers G. Smart Card Readers The readers supported shall be off the shelf readers of a non-proprietary design. The card readers shall have the capability of supporting keypad entries if required. ASI Specifications 15

16 General Software Requirements 5.0 General Software Requirements This section presents general requirements applicable to the Offeror provided SMS software and other software components including application sub-systems. All software components supplied by the Offeror should be standard, off the shelf, fully integrated, and currently installed and accepted by the Offeror s installed user base. If any software component is to be developed or modified by the Offeror to meet the requirements specified herein, such component shall be identified explicitly in Offeror s proposal Relational Database Software [Mandatory Requirement] The SMS software shall be based on a standard relational database management system product, available commercially from a recognized industry supplier. The relational database must include standard Structured Query Language (SQL) capability. Offeror shall provide information in sufficient detail in the proposal to demonstrate compliance with this requirement Database Interface / Integration [Mandatory Requirement] The SMS software shall have the ability to import or export database information to/from recognized industry standard formats Database Backup Features / Capabilities [Mandatory Requirement] The SMS software shall have an integrated backup feature. The SMS software shall allow the user to schedule a backup based on time and frequency as well as allowing for a manual backup to be selected. The destination of the backup database may be a set location or selected via a browser function. The database may be backed up to any type of media supported by a Windows based operating system Redundant Database Capabilities The SMS software database may be doubly redundant in order to minimize down time due to a corruption. This redundancy will be performed by a system fault tolerant server setup Software Capacities System software and language development software shall be existing, industry accepted, and of a type widely used in commercial systems. Operating system shall be multi-user, multi-tasking capable of operating in a non-proprietary CPU. The application software, substantially as offered, shall be written in a high level, industry standard programming language. All system functions shall be accessible via a point and click mouse control. Systems requiring command string control or complex syntax are not acceptable. The system software shall include the following features and be configured for minimum: ASI Specifications 16

17 A. 2,4,8,16,256. Readers. In excess of 1,000+ readers may be defined. B. In excess of 100,000 cardholders may be entered and stored C. In excess of 4 simultaneous programming / workstation locations D. Supporting up to 4 simultaneous printers E. Supporting up to 255 individual Time Zones F. Supporting up to 365 defined Holidays G. Supporting View, Add, Edit, Delete access controls individually or concurrently for each of the main database tables. This feature is settable on a per operator basis. H. In excess of 100,000 operators and associated access levels supported. I. In excess of 200,000 input points supported. J. In excess of 100,000 output control relays supported. K. Audible alarm annunciation at the CPU. L. In excess of 10,000 graphic maps may be displayed on host and workstation locations limited only by the memory available on the host computer. M. Command Center conditional response, alarm response, scheduled commands, future and immediate commands N. Alarm Intrusion Monitoring O. Over 100 custom cardholder data fields in addition to standard data fields P. Cardholder access privilege activation / expiration date Q. Integrated history and alarm report capabilities R. Integrated response to pre-defined transaction activity S. Integrated CCTV response to pre-defined transaction activity T. First In/Last Out capabilities U. TCP/IP On-board Communications ASI Specifications 17

18 5.0.6 Software Operation The SMS shall provide a top down configuration methodology. Top down programming shall allow the system operator to configure the system software and hardware configurations in a logical flowing method. The system should allow the operator to start at the highest configuration level of the system and then move down through the lower configuration levels without having to move back and forth between a variety of menus. The configuration tools shall utilize intelligent configuration controls. The system shall be structured such that the operator will not be able to perform configuration functions that are not valid based upon the configuration used. Where the operator may be presented with a choice of pre-defined objects, the system will provide a pop up pick list. The operator may choose an object in the listing by double clicking on the item. If the object has not been pre-defined, the operator may define the new object from the pop up pick list. The system shall utilize colorful icons and other graphics to display information. Icons shall be provided to represent: A. Intelligent Field Panels B. Door Lock Control C. Alarm Input D. Output Control Relay E. System / Alarm Event F. Manual Operator Actions Where certain data fields within data screens may contain the same information, the system shall provide the ability to define default settings for these data entry fields. The operator shall be able to change the default setting without impacting objects that have already been defined Menu Configurations The SMS software shall allow for the configuration and programming of the database through the use of simple menu commands. The menu commands may be executed by both mouse point and click as well as keystroke control. The menu commands shall also provide for customizable lookup controls. ASI Specifications 18

19 5.0.8 Memory Configurations The allocation of memory, between database configuration records and historical event buffering, within each intelligent field panel shall be dynamic. Any memory not being used for the storage of database configuration records shall be available for the buffering of historical events. 5.1 Database Configuration The database configuration shall be in a top down methodology from intelligent field panels to the readers / I/O devices. The database shall have the capability to be partitioned into logical zones from a geographical level. Intelligent field panels partitioned to a logical zone shall receive database configuration records for that zone only, allowing for efficient data management. 5.2 Time Zone Specifications The SMS software shall allow for programming up to 255 individual time zones, each of which has its own set of start and stop time intervals. The time zones shall be configured by using a drag-select operation with the mouse and a fine tuning of the intervals using keyboard entered values as necessary. The SMS software shall allow for time zone interval exceptions Time Zone Intervals [Mandatory Requirement] Each individual time zone may have up to 15 time zone intervals associated with it. A time zone interval consists of a start day and time and a stop day and time. Single and multi week time zones shall be supported. Up to 3,825 time zone intervals may be programmed within the SMS. Time Zones may also be programmed for alternating schedules on a userdefinable weekly basis. Time Zone intervals may also be customized based on pre-defined weeks during the year Time Zone Assignments [Mandatory Requirement] Each time zone shall be configured with both a user-definable name up to 20 characters in length as well as an identifying code number. Time Zones may be assigned to the following features of the SMS: A. Access Control Clearance B. Inputs C. Outputs D. Doors E. Scheduled Functions F. Conditional Functions G. Alarm Events ASI Specifications 19

20 5.3 Holidays and Holiday Lists [Mandatory Requirement] A holiday is defined as an exception to the time zone rule. Where a given function will execute on a non-holiday, that same function will not be executed on a defined holiday. The SMS shall have the ability to define up to 365 individual holidays. Each holiday shall be identified by both a date and a name up to 20 characters in length and may also be defined as a reoccurring date. A holiday list is a grouping of defined holidays. A given function such as access granted at a door or a scheduled command will not be performed on defined holidays unless it is associated with an appropriate holiday list. The SMS shall have the ability to define up to 8 holiday lists. Each list can have any combination of the defined holidays associated with it. Holiday Lists may be assigned to the following features of the SMS: A. Access Control Clearance B. Scheduled Functions C. Conditional Functions D. Alarm Events ASI Specifications 20

