+ All Categories
Home > Documents > Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to...

Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to...

Date post: 14-Oct-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
187
Technical Support: (651) 344-8723; Fax: 651-453-1338, http://www.access-specialties.com Installation & User’s Guide Access Security Integrator
Transcript
Page 1: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

Technical Support: (651) 344-8723; Fax: 651-453-1338, http://www.access-specialties.com

Installation & User’s Guide

Access Security Integrator

Page 2: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

ii

Table of Contents ©Copyright 2014 Access Specialties International, LLC................................................... 1

Software License Agreement.............................................................................................. 1

Technical Support ............................................................................................................... 1

Chapter 1 Welcome to Access Security Integrater ............................................................. 2 Controlling Access ......................................................................................................... 2 Card Readers and Transactions...................................................................................... 2 Monitoring Activity ....................................................................................................... 2 Commands ..................................................................................................................... 3

Chapter 2 Access Security Integrater Requirements .......................................................... 4 Minimum PC Requirements for SQL Server Host ........................................................ 4 Minimum PC Requirements for Workstations............................................................... 4 Technical Experience ..................................................................................................... 5

Chapter 3 System Components........................................................................................... 6 Panel Manager................................................................................................................ 6 ASI Server...................................................................................................................... 6 ASI Launch .................................................................................................................... 6 SQL Server..................................................................................................................... 6

SQL Server Versions................................................................................................. 6 Installing SQL Server................................................................................................ 6 Scheduling Backups in SQL Server Enterprise Manager ......................................... 7

Chapter 4 Install Access Security Integrater..................................................................... 12 Installation Options ...................................................................................................... 12

Stand-alone.............................................................................................................. 12 Networked ............................................................................................................... 12

Complete Installation ................................................................................................... 13 Custom Installations on the Server .............................................................................. 14 Custom Installations on a Workstation ........................................................................ 15 Database Installation / Upgrade ................................................................................... 17 File DSN ...................................................................................................................... 18

Password Integrity................................................................................................... 18 Create & Access the File DSN................................................................................ 18

DCOM.......................................................................................................................... 23 Server User Name / Password Changes .................................................................. 23

Chapter 5 Upgrade An Existing Access Security Integrater System................................ 26 Upgrade the Server Software ....................................................................................... 26 Upgrade the Database .................................................................................................. 27 Upgrade the Workstation Software.............................................................................. 27

Chapter 6 Start Using Access Security Integrater (Main Interface) ................................. 28 Log In To Access Security Integrater .......................................................................... 28 Interacting with Access Security Integrater ................................................................. 28

Page 3: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

iii

Module Icons................................................................................................................ 28 Module Tool Bar .......................................................................................................... 29 Menus........................................................................................................................... 29

File........................................................................................................................... 29 View ........................................................................................................................ 30 Edit .......................................................................................................................... 33 Toolbar .................................................................................................................... 34 Help ......................................................................................................................... 34

Message Box ................................................................................................................ 34

Chapter 7 Access Security Integrater Image Paths ........................................................... 35 Global Settings ............................................................................................................. 35 Local Settings............................................................................................................... 35 Client Image / Signature Paths..................................................................................... 36 Examples ...................................................................................................................... 37

Network Setup......................................................................................................... 37 Standalone Setup ..................................................................................................... 38

Chapter 8 Time Zones....................................................................................................... 39 Add Time Zones........................................................................................................... 40

Normal Shift ............................................................................................................ 40 Alternating Shift ...................................................................................................... 41 24/7 Shift ................................................................................................................. 42

Edit Time Zones........................................................................................................... 43 Delete Time Zones ....................................................................................................... 44 View Time Zones......................................................................................................... 44

Chapter 9 Device Center................................................................................................... 46 Zones ............................................................................................................................ 46 Panels ........................................................................................................................... 47

IC-1600.................................................................................................................... 47 UP-2000 .................................................................................................................. 48

Communication Protocols............................................................................................ 48 RS-232 Direct.......................................................................................................... 48 RS-232 Dial-Up....................................................................................................... 49 RS-485..................................................................................................................... 49 TCP/IP..................................................................................................................... 49

Device Overview.......................................................................................................... 49 IC-1600 Devices .......................................................................................................... 50

Channel Expander ................................................................................................... 50 Reader Interface Boards .......................................................................................... 50 Contact Points ......................................................................................................... 51 Elevator Control Module......................................................................................... 51

UP-2000 Devices ......................................................................................................... 51 Door Controls .......................................................................................................... 51 Monitor and Contact Points..................................................................................... 51

Monitor (Input) and Output Points............................................................................... 51 Anti-Passback............................................................................................................... 51

Page 4: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

iv

Areas ............................................................................................................................ 52 Define Panels ............................................................................................................... 52

Add a Panel ............................................................................................................. 52 Panel Information.................................................................................................... 52 Connection .............................................................................................................. 53 Settings .................................................................................................................... 54 Memory Configuration............................................................................................ 54 Notes........................................................................................................................ 55

Define Devices ............................................................................................................. 55 Define Readers ............................................................................................................. 57

Advanced Settings................................................................................................... 58 Define Anti-Passback.............................................................................................. 58 Reader Notes ........................................................................................................... 59 Define Elevator Control Module (ECM) ................................................................ 59

Define Areas ................................................................................................................ 62

Chapter 10 Hardware Information .................................................................................... 63 Cable Connections ....................................................................................................... 63 ECM ............................................................................................................................. 63 IC-1600 with Comtrol Units ........................................................................................ 63 IC-1600 with RS-485 ................................................................................................... 64 Reset Memory on Reader Interface Boards ................................................................. 64 Grounding IC-1600 Products ....................................................................................... 64 Dial-Up......................................................................................................................... 64 Short Haul Modems (ME800A Black Box Converter)................................................ 65 Cable Diagram ............................................................................................................. 66 Cards/Readers: ............................................................................................................. 66

Door controls........................................................................................................... 66 Dorado Magnetic Stripe readers.............................................................................. 66 Pin Only................................................................................................................... 67 PR-100 Programming Tips: .................................................................................... 67

Chapter 11 Access Groups................................................................................................ 68 Access Group Definitions ............................................................................................ 68

Add Access Group Definitions ............................................................................... 68 Group Access Assignments ......................................................................................... 69 Elevator Assignments .................................................................................................. 71

Chapter 12 Holidays ......................................................................................................... 72 Add Holiday Groups .................................................................................................... 72 Add Holidays ............................................................................................................... 73

Chapter 13 Cardholders .................................................................................................... 74 Menus........................................................................................................................... 75

File........................................................................................................................... 75 Cardholder ............................................................................................................... 75 Navigation ............................................................................................................... 76

Search Cardholders ...................................................................................................... 76 Define Custom Fields................................................................................................... 76

Page 5: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

v

Create Custom Fields .............................................................................................. 76 Add Cardholders .......................................................................................................... 77 Badges .......................................................................................................................... 78

Access Assignments ................................................................................................ 78 Add Additional Badges ........................................................................................... 80 Add Cardholder Images .......................................................................................... 81 Add A Signature...................................................................................................... 82 Enable Signature Pad .............................................................................................. 82 Change Signature Pad Type .................................................................................... 83 Associated Layout ................................................................................................... 83 View Access ............................................................................................................ 84

Chapter 14 Badge Layouts................................................................................................ 85 Menus........................................................................................................................... 85

File........................................................................................................................... 85 Box .......................................................................................................................... 85 Badge....................................................................................................................... 86 Navigation ............................................................................................................... 86

Icons ............................................................................................................................. 86 Create New Layouts..................................................................................................... 87 Print Badges ................................................................................................................. 90

Group Printing......................................................................................................... 90

Chapter 15 Alarms ............................................................................................................ 91 Define Alarm Types..................................................................................................... 91 Define Alarm Maps...................................................................................................... 92 Define Alarm Instructions............................................................................................ 94 Define Alarms .............................................................................................................. 95

Alarm Source........................................................................................................... 95 Alarm Info ............................................................................................................... 96 Alarm Maps............................................................................................................. 97 Time Zones.............................................................................................................. 98 Alarm Routing......................................................................................................... 99

Chapter 16 Alarm Monitor.............................................................................................. 100 Menus .................................................................................................................... 100 Icons ...................................................................................................................... 100

Monitor View............................................................................................................. 102

Chapter 17 Command Center.......................................................................................... 103 Available Commands ................................................................................................. 104

Commands to Outputs ........................................................................................... 104 Commands to Monitor Points ............................................................................... 104 Commands to a Reader ......................................................................................... 104

Define Scheduled Commands .................................................................................... 104 Command Info....................................................................................................... 104 Time Graph ........................................................................................................... 106

Define Future Commands .......................................................................................... 106 Command Info....................................................................................................... 106

Page 6: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

vi

Conditional Response Command............................................................................... 107 Command Info....................................................................................................... 108 Conditions ............................................................................................................. 108 Time Zone ............................................................................................................. 109 Notes...................................................................................................................... 110

Alarm Response Commands ...................................................................................... 110 Command Info....................................................................................................... 110 Notes...................................................................................................................... 111 Time Graph ........................................................................................................... 111

Chapter 18 Issue A Command ........................................................................................ 112 Add/Issue a New Command ...................................................................................... 112

Chapter 19 Operators ...................................................................................................... 113 Default Admin Operator ............................................................................................ 113 Add an Operator / Set Password Policies................................................................... 113

Menus .................................................................................................................... 114 Icons ...................................................................................................................... 115 Operator Information............................................................................................. 116 Copy Permissions.................................................................................................. 116 Operator Permissions ............................................................................................ 117 Zones ..................................................................................................................... 117

Add A Profile ............................................................................................................. 117

Chapter 20 Panel Manager.............................................................................................. 118 Assign Panels ............................................................................................................. 118 Menus......................................................................................................................... 119

Add/Remove Panels .............................................................................................. 119 Use Debug ............................................................................................................. 119 Use Nine Digit Encoded........................................................................................ 119 Turn Allocation On/Off......................................................................................... 120 Turn Transactions On/Off ..................................................................................... 121 Set Polling Speed .................................................................................................. 121 Edit Panel Event Checks ....................................................................................... 122 Exit ........................................................................................................................ 122

Columns ..................................................................................................................... 123 Messages .................................................................................................................... 124

Chapter 21 Transaction Monitor..................................................................................... 125 Transaction Tab.......................................................................................................... 125

Menus .................................................................................................................... 125 Transaction Color Code ........................................................................................ 126 Display Card Info .................................................................................................. 127 Columns ................................................................................................................ 127 Show Transactions by Panel or Zone.................................................................... 128

System Status Tab...................................................................................................... 128 Connections........................................................................................................... 128 System Status ........................................................................................................ 128 Current Status ........................................................................................................ 129

Page 7: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

vii

Refresh Values ...................................................................................................... 129

Chapter 22 Reports ......................................................................................................... 130 Create a New Report .................................................................................................. 130

Step 1..................................................................................................................... 130 Select Report Type and Subtype (if applicable).................................................... 131 Select Fields .......................................................................................................... 131 Define the Display Order of the Report Fields...................................................... 135 Select the sort order............................................................................................... 135 Set Date Range ...................................................................................................... 135 Additional Criteria................................................................................................. 135 Save Report ........................................................................................................... 135 Run Report ............................................................................................................ 135 Export Report ........................................................................................................ 135

Run A Saved Report .................................................................................................. 136 Create A New Query.................................................................................................. 136 Execute A Saved Query ............................................................................................. 137 Operator Activity Report ........................................................................................... 138

Chapter 23 Standalone Reports....................................................................................... 143 Setup on the SQL Server............................................................................................ 143 Setup Workstations .................................................................................................... 144 Initial Use................................................................................................................... 144 Create Access Security Integrater Reports to Schedule............................................. 145 Create SQL Queries to Schedule ............................................................................... 146 Schedule Reports and Queries ................................................................................... 148

Step 1 – Select a Schedule Function ..................................................................... 148 Step 2 – Select A Saved Report or Query ............................................................. 148 Step 3 – Select Report Frequency ......................................................................... 149 Step 4 – One Time Report..................................................................................... 150 Step 4 – Recurring Report ..................................................................................... 150 Step 5 – Select Report Format............................................................................... 153 Add Schedule ........................................................................................................ 153 Auto-Increment Date Ranges: ............................................................................... 153

View Existing Schedules ........................................................................................... 154 Edit Existing Schedules ............................................................................................. 155 Delete a Schedule....................................................................................................... 156

Chapter 24 Event Manager ............................................................................................. 159 Configure Pagers........................................................................................................ 159

Device Type .......................................................................................................... 160 Menus .................................................................................................................... 161 Pager Groups ......................................................................................................... 161

Configure E-Mail ....................................................................................................... 163 Menus .................................................................................................................... 163

Define Rules............................................................................................................... 168 Define Responses ....................................................................................................... 171

Define Panel Responses ........................................................................................ 171

Page 8: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

viii

Define CCTV Responses ...................................................................................... 172 Define Pager Responses ........................................................................................ 172 Define E-Mail Responses...................................................................................... 173 Define DVR Responses......................................................................................... 173

Define Events ............................................................................................................. 174

Index ................................................................................................................................... 1

Page 9: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

1

©Copyright 2014 Access Specialties International, LLC

All Rights Reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying or recording, without the express written permission of Access Specialties International. Information in this document is subject to change without notice and does not represent a commitment on the part of Access Specialties International. Unless otherwise noted, all names of companies, persons, products, and addresses contained herein are part of a completely fictitious scenario or scenarios and are designed solely to document the use of an Access Specialties’ product. Windows is a trademark of Microsoft Corporation.

SOFTWARE LICENSE AGREEMENT

The software described in this document is furnished under a License Agreement. This is a legal agreement between you and Access Specialties International, LLC. Opening the CD package indicates that you accept these terms:

Access Specialties International grants to you the right to use one copy of the enclosed software on a single computer or to a network server. If additional workstation licenses are purchased, you have the right to install the software on as many computers as is validated by the system registration. The software is owned by Access Specialties or its suppliers and is protected by the United States copyright laws and international treaty provisions. You may not rent or lease the software. You may not reverse engineer, de-compile, disassemble, or create derivative works from the software.

If you do not agree to the terms of this Agreement, promptly return the unopened software package and all accompanying items, to the place of purchase for a full refund.

TECHNICAL SUPPORT For technical assistance or further information, call the Technical Support at (651) 344-8723, (651) 344-8748, or (651) 344-8941. Support is available Monday through Friday, 8:00 AM to 5:00 PM, CST. A 24-hour fax line is also available by dialing (651) 453-1338. Written correspondence may be directed to Access Specialties International, 15230 Carrousel Way, Rosemount, MN 55068 or by email to [email protected]. Installation guides are available on the Access Security Integrator Installation CD and are installed to the ASI Launch folder as well.

Page 10: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

2

Chapter 1 WELCOME TO ACCESS SECURITY

INTEGRATER (ASI) ASI is an inclusive 32-bit Windows based access control software package that is integrated to operate with a Microsoft SQL Server database. Colorful screen graphics, easy-to-use interface, and powerful flexibility make ASI essential for managing your facility. When combined with the power of the IC-1600 Intelligent Controller and/or UP-2000 Universal Panel, you have state of the art access control… and “Security made easy.”

CONTROLLING ACCESS Access is controlled throughout your facility by information stored in a SQL database that ASI queries for controlling access, devices, and monitoring transactions and alarms. Information stored includes cardholders and card readers, as well as Access Groups and Time Zones. Access Groups are created by combining one or more readers with the defined Time Zones. Cardholders can have up to 12 assigned Access Groups. This allows each cardholder to have unique access privileges. Zones partition the system allowing panels and devices to be separated into separate zones controlling what information is sent to each panel and what information each system operator can view.

CARD READERS AND TRANSACTIONS ASI supports a variety of card technologies, such as proximity, magnetic stripe, barium ferrite, bar code, smart card, biometrics and keypad entry. Each Reader is connected to an RI (Reader Interface) board, or DW2 (Dual Wiegand Module). When a card is presented at a Reader, the data is sent from the Reader to the RI or DW2 and then to the panel. The panel holds key information regarding badge access. The panel then sends a signal back through the RI board or DW2 opening the contact if the door should be unlocked. The complete transaction is documented and stored for real time display, as well as reports.

MONITORING ACTIVITY Monitoring activity is accomplished via sensing devices. Most sensing devices provide a two-state output, an open or closed electrical connection. These conditions may be monitored with a dedicated system device such as the CC-165 (Contact Center) or MCM-168 (Monitor Control Module). The CC-165 device has the ability to monitor 16 sensors (such as motion detectors, smoke detectors, light sensors, thermostats etc.) The CC-165 also provides 5 output relays for activating and deactivating many types of devices (such as outdoor lighting,

Page 11: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

3

sirens, cameras, as well as a wide variety of other electro-mechanical devices). It should be noted that any monitored condition might be defined as an alarm condition or simply documented through system transactions.

COMMANDS The commands available through ASI help a facility run more efficiently. Devices being activated via output relays may also be manually commanded by a system operator or scheduled for repeat activity, such as turning parking lot lights on and off at a scheduled time on a daily basis. Doors and areas can also be set to open or close at specific times. There are also instances where immediate action must be taken, based upon a sensed condition. These actions can be set to occur automatically by defining a conditional response command. For example, if smoke is sensed by a hallway smoke detector being monitored, an output relay can be connected to the sprinkler system. A conditional response command can be programmed to turn on the sprinklers when smoke is detected.

Page 12: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

4

Chapter 2 ACCESS SECURITY INTEGRATER

REQUIREMENTS ASI offers a wide range of configuration options when creating the security system. The hardware requirements will vary depending on the Security Administrator’s choice of whether to install the application on the same computer as Microsoft SQL Server, or another computer. Below are the minimum recommendations necessary for installing ASI.

MINIMUM PC REQUIREMENTS FOR SQL SERVER HOST - Processor: 1.5GHz or higher - Display: VGA or higher-resolution monitor (Super VGA recommended) - Operating Systems: Windows 2000, Windows XP, Windows 2003 Server,

Windows 7 and Windows 2008 Server - Memory: 1G RAM or more - Hard Drive: 5 GB (depending on estimated size of database) - Disk Drive: CD-ROM Drive

- SQL 7.0: ~ 5 G - SQL 2000: ~ 9 G

- SQL Server: 7.0, 2000, 2005 and 2008 MINIMUM PC REQUIREMENTS FOR WORKSTATIONS

- Processor: 1GHz or faster - Operating System: Windows 2000, Windows XP, Windows 2003 Server,

Windows 7 and Windows 2008 Server - Memory: 512 MG of RAM - Hard Drive: 1G

Page 13: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

5

TECHNICAL EXPERIENCE There are two different levels of technical experience needed for the installation and operation of the ASI security software. Personnel installing the Microsoft SQL Sever software should be familiar with Microsoft SQL Server. The day-to-day operators using ASI should have a general level of comfort with the standard Windows environment. Access Specialties offers courses for all types of users and installers covering Microsoft Operating Systems, SQL Server, ASI, and Access Specialties hardware. Please see our website for more information. http://www.Access-Specialties.com.

