Network Based Security Made Easy

Similar documents
Smart Access Control System Software. User Manual. Version 1.0

First Access Express OPERATOR GUIDE

Smart Access Control System Software User Manual (Client Version)

Lasso Continuous Data Protection Lasso CDP Client Guide August 2005, Version Lasso CDP Client Guide Page 1 of All Rights Reserved.

Read Naturally SE Software Guide. Version 2.0

Getting Started With the Cisco PAM Desktop Software

S2 NetBox v4.8 Basic End-User Admin Training

IS2000. Administrative Operator s Guide

Business Insights Dashboard

IS2000. Administrative Operator s Guide. AOG-101 (07/2005) Software Version 7.45

USER MANUAL. Disclaimer

LiNC-NXG for Windows 8 Professional, Windows 7 Professional, Vista Business Edition and XP Professional

Equitrac Embedded for Kyocera Mita. Setup Guide Equitrac Corporation Equitrac Corporation

Car Park Control System Software User Manual

DesignPro Tools for Xerox Elixir Technologies Corporation. All rights reserved.

Embedded for Xerox EPA-EIP Setup Guide

Logging and Report Generator Program LRG. MS-Windows NT4.0, 2000 and XP Pro Version 7.0

Compass RTU Guide. Version 3.x

Windows Download & Installation

MapMarker Plus Desktop Installation Guide

Administrator s Guide

RedBeam Inventory Tracking User Manual

ACCESS CONTROL SOFTWARE V3.1 REFERENCE MANUAL

Report Viewer Version 8.1 Getting Started Guide

HR-Lite Database & Web Service Setup Guide

LockView 5 / 5Pro CompX Database & Network Configuration & Installation Manual

ipac Access Controller

MapMarker Plus Developer Installation Guide

WinPak 2 & 2005 Quick Reference

Controlsoft Identity and Access Management Software Controlsoft Identity Access Management Software

Configuring Cisco Access Policies

Access Control Database User Manual

Computer Paging Software

Installation Guide CONTROL MICROSYSTEMS

USER MANUAL. > analyze. reduce. recover

First Access OPERATOR GUIDE

Pension System/Windows. Installation Guide

Alien Handheld RTU Guide Version 3.9

EasyLobby SVM 10.0 / CardAccess 3000 Configuration Guide

Zodiac iclass OPERATOR GUIDE

Veritas Desktop and Laptop Option Mac Getting Started Guide

Installation Guide. New Installation of Version 3.5x-3.6x

Sage 300 Construction and Real Estate. MyAssistant Installation Guide Version 18.1

Integrated Access Control Alarm Management System

Equitrac Integrated for Océ

Configuring Cisco Access Policies

Avigilon Control Center Server User Guide

has been retired This version of the software Sage 300 Construction and Real Estate ( formerly Sage Timberline Office)

Multi-NVR Manager. Quick Start Configuration Usage

Relativity Designer Installation Guide

SEMS SOFTWARE SUITE INSTALLATION WHERE TO DOWNLOAD THE INSTALLERS

KYOCERA Net Admin Installation Guide

Table of Contents TRIMS Grounds Management Software Installation Guide

FirePoint 8. Setup & Quick Tour

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

Installing and Configuring Worldox/Web Mobile

Midpoint Security,

Pension System/Windows. Installation Guide

Equitrac Integrated for Konica Minolta. Setup Guide Equitrac Corporation

Millennium Expert/Enterprise Installation Guide Version Table of Contents

Centrify Infrastructure Services

TCS Access Control System Cheat Sheet

TimeClock Plus Web Edition 3.0

STONELOCK NETWORK USER MANUAL Version

Contents. User's Guide

Summary of Server Installation

Fitness Manager V4 Install Guide

Equitrac Embedded for Sharp OSA. Setup Guide Equitrac Corporation

User Guide. 3CX Recording Manager Standard. Version

EventMaster PLUS! Version 4 Installation and Upgrade Guide. Enterprise Deployment Microsoft SQL Server

Equitrac Integrated for Konica Minolta

PAL Installation Instructions

Pulse SCADA/HMI. Pulse Smart Login 1.1

User Guide. 3CX Audio Scheduler. Version

Media Archive Server for Small Teams

1. ECI Hosted Clients Installing Release 6.3 for the First Time (ECI Hosted) Upgrading to Release 6.3SP2 (ECI Hosted)

Integrated for Océ Setup Guide

KYOCERA Net Viewer 5.3 User Guide

Centrify Infrastructure Services

User Guide. Portable Calibration Module

Configuring Personnel and Badges

KYOCERA Net Viewer User Guide

Centra Workbench (V3.12 onwards)

Document Manager. Balance Point Technologies, Inc. Document Manager. User Guide. Certified MAX Integrator

Top Producer for Palm Handhelds

SMEC ASSET MANAGEMENT SYSTEM PMS Version 5.5. System Administrator s Guide

PigCHAMP Knowledge Software. Enterprise Edition Installation Guide

ChromQuest 4.2 Chromatography Data System

User Guide. Portable Calibration Module

Mac OS 8 Installation Instructions for Sonnet Presto and Presto Plus Processor Upgrade Cards

FileMaker. Mobile 7. User s Guide. For Windows, Mac, Palm OS, and Pocket PC. Companion for Palm OS and Pocket PC

SmartLock Surf OPERATOR GUIDE

EA/Studio Installation Guide

CentreWare DP User Guide

ATX Document Manager. User Guide

Avalanche Remote Control User Guide. Version 4.1

Installation and Configuration Guide

KMnet Viewer. User Guide

Avigilon Control Center Server User Guide

10ZiG Technology. Thin Desktop Quick Start Guide

Transcription:

Network Based Security Made Easy Installation & User s Guide Technical Support: (651) 453-1483; Fax: 651-453-1338, http://www.access-specialties.com

Table of Contents Copyright 2009 Access Specialties International, LLC... 1 Software License Agreement... 1 Technical Support... 1 Chapter 1 Welcome to FOCAL POINT... 2 Controlling Access... 2 Card Readers and Transactions... 2 Monitoring Activity... 2 Commands... 3 Chapter 2 FOCAL POINT Requirements... 3 Minimum PC Requirements for SQL Server Host... 3 Minimum PC Requirements for Workstations... 3 Technical Experience... 4 Chapter 3 System Components... 5 ASIDataServer... 5 Workstation... 5 SQL Server... 5 SQL Server Versions... 5 Installing SQL Server... 5 Scheduling Automatic Database Backups in SQL Server 2005 (Not possible in Express Version)... 6 Automatic Database Backups In SQL Server 2005 Express... 19 Chapter 4 Install FOCAL POINT... 27 Installation Options... 27 Stand-alone... 27 Networked... 27 Create & Access the File DSN... 28 Chapter 5 Upgrade An Existing FOCAL POINT System... 30 Upgrade the Server Software... 30 Upgrade the Database... 31 Upgrade the Workstation Software... 31 Chapter 6 Start Using FOCAL POINT (Main Interface)... 32 Log In To FOCAL POINT... 32 Interacting with FOCAL POINT... 33 Module Icons... 33 Module Tool Bar... 34 Menus... 34 File...Error! Bookmark not defined. View... 34 Help...Error! Bookmark not defined. ii

