9000-areas-zones.pdf

246
C•CURE 9000 Version 2.0 Areas and Zones Guide REVISION C0 6 Technology Park Drive Westford, MA 01886 http://www.swhouse.com Fax: 978-577-4392 Phone: 978-577-4000

Upload: raphael-muzzi

Post on 12-Jan-2016

10 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: 9000-Areas-Zones.pdf

C•CURE 9000Version 2.0

Areas and Zones Guide

REVISION C0

6 Technology Park DriveWestford, MA 01886http://www.swhouse.comFax: 978-577-4392 Phone: 978-577-4000

Page 2: 9000-Areas-Zones.pdf

Copyright and TrademarksC•CURE and Software House are registered trademarks of Tyco International Ltd. and itsrespective companies.

The trademarks, logos, and service marks displayed on this document are registered in theUnited States [or other countries]. Any misuse of the trademarks is strictly prohibited and TycoInternational Ltd. will aggressively enforce its intellectual property rights to the fullest extent ofthe law, including pursuit of criminal prosecution wherever necessary. All trademarks notowned by Tyco International Ltd. are the property of their respective owners, and are used withpermission or allowed under applicable laws.

Product offerings and specifications are subject to change without notice. Actual products mayvary from photos. Not all products include all features. Availability varies by region; contactyour sales representative.

Software version: 2.0Document Number: UM-228Revision Number: CORelease Date: January 2011

This manual is proprietary information of Software House. Unauthorized reproduction of anyportion of this manual is prohibited. The material in this manual is for information purposesonly. It is subject to change without notice. Software House assumes no responsibility forincorrect information this manual may contain.

Copyright © 2011 by Tyco International Ltd. and its respective companies.

All Rights Reserved.

Page 3: 9000-Areas-Zones.pdf

Table of Contents

Preface 9How to Use this Manual 10Chapter 1: iSTAR Cluster Areas 10Chapter 1: iSTAR Intrusion Zones 10Chapter 1: Keypad Commands 10

Finding More Information 11Manuals 11Online Help 11Windows Help 11

Conventions 12

Chapter 1 - iSTAR Cluster Areas 13Overview 14Setting Up Areas 17Antipassback 19No Antipassback 19Regular Antipassback 19Timed Antipassback 20Configuring Antipassback 20Antipassback Grace 21Antipassback Decision Making 22

Occupancy Restrictions 24Tracking the Location of Personnel 25Area User Count 25

iSTAR Cluster Area Configuration Steps 27Basic iSTAR Cluster Area Tasks 31Accessing the iSTAR Cluster Area Editor 32Creating an iSTAR Cluster Area 32Creating an iSTAR Cluster Area Template 33Configuring an iSTAR Cluster Area 34Viewing a List of iSTAR Cluster Areas 36

C•CURE 9000 Areas and Zones Guide 3

Page 4: 9000-Areas-Zones.pdf

Viewing Personnel in Area 40Viewing Personnel Groups Associated with Area 41Viewing the Status of an iSTAR Cluster Area 42Viewing Area Status on the Dynamic View 42Viewing Occupancy Mode Causes for an Area 44Modifying an iSTAR Cluster Area 45Deleting an iSTAR Cluster Area 46Setting a Property for an iSTAR Cluster Area 46Adding an iSTAR Cluster Area to a Group 47

iSTAR Cluster Area Editor 48iSTAR Cluster Area General Tab 48General Tab Tasks 49iSTAR Cluster Area Editor Definitions 50iSTAR Cluster Area General Tab Definitions 50Configuring iSTAR Cluster Area Doors, Readers, and Adjacent Areas 52Deleting iSTAR Cluster Area Doors, Readers, and Adjacent Areas 55iSTAR Cluster Area Antipassback Tab 55Antipassback Tab Tasks 56iSTAR Cluster Area Antipassback Tab Definitions 56Configuring Regular Antipassback for iSTAR Cluster Areas 58Configuring Timed Antipassback for iSTAR Cluster Areas 58iSTAR Cluster Area Occupancy Tab 59Occupancy Tab Tasks 60iSTAR Cluster Area Occupancy Tab Definitions 60How Area Occupancy Configuration Affects Occupancy Mode 63Rules for Area Occupancy Access 64Configuring Area Occupancy Restrictions for All Personnel 66Configuring Area Occupancy Restrictions for Personnel Groups 67Deleting a Personnel Group from an iSTAR Cluster Area 69iSTAR Cluster Area Triggers Tab 69Triggers Tab Tasks 70How to Use the Triggers Tab 70iSTAR Cluster Area Triggers Tab Definitions 70Configuring Triggers for iSTAR Cluster Areas 72Deleting a Trigger from an iSTAR Cluster Area 76iSTAR Cluster Area Groups Tab 76iSTAR Cluster Area Groups Tab Definitions 77iSTAR Cluster Area Status Tab 78Viewing Area Status on the Status Tab 79iSTAR Cluster Area State Images Tab 80State Images Tab Tasks 81

4 C•CURE 9000 Areas and Zones Guide

Page 5: 9000-Areas-Zones.pdf

Configuring Antipassback Communications Failure Mode for a Cluster 82Configuring Personnel Antipassback Options 85Configuring Event Actions to Reset the Occupancy Mode 87Setting System Variables That Affect Areas 91Viewing Area Location of Personnel 92Viewing Area Information on the Door Editor 95Running Roll Call Reports 97Running Roll Call Reports from the Administration Report Dynamic View 97Running Roll Call Reports from the Monitoring Station Report Status List 100Using an Event to Run a Roll Call Report 101

Gracing Personnel 102Viewing Area Status with Map Icons 109

Chapter 2 - iSTAR Intrusion Zones 113Introduction 114iSTAR Intrusion Zone Modes and States 115Armed 115Disarmed 116Violated 116Ready to Arm/Not Ready to Arm 117

Controlling Intrusion Zone Mode 119Card Control 120Event Control 122Direct Action at the Monitoring Station 125Inputs 125Intrusion Zone Status Triggers 129Doors 131

iSTAR Intrusion Zone Configuration Steps 136Basic Intrusion Zone Tasks 139Accessing the iSTAR Intrusion Zone Editor 139Creating an iSTAR Intrusion Zone 140Creating an iSTAR Intrusion Zone Template 140Configuring an iSTAR Intrusion Zone 141Viewing a List of iSTAR Intrusion Zones 142Viewing Doors/Inputs for an Intrusion Zone 146Viewing the Status of an iSTAR Intrusion Zone 148Viewing Intrusion Zone Status on the Dynamic View 149Modifying an iSTAR Intrusion Zone 150Deleting an iSTAR Intrusion Zone 151Setting a Property for an iSTAR Intrusion Zone 151Adding an iSTAR Intrusion Zone to a Group 152

C•CURE 9000 Areas and Zones Guide 5

Page 6: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone Editor 153iSTAR Intrusion Zone General Tab 154iSTAR Intrusion Zone Editor Definitions 155iSTAR Intrusion Zone General Tab Definitions 155Configuring iSTAR Intrusion Zone Entrance/Exit Doors 158Deleting iSTAR Intrusion Zone Entrance/Exit Doors 160

iSTAR Intrusion Zone Inputs Tab 162iSTAR Intrusion Zone Inputs Tab Definitions 163Configuring iSTAR Intrusion Zone Controlled/Protected Inputs 165Configuring Display Names for iSTAR Intrusion Zone Monitored Inputs 167Deleting iSTAR Intrusion Zone Controlled/Protected Inputs 168

iSTAR Intrusion Zone Arm - Disarm Tab 169iSTAR Intrusion Zone Arm - Disarm Tab Definitions 170Configuring Arming for an iSTAR Intrusion Zone 173Configuring Disarming for an iSTAR Intrusion Zone 175

iSTAR Intrusion Zone Triggers Tab 178iSTAR Intrusion Zone Triggers Tab Definitions 179Configuring Triggers for iSTAR Intrusion Zones 180Deleting a Trigger from an iSTAR Intrusion Zone 184

iSTAR Intrusion Zone Groups Tab 185iSTAR Intrusion Zone Groups Tab Definitions 185

iSTAR Intrusion Zone Status Tab 187Viewing Intrusion Zone Status on the Status Tab 187

iSTAR Intrusion Zone State Images Tab 189State Images Tab Tasks 190Configuring a Person to Arm/Disarm Intrusion Zones 191Viewing Intrusion Zone Information on the Door Editor 193Viewing Intrusion Zone Information on the Input Editor 195

Chapter 3 - Keypad Commands 197Overview 198Examples of Keypad Command Use 200How Keypad Commands Work 200

Keypad Command Configuration Steps 203Permissions Required to Configure Keypad Commands 204

Keypad Command Configuration Requirements 206Keypad Command Format 207Format Requirements 207Example Formats 208Defining Keypad Command Formats 210System Variable iSTAR Variables Tab Definitions 212

6 C•CURE 9000 Areas and Zones Guide

Page 7: 9000-Areas-Zones.pdf

Keypad Command Editor 214Accessing the Keypad Command Editor 214

Keypad Command General Tab 216Keypad Command General Tab Definitions 217

Keypad Command Permissions Tab 219Keypad Command Permissions Tab Definitions 219

Keypad Command Groups Tab 221Keypad Command Groups Tab Definitions 221

Keypad Command Tasks 223Creating a Keypad Command 223Creating a Keypad Command Template 224Configuring a Keypad Command 225Viewing a List of Keypad Commands 228Modifying a Keypad Command 231Deleting a Keypad Command 231Setting a Property for a Keypad Command 232Adding a Keypad Command to a Group 232

Configuring Readers for Keypad Commands 234Configuring a Person to Use Keypad Commands 236Enabling/Disabling Keypad Commands at Readers 238

Index 243

C•CURE 9000 Areas and Zones Guide 7

Page 8: 9000-Areas-Zones.pdf

8 C•CURE 9000 Areas and Zones Guide

Page 9: 9000-Areas-Zones.pdf

Preface

This C•CURE 9000 Areas and Zones Guide is for new and experienced security system users. Themanual describes the software features on theC•CURE 9000 Administration Client Areas and Zones menu and presents procedures forconfiguring and using them.

You should have read the installation procedures described in theC•CURE 9000 Installation and Upgrade Guide and familiarized yourself with the basic C•CURE 9000information provided in the C•CURE 9000 Getting Started Guide.

In this preface

• How to Use this Manual 10• Finding More Information 11• Conventions 12

C•CURE 9000 Areas and Zones Guide Preface 9

Page 10: 9000-Areas-Zones.pdf

How to Use thisManual

How to Use this ManualThis manual includes the following sections. Turn to the appropriate section for the information youneed.

Chapter 1: iSTAR Cluster Areas

This chapter describes how to configure iSTAR Clusters Areas, physical regions regulated byC•CURE 9000, and how to use them to control and monitor access in your facility. Areas are used tocontrol Antipassback— Regular and Timed—and with Occupancy Restrictions and also provide thecapability to track Personnel.

Chapter 2: iSTAR Intrusion Zones

This chapter describes how to configure iSTAR Intrusion Zones, physical areas delineated by Doorsand Inputs and monitored for alarms, and how to use them in C•CURE 9000 to monitor security inyour facility.

Chapter 3: Keypad Commands

This chapter describes how to configure and use Keypad Commands that can activate Panel Events.

10 Preface C•CURE 9000 Areas and Zones Guide

Page 11: 9000-Areas-Zones.pdf

FindingMore Information

Finding More InformationYou can access C•CURE 9000 manuals and online Help for more information about C•CURE 9000.

Manuals

C•CURE 9000 software manuals and Software House hardware manuals are available in AdobePDF format on the C•CURE 9000 DVD.

You can access the manuals if you copy the appropriate PDF files from the C•CURE 9000Installation DVD English\Manuals folder and install the Adobe Acrobat reader. Adobe AcrobatReader can be installed from the C•CURE 9000 Installation DVD English\Reader folder.

The available C•CURE 9000 and Software House manuals are listed in the C•CURE 9000 GettingStarted Guide “Product Guides and Help” section, and appear as hyperlinks in the online.pdf file onthe C•CURE 9000 DVD English\Manuals folder.

These manuals are also available from the Software House Member Center website(http://membercenter.swhouse.com/home/default.aspx).

Online Help

You can access C•CURE 9000 Help by pressing F1 or clicking Help from the menu bar in theAdministration/Monitoring Station applications.

Windows Help

You can get help for the Windows products by selecting Help from the specific Windows Start menuor by going to the Microsoft web site at www.microsoft.com.

C•CURE 9000 Areas and Zones Guide Preface 11

Page 12: 9000-Areas-Zones.pdf

Conventions

ConventionsThis manual uses the following text formats and symbols.

Convention Meaning

Bold This font indicates screen elements, and also indicateswhen you should take a direct action in aprocedure.

Bold font describesone of the following items:

• A command or character to type, or

• A button or option on the screen to press, or

• A keyon your keyboard to press

• A screen element or name

Regular italic font Indicatesa new term.

<text> Indicatesa variable.

The following items are used to indicate important information.

NOTE Indicates a note. Notes call attention to any item of information that may be of specialimportance.

TIP Indicates an alternate method of performing a task.

Indicates a caution. A caution contains information essential to avoiddamage to the system. A caution can pertain to hardware or software.

Indicates a warning. A warning contains information that advises usersthat failure to avoid a specific action could result in physical harm to theuser or to the hardware.

Indicates a danger. A danger contains information that users must knowto avoid death or serious injury.

12 Preface C•CURE 9000 Areas and Zones Guide

Page 13: 9000-Areas-Zones.pdf

1

Chapter 1 - iSTAR Cluster Areas

This chapter explains how Areas can be used to control and monitor access to physical regionsregulated by C•CURE 9000. Areas are used with Antipassback (APB)—both Regular and Timed—and with Occupancy Restrictions and also provide the capability to track Personnel.

In this chapter

• Overview 14• Setting Up Areas 17• Antipassback 19• Occupancy Restrictions 24• Tracking the Location of Personnel 25• iSTAR Cluster Area Configuration Steps 27• Basic iSTAR Cluster Area Tasks 31• iSTAR Cluster Area Editor 48• Configuring Antipassback Communications Failure Mode for a Cluster 82• Configuring Personnel Antipassback Options 85• Configuring Event Actions to Reset the Occupancy Mode 87• Setting System Variables That Affect Areas 91• Viewing Area Location of Personnel 92• Viewing Area Information on the Door Editor 95• Running Roll Call Reports 97• Gracing Personnel 102• Viewing Area Status with Map Icons 109

C•CURE 9000 Areas and Zones Guide Chapter 1 13

Page 14: 9000-Areas-Zones.pdf

Overview

OverviewAn Area represents a physical region—such as a room, a specific section of a building, or an entirebuilding. Areas are used to control and monitor access to the regions they represent. Maximumcontrol of Areas imposes restrictions on customers that may be impractical, so C•CURE 9000provides features that allow trade-offs between ‘correctness’ and ‘convenience’.

• Control is defined as actually preventing access based on location information.

Examples:

A customer might wish to prevent card holders from using their badges and then passingthem to friends so that they can gain entry. To prevent this, the customer can configure Areaswith antipassback. In such a configuration, the card holders are admitted, but when thefriends present the cards, they are rejected.

Another customer might want to make sure that a particular Area in the building wasaccessible to only a certain number of people at one time. To that end, the customer couldconfigure Areas with a Maximum Occupancy Restriction. In this type of configuration, whenthe maximum number of personnel defined for the Area is reached, no one else can enter—until some personnel leave.

• Monitoring is defined as knowing how many people are in a given area as well as who they are,or which area a given person is in, without actually controlling access to that area.

While Control and monitoring represent different functionality, they can also be used together.

There are various reasons for using Areas, including security, safety, and resource management.

• Security – The customer’s primary concern is to prevent legitimate card holders from enteringAreas in an incorrect sequence, to prevent non-card holders from using someone else’s card, orto prevent more than a specified number of cardholders from congregating in an area at thesame time.

• Safety – The customer’s primary concern is the safety of employees. Consequently, they want toknow where employees are at all times.

Example:

The customer might create an evacuation location at the facility where, in an emergency,employees have to present their cards. This location would be monitored, but not controlled.

On the other hand, access within the facility would be controlled with antipassback—not toprevent cardholders from going wherever they needed, but so the system knows whenemployees are inside the facility and therefore in possible danger during an emergency.

14 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 15: 9000-Areas-Zones.pdf

Overview

• Resource management – The customer’s primary concern is to limit use of a specific facility sothat it is appropriately available.

Examples:

The customer might have a parking lot which they do not want employees to let their friendsuse—by parking their own cars and then handing their cards to friends. In this case, thecustomer just wants to make sure that there is enough room for the vehicles of the otheremployees.

The customer might have a high-security laboratory which operates optimally with fourpersonnel present. In this case, the customer could configure that Area with MinimumOccupancy (also known as N-man Rule) specifying the number of personnel who must enterthe lab at the same time to gain access, and who also must remain in the Area.

Strict area control and monitoring impose certain restrictions on the customer.

In general, most doors in a facility have a reader on one side and a request-to-exit (RTE), using amotion detector, on the other side. Card holders must present their card to enter, but to exit they justwalk up to the door and open it.

Antipassback, however, requires both entry and exit readers because the system must see that acardholder has left an area before it can let them back in again.

• Having exit readers means that going out through the door is now slower.

• Personnel might be lining up to go to lunch, where previously they just walked right out.

• Personnel also have to learn to interact with the system in a new way: to pay attention andpresent their cards when exiting, even if their friends hold the door open for them. Otherwise,their next access attempts are denied, requiring them to find a system administrator to ‘grace’them.

• Installing Exit readers also doubles the cost of readers in a new facility and could incur buildingcosts in a retro-fit situation.

• Finally, in systems large enough to spread areas across more than one controller, accessdecisions may require these controllers to exchange messages over the network. Then if thenetwork is slow or unavailable, ‘correct’ decisions may be impossible to make in a timelyfashion. (The controller can guess, but sometimes it will be wrong.)

The preceding issues mean that customers may wish to make trade-offs between correctness andconvenience. The following features allow them to do so:

• Timed antipassback

C•CURE 9000 Areas and Zones Guide Chapter 1 15

Page 16: 9000-Areas-Zones.pdf

Overview

• Non-antipassback areas

• “Local access” failure mode

• Monitoring of card holder location

• Occupancy that counts Personnel numbers without restricting access

16 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 17: 9000-Areas-Zones.pdf

Setting Up Areas

Setting Up AreasAreas are defined by a set of Doors, Readers, and the Adjacent Areas to which these lead. Doorsbetween Areas require at least one Reader. In some configurations, such as for Anti-passback controlof the location of Personnel, an entrance Reader and an exit Reader are required. C•CURE 9000 usesAreas to regulate Antipassback control and Occupancy Restrictions.

When high security and reliable tracking of Personnel is required, Areas can be configured to requirepeople to use their badges to both enter and exit an Area. This provides a record of when a personleaves an Area, allowing the system to track the location of a person at any time. C•CURE 9000 usesthis information to produce Roll Call Reports and Antipassback notifications.

on Page 17 presents a simple example of two Areas with Doors and Readers controlling entry andexit.

Figure 1: Areasand Doorswith Entry and Exit Readers

Each iSTAR Cluster can have its own set of Areas, but antipassback does not function acrossClusters. Antipassback for iSTAR Cluster Areas means that all Doors, Readers, and adjacent Areasare within the same iSTAR Cluster. The host does not participate in Area access decisions so thesecontinue to function even if host communication is lost.

When there is a communications failure within the Cluster–between the master Controller and oneor more member Controllers, decisions are made according to the failure mode you configure for theCluster. For more detailed information, see How Cluster Antipassback Works DuringCommunications Failure on Page 22

C•CURE 9000 Areas and Zones Guide Chapter 1 17

Page 18: 9000-Areas-Zones.pdf

Setting Up Areas

You can configure Areas to control and/or monitor access in the following ways or in combinationsthereof:

• With no limitation – a person with appropriate clearances can freely enter and exit from anArea.

• Using Antipassback where access is restricted as follows:

• Regular antipassback – Personnel cannot exit an Area they are not in, nor re-enter an Areawithout exiting it first.

• Timed antipassback – Personnel cannot re-enter an Area until a specified amount of time haspassed.

• Using Maximum or Minimum Occupancy where access is restricted as follows:

• Personnel cannot access an Area:

– If the number already in the Area exceeds the maximum number defined.

– If they are not accompanied by the minimum number of personnel required to be in theArea at the same time.

• Personnel can access an Area regardless of the Maximum and Minimum Occupancyconfigured, but their number is counted.

You can monitor access and track a person’s location in the following ways:

• By running Roll call reports, which indicate the current location, by Area, for all Personnel at thetime the report is generated. For information, see Running Roll Call Reports on Page 97.

• Displaying their current Area on the Administration application Personnel Dynamic View(based on the last Area the person entered on a valid admit). For information, see Viewing AreaLocation of Personnel on Page 92.

• Displaying for any selected Area the Personnel in that Area from both the Administrationapplication Area Dynamic View and the Monitoring Station Area Status List. For information,see Viewing Personnel in Area on Page 40 and the C•CURE 9000 Monitoring Station Guide.

18 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 19: 9000-Areas-Zones.pdf

Antipassback

AntipassbackAntipassback (sometimes known as APB) prevents a person from passing back a card to anotherperson to use, and detects when someone tailgates (follows another person with a valid card admitthrough a door without using their own card).

You can configure the following types of antipassback:

• No Antipassback on Page 19

• Regular Antipassback on Page 19

• Timed Antipassback on Page 20

No Antipassback

You can configure an Area without antipassback and use it to:

• Designate boundaries.

• Interface with Areas of the antipassback system.

• Monitor access.

• Create Roll Call Reports

Example:

The front Door of a building typically leads from a non-antipassback Area to a controlledantipassback Area. The non-antipassback Area can be either a physical space or a ‘conceptual’area, such as ‘outside’.

Regular Antipassback

You can use a regular antipassback Area when you need to control the movements of personnelbased on their location. Configuring regular antipassback prevents a person from exiting an Areathat, according to the system, he/she is not in or from entering an Area that, according to the system,he/she is already in.

• A passback violation occurs when a person enters an Area and then passes the card to anotherperson who uses it to enter the same Area.

C•CURE 9000 Areas and Zones Guide Chapter 1 19

Page 20: 9000-Areas-Zones.pdf

Antipassback

• A tailgate violation occurs when a person tries to leave an Area that, according to the Controllermaking the decision, he/she is not in. This can occur if the person entered the Area by“tailgating” and then uses his/her card to exit the Area.

You can only enforce antipassback if you have both entry and exit Readers in an Area.

Timed Antipassback

You can use timed antipassback when you are not tracking all exits from an Area.

• A timed antipassback violation occurs when a person tries to access the same Area more thanonce during a specified period of time.

Example:

If a person enters an Area and then passes his/her card to some one else to use to enter thesame Area, a timed antipassback violation occurs.

Enforcing timed antipassback does not require exit Readers in an Area, only entry Readers.

Configuring Antipassback

To configure antipassback, you must configure at least two Areas that are controlled by Readers inthe same iSTAR Cluster.

You can use the Area Antipassback tab to set up Regular and Timed Antipassback.

l Configuring Regular Antipassback for iSTAR Cluster Areas on Page 58

l Configuring Timed Antipassback for iSTAR Cluster Areas on Page 58

Antipassback Events

You can configure triggers to activate Events for antipassback entry and exit violations for an Area.

• Entry events are pulsed on any violation that occurs on a Reader that leads into the Area.

• Exit events are pulsed on any violation on a Reader that leads out of the Area.

The specific cause of the violation does not affect which event is pulsed.

20 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 21: 9000-Areas-Zones.pdf

Antipassback

For information, see iSTAR Cluster Area Triggers Tab on Page 69. For detailed information onconfiguring Events, see the Events chapter in the C•CURE 9000 Software Configuration Guide.

Antipassback Exempt Personnel

If you select the Antipassback Exempt option while configuring a Personnel record, the systemallows the person to access Areas without being tested for antipassback. However, even if a personis configured as antipassback exempt, you can also choose to configure the Activate AntipassbackEvent option for him/her. In this case, while the person will gain access to the Area, he/she willalso trigger any antipassback violation Events configured.

Antipassback Grace

When you grace Personnel, it resets their cards’ antipassback information. Consequently, on theirnext access they are not checked for antipassback violation. You can grace card(s) from both theAdministration application and the Monitoring Station.

The first time Personnel use their cards after a grace action, the system does not check forantipassback violations. Once they present their cards and open the door, the system logs them intothe Area. After this move, for all subsequent use of their cards, the system returns to checking forantipassback violations. (Grace is not actually cleared until the person opens the door.)

The different types of grace are described in the following subsections. (For instructions on grantinggrace, see Gracing Personnel on Page 102.)

Person Grace

‘Person grace’ clears the antipassback and timed antipassback information for single Personnel fromthe following:

• On the Administration application Personnel Dynamic View – for one or more selected persons.

• On the Monitoring Station in several places:

• Swipe & Show tab – for a single card.

• On the Personnel in Area list – for one or more selected persons.

C•CURE 9000 Areas and Zones Guide Chapter 1 21

Page 22: 9000-Areas-Zones.pdf

Antipassback

Grace All

‘Grace All’ clears the antipassback and timed antipassback information for all cards in the system(in an unpartitioned system, when all Objects are in the only partition, the “Default” Partition) or inone or more Partition(s) from the following:

• On the Administration application

• From the Partition Dynamic View – for one or more selected Partitions.

• By configuring an Event with a Grace All Action.

• On the Monitoring Station Swipe & Show Grace Partition tab – as follows:

• If the system is not partitioned, gracing the Default Partition graces all cards in the database.

• If the system is partitioned, you can select the Partition(s) for which you want to grace allcards.

Antipassback Decision Making

How the Cluster Antipassback Decision is Made

In iSTAR Clusters, antipassback information is stored on the Cluster master. When an iSTARmember Controller is online and a card is presented at its reader:

• The member sends a request to the master for antipassback information.

• The master replies with the appropriate antipassback information (admit or deny).

• The member reports back to the Master whether or not the door was used.

As long as the communication within the Cluster is good, the Cluster members do not store anyantipassback information.

How Cluster Antipassback Works During Communications Failure

When the Cluster members lose communication with the Cluster master, the members begin toenforce antipassback locally according to the Communication Failure Mode configured for theCluster. If the failure mode is:

22 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 23: 9000-Areas-Zones.pdf

Antipassback

• No Access – Access is denied by any member Controller in the Cluster in communicationsfailure, while member Controllers still in communications with the Master continue to makenormal antipassback decisions for entry to the Area.

• Local – The Controllers use locally available information to grant or deny access. Thisinformation may be insufficient for the Controller to make a completely correct decision. In thiscase, the Controller still admits the person presenting the card.

Restoring Communication

When communications from member to master is restored, the member waits 16 sec*[size of cluster+ 1] before uploading Personnel locations to the master. The master then compares the time recordedin the member with the time recorded on the master, retaining the person’s latest recorded location.Once this upload is complete, the member deletes the locally stored antipassback data and resumesrequesting this information from the master per the normal operation.

C•CURE 9000 Areas and Zones Guide Chapter 1 23

Page 24: 9000-Areas-Zones.pdf

OccupancyRestrictions

Occupancy RestrictionsYou can limit access to an Area based on the maximum and minimum number of personnel presentat one time. You can also specify the number of personnel from a group allowed in an Area.

This feature is supported only for iSTAR Cluster Areas, and therefore for iSTAR controllers. Thedoors of an Occupancy-restricted Area can be on multiple iSTARs as long as all are in the samecluster.

NOTE The Occupancy restriction is not supported across iSTAR Clusters.