Page 14: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

6

Chapter 3 SYSTEM COMPONENTS

Access Security Integrater consists of three main components that have been designed to allow for a number of different installation options. Below is an overview of the purpose of each.

PANEL MANAGER Panel Manager controls ASI’s communications with the security systems hardware. Multiple panel managers can be run on separate computers to distribute the transaction load caused by multiple panels. This is particularly useful when the transaction traffic is very high.

ASI SERVER The ASI Server component performs all of the run-time communications between Access Security Integrater and the ASI SQL Database. A File DSN establishes the communications link between ASI Server and the SQL Database. Contact Access Specialties for specific DSN information.

ASI LAUNCH ASI Launch is the interface for defining the security system, issuing commands, and viewing real time transactions and alarms.

SQL SERVER

SQL SERVER VERSIONS ASI is compatible with the Desktop (MSDE) and the full versions of SQL Server 7.0 and the full version of SQL Server 8.0 (2000). The MSDE does not have the administrative tools that are available with the full version of SQL Server. It is free and is available on each Access Security Integrater installation CD. There is a 2 GB database limit with the MSDE version. Once the database grows to approximately 2 GB Access Security Integrater will stop working. Please consult Microsoft for licensing information and options for SQL Server.

INSTALLING SQL SERVER A copy of the MSDE SQL 7.0 version is included with each installation CD. Installing the ASI Server on a machine, which does not have SQL, will cause the MSDE version of SQL 7.0 to be installed on your machine.

Page 15: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

7

Installing a full version of Microsoft SQL Server is outside the scope of this help file. Please consult the Microsoft SQL Server Introduction Manual that came with your purchase of SQL Server. During installation select:

Local Install – Install to the Local Machine Setup Type – Typical Service Settings – Use Local System Account for Mixed Mode Authentication

SCHEDULING BACKUPS IN SQL SERVER ENTERPRISE MANAGER 1) Open the enterprise Manager 2) Explore down the tree to the database that you want to backup as shown 3) Right Click on the Name of the Database 4) Select “All Tasks” 5) Select Backup Database

Page 16: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

8

6) Set the Database and Name for the database that you want to backup 7) In the Backup section ensure the “Database – complete” button is selected 8) In the Destination Section click on the “Add…” button

Page 17: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

9

Page 18: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

10

9) Click on the “…” button next to “File Name” and browse to the location you want your scheduled backup to save to a. The default path for SQL 7 is C:\MSSQL7\BACKUP b. The default path for SQL 2000 is C:\Program Files\Microsoft SQL

Server\MSSQL\BACKUP\ 10) Click “Ok”

Page 19: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

11

11) In the Schedule section check the “Schedule” box 12) Click on the “…” box next to the schedule 13) Name your schedule and set the settings according to your own schedule

a. Several ASI functions are scheduled to happen at 00:00:00 every day so we recommend that backups are not scheduled within 10 minutes of midnight.

14) Ensure the “Enabled” box is checked on the right side 15) To edit when this backup occurs click on “Change…”

16) After you have finished editing, click “Ok” until you get back to the

Enterprise Manager 17) Close Enterprise Manager 18) It is recommended that at least one backup be verified

Page 20: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

12

Chapter 4 INSTALL ACCESS SECURITY INTEGRATER INSTALLATION OPTIONS

The Security Administrator can install the components of Access Security Integrater as either a stand-alone security system or as part of a networked security system.

STAND-ALONE All ASI components and the SQL Database are installed on one computer. A stand-alone security system can be implemented to meet the needs of users that want to localize their security system to one computer because of a smaller facility size or lack of network connections.

NETWORKED Implementing a networked security system is just as easy to accomplish as implementing a stand-alone security system and gives the user a high degree of flexibility in controlling access to key parts of the security system.

For Networked Security Systems, it is necessary to install the ASI Server component before installing either ASI Launch or Panel Manager on client workstations. ASI Server is only installed on the server machine. Selecting the complete installation, or individually selecting ASI Server through the custom installation will accomplish this.

Page 21: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

13

For each type of installation you will be given the option of installing shortcuts for ASI Launch and Panel Manager on the desktop or directly on the Start menu. You will also be given options for ASI Launch and Panel Manager to automatically launch when the Operating System is launched.

ASI 2000 Setup

COMPLETE INSTALLATION

1) Log in to the Server Operating System as an Administrator 2) Insert CD into server

a. If it does not auto start, select AutoRun.exe from the main folder 3) Select View Installation notes before installing Access Security Integrater 4) Select Complete Installation to install ASI Server, ASI Launch and Panel

Manager 5) If you are logged in under a network account, select the Network Server

computer name 6) If you are logged in locally select the local computer name 7) Select the account name that you are logged in as 8) Enter the password for this account

a. Note: If this password changes, the same changes will have to be made in DCOM

9) Click Next

Page 22: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

14

10) Setup may find an older version of Access Security Integrater and will uninstall that version before installing this version. Click Yes

11) We recommend that the default paths for installation be used. To do this, just continue to select Next

12) Please contact Access Specialties for questions regarding alternate installations

CUSTOM INSTALLATIONS ON THE SERVER

1) Log in to the Server Operating System as an Administrator 2) Insert CD into server

a. If it does not auto start, select AutoRun.exe from the main folder 3) Select View Installation notes before installing Access Security Integrater 4) Select Custom to choose which components to install

a. At a minimum, ASI Server must be installed on the server

5) Select which components you wish to install and click Next

Page 23: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

15

6) Make sure you have the proper information according to this screen and click OK

7) If you are logged in under a network account, select the Network Server computer name

8) If you are logged in locally select the local computer name 9) Select the account name that you are logged in as 10) Enter the password for this account

a. If the password changes, the same changes will have to be made in DCOM 11) Click Next

12) Setup may find an older version of Access Security Integrater and will uninstall that version before installing this version. Click Yes

13) We recommend that the default paths for installation be used. To do this, just continue to select Next

14) Please contact Access Specialties for questions regarding alternate installations

CUSTOM INSTALLATIONS ON A WORKSTATION 1) Log in to the Server Operating System as an Administrator 2) Insert CD into Workstation

a. If it does not auto start, select AutoRun.exe from the main folder 3) Select View Installation notes before installing Access Security Integrater 4) Select Custom to choose which components to install

Page 24: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

16

5) Select which components you wish to install and click Next

6) Make sure you have the proper information according to this screen and click OK

7) Select the computer name that has ASI Server installed or click on Enter IP Address enter the IP Address

8) Click Next

Page 25: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

17

9) Setup may find an older version of Access Security Integrater and will uninstall that version before installing this version. Click Yes

10) We recommend that the default paths for installation be used. To do this, just continue to select Next

11) Please contact Access Specialties for information regarding alternate installations

DATABASE INSTALLATION / UPGRADE

1) Run the setup on the machine housing SQL Server

2) Select Install Database

Page 26: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

18

3) Select the appropriate option 4) Easy to follow instructions and a clean graphical interface makes installing

new databases, restoring previous databases or upgrading current systems quick and easy.

FILE DSN A File DSN (Data Source Name) is used to connect ASI Server to the SQL database.

PASSWORD INTEGRITY It is important that the password used when creating the DSN be kept confidential. If compromised, a person could gain access to the SQL database.

CREATE & ACCESS THE FILE DSN

The File DSN is set up on the computer running ASIServer.exe. It establishes the link between ASIServer and the SQL database. This link must be established before ASI Launch can interact with the database. 1) Open the Control Panel

A) Windows XP – click on Start / Control Panel B) Windows 2000 – click on Start / Settings / Control Panel

2) Open Administrative Tools

3) Open Data Sources (ODBC)

Page 27: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

19

4) Select the “File DSN” tab

5) IF a DSN does exist select Configure and go to step 7 6) IF a DSN for Access Security Integrater does not already exist complete the

following steps: A) Select “Add…” B) Select SQL Server from the bottom of the list C) Select “Next”

Page 28: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

20

D) Type ASI2000 E) Select Next

F) Select Finish

Page 29: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

21

7) Select the Microsoft SQL Server with which you would like to connect. If the

ASI database resides on the workstation you are using, select or type ‘(local)’

8) Select ‘with SQL Server Authentication using a login ID and password entered by the user’

9) Contact Access Specialties for the specific Login ID and Password

Page 30: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

22

10) Change the default database to the name of the ASI database installed on the SQL server

11) Select ‘Next’

12) Select ‘Finish’

Page 31: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

23

13) Select ‘Test Data Source’

DCOM DCOM is Microsoft’s Distributed Communication Object Model. Access Security Integrater uses DCOM to connect workstations to the Server.

SERVER USER NAME / PASSWORD CHANGES If the user name and/or password on the Server are changed, the same changes must be applied in DCOM.

Page 32: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

24

Click on the Start menu and type DCOMCNFG. Scroll down to ASIServer.clsscctv as shown below.

On the Identity tab select This User and enter the OS user name. Enter and confirm the password. Click Apply.

Page 33: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

25

Page 34: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

26

Chapter 5 UPGRADE AN EXISTING ACCESS SECURITY

INTEGRATER SYSTEM Upgrading an Access Security Integrater system can be completed in minutes in just 3 easy steps. Before starting the upgrade, find the following information:

1) Computer name or IP Address of the Server: __________________ 2) Name of the SQL Database: ______________________________

i. Check the File DSN OR ii. Start Access Security Integrater and select View / Check DB /

Currently Connected Database 3) Name and location of all other machines running Access Security

Integrater workstations or Panel Manager:

View the Readme.txt from the cd to see PC requirements or view Server and Workstation Requirements from this manual. See Chapter 2.

UPGRADE THE SERVER SOFTWARE

First make sure that Access Security Integrater is closed on all workstations and on the Server. Check the processes tab in Task Manager and make sure that ASIServer.exe is not running. If it is, end the process. Next insert the latest Access Security Integrater CD. If the CD does not automatically run, or if you are installing from a folder, double click on the AutoRun.exe. Select Complete Install to install ASI Server, ASI Launch (workstation) and Panel Manager. Select Custom Install to install individual components. At least ASI Server must be installed on your Server PC (see Chapter 4). Select the workstation and user on which to install Access Security Integrater. Ensure that the user has Administrator permissions. To use a domain account select the computer name or IP address of that Server. Enter the password and click OK. Select Yes to remove previous ASI 2000 installs.

Page 35: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

27

Continue through the installation process, choosing which options best suit your needs. Do NOT try to run Access Security Integrater until the Database has been upgraded.

UPGRADE THE DATABASE Insert the installation cd on the machine running SQL or copy the folder to that machine. If you do not need to install the software on the computer or if you already have, stop the auto-run. Explore to the CD drive or open the software folder. Open the Upgrade folder. Double click on DatabaseUpgrade.exe.

From the drop down menu select the SQL Database name. Select Yes if you are using SQL MSDE. Select No if you are using a full version of SQL Server. Click on Upgrade Database. The upgrade utility will add the necessary components needed to run with the latest version of ASI Platinum. Custom installs of the software can be completed while the database is being upgraded. Do NOT try to start any Access Security Integrater component until the Upgrade is complete.

UPGRADE THE WORKSTATION SOFTWARE Perform custom installs (see Chapter 4) for each component needed on each workstation. During the installation you will be prompted to enter the IP address or Computer Name of the computer running ASI Server. If this is entered incorrectly you will get an error connecting, error 70. Should this occur, reinstall the workstation pointing at the correct computer.

Page 36: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

28

Chapter 6 START USING ACCESS SECURITY

INTEGRATER (MAIN INTERFACE)

LOG IN TO ACCESS SECURITY INTEGRATER Launch Access Security Integrater by clicking on Start/Programs/ASI/ASI or by double-clicking on available shortcuts. Contact Access Specialties for the User Name and Password if this is an initial installation.

INTERACTING WITH ACCESS SECURITY INTEGRATER Access Security Integrater allows each operator to have tailored permissions within ASI. ASI’s modular design makes it easy to grant administrative rights to an operator or restrict an operator to ‘view only’ privileges in any one of the modules. If an operator does not have any permissions within a module the icon button for that module will not appear on the screen.

MODULE ICONS ASI uses icons to organize each module of the software. The icons can be arranged across the top of the screen by clicking on Toolbar and selecting Toggle Toolbar Orientation.

Access Groups and Access Assignments are defined in this module. Access Assignments determine when a badge can be used at certain readers.

All alarms and maps are defined in this area. Assign priority levels; and identify conditions causing the alarm at a specific device or area. Alarm instructions are also created and assigned here.

The Cardholders module holds information about people, badges and access permissions. It is also where badge layouts are created and printed.

All Immediate, Scheduled, Future, Conditional Response and Alarm Response Commands can be created and issued in the Command Center.

Issue Command allows operators to quickly send commands to devices or areas such as locking or unlocking doors.

Device Center displays Zones, Panels, Devices, Card Readers and Input and Output Points.

Page 37: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

29

All Holiday Groups and definitions are created in the Holiday Definition module. Defined holidays can prevent badges from being granted access, and cause commands not to be issued on defined holidays.

Unique user names, passwords and permissions are assigned in the Operators module. Other security features, such as password rules, and login policies are also set here.

The Reports Module allows the user to easily create custom reports, save these reports for future use, edit saved reports or create SQL scripts that query the database for virtually any report needed.

Time Zone intervals are defined in this module. This section also displays graphs for visual confirmation of when a Time Zone is active.

The Transaction Monitor shows transactions live as they are happening throughout the day.

MODULE TOOL BAR

The Main Interface is customizable for each Operator. The Modules default appearance is a vertical alphabetical arrangement on the left. Selecting the Toggle Toolbar Orientation option in the toolbar menu can change the orientation causing the Module toolbar to appear across the top of the screen. Only the modules that an operator has permissions in will appear. Each operator can rearrange the module order in the Local Settings.

MENUS FILE

The file menu allows the Operator to log out of ASI, or Exit the application. Logging Off closes the application and brings up the login screen for the next operator. Exit closes ASI. The operator can also bring up the Issue Command module from the File

menu, which allows operators to generate or issue commands.

Page 38: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

30

VIEW

Client Monitor shows the Operators who are logged into ASI Launch. Operators can send and receive instant text messages from each other. Database Info provides a summary of the current database configuration. It shows important information such as the SQL database name, the database version, and when the last backup was made. Click on Check DB to check for missing stored procedures or tables within the SQL database. If tables and/or stored procedures are missing contact Access Specialties.

Server Info provides important information about ASI Server and the server computer including:

Number of Clients Connected Number of Panel Managers Connected Server Name ASI Server Version Server Operating System

Local Settings are where operators can tailor the interface configuration. Operators can select to show units in twips or inches, select 12 or 24 hour time formats, choose to have Alarms not pop up when an edit function is being used, and configure the appearance of Transaction Monitor.

Page 39: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

31

Local Settings Column widths in Transaction Monitor can be permanently set in twips. Each transaction that is generated is assigned a unique transaction number. Selecting Show Transaction ID will cause that column to appear in the Transaction Monitor. Show Cardholder Info will display a cardholder’s image and associated data such as name, and encoded number in the transaction monitor. Show Cardholder Info in Alarms shows the same information in the Alarm Monitor. Local image and map paths are also set in the Local Settings group. These paths are normally paths on the client machine that would contain images to be used in creating badges and maps to be used in setting up alarm maps. However, these paths can also be mapped drives to other machines if a central repository is being used for images and/or maps. See Chapter 6 Access Security Integrater Image Paths. Operators from client workstations should have a drive mapped to the cardholder photo images on the Server. This Local image path should include the file path to the Image folder on the mapped drive. For example: T:\Images. Cardholder images will not appear if this is not set properly. Documents detailing image paths can be found on the installation CD in a folder called User Manuals. Set Module Order allows operators to rearrange the order in which the modules appear in the Module Toolbar. Highlight a module name and click Move Selected Up or Move Selected Down. Click Accept / Save to keep these changes. Reset Defaults will arrange the modules in alphabetical order.

Page 40: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

32

Module Display Order

Global Settings can only be accessed when the System Administrator username is used. Many features are enabled here such as keeping all transactions, enabling an operator activity log, enabling a semi-private social security number field, and enabling an employee id field. When features are enabled in the software the operator will need to log off and log in again for these settings to take effect. The Global Image and Signature paths are also set here. The Global image path is the direct path from the computer running ASI Server to the image folder location. For best performance, store the images on the same computer running ASI Server. Certain combinations of operating systems may be more difficult to set up the mapped drives with proper permissions. See Chapter 6 Access Security Integrater Image Path

Page 41: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

33

Global Settings Keeping the full transaction history will place key information into an SQL table that is never cleared. Transactions will be cleared after 2 years if Enable Full Transaction History is not checked. Having this option enabled will substantially increase the size of the database. Enabling the operator activity log will store all operator activity in tables in the database. Reports can be run by anyone using the System Administrator login to see what changes are being made to the database and which operator made them. Enabling the social security number tracking adds a specific field to the Cardholder module for social security numbers. Operator permissions can be tailored allowing or removing an operator’s ability to see the social security number. When the Employee ID is enabled, an additional data field will appear in the Cardholders module. This field requires a unique number, which can be up to 10 alphanumeric characters. Operator Activity allows the Admin operator to run detailed reports on all operator activity. This feature must first be enabled in the Global Settings. See Reports/Operator Activity Report for more details. View Transactions opens the Transaction Monitor showing real-time transactions. Modules allows modules to be opened from the menu bar rather than selecting the icons on the Main Interface. Toggle Alarms disables or enables the alarms. Using F12 is another way to accomplish this task. It changes module priority so alarms will not interrupt work going on in other modules. Close exits ASI Launch.

EDIT

Gives the operator Add, Edit, and Delete options for each module.

Page 42: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

34

TOOLBAR Toggle Toolbar Orientation changes the module toolbar from a vertical orientation on the left side, to a horizontal arrangement across the top of the Main Interface.