21 Devices & Card Readers 6.0 Device and Card Reader Definitions [Mandatory Requirement] The SMS system shall have the ability to configure in excess of 1000 card readers and / or individual devices. Devices include items such as card readers, input monitoring boards, output control relay boards, I/O boards, and Elevator Control Modules. Each card reader or device shall have an associated user defined name up to 20 characters in length and an identifying number. Each defined card reader or door will have a door position status alarm point, request to exit input, tamper detect input, and 1 user defined input point available. 6.1 Access Modes [Mandatory Requirement] The SMS shall have the capability for defined card readers and doors to operate in the following modes: A. Card Only B. PIN Only C. Card & PIN D. Card OR PIN E. Scheduled OR Conditional Command Control 6.2 Reader Operation [Mandatory Requirement] The system shall allow a reader to be configured to operate using the following functions: A. Readers will read cards while the door is in the open position. B. Door lock will automatically lock upon the door being opened C. Automatic locking of the door lock after the door opened will be delayed for a user defined period D. Separate timers for the operation of the door lock and the software shunting of the door position status alarm point. The shunting of the door contact following the presentation of a valid access card or activation of the request to exit device shall be accomplished by software control. The use of a hardware shunt will not be accepted. 6.3 Door Alarms [Mandatory Requirement] The system shall allow each door to be configured to cause a variety of events to occur based upon activity at that door. The events may be caused by each of the following activities: A. Door Held Open / Door Forced Open B. Access Granted / Denied C. Cardholder Wrong Place / Wrong Time / Wrong PIN D. Card Expired / Inactivated E. Holiday Violation F. Tamper G. Wrong System Code H. Unknown Card ASI Specifications 21

22 6.4 Anti-Passback [Mandatory Requirement] The SMS shall provide for global and nested antipassback with the capability to be active or passive within defined areas. If set for active, the cardholder will not be granted access on an anti passback violation and an alarm will be presented to the operator. If set for passive, the cardholder will be granted access but an anti passback violation and alarm will be presented to the operator. Each door shall have the capability of being defined as neutral, in, or out in regards to anti-passback. Each door shall have the capability of being configured for one of four available passback zones. 6.5 Monitored Input Points [Mandatory Requirement] The SMS shall have the capability to define in excess of 1,024 individual monitored input points. Each input point shall be associated with a name up to 20 characters in length as well as an identifying number. The input point shall have the ability to input user defined text for both its closed and open conditions. Each input point shall be continuously monitored by the system and have the ability to be associated with an alarm definition. 6.6 Output Control Relays [Mandatory Requirement] The SMS shall have the capability to define in excess of 1,024 individual output controlled relays. Each relay shall have a userdefined name up to 20 characters in length and an identifying number. The open and closed contact states of the relay shall have a text description of up to 20 characters in length and shall be programmable for latched or pulsed activation duration. Pulsed activation shall be programmed for a pulse time of 1 to 254 seconds. Each output relay control may be associated with manual, scheduled, future, conditional, or alarm response commands. 6.7 Elevator Control Modules [Mandatory Requirement] The SMS shall have the capability to control up to 60 elevator controlled floors using an elevator control module. The elevator control module shall have the capability to provide fireman s override control as necessary. The SMS shall have the capability to define floor lists by user-defined name up to 20 characters in length and an identifying number. Each floor list shall be available for selection by the individual access groups that can be assigned to the cardholder, thus providing floor access on an individual cardholder basis. ASI Specifications 22

23 6.8 Areas [Mandatory Requirement] The SMS shall have the capability to group individual devices into an area. The area shall have a user definable name up to 20 characters in length and an identifying number. The area may be associated with manual, scheduled, conditional, or alarm response commands. Access Groups 7.0 Access Groups [Mandatory Requirement] The SMS shall have the capability to define up to 65,025 total access groups with 255 access groups defined per zone. An access group is defined as the identifier of individual readers combined with time zones. Each access group shall have a user-defined name up to 20 characters in length and an identifying number. 7.1 Access Group Assignments [Mandatory Requirement] The SMS shall have the capability to add any defined door and any defined time zone to an access group. The number of doors and time zones associated with any individual access group shall be able to exceed 100,000. The Access Group Assignment shall be graphically portrayed so that the time graph represents the time frame when a group can access each location. The Assignments area of the program shall also provide instant look up buttons for searches by group or by device. ASI Specifications 23

24 Cardholder Records 8.0 Cardholder Records [Mandatory Requirement] The SMS shall have the capability to define in excess of 100,000 individual cardholder records. Each record shall be able to exceed 100 data fields, both fixed and user-definable. Holiday lists, access groups, and anti-passback settings can also be associated with the cardholder record, as well as the fixed and user-definable data fields. 8.1 Card Data [Mandatory Requirement] The SMS shall have the capability to allow for encoded card numbers up to 9 digits in length and embossed numbers up to 16 digits. 8.2 Cardholder Record Information [Mandatory Requirement] The cardholder record shall consist of a minimum of the following data fields: A. Cardholder Name: Last, First, Middle Initial B. Encoded Card Number C. Embossed Card Number D. Activation Date E. Expiration Date F. Status: Active, Inactive G. Reason H. Cardholder Image File Name I. Group Memberships J. Holiday List Associations K. Anti-Passback Levels and Status L. In Excess of 100 Customizable Data Fields M. Last Reader Used N. Social Security Field (password protected) O. Employee Number (password protected) 8.3 Cardholder Image [Mandatory Requirement] The cardholder record shall have the capability of associating and viewing up to 4 digital images related to the individual. The images shall be in a *.jpg or *.pcx, or *.bmp format. The image name may be entered in via keyboard or selected from a pick list. 8.4 Cardholder Query Capabilities [Mandatory Requirement] The SMS shall allow queries to be performed on any field within the cardholder record. The system shall allow the queries to be performed based upon partial entry of data in a field, i.e. entering FI in the cardholder name field will return all records where the name begins with the letters FI. ASI Specifications 24

25 8.5 Cardholder Last Reader Used [Mandatory Requirement] The SMS shall have the capability to show the cardholders last reader used within the individual cardholder record. The last reader used field shall be dynamic, changing states whether the record is open or closed. 8.6 Cardholder Import/Export Capabilities [Mandatory Requirement] The SMS shall provide means for bulk loading of card records through the use of a data file generated from another source. The external file shall be an ASCII file in a delimited format. The SMS shall also provide the ability to generate the same format file of existing card records, allowing the information in the system to be exported to other computers and applications. The system shall allow the user to select the card records that will be included in the export file. 8.7 Cardholder Previous Activity Report [Mandatory Requirement] The SMS shall provide the ability to review the previous activity of the cardholder, while viewing the individual s cardholder record. Depressing the associated icon shall perform a historical search for all previous access activity for the cardholder. This information shall be displayed to the system operator, with the ability to generate a report, either to a file or printer. 8.8 Group Access Limits [Mandatory Requirement] The SMS shall provide the ability to associate each cardholder with up to 12 access groups within any zone. 8.9 Holiday List Associations [Mandatory Requirement] The SMS shall provide the ability to associate each cardholder with up to 8 holiday lists. This feature allows multi-tenant buildings to more accurately control access for special interests on holidays such as cleaning and maintenance crews, administration needs, etc Card Holder Associated Layout [Mandatory Requirement] The SMS shall provide the ability to associate each card holder record with a badge layout. The SMS shall also keep track of the badge print count. ASI Specifications 25