Maximum occupancy specifies the maximum number of personnel, or personnel from a group, whocan access an Area at one time. If at any time the number of personnel in an Area reaches themaximum number and access is restricted, all further access is denied—until personnel leave thearea. You can also configure an Event to trigger when an Area reaches its maximum occupancy. Acommon use of this feature is in parking lots where only a given number of personnel, or personnelfrom a group, can park in an Area.

In addition, you can configure maximum occupancy to only count the number of personnel enteringand leaving an Area without restricting access.

Minimum occupancy(or N-man Rule) specifies that a minimum number of personnel must enter theArea at the same time to gain access and must also remain in the specified Area. You can alsoconfigure an Event to trigger when an Area reaches its minimum occupancy.

In addition, you can configure minimum occupancy to only count the number of personnel enteringand leaving an Area without restricting access.

24 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 25: 9000-Areas-Zones.pdf

Tracking the Location of Personnel

Tracking the Location of PersonnelThe C•CURE 9000 host maintains a current Area for each Personnel record, as well as the time atwhich the area was entered.

The current Area represents the last known Area the person entered, based on a valid admit: therewas a card swipe granting access, and the door was opened after the access was granted. If the dooris not opened after a valid admit or access is denied, a person’s current Area is not updated.

The iSTAR Cluster Areas feature allows you to track the current location of Personnel in severaldifferent ways:

• Displaying their current Area on the Administration application Personnel Dynamic View. Forinformation, see Viewing Area Location of Personnel on Page 92

• Displaying the Personnel for a selected Area from the following:

• Administration application Area Dynamic View.

• Monitoring Station Area Status List.

• Administration application/Monitoring Station Area icon on Map.

For information, see Viewing Personnel in Area on Page 40 and the C•CURE 9000 MonitoringStation Guide.

• Running a Roll Call Report to generate of list of Personnel by Area(s) or Area group(s) as follows:

• From the Administration application Report Dynamic View.

• From the Monitoring Station Report Status List.

• By configuring an Event whose Action initiates the Report.

For information, see Running Roll Call Reports on Page 97, the C•CURE 9000 Monitoring StationGuide, and the Event chapter in the C•CURE 9000 Software Configuration Guide.

Area User Count

The host also maintains a user count for each Area that you can display on either of the following:

• Administration application Area Dynamic View.

• Monitoring Station Area Status List.

C•CURE 9000 Areas and Zones Guide Chapter 1 25

Page 26: 9000-Areas-Zones.pdf

Tracking the Location of Personnel

Because the count of Personnel in an Area can become incorrect due to tailgating, communicationfailure, or restarting the master controller, the User Count Status can be reset to the correct value byan Operator through a property set. (These manual modifications of the Area user count are audited,unlike the system updates that are not.)

For information, see Viewing a List of iSTAR Cluster Areas on Page 36 and Setting a Property for aniSTAR Cluster Area on Page 46.

26 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 27: 9000-Areas-Zones.pdf

iSTAR Cluster Area Configuration Steps

iSTAR Cluster Area Configuration StepsCreating iSTAR Cluster Areas on Page 27 shows the C•CURE 9000 Editors and activities that createiSTAR Cluster Areas. This table assumes that you have already configured the iSTAR Cluster andControllers, Doors, and Readers.

Task C•CURE 9000 Editor ConfigurationNotes

Additional Information

Configure a first basic iSTAR ClusterArea

Areasand Zones>iSTARClusterArea>New>iSTARCluster Area Editor andGeneral tab

Createsan Area andselects a Cluster for it,without assigningDoors.

See Configuring an iSTARCluster Area on Page 34 andiSTAR Cluster Area Editor onPage 48

Configure the AreaDoors/Readers/Adjacent Areas

Areasand Zones>iSTARClusterArea>New>iSTARCluster AreaEditor>General tab

Specifies

• Access In

- Doors

- Readers

- Adjacent Areas

• AccessOut (IfAccess In Door hastwo Readers)

- Doors

- Readers

- Adjacent Areas

See iSTAR Cluster AreaGeneral Tab on Page 48.

Configure Area Antipassback Areasand Zones>iSTARClusterArea>New>iSTARCluster AreaEditor>Antipassback tab

Specifies

• AntipassbackType:none/regular/timed

• For timed APB:options

See iSTAR Cluster AreaAntipassbackTab on Page 55.

Table 1: Creating iSTAR Cluster Areas

C•CURE 9000 Areas and Zones Guide Chapter 1 27

Page 28: 9000-Areas-Zones.pdf

iSTAR Cluster Area Configuration Steps

Task C•CURE 9000 Editor ConfigurationNotes

Additional Information

Configure AreaOccupancyRules Areasand Zones>iSTARClusterArea>New>iSTARCluster AreaEditor>Occupancy tab

Specifies

• OccupancyRestrictions for allPersonnel

- Max/Min:none/allowaccess/restrictaccess

- Max/Min Limits

• OccupancyRestrictions forPersonnelGroups:

- Max/Min

- Options

NOTE: Occupancyconfigurationchoicesalso setdefaultOccupancyMode for theArea.

See iSTAR Cluster AreaOccupancyTab on Page 59.

See iSTAR Cluster AreaStatusTab on Page 78 andConfiguring Event Actions toReset the OccupancyModeon Page 87

Configure Area Triggers Areasand Zones>iSTARClusterArea>New>iSTARCluster AreaEditor>Triggers tab

SpecifiesEvent Actionsto be activated forvariousArea violationsandOccupancystatuses.

See iSTAR Cluster AreaTriggersTab on Page 69.

Change Area State Images Areasand Zones>iSTARClusterArea>New>iSTARCluster AreaEditor>State Images tab

Modify Images thatindicate Area statesontheMonitoring Stationand onMaps.

See iSTAR Cluster Area StateImagesTab on Page 80 andState ImagesTab TasksonPage 81.

28 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 29: 9000-Areas-Zones.pdf

iSTAR Cluster Area Configuration Steps

Task C•CURE 9000 Editor ConfigurationNotes

Additional Information

Configure APBCommFailMode forCluster

Edit the Area’s iSTARCluster:

Hardware>HardwareTree>iSTARCluster>iSTAR ClusterEditor>Area Tab

SpecifiesAPBdecision-makingmode forArea’s iSTAR Clusterduring communicationsfailure:

• No Accessor Local

See Configuring AntipassbackCommunicationsFailureMode for a Cluster on Page82.

Configure PersonnelAPBOptions Personnel>Personnel>New>PersonnelEditor

- or -

Edit an existingPersonnelRecord

Specifies that a person:

• Is exempt fromAPB rules.

- and/or -

• ActivatesAPBEvents.

See Configuring PersonnelAntipassbackOptionson Page85

C•CURE 9000 Areas and Zones Guide Chapter 1 29

Page 30: 9000-Areas-Zones.pdf

iSTAR Cluster Area Configuration Steps

Task C•CURE 9000 Editor ConfigurationNotes

Additional Information

ModifySystemVariable Settings

• For APB

(Change these valuesonly inconsultation with SoftwareHouse Customer SupportCenter. Incorrect settings cancause APB comm fail.)

• For Occupancy

• Options&Tools>SystemVariables>iSTARDriver>

- iSTAR APBmaxping round trip

- iSTAR APBpinginterval

- iSTAR APBresponse timeout

• Options&Tools>SystemVariables>iSTARDriver>

- AlwaysTrackPersonnel

- MinimumOccupancyExitOption

• Options&Tools>SystemVariables>HardwareDriver>

- Next Card Time

• Variables that fine-tune iSTARController behaviorfor APBfunctionality.

• Variables thataffect Controllerbehavior forOccupancyfunctionality.

See “iSTAR Driver Settings” inthe SystemVariables chapterin theC•CURE9000 SystemMaintenanceGuide.

See Setting SystemVariablesThat Affect Areason Page 91.

30 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 31: 9000-Areas-Zones.pdf

Basic iSTAR Cluster Area Tasks

Basic iSTAR Cluster Area TasksThe C•CURE 9000 iSTAR Cluster Area Editor allow you to accomplish the following tasks:

• Creating an iSTAR Cluster Area on Page 32

• Creating an iSTAR Cluster Area Template on Page 33

• Configuring an iSTAR Cluster Area on Page 34

• Viewing a List of iSTAR Cluster Areas on Page 36

• Viewing Personnel in Area on Page 40

• Viewing Personnel Groups Associated with Area on Page 41

• Viewing the Status of an iSTAR Cluster Area on Page 42

• Viewing Occupancy Mode Causes for an Area on Page 44

• Modifying an iSTAR Cluster Area on Page 45

• Deleting an iSTAR Cluster Area on Page 46

• Setting a Property for an iSTAR Cluster Area on Page 46

• Adding an iSTAR Cluster Area to a Group on Page 47

The following tasks related to configuring and using iSTAR Cluster Areas are accomplished throughother C•CURE 9000 features:

• Configuring Antipassback Communications Failure Mode for a Cluster on Page 82

• Configuring Personnel Antipassback Options on Page 85

• Configuring Event Actions to Reset the Occupancy Mode on Page 87

• Setting System Variables That Affect Areas on Page 91

• Viewing Area Location of Personnel on Page 92

• Viewing Area Information on the Door Editor on Page 95

• Running Roll Call Reports on Page 97

• Gracing Personnel on Page 102

• Viewing Area Status with Map Icons on Page 109

C•CURE 9000 Areas and Zones Guide Chapter 1 31

Page 32: 9000-Areas-Zones.pdf

Basic iSTAR Cluster Area Tasks

Accessing the iSTAR Cluster Area Editor

You can access the iSTAR Cluster Area Editor from the C•CURE 9000 Areas and Zones pane.

To Access the iSTAR Cluster Area Editor

1. In the Navigation Pane of the Administration Workstation, click the Areas and Zones panebutton.

2. Click the Areas and Zones drop-down list and select iSTAR Cluster Area.

3. Click New to create a new Area.

- or -

Click to open a Dynamic View showing a list of all existing iSTAR Cluster Area Objects,right-click the iSTAR Cluster Area you want to change, and click Edit from the context menu thatappears.

The iSTAR Cluster Area Editor opens with the General tab displayed, as shown in Figure 6 onPage 49.

Creating an iSTAR Cluster Area

You can create a new iSTAR Cluster Area using the iSTAR Cluster Area Editor.

This procedure assumes that you have already configured the iSTAR Cluster and Controllers, Doors,and Readers.

To Create an iSTAR Cluster Area

1. In the Navigation Pane of the Administration Workstation, click the Areas and Zones panebutton.

2. Click the Areas and Zones drop-down list and select iSTAR Cluster Area.

3. Click New to create a new Area. The iSTAR Cluster Area Editor opens (see iSTAR Cluster AreaEditor General Tab on Page 49.

4. You can now configure the new Area.

5. To save your new Area, click Save and Close.

32 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 33: 9000-Areas-Zones.pdf

Basic iSTAR Cluster Area Tasks

- or -

Alternatively, if you want to save the Area and then create a new one, click Save and New. Thecurrent Area is saved and closed, but the iSTAR Cluster Area Editor remains open ready for anew Area.

Creating an iSTAR Cluster Area Template

You can create a new iSTAR Cluster Area Template using the iSTAR Cluster Area Editor. An iSTARCluster Area template saves you time because you do not have to re-enter the same Area informationagain.

To Create an iSTAR Cluster Area Template

1. In the Navigation Pane of the Administration Workstation, click the Areas and Zones panebutton.

2. Click the Areas and Zones drop-down list and select iSTAR Cluster Area.

3. Click the down-arrow on the New button, and click Template.

The iSTAR Cluster Area Editor where you can configure the Area template opens (see iSTARCluster Area General Tab on Page 48).

4. Configure the template to meet your requirements. Any fields that you configure with valuesbecome part of the template; then when you subsequently create a new Area from that template,these values are already filled in.

5. In the Name field, enter the name you wish to use for the template

Example:

iSTARAreaTemplate1

6. To save the template, click Save and Close.

The template will be available as an option on the pull-down menu on the New button in theAreas and Zones pane.

C•CURE 9000 Areas and Zones Guide Chapter 1 33

Page 34: 9000-Areas-Zones.pdf

Basic iSTAR Cluster Area Tasks

Configuring an iSTAR Cluster Area

This procedure assumes that you have already configured the iSTAR Cluster and Controllers, Doors,and Readers.

NOTE To aid in the configuration process, Software House suggests thatyou create a basic diagram showing all Doors, Readers, and Areasyou need to configure. Then as you perform the configuration of eachcomponent, mark the diagram so you know which components areconfigured and which remain to be configured. Figure 1 on Page 17is an example of an Area diagram.

The general sequence for creating and configuring an area is to first select the Cluster to control theArea and to then add a row to the Access In table and select a Door, Reader, and an adjacent Area.

Since each row entry for Door and Reader requires an adjacent Area, the first Area (Area1, forexample) must be saved without any assigned Doors. You can then configure an adjacent Area(Area2, for example) with Door, Reader, and the first Area you created (Area1) as the adjacent Area.

The easiest way to do the foregoing is to create the first Area, click Save and New, and then createthe additional Area(s) as described in the example procedure on Page 34.

Once you have saved Area2, it is automatically entered as the adjacent Area for Area1, and Area2’sAccess Out Door and Reader are also entered as the Access In Door and Reader for Area1.

To Configure iSTAR Cluster Areas

1. Create a new iSTAR Cluster Area.

2. Type a Name and Description for the iSTAR Cluster Area that sufficiently identifies this Areaand its purpose.

Example:

34 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 35: 9000-Areas-Zones.pdf

Basic iSTAR Cluster Area Tasks

iSTARArea1

3. Select an iSTAR Cluster for the Area on the General tab (shown in Figure 6 on Page 49).

4. To save your first ‘Doorless’ Area and then create an adjacent Area, click Save and New.

The current Area is saved and closed, and the iSTAR Cluster Area Editor remains open, readyfor a new Area.

5. Repeat Steps 1 and 2 on this page for the second Area.

Example:

iSTARArea2

6. On the General tab, select the same iSTAR Cluster selected in Step 3.

7. Use the General tab (shown in Figure 6 on Page 49) to configure the Access In table Doors andReaders for the Area and the adjacent Area. The Access Out table is populated automaticallybased on the Access In choices.

8. Use the Antipassback tab (shown in Figure 7 on Page 56) to configure the type of Antipassbackfor the Area and the related options.

9. Use the Occupancy tab (shown in Figure 8 on Page 59) to configure the types of Occupancy forthe Area and the related options.

10. Use the Triggers tab (shown in Figure 9 on Page 69) to configure triggers that can activate EventActions when the Area’s different Violation properties and Occupancy statuses have a certainvalue.

Examples:

APB Entry Violation or APB Exit Violation

At or Over Maximum or At or Under Minimum

11. Use the State Images tab (shown in Figure 12 on Page 80) to modify the Images that indicateArea states on the Monitoring Station for this Area.

12. To save Area2 as configured, click Save and Close.

13. Open iSTARArea1 in the iSTAR Cluster Area Editor to finish configuring it:

a. Select iSTAR Cluster Area from the Areas and Zones drop-down list and click to openthe Dynamic View list of the two iSTAR Cluster Areas.

b. Double-click iSTARArea1.

C•CURE 9000 Areas and Zones Guide Chapter 1 35

Page 36: 9000-Areas-Zones.pdf

Basic iSTAR Cluster Area Tasks

14. On the General tab, view the system-entered Doors, Readers, adjacent Area (Area2) in the AccessIn and Access Out table rows.

15. Configure Antipassback, Occupancy, and State Images, and Trigger options for iSTARArea1, asneeded.

16. Click Save and Close.

- or -

Alternatively, if you want to save this Area and then create another one, click Save and New.

Viewing a List of iSTAR Cluster Areas

You can display a list of the iSTAR Cluster Areas you have created by opening a Dynamic View ofiSTAR Cluster Areas.

To View a List of iSTAR Cluster Areas

1. In the Navigation Pane of the Administration Workstation, click Areas and Zones to open theAreas and Zones pane.

2. Select iSTAR Cluster Area from the Areas and Zones drop-down list.

3. Click to open a Dynamic View listing all iSTAR Cluster Area Objects, as shown in Figure 2on Page 36. (You can also click the down-arrow of this button to either view the list in thecurrent tabbed view or open a new tabbed view).

Figure 2: iSTAR Cluster Area List

• You can sort, filter, and group items in the list.

• You can right-click an iSTAR Cluster Area in the list to open the iSTAR Cluster Area Contextmenu and perform any of the functions on that menu. (See Viewing Personnel in Area onPage 40.)

36 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 37: 9000-Areas-Zones.pdf

Basic iSTAR Cluster Area Tasks

• You can right-click any column heading to open a context menu of all possible Area fieldsthat can display as columns and add/remove fields to view status information. (For moredetailed information, see Viewing Area Status on the Dynamic View on Page 42.)

For more information on using Dynamic Views, see the Dynamic Views chapter in the C•CURE9000 Data Views Guide.

iSTAR Cluster Area List Context Menu

The context menu that opens when you right-click an iSTAR Cluster Area in the iSTAR Cluster AreaDynamic View includes the selections described in Table 2 on Page 38.

C•CURE 9000 Areas and Zones Guide Chapter 1 37

Page 38: 9000-Areas-Zones.pdf

Basic iSTAR Cluster Area Tasks

Table 2: iSTAR Cluster Area List Context Menu

MenuSelection

Description

Edit Click thismenu selection to edit the selected iSTAR Cluster Area. The iSTAR Cluster Area Editor opens (withthe addition of aGroups tab, which displaysanyGroups that thisCluster Area belongs to). You can rename theiSTAR Cluster Area, change the description and anyother attributes, with the exception of the iSTAR Cluster towhich the Area is assigned.

Delete Click thismenu selection to delete the selected iSTAR Cluster Area. A prompt appears asking you to confirmthat you want to delete the iSTAR Cluster Area. ClickYes to delete the iSTAR Cluster Area or No to cancel thedeletion.

Setproperty

Click thismenu selection to change the value of the selected properties in the selected iSTAR Cluster Area(s).

A dialog boxappears asking you to select a property to change. Click to open a selection list and click theproperty you wish to change. You can then change the value of the following properties:

• Description – You can change the textual description of the iSTAR Cluster Area(s) by selecting thisproperty and typing in a new value.

• Enforce Timed APB Only – You can determine whether or not the iSTAR Cluster Area(s) is subject onlyto the timed antipassback rules—not to the regular antipassback rules—byselecting this property andselecting/clearing theValue checkbox.

• Personnel Count – You can reset the count of Personnel in the iSTAR Cluster Area(s) by selecting thisproperty and typing in a new value. (An Area’s count could have become incorrect due to tailgating or lossofHost-to-Controller communications.)

• Personnel Group Access Limited – You can determine whether or not the iSTAR Cluster Area(s) limitaccess to the Area only to Personnelwith Clearance belonging to anyGroups configured for the Area(s) byselecting this property and selecting/clearing theValue checkbox.

• Personnel Group Count Access – You can determine whether or not the iSTAR Cluster Area(s) allowPersonnelwith Clearance from anyGroups configured for the Area(s) to enter and exit the Area eventhough the numbersentered in theMaximum/Minimum fields have or have not been reached by selectingthis property and selecting/clearing theValue checkbox.

• Valid Exit Clears Timed APB – You can determine whether or not the iSTAR Cluster Area(s) allow aperson’s valid exit to clear the timed antipassback rules (permitting this person to immediately re-enter theArea) by selecting this property and selecting/clearing theValue checkbox.

Add toGroup

You can add one or more selected iSTAR Cluster Areas to a Group of iSTAR Cluster Areas.When you click thismenu choice, a dialog boxappears for you to select the Group to which to add the iSTAR Cluster Area(s).Whenyou click a Group of iSTAR Cluster Areas in the list, the selected iSTAR Cluster Area(s) are added to theGroup.

38 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 39: 9000-Areas-Zones.pdf

Basic iSTAR Cluster Area Tasks

MenuSelection

Description

Exportselection

Click thismenu selection to Open an Export...to XML or CSV file dialog box to export one or more of the selectediSTAR Cluster Area records to either an XML or a CSV file. This allowsyou to quickly and easily createXML/CSV reports on the selected data.

NOTE: Although XML is the initial default file type, once you choose a type in theSave as type field, whetherXML or CSV, that becomes the default the next time this dialog boxopens.

CSV-formatted exportscannot be imported. If you require importing functionality, export to XML.

• When you export to an XML file, all available data for the selected object(s), whether displayed in theDynamicView or not—aswell as all the child objects of the selected record(s), is exported.

• When you export to a CSV file, only data in the columnsdisplaying in the DynamicView is exported, and inthe order displayed. This allowsyou to both select and arrange data fields for your report. In addition,exporting to a CSV file allowsyou to view the exported data in an Excel spreadsheet and further manipulateit for your use.

For more information, see the DynamicViewschapter in theC•CURE9000 Data ViewsGuide.

NOTE:When you clickExport Selection, you are running the export on the client computer. Consequently, thesystem doesnot use the Default Export DirectoryPath—which is on the server. It opensa directory onthe client, reverting to the last directory used. You can navigate to the default export server directory, ifyou wish. Or to avoid confusion or use the same destination folder for both client and server computers,you can use UNC (UniversalNaming Convention) paths, for example: \\Computer Name\Program Files\Software House\SWHouse\SWHSystem\Export.

Find inAudit Log

Click thismenu selection to Open aQuery Parameters dialog box in which you can enter prompts and/or modifythe Query criteria to search for entries in the Audit Log that reference the selected iSTAR Cluster Area.Whenfound the results display in a separate DynamicView.

Find inJournal

Click thismenu selection to Open aQuery Parameters dialog box in which you can enter prompts and/or modifythe Query criteria to search for entries in the Journal that reference the selected iSTAR Cluster Area.Whenfound the results display in a separate DynamicView.

DisplayPersonnelin Area

Click thismenu selection to open thePersonnel in AreaDynamicView. This list includesall of the Personnelcurrently in the Area. Bydefault, the DynamicView shows the Person’s name and the Area Name. (See ViewingPersonnel in Area on Page 40.)

You can also right-click any column heading to view a list of other available Personnel fields that can displayascolumns. For more information, see the DynamicViewschapter in theC•CURE9000 Data ViewsGuide.

C•CURE 9000 Areas and Zones Guide Chapter 1 39

Page 40: 9000-Areas-Zones.pdf

Basic iSTAR Cluster Area Tasks

MenuSelection

Description

DisplayOccupancyPersonnelGroups

Click thismenu selection to open thePersonnel Groups for AreaDynamicView. This list includesall of thePersonnelGroups currently configured for the Area. Bydefault, the DynamicView shows the PersonnelGroupname, PersonnelCount, Maximum andMinimumOccupancyLimits, and Area Name. (See Viewing PersonnelGroupsAssociated with Area on Page 41.)

You can also use theSet Property option on the right-click context menu to reset the PersonnelCount for anArea PersonnelGroup.

For more information, see the DynamicViewschapter in theC•CURE9000 Data ViewsGuide.

Clear AreaCounts

Click thismenu selection to return the personnel count for all Areas, including in Area PersonnelGroups, to 0(zero).

ShowOccupancyModeCauses

Click thismenu selection to open anOccupancyModeCause List dialog box for the Area. (See ViewingOccupancyModeCauses for an Area on Page 44.)

Viewing Personnel in Area

You can select an existing iSTAR Cluster Area on the Dynamic View and display a list of thePersonnel currently in the Area

To View the Personnel in an Area

1. On the iSTAR Cluster Area Dynamic View, right-click an iSTAR Cluster Area in the list to openthe iSTAR Cluster Area Context menu (see iSTAR Cluster Area List Context Menu on Page 37).

2. Click Display Personnel in Area. A list such as that shown in the example in Figure 3 on Page41 displays.

40 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 41: 9000-Areas-Zones.pdf

Basic iSTAR Cluster Area Tasks

Figure 3: Personnel List for iSTAR Cluster Area

By default, the Dynamic View shows the Person’s name and the Area Name.

You can also right-click any column heading to view a list of other available Personnel fieldsthat can display as columns.

If new Personnel are granted access and enter the Area while this Dynamic View is open,

clicking updates the list.

For more information, see the Dynamic Views chapter in the C•CURE 9000 Data Views Guide.

Viewing Personnel Groups Associated with Area

You can select an existing iSTAR Cluster Area on the Dynamic View and display a list of thePersonnel Groups currently configured for the Area.

To View the Personnel Groups for an Area

1. On the iSTAR Cluster Area Dynamic View, right-click an iSTAR Cluster Area in the list to openthe iSTAR Cluster Area Context menu (see iSTAR Cluster Area List Context Menu on Page 37).

2. Click Display Personnel Groups for Area. A list such as that shown in Figure 4 on Page 42displays.

C•CURE 9000 Areas and Zones Guide Chapter 1 41

Page 42: 9000-Areas-Zones.pdf

Basic iSTAR Cluster Area Tasks

Figure 4: PersonnelGroup List for iSTAR Cluster Area

By default, the Dynamic View shows the Personnel Group’s name, the Personnel Count, theMaximum and Minimum Occupancy Limits, and the Area Name. You can also use the SetProperty option on the right-click context menu to reset the Personnel Count for an AreaPersonnel Group.

For more information, see the Dynamic Views chapter in the C•CURE 9000 Data Views Guide.

Viewing the Status of an iSTAR Cluster Area

You can view basic status information about an Cluster Area in three different places:

• Administration application

• Viewing Area Status on the Dynamic View on Page 42.

• Viewing Occupancy Mode Causes for an Area on Page 44

• Viewing Area Status on the Status Tab on Page 79.

• Monitoring Station: Explorer Bar>Non-Hardware Status> Areas>Status List - Area – see theMonitoring Status chapter in the C•CURE 9000 Monitoring Station Guide.

Viewing Area Status on the Dynamic View

This section briefly describes procedures for displaying Area status information on the iSTAR ClusterArea dynamic view. However, these changes are only in effect while you have the View open. Toactually change the View permanently, you need to configure the view and save your changes. Forinformation, see the Dynamic Views chapter in the C•CURE 9000 Data Views Guide.

To View Area Status Information

1. On the iSTAR Cluster Area Dynamic View, right-click any column heading.

42 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 43: 9000-Areas-Zones.pdf

Basic iSTAR Cluster Area Tasks

A context menu of all available Area fields that can display as columns appears.

Fields that are currently displayed in the view are marked with a .

2. To add fields as columns to view status information, click anywhere on that field in the list.

Example:

Group Maximum Occupancy Status/Group Minimum Occupancy Status/MaximumOccupancy Limit/Maximum Occupancy Restriction/Maximum Occupancy Status

3. To remove a field as a column in the Dynamic View, click a field in the list that has a .

4. To change the left/right order of the columns to your liking, click any column heading and dragthat column to a new position. The Dynamic View columns are adjusted to the new columnorder you established.

5. To change the column width:

C•CURE 9000 Areas and Zones Guide Chapter 1 43

Page 44: 9000-Areas-Zones.pdf

Basic iSTAR Cluster Area Tasks

a. move the cursor to the edge of the column heading you wish to resize. The cursor changes to

.

b. Drag this cursor to the left or right and release the mouse button to make the column wider ornarrower.

Viewing Occupancy Mode Causes for an Area

You can select an existing iSTAR Cluster Area on the Dynamic View and display a list of the causesfor the Area’s current Occupancy Mode. (For more information about Occupancy mode, see HowArea Occupancy Configuration Affects Occupancy Mode on Page 63, iSTAR Cluster Area Status Tabon Page 78, and Configuring Event Actions to Reset the Occupancy Mode on Page 87.)