HELP ASI Help offers help with the software and answers commonly asked questions. About ASI gives important information about the installation such as the version installed, and specific site information.

MESSAGE BOX

The message box across the top gives the name, version and description for the last module highlighted. It is also where messages from other computers (see Client Monitor) are shown. Function buttons (as listed) assist maneuvering through ASI 2000

Page 43: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

35

Chapter 7 ACCESS SECURITY INTEGRATER IMAGE

PATHS ASI uses the following Image Paths to handle Cardholder and Badge Images:

GLOBAL SETTINGS This is accessed from the ASI Launch Menu / View / Global Settings ASI Server needs to know the DIRECT PATH FROM ITSELF TO THE FOLDER WHERE THE IMAGES ARE STORED to function correctly. The purpose of these paths is explained on the form here: These paths will be the SAME as the Cardholder CLIENT Image paths (# 3 below) IF ASI Server IS RUNNING ON THE SAME MACHINE AS ASI LAUNCH. If these paths are not set, certain parts of the Cardholder application will not function correctly and the operator will be prompted to have the Administrator set these paths (ex. taking photos using a Twain camera).

LOCAL SETTINGS This is accessed from the ASI Launch Menu / View / Local Settings

Page 44: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

36

The “Local Paths” frame has two paths: One for Images (for use in the Cardholder Module) One for Maps (for use in the Alarms Module – Alarm Maps) These paths are LOCAL paths (i.e. they are set to folders ON THE MACHINE THAT ASI LAUNCH IS RUNNING) The ASI Operator will use these paths to select images for Badges / Cardholders and bitmaps for Alarm Maps.

CLIENT IMAGE / SIGNATURE PATHS These are accessed from the Cardholder Module / File / Set Client Image (Signature) Path This path is the DIRECT PATH FROM THE MACHINE RUNNING ASI LAUNCH TO THE IMAGE / SIGNATURE FOLDER USED TO STORE IMAGES. (Different than GLOBAL paths above) The main purpose of these paths is for the ability to show cardholder images in a cardholder report, but the path IS REQUIRED TO BE SET FOR ALL OPERATORS AND ALL MACHINES RUNNING ASI LAUNCH.

Page 45: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

37

If this path is NOT set, certain parts of the Cardholder application will prompt for setting of these paths (ex. taking photos using a Twain camera).

EXAMPLES For these examples, we will use: C:\Images = the Image Directory C:\Signatures = the Signature Directory

NETWORK SETUP ASI SERVER – Machine A ASI Launch – Machine B IMAGES – Machine C 1. Global Settings:

a. A drive is mapped to C:\Images on Machine C from Machine A we will call E:\

Page 46: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

38

b. A drive is mapped to C:\Signatures on Machine C from Machine A we will call F:\

c. The Global Paths will then be as follows:

i. Global Image Path = E:\ ii. Global Signature Path = F:\

2. Local Settings

a. We’ll say the local image path is C:\MyImages on Machine B b. We’ll say the local map path is C:\MyMaps on Machine B

3. Cardholders Client Paths

a. Map a drive to C:\Images on Machine C from Machine B we will call Y:\

b. Map a drive to C:\Signatures on Machine C from Machine B we will call Z:\

c. The Client Cardholder image / signature paths will be as follows: i. Client Image Path = Y:\

ii. Client Signature Path = Z:\

STANDALONE SETUP ASI SERVER – Machine A ASI Launch – Machine A IMAGES – Machine A 1. Global Settings:

a. Since everything is on Machine A, the Global Paths will then be as follows:

i. Global Image Path = C:\Images ii. Global Signature Path = C:\Signatures

2. Local Settings:

a. We’ll say the local image path is C:\MyImages on Machine A b. We’ll say the local map path is C:\MyMaps on Machine A

3. Cardholders Client Paths: a. Since everything is on Machine A, the Global Paths will then be as

follows: i. Client Image Path = C:\Images

ii. Client Signature Path = C:\Signatures

Page 47: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

39

Chapter 8 TIME ZONES

Time Zones are the corner stone of the Access Security Integrater database. Time zones are user-definable periods that control when an event will occur or not occur. For example, a Time Zone that is defined from 8:00 am – 5:00pm, Monday through Friday can be used to allow certain cardholders to gain access to certain card readers during those times, or to unlock main doors during that time. There are three types of Time Zones: Normal, Alternating and 24/7. Each Time Zone can be used for more than one function. For example, a 24/7 Time Zone (one that is in effect all the time) can be used for alarms and for granting access through doors, scheduled commands, and for managing events. Be aware that if a Time Zone is deleted, it will also delete any dependant information such as alarms, and access assignments.

Once in the Time Zone module, a list of the defined Time Zones will appear on the left. When a Time Zone is selected on the left, a graph on the right indicates when the Time Zone is active in green. The Display Week is the week number of the year. The first week in January will be week 1. By selecting a different week you can easily see any exceptions that were made. This provides a good visual for seeing Alternating shift definitions. Up to 255 Time Zones may be defined, and there are unlimited intervals for each Time Zone.

Page 48: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

40

Time Zone names are viewed throughout the application, so use brief descriptive terms such as “8am-5pm, Mon-Fri”. The Description and Notes sections are very important references explaining the Time Zone, or what the Time Zone may be used for. The Time Option selection allows the user to use 12-hour or 24-hour time descriptions.

ADD TIME ZONES To add a new Time Zone, click on the Time Zones module. Then click on the blue plus sign. Enter a Time Zone name and description. Select the type of Time Zone (24/7, Normal or Alternating).

NORMAL SHIFT

Normal Time Zones can have individual intervals on each day. These intervals will be the same for each week. A Time Zone defined from 8:00am – 5:00pm, Monday through Friday would be an example of a Normal Time Zone. Each day of the week can be different, but the sequence repeats each week. Normal Time Zones can consist of as few as one interval and need not span multiple days. For Normal shifts select the Start Day. This is the day of the week on which the first interval will occur. Then select the Start Time. Next select the Stop Day. This is the day of the week on which the first interval will stop. Then select the Stop Time.

Page 49: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

41

Using the Example of 8am – 5pm, Monday through Friday, the Start and Stop Days should be Monday. The Start Time should be 8:00 AM (0800 for the 24-hour time option). The Stop Time should be 5:00 PM (1700 for the 24-hour time option). The Final Day is the day of the week on which the last interval will occur. The Start and Stop Times will be replicated from the Time indicated for the Start Days. Using the same example as above, the Final Day and Final Day of Week should be Friday. Click Apply. Highlight the name of the Time Zone from the list to see the active time for this Time Zone.

ALTERNATING SHIFT Alternating Time Zones allows the user to define intervals for Week 1 and Week 2, and have them alternate by week. For example, Week 1 can be active for two weeks, and then Week 2 can be active for two weeks, then Week 1 will be active for two weeks, etc. Multiple weeks can be defined. Alternating shifts are defined similarly to the Normal shifts. The difference is that after the first week is defined additional weeks with different intervals can be added. Set the number of weeks that each Time Zone should be active before alternating to the next defined group of intervals.

In this example the janitors work Monday through Friday 7am to 3pm during Week 1, and Monday through Friday 3pm to 11pm during Week 2. Enter the name and description and select Alternating as the Type of Shift. This Time Zone will change every week.

Page 50: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

42

The start day is Monday and start time is 7:00 am. The stop day is Monday and stop time is 3:00 pm. The Final Day is Friday and Final Day of the week is also Friday. Notice the start and stop times were copied down. Click Apply.

Click OK

Now define the 2nd week. The start day is Monday and start time is 3:00 pm. The stop day is Monday and stop time is 11:00 pm. The Final Day is Friday and Final Day of the week is also Friday. Notice the start and stop times were copied down. Click Apply. Additional weeks can be defined this way, however, for this example the janitors are working the day shift every other week, so only two definitions are necessary. Click Exit. Highlight the name of the alternating shift on the left. View the graphic on the right side to see when it is active. Change the display week to see each week of the year as it is defined.

24/7 SHIFT

Page 51: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

43

The 24/7 Time Zone is active all day long, every day. Exceptions for holidays can be managed through the Holiday list, which is discussed further in Holidays. When the 24/7 shift is selected, note the time grid is removed. The 24/7 grid is pre-defined and cannot be edited. Click the Save/Exit button.

EDIT TIME ZONES Select the Time Zone to edit, and click on the yellow edit icon. The Start Day/Time and End Day/Times can be adjusted by typing in the desired times and days, or by clicking and dragging the left and right edges of an interval on the grid. Click the disk icon to save.

Page 52: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

44

There are two save options. One is to apply these changes to every week from this day forward. The second option is to only apply the change to that week. Using this option, the Time Zone will revert back to the originally defined Time Zone after the current week. This allows the user to easily make one-time changes. If this is a one-time change, then a check will go next to the Exceptions Exist list. If the changes are applied to the entire year, the Exception rule is not used. More intervals can be added using the Interval Properties boxes. Click on Add Interval and enter the Start Day and Time and the End Day and Time for the interval. Click Ok. Notice that the grid has been updated to show the new interval to the Time Zone.

DELETE TIME ZONES Deleting Time Zones is not recommended unless you have a thorough understanding of the relationship between that Time Zone and the rest of the database. When a Time Zone is deleted, all associated events, alarms, commands, and Access Groups will also be deleted. To delete a Time Zone, highlight the name on the left and click on the red x icon.

VIEW TIME ZONES

Page 53: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

45

Time Zones are viewed throughout the application by name and number. The Number, Name and Description are listed directly under the list of Time Zones. The time format can be toggled between standard 12 hour and military 24 hour formats. The Exceptions Exist check box allows the user to quickly see if a Time Zone has intervals, which are different than the ones originally created. The user can then select the Display Week from the drop down to view individual weeks.

Page 54: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

46

Chapter 9 DEVICE CENTER

The Device Center is where the hardware is defined. This includes zones, panels, devices, readers, monitor points, output points and areas. This is also where the communications protocols are defined. Multiple zones can be used to segment the access control database and hardware. Up to 255 panels can be defined per zone using a variety of communications protocols. Devices are then connected to the panels. Readers, door contacts, or other devices using the monitor points or output points are connected to the devices. On the left side of the Device Center, a tree-view shows the zones, panels, devices, readers and points that are defined in the system. The right side of the screen shows the details of the section selected on the left. For example, highlighting a zone on the left, displays the panels defined in that zone on the right side of the screen.

Device Center Tree

ZONES Zones are used to partition the database. Grouping panels into different zones will help the system run more efficiently by distributing panels on multiple

Page 55: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

47

computers. Zones can also be used to restrict which Operators can view those devices, Access Groups, alarms, commands, and even cardholders who have been assigned access in that zone. Each panel or device must be assigned to one and only one zone. There is no limit to the number of zones that can be created in the Access Security Integrater database. Careful consideration of how zones are used can increase the effectiveness and efficiency of the access control system. If multiple sites are being controlled from one server, giving each site its own zone can help the system operate more efficiently. Deleting a zone will also delete the hardware associated in that zone as well as any software definitions such as Access Groups, alarms, commands, areas, etc.

PANELS Panels are defined in each zone. Access Specialties manufactures 2 types of panels. The IC-1600 (Intelligent Controller) panel has 16 available direct channels. The UP-2000 (Universal Panel) has 4 available channels. Devices are then connected to each channel. The maximum distance between the computer running Panel Manager and any panel (IC-1600 or UP-2000) in RS-232 direct mode is 50 feet. In RS-485 mode the maximum distance is 4,000 feet. This length can be extended using a Comtrol, NI-10 card, or a Short Haul Modem. Each panel has a memory chip that holds a portion of the ASI database. When communication is lost between the computer running Panel Manager and the IC-1600 or UP-2000, the panel’s memory allows the attached devices to continue to operate as normal until the communication is restored. Any changes made through the software will not take place until the communication link has been restored.

IC-1600 Using RS-485 communications, up to 16 IC-1600 panels can be daisy-chained to a distance of 4000 ft., extending the distance between the computer running Panel Manager and the panels. Each channel is enabled through the Device Center in the ASI software. The IC-1600 can communicate via RS-232, modem continuous or scheduled, and RS-485. The memory on each IC-1600 can hold up to 1,000 badges (encoded numbers). If more than 1,000 badges are defined in that zone, a MEMEX (Memory Expansion)

Page 56: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

48

board can be placed on the IC-1600 allowing up to 25,000 badges to be defined in that zone. An IC-1600 can be configured for up to 11 site codes, although only 1 can be designated as the primary code. The primary code will be set at the RI boards and used for degraded mode. Devices that can be connected to an IC-1600 will be covered in more detail below. Included are the:

CE-1600 (Channel Expander) RI-110 (Reader Interface) RI-120 (Reader Interface) CEM (Contact Expansion Module) RI-130 (Reader Interface) CC-165 (Contact Center) ECM (Elevator Control Module)

UP-2000

The UP-2000 has 4 slots for devices. There are also 4 memory slots. Each memory card on the UP-2000 can hold up to 25,000 badges (encoded numbers) for a total of 100,000 badges. The UP-2000 can communicate via RS-232, modem continuous or scheduled, and TCP/IP. A UP-2000 can be configured for up to 11 site codes, although only 1 can be designated as the primary code. Devices that can be connected to an UP-2000 will be covered in more detail below. Included are the:

MM-32 (Monitor Module) CM-16 (Control Module) MCM-168 (Monitor Control Module) DW-2 (Dual Wiegand module)

COMMUNICATION PROTOCOLS

RS-232 DIRECT

RS-232 Direct can be used with an IC-1600 and UP-2000. The cable length must be less than 50 feet. The length can be extended several thousand feet with Short Haul modems or Wiegand Extenders. A Comm232 chip must be used in the IC-1600.

Page 57: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

49

RS-232 DIAL-UP RS-232 Direct can be used with an IC-1600 and UP-2000. A Comm232 chip must be used in the IC-1600. Below are some basic commands for testing communication with a modem through Hyper Terminal. Make sure the modem is connected to a Com Port and that Hyper Terminal can open it. ATI4 This shows the current modem settings ATE0 This turns command echo off ATE1 This turns command echo on ATI7 This causes the modem to show its firmware revision To get the newer US RoboticsV.92 modems communicating correctly, it may be necessary to change the buffer settings in the modem. This is done by connecting the modem to Hyper Terminal as described above, and then typing in the following command: AT S15=182 S32=248 &W

RS-485 RS-485 can be used with the IC-1600. Multiple panels can be connected together. This is called Daisy-Chaining the panels. The total distance from the Com Port to the last IC-1600 in the chain must be less than 4,000 feet. If IC-1600’s are daisy-chained, a terminated Comm485 chip must be used in the final IC-1600 in the chain. All the other IC-1600’s should have a non-terminated Comm485 chip. If an IC-1600 is not part of a daisy-chain, a terminated Comm485 chip must be used.

TCP/IP TCP/IP can be used with a UP-2000 panel using Access Specialties’ NI-10 card. The NI-10 card is placed in an available memory slot on the UP-2000, and is programmed with an IP address and defined in the ASI2000 software. For more information see the NI-10 documentation.

DEVICE OVERVIEW

All devices, whether using an IC-1600 or UP-2000, can be configured to unlock a door for a as long as needed. An unlock command will last forever unless power is lost or a new command is issued. Both the go and shunt times can be set to 255 seconds. This is how long the door will be unlocked. A shunt time can be defined and is used to determine how long the door can be held open before displaying a door held open message in the Transaction Monitor or triggering an alarm. The maximum shunt time is 255 seconds.

Page 58: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

50

The device can be further defined to send a Forced Entry message to the Transaction Monitor when the door is opened without going through the Access Control system, or to report only if the door is held open longer than the shunt time. Alarms can be triggered from these messages. Most readers are will work with the IC-1600 or UP-2000 panel. Readers can be also be set to work with supported keypads. Software commands can be issued to send readers into Card Only, Card Plus Pin, or Pin Only mode (in select cases) at any time.

IC-1600 DEVICES Devices that can be defined on an IC-1600 are the ECM (Elevator Control Module) RI-110, RI-120, RI-130, and CC-165. All RI boards can be connected to a channel on an IC-1600 or a port on a CE-1600. The RI boards are compatible with many Wiegand output card-readers. Up to 255 devices may be defined on one panel. However, busy sites will see faster communication speeds if the panels are not over-taxed. Contact Access Specialties for specific site recommendations.

CHANNEL EXPANDER A CE-1600 can be attached to a channel on an IC-1600. The Channel Expander can be installed up to 2 miles from the IC-1600. The CE-1600 has 16 available ports, thus expanding one channel on the IC-1600 to 16 and increasing the distance between the IC-1600 panel and the device by 2 miles. A CE-1600 looks very similar to the IC-1600. The main difference is that the CE-1600 does not hold any memory. It is only used for expansion and extending distances. CE-1600’s are not defined in Device Center. Devices are defined with a channel and port number. When a CE-1600 is not being used, the port number is 0. When a CE-1600 is being used, the port number is defined by 0-15 (the available ports). Dipswitches on the CE-1600 enable the ports.

READER INTERFACE BOARDS Each RI-110 provides access control to one door or gate and has one monitor point. An RI-120 is identical in capabilities as the RI-110, however a CEM-133 (Contact Expansion Module) can be attached providing an additional 3 output points and 12 monitor points. The RI-130 is capable of buffering transactions so that if communication is lost between the RI-130 and the panel, the transactions will not be lost.

Page 59: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

51

CONTACT POINTS The CC-165 (Contact Center) offers 16 monitor points and 5 output points. Readers cannot be connected to the CC-165.

ELEVATOR CONTROL MODULE An ECM can be connected to a channel or a port. The ECM controls which cardholders can use the elevator, and which floors they can access. Up to 20 floors can be controlled on each ECM. Up to three ECMs can be daisy-chained together to control a maximum of 50 floors.

UP-2000 DEVICES Devices that can be defined on the UP-2000 are the MM-32 (Monitor Module), CM-16 (Contact Module), MCM-168 (Monitor Control Module), and DW2 (Dual Wiegand module). The DW2 is compatible with many Wiegand output card-readers.

DOOR CONTROLS A DW-2 can be used to control 2 doors. It also has 1 user-definable monitor (input) point.

MONITOR AND CONTACT POINTS The MM-32, MCM-168, and CM-16 boards are used for monitoring and/or output relays.

MONITOR (INPUT) AND OUTPUT POINTS A Monitor Point takes inputs either from the points defined on a device or from an external device to monitor open and closed conditions on an electrical circuit. Examples include a smoke detector, or a panic button. An Output Point is a relay that opens or closes an electrical circuit. Output points can be used to control an external device such as setting off a siren or lights. Conditional response commands can be used to control the output points from defined inputs. For example, when a motion detector senses motion (input), the system directs the lights to turn on (outputs).