Chapter 7 Time Zones... 35 Add Time Zones... 40 Edit Time Zones... 40 Delete Time Zones... 41 Chapter 8 Access Point Center... 42 Zones... 42 Access Points... 42 Communication Protocols... 42 TCP/IP... 42 Access Point Overview... 43 Areas... 43 Define Access Points... 43 Add an Access Point... 43 Access Point Information... 43 Connection... 44 Notes... 44 Advanced Settings... 44 Define Areas... 44 Chapter 9 Hardware Information... 45 Chapter 10 Access Groups... 45 Access Group Definitions... 45 Add Access Group Definitions... 45 Group Access Assignments... 47 Elevator Assignments...Error! Bookmark not defined. Chapter 11 Holidays... 49 Add Holiday Groups... 49 Add Holidays... 50 Chapter 12 Cardholders... 51 Define Custom Fields... 51 Create Custom Fields... 52 Add Cardholders... 53 Badges... 54 Access Assignments... 54 Add Additional Badges...Error! Bookmark not defined. Add Cardholder Images... 56 Where Allowed... 56 Chapter 13 Alarms... 57 Define Alarm Types... 57 Define Alarm Instructions... 58 Define Alarms... 58 Alarm Source... 59 Alarm Info... 59 Time Zones... 60 Alarm Routing... 61 iii

Chapter 14 Alarm Monitor... 63 Menus... 63 Icons...Error! Bookmark not defined. Monitor View... 64 Chapter 15 Command Center... 65 Available Commands... 67 Commands to an Access Point... 67 Define Scheduled Commands... 67 Command Info... 67 Time Graph... 68 Define Future Commands... 68 Command Info... 68 Conditional Response Command... 69 Command Info... 69 Conditions... 69 Time Zone... 70 Notes... 70 Alarm Response Commands... 71 Command Info... 71 Notes... 71 Time Graph... 71 Chapter 16 Issue A Command... 73 Add/Issue a New Command... 73 Chapter 17 Operators... 75 Default Admin Operator... 75 Add an Operator / Set Password Policies... 75 Menus... 76 Icons...Error! Bookmark not defined. Operator Information... 77 Copy Permissions... 78 Operator Permissions... 78 Zones... 80 Add A Profile... 81 Chapter 18 Transaction Monitor... 82 Transaction Tab... 82 Menus...Error! Bookmark not defined. Transaction Color Code... 83 Display Card Info... 83 Columns... 83 Show Transactions by Panel or Zone...Error! Bookmark not defined. System Status Tab... 83 Connections... 84 System Status... 84 Current Status... 85 Refresh Values... 85 iv

Chapter 19 Reports... 86 Create a New Report...Error! Bookmark not defined. Step 1...Error! Bookmark not defined. Select Report Type and Subtype (if applicable)...error! Bookmark not defined. Select Fields...Error! Bookmark not defined. Define the Display Order of the Report Fields...Error! Bookmark not defined. Select the sort order...error! Bookmark not defined. Set Date Range...Error! Bookmark not defined. Additional Criteria...Error! Bookmark not defined. Save Report...Error! Bookmark not defined. Run Report...Error! Bookmark not defined. Export Report...Error! Bookmark not defined. Run A Saved Report...Error! Bookmark not defined. Create A New Query...Error! Bookmark not defined. Execute A Saved Query...Error! Bookmark not defined. Operator Activity Report...Error! Bookmark not defined. Chapter 20 Standalone Reports...Error! Bookmark not defined. Chapter 21 Event Manager...Error! Bookmark not defined. Index... 87 v

COPYRIGHT 2009 ACCESS SPECIALTIES INTERNATIONAL, LLC All Rights Reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying or recording, without the express written permission of Access Specialties, Inc. Information in this document is subject to change without notice and does not represent a commitment on the part of Access Specialties, Inc. Unless otherwise noted, all names of companies, persons, products, and addresses contained herein are part of a completely fictitious scenario or scenarios and are designed solely to document the use of an Access Specialties product. Windows is a trademark of Microsoft Corporation. SOFTWARE LICENSE AGREEMENT The software described in this document is furnished under a License Agreement. This is a legal agreement between you and Access Specialties, Inc. Opening the CD package indicates that you accept these terms: Access Specialties, Inc. grants to you the right to use one copy of the enclosed software on a single computer or to a network server. If additional workstation licenses are purchased, you have the right to install the software on as many computers as is validated by the system registration. The software is owned by Access Specialties or its suppliers and is protected by the United States copyright laws and international treaty provisions. You may not rent or lease the software. You may not reverse engineer, de-compile, disassemble, or create derivative works from the software. If you do not agree to the terms of this Agreement, promptly return the unopened software package and all accompanying items, to the place of purchase for a full refund. TECHNICAL SUPPORT For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or (651) 453-9116. Support is available Monday through Friday, 8:00 AM to 5:00 PM, CST. A 24-hour fax line is also available by dialing (651) 453-1338. Written correspondence may be directed to Access Specialties, Inc., 10255 Inver Grove Trail, Inver Grove Heights, MN 55077. Installation guides are also available at www.access-specialties.com. 1

Chapter 1 WELCOME TO FOCAL POINT FOCAL POINT is an inclusive 32-bit Windows based access control software package that is integrated to operate with a Microsoft SQL Server database. Colorful screen graphics, easy-to-use interface, and powerful flexibility make FOCAL POINT essential for managing your facility. When combined with the power of the HID Edge IP based controller, you have state of the art access control at the door and Network Based Security made easy. CONTROLLING ACCESS Access is controlled throughout your facility by information stored in a SQL database that FOCAL POINT queries for controlling access, and monitoring transactions and alarms. Information stored includes cardholders and access points, as well as Access Groups and Time Zones. Access Groups are created by combining one or more Access Points with the defined Time Zones. Cardholders can have up to 8 assigned Access Groups. This allows each cardholder to have unique access privileges. Zones partition the system allowing access points to be separated into separate zones controlling what information is sent to each access point and what information each system operator can view. CARD READERS AND TRANSACTIONS FOCAL POINT supports a variety of card technologies, such as proximity, magnetic stripe, barium ferrite, bar code, smart card, biometrics and keypad entry. An Edge controller has either an integrated proximity reader, or is wired to an external Wiegand reader. When a card is presented at a reader, the data is sent from the reader to the Edge controller. The controller holds key information regarding badge access. The controller then opens the contact if the door should be unlocked. The complete transaction is documented and stored for real time display, as well as reports. MONITORING ACTIVITY Monitoring activity is accomplished via sensing devices. The sensing devices have both an alarm, and non-alarm condition. It should be noted that any monitored condition might be defined as an alarm condition. The Edge reports activity at monitor points only when an alarm condition occurs on the controller, and when the alarm condition resets. Otherwise, no transaction is reported. 2

COMMANDS The commands available through FOCAL POINT help a facility run more efficiently. Doors may be manually commanded to lock or unlock by a system operator. Doors and areas can also be set to open or close at specific times. Chapter 2 FOCAL POINT REQUIREMENTS FOCAL POINT offers a wide range of configuration options when creating the security system. The hardware requirements will vary depending on the Security Administrator s choice of whether to install the application on the same computer as Microsoft SQL Server, or another computer. Below are the minimum recommendations necessary for installing FOCAL POINT. MINIMUM PC REQUIREMENTS FOR SQL SERVER HOST - Processor: Pentium IV (2.8 GHz or higher) - Display: VGA or higher-resolution monitor (Super VGA recommended) - Operating System: Windows 2000, Windows XP, Windows 2003 Server - Memory: 2048 Megabytes (MB) of RAM - Hard Drive: 40+ GB (depending on estimated size of database) - Disk Drive: CD-ROM Drive - Mouse: Microsoft Mouse or compatible pointing device - Additional space needed for setup files: - FOCAL POINT: ~ 20 MB - SQL 2005 or 2005 Express ~ 100 MB - Screen Resolution: 1024 x 768 and greater - Browser: Microsoft Internet Explorer 5.0 or later -.NET Framework version 2.0 - Windows Installer 3.1 or higher - Networking: Windows 2000, Windows XP, Windows 2003 Server built-in network - Additional network software is not required unless you are using Banyan VINES or AppleTalk ADSP. Novell NetWare client support is provided by NWLink - Supported Clients: Windows NT Workstation, Windows 2000, Windows XP, Apple Macintosh (Requires client software from a third party vendor), and OS/2 (Requires client software from a third party vendor). MINIMUM PC REQUIREMENTS FOR WORKSTATIONS - Processor: Pentium IV (1 GHz or higher) - Display: VGA or higher-resolution monitor (Super VGA recommended) - Operating System: WindowsNT, Windows 2000, Windows XP, Windows 2003 Server - Memory: 256 megabytes (MB) of RAM - Hard Drive: 40+ GB - Disk Drive: CD-ROM Drive 3