26 System Operators 9.0 System Operators [Mandatory Requirement] The SMS shall provide the ability to define in excess of 100,000 system operators. Each operator may be assigned any combination of privileges. 9.1 Password Protection [Mandatory Requirement] Each operator defined within the SMS shall have a password up to 20 characters in length. The SMS shall have the ability to require a password to be changed based on a user-defined period of time. If no time limit is entered, the password will not expire. 9.2 Privilege Levels [Mandatory Requirement] Privilege Levels of View, Add New, Change Existing, and Delete shall be individually selectable for all tables in the database. Privilege levels shall be assignable to the following menu functions at a minimum: A. Database Configuration B. Alarm Activity & Routing C. Event Monitoring D. Reporting E. Administration F. External Applications The SMS software package shall have the ability to limit the operator from being able to exit the security system. In addition, the SMS shall have the ability to limit the operator from running external software packages in conjunction with the security system. 9.3 Operator History Reporting [Mandatory Requirement] All event transactions by a system operator including manually issued commands, alarm acknowledgement, etc. shall be stored in the historical archive for later recall. Depressing the associated icon shall perform a historical search for all previous access activity for the operator. This information shall be displayed with the ability to generate a report, either to a file or printer. 9.4 Alarm Routing [Mandatory Requirement] The SMS shall have the ability to route alarms to individual operators based on type and priority level of the alarm. All or none shall also be selections for alarm routing if the user determines not to address alarms by type. ASI Specifications 26

27 Commands 10.0 SMS Command Structure [Mandatory Requirement] The SMS shall have the ability to support manual, scheduled, future, conditional, and alarm response commands to doors, areas, and output control relays. Memory shall be allocated on the intelligent field panels to accommodate the scheduled, future, and conditional commands such that they operate independently of the host computer Scheduled Commands [Mandatory Requirement] The SMS shall have the ability to schedule commands to a door, area, or output control relay based on a defined time zone. The SMS shall also have the ability to associate the scheduled command to a holiday list for activating or ignoring the command as specified 10.2 Conditional Response Commands [Mandatory Requirement] The SMS shall have the ability to perform conditional response commands to a door, area, or output control relay based on a selected event and a defined time zone. Selected events can include any monitored input point status or door related event. The SMS shall also have the ability to associate the scheduled command to a holiday list for activating or ignoring the command as specified Future Commands [Mandatory Requirement] The SMS shall have the ability to perform future commands to a door, area, or output control relay based on a selected date and time. A future command is defined as a one time only activation or deactivation of a door or output control relay Alarm Response Commands [Mandatory Requirement] The SMS shall have the ability to perform commands based on alarm response input. The SMS will issue commands to a door, area, or output control relay based on a selected alarm type or priority and associated time zone. The SMS shall also have the ability to associate the alarm response command to a holiday list for activating or ignoring the command as specified Manually Issued Commands [Mandatory Requirement] The SMS shall allow privileged operators to manually issue commands to doors, areas, and output control relays. ASI Specifications 27

28 Graphic Map Files 11.0 Graphic Map Files [Mandatory Requirement] The SMS shall have the ability to import existing image files such as site drawings, maps, schematics, etc for viewing within the application. These files may be called up and displayed during alarm events. The SMS shall also have the capability to nest maps allowing the operator to drill into and drill out of the hierarchy of maps Graphic File Formats [Mandatory Requirement] The graphic map files supported shall be of the following image file formats: A. *.bmp B. *.dib C. *.cmp D. *.cal E. *.img F. *.ica G. *.jpg H. *.jff I. *.jtf J. *.pct K. *.mac L. *.msp M. *.pcd N. *.pcx O. *.eps P. *.ras Q. *.tif R. *.wmf S. *.fxs T. *.wpg U. *.tga 11.2 Graphic File Limits [Mandatory Requirement] The SMS shall support in excess of 10,000 image files limited only by the memory available on the host computer Graphic Map File Editor [Mandatory Requirement] The SMS shall support editing of the map files to include a flashing target for alarm placement. It shall also support the creation of a hot zone which establishes a parent / child relationship to another map. Clicking on the hot zone with the mouse buttons will bring up the parent or child map as specified. ASI Specifications 28

29 11.4 Graphic Map File Nesting [Mandatory Requirement] The SMS shall support nesting of maps or the creation of parent / child relationships. Using a click and drag function on the mouse, a hot zone will be created on the map which can then be associated with another graphic map file. In excess of 50 map files may be nested in a parent / child relationship. The SMS shall provide for a test function of the nesting within the graphic map file editor allowing the user to view sequenced images separate from an actual alarm that requests the images. Alarms 12.0 Alarms [Mandatory Requirement] The SMS shall have the capability of presenting alarms to the operator based on defined system events or monitored input points. The alarm shall display direct information about the alarm, any graphic map files associated with it, and cardholder record information if the alarm was caused by a known cardholder. Individual alarms shall be named by up to 20 characters and also an identifying number Alarm Types [Mandatory Requirement] The SMS shall allow the user to define types of alarms such as maintenance, security breach, etc. Individual alarms defined within the SMS can then be associated with an alarm type. The defining of types allows the user to route specific alarm types to the appropriate operator optimizing the efficiency of the system. In excess of 100 alarm types are supported by the SMS 12.2 Alarm Configuration [Mandatory Requirement] The SMS shall allow the user to configure the alarm by using a combination of drop down pick lists, and selection forms. Depending on the source of the alarm, only applicable conditions will be available for selection Alarm Time Zone [Mandatory Requirement] The SMS shall allow the individual alarm to be associated with any defined time zone. The time zone for the alarm will be graphically represented on the alarm without the operator having to exit to another section of the SMS Alarm Instructional Text [Mandatory Requirement] The SMS shall allow the operator to define specific instructional text which can be associated with the alarm definition. Instructions will be given an identifying number as defined by the operator. The operator can then select the instructional text appropriate for the alarm being defined. Up to 255 characters can be stored for each instruction defined. ASI Specifications 29