ANTI-PASSBACK Anti-Passback is a technique of defining hardware to control movement through a facility. Readers are designated, in pairs, as either an In Reader or an Out Reader, and are further defined as being in 1 of 4 Anti-Passback zones. (This is not to be

Page 60: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

52

confused with a normal Zone) Readers used for Anti-Passback must be defined on the same panel. Badges that are used at an In Reader must then be used at an Out Reader within the Anti-Passback zone or an Anti-Passback violation will be generated. A Hard Anti-Passback will prevent access while Soft Anti-Passback will give a message of violation in the Transaction Monitor but still grant access. Alarms can be generated from Anti-Passback violations.

AREAS Grouping devices into an area allows simple control of all these devices with one command. Areas can include devices across multiple panels in multiple zones. Areas can also be used when defining Alarms and Events. For example, if 5 external lobby doors need to open at 8am and lock at 5pm, create an area and include these 5 devices. One command can be created to unlock and lock all 5 of these devices creating a more efficient environment.

DEFINE PANELS ADD A PANEL

Add a Panel in the Device Center under the Zone by right clicking on the Zone and selecting Add Panel.

PANEL INFORMATION Enter the Location, Panel Type, Panel Number, and Panel Manager ID. The default Panel Manager ID is 0. When a Panel is added into Panel Manager the correct ID will be assigned. Each Panel Manager has a unique identification number. The location should be very descriptive as it is viewed throughout the rest of the application when selecting devices. It is also viewed in Transaction Monitor. The Panel Enabled box enables the panel. To disable the panel, uncheck this box.

Page 61: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

53

CONNECTION Click on the Connection tab and select the Com Port #. Com Port numbers can be found in the hardware definitions in the computer’s control panel. Then select the Connection Type. If TCP/IP, RS-485 or modems are being used, additional configuration options will be displayed. The standard modem default information will be entered. The phone numbers for each modem must be entered in the appropriate Phone Number fields. The panel address is used to distinguish one panel from another. Dipswitches on the IC-1600 correspond to a unique Panel Address. See tech notes for compatible Modem types.

Connection Tab for Modems Connection Tab for TCP/IP with a UP-2000 When TCP/IP is selected, options for using DHCP or an IP address are given. The panel address is optional. Using an RS-485 protocol, IC-1600’s can be daisy chained together. The panel address is used to distinguish one panel from another. Dipswitches on the IC-1600 correspond to a unique Panel Address.

Page 62: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

54

SETTINGS Click on the Settings tab. This is where channels are enabled. Only the channels being used should be turned on for maximum performance. Ports on a CE-1600 are enabled with the dipswitches at the Channel Expander, while Channels are enabled in the software. (The ports on a UP-2000 panel are automatically enabled.)

IC-1600 Settings UP-2000 Settings When the Process Events For this Panel box is checked, it will tell Panel Manager to process any Events as defined in Event Manager that are waiting to be processed. If it is not checked, that panel will ignore all Events defined in Event Manager. The Time Difference box allows Panel Manager to process transactions from panels in different Time Zones. For example, Panel Manager could be running from a computer in Minnesota, which is in the Central Time zone. The panel could be located in New York, which is in the Eastern Time zone. The time difference would then be +1. If the panel were located in California, which is in the Pacific Time Zone, the time difference would be –2.

MEMORY CONFIGURATION Click on the Memory Configuration button from the Settings tab. This is where system maximum limits are set for devices, Time Zones, alarms, badges, and commands. Each of these should be set approximately 2 times as much as the planned maximum. For example, if 100 devices will be used, the Total # Devices should be set at 200. This will allow natural growth within your system without causing any memory problems.

Page 63: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

55

IC-1600 Memory Configuration The Re-Allocate Panel button is a simple way to re-load the panel with the database definitions. Re-allocation can take up to an hour or more depending on database size and connection type. Click on Cancel return to the settings tab. When settings are changed, the panel must be reallocated. Turning all the channels off when reallocating a panel will cause the allocation to finish faster.

NOTES Click on the Notes tab. Use the notes section to write important information about the exact location of the panel, or any other information that may be useful to someone else who is not as familiar with the device layout. Save the panel.

DEFINE DEVICES Next, add a device under the panel by right clicking on the panel and select Add Device. The type of devices is dependant upon the type of panel that was defined.

Page 64: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

56

IC-1600 Devices UP-2000 Devices Enter a location for the device. This location information will also be copied to the reader (if a reader will be defined on this device). The location should be descriptive, as it will be seen in many areas of the application including alarms, commands, areas, and in the transaction monitor. Enter the Device Type from the drop-down menu. Enter the Channel, Port and Device numbers. The channel is the connection number on the IC-1600 or UP-2000. The port is the connection number on the CE-1600 (if using an IC-1600 panel), or the port number on the DW2 (if using a UP-2000). Device numbers are optional, but must be unique per Zone. Device numbers can be used to show common locations. For example devices in one building can be in a 100 series, while device numbers for another building can be in a 200 series. When a Device # field is left blank the Device Center tree will use an auto-number called the Device ID. Using Device #’s for either all devices or none at all will provide consistency throughout the interface.

Page 65: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

57

When a Device # is entered, this number will be displayed in the Device Center tree as shown below.

Click Save.

DEFINE READERS

If defining a device that will have readers connected, clicking Save will save the Device definition and open the Reader definition. The location information is copied to the Reader. 128-bit max is the most common reader type. It’s a good default definition because it works for most reader types including Proximity, Barium Ferrite, Magnetic Stripe, and other custom formats. Enter the Unlock and Shunt times. The unlock time will be how long the go relay will be open. The shunt time is how long the door can be held open before generating a door held open transaction. Options can be selected to define how the device will report.

Page 66: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

58

ADVANCED SETTINGS Advanced Settings allow use of Request To Exit mode with or without the go relay. The default selection is with the go relay.

DEFINE ANTI-PASSBACK Click on the Anti-Passback tab. This is where Anti-Passback is defined. The default setting is No Anti-Passback Enforcement. This step can be skipped if Anti-Passback is not being used. Select if this is an “in” or “out” reader. Select

Page 67: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

59

Denies Cardholders already “IN” if it is an “in” reader”. Select Denies Cardholders already “OUT” if it is an “out” reader”. Select the Anti-Passback zone to be used for this reader. Since only 4 Anti-Passback zones can be defined per system, these should be carefully planned out in advance to prevent overlap. Select Optional Override, also referred to as Soft Anti-Passback. Hard Anti-Passback denies badges that have already swiped in. Soft Anti-Passback just alerts the operator by sending a transaction through the transaction monitor. Alarms and events can also be triggered from this transaction.

READER NOTES Use the Reader Notes section to denote specific locations of the Device location or any other specific Device or Reader information.

DEFINE ELEVATOR CONTROL MODULE (ECM) Right click on the Panel that the ECM will be defined under and select Add Device. Enter the Location, Channel and Port numbers. Select ECM from the drop down list of devices. This message box will appear. Select Yes.

Page 68: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

60

Enter the description for the floor list. Enter the number of floors that will be controlled by this ECM. Click OK.

Define which relay will be used for each floor by double clicking on the ECM Relay number and entering a description.

Page 69: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

61

Click Save and Close. Save the Device. The Floor List must now be defined, so click YES at this screen.

Match the ECM List to the Floor List.

Page 70: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

62

Click Assign and Close.

DEFINE AREAS To define an Area, open the Device Center and click on Area. Click on Add New Area and enter the Area Name and Description. Select an area and then click on Edit Area. Double click on devices to add them to the area. The devices in the area will move to the box on the bottom. Save the area when finished.

Page 71: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

63

Chapter 10 HARDWARE INFORMATION

CABLE CONNECTIONS For IC-1600 (RS232 Direct): Pin 1 of IC-1600 (J5) goes to pin 3 of the DB9. Pin 2 of J5 goes to pin 2 of DB9. Pin 5 of J5 goes to 5 of DB9. Pins 4 & 6 and 7 & 8 of DB9 are jumpered. For IC-1600 (Dial-up): Pin 1 of J5 goes to pin 3 of DB25. Pin 2 of J5 goes to pin 2 of DB25. Pin 5 of J5 goes to pin 7 of DB25. On DB25, pins 4 & 5 are jumpered, and pins 6 & 20 are jumpered. If not using a DB9 to DB25 cable, then the standard null modem cable supplied by Access Specialties will work, but an adapter will have to be used to attach it to modem. Pins 1 & 2 of J5 must be reversed. For UP-2000 (RS232 Direct): Pin 2 of DB9 goes to pin 3 of DB9. Pin 3 of DB9 goes to pin 2 of DB9. Pin 5 of DB9 goes to pin 5 of DB9. Pins 7 & 8 on each end are jumpered. For UP-2000 (Dial-up): Pin 2 of DB9 goes to pin 3 of DB25. Pin 3 of DB9 goes to pin 2 of DB25. Pin 5 of DB9 goes to pin 7 of DB25. Pins 4 & 5 of DB25 are jumpered, and pins 6 & 20 of DB25 are jumpered.

ECM When a Go-Offline command is issued to an ECM, any closure of the contacts will fire the relay. When an ECM is in degraded mode (comm. removed), it will grant access to any card based on the system code programmed by the dipswitches on SW2. When using an ECM with a PR-100, the LED wire between the RWTX board and the PR-100 must be disconnected at one end. Otherwise the keypad won’t work. If using the RWTXA board with a Prox reader instead of the TC-100 or PR-100, use a larger capacitor at C2 on the RWTXA board. The default capacitor is too small to handle anything larger than the ProxPoint.

IC-1600 WITH COMTROL UNITS If a system is using Comtrol Ethernet adapters and suddenly all panels stop polling with Panel Manager (even those that are direct connected), it might be necessary to cycle power on the Comtrol unit. If one Comtrol unit hangs up, it can prevent Panel Manager from polling to all panels, including the ones that are RS-232 direct.

Page 72: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

64

IC-1600 WITH RS-485 With middle resistor (R2) removed, board will be beginning or middle of line. With (R2) in place, board is end-of-line. RS-485 protocol allows 32 devices to be connected at a length of up to 4000ft. (total length of network).

RESET MEMORY ON READER INTERFACE BOARDS 1. Make note of current dipswitch settings on S2 (this is the system code)

2. Power down Reader Interface

3. Turn all dipswitches off.

4. Turn pin 7 of S1 to the ON position

5. Power on Reader Interface for 10 seconds

6. Power down Reader Interface

7. Turn pin 7 to off position

8. Set dip switches to your usual settings

GROUNDING IC-1600 PRODUCTS All IK-100 boxes should be earth grounded. The Reader Interfaces should be securely screwed into the IK-100 box. The shield of the communications cable between the Reader Interface and the IC or CE channel should be physically attached to the IK-100 box, but the shield should be left floating at the other end where the IC or CE channel is. The shield of the reader should also be attached to the IK-100 box. The cable from the reader to Reader Interface should be 22-gauge, three individually shielded pairs, and all shields earth grounded.

Page 73: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

65

DIAL-UP When using a modem, set the panel to RS-232 dial-up continuous mode. Reallocation will not occur in scheduled dial-up mode. When a dial-up panel is on a schedule and an alarm is generated, the panel will call back the computer with the alarm(s), but other transactions on the panel (i.e. card reads) will not be sent down to the computer at that time. The other transactions on the panel will be sent down when the computer calls the panel as scheduled. When replacing firmware on the IC-1600, the panel must be reconfigured and reallocated for the modems to work. The firmware on the US Robotics modems must have the same firmware version. The procedure for updating a modem’s firmware is to run an executable provided by US Robotics.

SHORT HAUL MODEMS (ME800A BLACK BOX CONVERTER) 1. RTS/DTR control disabled on both modems

2. Set both converters to DCE

3. Use a null converter between the modem and panel when connecting to

the UP-2000 using the cable that Access Specialties supplied for your panel.

4. If connecting to the IC-1600 panel, a null converter is not needed

5. T+ goes to R+ of the other modem; T- goes to R- on the other modem etc

6. Make sure that J5 on the IC-1600 is grounded at Pin7 of the Black Box

Modem B. Also it may be necessary to jumper pins 4 & 6 of DB9 on IC-1600 cable (this is done be default on cable supplied by Access Specialties).

Page 74: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

66

CABLE DIAGRAM If making cables from scratch, or if you need to check the pin outs of your cable, here is what the pin outs of your cables should look like:

CARDS/READERS:

DOOR CONTROLS

It’s possible to create a “man-trap” system where an Access Granted on one door prevents a second door from being accessed until the first door is closed again. To do this, connect either of the data lines from the first RI to the common of the shunt relay on the second RI. Then run another line back from the normally closed of the shunt relay on the second RI back to the pin on the first RI where the data line would normally go. Mirror the same wiring procedure from the second RI to the first RI. The idea here is that when access is granted on the first RI, its shunt relay will fire and break the connection of the second RI’s reader, thus preventing a card access on the second RI until the shunt time of the first RI expires. When the shunt time expires, the connection is restored to the second reader and it can be used as normal. If the second reader is accessed, its shunt relay fires and breaks the connection to the first reader, as described above.

DORADO MAGNETIC STRIPE READERS When using the Dorado Mag-Stripe readers, the cards should be formatted with format 2, and the data is 10 bits. The first two bits are leading zeros; then the system code (3 digits); then the encoded number (5 digits).

Computer Com Port to Modem A Note: No pins are Jumpered

Modem B to Panel Note: 7 & 8 of DB9 are Jumpered

DB9 DB25

1 8

2 3

3 2

4 20

5 7

6 6

7 4

8 5

9 22

DB9 DB25

1 8

2 3

3 2

4 20

5 7

6 6

7 4

8 5

9 NONE

Page 75: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

67

PIN ONLY You can use pin only with a PR-100 using either old or new RI-110 firmware and either old or new IC-1600 firmware provided you program the RI-110 into card or pin mode via the dipswitches. An RI-120 using new firmware will NOT work in Pin only mode, regardless of the IC firmware being used. Using a ProxPro w\keypad, you can use new RI firmware with either old or new IC1600 firmware and get the pin to work, provided you program the RI. To get a ProxPro w\keypad to work with older firmware, you must use pic chip RI263715.hex.

PR-100 PROGRAMMING TIPS: With Comm. Active: In Card or Pin mode, pin 9 of pin reader must be left on, and the dipswitches on PR-100 must reflect system code. Also, S2 of Reader Interface must reflect correct system code, which in turn must match panel’s system code. This allows Pin Reader to work; it doesn’t affect TC-100. With Comm. Active: In Card plus Pin mode, neither Reader Interface nor PR-100 needs to have any dipswitches set with correct system code. Degraded Mode: In Card plus Pin mode, Reader Interface must have proper system code set on S2.

Page 76: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

68

Chapter 11 ACCESS GROUPS

Devices and Time Zones are uniquely combined into Access Groups, which are assigned to badges. 12 access groups per zone may be assigned to each badge. When an access group has been added to the badge, that badge will work at the devices specified in the group during the specified time zone. For example, access group 1 may contain all the exterior doors of a building during a defined time zone of Monday through Friday, 8am to 5pm. Each badge that has been assigned access group 1 will open the exterior doors during that time frame. Access groups cannot span zones, so devices in a particular access group must all be in the same zone. Up to 255 access groups can be defined in each zone.

ACCESS GROUP DEFINITIONS Group definitions are where Access Groups are named, and numbered.

ADD ACCESS GROUP DEFINITIONS Select Access Groups from the Main Interface. Highlight Access Group Definitions and click OK. Select Add Group. Access group names should be very descriptive as they are viewed when assigning them to badges. Descriptions can be used to further specify groups. Group Numbers are optional and are not auto assigned.

Page 77: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

69

Access groups can be edited or deleted at any time. Once an Access Group has been deleted, Cardholders who were granted access to devices under that Access Group will no longer have access. In this example, there are three access groups named. After naming the groups, select Close.

Since Access Groups do not span Zones, click on the drop down arrow to select another zone. Define Groups for each Zone.

GROUP ACCESS ASSIGNMENTS

Select Access Groups from the Main Interface. Highlight Group Access Assignments and click OK. Columns indicate the Access Group while rows indicate the devices in that Access Group.

Page 78: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

70

Double click in each grid square to add appropriate Time Zones for each device in each Access Group. To exclude a device from an Access Group leave the corresponding grid square blank.

Page 79: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

71

In this example Access Group 1 contains all the doors during Time Zone 1 (24/7), Access Group 2 contains all the doors during Time Zone 2 (normal work hours), and Access Group 3 (Janitors) includes Devices 1 and 2 during the Time Zone 3 (the Alternating Time Zone as shown in the Time Zone module). The Green area indicates the time period during which a Cardholder with that Access Group will be granted access. Lookup Groups allows the Operator to view the Name and Description of the Access Group. Lookup Device allows the Operator to view the Name and Description of the Device. Since Access Groups do not span Zones, click on the drop down arrow at the top to select another Zone. Create Access Groups for each Zone.

ELEVATOR ASSIGNMENTS Select Access Groups from the Main Interface. Highlight Elevator Assignments and click OK. Columns indicate the Access Group while rows indicate the elevator floors in that Access Group.

Double click in each grid square to add appropriate Time Zones for each device in each Access Group. To exclude a device from an Access Group leave the corresponding grid square blank. In this example Access Group 1 contains all the floors during Time Zone 1 (24/7), Access Group 2 contains all the floors during Time Zone 2 (normal work hours), and Access Group 3 (Janitors) does not have any access to the elevator.

Page 80: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

72

Chapter 12 HOLIDAYS Holidays are defined in Holiday Groups. These groups provide exceptions to Time Zone rules for badge access, scheduled commands, and conditional response commands. A maximum of 255 Holiday Groups can be defined in Access Security Integrater. Each Holiday Group can have up to 50 defined holidays. Each Holiday must start at 12:00am and end on 11:59pm on the same date. Recurring Holidays occur on the same date every year.

Holiday Groups can be assigned to badges to grant cardholders access on holidays within a certain group. If a badge is not given access to a specific Holiday Group, that badge will not be granted access on the holidays within that group. Scheduled and conditional response commands also use Holiday Groups. Commands can be set not to happen on any Holidays defined in the selected Holiday Group.

ADD HOLIDAY GROUPS From the Main Interface click on the Holidays module.