-.NET Framework version 2.0 - Windows Installer 3.1 or higher - Mouse: Microsoft Mouse or compatible pointing device - Screen Resolution: 1024 x 768 and greater - Browser: Microsoft Internet Explorer 5.0 or later - Networking: Windows 2000, Windows XP, Windows 2003 Server built-in network - Additional network software is not required unless you are using Banyan VINES or AppleTalk ADSP. Novell NetWare client support is provided by NWLink - Supported Clients: Windows NT Workstation, Windows 2000, Windows XP, Apple Macintosh (Requires client software from a third party vendor), and OS/2 (Requires client software from a third party vendor). TECHNICAL EXPERIENCE There are two different levels of technical experience needed for the installation and operation of the FOCAL POINT security software. Personnel installing the Microsoft SQL Sever software should be familiar with Microsoft SQL Server. The day-to-day operators using FOCAL POINT should have a general level of comfort with the standard Windows environment. Access Specialties offers courses for all types of users and installers covering Microsoft Operating Systems, SQL Server, FOCAL POINT, and Access Specialties hardware. Please see our website for more information. http://www.access-specialties.com. 4

Chapter 3 SYSTEM COMPONENTS FOCAL POINT consists of two main components that have been designed to allow for a number of different installation options. Below is an overview of the purpose of each. ASIDATASERVER The ASIDataServer component performs all of the run-time communications between FOCAL POINT and the Focal Point SQL Database. A File DSN establishes the communications link between ASIDataServer and the SQL Database. Contact Access Specialties for specific DSN information. It also controls FOCAL POINT s communications with the security system s hardware. WORKSTATION Workstation is the interface for defining the security system, issuing commands, and viewing real time transactions and alarms. SQL SERVER SQL SERVER VERSIONS FOCAL POINT is compatible with either the Express or full version of SQL Server 2005. SQL Server 2005 Express is free and is available on each FOCAL POINT installation CD. Note that SQL Server 2005 Express does not include the SQLAgent scheduling service, which is required to perform automated SQL database backups through Management Studio. There is also an Express version of Management Studio, which is used to configure and modify SQL Server 2005 Express configuration and its databases. There is a 4 GB database limit with the Express version. Once the database grows to approximately 4 GB FOCAL POINT will stop working. Please consult Microsoft for licensing information and options for SQL Server. INSTALLING SQL SERVER A copy of SQL Server 2005 Express is included on the install CD. Installing the ASIDataServer component on a workstation that does not have SQL installed, will cause SQL Server 2005 Express to be installed automatically on that workstation. Installing a full version of Microsoft SQL Server is outside the scope of this help file. Please consult the Microsoft SQL Server Introduction Manual that came with your purchase of SQL Server. During installation select: 5

Setup Type Typical Service Settings Use Local System Account for Mixed Mode Authentication SCHEDULING AUTOMATIC DATABASE BACKUPS IN SQL SERVER 2005 (NOT POSSIBLE IN EXPRESS VERSION) 1) Open Management Studio 2) Connect to a Database Engine 3) Explore down the tree to the Management Node 6

4) If the SQL Server Agent service is not started, right click on it, and select Start. Click on the Yes button on the confirmation message, to start the SQL Agent service. 7

5) Expand the Management node 6) Right-click on Maintenance Plans, select Maintenance Plan Wizard 7) If you receive a message stating that Agent XPs are not enabled - Left-click on the New Query button - Copy and paste the following text into the query window: sp_configure 'show advanced options', 1; GO RECONFIGURE; GO sp_configure 'Agent XPs', 1; GO RECONFIGURE GO 8

- Execute this query 9

8) Click Next to continue 10

9) Enter a name for the job, as well as the appropriate credentials. 10) Click Next 11

11) Select Backup Database (Full), click Next 12) Click Next on the next screen. 12

13) Select the database to backup, by clicking on the arrow next to the Databases field. This will display a list that contains the defined database. Place a check in the box next to the name of the database you want to back up. 13

14) Click OK to close this screen. 15) Click Next 14

16) Click Change to set the options for the job scheduling. 15

17) Give it a name, and configure the remaining information according to the schedule the backup should be performed on. 18) Click OK 19) Click Next 16

20) Click Next 17

21) Click Finish 18

22) Click Close Backup job has been created, and saved. It will execute as defined by the schedule. AUTOMATIC DATABASE BACKUPS IN SQL SERVER 2005 EXPRESS Although it is not possible to directly schedule database backups using this version of SQL 2005, it is possible to create a job that runs using the built-in Windows scheduler. On the computer which runs SQL 2005 Express: 1) Open Management Studio Express 19

2) Provide required login information, and click Connect 3) Navigate to required database. 4) Right-click on the database name, select Tasks, then Back Up 20

5) Click on the Script button 6) Click Cancel 7) A new query window should be visible, which contains the statements to perform the database backup. 8) Click on the File, then Save Query As. 9) Save the file to an easy to find location, and meaningful name 21

10) Click Save 11) Close Management Studio Express 12) Open Control Panel, Double-click on the Scheduled Tasks button 13) Double-click on the Add Scheduled Task icon, to start the wizard to create a new scheduled task 14) Click Next 22

15) Click on the Browse button. 16) Select the query file which was created earlier, select Open 23

17) Select the schedule option, click Next 18) Depending upon the selected schedule frequency, the information which needs to be specified, will be slightly different. In this case, Weekly was selected. 19) Set the appropriate time, days, etc 20) Click Next 24

21) Supply a user and password that has sufficient rights to connect to SQL, as well as creating the backup file on the disk, and click Next 22) Click Finish to complete the process. The new scheduled job will display in the list. 25

26

Chapter 4 INSTALL FOCAL POINT INSTALLATION OPTIONS The Security Administrator can install the components of FOCAL POINT as either a stand-alone security system or as part of a networked security system. STAND-ALONE All FOCAL POINT components and the SQL Database are installed on one computer. A stand-alone security system can be implemented to meet the needs of users that want to localize their security system to one computer because of a smaller facility size or lack of network connections. NETWORKED Implementing a networked security system is just as easy to accomplish as implementing a stand-alone security system and gives the user a high degree of flexibility in controlling access to key parts of the security system. For Networked Security Systems, it is necessary to install the ASIDataServer component before installing Focal Point on client workstations. ASIDataServer is only installed on the server machine. Selecting the complete installation, or individually selecting ASIDataServer through the custom installation will accomplish this. For each type of installation you will be given the option of installing shortcuts for Focal Point on the desktop or directly on the Start menu. You will also be 27

[SETUP Screens/explanation go here] [Not certain if we ll need this. Right now, Focal Point is using a connection string which is defined in the.config file] CREATE & ACCESS THE FILE DSN The File DSN is set up on the computer running ASIDataServer.exe. It establishes the link between ASIDataServer and the SQL database. This link must be established before Focal Point can interact with the database. 1) Open the Control Panel A) Windows XP click on Start / Control Panel B) Windows 2000 click on Start / Settings / Control Panel 2) Open Administrative Tools 3) Open Data Sources (ODBC) 4) Select the File DSN tab 5) IF a DSN does exist select Configure and go to step 7 6) IF a DSN for FOCAL POINT does not already exist complete the following steps: A) Select Add 28