To View the Occupancy Mode Causes for an Area

1. On the iSTAR Cluster Area Dynamic View, right-click an iSTAR Cluster Area in the list to openthe iSTAR Cluster Area Context menu.

2. Click Show Occupancy Mode Causes. A list such as that shown in the example in Figure 4 onPage 42 displays.

Figure 5: OccupancyModeCause List for iSTAR Cluster Area

44 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 45: 9000-Areas-Zones.pdf

Basic iSTAR Cluster Area Tasks

By default, the Dynamic View shows the Cause, the Action, the Date and Time, and the Priorityof the Action. The causes are listed in order of priority, except when the priorities are equal—inwhich case they are listed by time.

Modifying an iSTAR Cluster Area

You can modify an existing iSTAR Cluster Area by editing it using the iSTAR Cluster Area Editor.You can change the Cluster for the Area only if you remove all the Doors from the Access In table. Inaddition, while you cannot change the Doors, Readers, and Adjacent Areas on an existing row, youcan remove the relevant table row and make new selections.

To Modify an iSTAR Cluster Area

1. In the Navigation Pane of the Administration Workstation, click Areas and Zones to open theAreas and Zones pane.

2. Select iSTAR Cluster Area from the Areas and Zones drop-down list.

3. Click to open a Dynamic View showing all iSTAR Cluster Area Objects.

4. Right-click the iSTAR Cluster Area in the list that you want to change and select Edit from thecontext menu that appears.

- or -

Double-click the iSTAR Cluster Area you want to change.

The iSTAR Cluster Area Editor opens for you to edit the Area making changes as you wish inthe fields on the top of the editor, and on any of the tabs. (The Editor now includes a Groups tabthat displays any Groups to which this iSTAR Cluster Area belongs.)

NOTE On the General tab:

• To change the Cluster selection, you must remove all the Doors from the AccessIn table.

• To change the Doors, Readers, and Adjacent Areas, remove the relevant table rowand make new selections.

5. To save the modified Area, click Save and Close.

- or -

C•CURE 9000 Areas and Zones Guide Chapter 1 45

Page 46: 9000-Areas-Zones.pdf

Basic iSTAR Cluster Area Tasks

If you want to save the Area and then create a new one, click Save and New. The current iSTARCluster Area is saved and closed, but the iSTAR Cluster Area Editor remains open ready for anew iSTAR Cluster Area.

Deleting an iSTAR Cluster Area

You can delete an iSTAR Cluster Area, if you also have Edit permission for any Personnel who maycurrently be in the Area. Deleting an Area with assigned Doors removes the association between theArea and the assigned Doors and Readers.

To Delete an iSTAR Cluster Area

1. In the Navigation Pane of the Administration Workstation, click Areas and Zones to open theAreas and Zones pane.

2. Select iSTAR Cluster Area from the Areas and Zones drop-down list.

3. Click to open a Dynamic View showing all iSTAR Cluster Area Objects.

4. Right-click the iSTAR Cluster Area in the list that you want to delete and select Delete from thecontext menu that appears.

5. Click Yes on the “Are you sure you want to delete the selected iSTAR Cluster Area?” messagebox.

Setting a Property for an iSTAR Cluster Area

You can use Set Property to quickly set a property for an iSTAR Cluster Area without opening theiSTAR Cluster Area Editor. You use Set Property for mass updates. See Table 2 on Page 38 for theproperties that can be changed.

To Set a Property for iSTAR Cluster Areas

1. In the Navigation Pane of the Administration Workstation, click Areas and Zones to open theAreas and Zones pane.

2. Select iSTAR Cluster Area from the Areas and Zones drop-down list.

3. Click to open a Dynamic View showing all iSTAR Cluster Area Objects.

46 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 47: 9000-Areas-Zones.pdf

Basic iSTAR Cluster Area Tasks

4. Right-click the iSTAR Cluster Area in the list for which you want to set the property and selectSet Property from the context menu.

5. Specify the property for the Cluster Area. Click the drop-down button to see a list of properties.

6. Enter the value for the property and click OK.

7. Click OK on the Setting Properties of iSTAR Cluster Area message box.

Adding an iSTAR Cluster Area to a Group

You can use Add To Group to add the iSTAR Cluster Area Object to a Group.

To Add iSTAR Cluster Areas To a Group

1. Make sure that the Group is already configured for the iSTAR Cluster Area to be added to it.

2. In the Navigation Pane of the Administration Workstation, click Areas and Zones to open theAreas and Zones pane.

3. Select iSTAR Cluster Area from the Areas and Zones drop-down list.

4. Click to open a Dynamic View showing all iSTAR Cluster Area Objects.

5. Right-click the Cluster Area in the list that you want to add to a Group and select Add To Groupfrom the context menu.

6. When the Group list displays, select the Group you want to add the iSTAR Cluster Area to.

The name and description of the Group display on the Groups tab of the iSTAR Cluster AreaEditor.

C•CURE 9000 Areas and Zones Guide Chapter 1 47

Page 48: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

iSTAR Cluster Area EditorThe iSTAR Cluster Area Editor, shown in Figure 6 on Page 49, in C•CURE 9000 lets you create andmodify iSTAR Cluster Area Objects.The iSTAR Cluster Area Editor displays the following tabs forconfiguring Cluster Areas:

• iSTAR Cluster Area General Tab on Page 48

• iSTAR Cluster Area Antipassback Tab on Page 55

• iSTAR Cluster Area Occupancy Tab on Page 59

• iSTAR Cluster Area Triggers Tab on Page 69

• iSTAR Cluster Area Status Tab on Page 78

• iSTAR Cluster Area State Images Tab on Page 80

• iSTAR Cluster Area Groups Tab on Page 76 (when editing an existing Area)

The iSTAR Cluster Area Editor has the buttons described in Table 3 on Page 48.

Button Description

SaveandClose

Click this button when you have completed any changes to the iSTAR Cluster Area and wish to save thosechanges. The iSTAR Cluster Area closes.

SaveandNew

Click this button when you have completed any changes to the iSTAR Cluster Area and wish to save those changesand also create a new iSTAR Cluster Area. The iSTAR Cluster Area you were editing is saved, and a new iSTARCluster Area opens (either blankor including template information if you were using a template to create the newiSTAR Cluster Area).

Click this button when you want to close the iSTAR Cluster Area Editorwithout saving your changes.

Awarning appears asking whether or not you want to save your changesbefore closing the editor. ClickYes to exitand save andNo to exit and cancel your changes.

Table 3: iSTAR Cluster Area Editor Buttons

iSTAR Cluster Area General Tab

The iSTAR Cluster Area General tab, shown in Figure 6 on Page 49, lets you define the Doors,Readers, and adjacent Areas for the Area.

48 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 49: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

Definitions for this tab are provided in:

l iSTAR Cluster Area Editor Definitions on Page 50.

l iSTAR Cluster Area General Tab Definitions on Page 50.

Figure 6: iSTAR Cluster Area Editor General Tab

General Tab Tasks

You use the General tab to accomplish the tasks listed below, needed to configure an iSTAR ClusterArea. The procedural steps for each task are detailed in the following subsections.

C•CURE 9000 Areas and Zones Guide Chapter 1 49

Page 50: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

• Configuring iSTAR Cluster Area Doors, Readers, and Adjacent Areas on Page 52

• Deleting iSTAR Cluster Area Doors, Readers, and Adjacent Areas on Page 55

iSTAR Cluster Area Editor Definitions

The iSTAR Cluster Area Editor has the fields shown in Table 4 on Page 50.

Fields/Buttons Description

Name Enter a unique name, up to 100 characters, to identify the iSTAR Cluster Area.

Description Enter a description of the iSTAR Cluster Area, up to 255 characters.

Partition A read-only field displaying the name of the Partition to which this iSTAR Cluster Area belongs. (This fieldis visible only if the C•CURE9000 system is partitioned.)

NOTE: The Area derives itsPartition from the selected iSTAR Cluster. If the Cluster’sPartition changes,then the Area’sPartition changesaccordingly.

Table 4: iSTAR Cluster Area Fields

iSTAR Cluster Area General Tab Definitions

The iSTAR Cluster Area General tab has the buttons shown in Table 5 on Page 50 (in the Access Intable) and the fields shown in Table 6 on Page 51.

Button Name Description

Add Click this button to add a new blank row to theAccess In table. Each new row is added after thelast.

Remove Click this button to remove a selected row from theAccess In table. You have to click the row

selector to select a row to remove. If no row is selected, this button isnot available.

Table 5: iSTAR Cluster Area Editor - General Tab Buttons

50 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 51: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

Fields/Buttons Description

Cluster

Cluster Select the iSTAR Cluster that controls the Area.

NOTE: TheAdd andRemove buttons in theAccess In table becomesavailable when you select theCluster.

Once you select the Cluster and add Doors to the Area, you cannot change the Cluster.Conversely, if you remove allDoors from the table, the Cluster field becomesavailable and youcanmake another selection.

Access In

DoorClick in theDoor field to display , and then click this button to select an EntryDoor from the dialog boxthat appears. The Door must belong to the selected Cluster and not yet be assigned to anyArea. Once aDoor is selected, theDoor EditorAreas & Zones tab displays read-onlyArea information. See ViewingArea Information on the Door Editor on Page 95.

NOTE: Once a Door is selected for a row, it cannot be changed, although the entire row can be removed.

ReaderClick in theReader field to display , and then click this button to select a Reader to lead into theArea from the dialog box that appears. (OnlyReaders configured for a Door appear in the list andcan be associated with an Area.) Each Door must have at least one Reader.

NOTE: You can change the Reader selection until thisArea configuration is saved. After that the Readercannot be changed, although the entire row can be removed.

TheAccess In Reader for a given Area will alwaysbe theAccess Out Reader for the adjacentArea.

Example:

If a Door and its single Reader are configured asAccess In to Area A, the editor for the adjacentArea B shows the Door and Reader asAccess Out to Area A.

Enters from AreaClick in this field to display , and then click this button to select an adjacent Area from the dialogbox that appears.

Access Out This table is populated automaticallywhen an entry ismade to the Access In table.

Table 6: iSTAR Cluster Area Editor - General Tab Fields

C•CURE 9000 Areas and Zones Guide Chapter 1 51

Page 52: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

Fields/Buttons Description

Door • If a Door selected in theAccess In table has two Readers, the system automatically enters the sameDoor and adjacent Area in thisAccess Out table. The Reader shown in this table is the other Readeron the Door.

• If a Door selected in theAccess In table hasonly oneReader, no entry ismade for that Door in thisAccess Out table.

Reader

Exits to Area

Configuring iSTAR Cluster Area Doors, Readers, and Adjacent Areas

This procedure assumes that you have already selected the iSTAR Cluster for the Area and haveconfigured iSTAR Doors and Readers for that Cluster.

To Configure iSTAR Cluster Area Doors, Readers, and Adjacent Areas

1. Create or modify an iSTAR Cluster Area. See Configuring an iSTAR Cluster Area on Page 34 orModifying an iSTAR Cluster Area on Page 45.

2. On the General tab of the iSTAR Cluster Area Editor in the Access In box, click tocreate a new row, as shown in the following example.

3. Click in the Door field to display and click this button.

A selection list opens with the Doors available for iSTAR Cluster Areas.

52 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 53: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

4. Click a Door to add it to the row.

Example:

3rdFloorlobby

5. Click in the Reader field to display and click this button.

A selection list opens with the Readers available for iSTAR Cluster Areas.

6. Click a Reader to add it to the row.

Example:

iSTAR Reader1-ACM1-iSTARController2a

As soon as the Reader is selected, if it was one of two Readers on the selected Door, the systempopulates the row in the Access Out box with the same Door and the other Reader.

Example:

Door:3rdFloorlobby

Reader: iSTAR Reader2-ACM1-iSTARController2a

7. Click in the Enters from Area field to display and click this button.

A selection list opens with the iSTAR Cluster Areas available to be the adjacent Area.

C•CURE 9000 Areas and Zones Guide Chapter 1 53

Page 54: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

8. Click an Area to add it to the row.

Example:

iSTARArea1

The selected adjacent Area is now entered not only as the Enters from Area for the Access Intable, but has also been entered by the system as the Exits To Area for the row in the AccessOut table.

The General tab now appears as shown in the following example:

54 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 55: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

9. To configure more Doors for this iSTAR Cluster Area, click Add in the Access In box and repeatthe preceding steps.

Deleting iSTAR Cluster Area Doors, Readers, and Adjacent Areas

Once you have selected a Door for a row, it cannot be changed. In addition once you have selected aReader and an adjacent Area for a row, you can modify them only until you save the Area. After thatyou cannot modify any Object in a row. You can, however, delete the entire row—thus removing theDoor, Reader, and Adjacent Area from the Area configuration.

To Delete an iSTAR Cluster Area Door

1. On the General tab of the iSTAR Cluster Area Editor in the Access In box, click a row to selectit.

2. Click Remove to delete the Door/Reader row.

The row is deleted. If the deleted Door had two Readers, the system also deletes the related rowin the Access Out box.

NOTE While you can actually select a row in the Access Out box, theRemove button remains unavailable. Consequently, you cannotdelete the row directly, only by deleting the related row in the AccessIn box

iSTAR Cluster Area Antipassback Tab

The iSTAR Cluster Area Antipassback tab, shown in Figure 7 on Page 56, lets you define the type ofAntipassback for the Area and the related options.

To configure antipassback you need at least two Areas controlled by Readers on the same Cluster—both an Access In Reader and an Access Out Reader.

Definitions for this tab are provided in iSTAR Cluster Area Antipassback Tab Definitions on Page 56.

C•CURE 9000 Areas and Zones Guide Chapter 1 55

Page 56: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

Figure 7: iSTAR Cluster Area Editor AntipassbackTab

Antipassback Tab Tasks

You use the Antipassback tab to accomplish the tasks listed below, to configure an iSTAR ClusterArea. The procedural steps for each task are detailed in the following subsections.

• Configuring Regular Antipassback for iSTAR Cluster Areas on Page 58

• Configuring Timed Antipassback for iSTAR Cluster Areas on Page 58

To configure how antipassback is enforced when the Cluster is in communications failure, seeConfiguring Antipassback Communications Failure Mode for a Cluster on Page 82.

iSTAR Cluster Area Antipassback Tab Definitions

The iSTAR Cluster Area Antipassback tab has the fields shown in Table 7 on Page 57.

56 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 57: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

Fields/Buttons Description

AntipassbackEnforcementType

Click the down-arrow to select from the drop-down list the type of Antipassback for the Area.

None –No antipassback checking is enforced. Personnelmayenter and exit the Area if theyhave validclearance. This is the default.

Antipassback – Regular antipassback checking is enforced. Antipassback violationsoccur whenPersonnel try to enter the Area they currently occupy (according to the system) or anynon-adjacent Area.

Timed Antipassback – Timed antipassback checking is enforced. Timed APB violationsoccur whenPersonnel try to re-enter the Area they currently occupy (according to the system) within a specified timeperiod. After the specified time haselapsed, Personnel are allowed to re-enter the Area, even if theyhavenot exited validly. (However, for tracking purposes, Personnel are considered to be in the area until theyexit validly—even if the antipassback timer period haselapsed.)

NOTE: Bydefault, Timed APBAreasalso enforce Regular APB rules. Personnelmust exit an Area beforeentering a non-adjacent Area.

Trigger violationon re-entrywithin: days -hours:minutes

NOTE: This field is available only if Timed Antipassback is selected in the preceding field as theEnforcement type.

Enter in days, hours, andminutes the time to elapse before the person can re-enter the Area. (Themaximum allowed interval isseven days.)

Enforce TimedAntipassbackOnly

NOTE: This field is available only if Timed Antipassback is selected as the Enforcement type.

Select this checkbox to indicate that only the timed APB rule should be enforced on thisArea, not theregular APB rules. The default is cleared.

Thus, when Personnel attempt to exit/enter an Area configured with this option:

• Regular APB exit rules are not checked and they can exit.

• Regular APB entrance rules are not checked— so if the APB timer period hasalreadyelapsed forthe person, they can enter.

NOTE: If regular APB is configured on an adjacent Area, that Area still enforces the regular APB rulesbefore granting either entry/exit.

Valid Exit ClearsTimer

NOTE: This field is available only if Timed Antipassback is selected as the Enforcement type.

Select this checkbox to indicate that if Personnel validly exit thisArea, their APB time period is cancelled sothey can re-enter the Area at once. The default is cleared.

Table 7: iSTAR Cluster Area Editor - AntipassbackTab Fields

C•CURE 9000 Areas and Zones Guide Chapter 1 57

Page 58: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

Configuring Regular Antipassback for iSTAR Cluster Areas

To Configure Regular Antipassback for an Area

1. Create or modify an iSTAR Cluster Area. See Configuring an iSTAR Cluster Area on Page 34 orModifying an iSTAR Cluster Area on Page 45.

2. On the iSTAR Cluster Area Editor, click the Antipassback tab to open.

3. Click the down-arrow in the Antipassback Enforcement Type field to display the followingdrop-down list. (The default is None.)

4. Click Antipassback to have regular antipassback enforced for this Area.

Configuring Timed Antipassback for iSTAR Cluster Areas

To Configure Timed Antipassback for an Area

1. Create or modify an iSTAR Cluster Area. See Configuring an iSTAR Cluster Area on Page 34 orModifying an iSTAR Cluster Area on Page 45.

2. On the iSTAR Cluster Area Editor, click the Antipassback tab to open.

3. Click the down-arrow in the Antipassback Enforcement Type field to display the followingdrop-down list. (The default is None.)

4. Click Timed Antipassback to have timed antipassback enforced for this Area.

When you select Timed Antipassback, the Trigger violation on re-entry within.... field and theEnforce Timed Antipassback Only and the Valid Exit Clears Timer check boxes becomeavailable.

58 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 59: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

5. In the Trigger violation on re-entry within: days - hours: minutes field, enter the time period thatmust elapse after a person enters the Area before he/she can re-enter.

6. To configure this Area so it does not enforce regular antipassback rules as usual (the default),only timed antipassback rules, select the Enforce Timed Antipassback Only check box.

7. To configure this Area so that a person who validly exits has their APB Timer period erased,click to select the Valid Exit Clears Timer check box. This allows such a person to immediatelyre-enter the Area.

iSTAR Cluster Area Occupancy Tab

The iSTAR Cluster Area Occupancy tab, shown in Figure 8 on Page 59, lets you define theOccupancy restrictions for the Area for both Personnel in general and for Personnel in PersonnelGroups.

Figure 8: iSTAR Cluster Area Editor OccupancyTab

Definitions for this tab are provided in iSTAR Cluster Area Occupancy Tab Definitions on Page 60.

C•CURE 9000 Areas and Zones Guide Chapter 1 59

Page 60: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

The following topics provide more information about the Occupancy tab:

l How Area Occupancy Configuration Affects Occupancy Mode on Page 63.

l Rules for Area Occupancy Access on Page 64.

Occupancy Tab Tasks

You use the Occupancy tab to accomplish the tasks listed below, needed to configure an iSTARCluster Area. The procedural steps for each task are detailed in the following subsections.

• Configuring Area Occupancy Restrictions for All Personnel on Page 66.

• Configuring Area Occupancy Restrictions for Personnel Groups on Page 67.

• Deleting a Personnel Group from an iSTAR Cluster Area on Page 69.

iSTAR Cluster Area Occupancy Tab Definitions

The iSTAR Cluster Area Occupancy tab has the buttons shown in Table 8 on Page 60 and the fieldsshown in Table 9 on Page 61.

Button Name Description

Add Click this button to add a new blank row to thePersonnel Groups table. Each new row is addedafter the last.

Remove Click this button to remove a selected row from thePersonnel Groups table. Youmust click the

row selector to select a row to remove. If no row is selected, this button isnot available.

Table 8: iSTAR Cluster Area Editor OccupancyTab Buttons

60 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 61: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

Fields/Buttons Description

Occupancy Restrictions for All PersonnelOccupancy restrictions/limit counts for All Personnel work in conjunction with Occupancy restrictions/limit counts forPersonnel Groups. See Rules for AreaOccupancyAccesson Page 64 for detailed information and examples.

MaximumOccupancy* Click the down-arrow to select the type of MaximumOccupancy for the Area from the drop-down list.

None – NoMaximumOccupancyRestriction is enforced. Personnelmayenter and exit theArea if theyhave valid clearance. This is the default. (When this option is selected, theMaximum Limit field is blankand unavailable.)

Allow Access–MaximumOccupancyRestriction is set, but the system allowsPersonnel toenter the Area even though the number entered in theMaximum Limit field (required) hasbeen reached. The system sendsamessage to theMonitoring Station when this occurs andtriggers anyOccupancyEvents configured for the Area.

Restrict Access –MaximumOccupancyRestriction is enforced. The system uses thenumber entered in theMaximum Limit field (required) to restrict access to the Area.

Maximum Limit Enter themaximum number of Personnel allowed in the area at one time. Bydefault, thisfield is blankand unavailable. It becomesavailable, and requiresan entry, when eitherAllow Access or Restrict Access are selected as theMaximumOccupancy type.

NOTE: If valuesare set for bothMaximum andMinimum Limits, themaximum valuemust beequal to/greater than theminimum value.

Table 9: iSTAR Cluster Area Editor - OccupancyTab Fields

C•CURE 9000 Areas and Zones Guide Chapter 1 61

Page 62: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

Fields/Buttons Description

MinimumOccupancy* Click the down-arrow to select from the drop-down list the type of MinimumOccupancy forthe Area.

None – NoMinimumOccupancyRestriction is enforced. Personnelmayenter and exit theArea if theyhave valid clearance. This is the default. (When this option is selected, theMinimum Limit field is blankand unavailable.)

Allow Access–MinimumOccupancyRestriction is set, but the system allowsPersonnel toenter and exit the Area even though the number entered in theMinimum Limit field(required) hasnot been reached. The system sendsamessage to theMonitoring Stationwhen this occurs and triggers anyOccupancyEvents configured for the Area.

Restrict Access –MinimumOccupancyRestriction is enforced. The system uses thenumber entered in theMinimum Limit field (required) to restrict access to and exit from theArea. To be allowed access, theminimum number of personnelmust enter within a certaintime frame. Once theminimum number entering the Area is reached, personnelwill not beallowed to exit the Area unless theyall exit at one time.

NOTE: The time interval for Minimum occupancy restrictions is set by theNext Card TimeSystemVariable in the Hardware Driver category. The variable default is 15seconds, so personnelwill alwayshave aminimum of 15 seconds to present the nextcard. For more information, see Setting SystemVariablesThat Affect AreasonPage 91.

Minimum Limit Enter theminimum number of Personnel allowed and required to be in the area at one time.

Occupancy Restrictions for Personnel GroupsOccupancy restrictions/limit counts set for Personnel Groupswork in conjunction with the Occupancy restrictions/limit countsset for All Personnel. So be carefulwhen configuring these options for the Area. See Rules for AreaOccupancyAccessonPage 64 for detailed information and examples.

PersonnelGroupClick in thePersonnel Group field to display , and then click this button to select aPersonnelGroup for association with thisArea from the dialog box that appears.

NOTE: If a person is amember of more than one PersonnelGroup selected for the sameArea, the Occupancy counts for the Groupsare not maintained correctlywhen theperson accesses the Area. For this reason, Software House recommendsavoidingthis type of configuration.

Maximum* Enter themaximum number of Personnel from thisGroup allowed in the Area at one time.

NOTE: If valuesare set for both GroupMaximum andGroupMinimum, themaximum valuemust be equal to/greater than theminimum value.

The value you enter in this field will apply to Personnel in thisGroup separately fromanyother configuredGroup.

62 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 63: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

Fields/Buttons Description

Minimum* Enter theminimum number of Personnel from thisGroup allowed and required to be in theArea at one time.

NOTE: The value you enter in this field will apply to Personnel in thisGroup separately fromanyother configuredGroup. In addition, if valuesare set for both Group and AllPersonnelMinimum Limits, whichever if the higher minimumwill apply.

Only allow Personnel in listedgroups to enter area

NOTE: This checkbox is available only if there is at least one PersonnelGroup in the list.

Select this option to limit access to the Area only to Personnel (with Clearance) in anyof thelisted Groups. Thismeans that Personnelnot in one of these group are denied access.

Count accessbyPersonnel inlisted groups; do not restrictaccess*

NOTE: This checkbox is available only if there is at least one PersonnelGroup in the list.

Select this option to allowPersonnel (with Clearance) from anyGroup in the list to enter andexit the Area whether or not the numbersentered in theMaximum/Minimum fields havebeen reached. The system sendsamessage to theMonitoring Station when this occurs andtriggers anyOccupancyEvents configured for the Area.

*The occupancy restrictions that you configure for thisArea set the initial default OccupancyMode for the Area, asdetailed inHow AreaOccupancyConfiguration AffectsOccupancyMode on Page 63.

How Area Occupancy Configuration Affects Occupancy Mode

The current Occupancy Mode for an Area—displayed on the Area Status tab (see Page 78)—isinitially set by the way you configure the Occupancy restrictions for the Area, as described in Table10 on Page 64.

Any one higher level Occupancy restriction, whether for ‘All Personnel’ or for a ‘Personnel Group,’raises the Occupancy Mode level.

Example:

The Minimum and Maximum Occupancy for the Area for ‘All Personnel’ is None, which wouldequal an Occupancy Mode of ‘No Occupancy Testing’. However, a Personnel Group isconfigured for the Area with a Maximum limit of 5 and a Minimum limit of 2. As a result, thedefault setting for the Area’s Occupancy Mode is ‘Counting for Events and Access Restriction.’

The Occupancy Mode can also be reset by Event Actions. For more information, see ConfiguringEvent Actions to Reset the Occupancy Mode on Page 87.

C•CURE 9000 Areas and Zones Guide Chapter 1 63

Page 64: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

Area Occupancy Tab Field Setting Default Occupancy Mode

Occupancy Restrictions for All Personnel

MaximumOccupancy/MinimumOccupancy None NoOccupancy

Allow Access Counting for Events

Restrict Access Counting for Events and AccessRestriction

Occupancy Restrictions for Personnel Groups

NoPersonnelGroup NoOccupancy

PersonnelGroup Entered No entries forMaximum/Minimum

NoOccupancy

Maximum/Minimum entered Counting for Events and AccessRestriction

Count accessbyPersonnel in listed groups; do notrestrict access

Selected Counting for Events

Table 10: Relation Between AreaOccupancyTab SettingsandOccupancyMode

Rules for Area Occupancy Access

For any particular Area Occupancy configuration, whether a person is admitted or not isstraightforward:

If any condition would deny access to the individual, then access is not granted.

The limits and restrictions configured for ‘All Personnel’ apply to the individual whether or nothe/she belongs to a Personnel Group configured in the Occupancy Restrictions for All PersonnelGroups box.

Examples:

The following example cases in Table 11 on Page 65 and Table 12 on Page 66 showconfigurations for All personnel and for Personnel Groups.

For a group,

64 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 65: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

• “Restrict access” means that the Count access by Personnel in listed groups; do not restrictaccess check box is not selected.

• “Allow access” means that the aforementioned check box is selected.