Select Holiday Groups. Select Add or hit F5.

Enter the name of the Holiday Group. The description is optional. Click Save. Add as many Holiday Groups as necessary, up to 255.

Page 81: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

73

ADD HOLIDAYS

From the Main Interface click on the Holidays module. Select Holiday Definition and click OK. Select Add or hit F5.

Enter the name of the Holiday. The description is optional. Enter the date of the Holiday. If this holiday happens on the same day every year, such as July 4th, select recurring holiday. Assign this Holiday to one or more Holiday Groups by checking the box for the appropriate Holiday Groups.

Any badges not assigned to one of these Holiday Groups will not gain access during the holidays defined within the Holiday Group. Scheduled and conditional response commands will occur or not as defined in the Command Center.

Page 82: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

74

Chapter 13 CARDHOLDERS

Cardholder Data includes First Name, Last Name, MI (Middle Initial), Social Security #, Employee ID, Photo, Signature, and Custom Fields. Badge Data includes Encoded, Embossed, Pin #, Activation and Expiration Dates, Active or Inactive flag, and Associated Layout. A Cardholder is a person who is issued one or more access cards. Each Cardholder has specific information associated with it such as Encoded Number, PIN, Social Security Number, Embossed Number, Activation and Expiration Dates, Photo, Signature, standard badge layout, and an unlimited number of user-definable Custom Fields. The encoded number is optional as some cardholders may be issued generic badges without access groups. The use of the restricted Social Security number and Employee ID fields are enabled in the Global Settings. In order for the Social Security Number field to be seen, the Operator must also have permissions to view Social Security Numbers. Cardholder photos and signatures are stored as .jpg files in folders. Global and client image paths allow all operators to view these files from remote workstations.

Page 83: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

75

When multiple badges are added, the Cardholder Data stays the same. The Badge Data must be entered for each Badge. Having multiple badges allows data on all of the Cardholder’s badges to be retained, whether they expired or were lost. Also, it allows the operator to easily see the badge layout(s) that the cardholder may have. The bottom left of the Cardholders screen shows the last place the card was used as well as which devices the selected badge has access to and the time during which that badge may be used at the device. Current Badge Print Count shows how many times a badge has been printed for the current cardholder. The Expand View buttons expand the respective boxes, which enable operators to view over 100 cardholders, 16 Custom Fields, and 27 lines of the Access Card description. See the Operator section to review how to restrict operator access to certain features.

MENUS FILE

Select Image Device chooses the camera to use for capturing images. Set Client Image Path and Set Client Signature Path sets the Cardholder Client Image and Signature paths respectively. This is set once for the admin in Global Settings. Each operator will need to set the Cardholder Client Paths. This is the path to the folder where the images or signatures are stored. Set Magnetic Encoding Format allows operators to setup up selected printers for printing cards with magnetic stripes. Exit closes the Cardholders module.

CARDHOLDER Add, Edit, Delete, Save, and Cancel refer to the current cardholder record. Custom Fields opens a window where Custom Field names and lookups can be added, edited or deleted. Deleting a custom field will also delete all associated data. Assign Access opens the window where Access Groups are assigned to badges as well as setting holiday exceptions and Anti-Passback rules per cardholder. Signature Pad Enable will enable the software to utilize compatible signature pads.

Page 84: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

76

NAVIGATION Use these options (or corresponding Function keys) to ease navigation through the found set of cardholders.

Move First – F5 Move Previous – F6 Move Next – F7 Move Last – F8

SEARCH CARDHOLDERS The search functions allow operators to search by literally any criteria related to cardholders including custom fields. Search though cardholders by:

Name Any Custom Field Encoded or embossed number Any combination of the above

Search options for each of these fields is:

Equals Starts with Ends With Contains

DEFINE CUSTOM FIELDS Click on Add to create extra data fields (ex. Address, Phone Number, Social Security Number) called Custom Fields. The number of Custom Fields is unlimited. Lookups create drop down lists, which are customized for each Custom Field. Creating the necessary Custom Fields before entering Cardholder data will save time because each cardholder won’t have to be edited to insert key Custom Field data.

CREATE CUSTOM FIELDS To add new custom fields or edit existing custom fields, click on the Cardholders module. Click on the Add button in the Custom Field section.

Select Add New Field. Enter the name of the Custom Field (ex, Department). To add a lookup highlight the custom field name on the left side of the screen and select Add Lookup For Selected Field. One at a time, enter the Lookups as shown in the example below. Lookups are optional.

Page 85: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

77

Continue adding Custom Fields and Lookups as needed. When lookups are used the only data that can be entered into that field is one of the lookup entries. Custom fields and lookups can be edited or deleted by selecting the corresponding buttons. Deleting lookups will not delete any related data. However, deleting a custom field will delete all related information. Care should be exercised so that important data is not lost. Click Exit to return to the Cardholders screen. The custom field names and lookups (drop down menus) will now appear.

ADD CARDHOLDERS To add new Cardholders or edit existing Cardholders, click on the Cardholders module. Click on the blue plus icon. All the fields that are editable will turn white. Enter Cardholder data. At a minimum, either a first name or last name is required. If the Social Security Number field was enabled in Global Settings, the operator will also need permission to view Social Security Numbers. The Social Security number must be unique, and contain 9 numeric digits. It is not a required field and may be left blank. If the Employee ID field was enabled in Global Settings it becomes a required field. The Employee ID must be unique and can contain up to 10 alphanumeric digits including special characters.

Page 86: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

78

Enter Badge data for the first badge. The encoded number is the unique number on the access card or key fob. The encoded number must be unique but is not required. This allows Cardholder information to be kept even for those who do not have badges. If the encoded number is not used, Access Groups cannot be assigned. The Embossed number is user definable, optional, and can be used as a badge number. The Pin # can be used with devices that have pin pads and is optional. Pin numbers are usually 4 or 5 digits depending on the device type being used. Enter custom field data as appropriate per cardholder. Drop down menus appear from the defined lookups. Text can be directly typed into any field that does not contain lookups.

BADGES Activation Date and Expiration Date show the period during which that badge will be active. The default activation date is the date of entry. The default for expiration date is 10 years from the date of entry. The Activation date must be later than 1/1/1990. A badge can be deactivated via the Active check box without changing the expiration date. When the Active box is not checked, the badge is inactive. A text box for corresponding notes will appear just below the check box. Additional detailed notes should be placed in the Badge Notes section.

ACCESS ASSIGNMENTS

To assign access to this badge click on the Access Assignments button. Access Groups

The Access Groups that were defined in the Access Groups module will appear on the left side of the Access Groups tab. Select the desired zone from the drop down menu. Double click on the desired Access Group name or highlight the Access Group name and click on the arrow button to put it on the right side. The badge will then have access to the devices within the assigned Access Group during the Time Zones defined in the Access Groups module.

Page 87: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

79

Up to 12 Access Groups from each zone can be assigned to one badge.

Holidays When Holidays are used, the badges that have assigned Holiday Groups will be granted access as usual during the holidays within the assigned group. Badges that do not have Holiday Groups assigned will not be granted access during defined Holidays. Holiday Groups displayed on the right side are the groups that are assigned to that badge. Select Holiday Groups and use the arrows to move them from side to side to grant or remove access. Each badge can have a maximum of 8 assigned Holiday Groups.

Page 88: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

80

Anti-Passback Anti-Passback forces a badge to be used in a certain sequence through readers. For example, if someone goes into a room, they then have to swipe to get out of a room, and cannot get back in until they do so. In this Anti-Passback tab, each badge’s status can be reset to “already in”, “already out”, or “neutral”. Badge status can also be set for “soft” Anti-Passback, which does not deny access to the cardholder, but notifies the operator in the Transaction Monitor of the Anti-Passback violation.

Click OK to return to the cardholder screen.

Notes

Notes allow operators to record specific information about individual badges.

ADD ADDITIONAL BADGES Each cardholder can have multiple badges. Each badge can have different Access Groups, encoded, embossed, pin numbers, activation and expiration dates, holiday groups and associated layouts. When a badge is added, the badge data fields do not carry over from other badges. To add additional badges: select the cardholder, select edit, and then select Add Encoded. Enter the badge information as shown above. Access Groups, Holidays and Anti-Passback are specific to each badge. To delete badges, edit the cardholder and highlight the badge to be deleted. Select Delete Encoded. This action is permanent and cannot be undone.

Page 89: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

81

ADD CARDHOLDER IMAGES Cardholders can have multiple associated images to choose from when printing badges. Images can be captured from any TWAIN compliant camera and be associated directly with that cardholder. Before images can be taken or associated, the Image Path Settings must be set. See the tech document Access Security Integrater Image Paths pdf located on each installation CD in the User Manuals folder. To find newly installed image devices, select the Cardholders module from the main interface. Click on File, Select Image Device.

Highlight the appropriate camera from the displayed devices and click Select.

To capture an image, edit the cardholder and click on the Camera icon.

Adjust settings as necessary and click Capture. After the image is captured, it can be adjusted by zooming in and out and centered. Click on the disk icon to save the image. Alternatively, any .jpg or .bmp file can be selected as the cardholder image.

Page 90: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

82

To browse to the folder where the image is located select Change Path. After the proper folder is selected click Save/Exit. All available image files will appear on the left side. Highlighting each image file shows a preview on the right side. After the appropriate image is saved click OK. The software will automatically use the cardholder’s name as the image name. This can be changed here. Select Ok. The image is now associated with the selected cardholder.

ADD A SIGNATURE Before signatures can be captured or associated, the Global Signature path under Global Settings must be set. This should be set one time at the Server machine and is the direct path from ASIServer to the local folder where the images are stored.

ENABLE SIGNATURE PAD The first time the signature pad is plugged in click on “Cardholder” and “Signature Pad Enable” on the machine with the signature pad.

Next choose the signature pad type. Currently Access Security Integrater supports the PenWare PW 1500 and Topaz T-L462 signature pads.

Page 91: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

83

CHANGE SIGNATURE PAD TYPE

To change the signature pad type in the future select “Cardholder” and “Signature Pad Type”.

To capture a signature, click on the signature pad icon. This allows signatures to be captured and then directly associated with that cardholder. To manually associate signatures, browse to the folder where the signatures are stored.

To browse to the folder where the signature is located select Change Path. After the proper folder is selected click Save/Exit. All available signature files will appear on the left side. Highlighting each signature file shows a preview on the right side. After the appropriate image is saved click OK. The signature will appear next to the cardholder image.

ASSOCIATED LAYOUT This list is a drop down menu of the Badge Layouts that have been created. The associated layout becomes the default badge layout for the selected cardholder. To associate a layout, edit the cardholder, select the appropriate layout and click on the disk icon to save.

Page 92: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

84

The cardholder must be saved before any cardholder or badge changes will be sent to the panels. VIEW ACCESS

Notice the Access for each badge will be displayed at the bottom left of the screen. It shows each device and the individual times when that badge will gain access at that device. Click on Report to view an HTML version of this data or save to a pipe delimited file. The file will be saved on the local machine in the \ASILaunch\AppItems folder where ASI was installed.

Page 93: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

85

Chapter 14 BADGE LAYOUTS

Badges are designed by selecting a portrait or landscape view, a background color or picture and adding text and image elements. Text can be configured similar to Microsoft products and use the same font packages that are installed on that machine. To get to the badge layout screen, first select a cardholder. Then click on the View Badges icon.

MENUS FILE

Set Client Image Path and Set Client Signature Path are used to set the Cardholder Image and Signature paths on workstations. Set Magnetic Encoding Format selects which type of printer is used for printing the magnetic stripe.

BOX These are the same as the icons listed below. They allow elements to be added, deleted and to view the properties of each element.

Page 94: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

86

BADGE New Layout will create a new badge layout. Save Layout, Delete Layout, View Front and View Back pertain to the highlighted layout. Print will print the current badge with the selected layout. Printer Type allows the user to print to a badge printer, such as a Fargo, or a standard printer.

Printer Settings is a shortcut to the computer’s printer settings. These settings also are reached through the computer’s control panel.

NAVIGATION These options allow easy movement through the cardholders as they are seen on the left side. To see the cardholders hide the box properties.

ICONS

Use these icon to save the badge layout. This should be done often.

Use this icon to create new badge layouts.

Use this red X to delete a badge layout. This is permanent and cannot be undone.

Page 95: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

87

Use these to send elements to the front or the back on the layout. This allows users to edit badge layouts easily, but is not saved in the final configuration.

These icons are used to add images and text boxes respectively.

Use this red X to delete badge layout elements.

Use these icons to show and hide box properties respectively.

Use this icon to return to the Cardholders screen.

CREATE NEW LAYOUTS Click on the blue Add icon to create a new badge. Name the new badge layout and click OK. The default height and width are for standard badge printing. Change the badge to Portrait or Landscape using the radio buttons. Select to print the Front and/or Back and Magnetic Encoding by checking the boxes next to the m. Additional font packages may be needed. The background color can be changed by clicking on the white rectangle directly under the Background Color text. This opens up the color palette. Alternatively, a .jpg or .bmp can be used as a background. Click Save. The badge layout is displayed on the right side of the screen. Use the Front and Back buttons to toggle between the front and back of the badge.

The Badge properties can be changed to select a different background color, image or orientation. The front and back sides can have different orientations. Click on this icon to add text to the badge. There are three sources of text: Individual Data Field, Combined Data Fields and Fixed Text.

Page 96: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

88

Select the Use Data Field radio button. A drop down menu allows any of the fields from the Cardholder module to be placed on the badge layout. Combine Data Fields brings up all the data fields and allows them to be merged with separator text to create custom text boxes. Fixed text can be typed in the Fixed Text field.

Fonts, styles and sizes can be configured by clicking on the ellipsis next to Font. The font color is changed by clicking in the font color rectangle. The word wrap box will cause overflowing text to go to the next line instead of being cut off. The alignment has a drop down menu allowing users to easily change the alignment of each text box. Use the Barcode Checksum box to convert text strings to barcodes. Extra barcode font packages may need to be installed on the machine. Select the appropriate barcode from the font menu, and then select the Barcode Checksum box. Checking the Opaque Background box allows a solid color to be used as the background of the text box. Click on the eye icon to add an image to the badge. There are three sources of images: Photo, Signature and Fixed Image. Photo places the cardholder’s selected photo on the badge layout. Signature places the cardholder’s signature on the badge layout. Use Fixed Image selects a static image to be used on all badges. This may be a company logo or seal. Use Stretch mode to fit or fill the images. Fit is the best option for cardholder photos and signatures. Increasing the Ghosting number causes the image to become faint and makes a good background image. Other images and text can then be placed on top of the ghosted images.

Page 97: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

89

As elements are saved on the badge layout they may be stretched or dragged around the screen allowing total customization. The Box Properties area allows complete control over where elements are placed and allows further control over alignment. For example, all text boxes could be aligned on the left using 0.1 and using H/V Alignment, Left / Top. This allows any user to create professional badge layouts.

Page 98: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

90

PRINT BADGES After layouts are created go to the cardholders screen and associate a default layout for each cardholder. Click on the Print icon to print a badge. To print a different layout, select the desired layout first, and then click on the print icon.

GROUP PRINTING Multiple badges can also be printed at once. Each badge will be printed using the Associated Layout. If a cardholder does not have an associated Layout, the currently selected layout will be used. Highlight the badges to print and click on the print icon. A message box will confirm the batch printing. Badges will print continuously in the order they are displayed in Access Security Integrater.

Page 99: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

91

Chapter 15 ALARMS

Alarms can be generated from a single event that occurs on a device or from a card swipe. Multiple alarm conditions can also be used to trigger each alarm. Alarms are based on devices or areas, combined with Time Zones and pre-defined alarm conditions. Deleting devices or areas that are used in Alarms will also delete those associated alarms. Alarm types are first used to distinguish one alarm from another. Types of alarms may include Fire, Security, Smoke or Intrusion. At a minimum, one Alarm Type must be defined before an alarm can be defined. Alarm Instructions are then defined. For each defined alarm up to 3 unique alarm instructions can be selected. An alarm instruction may include information about emergency phone numbers for the dispatchers to call or specific instructions about what to do in the even of a break-in. Up to 255 alarm instructions can be defined in Access Security Integrater. Alarm Maps can be added to show operators where the event occurred. A series of maps can be added to drill down within a given location. For example the first map could be of the facility, the next could be the building, and the next could be the floor plan of a specific floor, with the last map showing the exact location of the alarm. A red locator icon can be placed on the last map for further definition. Each alarm can be routed to all operators or specific operator(s) only.

DEFINE ALARM TYPES From the main interface click on the Alarms module. Select Alarm Types and click OK.

Page 100: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

92

Select Add or hit F5 to add a new Alarm Type.

Enter a name for the alarm type and click Save. Up to 255 Alarm Types can be saved.

DEFINE ALARM MAPS

From the Main Interface click on the Alarms module again. Select Alarm Maps. (In order for maps to display properly with alarms, the Map Path must be set in Local Settings.) Click on Add or hit F5.

Select Add again from the map box. Click on Browse to find the picture that will be the top level map. Enter a description if desired. The first map will be the Parent, so the parent box will be left blank. Click OK.

Page 101: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

93

Click on Add from the Map box again. Follow the same procedure before of browsing to the next desired map. This time the Parent will be the first map selected. Click OK.

Continue following this procedure until all of the maps are loaded. Each image’s parent will be the preceding image as shown below. Click Save when all desired images have been loaded.

Page 102: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

94

DEFINE ALARM INSTRUCTIONS From the Main Interface click on the Alarms module again. Select Alarm Instructions. Click on Add or hit F5.

Page 103: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

95

Enter a name for the instruction so that it can be easily called up when defining alarms. Enter specific instructions in the text box. One instruction can be used in multiple alarms. Text instructions can include up to 500 characters. Click OK to save this alarm instruction. Up to 255 alarm instructions can be saved. An Alarm Instruction cannot be deleted if it is used in an alarm.

DEFINE ALARMS From the Main Interface click on the Alarms module again. Select Alarm Definitions. Click on Add or hit F5.

ALARM SOURCE First define the source of the alarm. From the drop down menu select a single device or an area. The area must already be defined in the Device Center. Next select the specific device or area to be used. If a device that has monitor points is selected, another box to select specific points will be shown.

This example shows a single device with an Invalid Status condition.

Page 104: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

96

ALARM INFO

Priority and Type

Setting the priority level determines the order in which the alarm will be displayed in the Alarm Monitor. The Type of Alarm is selected from the previously defined types. Note that use of Alarm Response Commands requires the Priority and Type of the Command to match the Priority and Type of the Alarm.