B) Select Native client from the bottom of the list C) Select Next D) Type FocalPoint E) Select Next F) Select Finish 7) Select the Microsoft SQL Server with which you would like to connect. If the Focal Point database resides on the workstation you are using, select or type (local) 8) Select with SQL Server Authentication using a login ID and password entered by the user 9) Contact Access Specialties for the specific Login ID and Password 10) Change the default database to the name of the ASI database installed on the SQL server 11) Select Next 12) Select Finish 13) Select Test Data Source 29

[No defined process for doing this, as of yet] Chapter 5 UPGRADE AN EXISTING FOCAL POINT SYSTEM Upgrading an FOCAL POINT system can be completed in minutes in just 3 easy steps. Before starting the upgrade, find the following information: 1) Computer name or IP Address of the Server: 2) Name of the SQL Database: i. Check the File DSN OR ii. Start FOCAL POINT and select View / Check DB / Currently Connected Database 3) Name and location of all other machines running FOCAL POINT workstations or Panel Manager: View the Readme.txt from the cd to see PC requirements or view Server and Workstation Requirements from this manual. See Chapter 2. UPGRADE THE SERVER SOFTWARE First make sure that FOCAL POINT is closed on all workstations and on the Server. Check the processes tab in Task Manager and make sure that ASIDataServer.exe is not running. If it is, end the process. Next insert the latest FOCAL POINT CD. If the CD does not automatically run, or if you are installing from a folder, double click on the AutoRun.exe. Select Complete Install to install ASI Server, ASI Launch (workstation) and Panel Manager. Select Custom Install to install individual components. At least ASI Server must be installed on your Server PC (see Chapter 4). Select the workstation and user on which to install FOCAL POINT. Ensure that the user has Administrator permissions. To use a domain account select the computer name or IP address of that Server. Enter the password and click OK. Select Yes to remove previous FOCAL POINT installs. 30

Continue through the installation process, choosing which options best suit your needs. Do NOT try to run FOCAL POINT until the Database has been upgraded. UPGRADE THE DATABASE Insert the installation cd on the machine running SQL or copy the folder to that machine. If you do not need to install the software on the computer or if you already have, stop the auto-run. Explore to the CD drive or open the software folder. Open the Upgrade folder. Double click on DatabaseUpgrade.exe. From the drop down menu select the SQL Database name. Select Yes if you are using SQL MSDE. Select No if you are using a full version of SQL Server. Click on Upgrade Database. The upgrade utility will add the necessary components needed to run with the latest version of FOCAL POINT. Custom installs of the software can be completed while the database is being upgraded. Do NOT try to start any FOCAL POINT component until the Upgrade is complete. UPGRADE THE WORKSTATION SOFTWARE Perform custom installs (see Chapter 4) for each component needed on each workstation. During the installation you will be prompted to enter the IP address or Computer Name of the computer running ASI Server. If this is entered incorrectly you will get an error connecting, error 70. Should this occur, reinstall the workstation pointing at the correct computer. 31

Chapter 6 START USING FOCAL POINT (MAIN INTERFACE) LOG IN TO FOCAL POINT Launch FOCAL POINT by clicking on Start/Programs/ASI/Focal Point or by double-clicking on available shortcuts. Contact Access Specialties for the User Name and Password if this is an initial installation. The following two screens will display, before the main logon window: MAIN LOGIN SCREEN Enter a valid login and password, or select an operator name from the drop-down list. If an operator is selected, a valid password will still have to be provided to complete the login process. 32

Click the OK button to enter Focal Point INTERACTING WITH FOCAL POINT FOCAL POINT allows each operator to have tailored permissions within FOCAL POINT. FOCAL POINT s modular design makes it easy to grant administrative rights to an operator or restrict an operator to view only privileges in any one of the modules. If an operator does not have any permissions within a module the icon button for that module will not appear on the screen. MODULE ICONS FOCAL POINT uses icons to organize each module of the software. Access Groups and Access Assignments are defined in this module. Access Assignments determine when a badge can be used at certain readers. All alarms are defined in this area. Assign priority levels; and identify conditions causing the alarm at a specific device or area. Alarm instructions are also created and assigned here. The Cardholders module holds information about people, badges and access permissions. It is also where badge layouts are created and printed. 33

All Immediate, Scheduled, Future, Conditional Response and Alarm Response Commands can be created and issued in the Command Center. Issue Command allows operators to quickly send commands to devices or areas such as locking or unlocking doors. Access Point Manager displays Zones, Areas, and Access Points All Holiday Groups and definitions are created in the Holiday Definition module. Defined holidays can prevent badges from being granted access, and cause commands not to be issued on defined holidays. Unique user names, passwords and permissions are assigned in the Operators module. Other security features, such as password rules, and login policies are also set here. The Reports Module allows the user to easily create custom reports, save these reports for future use, edit saved reports or create SQL scripts that query the database for virtually any report needed Time Zone intervals are defined in this module. This section also displays graphs for visual confirmation of when a Time Zone is active. The Transaction Monitor shows transactions live as they are happening throughout the day. MODULE TOOL BAR Only the modules that an operator has permissions to, will be enabled. The remaining modules will be visible, and greyed out. MENUS VIEW 34

Show Names: If checked, the descriptions will appear under the icons in the main window. Unchecked, the descriptions will be hidden. About About Focal Point Workstation: Displays version and license information for this install of Focal Point. Chapter 7 TIME ZONES TIME Time Zones are the corner stone of the FOCAL POINT database. Time zones are user-definable periods that control when an event will occur or not occur. For example, a Time Zone that is defined from 8:00 am 5:00pm, Monday through Friday can be used to allow certain cardholders to gain access to certain card readers during those times, or to unlock main doors during that time. Each Time Zone can be used for more than one function. For example, a 24/7 Time Zone (one that is in effect all the time) can be used for alarms, granting access through doors and scheduled commands Be aware that if a Time Zone is deleted, it will also delete any dependant information such as alarms, and access assignments that are using the Time Zone that was deleted. Time Zone names are viewed throughout the application, so use descriptive terms such as 8am-5pm, Mon-Fri. The Description and Notes sections are very important references explaining the Time Zone, or what the Time Zone may be used for. Time zones contain zero or more intervals, during which time the time zone is considered to be active. The times during which the Time Zone is active, are displayed in green in the graphic underneath the defined interval descriptions ZONE INTERVALS Time zone intervals are entered, updated and deleted individually for each Time Zone definition, using this set of controls on the Time Zone definition form. 35

You must be either adding or editing an existing Time Zone to change the interval definitions for a Time Zone. ADD A NEW INTERVAL Select a Time Zone to edit, or click on Add to create a new time Zone definition. Using the left-hand set of controls, select a starting day of the week for this interval. Select or type the starting hour and minute, as well as AM/PM. Select the Ending day of the week for this interval. 36

Select or type the ending hour and minute, as well as AM/PM. Click the Add button next to the list of defined intervals. The new interval will then appear in the list: This interval starts Sunday @ 6:00 AM, and ends Sunday @1:00 PM Note that the graphical representation of the Time Zone will change to reflect the currently defined intervals. Changes will not take affect until the Time Zone is actually saved. UPDATE AN EXISTING INTERVAL Select a Time Zone to edit Select the interval to be changed from the list of defined intervals in the list below 37

The start and stop information for that interval, will be loaded into the controls above this list of intervals Make the desired changes to either the start or stop information for that interval, then click the Update button. Here, the start and end time of the interval for Wednesday, was set to start an hour later, and end an hour later. The changes to the interval will be displayed in the list, as well as the graphical control below the interval, however will not actually take affect until the Time Zone is actually saved. 38