30 12.5 Alarm Comments By Operator [Mandatory Requirement] The SMS shall support the ability to allow operators to manually enter comments about the alarm. A comments section within the active alarm screen shall store all comments and allow them to be viewed Alarm Map Definitions [Mandatory Requirement] The SMS shall support the capability to view graphic map files associated with an alarm event. The viewing of the map files must be within the alarm screen. Exiting to another section of the security system to view an associated map is not acceptable. The SMS shall also allow the operator to define the alarm map and the highest level parent map, if it is of a nested configuration. All maps in order of the parent map selected down to the alarm map shall be viewable from the alarm screen by drilling in or drilling out of the maps by mouse click Alarm Priority Levels [Mandatory Requirement] The SMS shall support the capability of prioritizing alarms from a level of 0 to 9. A priority level of 0 effectively ignores the alarm. A priority of 9 will cause this level of alarm to supersede others of lower priority and be presented first on the alarm screen Alarm Redundancy Counter [Mandatory Requirement] The SMS shall have the ability to count the number of times an alarm is triggered while in an alarm state. The alarm screen shall show this dynamic number and its time of first occurrence as well as the most recent time it has been triggered Alarm Testing [Mandatory Requirement] The SMS shall have the ability to test the alarm by pressing the test icon on the alarm definition screen. This function will activate the alarm monitor screen and any associated instructional text, maps, etc. that have been defined with the alarm Alarm History Reporting [Mandatory Requirement] The SMS shall have the ability to bring up a report on the specific alarms recent activity. By pressing the associated icon the SMS will search for all alarm events associated with this specific alarm. A report will be presented which can be printed or saved to a file. ASI Specifications 30

S P E C I A L E D I T I O N E N T R A P A S S TM

S P E C I A L E D I T I O N E N T R A P A S S TM S P E C I A L E D I T I O N E N T R A P A S S TM Architectural and Engineering Specifications Access Control and Integrated Systems DN1610-1004 / Version 4.03 TABLE OF CONTENTS PART I GENERAL... 3 1.1

More information

Network Based Security Made Easy

Network Based Security Made Easy Network Based Security Made Easy Installation & User s Guide Technical Support: (651) 453-1483; Fax: 651-453-1338, http://www.access-specialties.com Table of Contents Copyright 2009 Access Specialties

More information

SiPass Software. Fire & Security Products. SiPass integrated

SiPass Software. Fire & Security Products. SiPass integrated SiPass Software SiPass integrated Flexible structure for each demand Easy installation and administration Expansion modules optionally available High operational ease by Graphic User Interface Access control

More information

PW6000 Modular Access Control System PW6000 Intelligent Controllers and Modules

PW6000 Modular Access Control System PW6000 Intelligent Controllers and Modules Modular Access Control System The next generation of the PW-Series family improves on the existing PW technology to offer superior features and benefits. The PW-Series Modular Control System is an advanced

More information

Smart HUB - HUB to expand one Master Controller s RS-485 port to 8 RS-485 ports - Use 12VDC power

Smart HUB - HUB to expand one Master Controller s RS-485 port to 8 RS-485 ports - Use 12VDC power Hardware Overview - SmartKey Master Controller - Smart HUB - - RFID Readers Master Controller HUB Features: RFID Readers SmartKey Master Controller - 1MB internal memory (2MB optional), can hold up to

More information

C O R P O R A T E E D I T I O N E N T R A P A S S TM

C O R P O R A T E E D I T I O N E N T R A P A S S TM C O R P O R A T E E D I T I O N E N T R A P A S S TM Architectural and Engineering Specifications Access Control and Integrated Systems DN1609-1004 / Version 4.03 TABLE OF CONTENTS PART I GENERAL... 4

More information

DPT - EN1 R1 Users Manual

DPT - EN1 R1 Users Manual DPT - EN1 R1 Users Manual Revision Date: 4 September, 2002 Product User s Notice No part of this manual, including the products and software described in it, may be reproduced, transmitted, transcribed,

More information

Cardax FT Series 3 Command Centre

Cardax FT Series 3 Command Centre SERIES 3 Series 3 Command Centre Command Centre Series 3 Command Centre is the system software, supporting up to 64 doors, for Series 3 - an effective access control and alarms management security system.

More information

LiteKeeper 4. Stand Alone Lighting Control Panel Technical Specifications PART 1. GENERAL 1.01 INTRODUCTION 1.02 DESCRIPTION OF WORK

LiteKeeper 4. Stand Alone Lighting Control Panel Technical Specifications PART 1. GENERAL 1.01 INTRODUCTION 1.02 DESCRIPTION OF WORK LiteKeeper 4 Stand Alone Lighting Control Panel Technical Specifications PART 1. GENERAL 1.01 INTRODUCTION The work covered in this section is subject to all of the requirements in the General Conditions

More information

TCS Access Control System Cheat Sheet

TCS Access Control System Cheat Sheet TCS Access Control System Cheat Sheet Access Control Main Screen 1 Toolbar 2 Device View Toolbar No. Name Function 1 Login Logs in the ASServer. 2 Logout Logs out the ASServer. 3 Devices Defines controllers

More information

Architectural and Engineering Specification. Brivo ACS 5000 Control Panels and ACS Service

Architectural and Engineering Specification. Brivo ACS 5000 Control Panels and ACS Service Architectural and Engineering Specification Brivo ACS 5000 Control Panels and ACS Service Document Number: MKT-DOC-006 November 22, 2005 Architectural and Engineering Specification Page 1 Table of Contents

More information

Smart Access Control System Software. User Manual. Version 1.0

Smart Access Control System Software. User Manual. Version 1.0 Smart Access Control System Software User Manual Version 1.0 Copyright MaCaPS International Ltd. 2002 This manual was produced by MaCaPS International Ltd. MaCaPS International Ltd. http://www.macaps.com.hk

More information

Why is the Maxxess/Salto integration different from all other SALTO integrations?

Why is the Maxxess/Salto integration different from all other SALTO integrations? Why is the Maxxess/Salto integration different from all other SALTO integrations? SALTO, one of the fastest growing wireless access control companies, and Maxxess, the leader in open, integrated systems

More information

SPECIAL SPECIFICATION 1432 Computer Equipment

SPECIAL SPECIFICATION 1432 Computer Equipment 1993 Specifications CSJ s 0326-01-030 & 0507-03-037 SPECIAL SPECIFICATION 1432 Computer Equipment 1. Description. This Item shall govern providing, for the Department s use, desktop microcomputers, laptop

More information

ACCESS CONTROL SOFTWARE V3.1 REFERENCE MANUAL

ACCESS CONTROL SOFTWARE V3.1 REFERENCE MANUAL ACCESS CONTROL SOFTWARE V3.1 REFERENCE MANUAL 01/2004 Centaur is a registered trademark of Position Technology INC. Pro-Report, Tracker, FrontGuard and FrontView are trademarks of Position Technology Inc.