Requirements for Clearing This Alarm If a monitor point is used, another constraint can be applied to the alarm called, ‘Device must return to non-alarm condition’. This means that the alarm condition must stop occurring before an operator can clear the alarm from the Alarm Monitor. The Operator Must Enter Comments check box forces the operator to enter comments regarding the alarm before it can be cleared from the Alarm Monitor.

Time Zone Select the Time Zone to be used. Alarms will only occur when this Time Zone is active. To verify the Time Zone, click on the Time Zone tab. The corresponding graph will appear. The green area is the active time.

Page 105: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

97

Instructions to Operator Up to 3 defined alarm instructions can be selected per alarm. From the drop down menu select the instructions that were defined in the Alarm Instructions area. The alarm instructions will appear in the Alarm Monitor in the order that they are displayed.

ALARM MAPS The use of maps is optional. To select maps to use click on the Select Map button next to the Alarm Map (the top line).

Select the lowest map of the image tree to use and click Save.

The next screen will display the map that was selected. Click anywhere on the map to add a red alert circle. Click OK.

Page 106: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

98

Next to First Map Displayed click on Select Map. Select which map will be displayed first in the Alarm Monitor. From the Alarm Monitor the operator will be able to drill down through each map that is in the map tree as defined in Alarm Maps.

TIME ZONES

This displays the Time Zone that is selected on the Alarm Info tab.

Page 107: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

99

ALARM ROUTING Each alarm can be routed to All Operators or Selected Operators by using the radio buttons. The list of operators is displayed on the left side. Highlight the desired operators and double click or use the arrow buttons to put them on the right side of the screen. The operators on the right side of the screen are the only operators that will see that alarm when Selected Operators is used.

Page 108: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

100

Chapter 16 ALARM MONITOR

The Alarm Monitor is a separate interface that shows currently active alarms in its own screen. The Alarm Monitor shows alarm transactions only. These alarm transactions are also displayed in red text in the Transaction Monitor. The alarm monitor cannot be closed. However, an operator’s permissions can be changed to not include the Alarm Monitor. To do this, remove the operator’s permissions for Acknowledge, Clear Active Alarms, Silence, and View Active Alarms under the Alarms tree as shown below. Using Zones also restricts an operator’s ability to only view alarms originating in Zones which they have permission to view.

To Enable or Disable alarms, press F12. When the alarms are disabled, new alarms will not appear in Alarm Monitor for that operator until alarms are enabled again.

MENUS Clear Alarm – Clears the selected alarm Clear All Alarms – Clears all of the alarms in the grid Save Column Widths – Saves the grid column widths

ICONS Ack Alarm – Acknowledges the selected alarm Ack All Alarms – Acknowledges all alarms

Page 109: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

101

Alarm Map – Displays the map associated with selected alarm Enter Comment – Allows entry of a comment prior to acknowledging an alarm View Comments – Displays the comments associated with an alarm View Instructions – Displays the instructions associated with an alarm Silence Alarms – Stops the audible beep Ignore Displayed Alarms

(1) When checked (enabled) the alarm monitor screen will not pop up over the screen the user is in until a new alarm transaction comes in.

(2) When not checked the screen will pop up every few seconds to remind the Operator that there are alarms that need attention.

Display Card info with Alarms – Displays the card information associated with selected alarm.

Page 110: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

102

MONITOR VIEW The Alarm Monitor grid gives details on the alarms. When multiple instances of the same alarm come in, the alarm count increases. A new alarm row is not generated. Panel – Panel Description Device – Device Description Point – Point Description Name – Cardholder name Encoded – The encoded number if the alarm was generated from a badge Description – Description of the alarm Time – Time the alarm occurred Date – Date the alarm occurred Count – Number of times alarm has occurred

Page 111: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

103

Chapter 17 COMMAND CENTER

There are five types of commands that can be issued directly to devices or areas. These commands can be used to open or close outputs, tell devices to go online or offline, lock or unlock doors, and grant access, among others. These commands can be set to happen on a time schedule, at one point in the future, immediately, based on an event, or based on an alarm.

Scheduled commands are used to control an area (as defined in the Device Center), individual readers or output points on a time-scheduled basis. Scheduled commands are tied to Time Zones. Future Commands are single occurrence commands. An exact date and time is used with a specific command to control a device or area. Conditional Response Commands are used to control an area (as defined in the Device Center), individual readers or output points based on events occurring. Alarm Response Commands are used to control an area (as defined in the Device Center), individual readers or output points based on alarms occurring. Issue a Command allows the Operator to send immediate commands to a specific device or area. Issued commands can be saved for quick recall. Issue Command can also be seen directly from the Main Interface. Commands are partitioned by Zones as defined in the Device Center. Scheduled Commands, Future Commands, and Alarm Response commands can be defined for Areas, which can also span Zones. Conditional Response Commands cannot span Zones.

Page 112: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

104

AVAILABLE COMMANDS COMMANDS TO OUTPUTS

Close Output Open Output

COMMANDS TO MONITOR POINTS

Go offline – All input points on the device will stop recording Go online – Enables all input points for recording

COMMANDS TO A READER Go Offline – All user-definable input points on the Reader will stop recording Go Online – Enables all user-definable input points for recording Grant Access Lock Door Set To “Card + Pin” requirement – a PIN is required after a valid card read Set to Card or Pin – Access will be granted with a valid card read or a valid PIN Set to Card Only – Only a valid card will be given access Unlock Door

DEFINE SCHEDULED COMMANDS From the Main Interface click on the Command Center module. Select Scheduled Commands and click OK. Click on Add or hit F5 to define a new scheduled command.

COMMAND INFO Device or Area to Command

Commands can be issued to a single device or to an Area. If a device with an output point is selected, a menu to select the point will appear. The point does not have to be selected if the command is going to a Reader.

Commands Select from the drop down menus what should happen when the Time Zone is active (on) and inactive (off).

Page 113: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

105

When

Select the Time Zone for the Scheduled Command to use. The command will only occur when that Time Zone is active. Deleting associated Time Zones will delete the Scheduled Command.

Holiday Exceptions If the Holiday Exception is selected the command will not be issued during Holidays assigned to that Holiday Group.

In this example, the door to Room 330 will be unlocked using the Time Zone Monday through Friday from 8am to 5pm. On the Holidays in the Contractors Holiday Group, the command will not be issued and the door will remain locked.

Page 114: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

106

TIME GRAPH Time Graph shows a visual graph of Time Zone selected on the Command Info tab.

Click Save to save and return to the Scheduled Commands screen. All scheduled commands will be listed. When multiple pages of commands are defined use the controls to move between pages of commands.

DEFINE FUTURE COMMANDS

From the Main Interface click on the Command Center module. Select Future Commands and click OK. Click on Add or hit F5 to define a new future command.

COMMAND INFO

Select Single Device or Area. Select the Device and Point if appropriate. Select the command to be used. The available commands depend on the specific device definition. Select the exact date and time the command should occur. This is a one-time command.

Page 115: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

107

In this example, the sprinklers in Room 330 will be turned on at 9:05am on April 1, 2006. The sprinklers will not turn off until another command is issued for the sprinklers to return to normal state. Click save. The time and date used will be the system time on the computer running ASIServer. All future commands will be listed. When multiple pages of commands are defined use the controls to move between pages of commands.

CONDITIONAL RESPONSE COMMAND From the Main Interface click on the Command Center module. Select Conditional Response Commands and click OK. Click on Add or hit F5 to define a new conditional response command.

Page 116: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

108

COMMAND INFO

Source of Condition Select the Zone and Device to be used as the condition. Select the Input Point radio button if an input (monitor point) will be the source of the condition, then select the specific input Point. In this example an Input point in Room 214 will be used as the source of the condition. On the Conditions tab the specific condition(s) will be selected.

Response (Command) The device to be controlled as the response must be on the same Panel as the Source of Condition. Select the specific device (and output point if desired). Select which command should occur when the condition (as defined on the Conditions tab) occurs.

CONDITIONS Conditions

The displayed conditions are dependant on the device selected and whether or not an Input Point is used as the Source of Condition on the Command Info tab.

When Select the Time Zone for the Conditional Response Command to use. The command will only occur when that Time Zone is active. Deleting associated Time Zones will delete the Conditional Response Command.

Page 117: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

109

Holiday Exceptions

If the Holiday Exception is selected the command will not be issued during Holidays assigned to that Holiday Group.

TIME ZONE Time Graph shows a visual graph of the Time Zone selected on the Command Info tab.

Page 118: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

110

NOTES Notes allow the Operator to enter comments to be stored with the command.

Click Save to save and return to the Conditional Response Commands screen. All conditional response commands will be listed. When multiple pages of commands are defined use the controls to move between pages of commands.

ALARM RESPONSE COMMANDS From the Main Interface click on the Command Center module. Select Alarm Response Commands and click OK. Click on Add or hit F5 to define a new alarm response command.

COMMAND INFO

Device or Area to Command

Select the Single Device or Area radio button. Next, select the Zone and Device to command. If commanding an output point, then select the specific Point.

Commands Select the command to be used. The available commands depend on the specific device definition.

Page 119: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

111

Alarm Conditions Select the same Alarm Type to be used to activate this command. Select the same Priority and Time Zone as the Alarm Definition. All Alarm Types that correspond to this Alarm Response command must be using the same Priority and Time Zone.

In this example, when a Smoke Detected alarm occurs, the sprinklers in Room 330 will turn on. In order to turn on all sprinklers that are defined in the Device Center use an Area instead of a Single Device.

NOTES Notes allow the Operator to enter comments to be stored with the Command.

TIME GRAPH Time Graph shows a visual graph of the Time Zone selected on the Command Info tab. Click Save to save and return to the Alarm Response Commands screen. All alarm response commands will be listed. When multiple pages of commands are defined use the controls to move between pages of commands.

Page 120: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

112

Chapter 18 ISSUE A COMMAND

Issue a Command allows the Operator to send immediate commands to devices or areas. Issued commands can be saved for quick recall. Issued Commands can also be seen from the Command Center.

ADD/ISSUE A NEW COMMAND From the Main Interface click on the Issue a Command module. Click on Add or hit F5 to define a new command.

Select the Single Device or Area radio button. Select the Zone, Device and Point (if applicable) to command. The Lookup feature can help find the correct device. Next select the command to issue. Click Save to save this command for future use. Click Issue Command to issue it immediately.

Once a command has been saved, highlight it in the Issue Command screen and hit F11 to send the command quickly. Click Save to save and return to the Issue a Command screen. All issued commands will be listed. When multiple pages of commands are defined use the controls to move between pages of commands.

Page 121: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

113

Chapter 19 OPERATORS

Anyone who needs to log into the Access Security Integrater application can be an Operator. Operators are not associated with Cardholders. Operators must have a unique User Name and Password. Deleting an Operator prevents reports being run on that Operator at a future date. Suspending an operator’s permissions will make it impossible for that operator to login. Do not change the user name for the System Administrator account (admin). Setting Global Paths for Images and Signatures can only be performed using this account. Each Operator can have unique permissions controlling what they can see and do within the application. To perform some duties Operators must have certain permission combinations in various modules. For example, an operator must have permission to view Cardholders in order to print badges. When a key is present next to a given module function, the operator will have permission to perform that function. Double click on a specific function to grant or remove permissions individually.

DEFAULT ADMIN OPERATOR User Name – admin Password – asi The admin operator has most permissions and the Default Zone. There are 2 permissions that Admin does not have by default. The first is the permission to be able to view the SSN in the Cardholders module. When the Social Security Number is used (enabled in the Global Settings) each operator must specifically be given permissions to view social security numbers. The other permission, Restricted by Zone, is also in Cardholders. When this is enabled, the operator will only be able to see the cardholders who have badge permissions in the specified zones on the right. Profiles can also be saved. A profile consists of a name and specific permissions. When adding new operators the permissions from a Profile can be copied. This is a very efficient way to add new operators who have similar permissions. Once the basic profile permissions have been copied, the operator’s permissions can be further tailored. ADD AN OPERATOR / SET PASSWORD POLICIES

From the Main Interface click on the Operators module. Click on Add or hit F5 to add a new operator.

Page 122: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

114

MENUS Operators – save or clear operator settings

View – expand or collapse permissions tree

Policies – passwords

Check the Passwords Are Case-sensitive box to enforce Case-Sensitive passwords. To force operators to change their passwords on a regular basis, check the Force Password Expiration and set the frequency. Limit Logon Attempts limits the number of times an Operator can attempt to login before the system will lock them out. Having someone else with permissions to see Operators login and re-save this option can reset the password policies.

Page 123: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

115

Click Save to apply the changes. These changes will apply to all operators.

ICONS

Save Operator or Profile

Clear Operator/Profile Information

Expand all view trees to see all permissions

Collapse all view trees

Assign most permissions to the Operator/Profile *Note this does not enable social security number access and does not restrict the operator from seeing all cardholders.

Remove all permissions from the Operator/Profile

Return to the main Operator screen

Page 124: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

116

OPERATOR INFORMATION Check the radio button for Operator. Enter the rest of the information specific to each operator.

First Name – Optional Last Name – Optional MI – Optional User Name – Required and must be unique Password – Required

Confirm password – retype the password for confirmation Suspend this account – deactivates the operator

COPY PERMISSIONS

When defining a new operator or editing an existing operator, permissions can be copied from another operator or profile. Select the operator or profile to copy and click on the “Copy Permissions” button.

Page 125: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

117

OPERATOR PERMISSIONS

Double click on individual functions to grant or remove for that Operator. The key icon next to a function indicates permission is granted. Expand the tree for each module to view related functions. Double click on All to give the Operator/Profile permission to everything under the selected function tree.

ZONES Select the zones in which the operator has permissions. Zone partitioning affects which cardholders and devices an operator has permission to view. Operators will only be able to view devices that are in the specified zone(s). If the Restrict by Zone permission is selected the operator will only be able to see the Cardholders who have access assignments in the specified zone(s).

ADD A PROFILE

The only difference between a Profile and an Operator is that the Profile needs only a profile name. All other menu options, icons, and permissions are the same. A Profile cannot be used as a login.

Page 126: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

118

Chapter 20 PANEL MANAGER

Panel Manager is responsible for communications between Access Security Integrater and the ASI system hardware. Panel Manager must be installed on the computer(s) that are controlling the hardware. Only 1 Panel Manager can be installed on each computer. Each panel can only be assigned to one Panel Manager. Additional Panel Managers may be used on multiple computers where load distribution may be necessary. Having multiple Panel Managers will speed up the communications between system devices and ASIServer.

ASSIGN PANELS

At least one panel with the PMID set to 0 must be defined in the ASI Device Center before Panel Manager can be started. Start Panel Manager. Select Yes to Assign Panels Now, and then choose which panel(s) will be controlled via this Panel Manager. The available panels are listed on the left. These are all the panels with a Panel Manager ID of 0 in the Device Center.

Double click on a Panel or highlight the panel and click on the >> arrows. Checking the box on the right allows the panel to reallocate. Panel Manager will check panel data against the current data in the SQL database to determine if the panel needs to reallocate. Firmware upgrades may cause the panel to reallocate. Reallocation clears panel memory and resends the current configuration to the panel.

Page 127: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

119

MENUS

ADD/REMOVE PANELS Brings up a screen to assign panels. The check box on the upper right must be checked for each panel to allow it to reallocate.

USE DEBUG Debug is a tool that can be used by Access Specialties to check communications problems in Panel Manager. Debug should be turned off during normal operations unless instructed by Access Specialties technicians.

USE NINE DIGIT ENCODED Select this option only when using cards that have 9-digit encoded numbers.

Page 128: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

120

TURN ALLOCATION ON/OFF

Turn Allocation On is the normal position. Turning allocation off allows Panel Manager to be restarted without reallocating the assigned panel(s). Each panel can be individually controlled.

Page 129: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

121

TURN TRANSACTIONS ON/OFF Turn Transactions On is the normal position. Turning transactions off allows Panel Manager to be restarted without processing buffered transactions. Buffered transactions are then lost and cannot be recovered. Each panel can be individually controlled.

SET POLLING SPEED The rate at which Panel Manager polls each panel is user configurable. Setting intervals at 1,000 means that panels will be polled once per second. 100 is the fastest speed that can be used. If the speed is set too fast, the panels will not have enough time to respond and “Comm. Lost” transactions will begin to come through the transaction monitor. Check with Access Specialties prior to adjusting the polling speed.

Page 130: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

122

The current interval number is listed at the top of the box. Type in a new polling speed and click OK to change the polling speed. Click Cancel to keep the current interval and return to Panel Manager.

EDIT PANEL EVENT CHECKS Checking the Panels Enabled boxes for each panel works in conjunction with Event Manager. When the panels are enabled, defined events in Event Manager will be turned on.

Un-checking the “Panels Enabled” box causes defined events in Event Manager to be ignored. If communications between Panel Manager and a panel have stopped for a significant period of time, disable the event check before re-establishing the link between Panel Manager and the panel. Otherwise, buffered event transactions will be processed in real time causing the events to occur.

EXIT Closes Panel Manager

Page 131: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

123

COLUMNS

ID – Panel ID as defined in the Device Center Location – Name of the panel as defined in Device Center. Panel State – A green background indicates that the panel is operating. When the Panel State reaches P-10 I-61 the panel is fully communicating with Panel Manager. Disabled indicates that the panel is not operating. A message will appear at the bottom of Panel Manager as to the reason why. In this case Port 2 cannot be opened. Either change the Com Port to a valid port in Device Center or enable the Com Port on the computer. Port-address – Communications Port and Panel Address respectively, used to differentiate panels that share the same communications port in RS-485 and RS-232 Dial Up. Port Type – Indicates type of communications used.

(3) RS-232 Direct (4) RS-232 Dialup (5) RS-485 (6) TCIP

Port Status – Lost Comm (Red) indicates that Panel Manager has lost communication with the Panel. Disabled (Red) indicates that Panel Manager is not able to establish communications with the Panel. Running (Green) indicates that Panel Manager is communicating with the panel.