DELETE AN EXISTING INTERVAL Select a Time Zone to edit Select the interval to be deleted from the list of defined intervals in the list below The start and stop information for that interval, will be loaded into the controls above this list of intervals Click the Delete button. The interval will be removed from the list, and the graphical display will be updated to show the interval has been removed Here, the interval that started on Saturday, and ended on Sunday, was removed from the list. 39

Note that none of these changes will take effect, until the Save button is clicked. This will send the new Time Zone definition information to all of the access points that are defined in the system. ADD TIME ZONES To add a new Time Zone, click on the Time Zones module. Then click on the Add button.. Enter the information to define this new time zone, including Name, and defining intervals when the time zone is active. Note that only five intervals can be defined for a specific day of the week within each Time Zone. A name must be specified for each Time Zone, and must be unique throughout the System. EDIT TIME ZONES To edit an existing Time Zone, click on the Time Zones module. Then click on the desired Time Zone in the list, then the Edit button. Make desired changes to the existing Time Zone, then click on Save. Changes will be sent to the controllers immediately upon the save operation. 40

DELETE TIME ZONES To delete an existing Time Zone, click on the Time Zones module. Then click on the desired Time Zone in the list, then the Delete button. A confirmation message will be displayed: You must select the Yes button to actually delete the Time Zone. Deleting Time Zones is not recommended unless you have a thorough understanding of the relationship between that Time Zone and the rest of the database. When a Time Zone is deleted, all associated events, alarms, commands, and Access Groups will also be deleted. To delete a Time Zone, highlight the name in the list, and click on the Delete button. A confirmation will appear. Click Yes to remove the Time Zone from the database. 41

Chapter 8 ACCESS POINT CENTER The Access Pont Center is where the hardware is defined. This includes Zones, access points and areas. This is also where the TCP/IP communication parameters are defined for each controller. Multiple zones can be used to segment the access control database and hardware at larger installations. [Access point List] ZONES Zones are used to partition the database. Grouping access points into different zones will help the system run more efficiently by distributing the appropriate cardholder information to the correct controllers. Zones can also be used to restrict which operators can view access points, access groups, alarms, commands, and cardholders who have been assigned access in that zone. Each access point must be assigned to one and only one zone. There is no limit to the number of zones that can be created in the Focal Point database. Careful consideration of how zones are used can increase the effectiveness and efficiency of the access control system. If multiple sites are being controlled from one server, giving each site its own zone can help the system operate more efficiently. Deleting a zone will also delete the hardware associated in that zone as well as any software definitions such as access groups, alarms, commands and areas that reference that zone. ACCESS POINTS Access Points are defined in each zone. Each Access Point has memory that holds a portion of the Focal Point database. When communication is lost between the computer running ASIDataServer and the Access Points, the Access Point s memory allows operation as normal until the communication is restored. Any changes made through the software will not take place until the communication link has been restored. Any transactions that have been stored in the Access Point s memory while it was not communicating with the host PC, will also be received at that time. COMMUNICATION PROTOCOLS TCP/IP TCP/IP is used with an Edge controller. The controller s TCP/IP connection is configured using the built-in web interface through Internet Explorer. Some of this same information is displayed for reference in Focal Point. 42

ACCESS POINT OVERVIEW All access points can be configured to unlock a door for as long as needed. An unlock command will last forever unless power is lost or a new command is issued. Both the go and shunt times have a maximum value of 1,620 seconds, or 27 minutes. The unlock time is how long the door will be unlocked when a valid access has been granted, a Grant Access command executed, or the Request To Exit has been activated. The shunt time is used to determine how long the door can remain open beyond the unlock time, before a door held open message is displayed in the Transaction Monitor. The access point can be configured to require Card Only, Card Plus Pin, or Pin Only mode at any time. PIN entry requires a reader that allows PIN entry. This information is used in conjunction with the Access Mode defined for each cardholder, to determine whether or not enough information has been provided to validate their specific access request. AREAS Grouping Access Points into an area allows simple control of all these devices with one command. Areas can include Access Points across multiple zones. Areas can also be used when defining Alarms, and some commands. For example, if 5 external lobby doors need to open at 8am and lock at 5pm, create an area and include these 5 devices. One command can be created to unlock and lock all 5 of these devices creating a more efficient environment. DEFINE ACCESS POINTS [ACCESS POINT SCREENS] ADD AN ACCESS POINT Open Access Point Center Click on the Add button Enter the required information. ACCESS POINT INFORMATION Enter the Location, MAC address, unlock and shunt times. The location should be very descriptive as it is viewed throughout the rest of the application when selecting devices. It is also viewed in Transaction Monitor. The Panel Enabled box enables the panel. To disable the panel, uncheck this box. 43

CONNECTION Configure the options for DHCP or an IP address are given. SETTINGS The Time Difference box allows ASIDataServer to process transactions from controllers in different time zones. For example, ASIDataServer could be running from a computer in Minnesota, which is in the Central time zone. The controller could be located in New York, which is in the Eastern time zone. The time difference would then be +1. If the controller were located in California, which is in the Pacific time zone, the time difference would be 2. The Re-Allocate Panel button is a simple way to re-load the panel with the database definitions. Re-allocation can take up to an hour or more depending on database. Click on Cancel return to the settings tab. NOTES Click on the Notes tab. Use the notes section to write important information about the exact location of the panel, or any other information that may be useful to someone else who is not as familiar with the system layout. Save the Access Point. ADVANCED SETTINGS Advanced Settings allow configuration of advanced settings. Normally, only required for PIN reader definition. DEFINE AREAS Areas are maintained using the Area Listings tab. To add a new Area, open the Access Point Center and click on the Area Listings tab. Click on the Add button, then enter the Area Name and Description. Click on the Save button to save the area definition. Select an area and then click on Edit Area. Double click on an Access Point to add it to the area. The Access Points in the area will move to the box on the bottom. Save the area when finished. To delete an area, open the Access Point Center and click on the Area Listings. Click on the area you wish to remove, then click the Delete button. Note that deleting an existing area, will also remove any commands or alarms that area is referenced by. 44

Chapter 9 HARDWARE INFORMATION Chapter 10 ACCESS GROUPS Access Points and Time Zones are uniquely combined into Access Groups, which are assigned to badges. 8 access groups per zone may be assigned to each badge. When an access group has been added to the badge, that badge will work at the Access Points specified in the group during the specified time zone. For example, access group 1 may contain all the exterior doors of a building during a defined time zone of Monday through Friday, 8am to 5pm. Each badge that has been assigned access group 1 will open the exterior doors during that time frame. Access groups cannot span zones, so Access Points in a particular access group must all be in the same zone. ACCESS GROUP DEFINITIONS Group definitions are where Access Groups are named. ADD ACCESS GROUP DEFINITIONS Select Access Groups from the Main Interface. Click on Access Group Listings tab. Click Add button. Access group names should be very descriptive as they are viewed when assigning them to badges. Descriptions can be used to further specify groups. 45

Access groups can be edited or deleted at any time. Once an Access Group has been deleted, cardholders who were part of that access group will no longer have any access to the access points that group had allowed. In this example, there are four Access Groups defined in the zone ASI Sales Office Since Access Groups do not span Zones, click on the drop down arrow to select another zone. Define Groups for each Zone. 46

GROUP ACCESS ASSIGNMENTS Select Access Groups from the Main Interface. Click on the Group Access Assignments tab. Columns indicate the Access Group while rows indicate the devices in that Access Group. Access Groups are defined by zone. The first zone that is defined will be loaded by default. If the Access Groups are defined in a different zone, this zone must be selected before any changes can be made. Double click in each grid square to add appropriate Time Zones for each Access Point in each Access Group. To exclude an Access Point from an Access Group leave the corresponding grid square blank. In this example Access Group 1, 3, and 4 contain all the doors during Time Zone 2 (24/7), Access Group 6 contains all the doors during Time Zone 1 (normal work hours) Selecting a cell that contains a number referring to a Time Zone, will display the graphical representation of the time zone below the assignment grid. 47