More information

ivms-4200 Access Control Client User Manual UD00895N

ivms-4200 Access Control Client User Manual UD00895N ivms-4200 Access Control Client User Manual UD00895N User Manual About this Manual This Manual is applicable to ivms-4200 Access Control Client. The Manual includes instructions for using and managing

More information

SECTION ACCESS CONTROL/SECURITY SYSTEM

SECTION ACCESS CONTROL/SECURITY SYSTEM 10731 Rockwall Road Dallas, Texas 75238 (214) 553-6140 voice (214) 553-6147 facsimile (888) 419-8353 voice http:/www.dsxinc.com Email: sales@dsxinc.com SPECIFICATION GUIDE SECTION 13700 ACCESS CONTROL/SECURITY

More information

G L O B A L E D I T I O N E N T R A P A S S TM

G L O B A L E D I T I O N E N T R A P A S S TM G L O B A L E D I T I O N E N T R A P A S S TM Architectural and Engineering Specifications Access Control and Integrated Systems DN1606-1004 / Version 4.03 TABLE OF CONTENTS PART I GENERAL... 4 1.1 GENERAL

More information

PRO2200 Professional Modular Access Control Hardware

PRO2200 Professional Modular Access Control Hardware PRO2200 Access Control Hardware As a part of the WIN-PAK software controlled hardware family the PRO2200 professional modular access control hardware is an advanced access control panel capable of providing

More information

IS2000. Administrative Operator s Guide

IS2000. Administrative Operator s Guide IS2000 Administrative Operator s Guide Table of Contents Logging Off... 7 Event Manager... 7 HARDWARE MANAGER... 8 Maneuvering the Hardware Tree... 8 Unlocking the Module... 8 Viewing the Hardware Tree...

More information

PRO3200 Professional Modular Access Control Hardware

PRO3200 Professional Modular Access Control Hardware PRO3200 Access Control Hardware As a part of the WIN-PAK software controlled hardware family the PRO3200 professional modular access control hardware is an advanced access control panel capable of providing

More information

1993 Specifications CSJ SPECIAL SPECIFICATION ITEM Transportation Management Console

1993 Specifications CSJ SPECIAL SPECIFICATION ITEM Transportation Management Console 1993 Specifications CSJ 0598-01-057 1.0 Description SPECIAL SPECIFICATION ITEM 6398 Transportation Management Console This Item shall govern for the furnishing and installation of Transportation Management

More information

IQ Series Architect/Engineer Guide Specification P/N Revision 5.0

IQ Series Architect/Engineer Guide Specification P/N Revision 5.0 IQ Series Architect/Engineer Guide Specification P/N 37-20002-001 Revision 5.0 PCSC 3541 Challenger St. Torrance, California 90503 Phone/Fax: (310) 303-3600 Web Site: http://www.1pcsc.com E-Mail: Sales@1PCSC.COM

More information

Access Easy Control System. Reference Guide

Access Easy Control System. Reference Guide Access Easy Control System Reference Guide Content 3 1. AEC System Overview 4 2. AEC Main Components 6 3. AEC Configuration 7 4. AEC Benefits 8 5. AEC Easy Ordering 10 6. AEMC More than 16 readers? 12

More information

First Access Express OPERATOR GUIDE

First Access Express OPERATOR GUIDE First Access Express OPERATOR GUIDE October 2016 Cutting edge simplicity Table of Contents Introduction... 4 PC Requirements... 5 Step 1. Software Installation... 5 Complete Installation Server and Client...

More information

SK-NET. Version 2. Installation and Operating Manual

SK-NET. Version 2. Installation and Operating Manual SK-NET Version 2 Installation and Operating Manual Version Note: This manual covers features available in SK-NET Version 2.40. A few features described in this manual are only available with SK-ACP and

More information

AXP-400. Enterprise. Access Solution

AXP-400. Enterprise. Access Solution Enterprise Access Solution The Enterprise Solution The scalable Amano AXP-400 facility management solution offers control of up to 4,000 doors and 160,000 tagholders per site (supporting multiple sites

More information

Product Feature Matrix

Product Feature Matrix Business Policies Available Through Distributors Yes Yes Yes Yes Yes Yes Yes Available Through Dealers Yes Yes Yes Yes Yes Yes Yes Available Through Integrators Yes Yes Yes Yes Yes Yes Yes System Architecture

More information

CHECKLIST FOR IT AND SECURITY PERSONNEL

CHECKLIST FOR IT AND SECURITY PERSONNEL ABSTRACT This document describes basic requirements for PC, Operating Systems and Networks for IDenticard PremiSys Software CHECKLIST FOR IT April 17, 2018 AND SECURITY PERSONNEL IDenticard PremiSys v3.2

More information

T h e re is an upgrade route to larger configurations. O v e rv i e w

T h e re is an upgrade route to larger configurations. O v e rv i e w AMAG 625 Lite Overview AMAG 625 Lite Softwar e AMAG 625 Lite Software is very user friendly and incorporates best of breed functionality including: Comprehensive on-line help Dynamic Maps Flexible card

More information

FACIAL RECOGNITION TERMINAL SYSTEM

FACIAL RECOGNITION TERMINAL SYSTEM StoneLock is a global leader in designing and manufacturing secure access control solutions. We are proud to build and design the most secure, reliable and user-friendly access control products for both

More information

Versa XS 3.0. Advanced Programming Guide. Versatile Access Control Programming Software for EL Models

Versa XS 3.0. Advanced Programming Guide. Versatile Access Control Programming Software for EL Models TM Versa XS 3.0 Advanced Programming Guide Versatile Access Control Programming Software for EL Models TM VERSA XS SET UP & OVERVIEW............... 2-9 About Versa XS.............................. 2 Direct

More information

2010 Product Line Catalog

2010 Product Line Catalog 2010 Product Line Catalog emerge Embedded Software Systems w Part of Access SySTEM From enterprise-wide security management to small and mid-size access control, Linear s IEI brand has a choice of, giving

More information

Access control software SENATORFX. Quick start guide

Access control software SENATORFX. Quick start guide Access control software SENATORFX Quick start guide CONTENTS p.2/23 CONTENTS CONTENTS...2 INFORMATION...3 1) PC specifications...3 2) RS485 bus connections...4 3) Ethernet network connections...5 4) Software

More information

Installation & operation manual SUPERVISOR SOFTWARE KaDe Premium Plus II

Installation & operation manual SUPERVISOR SOFTWARE KaDe Premium Plus II Installation & operation manual SUPERVISOR SOFTWARE KaDe Premium Plus II V 1.1.0026.138B Update: 15-05-2018 R2 CONTENTS Chapter 1 Introduction 1.1 General information................. 5 1.2 System functions

More information

You have accessed an older version of a Paradyne product document.