Case # Conditions AreaCount

Activity Result

Case 1 All Personnel Min = 3; Allow Access 0 1Group Amemberpresents card

Accessdenied(based onGroup)

PersonnelGroup A Min = 2; Restrict Access 0

Case 2 All Personnel Min = 3; Allow Access 0 2Group Amemberspresent cards

Accessgranted(based onGroup)

PersonnelGroup A Min = 2; Restrict Access 0

Case 3 All Personnel Min = 3; Restrict Access 0 2Group Amemberspresent cards

Accessdenied(based on All Personnel)

PersonnelGroup A Min = 2; Restrict Access 0

Case 4 All Personnel Min = 2; Allow Access 0 1Group Amemberpresents card

Accessdenied

PersonnelGroup A Min = 3; Restrict Access 0

Case 5 All Personnel Min = 2; Allow Access 0 2Group Amemberspresent cards

Accessdenied(based onGroup)

PersonnelGroup A Min = 3; Restrict Access 0

Case 6 All Personnel Min = 2; Restrict Access 0 2Group Amemberspresent cards

Accessdenied(based onGroup)

PersonnelGroup A Min = 3; Restrict Access 0

Table 11: MinimumOccupancyConfigurations

C•CURE 9000 Areas and Zones Guide Chapter 1 65

Page 66: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

Case # Conditions AreaCount

Activity Result

Case 1 All Personnel Max=4; RestrictAccess

3 fromGroupA

Group Amemberpresents card

Accessdenied(based onGroup)

PersonnelGroup A

Max=3; RestrictAccess

Non-Group Amemberpresents card

Accessgranted(no conditiondeniesaccess)

Case 2 All Personnel Max=3; RestrictAccess

3 fromGroupA

Group Amemberpresents card

Accessgranted(based on AllPersonnel)

PersonnelGroup A

Max=4; RestrictAccess*

Case 3 All Personnel Max=3; AllowAccess

3 fromGroupA

Group Amemberpresents card

Accessgranted(no conditiondeniesaccess)

PersonnelGroup A

Max=4; RestrictAccess

4 fromGroupA

Group Amemberpresents card

Accessdenied(based onGroup)

Non-Group Amemberpresents card

Accessgranted(no conditiondeniesaccess)

*This configuration isnot recommended because 4Group Amemberswillnot be allowed to enter the Area.

Table 12: MaximumOccupancyConfigurations

Configuring Area Occupancy Restrictions for All Personnel

To Configure Occupancy Restrictions for All Personnel for an Area

1. Create or modify an iSTAR Cluster Area. See Configuring an iSTAR Cluster Area on Page 34 orModifying an iSTAR Cluster Area on Page 45.

2. On the iSTAR Cluster Area Editor, click the Occupancy tab to open.

66 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 67: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

3. In the Occupancy Restrictions for All Personnel box, click the down-arrow in theMaximumOccupancy field to display the following drop-down list and select one of the three MaximumOccupancy types. (The default is None.)

4. In theMaximum Limit field, which becomes available and requires an entry if you selectedeither Allow Access or Restrict Access, enter the maximum number of Personnel allowed in thearea at one time.

5. Click the down-arrow in theMinimum Occupancy field to display the following drop-down listand select one of the three Minimum Occupancy types. (The default is None.)

6. In theMinimum Limit field, which becomes available and requires an entry if you selectedeither Allow Access or Restrict Access, enter the minimum number of Personnelallowed/required in the area at one time.

NOTE If values are set for both the Maximum and Minimum Limits, themaximum value must be equal to or greater than the minimumvalue.

Configuring Area Occupancy Restrictions for Personnel Groups

To Configure Occupancy Restrictions for Personnel Groups for an Area

1. Create or modify an iSTAR Cluster Area. See Configuring an iSTAR Cluster Area on Page 34 orModifying an iSTAR Cluster Area on Page 45.

2. On the iSTAR Cluster Area Editor, click the Occupancy tab to open.

3. In the Occupancy Restrictions for Personnel Groups box, click Add to create a new row, asshown in the following example.

C•CURE 9000 Areas and Zones Guide Chapter 1 67

Page 68: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

4. Click in the Personnel Group field to display and click this button.

A selection list opens with the Personnel Groups available for iSTAR Cluster Areas.

5. Click a Group to add it to the row.

Example:

Personnel Group 3

6. In theMaximum field enter the maximum number of Personnel from this Group allowed in theArea at one time.

7. In theMinimum field enter the minimum number of Personnel from this Group both allowedand required to be in the Area at one time.

NOTE If values are set for both the Maximum and Minimum Limits, themaximum value must be equal to or greater than the minimumvalue.

8. To configure more Personnel Groups for this iSTAR Cluster Area, click Add and repeat thepreceding steps.

9. To limit access to the Area only to Personnel (with the appropriate Clearance) in any of theGroups listed in the box, click to select the Only allow Personnel in listed groups to enter areacheck box.

68 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 69: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

10. To allow Personnel (with the appropriate Clearance) from any of the Groups listed in the box toenter and exit the Area whether or not the numbers entered in the Maximum/Minimum fieldshave been reached, click to select the Count access by Personnel in listed groups; do not restrictaccess check box. In this situation, the system sends a message to the Monitoring Station andtriggers any Occupancy Events configured for the Area.

NOTE If a person is a member of more than one Personnel Group selectedfor the same Area, the Occupancy counts for the Groups are notmaintained correctly when the person accesses the Area. For thisreason, Software House recommends avoiding this type ofconfiguration.

Deleting a Personnel Group from an iSTAR Cluster Area

To Delete an iSTAR Cluster Area Personnel Group

1. In the Occupancy Restrictions for Personnel Groups box on the Occupancy tab, click aPersonnel Group row to select it.

2. Click Remove to delete the row.

iSTAR Cluster Area Triggers Tab

The iSTAR Cluster Area Triggers tab, shown in Figure 9 on Page 69, allows you to set up Triggers,configured procedures used by C•CURE 9000 to activate specific actions when a particularpredefined condition occurs.

Figure 9: iSTAR Cluster Area Editor TriggersTab

Definitions for this tab are provided in iSTAR Cluster Area Triggers Tab Definitions on Page 70.

The following topics provide more information about the Triggers tab:

C•CURE 9000 Areas and Zones Guide Chapter 1 69

Page 70: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

l How to Use the Triggers Tab on Page 70.

Triggers Tab Tasks

You use the Triggers tab to accomplish the tasks listed below, needed to configure an iSTAR ClusterArea. The procedural steps for each task are detailed in the following subsections.

• Configuring Triggers for iSTAR Cluster Areas on Page 72.

• Deleting a Trigger from an iSTAR Cluster Area on Page 76.

How to Use the Triggers Tab

The tab contains one Action, Activate Event, that can be linked to a specific value of an Area-relatedviolation or state and to any panel or host Event configured in the system. Once the Area’s statematches one of these values, the linked Activate Event Action is triggered and the user-specifiedEvent is set to an active state (if allowed by the Event, which should be armed at the time). ViolationStatus Events (such as APB Entry/Exit Violations—representing antipassback violations—andAccess over Maximum/under Minimum Occupancy Violations) are momentarily activated, whileMaximum and Minimum Occupancy Status Events are persistent.

You could use the activated Event to display a Reader LCD Message saying “Lot Full” when aParking Lot Area’s Maximum Occupancy Status becomes “At or Over Maximum”.

By creating new rows and selecting different values for each row, each value of the Violation Statusfield can trigger its own Event. It is also possible to trigger two different Events for the sameviolation state value by creating two rows with the same value and then linking each row to its ownEvent.

NOTE However, each violation state value can activate only one panelEvent.

iSTAR Cluster Area Triggers Tab Definitions

The iSTAR Cluster Area Triggers tab has the buttons shown in Table 13 on Page 71 and the fieldsshown in Table 14 on Page 71.

70 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 71: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

Button Name Description

Add Click this button create a new row in the Triggers table. You have to configure all the fields in therow and select an Event to complete the Add operation.

Remove Click this button to remove a selected row from the Triggers table. You have to click the row

selector to select a row to remove. If no row is selected, this button isnot available.

Table 13: iSTAR Cluster Area Editor TriggersTab Buttons

Field Description

PropertyClick in theProperty field to display and then click this button to displaya dialogboxwith available properties. Double-click a Property to select it.

Value Click the down-arrow to select a value from the drop-down list or for the PersonnelCount Property, enter 0 (zero) or 1 (one).

When the Area’sViolation Status matches this value, the Event you specify in theEventfield is activated.

Action Click the down-arrow to selectActivate Event (the only type available) from the drop-down list. ThisAction will be executed when the value of the Area’sStatus matches thatselected in theValue field.

Details The name of the Event configured for this row (read-only) is entered by the system onceyoumake a selection in theEvent field.

EventClick in this field to select the Event to be activated if the Area’sViolation Status forthe current row on the grid has the specified value.

For each Violation Status value, you can selectmultiple host Events, but onlyonepanelEvent.

NOTE: Switching rows in the grid updates this field with the user-selected Event so thateach row can have its own Event to activate.

Table 14: iSTAR Cluster Area Editor - TriggersTab Fields

C•CURE 9000 Areas and Zones Guide Chapter 1 71

Page 72: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

Field Description

ScheduleClick in theSchedule field to display and then click this button to displaya dialogboxwith available Schedules. Double-click a Schedule to select it.

• For panelEvents, theSchedule field is set toAlways and cannot bemodified.

• For host Events, this field ismodifiable.

*For detailed information about the relationshipsbetween the available properties, their corresponding values, the Eventtypes, and Scheduling, see Table 15 on Page 72.

Property Possible Values EventType

ScheduleType

GroupMaximumOccupancyStatus

At or Over Maximum

Panel

Host

Alwaysonly

Modifiable

GroupMinimumOccupancyStatus

At or Under Minimum

MaximumOccupancyStatus

At or Over Maximum

MinimumOccupancyStatus

At or Under Minimum

PersonnelCount Enter 0 (zero) or 1 (one)

Violation Status APBEntryViolation/APBExit Violation (Antipassback violations)

Accessover MaximumOccupancyViolation/Exit under MinimumOccupancyViolation

AdditionalCard Violation

Table 15: iSTAR Cluster Area TriggersTable Details

Configuring Triggers for iSTAR Cluster Areas

You can create as many triggers as you wish for any iSTAR Cluster Area.

72 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 73: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

To Configure Cluster Area Triggers

1. Create or modify an iSTAR Cluster Area. See Configuring an iSTAR Cluster Area on Page 34 orModifying an iSTAR Cluster Area on Page 45.

2. On the iSTAR Cluster Area Editor, click the Triggers tab to open.

3. Click Add to create a new trigger row, as shown in the following figure.

4. Click in the Property field to display and click this button.

A selection list opens with the available properties.

5. Click a property to add it to the row.

Example:

Violation Status

6. Click the down-arrow in the Value field to display a drop-down list of values for the propertyyou selected.

7. Click the Value you want to activate the event for this trigger to add it to the row.

Example:

C•CURE 9000 Areas and Zones Guide Chapter 1 73

Page 74: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

APB Exit Violation

8. Click the down-arrow in the Action field to display a drop-down list containing Activate Eventas the only available Action. Click Activate Event to add it to the row as the action that will beexecuted when the Cluster Area’s state matches that selected in the Value field.

The Event field displays on the bottom of the tab.

9. Click in the Event field to display a selection list of all Events currently configured in theC•CURE 9000 system, and then click an Event to select it.

The system enters the name of the Event you select in the Details field for the row when youclick anywhere outside the Event field. This Event will be activated whenever the ViolationState for the current row on the grid matches the value specified in that row.

74 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 75: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

The Schedule field contains the default entry Always. (This is the only schedule valid forPanel Events. You can select a different schedule for a Host Event.)

10. Click in the Schedule field to display a selection list of schedules configured in theC•CURE 9000 system.

11. Click a Schedule to select it.

The tab now appears as shown in the following example.

C•CURE 9000 Areas and Zones Guide Chapter 1 75

Page 76: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

12. To create more triggers for this iSTAR Cluster Area, repeat the above steps for each trigger youwant.

Switching rows in the grid updates the Event field with the user-selected event so that each rowcan have its own event to activate.

Deleting a Trigger from an iSTAR Cluster Area

To Delete an iSTAR Cluster Area Trigger

1. On the Triggers tab, click a row to select it.

2. Click Remove to delete the trigger row.

iSTAR Cluster Area Groups Tab

The iSTAR Cluster Area Groups tab, shown in Figure 10 on Page 77, lists the iSTAR Cluster AreaGroups to which this Area belongs.

NOTE This tab does not display on the iSTAR Cluster Area Editor whenyou are configuring a new Area. It displays when you are editing anexisting Area.

76 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 77: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

The Groups table on this tab is a Dynamic View that you can filter, group, print, and view in CardView, using the buttons described in Table 16 on Page 77.

Definitions for the icons and columns on the Groups tab are provided in iSTAR Cluster Area GroupsTab Definitions on Page 77.

You can select any of the Area Groups in the list and double-click to edit it or right-click todisplay the Groups Context menu (described in the Groups chapter in the C•CURE 9000 SoftwareConfiguration Guide). You can also right-click in the Name or Description field of an Area Group rowto display a standard edit menu.

Figure 10: iSTAR Cluster Area Editor GroupsTab

iSTAR Cluster Area Groups Tab Definitions

The iSTAR Cluster Area Groups tab has the buttons and fields shown in Table 16 on Page 77.

Fields/Buttons Name Description

CardView

Click to display the list of iSTAR Cluster AreaGroups in Card View

Print Click to print the list of iSTAR Cluster AreaGroups.

Group Click to enable Grouping of the list. You can drag a column heading to the area labeledDragcolumns to group by here to group the list by that heading

Table 16: iSTAR Cluster Area Editor GroupsTab Fields/Buttons

C•CURE 9000 Areas and Zones Guide Chapter 1 77

Page 78: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

Fields/Buttons Name Description

Filter Click to display the filter bar. You can click in the filter bar to add filtering criteria to any column ofthe list. For more information about Filtering, see the DynamicViewschapter in theC•CURE9000 Data ViewsGuide.

Name Name of the Group, up to 100 characters.

Description Description of the Group.

iSTAR Cluster Area Status Tab

The iSTAR Cluster Area Status tab, shown in Figure 11 on Page 80, provides a read-only listing ofcritical information about the dynamic status of this iSTAR Cluster Area, including:

• Personnel Count– displays the number of Personnel currently in this Area

• Maximum Occupancy Status– shows whether or not the Maximum Occupancy limit wasreached: Unknown, At or Over Maximum, or Normal

• Minimum Occupancy Status – shows whether or not the Minimum Occupancy limit wasreached: Unknown, At or Under Minimum, or Normal

• Current Occupancy Mode – displays the last reported mode: Unknown, No Occupancy,Counting Only, Counting for Events, or Counting for Events and Access Restriction

NOTE An Area’s initial Occupancy mode depends on the way in which theArea was configured on the Occupancy tab, described in How AreaOccupancy Configuration Affects Occupancy Mode on Page 63. Youcan reset the mode through Event Actions, described in ConfiguringEvent Actions to Reset the Occupancy Mode on Page 87. (The‘Counting Only’ mode can only be set with an Event Action.)

• Group Maximum Occupancy Status – shows whether or not the Maximum Occupancy limitwas reached: Unknown, At or Over Maximum, or Normal

• Group Minimum Occupancy Status – shows whether or not the Minimum Occupancy limit wasreached: Unknown, At or Under Minimum, or Normal

78 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 79: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

• Communication Status – displays the comm state of the Cluster Area: Normal, CommunicationFailure, or Partial Connectivity

NOTE Partial Connectivity indicates that Occupancy is not being enforced forthe Area because some iSTAR Controller with Readers in the Area isin Comm Fail. In this situation, the iSTAR continues to collectOccupancy information and when communication is restored, allinformation is synchronized.

• Personnel Groups – if any configured for Area – displays:

• Personnel Group Name

• Personnel Count

Viewing Area Status on the Status Tab

To View Status on the iSTAR Cluster Area Editor

1. In the Navigation Pane of the Administration Workstation, click the Areas and Zones panebutton.

2. Click the Areas and Zones drop-down list and select iSTAR Cluster Area.

3. Click to open a Dynamic View showing a list of all existing iSTAR Cluster Area Objects

4. Right-click the iSTAR Cluster Area whose status you want to view and click Edit from thecontext menu that appears. The iSTAR Cluster Area Editor opens with the General tabdisplayed.

5. Click the Status tab to open, as shown in Figure 11 on Page 80.

C•CURE 9000 Areas and Zones Guide Chapter 1 79

Page 80: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

Figure 11: iSTAR Cluster Area Editor StatusTab

iSTAR Cluster Area State Images Tab

The iSTAR Cluster Area State Images tab, shown in Figure 12 on Page 80, provides a means tochange the default images used to indicate states for the iSTAR Cluster Area on the MonitoringStation. You can select other images to display for this Cluster Area or return to the default images,as described in State Images Tab Tasks on Page 81.

Figure 12: iSTAR Cluster Area Editor State ImagesTab

80 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 81: 9000-Areas-Zones.pdf

iSTAR Cluster Area Editor

State Images Tab Tasks

To Change an Image

1. Double-click the default image in the tab to open a Windows file selection dialog box.

2. If necessary, navigate to find the new image.

3. Select the desired replacement image and click Open.

The new image replaces the default image and displays in the State Images tab.

To Restore the Default Image

• Right-click the replacement image in the Area State Images tab and select Restore Default.

C•CURE 9000 Areas and Zones Guide Chapter 1 81

Page 82: 9000-Areas-Zones.pdf

Configuring AntipassbackCommunicationsFailureMode for a Cluster

Configuring Antipassback Communications FailureMode for a ClusterYou can configure how Cluster antipassback works during a communications failure when theCluster members lose communication with the Cluster master. In this situation, the Cluster members(the Controllers) begin to enforce antipassback locally, based on the Failure Mode you configure forthe Cluster on the Area tab of the iSTAR Cluster Editor, as shown in Figure 13 on Page 82.

NOTE Modifying the antipassback communications failure mode requires afull Cluster download so it can only be done if the Cluster is notEnabled.

Figure 13: iSTAR Cluster Editor – Area Tab

By default the No Access option is cleared (not set), while the Local option is selected (set).

82 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 83: 9000-Areas-Zones.pdf

Configuring AntipassbackCommunicationsFailureMode for a Cluster

NOTE A Cluster that has an Alternate Master configured supports onlyLocal Failure Mode. Consequently, once a secondary Controller isselected for the Cluster, No access Mode is unavailable.

The Area tab has the fields shown in Table 17 on Page 83.

Fields Description

Noaccess

Select this option to configureNo access as the CommunicationsFailuremode for thisCluster.

• Access is denied byanymember Controller in the Cluster in communications failure.

• Member Controllers still in communicationswith theMaster continue to request normal antipassbackdecisionsfor entry to the Area.

• Master Controllers need no communication tomake antipassbackdecisionsand alwaysdo so regardlessofhost or member communication.

(In thismode, the person is presumed to be in violation, unlessproven otherwise.)

NOTE: Thismode isunavailable if the Cluster hasan AlternateMaster.

Local Select this option to configure Local as the CommunicationsFailuremode for thisCluster.

• The Controller uses locally available information to grant or denyaccess. Even if this information is insufficient,the Controller admits the person presenting the card.

(In thismode, the person is presumed not-in-violation, unlessproven otherwise.) When Localmode isconfigured, the person is allowed in unless the Controllersmaking the decision determine beyond doubt that he/sheis guilty of an antipassback violation.

Table 17: iSTAR Cluster Editor –- Area Tab Fields

To Configure Cluster Antipassback Communications Failure Mode

1. In the Navigation Pane of the Administration Workstation, click the Hardware pane button.

2. Click the Hardware drop-down list, select iSTAR Cluster, and click to open a DynamicView showing a list of all existing iSTAR Clusters.

- or -

Expand the Hardware Tree.

C•CURE 9000 Areas and Zones Guide Chapter 1 83

Page 84: 9000-Areas-Zones.pdf

Configuring AntipassbackCommunicationsFailureMode for a Cluster

3. In the Dynamic View list/Tree, select the iSTAR Cluster for which you want to set theAntipassback Communications Failure Mode, right-click, and click Edit from the context menuthat appears.

4. On the iSTAR Cluster Editor, click to open the Area Tab.

5. Click to select either the No access or Local option.

84 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 85: 9000-Areas-Zones.pdf

Configuring PersonnelAntipassbackOptions

Configuring Personnel Antipassback OptionsYou can configure a person to be exempt from antipassback rules (both regular and timed) for allAreas so that he/she is permitted entry to/exit from an antipassback Area regardless of a violation.In such cases, no violation message are generated/logged, but access activity is logged as usual.

In addition, you can specify that a person activate antipassback events, whether or not he/she isantipassback exempt, if the access/exit would ordinarily cause a violation.

You configure these options on the Personnel Editor General tab, as shown in Figure 14 on Page 85.By default the Antipassback Exempt option is cleared (not set), while the Activate AntipassbackEvent option is selected (set).

Figure 14: PersonnelEditor – General Tab

C•CURE 9000 Areas and Zones Guide Chapter 1 85

Page 86: 9000-Areas-Zones.pdf

Configuring PersonnelAntipassbackOptions

To Configure a Person To Be Antipassback Exempt

1. In the Navigation Pane of the Administration Workstation, click the Personnel pane button.

2. Click the Personnel drop-down list and select Personnel.

3. Click New to create a new Personnel record.

- or -

Click to open a Dynamic View showing a list of all existing Personnel Objects, right-clickthe Personnel record you want to change, and click Edit from the context menu that appears.

The Personnel Editor opens with the General Tab displayed.

4. In the Options box, click to select the Antipassback Exempt option.

5. To save the Personnel record, click Save and Close.

To Configure a Person To Always Activate Antipassback Events

1. Open a Personnel Record on the Personnel Editor General Tab.

2. In the Options box, click to select the Activate Antipassback Event option.

3. To save the Personnel record, click Save and Close.

86 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 87: 9000-Areas-Zones.pdf

Configuring Event Actions to Reset the OccupancyMode

Configuring Event Actions to Reset the Occupancy ModeYou can configure an Event with an Action to reset the current Occupancy Mode for an iSTARCluster Area—set by default by the original Occupancy configuration. Such an Event Action canchange an Area’s Occupancy mode to ‘Counting Only’, which cannot be set by the Areaconfiguration. In addition, you can use an Event Action to clear the Area counts for ‘All Personnel’and ‘Personnel Groups’.

To Configure Events to Set Occupancy Mode or Clear Area Count

1. Click Configuration to open the Configuration pane.

2. Select Event from the Configuration Pane drop-down list.

3. Click New on the Configuration Pane. The Event Editor opens.

a. Type a name for this Event in the Name field.

b. Type a Description in the Description field.

c. Click Enabled to make the Event available to C•CURE 9000 Operators.

4. On the Event General tab, choose the settings that you want for the Event.

5. Click the Action tab to open, as shown in Figure 15 on Page 88.

C•CURE 9000 Areas and Zones Guide Chapter 1 87

Page 88: 9000-Areas-Zones.pdf

Configuring Event Actions to Reset the OccupancyMode

Figure 15: Event Editor – Action Tab

6. On the Action tab, click Add to add an Action row.

7. Click the down-arrow in the Action field and then scroll down in the drop-down list to select theAction you want.

88 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 89: 9000-Areas-Zones.pdf

Configuring Event Actions to Reset the OccupancyMode

The Area field displays on the bottom of the screen.

8. Click in the Area field to display a selection list of all Areas currently configured in theC•CURE 9000 system, and then click to select the Area for which you want to change theOccupancy Mode, or clear the counts.

The system enters the name of the Area you select in the Details field for the row.

9. Select the Resettable check box if you want an operator responding to the Event to be able toreset the Action without acknowledging the Event.

The tab now appears as shown in the following example, and iSTAR Area1 will have itsOccupancy Mode changed to ‘Counting Only’ when this Event activates.

C•CURE 9000 Areas and Zones Guide Chapter 1 89

Page 90: 9000-Areas-Zones.pdf

Configuring Event Actions to Reset the OccupancyMode

90 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 91: 9000-Areas-Zones.pdf

Setting SystemVariablesThat Affect Areas

Setting System Variables That Affect AreasThree System Variables described in Table 18 on Page 91 have an impact on Areas functionality.

Category/SystemVariable

Description DefaultSetting

HardwareDriver

Next Card Maximum length of time (in seconds) allowed between card presentations for features thatrequire the presentation of multiple cards for access (into and out of MinimumOccupancyAreas,for example).

The valuemust be between 15 and 2147483147.

15

iSTARDriver

AlwaysTrackPersonnel

If True, the Area location of Personnel isalways tracked at the Controller/Panel.

If False, the Area location of Personnel isnot tracked at the Controller/Panel, unlessAntipassback is configured.

True

MinimumOccupancyExit Option

Enablespersonnel to exit an Area configured for restrictedMinimumOccupancy if the iSTARresets, which will reset the Area count to 0 (zero).

If True, the iSTAR permits the personnel inside the Area to exit.

If False, the iSTAR doesnot permit the personnel inside the Area to exit, unless the Area count isreset correctly.

In either case, the Areamayhave an incorrect count that should be reset manually

False

Table 18: SystemVariables that Affect Schedules

To Change the Value for an Area-related System Variable

1. In the Administration Station, on the Options & Tools pane, select System Variables.

2. On the General tab, expand the Hardware or iSTAR Driver category, as needed.

3. In the Name column, locate the system variable you want to update.

4. In the Value column, enter a new value.

C•CURE 9000 Areas and Zones Guide Chapter 1 91

Page 92: 9000-Areas-Zones.pdf

Viewing Area Location of Personnel

Viewing Area Location of PersonnelYou can view the current Area that Personnel are in by opening the default Dynamic View forPersonnel records on the Administration application.

To View a Person’s Current Area

1. In the Navigation Pane of the Administration Workstation, click the Personnel pane button.

2. Select Personnel from the Personnel pane drop-down list.

3. Click to open a Dynamic View listing all Personnel objects. (You can also click the down-arrow of this button to either view the list in the current tabbed view or open a new tabbedview).

Figure 16: PersonnelDynamicView List

• You can sort, filter, and group items in the list.

• You can right-click a Personnel record in the list to open the context menu (for information,see the Personnel chapter in the C•CURE 9000 Personnel Guide) and perform any of thefunctions on that menu. See the Dynamic Views chapter in the C•CURE 9000 Data ViewsGuide for more information on using Dynamic Views.

4. Right-click any column heading to open the following context menu with additional Personnelfields that can display as columns.

92 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 93: 9000-Areas-Zones.pdf

Viewing Area Location of Personnel

5. ClickMore Columns to open a dialog box listing all the other possible Personnel fields that candisplay as columns, as shown in the following figure.

6. Select Area Name and Area Access Time from the list and click OK on the top of the dialogbox.

The Personnel Dynamic View now includes a column for Area Name and Area Access Timepopulated with the current location for each person in the list and the time he/she entered theArea, as shown in Figure 17 on Page 94.

C•CURE 9000 Areas and Zones Guide Chapter 1 93

Page 94: 9000-Areas-Zones.pdf

Viewing Area Location of Personnel

Figure 17: PersonnelDynamicView with Area Location

94 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 95: 9000-Areas-Zones.pdf

Viewing Area Information on the Door Editor

Viewing Area Information on the Door EditorA Door assigned to an iSTAR Cluster Area displays read-only assignment information on the DoorEditor on the Areas & Zones tab, as shown in Figure 18 on Page 95.

NOTE If this Door is not assigned to an Area, the Areas box is blank.

Figure 18: Door Editor –- Areas&ZonesTab

The Areas & Zones tab has the read-only fields shown in on Page 95.

C•CURE 9000 Areas and Zones Guide Chapter 1 95

Page 96: 9000-Areas-Zones.pdf

Viewing Area Information on the Door Editor

Fields Description

EntryArea Name of Area to which thisDoor is an ‘Access In’Door.

Exit Area Name of Area to which thisDoor is an ‘AccessOut’Door.