The Green area indicates the time period during which a Cardholder with that Access Group will be granted access. Here, the Time Zone is active from 8:00 am to 5:00 pm, Monday Friday. Clicking on the Lookup button at the top of the screen, will allow you to select a specific group or access point to locate in the current Zone in the grid. Selecting a group name, or Access Point Name, and clicking the OK button will change the information which is selected (highlighted), based upon the selection made, without having to physically scan the list to find it. Since Access Groups do not span Zones, click on the drop down arrow at the top to select another Zone. Create Access Groups for each Zone. 48

Chapter 11 HOLIDAYS Holidays are defined in Holiday Groups. These groups provide exceptions to Time Zone rules for badge access, scheduled commands, and conditional response commands. Each Holiday must start at 12:00am and end on 11:59pm on the same date. Recurring Holidays occur on the same date every year. Holiday Groups can be assigned to badges to grant cardholders access on holidays within a certain group. If a badge is not given access to a specific Holiday Group, that badge will not be granted access on the holidays within that group. ADD HOLIDAY GROUPS From the Main Interface click on the Holidays module. Click on the Holiday Group Listings tab. Select Add or hit F5. Enter the name of the Holiday Group. The description is optional. Click Save. Add as many Holiday Groups as necessary. 49

ADD HOLIDAYS From the Main Interface click on the Holidays module. Select Holiday Definition tab. Select Add or hit F5. Enter the name of the Holiday. The description is optional. Enter the date of the Holiday. If this holiday happens on the same day every year, such as July 4 th, select recurring holiday. Assign this Holiday to one or more Holiday Groups by checking the box for the appropriate Holiday Groups. Any badges not assigned to one of these Holiday Groups will not gain access during the holidays defined within the Holiday Group. 50

Chapter 12 CARDHOLDERS Cardholder Data includes First Name, Last Name, MI (Middle Initial), Photo and Custom Fields. Badge Data includes Encoded, Embossed, Pin #, Activation and Expiration Dates, Active or Inactive flag. A Cardholder is a person who is issued one or more access cards. Each Cardholder has specific information associated with it such as Encoded Number, PIN, Embossed Number, Activation and Expiration Dates, Photo and an unlimited number of user-definable Custom Fields. Cardholder photos are stored as.jpg files in folders. DEFINE CUSTOM FIELDS Either click on Add to create a new cardholder, or select one and click Edit Click in the Custom Fields tab 51

Click on the Add Custom Field button to create extra data fields (ex. Address, Phone Number, Social Security Number) called Custom Fields. The number of Custom Fields is unlimited. Lookups create drop down lists, which are customized for each Custom Field. Creating the necessary Custom Fields before entering Cardholder data will save time because each cardholder won t have to be edited to insert key Custom Field data. CREATE CUSTOM FIELDS Select Add New Field. Enter the name of the Custom Field (ex, Department). To add a lookup highlight the custom field name on the left side of the screen and select Add Lookup For Selected Field. One at a time, enter the Lookups as shown in the example below. Lookups are optional. 52

Continue adding Custom Fields and Lookups as needed. When lookups are used the only data that can be entered into that field is one of the lookup entries. Custom fields and lookups can be edited or deleted by selecting the corresponding buttons. Deleting lookups will not delete any related data. However, deleting a custom field will delete all related information. Care should be exercised so that important data is not lost. Click Done to return to the Cardholders screen. The custom field names and lookups (drop down menus) will now appear. ADD CARDHOLDERS To add new Cardholders or edit existing Cardholders, click on the Cardholders module. Enter Cardholder data. At a minimum, either a first name or last name is required. 53

Enter Badge data. The encoded number is the unique number on the access card or key fob. The encoded number must be unique but is not required. This allows Cardholder information to be kept even for those who do not have badges. If the encoded number is not used, Access Groups cannot be assigned. The Embossed number is user definable, optional, and can be used as a badge number. The Pin # can be used with devices that have pin pads and is optional. Pin numbers are usually 4 or 5 digits depending on the device type being used. Select Access Mode for this cardholder. If not specified, is Card Only. This means only a card is required for validating access at any door. Note that the other modes (Card + PIN, Card or PIN, PIN only) require the use of a PIN reader. This is used in addition to the access mode that is configured in the Access Point definition, to verify that the cardholder can get access to a specific door. Changing the Access Mode from Card only to an Access Mode other than Card + Pin, will require that the entire cardholder database be regenerated, and sent to each of the access points that cardholder has access to. In a similar fashion, changing from any access mode other than Card + Pin, to Card Only, will require the cardholder database to be regenerated, and sent to all the access points the cardholder has access to. Enter custom field data as appropriate per cardholder. Drop down menus appear from the defined lookups. Text can be directly typed into any field that does not contain lookups. BADGES Activation Date and Expiration Date show the period during which that badge will be active. The default activation date is the date of entry. The default for expiration date is 10 years from the date of entry. The Activation date must be later than 1/1/1990. A badge can be deactivated via the Active check box without changing the expiration date. When the Active box is not checked, the badge is inactive. A text box for corresponding notes will appear just below the check box. Additional detailed notes should be placed in the Badge Notes section. ACCESS ASSIGNMENTS To assign access to this badge click on the Access Groups tab. 54

ACCESS GROUPS The Access Groups that have been defined in the Access Groups module will appear on the left side of the Access Groups tab. Select the desired zone from the drop down menu. Double click on the desired Access Group name or highlight the Access Group name and click on the arrow button to put it on the right side. The badge will then have access to the Access Points within the assigned Access Group during the Time Zones defined in the Access Groups module. Up to 8 Access Groups from each zone can be assigned to one badge. HOLIDAYS When Holidays are used, the badges that have assigned Holiday Groups will be granted access as usual during the holidays within the assigned group. Badges that do not have Holiday Groups assigned will not be granted access during defined Holidays. Holiday Groups displayed on the right side are the groups that are assigned to that badge. Select Holiday Groups and use the arrows to move them from side to side to grant or remove access. Each badge can have a maximum of 8 assigned Holiday Groups. 55

GENERAL NOTES Notes allow operators to record specific information about individual badges. CARDHOLDER IMAGE CARDHOLDERS CAN HAVE AN IMAGE ASSOCIATED WITH THEM, WHICH WILL DISPLAY IN TRANSACTION MONITOR OR ALARM MONITOR WHEN A CARD TRANSACTION IS RECEIVED FOR THEIR BADGE. Click on the Add Photo button to associate a new image with this badge. Click on the Delete Photo button to associate a new image with this badge. WHERE ALLOWED Information on where a specific Badge is allowed access, is visible on the Where Allowed tab. Note that the actual Access Group Assignment information can not be changed here. This is display-only information. 56

Chapter 13 ALARMS Alarms can be generated from a single event that occurs on an Access Point or from a card swipe. Multiple alarm conditions can also be used to trigger each alarm. Alarms are based on Access Points or areas, combined with Time Zones and pre-defined alarm conditions. Deleting Access Points or areas that are used in Alarms will also delete those associated alarms. Alarm types are first used to distinguish one alarm from another. Types of alarms may include Fire, Security, Smoke or Intrusion. At a minimum, one Alarm Type must be defined before an alarm can be defined. Alarm Instructions are then defined. For each defined alarm up to 3 unique alarm instructions can be selected. An alarm instruction may include information about emergency phone numbers for the dispatchers to call or specific instructions about what to do in the even of a break-in. Each alarm can be routed to all operators or specific operator(s) only. DEFINE ALARM TYPES From the main interface click on the Alarms module. Click on the Alarm Types Listing tab Select Add or hit F5 to add a new Alarm Type. Enter a name for the alarm type and click Save. 57