You have accessed an older version of a Paradyne product document. You have accessed an older version of a Paradyne product document. Paradyne is no longer a subsidiary of AT&T. Any reference to AT&T Paradyne is amended to read Paradyne Corporation. Paradyne 6700-A2-GB41-10

More information

Startup Guide. NetAXS-123. Version 5.2

Startup Guide. NetAXS-123. Version 5.2 NetAXS-123 Startup Guide Version 5.2 This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2)

More information

2013 May. AxTraxNG Access Control Management Software Software Manual (Version 22.x)

2013 May. AxTraxNG Access Control Management Software Software Manual (Version 22.x) 2013 May AxTraxNG Access Control Management Software Software Manual (Version 22.x) Copyright 2013 by Rosslare. All rights reserved. This manual and the information contained herein are proprietary to

More information

Legrand Access System Software USER GUIDE

Legrand Access System Software USER GUIDE Legrand Access System Software USER GUIDE Introduction The Legrand Access System Software package is part of a series of tools developed by Legrand to manage building access control in the tertiary sector.

More information

AxTraxNG Access Control Management Software Software Manual (Version 27.x)

AxTraxNG Access Control Management Software Software Manual (Version 27.x) AxTraxNG Access Control Management Software Software Manual (Version 27.x) Copyright 2015 by Rosslare. All rights reserved. This manual and the information contained herein are proprietary to ROSSLARE

More information

Lesson 1: Preparing for Installation

Lesson 1: Preparing for Installation 2-2 Chapter 2 Installing Windows XP Professional Lesson 1: Preparing for Installation When you install Windows XP Professional, the Windows XP Professional Setup program allows you to specify how to install

More information

CCURE Access Control Plugin and Video Integration Guide 3.2. Click here for the most recent version of this document.

CCURE Access Control Plugin and Video Integration Guide 3.2. Click here for the most recent version of this document. CCURE Access Control Plugin and Video Integration Guide 3.2 Click here for the most recent version of this document. Document last updated: November 22, 2017 Copyright notice Genetec Inc., 2017 Genetec

More information

ATL20 ATL30 Automatic transfer switch controller

ATL20 ATL30 Automatic transfer switch controller I 194 GB 07 07 ATL20 ATL30 Automatic transfer switch controller REMOTE CONTROL SOFTWARE MANUAL Summary Introduction... 2 Minimum resources of the PC... 2 Installation... 2 Activation of the PC-ATL connection...

More information

Smart Access Control System Software User Manual (Client Version)

Smart Access Control System Software User Manual (Client Version) Disclaimer Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced

More information

SmartLock Surf OPERATOR GUIDE

SmartLock Surf OPERATOR GUIDE SmartLock Surf OPERATOR GUIDE May 2015 Table of Contents Introduction... 5 Server PC Requirements... 7 Client PC Requirements... 7 Step 1. Software Installation... 8 Step 2. Firewall... 8 Step 3. Port

More information

Product Overview. Revision 1.3

Product Overview. Revision 1.3 Product Overview Revision 1.3 Revision History Revision 1.0 Initial release. Revision 1.1 HS changed to CP - page 7& 8 Revision 1.2 CP changed to Secure Changed Drawing on page 8 Revision 1.3 Added Off-Line

More information

System Overview. EcoSystemTM Bus. IR Receiver. Occupant Sensor. IR Remote 1 Supplied by others

System Overview. EcoSystemTM Bus. IR Receiver. Occupant Sensor. IR Remote 1 Supplied by others System Overview Quantum-1 4-23-07 QuantumTM QuantumTM is a facility management solution that creates a flexible, productive, and energy-efficient environment for an entire building or campus by enabling

More information

GLOSSARY. See also: Access point

GLOSSARY. See also: Access point GLOSSARY A Access level A set of access points, each with a corresponding time schedule, that determine where and when a badge holder has permission to pass through an access point. See also: Access point

More information

Keyscan Aurora Software

Keyscan Aurora Software Keyscan Aurora Software Advanced Features Multi-Threaded Communication: The dawn of a new age for access control. Aurora's all new communication structure provides simultaneous communication to all IP

More information

RK-LINK TM Version 2.x Instructions

RK-LINK TM Version 2.x Instructions Quick Start Steps Requirements - Windows 95 or Windows NT 4.0 or later, 16MB RAM, 20-30MB Hard Disk, 486 or better processor, Serial COM Port capable of 19.2K Baud. RKAT Module must be installed at the

More information

User's Manual. Access Control System. Version April 2001

User's Manual. Access Control System. Version April 2001 Win Access 2000 Version 3.00 User's Manual Version 3.00 April 2001 Access Control System The manufacture has taken due care in preparing this documentation. Due to lead time required for printing, some

More information

Monitoring Supervisor Guide. Access Control Manager Software Version

Monitoring Supervisor Guide. Access Control Manager Software Version Monitoring Supervisor Guide Access Control Manager Software Version 5.10.10 2018, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, ACCESS CONTROL MANAGER, ACM, ACM VERIFY AND TRUSTED

More information

MICROTRAK EVOLUTION.NET USER GUIDE

MICROTRAK EVOLUTION.NET USER GUIDE MAN047-08 AUGUST 2016 GETTING STARTED Microtrak Evolution.NET consists of easy to use, intuitive modules. They cover the main areas of operation - User Management, Personnel Management, Facility Management,

More information

Central Monitoring by Center V2

Central Monitoring by Center V2 CHAPTER 9 Central Monitoring by Center V2 With Center V2, central monitoring station (CMS) can be deployed immediately because it brings multiple GV systems together into an integrated interface, allowing

More information

Car Park Control System Software User Manual

Car Park Control System Software User Manual Disclaimer Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced

More information

AlphaVision PC. Embedded PC Graphical LED Displays

AlphaVision PC. Embedded PC Graphical LED Displays Embedded PC Graphical LED Displays PRODUCT OVERVIEW Adaptive Micro Systems is proud to present the new AlphaVision PC family of LED alphanumeric and graphical displays. What makes this product line unique

More information

Midpoint Security,

Midpoint Security, User Manual Revision: 6, Date: October 4, 009 Midpoint Security, UAB, Kaunas, Lithuania www..emssa.net TABLE OF CONTENTS Copyright notice... Liability waiver... Introduction... 4 Overview... Settings tab...

More information

Single-Door + Multi-Function

Single-Door + Multi-Function Single-Door + Multi-Function Overview The Single-Door Access Control System is specially designs with proven and reliable proximity whereby it can be switched to other modes like Standalone, PC Control,

More information

SPECIAL PROVISION TO SPECIAL SPECIFICATION Computer Equipment

SPECIAL PROVISION TO SPECIAL SPECIFICATION Computer Equipment 1993 Specifications CSJ 0015-13-244 SPECIAL PROVISION TO SPECIAL SPECIFICATION 5865--001 Computer Equipment For this project, Special Specification Item 5865, Computer Equipment, is hereby amended with

More information

UP-2000 Universal Panel Installation & User's Guide

UP-2000 Universal Panel Installation & User's Guide Copyright 2009, Access Specialties International, LLC All Rights Reserved. UP-2000 Universal Controller Table of Contents Introduction--------------------------------------------------------------- pg

More information

LIVE PLAYER. VR-5033 (Applicable to VR-5000 software version )

LIVE PLAYER. VR-5033 (Applicable to VR-5000 software version ) LIVE PLAYER VR-5033 (Applicable to VR-5000 software version 2.07.00) TABLE OF CONTENTS FOREWORD... ii 1. INSTALLATION... 1 1.1 Requirements... 1 1.2 Software Installation... 1 2. PLAYER CONFIGURATION...