Table 19: Door Editor –- Areas&ZonesTab Fields

To View a Door’s Area Information

1. In the Navigation Pane of the Administration Workstation, click the Hardware pane button.

2. Expand the Hardware Tree and navigate to the iSTAR Door whose information you want toview.

3. Select the Door and right-click to display the context menu.

4. Click Edit.

5. When the iSTAR Door Editor appears, click to open the Areas & Zones Tab and review theArea information.

96 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 97: 9000-Areas-Zones.pdf

Running RollCallReports

Running Roll Call ReportsC•CURE 9000 allows you to generate a Roll Call Report, a Software House pre-defined Report, thatlists all Personnel determined to be in specified Area(s) or Area Group(s). The Roll Call Report givesa view of where personnel are located at the time the report is started. This Report, which can assistin the emergency evacuations of buildings, can be initiated in different ways:

• Running Roll Call Reports from the Administration Report Dynamic View on Page 97.

• Running Roll Call Reports from the Monitoring Station Report Status List on Page 100

• Using an Event to Run a Roll Call Report on Page 101

C•CURE 9000 tracks the current location, or Area, of all Personnel as they move through Doorscontrolled by access Readers. This tracking is independent of the anti-passback restrictions of anArea, so anti-passback does not have to be enforced for Roll Call Reports to be used.

Area Groups, which can contain one or more Areas, also support the generation of Roll Call Reports(with the exception of the system default “All Areas” Group). An Area may be assigned to severalArea groups; the Areas assigned to an Area Group may also span multiple iSTAR Controllers. Forinformation on Area Groups, see the Groups chapter in the C•CURE 9000 Software Configuration Guideand Adding an iSTAR Cluster Area to a Group on Page 47.

NOTE The Roll Call Report (SWH20 - Roll Call) is one of the pre-definedReports provided by Software House. While you cannot alter theoriginal Report, you can make a copy of the Report and then modifyit to your liking. For information, see Appendix A in the C•CURE9000 Data Views Guide.

Running Roll Call Reports from the Administration Report Dynamic View

To Run a Roll Call Report from the Report Dynamic View

1. In the Navigation Pane of the Administration Workstation, click the Data Views pane button.

2. Click the Data Views drop-down list and select Report.

C•CURE 9000 Areas and Zones Guide Chapter 1 97

Page 98: 9000-Areas-Zones.pdf

Running RollCallReports

3. Click to open a Dynamic View listing all Reports, both the Software House pre-definedReports and Reports you’ve created. (You can also click the down-arrow of this button to eitherview the list in the current tabbed view or open a new tabbed view).

4. Use the right-hand scroll bar to scroll down through the list and find the Roll Call Report,SWH20 - Roll Call.

5. Double-click the Roll Call Report to run it as a new tab in the C•CURE 9000 content area.

- or -

Right-click the Roll Call Report to open the Report Context menu and take one of the followingactions:

• Click View to run the Roll Call Report as a new tab in the C•CURE 9000 content area.

• Click Popup View to run the Roll Call Report and view it in a separate popup window.

• Click View in Current Tab to run the Roll Call Report in the current tab in the C•CURE 9000content area (replacing the Reports Dynamic View).

• Click Run on Server to start the Roll Call Report running in the background. The finishedreport is saved and is accessible from the Report Result Dynamic View.)

NOTE A system variable in the Reporting category allows you to set limitson the maximum page count of the reports generated in yourC•CURE 9000 system. For information, see the System Variableschapter in the C•CURE 9000 System Maintenance Guide.

A Query Parameters dialog box appears, as shown in Figure 19 on Page 99. (For moreinformation about queries, see the Query chapter in the C•CURE 9000 Data Views Guide.)

98 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 99: 9000-Areas-Zones.pdf

Running RollCallReports

Figure 19: RollCallReport QueryParametersDialog Box

6. To view all the information about the query’s search criteria, click Show Query Detail.

7. Enter values for the Area Name and/or Area Group parameters and then click Execute Queryto retrieve data for the Report.

The progress of the report generation displays on the Status bar.

Once the status bar shows the number of records being processed, a Cancel Report button on thetop of the screen becomes available for use.

When the report processing is completed, the Roll Call Report appears on the Report Viewer, asshown in the example in Figure 20 on Page 100. The Cancel Report button disappears and theSave Result and Export Document buttons become available.

C•CURE 9000 Areas and Zones Guide Chapter 1 99

Page 100: 9000-Areas-Zones.pdf

Running RollCallReports

Figure 20: RollCallReport on Report Viewer

Running Roll Call Reports from the Monitoring Station Report Status List

To Run a Roll Call Report from the Monitoring Station

1. On the Explorer Bar of the Monitoring Station, click Reports in theNon Hardware Status Menu.

The Report Status List dialog box opens with a list of all Reports in the system, both theSoftware House canned Reports and Reports you’ve created.

2. Click the Data Views drop-down list and select Report.

3. Use the right-hand scroll bar to scroll down through the list and find the Roll Call Report.

100 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 101: 9000-Areas-Zones.pdf

Running RollCallReports

4. Right-click the Roll Call Report to open the Report Context menu and take one of the followingactions:

• Click Popup View to run the Roll Call Report and view it in a separate popup window.

• Click Run on Server to start the Roll Call Report running in the background. The finishedreport is saved and is accessible from the Report Result Dynamic View.)

NOTE A system variable in the Reporting category allows you to set limitson the maximum page count of the reports generated in yourC•CURE 9000 system. For information, see the System Variableschapter in the C•CURE 9000 System Maintenance Guide.

A Query Parameters dialog box appears, as shown in Figure 19 on Page 99. (For moreinformation about queries, see the Query chapter in the C•CURE 9000 Data Views Guide.)

5. To view all the information about the query’s search criteria, click Show Query Detail.

6. Enter values for the Area Name and/or Area Group parameters and then click Execute Queryto retrieve data for the Report.

The progress of the report generation displays on the Status bar.

Once the status bar shows the number of records being processed, a Cancel Report button on thetop of the screen becomes available for use.

When the report processing is completed, the Roll Call Report appears on the Report Viewer, asshown in the example in Figure 20 on Page 100.

Using an Event to Run a Roll Call Report

You can configure an Event with an Action that runs a Roll Call Report. For information, see“Scheduling a Report” in the Reports chapter in the C•CURE 9000 Data Views Guide.

C•CURE 9000 Areas and Zones Guide Chapter 1 101

Page 102: 9000-Areas-Zones.pdf

Gracing Personnel

Gracing PersonnelYou can choose to grace Personnel denied access to an antipassback Area from both theAdministration application and the Monitoring Station.

• Grace Personnel – applies to one or more selected persons.

• Grace All – applies to all Personnel in one or more selected Partitions. Since in an unpartitionedsystem, all Security Objects are in the ‘Default’ Partition, applying Grace All to the DefaultPartition graces all Personnel in the C•CURE 9000.

The methods for ‘gracing’ are as follows:

• Gracing Selected Personnel

• From the Administration Application – see Page 102

• From the Monitoring Station – see Page 103

• Gracing All Personnel

• From the Administration Application – see Page 104

• From the Monitoring Station – see Page 105

• Using an Event – see Page 106

To Grace Selected Personnel from the Administration Application

1. In the Navigation Pane of the Administration Workstation, click the Personnel pane button.

2. Select Personnel from the Personnel pane drop-down list.

3. Click to open a Dynamic View listing all Personnel objects, as shown in the examples inFigure 16 on Page 92 and Figure 17 on Page 94. (You can also click the down-arrow of thisbutton to either view the list in the current tabbed view or open a new tabbed view).

4. Click to select one or more Personnel in the list and then right-click to display the Context menuas follows:

102 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 103: 9000-Areas-Zones.pdf

Gracing Personnel

5. Click Grace Personnel.

The selected Personnel are graced, which displays on the Monitoring Station Activity Viewer asfollows:

To Grace Selected Personnel from the Monitoring Station

1. Open the Swipe & Show Viewer of the Monitoring Station, as shown in Figure 21 on Page 103.

Figure 21: Monitoring Station Swipe &Show Viewer

- or -

C•CURE 9000 Areas and Zones Guide Chapter 1 103

Page 104: 9000-Areas-Zones.pdf

Gracing Personnel

On the Monitoring Station Activity Viewer in rows showing Personnel accesses, click to select arow, and right-click to display the context menu, as shown in the following example.

2. Click the Grace Personnel button on the Swipe & Show Viewer.

- or -

Click Grace Personnel on the Activity Viewer context menu.

To Grace ‘All’ Personnel from the Administration Application

1. In the Navigation Pane of the Administration Workstation, click the Configuration pane button.

2. Select Partition from the Configuration pane drop-down list.

3. Click to open a Dynamic View with all the Partition Objects your Privileges allow you tosee. (You can also click the down-arrow of this button to either view the list in the current tabbedview or open a new tabbed view).

4. Click to select one or more Partitions in the list and then right-click to display the Context menuas shown in the following example:

104 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 105: 9000-Areas-Zones.pdf

Gracing Personnel

5. Click Grace All.

All the Personnel in the selected Partition, Partition A, are graced. (If the system was notpartitioned, only the Default Partition would display in the list. In that case, the commandwould grace all system Personnel.)

To Grace ‘All’ Personnel from the Monitoring Station

1. Open the Swipe & Show Viewer of the Monitoring Station and click to open the Grace Partitiontab, as shown in Figure 22 on Page 105.

Figure 22: Monitoring Station Swipe &Show Viewer – Grace Partition Tab

C•CURE 9000 Areas and Zones Guide Chapter 1 105

Page 106: 9000-Areas-Zones.pdf

Gracing Personnel

2. Click to select one or more Partitions in the list and then right-click to display the Context menuas shown in the following example:

3. Click Grace All.

All the Personnel in the selected Partition, Partition A, are graced. (If the system was notpartitioned, only the Default Partition would display in the list. In that case, the commandwould grace all system Personnel.)

To Grace ‘All’ Personnel Using an Event

1. Configure an event with an appropriate name and description according to the information inthe Events chapter in the C•CURE 9000 Software Configuration Guide.

2. Click to open the Action tab, as shown in Figure 23 on Page 107.

106 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 107: 9000-Areas-Zones.pdf

Gracing Personnel

Figure 23: Event Editor Action Tab

3. Click Add to create a new Action row.

a. Click the down-arrow in the Action field to display a drop-down list containing availableActions. Use the scroll bar to scroll down to find Grace All and click to add it to the row asthe Action that will be executed by this Event.

Once you select Grace All, the Partition field displays on the bottom of the tab.

C•CURE 9000 Areas and Zones Guide Chapter 1 107

Page 108: 9000-Areas-Zones.pdf

Gracing Personnel

b. Click in the Partition field to display a selection list of all Partitions currently configuredin the C•CURE 9000 system, and then click an Partition to select it.

When you click anywhere outside the Partition field, the system enters the name of thePartition you selected in the Details field for the row.

The Grace All Action will be applied to all Personnel in the selected Partition, Partition A,whenever this Event is activated. (If the system was not partitioned, only the Default Partitioncould be selected. In that case, the command would grace all system Personnel.)

c. Leave the Resettable check box unselected. Resetting an Event Action is not applicable to aGrace All Action.

4. Finish configuring the other appropriate settings for this Event, remembering to select theEnabled check box to activate the Event.

108 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 109: 9000-Areas-Zones.pdf

Viewing Area Statuswith Map Icons

Viewing Area Status with Map IconsTheMap Editor in C•CURE 9000, as shown in the example in Figure 24 on Page 109, lets youdisplay your facility's floor or site plan and place clickable icons that permit you to monitor the stateof iSTAR Areas and, if desired, their related Doors.

Figure 24: MapEditor with Area and Door Icons

For detailed information on creating Maps, see the Maps chapter in the C•CURE 9000 Data ViewsGuide and the “Adding an Object Icon to the Map” section in particular.

TheMap Viewer, accessed from the context menu that displays when you right-click a specific Maprow in either the Maps Dynamic View on the Administration Application or the Maps Status Liston the Monitoring Station, allows you to view such a Map in real time. The Area and Door icons onthe Map show the current status of the Objects they represent, as shown in the example in Figure 25on Page 110.

C•CURE 9000 Areas and Zones Guide Chapter 1 109

Page 110: 9000-Areas-Zones.pdf

Viewing Area Statuswith Map Icons

Figure 25: MapPopup View with Area and Door Icons

You can also right-click any icon on theMap Popup View to display another context menu pertinentto the specific Object type, as shown in the example for the Area icon in Figure 26 on Page 111 (if theShow context menu on right click option was selected in theMaps Icon Properties dialog box whenyou configured the Map).

110 Chapter 1 C•CURE 9000 Areas and Zones Guide

Page 111: 9000-Areas-Zones.pdf

Viewing Area Statuswith Map Icons

Figure 26: MapPopup View with Area Icon Context Menu

The iSTAR Cluster Area icon context menu has the same options as the context menu for iSTARCluster Areas in the Dynamic View, described in Table 2 on Page 38.

C•CURE 9000 Areas and Zones Guide Chapter 1 111

Page 112: 9000-Areas-Zones.pdf

112 Chapter 1 C•CURE 9000 Areas and Zones Guide

Viewing Area Statuswith Map Icons

Page 113: 9000-Areas-Zones.pdf

2

Chapter 2 - iSTAR Intrusion Zones

This chapter includes conceptual information about iSTAR Intrusion Zones and describes theprocedures you use to create them.

In this chapter

• Introduction 114• iSTAR Intrusion Zone Modes and States 115• Controlling Intrusion Zone Mode 119• iSTAR Intrusion Zone Configuration Steps 136• Basic Intrusion Zone Tasks 139• iSTAR Intrusion Zone Editor 153• iSTAR Intrusion Zone General Tab 154• iSTAR Intrusion Zone Inputs Tab 162• iSTAR Intrusion Zone Arm - Disarm Tab 169• iSTAR Intrusion Zone Triggers Tab 178• iSTAR Intrusion Zone Groups Tab 185• iSTAR Intrusion Zone Status Tab 187• iSTAR Intrusion Zone State Images Tab 189• State Images Tab Tasks 190• Configuring a Person to Arm/Disarm Intrusion Zones 191• Viewing Intrusion Zone Information on the Door Editor 193• Viewing Intrusion Zone Information on the Input Editor 195

C•CURE 9000 Areas and Zones Guide Chapter 2 113

Page 114: 9000-Areas-Zones.pdf

Introduction

IntroductionAn iSTAR Intrusion Zone is a user-defined group of Doors and Inputs on the same local Controllerthat delineates a physical area monitored for alarms—thus protecting that area. The Inputs youassign to an iSTAR Intrusion Zone—such as motion detectors, glass break sensors, etc.—monitorsecurity inside the zone. The Doors you assign to an iSTAR Intrusion Zone define the entrance andexit points for the zone.

Grouping Doors and Inputs into an iSTAR Intrusion Zone allows easy Arming and Disarming ofgroups of alarm monitoring points (Inputs), as well as Locking and Unlocking groups of doors,while displaying their current mode and status. The local Controller is responsible for monitoringthe Doors and Inputs, reporting the state of the Intrusion Zone as a whole, and controlling the Dooraccess modes and Input Arm/Disarm states. The use of Intrusion Zones is optional.

In addition Triggers can be defined to link the Intrusion Zone’s current mode and status (such aswhen a zone is violated) to Events whose Actions sound an alarm or send an e-mail or page, forexample.

114 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 115: 9000-Areas-Zones.pdf

iSTAR Intrusion ZoneModesand States

iSTAR Intrusion Zone Modes and StatesAn Intrusion Zone is always in one of two modes:

• Armed

• Disarmed

An iSTAR Intrusion Zone in Armed mode can be in either of the following two states:

• Violated

• Not Violated

Regardless of its Mode and Violated state, an iSTAR Intrusion Zone’s Ready To Arm State may beeither:

• Ready to Arm

• Not Ready to Arm – the iSTAR Intrusion Zone has offnormal Inputs or open Doors (whether it isArmed or Disarmed)

You can view the mode/state of an iSTAR Intrusion Zone in three places:

• Administration application

• iSTAR Intrusion Zone Dynamic View – see Viewing Intrusion Zone Status on the DynamicView on Page 149.

• iSTAR Intrusion Zone Editor Status tab– see Viewing Intrusion Zone Status on the Status Tabon Page 187

• Monitoring Station: Explorer Bar>Non-Hardware Status> Intrusion Zones>Status List - iSTARIntrusion Zones – see the Monitoring Status chapter in the C•CURE 9000 Monitoring StationGuide.

Armed

If the zone is Armed, the area is protected. You cannot enter an Armed Intrusion Zone without usingDoors, activating Inputs, and causing an Intrusion Zone Violation.

When you arm an Intrusion Zone, the iSTAR reports the Armed status to the C•CURE server. If theArming method included presenting a card, the hardware reports the Personnel access. The iSTARalso reports tamper, input supervision errors, and communication failures.

C•CURE 9000 Areas and Zones Guide Chapter 2 115

Page 116: 9000-Areas-Zones.pdf

iSTAR Intrusion ZoneModesand States

For five seconds after an Intrusion Zone is armed, the zone’s readers display “Area Armed” in theLCD area. This message is followed by the current date and time. If there is an Event assigned to theArmed mode, the iSTAR activates the Event while the Intrusion Zone is Armed.

Disarmed

If the zone is Disarmed, the Inputs assigned to that Intrusion Zone do not generate Intrusion ZoneViolations when activated (when people enter the zone, for example).

When you disarm an Intrusion Zone, the iSTAR reports the Disarmed status to the C•CURE server.If the Disarm method included presenting a card, the hardware reports the Personnel access. For fiveseconds after an Intrusion Zone is disarmed, the system displays Disarm status messages on allReaders within the zones. If there is an Event assigned to the Disarmed mode, the iSTAR activatesthe Event while the Intrusion Zone is Disarmed.

The iSTAR processes access requests at the Intrusion Zone Doors during the Disarmed state. You cangain access at the locked Doors through the usual means: valid card, valid card and pin, or RTE.The iSTAR also reports tamper, input supervision errors, and communication failures.

Violated

An Intrusion Zone changes from Normal to Violated when the system detects an Intrusion ZoneViolation. Violations include:

• Hardware tamper or communication failure

• Supervision errors for Intrusion Zone Inputs or tamper Inputs

• Inputs that activate while the zone is armed. (If the zone is disarmed within the entrance delay,the Violation does not occur.)

• Doors that open while the zone is armed. (If the zone is disarmed within the entrance delay, theViolation does not occur.)

When the system detects an Intrusion Zone Violation, the iSTAR changes the status of the IntrusionZone to Violated and notifies C•CURE 9000 of the Violation. The server records the Violation in thejournal and generates an activity message at the Monitoring Station.

116 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 117: 9000-Areas-Zones.pdf

iSTAR Intrusion ZoneModesand States

If the Intrusion Zone includes an action, such as flashing lights, configured on the Triggers tab forthe Event to be activated if the Zone is in a Violated state, the system initiates the action while theIntrusion Zone is Violated.

The Intrusion Zone status remains Violated—whether or not the object causing the Violation returnsto the Normal state—until you change the mode of the Intrusion Zone to Armed or Disarmed.

You can change the mode to Armed via key-press/active input and card swipe, Keypad CommandAction, or an Arm selected Direct Action from the Administration application Dynamic View orMonitoring Station Status List.

You can only disarm a Violated iSTAR Intrusion Zone if you have selected the Allow Disarm WhileViolated option on the iSTAR Intrusion Zone Arm - Disarm tab. (If this option is not selected, youmust first clear the Violation by deactivating the appropriate Inputs and re-arming the zone, or byforce-arming the zone.

You can change the mode to Disarmed via card swipe, key-press/active input and card swipe,Keypad Command Action, or a Disarm selected Direct Action from the Administration applicationDynamic View or Monitoring Station Status List.

For instructions on Arming and Disarming a zone, see Controlling Intrusion Zone Mode on Page119.

Ready to Arm/Not Ready to Arm

The status of the Intrusion Zone may be either Ready to arm or Not ready to arm.

Ready to Arm

The intrusion zone is ready to arm when:

• All objects assigned to the Intrusion Zone are in a Normal state

• Intrusion Zone Inputs are not active

• Intrusion Zone Doors are closed

You can arm an Intrusion Zone whose status is Ready to arm.

Not Ready to Arm

The status of an Intrusion Zone is Not ready to arm when:

C•CURE 9000 Areas and Zones Guide Chapter 2 117

Page 118: 9000-Areas-Zones.pdf

iSTAR Intrusion ZoneModesand States

• Any object assigned to the Intrusion Zone is not functioning normally

• An Intrusion Zone Input is active

• An Intrusion Zone Door is open

When the Intrusion Zone status is Not ready to arm, you cannot change the mode of the zone fromDisarmed to Armed unless you use the “force armed” feature.

You can force arm an intrusion zone with a normal Event Action, a local Keypad Command Action,or a Direct Action from the Administration application Dynamic View or Monitoring Station StatusList. A force arm is necessary when one or more Intrusion Zone Inputs are active, causing a Notready to arm state. You can also force arm an Intrusion Zone, to intentionally disregard an activemonitoring point.

118 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 119: 9000-Areas-Zones.pdf

Controlling Intrusion ZoneMode

Controlling Intrusion Zone ModeThe Arming/Disarming mode of an iSTAR Intrusion Zone can be controlled by the followingmethods, illustrated in Figure 27 on Page 119:

• Card Control

• Event Control

• C•CURE 9000 Events

• Keypad Command Events

• Monitoring Station Manual Event Activation

• Manual Control (Direct Actions from Monitoring Station)

Figure 27: Controlling iSTAR Intrusion ZoneModes

C•CURE 9000 Areas and Zones Guide Chapter 2 119

Page 120: 9000-Areas-Zones.pdf

Controlling Intrusion ZoneMode

When the Intrusion Zone is armed, all the Intrusion Zone Inputs are armed, Intrusion Zone Doorsare set to an armed state, and the Intrusion Zone’s Trigger-linked armed Event is active. If IntrusionZone Inputs activate while the Intrusion Zone is armed and the Intrusion Zone is not disarmedbefore the Entrance Delay expires, the Intrusion Zone goes into a Violated state and triggers theviolated event.

When the Intrusion Zone is disarmed, all Intrusion Zone Inputs (except for Protected Inputs) aredisarmed, Intrusion Zone doors are set to a disarmed state, and the Intrusion Zone’s Trigger-linkeddisarmed Event is active.

If Inputs activate while the Intrusion Zone is armed or disarmed, the Intrusion Zone becomes not-ready-to-arm and triggers the not-ready-to-arm event.

The various methods can be combined.

Example:

You can arm an Intrusion Zone via Card Control—a card read, but disarm it with EventControl—an event triggered by a Keypad Command.

Card Control

Card Control provides the methods shown in Table 20 on Page 120 to arm or disarm a zone.

Disarm Arm

CredentialOnly (with valid Clearance) Key-press* and Credential (with valid Clearance)

Credential (with valid Clearance) and Active Input** Active Input** and Credential (with valid Clearance)

Credential (with valid Clearance) and PersonnelGroup Key-press*, Credential (with valid Clearance), andPersonnelGroup

Credential (with valid Clearance), Active Input**, andPersonnelGroup

Active Input**, Credential (with valid Clearance), andPersonnelGroup

*To key-press, press the CMD/ENT key twice; and then present a valid Credentialwithin ten seconds.

**AnActive Input is anyavailable input of the iSTAR. It is common to use a key-activated switch as the Active Input. The switchmust be active prior to the presentation of the Credential.

Table 20: Card ControlOptions

120 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 121: 9000-Areas-Zones.pdf

Controlling Intrusion ZoneMode

When arming or disarming an Intrusion Zone by Card Control, the behavior of the zone and theDoor is affected by the location of the Reader, whether outside the zone or inside the zone.

When the Intrusion Zone is armed from an outside Reader, the door strike is not activated when thevalid Credential is read. The system determines that the zone is being armed because either theActive Input is active or CMD/ENT has been pressed twice (a key-press). Since you are alreadyoutside the Intrusion Zone, there is no need to activate the door strike. If you arm the Intrusion Zonefrom an inside Reader, then the door strike does activate.

Example:

Figure 28 on Page 121 illustrates the use of the Door State Monitor (DSM) when controlling anIntrusion Zone by card control:

• The diagram begins with the zone armed.

• A person then disarms the Intrusion Zone using card control atReader 1. (Notice that when the door opens after the valid card read, the zone immediatelydisarms.)

• Later, the person arms the Intrusion Zone from the inside using card control at Reader 2.(Notice that the Intrusion Zone does not arm until the person leaves the Intrusion Zone byopening and then closing the door.)

Figure 28: Use of a Door StateMonitor with Card Control

C•CURE 9000 Areas and Zones Guide Chapter 2 121

Page 122: 9000-Areas-Zones.pdf

Controlling Intrusion ZoneMode

For more information about outside/inside Readers, see Door Behavior for Entrance and Exit Doorson Page 134.

When card control is used, the person must have a valid Clearance at the door where the card ispresented. As documented in Table 20 on Page 120, card control can be further qualified by requiringthe person to be a member of a particular Personnel Group.

NOTE Personnel designated as Intrusion Zone Administrators do not haveto be included in the required Personnel Group, but must have validClearance at the door. For more information, see Configuring aPerson to Arm/Disarm Intrusion Zones on Page 191.

Event Control

There are Event Actions that control the mode of iSTAR Intrusion Zones. Some can be used by anyEvent and others are restricted to Keypad Command Events.

The Event Actions in the following list can be used by any Event and can control any of the iSTARIntrusion Zones. They can be either Cluster- or Host-based, unless they are linked to a KeypadCommand—in which case they must be downloaded to an iSTAR Controller in a Cluster.

• Arm Intrusion Zone

• Disarm Intrusion Zone

• Force arm Intrusion Zone

• Toggle Intrusion Zone mode

The Event Actions in the following list are restricted to Keypad Commands. These actions must bedownloaded to the iSTAR Controller where the Intrusion Zone is configured. The Keypad Readermust be associated with a Door that is part of the Intrusion Zone.

• Show Intrusion Zone Offnormal Points

• Show Intrusion Zone Status

• Arm Local Intrusion Zone

• Disarm Local Intrusion Zone

• Force Arm Local Intrusion Zone

122 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 123: 9000-Areas-Zones.pdf

Controlling Intrusion ZoneMode

• Show Local Intrusion Zone Offnormal Points

• Show Local Intrusion Zone Status

• Toggle Local Intrusion Zone

Event Caused by Schedule

A Schedule can be configured to cause an Event that can automatically control the Intrusion Zonebased on date and time.

Example:

Disarming an Intrusion Zone during normal work hours.

Controlling Intrusion Zones with Schedules is different from controlling other C•CURE 9000 Objects.Arming/disarming is done on the leading edge of the Schedule Event. The arm state does not followthe state of the Schedule or the Event.

Use a one-minute Schedule-caused Event to arm the Intrusion Zone and another one-minuteSchedule-caused Event to disarm it, as shown in the example in Figure 29 on Page 123.

Figure 29: Scheduled Events controlling Intrusion ZoneMode

Event Caused by an Input

Any Input (except those with a special use, such as a Door State Monitor) can be used to activate anEvent which then controls the Intrusion Zone. For instance, a switch inside the Intrusion Zone canbe used to toggle the Intrusion Zone between the armed and disarmed states. If an Input is used inthis way, the Intrusion Zone configuration permits Entrance and Exit Delays to allow time to get inor out of the Intrusion Zone before an alarm is triggered.

C•CURE 9000 Areas and Zones Guide Chapter 2 123

Page 124: 9000-Areas-Zones.pdf

Controlling Intrusion ZoneMode

Event Caused by Another Event

C•CURE 9000 Event capability permits linking other Events to the Events that control the IntrusionZone.

Example:

The Intrusion Zone can be immediately armed and secured if a duress condition or door forcedalarm occurs anywhere in the building.