Page 132: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

124

Initializing (Yellow) indicates that Panel Manager is attempting to establish a communication link with the Panel. Init Modem (Blue) indicates that Panel Manager is attempting to dial the modem as defined in Device Center. Polls – Polls are software packets sent from Panel Manager to the panel to determine the status of the panel. Polls are sent based on the Polling Speed intervals. Increasing polls indicate that Panel Manager is working. Acks – Acks are acknowledgements from the panel in response to Polls sent by Panel Manager. Increasing Acks means that Panel Manager and the panel are communicating. Sent – Indicates the number of Polls sent. Received – Indicates the number of Polls received. Noise – Noise can be generated in a number of ways. Noise characters could indicate that Panel Manager could not process a data packet. The Panel tries 3 times to send packets before “dumping” the packet. Dumped Packets are indicated in Transaction Monitor. Noise can also be generated from external sources such as power or phone lines. Noise does not always mean that packets have been dumped.

MESSAGES Messages will be displayed at the bottom of Panel Manager.

Page 133: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

125

Chapter 21 TRANSACTION MONITOR

The Transaction Monitor displays real time what is going on within the software and at the devices. It shows card reads, alarms, operators logging on and off, updates to cardholders and badges, commands, and events. When Transaction Monitor is initially opened only live transactions will appear. Click Refresh in the bottom left corner to load the previous transactions for the day.

TRANSACTION TAB MENUS

Transaction Show – Shows the Transaction Tab Show Trans Id – When this is checked the unique number for each transaction will be displayed in the grid. Show Employee ID – When checked the cardholder’s Employee ID will be displayed in the grid. The Employee ID field must be enabled in Global Settings first.

Exit

Status Show – Shows the Status Tab.

Page 134: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

126

Utilities Clear Buffer – Deletes transactions that are buffered at the panel. Clear Pending Records – Deletes records that are waiting to be sent to the panel. Save Column Widths – Allows the column widths to be adjusted and saved. Each time Transaction Monitor is opened, these column widths will be used. This is also accessible from Local Settings.

Reports Cardholder By Panel – Shows Cardholder Access Groups

Filters Allows the Operator to determine which transactions will show up in transaction monitor Show Device Description Show Cardholder Transactions Show System Transactions Show Operator Actions Show Panel Manager Transactions Show Events

TRANSACTION COLOR CODE Each transaction is color coordinated indicating the type of transaction. The color legend is in the upper left corner of Transaction Monitor.

Page 135: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

127

DISPLAY CARD INFO Check the Display Card Info with transactions box to show cardholder images and certain cardholder and badge data with associated transactions.

COLUMNS Panel – Gives the name of the panel on which the transaction occurred. A ‘0’ appears when a transaction is not associated with a panel, such as operator transactions. Device – Displays the Device Number where the transaction occurred. A ‘0’ appears when a transaction is not associated with a device. Point – Shows the monitor point number of defined points. A ‘0’ appears when a transaction is not associated with a point. Name – Gives the name of the operator if it is an operator transaction. If the transaction occurred on a panel it will say “Panel”. Indicates the name of the PC if the transaction was a function of the PC (such as “Lost Panel”). Encoded – Shows encoded numbers for cardholder transactions. It is also a descriptive reference for other uses. Description – Shows the event that occurred. Time – Time transaction occurred corresponding to the system time on the computer running ASIServer. Date – Date transaction occurred corresponding to the system time on the computer running ASIServer.

Page 136: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

128

SHOW TRANSACTIONS BY PANEL OR ZONE Select to show information for one particular zone, panel, or all zones. Select Only Zone and then choose the Zone to be displayed. Choose specific panels by selecting Only Panel and then selecting the Panel to be displayed.

SYSTEM STATUS TAB The system status tab shows a summary of information in the database.

CONNECTIONS Clicking on the Connections radio button gives a listing of the current panels. The Zone and Panel names are shown with the status. Available status indicates the Com Port is open. It does not indicate communication status between the panel and Panel Manager. Check Panel Manager for this information.

SYSTEM STATUS System status gives an overview of the devices and cardholders that are defined in the system. The Use Date check box allows the operator to select a Date Range to use. The operator can then see transaction details during that time frame including Number of Access Granted, Number of Access Denied, Number of Alarms, Total Transactions, Buffered Transactions, and Pending Records.

Page 137: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

129

CURRENT STATUS Current Status shows specific information as shown.

REFRESH VALUES Retrieves current data from the database and refreshes the values. Use this button to retrieve up to date information or when changing the date range.

Page 138: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

130

Chapter 22 REPORTS

The main Report module is comprised of four options: Create new reports, run saved reports, create new SQL queries and run saved SQL queries. Creating new reports is easy and they are fully customizable. Check the desired areas and fields to create each report.

CREATE A NEW REPORT From the Main Interface click on the Reports module.

STEP 1 In Step 1 click on the Create New Report radio button. Click Next.

Page 139: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

131

SELECT REPORT TYPE AND SUBTYPE (IF APPLICABLE)

Select the fields to include in the Report. The outline below shows the available fields in each Report Type.

SELECT FIELDS Access Assignments

1) Access Group Description 2) Access Group Name 3) Device Location 4) Group Number 5) Time Zone Name 6) Time Zone Number 7) User Name

Alarms

1) Alarm Comments 2) Alarm Instruction 1 3) Alarm Instruction 2 4) Alarm Instruction 3 5) Alarm Notes 6) Alarm Type 7) Area Name 8) Condition(s) 9) Device Location 10) Device Must Return 11) Device Number 12) Input Closed Description 13) Input Location

Page 140: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

132

14) Input Number 15) Input Open Description 16) Priority 17) Time Zone Name 18) Time Zone Number 19) Triggered count 20) User Name

Cardholders

1) Custom Fields 2) Access Groups Assigned 3) Card Activation 4) Card Expiration 5) Card Notes 6) Card Status 7) Cardholder First Name 8) Cardholder Full Name 9) Cardholder Last Name 10) Cardholder MI 11) Encoded 12) Last Access 13) Last Reader Used 14) PIN 15) Status Comment 16) User Name

Commands

1) Alarm Response a) Alarm Command Notes b) Alarm Off Command c) Alarm On Command d) Alarm Type e) Area Name f) Device Location g) Device Number h) Minimum Priority i) User Name

2) Conditional Response a) Conditional Device b) Holiday Group c) Notes d) Response Command e) Response Device f) Trigger Condition g) User Name

Page 141: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

133

3) Future a) Area Name b) Device Location c) Device Number d) Future Command e) When Issued

4) Issue

a) Area Name b) Command Issued c) Device Location d) Device Number e) Issue Count

5) Scheduled

a) Area Name Device Location b) Holiday Schedule c) Off Command d) On Command e) Scheduled Command Notes f) Time Zone Name

Devices

1) Device a) APB Mode b) APB Zone c) Area Name d) Channel e) Device Description f) Device Location g) Device Number h) Device Type i) Input Closed Description j) Input Location k) Input Number l) Input Open Description m) Input Point Notes n) Output Closed Description o) Output Location p) Output Notes q) Output Number r) Output Open Description s) Panel Location t) Panel Zone Name u) Port v) Pulse Time

Page 142: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

134

w) Reader Location x) Reader Notes y) Reader Number z) Reader Type aa) Shunt Time bb) Shunt Time Units cc) Unlock Seconds dd) User Name

2) Area a) Area Description b) Area Name c) Device Location d) Device Number

Holidays

1) Holiday Group Name 2) Holiday Name 3) When Scheduled

Operators 1) Deleted 2) First Name 3) Full Name 4) Last Name 5) MI 6) Notes 7) Permissions 8) User Name 9) Zones For Operator

Time Zones 1) Time Zone Description 2) Time Zone Name 3) Time Zone Number 4) When Active

Transactions

1) Cardholder Full Name 2) Condition(s) 3) Description 4) Device Location 5) Device Number 6) Device Point 7) Embossed Encoded 8) Name on Trans

Page 143: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

135

9) Panel Location 10) Panel Number 11) Panel Zone Name 12) PIN Transaction Date

DEFINE THE DISPLAY ORDER OF THE REPORT FIELDS

Highlight a field and use the up and down arrows to move it to the desired location. This is the order in which the fields will appear on the report from left to right.

SELECT THE SORT ORDER Select up to 3 fields to use for sorting criteria. Select Ascending or Descending for each sort field. Sorting is optional.

SET DATE RANGE

If a date field was selected you will be prompted to enter a date range.

ADDITIONAL CRITERIA Click on a field in the “Available Fields” list. Type in or select the desired criteria. Click Set Criteria. Repeat this process for all fields you wish to add criteria to. To remove criteria, click on an item in the yellow Current Criteria box and click “Remove Criteria”. For Cardholder reports, click on the Show Images box to have the cardholder’s image appear in the report. In order for the images to appear correctly the Client Image Path must be set in the Cardholders module.

SAVE REPORT The Report Type and criteria created can be saved for running future reports. Click “Save Report”. Enter a Name for this report.

RUN REPORT Click Run Report to run and view this report in an html format. When the report has been run, the paged report files will be saved to the \ASILaunch\AppItems folder where ASI Launch was installed.

EXPORT REPORT Exports the report to a delimited text file instead of html. When exported, the delimited text file will be saved to the \ASILaunch\AppItems folder where ASI Launch was installed.

Page 144: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

136

RUN A SAVED REPORT Select this option to run or modify a previously saved report. From the Main Interface click on the Reports module. In Step 1 click on the Run A Saved Report radio button. Click Next. Select a Saved Report from the list to run. Click Next to change the saved criteria. Click “Run as defined” to run the report as it is currently defined and view the html file. Click “Export as Defined” to Export the report to a text file. Click “Delete” to delete the report. Once a report has been deleted, it cannot be recovered.

CREATE A NEW QUERY This option allows an Operator to run SQL queries directly against the SQL database from a client workstation. Be wary of the queries that are run. Unless otherwise instructed by Access Specialties technicians, only “SELECT” SQL statements should be run. Running other queries against the database can cause data loss, corruption, and may cause ASI 2000 to no longer function. From the Main Interface click on the Reports module. In Step 1 click on the Create a New Query radio button. Click Next.

Type the query in the text box. Click “Execute Query” to run the query without saving it. Enter a Heading for the report. The output for select statements will be in html format. The paged output files will be saved to the \ASILaunch\AppItems folder where ASI Launch was installed.

Page 145: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

137

Click “Save Query” to save the query before running it. Enter a Heading for the report. Enter a File Name for the report. The query file will be saved to the \ASILaunch\AppItems folder where ASI Launch was installed. Execute the query after it has been saved to view the report.

EXECUTE A SAVED QUERY This option allows an operator to run previously saved queries used for custom reporting. From the Main Interface click on the Reports module. In Step 1 click on the Execute a Saved Query radio button. Click Next. Select a Saved Query from the list to run.

Click on “Execute Query” to run the query. Click on “Delete” to delete that query. Once a query has been deleted, it cannot be recovered.

Page 146: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

138

OPERATOR ACTIVITY REPORT

The Operator Activity report allows the System Administrator operator to run detailed reports on all operator activity. This feature must first be enabled in Global Settings.

From the Main Interface click on View, Operator Activity.

Page 147: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

139

To generate a new report, select New Report.

This example shows a report to see all the changes Operator 1 has made in the Cardholders module. When defining a report the CTRL and SHIFT keys can be used for multiple selections in each step. Selecting Clear Selections will clear any selections made in that step only. Clicking Next and Back from any of the steps will help navigate through the steps. All selections made will be retained until you click Clear Selections for a particular step.

Step 1 allows you to choose which operators to run the report on. Click Next.

Page 148: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

140

Step 2 allows you to choose which module(s) to run the report on. Check the All Modules button to see all activity. Click Next.

Step 3 allows you to further define the report by selecting certain areas within the selected module(s). Click Next.

Step 4 allows you to set which operator actions you want to see. Changes made to the image paths are included in the section. Click Next.

Step 5 allows you to set up to 3 sorts on the results. Click Next.

Page 149: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

141

Step 6 allows the operator to set the desired activity date range for the report. To see all records, enter a large date range. Click Next.

Additional information includes affected field data. Without this checked, the report will only show the operator action (add, edit, delete, etc). Additional information will show pertinent data that was changed or manipulated. Selecting Run will send the output of the report to an html file. Selecting Export will allow you to give the report a name and will save it as a pipe delimited file. The paged html files or pipe delimited text file will be saved to the \ASILaunch\AppItems folder where ASI Launch was installed.

Selecting Save will save the report definition for future use. Enter a descriptive name to differentiate between similar reports.

Page 150: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

142

This report definition is now saved and can be run by selecting Run as Defined or redefined by selecting Edit Report. Deleting the report will only delete the report definition. The data will not be deleted. To clear out the activity log, select Clear Log. This permanently deletes all activity records currently in the database, so make sure all necessary reports and/or backups have been executed before doing so.

Page 151: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

143

Chapter 23 STANDALONE REPORTS The Standalone Reports module is for use with Access Security Integrater version 3.1.3 or later. The Standalone Reports module allows customized reports and queries to be scheduled on a reoccurring daily, weekly, or monthly basis, or one time only. Unlike the Reports module that is in Access Security Integrater, these reports query the SQL database directly without going through the ASIServer module. This means that running large reports or queries will not affect the performance of your Access Control system. Each schedule that is running uses one SQL license. The MSDE allows only 5 SQL licenses. When using the Standalone Reports module with the MSDE, the schedules should be spaced out so that no more than 3 schedules are running at any given time. There are two files that need to be copied to the SQL Server machine for the base support of the Standalone Reports module. There is one executable (ASIReports.exe) that needs to be copied to the computer(s), which will be used to run the reports. ASIReports.exe is the interface for the reports, queries and scheduling module. ASIReports.exe can be installed on multiple computers, however care must be taken that only one user is editing a report or query definition at one time. All schedule reports or queries will be saved in C:\ASIReports folder on the local computer.

SETUP ON THE SQL SERVER

1) On the machine running SQL Server - start SQL Server Agent a. Double click on the SQL Server box located in the toolbar on the bottom

right of the screen b.

c. Select SQL Server Agent from the Services menu d. Select Start/Continue e. Check the box that says Auto-start service when OS starts

Page 152: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

144

f. Close the SQL Server Service Manager

2) On the machine running SQL Server - Create a folder called ASIReports directly off the C drive (C:\ASIReports). Do not use any spaces

3) Copy RptSchedExec.exe, RptSchedExecAutoInc.exe, and ASIReports.exe to the

ASIReports folder a. These files can be found on the Access Security Integrater installation cd

in the StandaloneReports/SQLServer folder SETUP WORKSTATIONS

Any computer that has access to the SQL Server can be used for Standalone Reports. Create a folder called ASIReports directly off the C drive (C:\ASIReports). Do not use any spaces. Copy ASIReports.exe to the ASIReports folder. These files can be found on the Access Security Integrater installation cd in the StandaloneReports/Client folder.

INITIAL USE

Double click on ASIReports.exe and enter the SQL Server and Database information as in the example shown below. Select Ok.

Page 153: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

145

Next browse to the folder where the Cardholder Images are located. Note if this is not selected, the reports will run, but images will not appear in selected reports. Click Save.

CREATE ASI 2000 REPORTS TO SCHEDULE

To create Access Security Integrater Reports to schedule, open ASIReports.exe and select ‘Create a New Report’. Create and save reports and queries the same as the regular reports module in Access Security Integrater (see Chapter 20).

Page 154: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

146

**Previously saved reports or queries from the Reports module in ASI cannot be used.

These reports and queries will be saved in the ASIReports folder.

CREATE SQL QUERIES TO SCHEDULE To create SQL queries to schedule, open ASIReports.exe and select ‘Create New Query”.

Select Next.

Type the query into the text field.

Page 155: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

147

**When using dates in the query, the query must be written with the following format: TTT.FFF >='SSS' AND TTT.FFF <='EEE' Where: TTT = Table Name FFF = Field Name SSS = Start (From) Date EEE = End (To) Date If this format is not used, the auto-increment dates portion will not work. Select Save Query.

Page 156: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

148

Enter a Heading for the query and click OK. The heading will be displayed at the top of the page of the output file.

Enter a File Name for the query and click Ok. This will be the name of the output file. When recurring reports are schedule the date will be placed in front of this file name.

Select OK.

SCHEDULE REPORTS AND QUERIES After reports or queries have been saved, click on the Schedule button in the upper right corner.

STEP 1 – SELECT A SCHEDULE FUNCTION Select the Add a new report schedule radio button. Click Next.

STEP 2 – SELECT A SAVED REPORT OR QUERY

Select ‘Saved Reports’.

Page 157: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

149

Select the desired Report (this must be one that was previously saved through the ASI Reports generator.

Select Next.

STEP 3 – SELECT REPORT FREQUENCY Select to run this report or query One Time or on a Recurring Schedule.

Page 158: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

150

Select Next.

STEP 4 – ONE TIME REPORT Select the time and date to run this report or query.

Select Next.

STEP 4 – RECURRING REPORT Select the frequency of the report (Daily, Weekly, Monthly). If Daily is selected, choose how many days between the reports, such as every day (1), every other day (2), etc.

Page 159: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

151

If weekly is selected (as shown below) select the day(s) of the week on which is should run and the frequency. For every week, select 1, for every other week, select 2, etc.

Select the execution time, which is the exact time at which the report will run. The time from the SQL Server machine will be used.

In the Duration box select the Start Date.

Page 160: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

152

Select the End Date or No End Date button.

Using an End Date will cause the report or query only to be run during that period. Using No End Date will cause the report or query to run indefinitely.

Select Next.

Page 161: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

153

STEP 5 – SELECT REPORT FORMAT Select the output of the report or query to be HTML or Delimited. Use HTML if cardholder images are used in the reports.

Select Next.

ADD SCHEDULE Click Add Schedule to save the schedule that was just created. This creates an SQL job on the SQL Server. The reports and/or queries will be saved to the local machine under C:\ASIReports.

AUTO-INCREMENT DATE RANGES:

If dates are used in the Report an option will appear to have those dates auto-increase with the occurrence schedule that was selected in Step 4. For example if the Report is scheduled to run weekly and Activation Date is set to auto increment as shown below, each time the report is run the Activation date range will move forward in time by one week.

Page 162: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

154

**Access Specialties recommends using auto-increment on a maximum of 2 date ranges for maximum accuracy on the report. Select Update Schedule.

A message box will indicate that the report has been added. Select OK.

VIEW EXISTING SCHEDULES

Go to Step 1. Report and Query schedules appear in the blue box on the left under Current Report Schedule(s). Queries have a * next to the name.

Page 163: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

155

EDIT EXISTING SCHEDULES To Edit or View the details of this report go to Step 1 and select ‘Edit an existing report schedule’. This is also to edit query schedules.

Click Next.

The details of the schedule appear on the right side.

Click Next.