More information

Integrated Access Control Alarm Management System

Integrated Access Control Alarm Management System Integrated Access Control Alarm Management System Installation Guide PUBLICATION INFORMATION Full Release 1 Protégé System Management Suite Installation Guide PREFACE Copyright Notice Copyright 2004-2007

More information

Integra32. Integrated Alarm Monitoring and Access Control USER MANUAL

Integra32. Integrated Alarm Monitoring and Access Control USER MANUAL Integra32 Integrated Alarm Monitoring and Access Control USER MANUAL C o p y r i g h t N o t i c e Copyright 1995 2010 by All rights reserved Worldwide. Printed in Canada. This publication has been provided

More information

Superview INSTRUCTIONS. Version 2.0x

Superview INSTRUCTIONS. Version 2.0x INSTRUCTIONS Version 2.0x INDEX INDEX... 1 INTRODUCTION... 2 INSTALLING SUPERVIEW... 3 SYSTEM REQUIREMENTS... 3 INSTALLATION PROCEDURES... 3 FIRST STEPS... 4 CREATING A SIMPLE APPLICATION... 4 Start...

More information

using optional EMX 190 expansion modules), and makes access decisions based on its own distributed

using optional EMX 190 expansion modules), and makes access decisions based on its own distributed Infinity ACX 700 Access Control Unit The Infinity ACX 700 is a programmable, stand-alone access controller that is a basic building block of the Infinity Security Management System. Each ACX 700 controls

More information

NDA ISSUE 1 STOCK # MATWorX 32 User s Guide. December, NEC America, Inc.

NDA ISSUE 1 STOCK # MATWorX 32 User s Guide. December, NEC America, Inc. NDA-24215 ISSUE 1 STOCK # 151942 MATWorX 32 User s Guide December, 1997 NEC America, Inc. LIABILITY DISCLAIMER NEC America, Inc. reserves the right to change the specifications, functions, or features,

More information

Controller Cardax FT Controller The CardaxFT Controller 5000 is the intelligent field controller in the CardaxFT security system.

Controller Cardax FT Controller The CardaxFT Controller 5000 is the intelligent field controller in the CardaxFT security system. The features described in this data sheet are being progressively added to the CardaxFT Controller (5000 Series) during 2002/2003. Please contact Cardax for further information. Cardax FT Controller 5000

More information

Cardax FT Command Centre

Cardax FT Command Centre Cardax FT Command Centre Cardax FT Command Centre is the central management tool for the Cardax FT system. The software is powerful, and caters for a versatile feature set. From the suite of security systems

More information

Controlsoft Identity and Access Management Software Controlsoft Identity Access Management Software

Controlsoft Identity and Access Management Software Controlsoft Identity Access Management Software Controlsoft Identity Access Management Software IA Server Software Installation Guide v8.0.229 2018 Controlsoft Ltd 9010-0050 Issue 6 Page 1 of 39 29/10/2018 Contents 1. Introduction... 3 1.1. PC Specifications...

More information

GETTING STARTED. Installing the System 2000 Hardware. Configuring Your System 2000 Hardware. Troubleshooting. Configuring Your System 2000 Network

GETTING STARTED. Installing the System 2000 Hardware. Configuring Your System 2000 Hardware. Troubleshooting. Configuring Your System 2000 Network SYSTEM 2000 GETTING STARTED Installing the System 2000 Hardware Whether you are upgrade an existing System 2, or this is a brand new installation, there will be some hardware installation involved. We

More information

SPECIAL SPECIFICATION 1252 System Control Unit Console

SPECIAL SPECIFICATION 1252 System Control Unit Console 1993 Specifications CSJ 0924-06-147, etc. SPECIAL SPECIFICATION 1252 System Control Unit Console 1. Description. This Item shall govern for the furnishing and installation of system control unit (SCU)

More information

Pyxis ScrubStation system version 7.0 specifications

Pyxis ScrubStation system version 7.0 specifications Integrated scrub management system The Pyxis ScrubStation system v7.0 brings a number of new features to the Pyxis ScrubStation family of products, which can speed access, ensure garment availability and

More information

Access Easy Controller 2.1

Access Easy Controller 2.1 Systems Access Easy Controller 2.1 Access Easy Controller 2.1 4 access Wiegand readers expandable to 16 Capacity up to 20,480 card holders and 100,000 transactions Classify cardholders based on 254 access

More information

Access Control Database User Manual

Access Control Database User Manual Access Control Database User Manual P/N 270961 Rev 1.0 25OCT01 DEVELOPED BY COPYRIGHT NOTICE TRADEMARKS CREDITS Edwards Systems Technology 6411 Parkland Drive Sarasota, FL 34243 (941) 739-4300 Copyright

More information

CA-A480-A Elevator Controller. Reference & Installation Manual

CA-A480-A Elevator Controller. Reference & Installation Manual CA-A480-A Elevator Controller Reference & Installation Manual TABLE OF CONTENTS INTRODUCTION.................................................................. 4 Introduction.............................................................................................

More information

Import Push [F9] - Imp./Exp. Select Restore accounts from Disk Enter the exported file name along with the it s directory location

Import Push [F9] - Imp./Exp. Select Restore accounts from Disk Enter the exported file name along with the it s directory location Espload Open Port Faillure Solution. The following link http://support.microsoft.com/ explains why this error message (OPEN PORT FAILURE) is prompted. Please take some time to read it and attempt the solution

More information

TAC I/NETTM 1284, 1280, Security Control Unit

TAC I/NETTM 1284, 1280, Security Control Unit TAC I/NETTM The SCU () family of modular, stand-alone controllers are basic building blocks of the I/NET Seven Security Management System, and provide a flexible mix of door control and alarm monitoring

More information

SCLIntra Enterprise Product Summary

SCLIntra Enterprise Product Summary SCLIntra Enterprise Product Summary SCLIntra uses barcoding technology to monitor and control the flow of tangible objects mail, parcels, property, files or people as they enter and move through a facility.

More information

Table of Contents. 1 Introduction. 2 Wireless Configurations. 3 Setting Up your LAN Administrator Station

Table of Contents. 1 Introduction. 2 Wireless Configurations. 3 Setting Up your LAN Administrator Station Table of Contents 1 Introduction About Avaya Wireless 1-1 About Avaya Wireless Tools 1-2 About Avaya Wireless Access Points 1-5 About This User s Guide 1-6 About Icons used in this Document 1-7 On-line

More information

1.0. Quest Enterprise Reporter Discovery Manager USER GUIDE

1.0. Quest Enterprise Reporter Discovery Manager USER GUIDE 1.0 Quest Enterprise Reporter Discovery Manager USER GUIDE 2012 Quest Software. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

The Cardax FT Controller 6000 can support up to 16 GBUS devices.