Event Caused by a Keypad Command

Use the Keypad Command capability of the C•CURE 9000 to activate Events that control IntrusionZones from Reader Keypads.

An important point to understand about Keypad Command Events is that these events live untiloverridden. An action is required to undo or override a Keypad Command Event. Software Houserecommends constructing Keypad Commands in pairs; use one Keypad Command to activate anObject, and another Keypad Command to deactivate the Object.

There are various ways these Keypad Command pairs can be configured.

Any event caused by a Keypad Command must be downloaded to an iSTAR Controller that is partof the same Cluster where the Intrusion Zone is configured.

It is also possible to activate Events in another Cluster by using ‘indirection’—have the KeypadEvent activate an Event in the Cluster which then activates a further Event that is in either the Hostor another Cluster.

Local – Some Intrusion Zone Event Actions are local—the Keypad Command must come from aReader on a Door in the Intrusion Zone. The Event triggered by that Keypad Command must bedownloaded to the iSTAR Controller that includes the Intrusion Zone.

Manual Event Activation from the Monitoring Station

Any Event can be activated from the Monitoring Station by a Manual Action. You define the timeand date the activation will start and end.

NOTE Remember that the arming and disarming is edge-triggered, so youwant one Event to arm the Intrusion Zone and another Event todisarm the Intrusion Zone.

124 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 125: 9000-Areas-Zones.pdf

Controlling Intrusion ZoneMode

Direct Action at the Monitoring Station

You can manually Disarm, Arm, or Force-arm a selected Intrusion Zone from the Monitoring StationStatus List for Intrusion Zones. These actions do not need a start/end date and time. If the Action isallowed, it occurs immediately.

Some situations where such an action is or is not allowed follow:

• You cannot Disarm an armed Intrusion Zone that is in violation unless the Allow Disarm WhileViolated option is selected (see iSTAR Intrusion Zone Arm - Disarm Tab on Page 169).

• You cannot Arm a disarmed Intrusion Zone if the Intrusion Zone is not ready to arm (theIntrusion Zone contains one or more activated Inputs). However, in such a situation you canForce-arm the Intrusion Zone. When an Intrusion Zone is force-armed, the latter inputs do notcause a violation, but continue to cause a not ready to arm state.

Inputs

An iSTAR Intrusion Zone can have three types of Inputs:

• Controlled Inputs

• Protected Inputs

• Monitored Inputs

Controlled Inputs

These are the regular inputs that are configured to be part of the Intrusion Zone. These Inputs areconfigured to be armed and disarmed as the Intrusion Zone is armed and disarmed. The IntrusionZone monitors these Inputs and does not allow arming if they are active, and if these Inputs becomeactive while the Intrusion Zone is armed, the zone becomes Violated.

Protection Inputs

These Inputs are configured to be monitored by an Intrusion Zone without being disarmed andarmed by the zone. The Intrusion Zone monitors these Inputs and does not allow normal arming ifthey are active. These Inputs are not controlled by the Intrusion Zone, nor are they normal monitoredInputs of the zone. However, these Inputs are configured as part of the Intrusion Zone and have

C•CURE 9000 Areas and Zones Guide Chapter 2 125

Page 126: 9000-Areas-Zones.pdf

Controlling Intrusion ZoneMode

option flags set to indicate that they are protection Inputs. If these Protection Inputs become activewhile the Intrusion Zone is armed, the zone becomes Violated.

Monitored Inputs

These Inputs, which are monitored by the Intrusion Zone but not armed or disarmed by theIntrusion Zone, are not specifically configured as part of the Intrusion Zone—they are not in theIntrusion Zone selected Inputs list. Instead, these Inputs are automatically derived from theController, Doors, Arm/Disarm Inputs, Protection Inputs, and Controlled Inputs that are configuredfor the Intrusion Zone. The Monitored Inputs monitor the health of the Intrusion Zone’s configuredControlled/Protection Inputs and Doors. The list of Monitored Inputs includes the Controller cabinettamper and all the tampers and comm fail Inputs for the Hardware that controls the Inputs andDoors configured to be in the iSTAR Intrusion Zone, as well as supervision errors for all IntrusionZone Hardware.

Activation of these Inputs causes an armed Intrusion Zone to become violated and prevents normalIntrusion Zone arming. Force arming over an active Monitored Input allows the Intrusion Zone toarm, without affecting the state of the Monitored Input. Subsequent new activation of the MonitoredInput causes the armed zone to become violated.

When Monitored Inputs are activated, they appear on the Reader LCD of Intrusion Zone Doors ifthese Doors are configured for ‘Status’ display mode.

The following list includes all the groups of Inputs that are monitored by iSTAR Intrusion Zones:

NOTE Most of the Monitored Inputs cannot be removed from the IntrusionZone Monitored Inputs list, but if the Input is not configured in thesystem at all, then the physical/logical Input will not be monitoredby the Intrusion Zone.

The first two Monitored Inputs in the list, the iSTAR cabinet tamperand the door open state for the Doors, have special behavior. Theothers from #3 onward have the common behavior of preventingarming and causing immediate violation of an armed IntrusionZone.

1. iSTAR Cabinet Tamper – The cabinet tamper for the iSTAR Controller is a Monitored Input forall Intrusion Zones on that iSTAR. This is the only such Input that can be removed from the

126 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 127: 9000-Areas-Zones.pdf

Controlling Intrusion ZoneMode

Monitored Input list through a system variable. (For information, see the “iSTAR Driver” sectionin the System Variables chapter in the C•CURE 9000 System Maintenance Guide.)

2. Door Open Status – This is the door open state for Doors configured to be part of the iSTARIntrusion Zone. An open Door prevents normal arming. A Door on an armed Intrusion Zonethat opens either starts an entrance delay or if there is no entrance delay, causes the IntrusionZone to be violated.

3. DSM/RTE Supervision Errors – Supervision errors on DSMs and RTEs for Doors configured tobe part of the Intrusion Zone.

4. Controlled Input Supervision Errors – Supervision errors for Controlled Inputs that are part ofthe Intrusion Zone.

5. Other Inputs – Supervision errors for the arm/disarm Inputs that may be configured for theIntrusion Zone.

6. Reader Tamper and Reader Comm. Fail – Reader tamper and reader comm. fail Inputs—ifconfigured—for Readers on Doors that are in the Intrusion Zone. Also includes:

• Reader tamper and reader comm. fail Inputs—if configured—for Readers that containControlled Inputs for the Intrusion Zone even if the Reader is not on any Door or is on a Doorthat is not part of the Intrusion Zone.

• Reader tamper and reader comm. fail Inputs—if configured—for Readers that contain any armor disarm Inputs for the Intrusion Zone or for Readers that may contain any advanced doormonitoring Inputs for Doors controlled by the Intrusion Zone.

• Reader tamper and reader comm. fail Inputs for Readers that may contain any Outputs usedby Doors controlled by the Intrusion Zone.

7. I/8 Input Board Tamper and Comm. Fail – Tamper and comm. fail Inputs—if configured—forI/8 Input boards that contain Controlled Inputs for the Intrusion Zone. Also includes I/8 InputBoard Tamper and Comm. Fail Inputs for I/8 boards that contain Intrusion Zone arm/disarmInputs.

8. R/8 Output Board Tamper and Comm. Fail – Tamper and comm. fail Inputs—if configured—forR/8 Output boards that contain any Outputs used by Doors controlled by the Intrusion Zone.

9. Tamper and Comm. Fail for Protection Inputs – the tamper and comm. fail inputs—ifconfigured—for the Readers and I/8 Input boards that contain the Protection Inputs.

10. Protection Input Supervision Errors – Supervision errors of Protection Inputs are also treated asMonitored Inputs.

C•CURE 9000 Areas and Zones Guide Chapter 2 127

Page 128: 9000-Areas-Zones.pdf

Controlling Intrusion ZoneMode

on Page 125 shows a basic iSTAR Intrusion Zone with two doors and six Inputs. The Inputs areswitch contacts that indicate situations such as glass breakage, motion sensing, etc.

• If any Input is active (excluding an entrance delay or a shunt) when the Intrusion Zone isarmed, there is a violation.

• If any Input is active when the Intrusion Zone is disarmed, the zone is considered to be notready to arm.

Figure 30: Example of iSTAR Intrusion Zone: TwoDoorsand Six Inputs

A Controlled Input can optionally be configured either to be shunted during an entrance delay or tobe shunted and also to trigger an entrance delay.

Shunt Example:

When a switch inside the Intrusion Zone controls arming and disarming and the switch area ismonitored by a motion sensor, you would want the motion sensor (Input) to be shunted duringthe entrance delay.

Entrance Delay Example:

128 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 129: 9000-Areas-Zones.pdf

Controlling Intrusion ZoneMode

When a perimeter Door of the Intrusion Zone is either key-operated or has a combination lock,you would want an Input monitoring the Door to trigger an entrance delay. This would allow aperson time to disarm the Intrusion Zone after entering. This Input would also be shuntedduring the entrance delay.

Protection Input Example:

The Glass Break Sensor Inputs #1 and #2 are Protected Inputs that are always armed (24/7).They are never shunted during an entrance delay, nor do they trigger an entrance delay.

• If these Protected Inputs activate while the Intrusion Zone is armed, the zone becomesviolated.

• If these Protected Inputs activate while the Intrusion Zone is disarmed, the Inputs report theirInput state and the zone becomes not ready to arm.

Intrusion Zone Status Triggers

Triggers allow you to configure the activation of Events that both display the Intrusion Zone modeand respond to the state of the Intrusion Zone. The Events can be configured to activate when theiSTAR Intrusion Zone is in the following modes/states:

• While disarmed

• While armed

• When ready to arm

• When not ready to arm

• When violated

• When not violated

You can also configure a Trigger (‘arm check status’) that activates an Event if it finds that theIntrusion Zone is not armed during a specified Schedule.

Events indicating an Armed or Disarmed mode are usually used to activate status indicators thatindicate the Intrusion Zone’s mode.

A Not ready to arm state exists when the zone is disarmed and any Input in the zone is active. TheNot ready to arm state is asserted even when an approved person opens the door. A typical use ofthe event is to activate an indicator light.

C•CURE 9000 Areas and Zones Guide Chapter 2 129

Page 130: 9000-Areas-Zones.pdf

Controlling Intrusion ZoneMode

A Zone violated state can use an event to sound an alarm and cause other actions in response to theviolation.

Some of these Events may be either Panel-based (Controller) or Host-based; Others are either Hostonly or Panel only. The actions of these events can link to any system Objects, Events, or iSTARClusters.

Table 21 on Page 130 shows the effect of off normal points on the not ready to arm and violatedEvents. The Property Value: Violated column indicates if the Intrusion Zone is in violation after anyentrance or exit delay expires.

Case Intrusion ZoneMode

Any Off Normal Points Property Value:Ready to Arm*

Property Value:Violated**

1 Armed No Yes No

2 Disarmed No Yes No

3 Armed Yes No Yes

4 Armed Not now, but one existedpreviously

Yes Yes

5 Disarmed Yes No No

6*** Force Armed Input(s) active when Forcearmed, remain active.

No No

7*** Force Armed Input(s) active when Forcearmed, remain active.Additional input(s) active.

No Yes

*A ready to armstatemeans that no Inputs are off normal.

**A violated statemeans that at least one Input is active or wasactive. This state can only occur with the Intrusion ZoneinArmedmode.

Table 21: Intrusion ZoneMode and Effect of Off NormalPoints

130 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 131: 9000-Areas-Zones.pdf

Controlling Intrusion ZoneMode

Case Intrusion ZoneMode

Any Off Normal Points Property Value:Ready to Arm*

Property Value:Violated**

***Cases6-7 explain a Force Armed situation. You can force arm an Intrusion Zone with a normalEvent Action, aLocalKeypad Command Action, or a Direct Action from theMonitoring Station. A force arm is necessarywhen one ormore Intrusion Zone Inputs are active due to a fault, causing a not ready to armstate.

• In case 6, with the Intrusion Zone force armedwith an active Input, the zone is inArmedmode, in a not ready toarmstate, and not violated. If the active Input goesnon-active, the not ready to armstate will deactivate. Theeffect of force arming is to ignore anyactive Inputs at the time of the force arm for the purpose of indicating aviolation.

• In case 7, the Intrusion Zone is force armedwith an active Input as in case 6, but another Input goesactive;therefore, the Intrusion Zone is inArmedmode, in a not ready to armstate, and isviolated.

Doors

When configuring the doors that define an iSTAR Intrusion Zone, you must consider the values forthe following optional fields:

• Arm state and Disarm state

• Card Control

• Display

• Entrance or Exit Door

Arm Mode and Disarm Mode

When an Intrusion Zone is in either the Armed or Disarmed mode, an

Intrusion Zone Door has three possible states.

In Armed mode - The three possible Door states are:

• Locked – The Door is locked. A Card access with a valid Clearance is required to enter. If a cardis presented, it must immediately disarm the zone by Card control or coincide with a disarm ofthe Intrusion Zone by other methods within the Entrance Delay Time.

• Secured – The Door is secured. The Door Reader does not allow a card access, but can be usedfor Card control and Keypad Commands. The Door status must be changed to Locked or

C•CURE 9000 Areas and Zones Guide Chapter 2 131

Page 132: 9000-Areas-Zones.pdf

Controlling Intrusion ZoneMode

Unlocked before it can be used for access. Typically, Disarming the Intrusion Zone changes theDoor to Locked or Unlocked.

• Unlocked – It is unlikely to want a perimeter Door of the Intrusion Zone left unlocked. However,there could be a Door within the Intrusion Zone that is left unlocked for safety reasons.

In Disarmed mode - The three possible door states are:

• Locked – The Door is locked. A card access with a valid Clearance is required.

• Secured – The Door is secured. The Door Reader does not allow a card access, but can be usedfor card control and Keypad Commands. Before the Door can be used for access, its state mustbe changed to “Locked” or “Unlocked”.

NOTE This state is not often used in a Disarmed Intrusion Zone. Therecould, however, be a case where a Door within the zone leading to astore room (or something similar) is left secured even though theIntrusion Zone is Disarmed.

• Unlocked – The Door is open. No card access is required.

Card Control

This option controls whether the Card control methods, described in Card Control on Page 120, areallowed at this Door.

If Card control methods are configured, Card reads are allowed even if the Door state is unlocked orsecure. In the latter cases, the card reads are not used for access but for Card swipe arm/disarm ofthe Intrusion Zone. If the system determines that the Card read is not being used for arm or disarm,the Card reads will be ignored.

Display

This option controls whether or not status information about this Intrusion Zone is shown on theLCD display on the door reader(s).

• Display flag is set to blank. The first line of the Reader’s LCD shows date and time, while thesecond line momentarily shows or mode change status/access control messages.

• Display flag is set to Status. The first line of the Reader’s LCD shows date and time, while thesecond line alternates between normal door modes/actions, Intrusion Zone modes/actions, and

132 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 133: 9000-Areas-Zones.pdf

Controlling Intrusion ZoneMode

off normal point(s)—if there are any. If there is more than one off normal point, each successivedisplay shows the next one in sequence.

Figure 31 on Page 133 illustrates a situation where Input number 4 of the first I8 board is active.

Figure 31: Sample of LCD Second Line StatusDisplay– with Off NormalPoint

Entrance/Exit Door

Whether a Door is an Entrance or an Exit Door relates to whether or not the inbound Reader of theDoor leads into the Intrusion Zone.

The purpose is to allow the Intrusion Zone to decide whether a person is physically inside or outsideof the zone.

• If they are outside when they disarm the zone, then the Door strike needs to be opened.

• If they are outside when they arm the zone, there is no need to activate the strike.

In most cases, the inbound Reader leads into the Intrusion Zone and the outbound Reader leads outof the zone. In these cases, designate the door as an Entrance Door.

The Exit Door designation is rarely used. The Exit Door designation relates to an Intrusion Zone thatis also part of, or abutting, an anti-passback (APB) area. Figure 32 on Page 134 shows two APBareas, with one of them also being an Intrusion Zone.

C•CURE 9000 Areas and Zones Guide Chapter 2 133

Page 134: 9000-Areas-Zones.pdf

Controlling Intrusion ZoneMode

Figure 32: iSTAR Intrusion Zone Also an Anti-passbackArea

Example:

Assume that the APB Areas in Figure 32 on Page 134 above were created prior to the IntrusionZone. When defining AP Area 52 the middle door was defined with Reader 3 as the inboundReader to AP Area 52 and Reader 4 as the outbound Reader from AP Area 52 to AP Area 51.

Later when the Intrusion Zone was configured, the left-side door was configured as an EntranceDoor since the inbound Reader brought you into the Intrusion Zone. The middle door wasconfigured as an Exit door since the outbound reader brought you into the IZ.

Designating a Door as an Exit Door reverses the actions and effects of the Door strike and the DoorState Monitor (DSM), as described in the following section, Door Behavior for Entrance and ExitDoors. The inbound Reader of an Entrance Door behaves exactly the same as the outbound Readerof an Exit door, and vice versa.

Door Behavior for Entrance and Exit Doors

You control how the Door strike behaves, and the DSM is interpreted with the Entrance and Exitselection. (When the door strike is active and a DSM exists, you must open, and sometimes close, theDoor for actions to take effect.)

Table 22 on Page 135 shows all the meaningful situations that you may encounter withEntrance/Exit Doors.

134 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 135: 9000-Areas-Zones.pdf

Controlling Intrusion ZoneMode

Case DoorType

DoorReader

ZoneState

DoorAction

Door StrikeActive

DSM Required

1a Entrance Inbound Armed Disarm Yes Yes - disarmswhen dooropens

2b Entrance Inbound Not Armed Arm No No

3c Entrance Outbound Not Armed Arm Yes Yes - armswhen door opensand closes

4d Entrance Outbound Armed Disarm No No

5a Exit Outbound Armed Disarm Yes Yes - disarmswhen dooropens

6b Exit Outbound Not Armed Arm No No

7c Exit Inbound Not Armed Arm Yes Yes - armswhen door opensand closes

8d Exit Inbound Armed Disarm No No

aCases1 and 5 represent approaching the armed Intrusion Zone from outside and disarming it with Card control. Thezone disarmsand you are granted access. If a DSM is configured, the zone doesnot disarm until the Door opensandactivates the DSM.

bCases2 and 6 represent arming the Intrusion Zone byCard control from the Reader physically outside the zone.

NOTE: The Card arms the zone, but doesnot activate the strike.

If you simply present your Card with no attempt to arm the zone, it is treated asa normalDoor accessand activates thestrike. The system can differentiate between a Door accessand an attempt to arm: to indicate that you want to arm thezone, youmust have either pressed CMD/ENT twice or have an active Input.

cCases3 and 7 represent approaching the inside Reader and arming the Intrusion Zone.

NOTE: The door strike is activated to allow exit.

You should also configure an exit delay for these cases. If a DSM is configured, the zone doesnot arm until the Dooropensand closes.

dCases4 and 8 represent disarming the Intrusion Zone from an inside Reader. (For security reasons, this zonemaybe configured to only be armed or disarmed from inside.) You gain access through the Door with an entrance delay,enter, and then disarm the zone. Anymotion sensor Inputs covering entrance areasduring this timemust be shunted.

NOTE: The strike doesnot activate in these casesbecause you are already in the zone.

Table 22: Entrance and Exit Door Behavior

C•CURE 9000 Areas and Zones Guide Chapter 2 135

Page 136: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone Configuration Steps

iSTAR Intrusion Zone Configuration StepsTable 23 on Page 136 shows the C•CURE 9000 Editors and activities that create iSTAR IntrusionZones. This table assumes that you have already configured the iSTAR Cluster and Controller.

Task C•CURE 9000 Editor Configuration Notes AdditionalInformation

Disable/Enablethe IntrusionZone CabinetTamper

(optional)

Options&Tools>SystemVariables>iSTAR Driver Category>Disable the Intrusion Zone CabinetTamper

Whether to disable the use ofthe Intrusion Zone CabinetTamper or not.

The default value is false –the Intrusion Zone CabinetTamper is enabled.

NOTE: Youmust stop andrestart the iSTARdriver to have anychanges youmake tothis variable takeeffect.

See “iSTAR DriverSettings” in theSystemVariableschapter in theC•CURE9000SystemMaintenanceGuide.

Configure aPersonnelGroup

(optional,depending onarming/disarmingmethod)

Configuration>Group>New>Group Editor

- or -

Edit an existing PersonnelGroup

Createsa PersonnelGroupto whosemembersarming/disarming theIntrusion Zone with the cardswipemethods can belimited.

See theGroupschapter in theC•CURE9000SoftwareConfiguration Guide.

Configure theiSTAR IntrusionZone

Areasand Zones>iSTAR IntrusionZone>New>iSTAR Intrusion Zone EditorandGeneral tab

Createsan iSTAR IntrusionZone and selects a Controllerfor it.

See Basic IntrusionZone Taskson Page139 and iSTARIntrusion Zone Editoron Page 153

Table 23: Creating iSTAR Intrusion Zones

136 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 137: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone Configuration Steps

Task C•CURE 9000 Editor Configuration Notes AdditionalInformation

ConfigureIntrusion ZoneDoors

Areasand Zones>iSTAR IntrusionZone>New>iSTAR Intrusion ZoneEditor>General tab

Specifies

• Entrance/exit Doors

• Door state

• Card control access

• Reader displaymode

• Displayname

See iSTAR IntrusionZoneGeneral Tab onPage 154.

ConfigureIntrusion ZoneInputs

Areasand Zones>iSTAR IntrusionZone>New>iSTAR Intrusion ZoneEditor>Inputs tab

Specifies

• Controlled Inputs thatcause entrance delaysorare shunted duringentrance delay.

• Protection Inputs that aremonitored 24/7.

• Input Displayname

DisplaysMonitored Inputs

See iSTAR IntrusionZone InputsTab onPage 162.

ConfigureIntrusion ZoneArm/DisarmMethods

Areasand Zones>iSTAR IntrusionZone>New>iSTAR Intrusion ZoneEditor>Arm - Disarm tab

• Specifiesarming/disarmingmethods

• Definesexit/entrancedelays

See iSTAR IntrusionZone Arm - DisarmTab on Page 169.

ConfigureIntrusion ZoneTriggers

Areasand Zones>iSTAR IntrusionZone>New>iSTAR Intrusion ZoneEditor>Triggers tab

SpecifiesEvent Actions to beactivated for iSTAR IntrusionZonemodes/states.

See iSTAR IntrusionZone TriggersTab onPage 178.

ChangeIntrusion ZoneState Images

Areasand Zones>iSTAR IntrusionZone>New>iSTAR Intrusion ZoneEditor>State Images tab

Modify Images that indicateiSTAR Intrusion Zone stateson theMonitoring Station.

See iSTAR IntrusionZone State ImagesTab on Page 189 andState ImagesTabTaskson Page 190.

C•CURE 9000 Areas and Zones Guide Chapter 2 137

Page 138: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone Configuration Steps

Task C•CURE 9000 Editor Configuration Notes AdditionalInformation

ConfigurePersonnel

Personnel>Personnel>New>PersonnelEditor

- or -

Edit an existing PersonnelRecord

Enablesa specific personnot necessarily in theiSTAR Intrusion ZonePersonnelGroup toarm/disarm the IntrusionZone with the Card swipemethods.

See Configuring aPerson to Arm/DisarmIntrusion ZonesonPage 191

138 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 139: 9000-Areas-Zones.pdf

Basic Intrusion Zone Tasks

Basic Intrusion Zone TasksThe C•CURE 9000 iSTAR Intrusion Zones Editor allow you to accomplish the following tasks:

• Creating an iSTAR Intrusion Zone on Page 140

• Creating an iSTAR Intrusion Zone Template on Page 140

• Configuring an iSTAR Intrusion Zone on Page 141

• Viewing a List of iSTAR Intrusion Zones on Page 142

• Viewing Doors/Inputs for an Intrusion Zone on Page 146

• Viewing the Status of an iSTAR Intrusion Zone on Page 148

• Modifying an iSTAR Intrusion Zone on Page 150

• Deleting an iSTAR Intrusion Zone on Page 151

• Setting a Property for an iSTAR Intrusion Zone on Page 151

• Adding an iSTAR Intrusion Zone to a Group on Page 152

The following tasks related to configuring and using iSTAR Intrusion Zones are accomplishedthrough other C•CURE 9000 features:

• Configuring a Person to Arm/Disarm Intrusion Zones on Page 191

• Viewing Intrusion Zone Information on the Door Editor on Page 193

• Viewing Intrusion Zone Information on the Input Editor on Page 195

Accessing the iSTAR Intrusion Zone Editor

You can access the iSTAR Intrusion Zone Editor from the C•CURE 9000 Areas and Zones pane.

To Access the iSTAR Intrusion Zone Editor

1. In the Navigation Pane of the Administration Workstation, click the Areas and Zones panebutton.

2. Click the Areas and Zones drop-down list and select iSTAR Intrusion Zone.

3. Click New to create a new Intrusion Zone.

- or -

C•CURE 9000 Areas and Zones Guide Chapter 2 139

Page 140: 9000-Areas-Zones.pdf

Basic Intrusion Zone Tasks

Click to open a Dynamic View showing a list of all existing iSTAR Intrusion Zone Objects,right-click the iSTAR Intrusion Zone you want to change, and click Edit from the context menuthat appears.

The iSTAR Intrusion Zone Editor opens with the General tab displayed, as shown in Figure 35on Page 154.

Creating an iSTAR Intrusion Zone

You can create a new iSTAR Intrusion Zone using the iSTAR Intrusion Zone Editor.

This procedure assumes that you have already configured the iSTAR Cluster and Controller and ifrequired by validation type, have also configured at least one Personnel Group.

To Create an iSTAR Intrusion Zone

1. In the Navigation Pane of the Administration Workstation, click the Areas and Zones panebutton.

2. Click the Areas and Zones drop-down list and select iSTAR Intrusion Zone.

3. Click New to create a new Intrusion Zone. The iSTAR Intrusion Zone Editor opens.

You can now configure the new Intrusion Zone.

4. To save your new Intrusion Zone, click Save and Close.

- or -

Alternatively, if you want to save the Intrusion Zone and then create a new one, click Save andNew. The current Intrusion Zone is saved and closed, but the iSTAR Intrusion Zone Editorremains open ready for a new Intrusion Zone.

Creating an iSTAR Intrusion Zone Template

You can create a new template for an iSTAR Intrusion Zone. An iSTAR Intrusion Zone templatesaves you time because you do not have to re-enter the same Intrusion Zone information again.

140 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 141: 9000-Areas-Zones.pdf

Basic Intrusion Zone Tasks

To Create an iSTAR Intrusion Zone Template

1. In the Navigation Pane of the Administration Workstation, click the Areas and Zones panebutton.

2. Click the Areas and Zones drop-down list and select iSTAR Intrusion Zone.

3. Click the down-arrow on the New button, and click Template.

The iSTAR Intrusion Zone Editor where you can configure the Intrusion Zone template opens(see Figure 35 on Page 154).

4. Configure the template to meet your requirements. Any fields you configure values for becomepart of the template; then when you subsequently create a new Intrusion Zone from thattemplate, these values are already filled in.

5. In the Name field, enter the name you wish to use for the template

Example:

iSTARIZTemplate1

6. To save the template, click Save and Close.

The template will be available as an option on the pull-down menu on the New button in theAreas and Zones pane.

Configuring an iSTAR Intrusion Zone

This procedure assumes that you have already configured the iSTAR Cluster and Controller and ifrequired by validation type, have also configured at least one Personnel Group.