Page 164: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

156

Follow the previous steps to update the report schedule. To cancel select Return to Main Menu.

Click Next through Steps 4 and 5 and select Update Schedule to save the changes.

DELETE A SCHEDULE

To delete a report schedule go to Step 1 and select ‘Delete a report schedule’.

Select Next.

Page 165: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

157

Highlight the schedule to delete. Use the additional information on the right side to verify that is the correct schedule to delete.

Select Delete Schedule.

Page 166: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

158

Select Yes to permanently delete this schedule.

Select OK to acknowledge that the schedule has been deleted.

Page 167: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

159

Chapter 24 EVENT MANAGER Event Manager provides automated control, linking transaction activity in ASI Platinum to a Panel, CCTV, Pager, E-Mail or DVR response. In Event Manager, events are defined based on conditions reported in the ASI Platinum database. Each transaction is compared to defined Events. If a defined event occurs, Event Manager communicates with the Panel, CCTV, Pager, E-Mail, or DVR application. Buffered transactions are processed as happening “Real Time”. Disable Event check in Panel Manager when unbuffering transactions to prevent buffered transactions from initiating Events. Multiple Responses can be linked to a single event. For example, a Forced Entry condition on a door may command the CCTV system to view the door and also issue a page to a roving guard for investigation. An Event is comprised of Rules and Responses. A Rule is any single piece of information that can be derived from a transaction. Rules can be used in multiple events or combined with other rules. A Response is a command to control ASI System hardware or any other devices. Responses can be used in multiple events. The combination of Rules and Responses is called an Event. All defined Rules, Responses and Events are displayed in the Event Manager grid. Rules and Responses can be used in multiple events.

CONFIGURE PAGERS Before Pager Responses can be defined the Pagers must be configured. From Event Manager select Pager, Configure Pager.

The following screen will be displayed. Enter site-specific information.

Page 168: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

160

DEVICE TYPE Pager indicates a traditional paging system. Wireless denotes a wireless paging system. If Wireless is used enter the Wireless Address.

Send Page will automatically send the current page. This can be used to test the pages. To enter additional pagers, change the necessary information and click Save Pager Entry. Each time Save Pager Entry is clicked a new entry is made. Use the Next and Prior buttons to scroll through the defined Pagers. Click Return to close the screen when finished. Pager Groups will assign individual pagers to groups that can be used in Pager Responses.

Page 169: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

161

MENUS To Add, Edit, Delete and Save Pager Entries, select Pager Entry and choose the appropriate option.

To Add, Edit or Delete Wireless Address information, select Wireless Address and choose the appropriate option.

PAGER GROUPS

Select Edit Pager Groups to define the Pager Groups.

Page 170: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

162

Select Add, Edit or Delete to perform the desired function. Select Return to go back to the previous screen. Each Pager can be a part of multiple Groups. Double click on one or more of the available groups on the left side of the screen to add the current pager to the group.

Page 171: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

163

Click Save when finished defining Pager Groups. Click Return to go back to the Pager Configuration Screen.

CONFIGURE E-MAIL From the Event Manager screen, select E-Mail, Configure E-Mail.

MENUS Contacts

To add a new contact, select Contact, Add Contact. The First and Last Names are drop down menus from the Cardholder’s module. Enter an E-Mail Address and click Save.

Page 172: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

164

Multiple E-Mail addresses can be entered for each contact. To add more addresses for the contact, click Yes and enter the next E-Mail address. Otherwise, click No.

Click Return to Groups to add E-Mail groups to this contact. Click Return to E-Mail to return to the main E-Mail Configuration screen. To set the From addresses, select Contact, Add From Address. Enter the From E-Mail addresses one a time. Select Add Address to add each address. Click Close when complete. Each From address will be displayed in the box below.

To Delete From E-Mail address(es), click on Contact, Edit From Address. Choose individual From E-Mail addresses and click Delete Selected. Mail Groups

Mail Groups allow Responses to be sent to multiple E-Mail addresses with one Response. Select Mail Groups, Add Mail Group

Page 173: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

165

Enter a descriptive name for the new Mail Group.

The defined Groups appear on the left side. The E-Mail Contacts appear on the right side. To add Contacts to a Group highlight the desired Group. Next, highlight the appropriate Contact on the right side and use the arrow to move the contact to the middle. All of the contacts that appear in the Group Members column are members of the highlighted Group.

Use the Delete Member button to remove the Group Member from the Group. Use the Add, Edit and Delete buttons under the Contacts column to perform the desired Contact function. To save changes to a Group, highlight a Group and click on Save Group. When all Groups have been defined select Return to E-Mail. Each Mail Group option displays the E-Mail Groups screen.

Page 174: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

166

E-Mail Message Define the E-Mail Messages to be sent with Responses. Select E-Mail Message, Add E-Mail Message.

Select a From Address from the previously defined From E-Mail addresses. Enter an E-Mail Description to be used as the Subject line.

To create the email message click in the Message Text area.

Page 175: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

167

Click on Add and choose from the available options to create the email message from text to database fields.

Customize the email message by adding or deleting fields. Arrange the fields by highlighting the Text or Field Entry and using the Up, Down and Delete buttons.

Page 176: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

168

DEFINE RULES From the Main Interface click on the Event Manager module. Select Add in the Rules box. Enter a description for this rule.

Click in the Select Field box. Lists of the possible fields to use as rules are displayed. Below is an outline of the available fields.

Cardholder Personal

Badge Number First Name Last Name Middle Initial

Where Allowed Access Group Description Access Group Index

System Hardware Device

Location Device Index Device Number Channel Port

Panel Panel Location Panel Index

Reader Reader Location Reader Index Anti-Passback

Output Point Output Point Location Output Point Index Output Point Open Description Output Point Closed Description

Monitor Point Monitor Point Location Monitor Point Index Monitor Point Closed Description Monitor Point Open Description

Page 177: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

169

Condition Card Activity

Access Granted Wrong Place Wrong time Wrong Pin Number Inactive Status Wrong System Code Expired Card Not Yet Active Holiday Violation Unknown Card Anti-Passback Violation Soft Anti-Passback Violation

General Activity Door Held Open Door Closed Forced Entry Forced Closed Comm Lost Comm Restored Monitor Point Open Monitor Point Closed Tamper Panel Activity

Device Responses to Commands Door Unlock Door Locked Output Point Opened Output Point Closed Card Only Mode Card + Pin Mode Device Online Device Offline

Operator Activity Alarm Acknowledge Operator Commands to Devices Operator Log In/Out

System Commands Scheduled Command Future Command Conditional and Alarm Responses Count Cards

Date and Time Date Time

Page 178: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

170

Day Date and Time Combination Blocks

Date and Time Day and Time

Alarms Priority Type Count

First In /Last Out By Access Group By Reader

Select the condition field and operator (=, <>, <, >). Operators are dependant upon which condition field is selected. Select the value for the Rule. Values are dependant upon which condition field is selected.

Select Save Rule. Additional rules are added in the same manner. Operators and Values are dependant upon the Field selected. Very specific Descriptions will aid in defining the rest of the Event. To edit a rule, double click on the Rule row, or highlight the rule and click Edit. To delete a Rule, highlight the rule and select Delete in the Rule box. Deletions are permanent.

Page 179: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

171

DEFINE RESPONSES From the Main Interface click on the Event Manager module. Select the appropriate response tab and choose Add from the Responses box.

DEFINE PANEL RESPONSES Select the Panel Response tab and choose Add from the Responses box. Enter the Response Description. Select the response to go to a single device, reader or area. Select the specific Device, Reader or Area. Output points will appear if a device with defined output points is selected. Choose a command to occur. Click Save Response.

Page 180: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

172

DEFINE CCTV RESPONSES Select the CCTV Response tab and choose Add from the Responses box. Enter the Response Description. Choose the Com Port. Choose to use a Defined Control and select the Control Name. To set up a New String choose New string and enter the string in the Actual String box. Click Save.

DEFINE PAGER RESPONSES Select the Pager Response tab and choose Add from the Responses box. Enter the Pager Response description. Choose individuals or groups. Click Save Response. Select Close to return to the Event Manager screen.

Page 181: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

173

DEFINE E-MAIL RESPONSES Select the E-Mail Response tab and choose Add from the Responses box.

Enter the E-Mail Response description. Select the Show Groups or Show Individuals radio buttons. The available contacts and messages will appear on the left side (see Configure E-Mail). Double click on the available contacts to add them to the right side. This defines the Response. Click Save Response.

DEFINE DVR RESPONSES Select the DVR Response tab and choose Add from the Responses box. Enter the Description and DVR Machine ID. From the drop-down menus select the Video Monitor, Camera and Type.

Click Save.

Page 182: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

174

DEFINE EVENTS Events combine the previously defined Rules and Responses. Multiple Rules and/or Responses can be used to create unique, complex Events. From the Main Interface click on the Event Manager module. Select the appropriate response tab and choose Add from the Events box. All Rules and Responses, which appear on the left side of the screen, are the available Rules/Responses to choose from. All Rules and Responses on the right side of the screen are the Rule(s) or Response(s) that are used in the current Event. Double click on each Rule or Response to move it from one side to the other.

Enter an Event Description. Next, select the Rule(s) to be used from the Available Rules box. Double click on each desired Rule to move it to the right side of the screen.

Page 183: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

175

Finally, select the appropriate Response tab and select the Response(s) to be used. Double click on each desired Response to move it to the right side of the screen. Use the tabs to view the corresponding defined Responses. Click Save Event when finished.

Page 184: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

1

INDEX Access Groups.............................................................................................................................................. 68 Alarm Monitor...........................................................................................................31, 98, 99, 100, 102, 104 Alarms .......................................................................................................................................................... 93

Define ...................................................................................................................................................... 97 Instructions .............................................................................................................................................. 96 Maps ...................................................................................................................................................94, 99 Routing .................................................................................................................................................. 100 Toggle...................................................................................................................................................... 34 Type Definitions ...................................................................................................................................... 93

Anti-Passback............................................................................................................................................... 52 Define ...................................................................................................................................................... 58 Hard ......................................................................................................................................................... 52 Soft .......................................................................................................................................................... 52

Areas........................................................................................................................................................52, 62 ASI Launch....................................................................................................................................6, 12, 13, 34 ASI Server ...............................................................................................................................6, 12, 13, 30, 32 Associated Layout ........................................................................................................................................ 85 Badge Layouts.............................................................................................................................................. 87

Create....................................................................................................................................................... 89 Print ....................................................................................................................................................88, 92 Printer Settings ........................................................................................................................................ 88 Printer Type ............................................................................................................................................. 88

Badges .......................................................................................................................................................... 79 Access Assignments ................................................................................................................................ 79 Anti-Passback .......................................................................................................................................... 81 Associated Layout ................................................................................................................................... 85 Holidays................................................................................................................................................... 80 Magnetic Encoding.......................................................................................................................76, 87, 89 Multiple Badges..................................................................................................................................76, 82

Cable Connections........................................................................................................................................ 63 Cable Diagram.............................................................................................................................................. 66 Cardholders .................................................................................................................................................. 75

Access Assignments ................................................................................................................................ 79 Anti-Passback .......................................................................................................................................... 81 Associated Layout ................................................................................................................................... 85 Client Image Path ...............................................................................................................................76, 87 Client Signature Path ............................................................................................................................... 87 Custom Field Creation............................................................................................................................. 78 Custom Fields .......................................................................................................................................... 75 Employee ID.........................................................................................................................32, 75, 79, 128 Enable Signature Pad............................................................................................................................... 83 Global Image Path ..............................................................................................................................32, 76 Global Signature Path .............................................................................................................................. 32 Holidays................................................................................................................................................... 80 Images...................................................................................................................................................... 82 Search ...................................................................................................................................................... 77 Signature.................................................................................................................................................. 83

CCTV ..................................................................................................................................................161, 174 Channel Expander .............................................................................................................................48, 50, 54 Client Image Path ......................................................................................................................................... 76 Client Monitor .............................................................................................................................................. 30 Client Signature Path.................................................................................................................................... 76 Commands

Page 185: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

2

Alarm Response..................................................................................................................................... 112 Command Center ................................................................................................................................... 105 Conditional Response .....................................................................................................................105, 109 Future..............................................................................................................................................105, 108 Issue................................................................................................................................................105, 114 Scheduled........................................................................................................................................105, 106

Communication Protocols ............................................................................................................................ 48 RS-232 Dial-Up....................................................................................................................................... 49 RS-232 Direct .......................................................................................................................................... 48 RS-485..................................................................................................................................................... 49 TCP/IP ..................................................................................................................................................... 49

Comtrol....................................................................................................................................................47, 63 Contact Points............................................................................................................................................... 51 Custom Fields............................................................................................................................................... 77 Database Info................................................................................................................................................ 30 Database Installation / Upgrade.................................................................................................................... 17 DCOM...............................................................................................................................................13, 15, 23 Device Center ............................................................................................................................................... 46

Areas...................................................................................................................................................52, 62 Panels....................................................................................................................................................... 47 Zones ....................................................................................................................................................... 46

Devices Define ...................................................................................................................................................... 55

Dial-Up......................................................................................................................................................... 65 Door controls................................................................................................................................................ 66 DVR ....................................................................................................................................................161, 176 Elevator Control Module.............................................................................................................48, 50, 51, 59 E-Mail..................................................................................................................................................165, 175 Employee ID........................................................................................................................32, 33, 75, 79, 128 Event Manager ........................................................................................................................................... 161

Configure Pagers ................................................................................................................................... 161 Define Events ........................................................................................................................................ 176 E-Mail.............................................................................................................................................165, 175 E-Mail Message..................................................................................................................................... 167 Response................................................................................................................................................ 173 Rules ...................................................................................................................................................... 170

File DSN....................................................................................................................................................... 18 Change..................................................................................................................................................... 18 Create....................................................................................................................................................... 18

Global Image Path ........................................................................................................................................ 32 Global Signature Path................................................................................................................................... 32 Grounding..................................................................................................................................................... 64 Hardware ...................................................................................................................................................... 63 Holidays ....................................................................................................................................................... 72 Image Paths

Client Image ............................................................................................................................................ 36 Client Signature ....................................................................................................................................... 36 Global ...................................................................................................................................................... 35 Local ........................................................................................................................................................ 35 Set ............................................................................................................................................................ 35 Workstations............................................................................................................................................ 87

Install ASI Platinum ..................................................................................................................................... 12 Complete.................................................................................................................................................. 13 Custom................................................................................................................................................14, 15 Options .................................................................................................................................................... 12

Installing ASI Platinum

Page 186: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

3

PC Requirements ....................................................................................................................................... 4 Local Settings ............................................................................................................................30, 31, 94, 129 Magnetic Encoding............................................................................................................................76, 87, 89 Main Interface .............................................................................................................................................. 28

Icons ........................................................................................................................................................ 28 Tool Bar................................................................................................................................................... 29

Memory Configuration................................................................................................................................. 54 Monitor Point ............................................................................................................................................... 51 Operator Activity...................................................................................................................................33, 141

Log......................................................................................................................................................32, 33 Reports................................................................................................................................................... 141

Operators .................................................................................................................................................... 116 Add ........................................................................................................................................................ 117 Create Profile......................................................................................................................................... 120 Password Policies .................................................................................................................................. 117 Permissions............................................................................................................................................ 119

Output Point ................................................................................................................................................. 51 Pagers ..................................................................................................................................................161, 162 Panel Manager............................. 6, 12, 13, 47, 52, 54, 63, 121, 122, 123, 124, 125, 126, 127, 129, 131, 161 Panels ........................................................................................................................................................... 47

Communication Protocols ....................................................................................................................... 48 Define ...................................................................................................................................................... 52 IC-1600.................................................................................................................................................... 47 IC-1600 Devices ...................................................................................................................................... 50 Memory Configuration ............................................................................................................................ 54 Re-Allocate.............................................................................................................................................. 55 UP-2000................................................................................................................................................... 48 UP-2000 Devices ..................................................................................................................................... 51

Password Server....................................................................................................................................................... 23

PC Requirements............................................................................................................................................ 4 Reader Interface ......................................................................................................................2, 48, 50, 64, 67

Reset Memory.......................................................................................................................................... 64 Readers

Define ...................................................................................................................................................... 57 Re-Allocate Panel......................................................................................................................................... 55 Reports ....................................................................................................................................................... 133

Create New Query ................................................................................................................................. 139 Create New Reoport .............................................................................................................................. 133 Operator Activity Report ....................................................................................................................... 141 Run Saved Query................................................................................................................................... 140 Run Saved Report .................................................................................................................................. 139 Standalone Reports ................................................................................................................................ 146

Requirements.................................................................................................................................................. 4 Reset Memory .............................................................................................................................................. 64 Server Info.................................................................................................................................................... 30 Short Haul Modems...................................................................................................................................... 65 Signature Pad...........................................................................................................................................77, 83

Enable Signature Pad............................................................................................................................... 83 Signature Pad Type.................................................................................................................................. 84 Supported Models.................................................................................................................................... 84

Social Security Number Tracking ................................................................................................................ 33 SQL Server ........................................................................................................................................2, 6, 7, 17 Standalone Reports..................................................................................................................................... 146

Cardholder Image Path .......................................................................................................................... 148 Create Queries to Schedule.................................................................................................................... 149

Page 187: Installation & User’s Guide...Carrousel Way, Rosemount, MN 55068 or by email to support@access-specialties.com. Installation guides are available on the Access Security Integrator

4

Create Reports to Schedule.................................................................................................................... 148 Delete a Schedule .................................................................................................................................. 159 Edit Existing Schedules ......................................................................................................................... 158 Increment Date Ranges.......................................................................................................................... 156 Initial use ............................................................................................................................................... 147 Schedule Reports and Queries ............................................................................................................... 151 Setup on a workstation........................................................................................................................... 147 Setup on the SQL Server ....................................................................................................................... 146 View Existing Schedules ....................................................................................................................... 157

System Status ............................................................................................................................................. 131 Time Zones................................................................................................................................................... 39

Add .......................................................................................................................................................... 40 Delete....................................................................................................................................................... 44 Edit .......................................................................................................................................................... 43 View ........................................................................................................................................................ 44

Transaction History ...................................................................................................................................... 33 Transaction Monitor ........................................................................ 31, 33, 49, 50, 52, 81, 102, 127, 128, 129 Upgrade ........................................................................................................................................................ 26

Database .................................................................................................................................................. 27 Server Software ....................................................................................................................................... 26 Workstation Software .............................................................................................................................. 27

Zones ............................................................................................................................................................ 46


Recommended