The Cardax FT Controller 6000 can support up to 16 GBUS devices. The Cardax FT Controller 6000 is a powerful modular, intelligent field controller for processing, storing and communicating large amounts of data in real time, independently of the Cardax FT Command Centre

More information

SCADA. SurvalentONE. STC Explorer

SCADA. SurvalentONE. STC Explorer SurvalentONE SCADA SurvalentONE SCADA Survalent SCADA is a software automation solution to provide real-time control and data acquisition for utility operations. Survalent SCADA software includes STC Explorer

More information

IS2000. Administrative Operator s Guide. AOG-101 (07/2005) Software Version 7.45

IS2000. Administrative Operator s Guide.  AOG-101 (07/2005) Software Version 7.45 IS2000 Administrative Operator s Guide www.imron.com AOG-101 (07/2005) Software Version 7.45 Table of Contents INTRODUCTION...6 Overview...6 GENERAL INFORMATION...6 Logging On...7 Logging Off...9 Event

More information

ACCESS CONTROL SYSTEM

ACCESS CONTROL SYSTEM ACCESS CONTROL SYSTEM System versions Standalone controllers series based on integrated models KZ-400, 500, 600, 700, KZC-300,800, 900 KaDe Lite system based on integrated controllers KZ-1000 KaDe Premium

More information

LiteKeeper 8. Stand Alone Lighting Control Panel Technical Specifications PART 1. GENERAL 1.01 INTRODUCTION 1.02 DESCRIPTION OF WORK

LiteKeeper 8. Stand Alone Lighting Control Panel Technical Specifications PART 1. GENERAL 1.01 INTRODUCTION 1.02 DESCRIPTION OF WORK LiteKeeper 8 Stand Alone Lighting Control Panel Technical Specifications PART 1. GENERAL 1.01 INTRODUCTION The work covered in this section is subject to all of the requirements in the General Conditions

More information

180 Series Keypad. Handbook. Revision 2.1

180 Series Keypad. Handbook. Revision 2.1 180 Series Keypad Handbook Revision 2.1 Revision History Revision 1.0 Initial release Revision 2.0 Major update with addition of 180-40 Added 180-40 to document and various headings Note regarding unique

More information

Centralized monitoring software Monas-NET

Centralized monitoring software Monas-NET Communications for security Centralized monitoring software Monas-NET (Version 1.56) User guide Content 1. Application of the programme MONAS-NET 3 2. Security of the programme 3 3. Programme components

More information

Installation & User Manual

Installation & User Manual Contents Installation Instructions 3 Installation Diagrams 4 System Overview 6 Wiring Diagrams 8 Network Diagrams 9 Operation Instructions Fingerprint Enrollment 12 21 Wi-Enterprise Controller www.transmittersolutionssmart.com

More information

AC-115 Compact Networked Single-Door Controller Hardware Installation and Programming

AC-115 Compact Networked Single-Door Controller Hardware Installation and Programming AC-115 Compact Networked Single- Controller Hardware Installation and Programming Copyright 2013 by Rosslare. All rights reserved. This manual and the information contained herein are proprietary to REL,

More information

SECTION ( ) LIGHTING CONTROL PANELBOARD

SECTION ( ) LIGHTING CONTROL PANELBOARD (26 24 16.02) LIGHTING CONTROL PANELBOARD PART 1 GENERAL 1.01 SCOPE A. The Contractor shall furnish and install Lighting Control Panelboards as specified and as shown on the contract drawings. B. The Lighting

More information

Advanced integrated access control system

Advanced integrated access control system ASL5000-ST, ASL5000-SE, ASL5000-FA ASL5000-OA, ASL5000-CO SiPass integrated core software packages Advanced integrated access control system SiPass integrated Flexible structure Easy installation and administration

More information

SlimWare 2.1 User's Manual Revision: E

SlimWare 2.1 User's Manual Revision: E SlimWare User's Manual - Page i SlimWare 2.1 User's Manual Revision: E SlimWare User's Manual - Page ii Table of Contents Introduction...1 1 SlimWare Installation...2 2 Interface Connections...3 3 Starting

More information

X-SMART System Management Software User Manual

X-SMART System Management Software User Manual X-SMART System Management Software User Manual M_2000060638_EN_2.1 Copyright 2012 Life Safety A/V (Guangzhou) Co., Ltd. All rights reserved. No part of this document may be reproduced in any form without

More information

Visit us on the World-Wide Web at Programming Guide. Controller Boards

Visit us on the World-Wide Web at   Programming Guide. Controller Boards Visit us on the World-Wide Web at www.chamberlain.com PRO Systems Programming Guide Controller Boards -106 & -107 PROKey PROCard TABLE OF CONTENTS INTRODUCTION About the PRO System................................3

More information

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1 CLIQ Web Manager User Manual V 6.1 The global leader in door opening solutions Program version: 6.1 Document number: ST-003478 Date published: 2016-03-31 Language: en-gb Table of contents 1 Overview...9

More information

Micro-PWC Personal Work Center PW6000

Micro-PWC Personal Work Center PW6000 Micro-PWC Personal Work Center PW6000 Engineering, Operation and Information Workstation software Dynamic graphic displays with network-wide database access Real-time, historical and archive trend displays

More information

C CURE 800/8000 Security Management Solution

C CURE 800/8000 Security Management Solution D A T a s h e e t C CURE 800/8000 Security Management Solution Features that make a difference: Quickly access and leverage LDAP compliant data sources such as Microsoft Active Directory in real time Advanced

More information

MorphoManager User Manual. Table of Contents

MorphoManager User Manual. Table of Contents User Manual Table of Contents Introduction... 4 Support... 4 Overview... 5 What is a client?... 5 What is a server?... 5 What is a fingerprint enrollment device?... 5 What is a MorphoAccess?... 6 What

More information

IVS 2.0 Software Manual for Air, Vac & Water Machines

IVS 2.0 Software Manual for Air, Vac & Water Machines IVS 2.0 Software Manual for Air, Vac & Water Machines Development Draft Ver. 7.13.07 Table of Contents PREFACE...1 CHAPTER 1-INCORPORATING IVS 2.0 INTO YOUR BUSINESS...2 Overview... 2 Menu Selections...

More information

USER MANUAL. Disclaimer

USER MANUAL. Disclaimer USER MANUAL Disclaimer The instructions in this document have been carefully checked for accuracy and are presumed to be reliable. Smart I Electronics Systems Pvt. Ltd. and its writers assume no responsibility

More information