C•CURE 9000 Areas and Zones Guide Chapter 2 141

Page 142: 9000-Areas-Zones.pdf

Basic Intrusion Zone Tasks

To Configure an iSTAR Intrusion Zone

1. Create a new iSTAR Intrusion Zone or modify an existing iSTAR Intrusion Zone.

NOTE If you are modifying an existing Intrusion Zone, you cannot changethe iSTAR Controller field.

2. Type a Name and Description for the iSTAR Intrusion Zone that sufficiently identifies thisIntrusion Zone and its purpose.

3. Select an iSTAR Controller for the Intrusion Zone on the General tab (shown in Figure 35 onPage 154).

4. Use the General tab (shown in Figure 35 on Page 154) to configure the Doors that lead into andout of the Intrusion Zone and the options that affect the use and operation of these doors.

5. Use the Inputs tab (shown in Figure 36 on Page 163) to configure Inputs that arecontrolled/monitored by the Intrusion Zone—including Inputs that are protected 24/7.

6. Use the Arm-Disarm tab (shown in Figure 37 on Page 170) to configure the local methods forarming/disarming the Intrusion Zone, the related options, and the exit/entrance delays.

7. Use the Triggers tab (shown in Figure 38 on Page 178) to configure triggers that can activateEvent Actions when the Intrusion Zone’s mode or state has a certain value (for example,armed/disarmed or ready to arm/not ready to arm).

8. Use the State Images tab (shown in Figure 41 on Page 189) to change the default images used toindicate states for the iSTAR Intrusion Zone on the Monitoring Station, or to return to the defaultimages.

Viewing a List of iSTAR Intrusion Zones

You can display a list of the iSTAR Intrusion Zones you have created by opening a Dynamic Viewof iSTAR Intrusion Zones.

To View a List of iSTAR Intrusion Zones

1. In the Navigation Pane of the Administration Workstation, click Areas and Zones to open theAreas and Zones pane.

2. Select iSTAR Intrusion Zone from the Areas and Zones drop-down list.

142 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 143: 9000-Areas-Zones.pdf

Basic Intrusion Zone Tasks

3. Click to open a Dynamic View listing all iSTAR Intrusion Zone Objects, as shown inFigure 33 on Page 143. (You can also click the down-arrow of this button to either view the listin the current tabbed view or open a new tabbed view).

Figure 33: iSTAR Intrusion Zone List

• You can sort, filter, and group items in the list.

• You can right-click an iSTAR Intrusion Zone in the list to open the iSTAR Intrusion ZoneContext menu (see Table 24 on Page 144) and perform any of the functions on that menu. (SeeViewing Doors/Inputs for an Intrusion Zone on Page 146.)

• You can right-click any column heading to open a context menu of all possible Intrusion Zonefields that can display as columns and add/remove fields to view status information. SeeViewing Intrusion Zone Status on the Dynamic View on Page 149

For more information on using Dynamic Views, see the Dynamic Views chapter in the C•CURE9000 Data Views Guide.

iSTAR Intrusion Zone List Context Menu

The context menu that opens when you right-click an iSTAR Intrusion Zone in the iSTAR IntrusionZone Dynamic View includes the selections described in Table 24 on Page 144.

C•CURE 9000 Areas and Zones Guide Chapter 2 143

Page 144: 9000-Areas-Zones.pdf

Basic Intrusion Zone Tasks

MenuSelection

Description

Edit Click thismenu selection to edit the selected iSTAR Intrusion Zone. The iSTAR Intrusion Zone Editor opens(with the addition of aGroups tab, which displaysanyGroups that this zone belongs to). You can rename theiSTAR Intrusion Zone, change the description and anyother attributeswith the exception of the iSTARController.

Delete Click thismenu selection to delete the selected iSTAR Intrusion Zone. A prompt appears asking you to confirmthat you want to delete the iSTAR Intrusion Zone. ClickYes to delete the iSTAR Intrusion Zone or No to cancelthe deletion.

Setproperty

Click thismenu selection to change the value of the selected properties in the selected iSTAR Intrusion Zone(s).

A dialog boxappears asking you to select a property to change. Click to open a selection list and click theproperty you wish to change. You can then change the value of the following properties:

• Allow DisarmWhile Violated– You can determine whether or not the iSTAR Intrusion Zone(s) can bedisarmedwhile in Violatedmode by selecting this property and selecting/clearing theValue checkbox.

• Description – You can change the textual description of the iSTAR Intrusion Zone(s) by selecting thisproperty and typing in a new value.

• Enabled – You can determine whether or not the iSTAR Intrusion Zone(s) are activated on the system byselecting this property and selecting/clearing theValue checkbox.

Add toGroup

You can add one or more selected iSTAR Intrusion Zones to aGroup of iSTAR Intrusion Zones.When you clickthismenu choice, a dialog boxappears for you to select the Group to which to add the iSTAR Intrusion Zone(s).When you click a Group of iSTAR Intrusion Zones in the list, the selected iSTAR Intrusion Zone(s) are added tothe Group.

Table 24: iSTAR Intrusion Zone List Right-ClickContext MenuOptions

144 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 145: 9000-Areas-Zones.pdf

Basic Intrusion Zone Tasks

MenuSelection

Description

Exportselection

Click thismenu selection to Open an Export...to XML or CSV file dialog box to export one or more of the selectediSTAR Intrusion Zone records to either an XML or a CSV file. This allowsyou to quickly and easily createXML/CSV reports on the selected data.

NOTE: Although XML is the initial default file type, once you choose a type in theSave as type field, whetherXML or CSV, that becomes the default the next time this dialog boxopens.

CSV-formatted exportscannot be imported. If you require importing functionality, export to XML.

• When you export to an XML file, all available data for the selected object(s), whether displayed in theDynamicView or not—aswell as all the child objects of the selected record(s), is exported.

• When you export to a CSV file, only data in the columnsdisplaying in the DynamicView is exported, and inthe order displayed. This allowsyou to both select and arrange data fields for your report. In addition,exporting to a CSV file allowsyou to view the exported data in an Excel spreadsheet and further manipulateit for your use.

For more information, see the DynamicViewschapter in theC•CURE9000 Data ViewsGuide.

NOTE:When you clickExport Selection, you are running the export on the client computer. Consequently, thesystem doesnot use the Default Export DirectoryPath—which is on the server. It opensa directory onthe client, reverting to the last directory used. You can navigate to the default export server directory, ifyou wish. Or to avoid confusion or use the same destination folder for both client and server computers,you can use UNC (UniversalNaming Convention) paths, for example: \\Computer Name\Program Files\Software House\SWHouse\SWHSystem\Export.

Find inAudit Log

Click thismenu selection to Open aQuery Parameters dialog box in which you can enter prompts and/or modifythe Query criteria to search for entries in the Audit Log that reference the selected iSTAR Intrusion Zone.Whenfound the results display in a separate DynamicView.

Find inJournal

Click thismenu selection to Open aQuery Parameters dialog box in which you can enter prompts and/or modifythe Query criteria to search for entries in the Journal that reference the selected iSTAR Intrusion Zone.Whenfound the results display in a separate DynamicView.

Arm Click thismenu selection to arm the selected Intrusion Zone.

NOTE: Thismenu option is available only if the iSTAR Intrusion Zone’sController is enabled.

Disarm Click thismenu selection to disarm the selected Intrusion Zone.

NOTE: Thismenu option is available only if the iSTAR Intrusion Zone’sController is enabled.

Force Arm Click thismenu selection to force arm the selected Intrusion Zone.

NOTE: Thismenu option is available only if the iSTAR Intrusion Zone’sController is enabled.

C•CURE 9000 Areas and Zones Guide Chapter 2 145

Page 146: 9000-Areas-Zones.pdf

Basic Intrusion Zone Tasks

MenuSelection

Description

DisplayDoors andInputs

Click thismenu selection to open theDoors and Inputs of [selected Intrusion Zone] DynamicView. Theselists include respectively all of the selected Intrusion Zone’sDoors and itsControlled andMonitored Inputs. Bydefault, the DynamicViewsshow the name of the Door(s)/Input(s) and their Intrusion Zone Status. (SeeViewing Doors/Inputs for an Intrusion Zone on Page 146.)

You can also right-click any column heading to view a list of other available Door/Input fields that can displayascolumns. For more information, see the DynamicViewschapter in theC•CURE9000 Data ViewsGuide.

Viewing Doors/Inputs for an Intrusion Zone

You can select an existing Intrusion Zone on the Dynamic View and display lists of its Doors andInputs with relevant Intrusion Status and other information.

NOTE The Dynamic Views for both iSTAR Doors and iSTAR Inputs allowyou to add a column that names the Intrusion Zone to which theDoors/Inputs belong.

To View an Intrusion Zone’s Doors/Inputs

1. On the iSTAR Intrusion Zone Dynamic View, right-click an iSTAR Intrusion Zone in the list toopen the iSTAR Intrusion Zone Context menu (see Table 24 on Page 144).

2. Click Display Door and Inputs. The lists such as those shown in the example inFigure 34 onPage 147 display.

146 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 147: 9000-Areas-Zones.pdf

Basic Intrusion Zone Tasks

Figure 34: Doorsand Inputs List for iSTAR Intrusion Zone

The screen displays a Dynamic View list of the selected Intrusion Zone’s Doors on the top and aDynamic View list of its Controlled/Monitored Inputs on the bottom. By default, the DynamicViews show the name of the Door(s)/Input(s) and their Intrusion Zone Status. The DynamicViews have the fields described in Table 25 on Page 147.

• You can sort, filter, and group items in the lists.

• You can also right-click any column heading to view a list of other available Door/Inputfields that can display as columns.

If new Doors/Inputs are added to the zone while this Dynamic View is open, clickingRefresh All updates both lists and related values.

For more information, see the Dynamic Views chapter in the C•CURE 9000 Data Views Guide.

Fields Description

(Doors)

Name Door system name

Open Status OpenClosed

Table 25: Doorsand Inputs of iSTAR Intrusion Zone Fields

C•CURE 9000 Areas and Zones Guide Chapter 2 147

Page 148: 9000-Areas-Zones.pdf

Basic Intrusion Zone Tasks

Fields Description

Statusof the Door in the Intrusion Zone NormalOffnormal (would violate zone if zone were armed)Not Applicable (host maynot be communicating with Controller)

(Inputs – Controlled & Monitored)

Name Input system name

Active Status ActiveInactive

Supervision Status UninitializedSupervision Error or specific error, such asOpen Loop, Line Fault, etc.

Statusof the Input in the Intrusion Zone Controlled Input:

NormalOffnormal (would violate zone if zone were armed)Not Applicable (host maynot be communicating with Controller)

Monitored Input: alwaysNot Applicable

Viewing the Status of an iSTAR Intrusion Zone

You can view basic status information about an Intrusion Zone in three different places:

• Administration application

• iSTAR Intrusion Zone Dynamic View – see Viewing Intrusion Zone Status on the DynamicView on Page 149.

• iSTAR Intrusion Zone Editor Status tab – see Viewing Intrusion Zone Status on the StatusTab on Page 187.

• Monitoring Station: Explorer Bar>Non-Hardware Status> Intrusion Zones>Status List - iSTARIntrusion Zones – see the Monitoring Status chapter in the C•CURE 9000 Monitoring StationGuide.

148 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 149: 9000-Areas-Zones.pdf

Basic Intrusion Zone Tasks

Viewing Intrusion Zone Status on the Dynamic View

This section briefly describes procedures for displaying Intrusion Zone status information on theiSTAR Intrusion Zone dynamic view. However, these changes are only in effect while you have theView open. To actually change the View permanently, you need to configure the view and save yourchanges. For information, see the Dynamic Views chapter in the C•CURE 9000 Data Views Guide.

To View Intrusion Zone Status Information

1. On the iSTAR Intrusion Zone Dynamic View, right-click any column heading.

A context menu of all available Intrusion Zone fields that can display as columns appears.

Fields that are currently displayed in the view are marked with a .

2. To add fields as columns to view status information, click anywhere on that field in the list.

Example:

First Violating Cause/Mode Changed Method/Mode Changed Method Occurred Time/ModeStatus/Ready To Arm Status

C•CURE 9000 Areas and Zones Guide Chapter 2 149

Page 150: 9000-Areas-Zones.pdf

Basic Intrusion Zone Tasks

3. To remove a field as a column in the Dynamic View, click a field in the list that has a .

4. To change the left/right order of the columns to your liking, click any column heading and dragthat column to a new position. The Dynamic View columns are adjusted to the new columnorder you established.

5. To change the column width:

a. Move the cursor to the edge of the column heading you wish to resize. The cursor changes to

.

b. Drag this cursor to the left or right and release the mouse button to make the column wider ornarrower.

Modifying an iSTAR Intrusion Zone

You can modify an existing iSTAR Intrusion Zone by editing it using the iSTAR Intrusion ZoneEditor.

To Modify an iSTAR Intrusion Zone

1. In the Navigation Pane of the Administration Workstation, click Areas and Zones to open theAreas and Zones pane.

2. Select iSTAR Intrusion Zone from the Areas and Zones drop-down list.

3. Click to open a Dynamic View showing all iSTAR Intrusion Zone Objects.

4. Right-click the iSTAR Intrusion Zone in the list that you want to change and select Edit from thecontext menu that appears.

- or -

Double-click the iSTAR Intrusion Zone you want to change.

The iSTAR Intrusion Zone Editor opens for you to edit the Intrusion Zone making changes asyou wish in the fields on the top of the editor, and on any of the tabs (with the exception of theiSTAR Controller). (The Editor now includes a Groups tab that displays any Groups to whichthis iSTAR Intrusion Zone belongs.)

5. To save the modified Intrusion Zone, click Save and Close.

- or -

150 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 151: 9000-Areas-Zones.pdf

Basic Intrusion Zone Tasks

Alternatively, if you want to save the Intrusion Zone and then create a new one, click Save andNew. The current iSTAR Intrusion Zone is saved and closed, but the iSTAR Intrusion ZoneEditor remains open ready for a new iSTAR Intrusion Zone.

Deleting an iSTAR Intrusion Zone

You can delete an iSTAR Intrusion Zone.

To Delete an iSTAR Intrusion Zone

1. In the Navigation Pane of the Administration Workstation, click Areas and Zones to open theAreas and Zones pane.

2. Select iSTAR Intrusion Zone from the Areas and Zones drop-down list.

3. Click to open a Dynamic View showing all iSTAR Intrusion Zone Objects.

4. Right-click the iSTAR Intrusion Zone in the list that you want to delete and select Delete fromthe context menu that appears.

5. Click Yes on the “Are you sure you want to delete the selected iSTAR Intrusion Zone?” messagebox.

Setting a Property for an iSTAR Intrusion Zone

You can use Set Property to quickly set a property for an iSTAR Intrusion Zone without opening theiSTAR Intrusion Zone Editor. You use Set Property for mass updates. See Figure 33 on Page 143 forthe properties that can be changed.

To Set a Property for iSTAR Intrusion Zones

1. In the Navigation Pane of the Administration Workstation, click Areas and Zones to open theAreas and Zones pane.

2. Select iSTAR Intrusion Zone from the Areas and Zones drop-down list.

3. Click to open a Dynamic View showing all iSTAR Intrusion Zone Objects.

4. Right-click the iSTAR Intrusion Zone in the list for which you want to set the property and selectSet Property from the context menu.

C•CURE 9000 Areas and Zones Guide Chapter 2 151

Page 152: 9000-Areas-Zones.pdf

Basic Intrusion Zone Tasks

5. Specify the property for the Intrusion Zone. Click the drop-down button to see a list of properties.

6. Enter the value for the property and click OK.

7. Click OK on the Setting Properties of iSTAR Intrusion Zone message box.

Adding an iSTAR Intrusion Zone to a Group

Use Add To Group to add the iSTAR Intrusion Zone Object to a Group.

To Add iSTAR Intrusion Zones To a Group

1. Make sure that the Group is already configured for the iSTAR Intrusion Zone to be added to it.

2. In the Navigation Pane of the Administration Workstation, click Areas and Zones to open theAreas and Zones pane.

3. Select iSTAR Intrusion Zone from the Areas and Zones drop-down list.

4. Click to open a Dynamic View showing all iSTAR Intrusion Zone Objects.

5. Right-click the Intrusion Zone in the list that you want to add to a Group and select Add ToGroup from the context menu.

6. When the Group list displays, select the Group you want to add the iSTAR Intrusion Zone to.The name and description of the Group now display on the Groups tab of the iSTAR IntrusionZone Editor.

152 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 153: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone Editor

iSTAR Intrusion Zone EditorThe iSTAR Intrusion Zone Editor, shown in Figure 35 on Page 154, in C•CURE 9000 lets you createand modify iSTAR Intrusion Zone Objects. The iSTAR Intrusion Zone Editor displays the followingtabs for configuring Intrusion Zones:

• iSTAR Intrusion Zone General Tab on Page 154

• iSTAR Intrusion Zone Inputs Tab on Page 162

• iSTAR Intrusion Zone Arm - Disarm Tab on Page 169

• iSTAR Intrusion Zone Triggers Tab on Page 178

• iSTAR Intrusion Zone Groups Tab on Page 185 (when editing an existing Intrusion Zone)

• iSTAR Intrusion Zone Status Tab on Page 187

• iSTAR Intrusion Zone State Images Tab on Page 189

The iSTAR Intrusion Zone Editor has the buttons described in Table 26 on Page 153.

Button Description

SaveandClose

Click this button when you have completed changes to the iSTAR Intrusion Zone and wish to save those changes.The iSTAR Intrusion Zone closes.

SaveandNew

Click this button when you have completed any changes to the iSTAR Intrusion Zone and wish to save thosechangesand also create a new iSTAR Intrusion Zone. The iSTAR Intrusion Zone you were editing is saved, and anew iSTAR Intrusion Zone opens (either blankor including template information if you were using a template tocreate the new iSTAR Intrusion Zone).

Click this button when you want to close the iSTAR Intrusion Zone Editorwithout saving your changes.

Awarning appears asking whether or not you want to save your changesbefore closing the editor. ClickYes to exitand save andNo to exit and cancel your changes.

Table 26: iSTAR Intrusion Zone Editor Buttons

C•CURE 9000 Areas and Zones Guide Chapter 2 153

Page 154: 9000-Areas-Zones.pdf

iSTAR Intrusion ZoneGeneral Tab

iSTAR Intrusion Zone General TabThe iSTAR Intrusion Zone General tab, shown in Figure 35 on Page 154, lets you define the doorsfor the Intrusion Zone.

Definitions for this tab are provided in iSTAR Intrusion Zone General Tab Definitions on Page 155.

You can perform the following tasks from the iSTAR Intrusion Zone General tab:

l Configuring iSTAR Intrusion Zone Entrance/Exit Doors on Page 158

l Deleting iSTAR Intrusion Zone Entrance/Exit Doors on Page 160

Figure 35: iSTAR Intrusion Zone Editor General Tab

154 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 155: 9000-Areas-Zones.pdf

iSTAR Intrusion ZoneGeneral Tab

iSTAR Intrusion Zone Editor Definitions

The iSTAR Intrusion Zone Editor has the fields shown in Table 27 on Page 155.

Fields/Buttons Description

Name Enter a unique name, up to 100 characters, to identify the iSTAR Intrusion Zone.

Description Enter a description of the iSTAR Intrusion Zone, up to 255 characters.

Enabled Select this checkbox to activate the iSTAR Intrusion Zone.

Partition A read-only field displaying the name of the Partition to which this iSTAR Intrusion Zone belongs. (Thisfield is visible only if the C•CURE9000 system is partitioned.)

NOTE: The Intrusion Zone derives itsPartition from the selected iSTAR Controller. If the Controller’sPartition changes—the Partition of the Cluster to which the Controller belongs is changed, thenthe Intrusion Zone’sPartition changesaccordingly.

Table 27: iSTAR Intrusion Zone Editor Fields

iSTAR Intrusion Zone General Tab Definitions

The iSTAR Intrusion Zone General tab has the buttons shown in Table 28 on Page 155 (in theEntrance Doors and Exit Doors tables) and the fields shown in Table 29 on Page 156.

Button Name Description

Add Click this button to add a new blank row to theEntrance Doors or Exit Doors table. Each newrow is added after the last.

To add a new row after a specific existing row, click the row selector to select a row and

then click .

Remove Click this button to remove a selected row from theEntrance Doors or Exit Doors table. You

have to click the row selector to select a row to remove. If no row is selected, this button isnot available.

Table 28: iSTAR Intrusion Zone Editor - General Tab Buttons

C•CURE 9000 Areas and Zones Guide Chapter 2 155

Page 156: 9000-Areas-Zones.pdf

iSTAR Intrusion ZoneGeneral Tab

Fields/Buttons Description

Controller

iSTAR Controller Select the controller for the Intrusion Zone.

NOTE: TheAdd andRemove buttons in theEntrance Doors andExit Doors tablesbecome availablewhen you select the Controller.

Once you select the Controller and add either a Door or an Input, you cannot change theController.

Entrance Doors

DoorClick in theDoor field to display , and then click this button to select a Door from the dialog box thatappears. The Door must belong to the selected Controller and not yet be assigned to any Intrusion Zone.Once a Door is selected, theDoor EditorAreas & Zones tab displays read-only Intrusion Zoneinformation. See Viewing Intrusion Zone Information on the Door Editor on Page 193.

NOTE: Once a Door is selected for a row, it cannot be changed, although its attributes can be changed,and the entire row can be removed.

Arm State Click the down-arrow to select from the drop-down list themode that this door is set to when the IntrusionZone isArmed:

Locked,Secured, or Unlocked (For detailed Door state information, see Doors on Page 131.)

Disarm State Click the down-arrow to select from the drop-down list themode that this door is set to when the IntrusionZone isDisarmed:

Locked,Secured, or Unlocked (For detailed Door state information, see Doors on Page 131.)

Card Control Click to select this checkbox to allow thisDoor to use the Card Arm/Disarmmethod to arm or disarm theIntrusion Zone. The default is cleared.

DisplayMode Click the down-arrow to select the displaymode for the LCDson thisDoor’sReader from the drop-downlist.

Blank – The LCD displaysdate/time and the normalDoor information with momentary displaysofIntrusion Zonemode changes. This is the default.

Status – The LCD displaysdate/time on the first line and the second line displaysdynamically changinginformation about the Intrusion Zone’s state.

For more detailed information and an illustrative graphic, see Displayon Page 132.

Table 29: iSTAR Intrusion Zone Editor - General Tab Fields

156 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 157: 9000-Areas-Zones.pdf

iSTAR Intrusion ZoneGeneral Tab

Fields/Buttons Description

DisplayName Click in this field and type the name that you want displayed on the Reader LCD display for the Door—upto 16 characters (restricted to printable ASCII characters and the “space”).

NOTE: This field allowsyou to create an LCD displayname for this Intrusion Zone Door. If you do notenter a name here, the systemwill use the rightmost 16 characters of the Door’s name.

The DisplayName is used whenever the Intrusion Zone needs to display this door asan‘offnormal’ point on the Reader LCD. (This name doesnot have to be ‘unique.’)

Exit Doors

DoorClick in theDoor field to display , and then click this button to select a Door from the dialog box thatappears. The Door must belong to the selected Controller and not yet be assigned to any Intrusion Zone.Once a Door is selected, theDoor EditorAreas & Zones tab displays read-only Intrusion Zoneinformation. See Viewing Intrusion Zone Information on the Door Editor on Page 193.

NOTE: Once a Door is selected for a row, it cannot be changed, although its attributes can be changed,and the entire row can be removed.

Arm State Click the down-arrow to select from the drop-down list themode that this door is set to when the IntrusionZone isArmed:

Locked,Secured, or Unlocked (For detailed Door state information, see Doors on Page 131.)

Disarm State Click the down-arrow to select from the drop-down list themode that this door is set to when the IntrusionZone isDisarmed:

Locked,Secured, or Unlocked (For detailed Door state information, see Doors on Page 131.)

Card Control Click to select this checkbox to allow thisDoor to use the Card Arm/Disarmmethod to arm or disarm theIntrusion Zone. The default is cleared.

DisplayMode Click the down-arrow to select the displaymode for the LCDson thisDoor’sReader from the drop-downlist.

Blank – The LCD displaysdate/time and the normalDoor information with momentary displaysofIntrusion Zonemode changes. This is the default.

Status – The LCD displaysdate/time on the first line and the second line displaysdynamically changinginformation about the Intrusion Zone’s state.

C•CURE 9000 Areas and Zones Guide Chapter 2 157

Page 158: 9000-Areas-Zones.pdf

iSTAR Intrusion ZoneGeneral Tab

Fields/Buttons Description

DisplayName Click in this field and type the name that you want displayed on the Reader LCD display for the Door—upto 16 characters (restricted to printable ASCII characters and the “space”).

NOTE: This field allowsyou to create an LCD displayname for this Intrusion Zone Door. If you do notenter a name here, the systemwill use the rightmost 16 characters of the Door’s name.

The DisplayName is used whenever the Intrusion Zone needs to display this door asan‘offnormal’ point on the Reader LCD. (This name doesnot have to be ‘unique.’)

Configuring iSTAR Intrusion Zone Entrance/Exit Doors

This procedure assumes that you have already selected the iSTAR Controller for the Intrusion Zoneand have configured Doors and Readers.

To Configure iSTAR Intrusion Zone Entrance/Exit Doors

1. Create or modify an iSTAR Intrusion Zone. See Creating an iSTAR Intrusion Zone on Page 140or Modifying an iSTAR Intrusion Zone on Page 150.

2. On the General tab of the iSTAR Intrusion Zone Editor in the Entrance Doors box or the ExitDoors box, click Add to create a new row, as shown in the following example for the EntranceDoors.

3. Click in the Door field to display and click this button.

A selection list opens with the Doors available for iSTAR Intrusion Zones.

158 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 159: 9000-Areas-Zones.pdf

iSTAR Intrusion ZoneGeneral Tab

4. Click a Door to add it to the row.

Example:

lobby door

5. Click the down-arrow in the Arm State field to display a drop-down list of access control modes:Locked/Secured/Unlocked. (The default entry is Locked.)

6. Click theMode you want set for this Door when the Intrusion Zone is in the Armed state to addit to the row.

Example:

Locked

7. Click the down-arrow in the Disarm State field to display a drop-down list of access controlmodes: also Locked/Secured/Unlocked. (The default entry is Locked.)

8. Click theMode you want set for this Door when the Intrusion Zone is in the Disarmed state toadd it to the row.

Example:

Unlocked

9. To allow the Intrusion Zone to be armed/disarmed using card methods at this Door, click toselect the check box in the Card Control field. (The default entry is cleared.)

C•CURE 9000 Areas and Zones Guide Chapter 2 159

Page 160: 9000-Areas-Zones.pdf

iSTAR Intrusion ZoneGeneral Tab

- or -

To not allow card method Arming/Disarming at this door, do not select the check box.

10. Click the down-arrow in the Display Mode field to display the mode drop-down list:Blank/Status. (The default entry is Blank.)

11. Click the LCD-type Display Mode you want for this Door’s Reader to add it to the row.

Example:

Status

12. Click in the Display Name field and type the name you want displayed for this Door on itsReader’s LCD display—up to 16 characters.

NOTE If you do not enter a name here, the system uses the 16 rightmost characters of theDoor’s name.

The row now appears as shown in the following example for an Entrance Door:

13. To configure more Entrance/Exit Doors for this iSTAR Intrusion Zone, click Add in theappropriate box and repeat the preceding steps.

Deleting iSTAR Intrusion Zone Entrance/Exit Doors

Once you have selected a Door for a row, it cannot be changed. You can, however, delete the entirerow, removing that Door from the Intrusion Zone.

160 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 161: 9000-Areas-Zones.pdf

iSTAR Intrusion ZoneGeneral Tab

NOTE If you need to completely delete a Door from the system, you mustfirst make sure to remove it from any Intrusion Zone to which it isassigned.