DEFINE ALARM INSTRUCTIONS From the Main Interface click on the Alarms module. Select the Alarm Instructions Listing tab. Click on Add or hit F5. Enter a name for the instruction so that it can be easily called up when defining alarms. Enter specific instructions in the text box. One instruction can be used in multiple alarms. Text instructions can include up to 500 characters. Click OK to save this alarm instruction. Up to 255 alarm instructions can be saved. An Alarm Instruction cannot be deleted if it is used in an alarm. DEFINE ALARMS From the Main Interface click on the Alarms module again. Select Alarm Definitions Listing tab. Click on Add or hit F5. 58

ALARM SOURCE First define the source of the alarm. From the drop down menu select a single access point or an area. The area must already be defined in Access Point Center. ALARM INFO 59

PRIORITY AND TYPE Setting the priority level determines the order in which the alarm will be displayed in the Alarm Monitor. The Type of Alarm is selected from the previously defined types. Note that use of Alarm Response Commands requires the Priority and Type of the Command to match the Priority and Type of the Alarm. REQUIREMENTS FOR CLEARING THIS ALARM The Device must return to non-alarm condition checkbox works in conjunction with alarms that come from monitor points. For example, if a Door Held Open alarm is defined, and this box is checked, the alarm cannot be cleared until the Door Closed transaction comes through. The Operator Must Enter Comments check box forces the operator to enter comments regarding the alarm before it can be cleared from the Alarm Monitor. TIME ZONE Select the Time Zone to be used. Alarm transactions will only occur when this Time Zone is active. To verify the Time Zone, click on the Time Zone tab. The corresponding graph will appear. The green area is the active time. INSTRUCTIONS TO OPERATOR Up to 3 defined alarm instructions can be selected per alarm. From the drop down menu select the instructions that were defined in the Alarm Instructions area. The alarm instructions will appear in the Alarm Monitor in the order that they are displayed. TIME ZONES This displays the Time Zone that is selected on the Alarm Info tab. 60

ALARM ROUTING Each alarm can be routed to All Operators or Selected Operators by using the radio buttons. The list of operators is displayed on the left side. Highlight the desired operators and double click or use the arrow buttons to put them on the right side of the screen. The operators on the right side of the screen are the only operators that will see that alarm when Selected Operators is used. 61

Notes General notes for this alarm can be saved here. Note that there is a limit of 200 characters on this information. 62

Chapter 14 ALARM MONITOR The Alarm Monitor is a separate interface that shows currently active alarms in its own screen. The Alarm Monitor shows alarm transactions only. These alarm transactions are also displayed in red text in the Transaction Monitor. The alarm monitor cannot be closed. However, an operator s permissions can be changed to not include the Alarm Monitor. To do this, remove the operator s permissions for Acknowledge, Clear Active Alarms, Silence, and View Active Alarms under the Alarms tree as shown below. Using Zones also restricts an operator s ability to only view alarms originating in Zones which they have permission to view. To Enable or Disable alarms, press F12. When the alarms are disabled, new alarms will not appear in Alarm Monitor for that operator until alarms are enabled again. MENUS Clear Alarm Clears the selected alarm Clear All Alarms Clears all of the alarms in the grid Save Column Widths Saves the grid column widths BUTTONS Acknowledge Alarm Acknowledges the currently selected alarm Acknowledge All Alarms Acknowledges all alarms displayed. Enter Comment Allows entry of a comment prior to acknowledging an alarm 63

View Comments Displays the comments associated with an alarm View Instructions Displays the instructions associated with an alarm Silence Alarms Stops the audible beep Ignore Displayed Alarms (1) When checked (enabled) the alarm monitor screen will not pop up over the screen the user is in until a new alarm transaction comes in. (2) When not checked the screen will pop up every few seconds to remind the Operator that there are alarms that need attention. Display Card info with Alarms Displays the card information associated with selected alarm. MONITOR VIEW The Alarm Monitor grid gives details on the alarms. When multiple instances of the same alarm come in, the alarm count increases. A new alarm row is not generated. 64

Priority Priority of alarm as defined in the alarm definition. Higher priority alarms display at the top of the list. Access Point Access Point Description Name Cardholder name, if the alarm was generated from a badge, and the Encoded The encoded number if the alarm was generated from a badge Description Description of the alarm Time Time the alarm occurred Date Date the alarm occurred Count Number of times alarm has occurred 65

Chapter 15 COMMAND CENTER There are several types of commands that can be issued directly to devices or areas. These commands can be used to lock or unlock doors and grant access, among others. These commands can be set to happen on a time schedule, at one point in the future, immediately, based on an event, or based on an alarm. From the Main Interface click on the Command Center Icon. Scheduled commands are used to control an area (as defined in the Device Center), individual readers or output points on a time-scheduled basis. Scheduled commands are tied to Time Zones. Future Commands are single occurrence commands. An exact date and time is used with a specific command to control a device or area. Conditional Response Commands are used to control an area (as defined in the Access Pint Center), individual readers or output points based on events occurring. Alarm Response Commands are used to control an area (as defined in the Device Center), individual readers or output points based on alarms occurring. Issue a Command allows the Operator to send immediate commands to a specific access point or area. Issued commands can be saved for quick recall. Issue Command can also be seen directly from the Main Interface. 66

Commands are partitioned by Zones as defined in the Access Point Center. Scheduled Commands, Future Commands, and Alarm Response commands can be defined for Areas, which can also span Zones. Conditional Response Commands cannot span Zones. AVAILABLE COMMANDS COMMANDS TO AN ACCESS POINT Grant Access Lock Door Unlock Door DEFINE SCHEDULED COMMANDS From the Main Interface click on the Command Center module. Select the Scheduled Commands Listing tab. Click on Add or hit F5 to define a new scheduled command. COMMAND INFO ACCESS POINT OR AREA TO COMMAND Commands can be issued to a single access point or to an Area. COMMANDS Select from the drop down menus what should happen when the Time Zone is active (on) and inactive (off). 67

WHEN Select the Time Zone for the Scheduled Command to use. The command will only occur when that Time Zone is active. Deleting associated Time Zones will delete the Scheduled Command. HOLIDAY EXCEPTIONS If the Holiday Exception is selected the command will not be issued during Holidays assigned to that Holiday Group. In this example, the door to Room 330 will be unlocked using the Time Zone Monday through Friday from 8am to 5pm. On the Holidays in the Contractors Holiday Group, the command will not be issued and the door will remain locked. TIME GRAPH Time Graph shows a visual graph of Time Zone selected on the Command Info tab. Click Save to save and return to the Scheduled Commands screen. All scheduled commands will be listed. DEFINE FUTURE COMMANDS From the Main Interface click on the Command Center module. Click on the Future Commands Listing tab. Click on Add or hit F5 to define a new future command. COMMAND INFO Select single Access Point or Area. Select the command to be executed. Select the exact date and time the command should occur. This is a one-time command. 68

Click save. The time and date used will be the system time on the computer running ASIDataServer. All future commands will be listed. CONDITIONAL RESPONSE COMMAND From the Main Interface click on the Command Center module. Click on the Conditional Response Commands Listing tab. Click on Add or hit F5 to define a new conditional response command. COMMAND INFO TRIGGER DEVICE AND EVENT Select the Zone and Access Point to be used as the condition. RESPONSE COMMAND Select the specific access point to be controlled. Select which command should occur when the condition (as defined on the Conditions tab) occurs. CONDITIONS 69

CONDITIONS The displayed conditions are dependant on the device selected and whether or not an Input Point is used as the Source of Condition on the Command Info tab. WHEN Select the Time Zone for the Conditional Response Command to use. The command will only occur when that Time Zone is active. Deleting associated Time Zones will delete the Conditional Response Command. HOLIDAY EXCEPTIONS If the Holiday Exception is selected the command will not be issued during Holidays assigned to that Holiday Group. TIME ZONE Time Graph shows a visual graph of the Time Zone selected on the Command Info tab. NOTES Notes allow the Operator to enter comments to be stored with the command. Click Save to save and return to the Conditional Response Commands screen. All conditional response commands will be listed. 70

ALARM RESPONSE COMMANDS From the Main Interface click on the Command Center module. Click on the Alarm Response Commands Listing tab. Click on Add or hit F5 to define a new alarm response command. COMMAND INFO ACCESS POINT OR AREA TO COMMAND Select the Access Point or Area radio button. Next, select the Zone and Access Point to command. COMMANDS Select the command to be issued when the alarm occurs, and the command to be issued when the alarm is cleared.. ALARM CONDITIONS Select the same Alarm Type to be used to activate this command. Select the same Priority and Time Zone as the Alarm Definition. All Alarm Types that correspond to this Alarm Response command must be using the same Priority and Time Zone. NOTES Notes allow the Operator to enter comments to be stored with the Command. TIME GRAPH Time Graph shows a visual graph of the Time Zone selected on the Command Info tab. 71

Click Save to save and return to the Alarm Response Commands screen. All alarm response commands will be listed. 72

Chapter 16 ISSUE A COMMAND Issue a Command allows the Operator to send immediate commands to devices or areas. Issued commands can be saved for quick recall. Issued Commands can also be seen from the Command Center. ADD/ISSUE A NEW COMMAND From the Main Interface click on the Issue a Command module. Click on Add or hit F5 to define a new command. 73

Select the Access Point or Area radio button. Select the Zone and Access Point to command. The Lookup feature can help find the correct Access Point. Next select the command to issue. Click Save to save this command for future use. Click Issue Command to issue it immediately. Once a command has been saved, highlight it in the Issue Command screen and hit F11 to send the command quickly. Click Save to save and return to the Issue a Command screen. All issued commands will be listed. 74

Chapter 17 OPERATORS Anyone who needs to log into the Focal Point application can be an Operator. Operators are not associated with Cardholders. Operators must have a unique User Name and Password. Deleting an Operator prevents reports being run on that Operator at a future date. Suspending an operator s permissions will make it impossible for that operator to login. Do not change the user name for the System Administrator account (admin). Each Operator can have unique permissions controlling what they can see and do within the application. To perform some duties Operators must have certain permission combinations in various modules. For example, an operator must have permission to view Cardholders in order to get into the Cardholder module. When a check is present next to a given module function, the operator will have permission to perform that function. Double click on a specific function to grant or remove permissions individually. DEFAULT ADMIN OPERATOR User Name admin Password asi The admin operator has most permissions and the Default Zone. The other permission, Restricted by Zone, is also in Cardholders. When this is enabled, the operator will only be able to see the cardholders who have badge permissions in the specified zones on the right. Profiles can also be saved. A profile consists of a name and specific permissions. When adding new operators the permissions from a Profile can be copied. This is a very efficient way to add new operators who have similar permissions. Once the basic profile permissions have been copied, the operator s permissions can be further tailored. ADD AN OPERATOR / SET PASSWORD POLICIES From the Main Interface click on the Operators module. Click on Add or hit F5 to add a new operator. 75

MENUS Operators save or clear operator settings View expand or collapse permissions tree POLICIES TAB 76

PASSWORDS ARE CASE-SENSITIVE Check this box to force the exact match of upper and lower case letters in the entered password for the operator. Operator must enter the password in the exact same case to log on. FORCE PASSWORD EXPIRATION Check this box to force password to expire after the set number of days. Operator would have to enter a new password when the number of days expires. LIMIT LOGON ATTEMPTS Check this box to enforce a limit on the number of times an operator can fail subsequent login attempts. PERMISSIONS TAB 77

OPERATOR INFORMATION Check the radio button for Operator. Enter the rest of the information specific to each operator. First Name Last Name MI User Name Required and must be unique Password Required Confirm password retype the password for confirmation Suspend this account deactivates the operator, preventing login COPY PERMISSIONS When defining a new operator or editing an existing operator, permissions can be copied from another operator or profile. Select the operator or profile to copy and click on the Copy Permissions button. OPERATOR PERMISSIONS Check the box next to the permission(s) you wish to grant the operator, for each module. 78

COMMON PERMISSIONS: VIEW Operator can look at the information in this module, but is not allowed to change anything. Minimum required to have access to a specific module. EDIT Operator can perform Add, Edit and Delete of information in this Module ADDITIONAL PERMISSIONS CARDHOLDERS RESTRICTED BY ZONE Operator will only be able to see cardholders which are included in Zones the operator is allowed access to. COMMAND CENTER ISSUE COMMAND Operator will not be able to actually send (issue) and defined Issue Commands to devices, unless this permisson is checked. ALARMS 79

ACKNOWLEDGE Operator will not be able to acknowledge an alarm, unless this permission is checked. EDIT Operator will not be able to Add, Edit or Delete existing alarm definitions, unless this permission is checked. SILENCE Operator will not be able to check the Silence Alarm option in Alarm Monitor, unless this permission is checked. VIEW ACTIVE ALARM Operator will not be able to see incoming alarm transactions, unless this permission is checked. CLEAR ACTIVE ALARM Operator will not be able to clear any existing alarms, unless this permission is checked. ZONES Select the zones in which the operator has permissions. Zone partitioning affects which cardholders and devices an operator has permission to view. Operators will only be able to view Access Points that are in the specified zone(s). If the Restrict by Zone permission is selected the operator will only be able to see the Cardholders who have access assignments in the specified zone(s). 80

ADD A PROFILE The only difference between a Profile and an Operator is that the Profile needs only a profile name. All other menu options, icons, and permissions are the same. A Profile cannot be used as a login. 81

Chapter 18 TRANSACTION MONITOR The Transaction Monitor displays real time what is going on within the software and at the Access Points. It shows card reads, alarms, operators logging on and off, updates to cardholders and badges, and commands. TRANSACTION TAB CLEAR BUFFER This button removes undisplayed transactions from a temporary table in the SQL database. CLEAR PENDING This button removes any unsent commands which are going to an access point, from a temporary table in the SQL database. FILTERS Allows the Operator to determine which transactions will show up in transaction monitor Show Cardholder Transactions Show System Transactions Show Operator Actions 82

TRANSACTION COLOR CODE Blue Operator Transaction Bright Red Alarm Black System and/or Cardholder DISPLAY CARD INFO Check the Display Card Info with transactions box to show cardholder images and certain cardholder and badge data with associated transactions. COLUMNS Access Point Gives the name of the Access Point on which the transaction occurred. A 0 appears when a transaction is not associated with a panel, such as operator transactions. Name Gives the name of the operator if it is an operator transaction. If the transaction occurred from an Access Point it will say Access Point. Encoded Shows encoded numbers for cardholder transactions. It is also a descriptive reference for other uses. Description Shows the event that occurred. Time Time transaction occurred corresponding to the system time on the computer running ASIDataServer. Date Date transaction occurred corresponding to the system time on the computer running ASIDataServer. SYSTEM STATUS TAB The system status tab shows a summary of information in the database. 83

CONNECTIONS Clicking on the Connections radio button gives a listing of the current Access Points. The Zone and Panel names are shown with the status. SYSTEM STATUS System status gives an overview of the Access Points and Cardholders that are defined in the system. The Use Date check box allows the operator to select a Date Range to use. The operator can then see transaction details during that time frame including Number of Access Granted, Number of Access Denied, Number of Alarms, Total Transactions, Buffered Transactions, and Pending Records. 84