To Delete an iSTAR Intrusion Zone Entrance/Exit Door

1. On the General tab of the iSTAR Intrusion Zone Editor in the Entrance Doors box or the ExitDoors box, click a row to select it.

2. Click Remove to delete the Door row.

C•CURE 9000 Areas and Zones Guide Chapter 2 161

Page 162: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone InputsTab

iSTAR Intrusion Zone Inputs TabThe iSTAR Intrusion Zone Inputs tab, shown in Figure 36 on Page 163, lets you define Inputs to becontrolled/monitored by the iSTAR Intrusion Zone as follows:

• Set the Controlled/Monitored Inputs that:

• Cause the Entrance Delay to start.

• Are shunted during the Entrance Delay.

• Cause immediate violation of the Intrusion Zone when armed without starting the EntranceDelay.

• Define the Inputs monitored by the Intrusion Zone that are armed 24/7 (Protection Inputs).

• View Monitored Inputs and modify Display Name.

Definitions for this tab are provided in iSTAR Intrusion Zone Inputs Tab Definitions on Page 163.

You can perform the following tasks from the iSTAR Intrusion Zone Inputs tab:

l Configuring iSTAR Intrusion Zone Controlled/Protected Inputs on Page 165

l Configuring Display Names for iSTAR Intrusion Zone Monitored Inputs on Page 167

l Deleting iSTAR Intrusion Zone Controlled/Protected Inputs on Page 168

162 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 163: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone InputsTab

Figure 36: iSTAR Intrusion Zone Editor InputsTab

iSTAR Intrusion Zone Inputs Tab Definitions

The iSTAR Intrusion Zone Inputs tab has the buttons shown in Table 30 on Page 163 (in theControlled Inputs table) and the fields shown in Table 31 on Page 164.

Button Name Description

Add Click this button to add a row to theControlled Inputs table. Each new row is added after thelast.

To add a new row after a specific existing row, click the row selector to select a row and

then click .

Table 30: iSTAR Intrusion Zone Editor InputsTab Buttons

C•CURE 9000 Areas and Zones Guide Chapter 2 163

Page 164: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone InputsTab

Button Name Description

Remove Click this button to remove a selected row from theControlled Inputs table. You have to click the

row selector to select a row to remove. If no row is selected, this button isnot available.

Fields/Buttons Description

Controlled Inputs

InputClick in the Input field to display , and then click this button to select an Input from the dialog box thatappears. The Input must belong to the selected Controller and not yet be assigned to any Intrusion Zone.

Once you select an Input for the Intrusion Zone, the following happenson the Input Editor:

• On theGeneral tab, the value in the Type field changes fromGeneral to Intrusion Zone.

• The Intrusion Zone tab becomesavailable, displaying read-only information on the Intrusion Zoneto which the Input now belongsand the Input’s displayname. For Information, see Viewing IntrusionZone Information on the Input Editor on Page 195.

Entrance DelayTrigger

Click this checkbox to select this Input asan Entrance DelayTrigger for the Intrusion Zone. The default iscleared.

If selected, activation of this Input while the Intrusion Zone is armed starts the Entrance Delayand givesthe person entering the zone time to disarm the Intrusion Zone.

NOTE: The Entrance DelayTrigger must also be selected asEntrance DelayShunt.

Entrance DelayShunt

Click this checkbox to select this Input to be shunted during the Entrance Delay for the Intrusion Zone. Thedefault is cleared.

Protected Click to select this checkbox to indicate that this Input isProtected. The default is cleared.

Once youmake this a Protected Input for the Intrusion Zone, the value in the Type field on theGeneraltab of the Input Editor changes to Intrusion Zone - Protected.

The Intrusion Zone tab becomesavailable, displaying read-only information on the Intrusion Zone towhich the Input now belongsand the Input’s displayname. For Information, see Viewing Intrusion ZoneInformation on the Input Editor on Page 195.

Table 31: iSTAR Intrusion Zone Editor - InputsTab Fields

164 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 165: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone InputsTab

Fields/Buttons Description

DisplayName Click in this field and type the name that you want displayed on the Reader LCD display for the Input—upto 16 characters (restricted to printable ASCII characters and the “space”).

NOTE: This field allowsyou to create an LCD displayname for this Intrusion Zone Controlled Input. If youdo not enter a name here, the systemwill use the rightmost 16 characters of the Input’s name.

The DisplayName is used whenever the Intrusion Zone needs to display this door asan‘offnormal’ point on the Reader LCD. (This name doesnot have to be ‘unique.’)

MonitoredInputs

The system automatically populates this table based on the Doors, Controlled Inputs, andArming/Disarming Inputs configured for the Intrusion Zone. (For theseMonitored Inputs to display in thetable theyhave to have been configured on the iSTAR Controller.)

TheMonitored Inputs displayed in this table change dynamically if you change the zone’s assigned Doors,Controlled Inputs, or Arming/Disarming Inputs.

NOTE: The iSTAR Cabinet Tamper Input will automatically be entered here to bemonitored by thisIntrusion Zone (and all other Intrusion Zoneson thisController) unless its use hasbeen disabledbya SystemVariable. For more information, see “iSTAR Driver Settings” in the SystemVariableschapter in theC•CURE9000 SystemMaintenanceGuide.

Input Input system name

DisplayName Click in this field and type the name that you want displayed on the Reader LCD display for the Input—upto 16 characters (restricted to printable ASCII characters and the “space”).

NOTE: This field allowsyou to create an LCD displayname for thisMonitored Input. The DisplayName isshared between all Intrusion Zoneson the sameController. If you do not enter a name here, thesystemwill use the rightmost 16 characters of the Input’s name.

The DisplayName is used whenever the Intrusion Zone needs to display this Input asan‘offnormal’ point on the Reader LCD. (This name doesnot have to be ‘unique.’)

Configuring iSTAR Intrusion Zone Controlled/Protected Inputs

This procedure assumes that you have already selected the iSTAR Controller for the Intrusion Zoneand have configured Doors, Readers, and Inputs.

To Configure iSTAR Intrusion Zone Controlled/Protected Inputs

1. Create or modify an iSTAR Intrusion Zone. See Creating an iSTAR Intrusion Zone on Page 140or Modifying an iSTAR Intrusion Zone on Page 150.

2. On the iSTAR Intrusion Zone Editor, click the Inputs tab to open.

C•CURE 9000 Areas and Zones Guide Chapter 2 165

Page 166: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone InputsTab

3. In the Controlled Inputs box, click Add to create a new row, as shown in the following example.

4. Click in the Input field to display and click this button.

A selection list opens with the Inputs available for iSTAR Intrusion Zones.

5. Click an Input to add it to the row.

Example:

iSTAR Input1-ACM1-iSTARontroller1

6. To make this Input an Entrance Delay Trigger for the Intrusion Zone, click to select the check boxin the Entrance Delay Trigger field. (The default entry is cleared.)

7. To select this Input to be shunted during Entrance Delays for the Intrusion Zone, click to selectthe check box in the Entrance Delay Shunt field. (The default entry is cleared.)

8. To configure this Input to be protected 24/7, click to select the check box in the Protected field.(The default entry is cleared.)

166 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 167: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone InputsTab

NOTE A Protected Input cannot be an Entrance Delay Trigger, nor can it beshunted during Entrance Delay.

9. Click in the Display Name field and type the name you want displayed for this Input on theReader’s LCD display—up to 16 characters.

Example:

Zone5

NOTE If you do not enter a name here, the system uses the 16 rightmostcharacters of the Input’s name. (This name does not have to be‘unique.’)

The row now appears as shown in the following example:

10. To configure more Controlled Inputs for this iSTAR Intrusion Zone, click Add in the appropriatebox and repeat the preceeding steps.

Configuring Display Names for iSTAR Intrusion Zone Monitored Inputs

This procedure assumes that you have already selected the iSTAR Controller for the Intrusion Zoneand have configured Doors, Readers, and Inputs.

To Configure iSTAR Intrusion Zone Monitored Input Display Names

1. Create or modify an iSTAR Intrusion Zone. See Creating an iSTAR Intrusion Zone on Page 140or Modifying an iSTAR Intrusion Zone on Page 150.

2. Click in the Display Name field and type the name you want displayed whenever the IntrusionZone needs to display this Input as an ‘offnormal’ point on the Reader LCD—up to 16characters. (This Display Name is shared between all Intrusion Zones on the same Controller.)

Example:

C•CURE 9000 Areas and Zones Guide Chapter 2 167

Page 168: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone InputsTab

Input1TampiSTAR1

NOTE If you do not enter a name here, the system uses the 16 rightmostcharacters of the Input’s name. (This name does not have to be ‘unique.’)

The row now appears as shown in the following example:

3. To enter Display Names for any other Monitored Inputs for this iSTAR Intrusion Zone, repeatthe preceeding step.

Deleting iSTAR Intrusion Zone Controlled/Protected Inputs

Once you have selected a Controlled Input for a row, it cannot be changed. You can, however, deletethe entire row, removing that Input from the Intrusion Zone.

NOTE If you need to completely delete a Controlled/Protected Input fromthe system, you must first make sure to remove it from any IntrusionZone to which it is assigned.

To Delete an iSTAR Intrusion Zone Controlled/Protected Input

1. On the Inputs tab of the iSTAR Intrusion Zone Editor in the Controlled Inputs box, click a rowto select it.

2. Click Remove to delete the Input row.

168 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 169: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone Arm - Disarm Tab

iSTAR Intrusion Zone Arm - Disarm TabThe iSTAR Intrusion Zone Arm - Disarm tab, shown in Figure 37 on Page 170, lets you define thelocal methods for arming and disarming the Intrusion Zone, the related options, and the exit andentrance delays.

Definitions for this tab are provided in iSTAR Intrusion Zone Arm - Disarm Tab Definitions on Page170.

You can perform the following tasks from the iSTAR Intrusion Zone Arm - Disarm tab:

l Configuring Arming for an iSTAR Intrusion Zone on Page 173

l Configuring Disarming for an iSTAR Intrusion Zone on Page 175

NOTE Other methods that can be used to arm/disarm an Intrusion Zoneinclude:

• Host manual actions (guard privileges control this)

• Keypad Commands

• Event Actions (activated by Triggers)

C•CURE 9000 Areas and Zones Guide Chapter 2 169

Page 170: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone Arm - Disarm Tab

Figure 37: iSTAR Intrusion Zone Editor Arm - Disarm Tab

iSTAR Intrusion Zone Arm - Disarm Tab Definitions

The iSTAR Intrusion Zone Arm - Disarm tab has the fields shown in Table 32 on Page 170.

Fields/Buttons Description

Arming

Table 32: iSTAR Intrusion Zone Editor - Arm - Disarm Tab Fields

170 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 171: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone Arm - Disarm Tab

Fields/Buttons Description

CardMethod toArm Zone

Click the down-arrow to select from the drop-down list the Cardmethod required to arm the IntrusionZone.

None – No Card swipe is allowed to arm the Intrusion Zone. This is the default. (Typically selected to armwith an Event)

Key Press and Credential – The personmust pressCMD/ENT twice and then swipe a card withClearance.

Active Input and Credential – The personmust pressan Active Input (selected in theArming Inputfield—a keyactivated switch, for example) and then swipe a card with Clearance.

Key Press, Credential and Personnel group – The personmust pressCMD/ENT twice and thenswipe a card with Clearance, andmust also belong to the Personnel group designated in thePersonnelGroup if Required field.

NOTE: Personnelwith the Intrusion Zone Administrator option selected (Personnel General tab)who have clearance to the door do not have to be in the PersonnelGroup to validly use thecommand.

Active Input, Credential and Personnel Group – The personmust pressan Active Input (selected intheArming Input field—a keyactivated switch, for example) and then swipe a card with Clearance, andmust also belong to the Personnel group designated in thePersonnel Group if Required field.

Arming Input NOTE: This field is available only if the CardMethod selected in the preceding field specifies an ActiveInput.

Click and select an Input from the dialog box to act as the Active Input to arm this Intrusion Zone. Thesame Input can be used for both arming and disarming the Intrusion Zone.

(Only Inputs on the Controller not yet assigned to anyother function and not configured on the IntrusionZone Inputs tab asa Controlled Input display in the list.)

The Input you select has its type changed from ‘General’ to Intrusion Zone’ once you save the IntrusionZone configuration.

PersonnelGroupif Required

NOTE: This field is available only if the CardMethod selected in theCard Method to Arm Zone fieldspecifies a PersonnelGroup.

Click and select aPersonnel Group from the dialog box that appears.NOTE: Personnelwith the Intrusion Zone Administrator option selected (Personnel General tab)

can alwaysarm the Intrusion Zone without being in the specified PersonnelGroup—if theyhaveclearance to the door.

Exit Delaymin:sec

Click the up- and down-arrows to set the Exit Delay time inminutesand seconds. The range is from 00:00to 2:00 (min:sec)

If an Exit Delay time is set, when arming of the Intrusion Zone is activated by the selectedmethod, the ExitDelays starts, giving the person exiting the zone time to leave without the Intrusion Zone going intoViolation.

C•CURE 9000 Areas and Zones Guide Chapter 2 171

Page 172: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone Arm - Disarm Tab

Fields/Buttons Description

Disarming

CardMethod toDisarm Zone

Click the down-arrow to select from the drop-down list he Cardmethod required to disarm the IntrusionZone.

None – No Card swipe is allowed to disarm the Intrusion Zone. This is the default. (Typically selected todisarmwith an Event)

Credential Only – The personmust swipe a card with Clearance.

Active Input and Credential – The personmust pressan Active Input (selected in the Input field—akeyactivated switch, for example) and then swipe a card with Clearance.

Credential and Personnel group – The personmust swipe a card with Clearance andmust alsobelong to the Personnel group designated in thePersonnel Group if Required field.

NOTE: Personnelwith the Intrusion Zone Administrator option selected (Personnel General tab)who have clearance to the door do not have to be in the PersonnelGroup to validly disarm theZone.

Active Input, Credential and Personnel Group – The personmust pressan Active Input (selected inthe Input field—a keyactivated switch, for example) and then swipe a card with Clearance, andmust alsobelong to the Personnel group designated in thePersonnel Group if Required field.

NOTE: This field is available only if the CardMethod selected in the preceding field specifies an ActiveInput.

Click and select an Input from the dialog box to act as the Active Input to disarm this Intrusion Zone.The same Input can be used for both arming and disarming the Intrusion Zone.

(Only Inputs on the Controller not yet assigned to anyother function and not configured on the IntrusionZone Inputs tab asa Controlled Input display in the list.)

The Input you select has its type changed from ‘General’ to Intrusion Zone’ once you save the IntrusionZone configuration.

PersonnelGroupif Required

NOTE: This field is available only if the CardMethod selected in theCard Method to Disarm Zone fieldspecifies a PersonnelGroup.

Click and select aPersonnel Group from the dialog box that appears.NOTE: Personnelwith the Intrusion Zone Administrator option selected (Personnel General tab)

can alwaysdisarm the Intrusion Zone without being in the specified PersonnelGroup—if theyhaveclearance to the door.

172 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 173: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone Arm - Disarm Tab

Fields/Buttons Description

Entrance Delaymin:sec

Click the up- and down-arrows to set the Entrance Delay time inminutesand seconds. The range is from00:00 to 20:30 (min:sec)

If an Entrance Delay time is set, a person entering an armed Intrusion Zone activatesanyEntrance DelayTrigger Input(s) and is given the time to disarm the Intrusion Zone.

Allow DisarmWhile Violated

Click to select this checkbox to permit this Intrusion Zone to be disarmedwhile in Violatedmode. Thedefault is cleared.

NOTE: If you want the person who disarmsan Intrusion Zone at the start of the work day to be awarebefore the disarm that the zone hasbeen violated during the night, leave this option cleared(not set).

Configuring Arming for an iSTAR Intrusion Zone

This procedure assumes that you have already selected the iSTAR Controller for the Intrusion Zoneand have configured Doors, Readers, and Inputs.

To Configure Arming for an iSTAR Intrusion Zone

1. Create or modify an iSTAR Intrusion Zone. See Creating an iSTAR Intrusion Zone on Page 140or Modifying an iSTAR Intrusion Zone on Page 150.

2. On the iSTAR Intrusion Zone Editor, click the Arm - Disarm tab to open.

3. In the Arming box, click the down-arrow in the Card Method to Arm Zone field to display adrop-down list of card arming methods. (The default is None.)

4. Click the local method you want to be used to arm this Intrusion Zone.

If you select a method requiring an Active Input, the Arming Input field becomes available andrequires an entry. If you select a method requiring a Personnel Group, the Personnel Group ifRequired field becomes available and requires an entry.

5. If required, click next to the Arming Input field.

C•CURE 9000 Areas and Zones Guide Chapter 2 173

Page 174: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone Arm - Disarm Tab

A selection list opens with the Inputs available for arming iSTAR Intrusion Zones.

6. Click an Input to select it. (The same Input can be used to both arm and disarm the zone, but itcannot be a Controlled Input.)

7. If required, click next to the Personnel Group if Required field.

A selection list opens with the available Personnel Groups.

Select the Personnel Group to which the person must belong in order to arm the Intrusion Zone.

NOTE Personnel who have the Intrusion Zone Administrator optionselected on their record and have clearance to the door can alwaysarm the Intrusion Zone even if they are not in the selected PersonnelGroup. For information, see Configuring a Person to Arm/DisarmIntrusion Zones on Page 191.

174 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 175: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone Arm - Disarm Tab

8. In the Exit Delay field, click the up- and down-arrows to set the time in minutes and secondsthat the person arming the zone by the selected method has to exit before the zone violates. Therange is from 00:00 to 2:00 (min:sec).

Configuring Disarming for an iSTAR Intrusion Zone

This procedure assumes that you have already selected the iSTAR Controller for the Intrusion Zoneand have configured Doors, Readers, and Inputs.

To Configure Disarming for an iSTAR Intrusion Zone

1. Create or modify an iSTAR Intrusion Zone. See Creating an iSTAR Intrusion Zone on Page 140or Modifying an iSTAR Intrusion Zone on Page 150.

2. On the iSTAR Intrusion Zone Editor, click the Arm - Disarm tab to open.

3. In the Disarming box, click the down-arrow in the Card Method to Disarm Zone field to displaya drop-down list of card disarming methods. (The default is None.)

4. Click the local method you want to be used to disarm this Intrusion Zone.

If you select a method requiring an Active Input, the Disarming Input field becomes availableand requires an entry. If you select a method requiring a Personnel Group, the Personnel Groupif Required field becomes available and requires an entry.

5. If required, click next to the Disarming Input field.

A selection list opens with the Inputs available for disarming iSTAR Intrusion Zones.

C•CURE 9000 Areas and Zones Guide Chapter 2 175

Page 176: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone Arm - Disarm Tab

6. Click an Input to select it. (The same Input can be used to both arm and disarm the zone, but itcannot be a Controlled Input.)

7. If required, click next to the Personnel Group if Required field.

A selection list opens with the available Personnel Groups.

Select the Personnel Group to which the person must belong in order to disarm the IntrusionZone.

NOTE Personnel who have the Intrusion Zone Administrator optionselected on their record and have clearance to the door can alwaysdisarm the Intrusion Zone even if they are not in the selectedPersonnel Group. For information, see Configuring a Person toArm/Disarm Intrusion Zones on Page 191.

176 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 177: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone Arm - Disarm Tab

8. In the Entrance Delay field, click the up- and down-arrows to set the time in minutes andseconds that the person disarming the zone by the selected method has to enter and disarmbefore the zone violates. The range is from 00:00 to 20:30 (min:sec).

9. Click to select the Allow Disarm While Violated option or leave it clear.

C•CURE 9000 Areas and Zones Guide Chapter 2 177

Page 178: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone TriggersTab

iSTAR Intrusion Zone Triggers TabThe iSTAR Intrusion Zone Triggers tab, shown in Figure 38 on Page 178, allows you to set upTriggers, configured procedures used by C•CURE 9000 to activate specific actions when a particularpredefined condition occurs.

Figure 38: iSTAR Intrusion Zone Editor TriggersTab

The tab contains one Action, Activate Event, that can be linked to a specific value of an IntrusionZone-related state and to any panel or host Event configured in the system. Once the IntrusionZone’s state matches one of these values, the linked Activate Event action is triggered and the user-specified Event is set to an active state (if allowed by the Event, which should be armed at the time).

Typically you could use the activated Event to arm or disarm an Intrusion Zone, set off an alarmwhen an Intrusion Zone is in a Violated state, or schedule a nightly Arming check for a particularIntrusion Zone. For details about available Trigger properties, their corresponding values, the Eventtypes, and Scheduling, see Table 35 on Page 180.

By creating new rows and selecting different values for each row, each value of the Property fieldcan trigger its own Event. It is also possible to trigger two different Events for the same IntrusionZone state value by creating two rows with the same value and then linking each row to its ownEvent.

You use the Triggers tab to accomplish the tasks listed below, needed to configure an iSTARIntrusion Zone. The procedural steps for each task are detailed in the following subsections.

• Configuring Triggers for iSTAR Intrusion Zones on Page 180

• Deleting a Trigger from an iSTAR Intrusion Zone on Page 184

178 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 179: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone TriggersTab

iSTAR Intrusion Zone Triggers Tab Definitions

The iSTAR Intrusion Zone Triggers tab has the buttons shown in Table 33 on Page 179 and thefields shown in Table 34 on Page 179.

Button Name Description

Add Click this button create a new row in the Triggers table. You have to configure all the fields in therow and select an Event to complete the Add operation

To add a new row after a specific existing row, click the row selector to select a row and

then click .

Remove Click this button to remove a selected row from the Triggers table. You have to click the row

selector to select a row to remove. If no row is selected, this button isnot available.

Table 33: iSTAR Intrusion Zone Editor TriggersTab Buttons

Field Description

Property*Click in theProperty field to display and then click this button to displaya dialog boxwith available Intrusion Zone properties. Double-click a Property to select it.

Value* Click the down-arrow to select a value from the drop-down list.

When the Intrusion Zone’sState propertymatches this value, the event you specify in theEvent field is activated.

Action Click the down-arrow to selectActivate Event (the only type available) from the drop-down list. This action will be executed when the value of the Intrusion Zone’sStatepropertymatches that selected in theValue field.

Details The name of the event configured for this row (read-only) is entered by the system onceyoumake a selection in theEvent field.

Table 34: iSTAR Intrusion Zone Editor - TriggersTab Fields

C•CURE 9000 Areas and Zones Guide Chapter 2 179

Page 180: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone TriggersTab

Field Description

Event*Click in this field to select the event to be activated if the State for the current row onthe grid has the specified value.

NOTE: Switching rows in the grid updates this field with the user-selected event so thateach row can have its own event to activate.

Schedule*Click in theSchedule field to display and then click this button to displaya dialog boxwith available Schedules. Double-click a Schedule to select it.

*For detailed information about the relationshipsbetween the available properties, their corresponding values, the Event types,and Scheduling, see Table 35 on Page 180.

Property Possible Values Event Type Schedule Type

ArmCheckStatus Not Armed Panel only Must be scheduledCannot be Always/Never

Mode Status Armed/Disarmed Panel

Host

Alwaysonly

Modifiable

ReadyTo Arm Status ReadyTo Arm Host only Modifiable

Not ReadyTo Arm Panel

Host

Alwaysonly

Modifiable

Violation Status Not Violated Host only Modifiable

Violated Panel

Host

Alwaysonly

Modifiable

Table 35: iSTAR Intrusion Zone TriggersTable Details

Configuring Triggers for iSTAR Intrusion Zones

You can create as many triggers as you wish for any iSTAR Intrusion Zone.

180 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 181: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone TriggersTab

To Configure Intrusion Zone Triggers

1. Create or modify an iSTAR Intrusion Zone. See Creating an iSTAR Intrusion Zone on Page 140or Modifying an iSTAR Intrusion Zone on Page 150.

2. On the iSTAR Intrusion Zone Editor, click the Triggers tab to open.

3. Click Add to create a new trigger row, as shown in the following figure.

4. Click in the Property field to display and click this button.

A selection list opens with the properties available for iSTAR Intrusion Zones.

5. Click a property to add it to the row.

Example:

Mode Status

6. Click the down-arrow in the Value field to display a drop-down list of values for the propertyyou selected.

7. Click the Value you want to activate the event for this trigger to add it to the row.

Example:

Disarmed

C•CURE 9000 Areas and Zones Guide Chapter 2 181

Page 182: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone TriggersTab

8. Click the down-arrow in the Action field to display a drop-down list containing Activate Eventas the only available action. Click Activate Event to add it to the row as the action that will beexecuted when the Intrusion Zone’s state matches that selected in the Value field.

The Event field displays on the bottom of the tab.

9. Click in the Event field to display a selection list of all events currently configured in theC•CURE 9000 system, and then click an Event to select it.

The system enters the name of the Event you select in the Details field for the row when youclick anywhere outside the Event field. This event will be activated whenever the State for thecurrent row on the grid matches the value specified in that row.

182 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 183: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone TriggersTab

The Schedule field contains the default entry Always, which is the only type valid for PanelEvents. You can select a schedule for a Host Event and must select a schedule (other thanAlways/Never) for the Arm Check Status property (even though it is a Panel Event).

10. Click in the Schedule field to display a selection list of schedules configured in theC•CURE 9000 system.

11. Click a Schedule to select it.

The tab now appears as shown in the following example.

C•CURE 9000 Areas and Zones Guide Chapter 2 183

Page 184: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone TriggersTab

12. To create more triggers for this iSTAR Intrusion Zone, repeat these steps for each trigger youwant.

Switching rows in the grid updates the Event field with the user-selected event so that each rowcan have its own event to activate.

Deleting a Trigger from an iSTAR Intrusion Zone

To Delete an iSTAR Intrusion Zone Trigger

1. On the Triggers tab, click a row to select it.

2. Click Remove to delete the trigger row.

184 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 185: 9000-Areas-Zones.pdf

iSTAR Intrusion ZoneGroupsTab

iSTAR Intrusion Zone Groups TabThe iSTAR Intrusion Zone Groups tab, shown in Figure 39 on Page 185, lists the iSTAR IntrusionZone Groups to which this Intrusion Zone belongs.

NOTE This tab does not display on the iSTAR Intrusion Zone Editor whenyou are configuring a new Intrusion Zone. It displays when you areediting an existing Intrusion Zone.

The Groups table on this tab is a Dynamic View that you can filter, group, print, and view in CardView, using the buttons described in Table 36 on Page 185.

You can select any of the Intrusion Zone Groups in the list and double-lick to edit it or right-click to display the Groups Context menu (described in the Groups chapter in the C•CURE 9000Software Configuration Guide). You can also right-click in the Name or Description field of anIntrusion Zone Group row to display a standard edit menu.

Figure 39: iSTAR Intrusion Zone Editor GroupsTab

iSTAR Intrusion Zone Groups Tab Definitions

The iSTAR Intrusion Zone Groups tab has the buttons and fields shown in Table 36 on Page 185.

Fields/Buttons Name Description

CardView

Click to display the list of iSTAR Intrusion ZoneGroups in Card View

Table 36: iSTAR Intrusion Zone Editor GroupsTab Fields/Buttons

C•CURE 9000 Areas and Zones Guide Chapter 2 185

Page 186: 9000-Areas-Zones.pdf

iSTAR Intrusion ZoneGroupsTab

Fields/Buttons Name Description

Print Click to print the list of iSTAR Intrusion ZoneGroups.

Group Click to enable Grouping of the list. You can drag a column heading to the area labeledDragcolumns to group by here to group the list by that heading

Filter Click to display the filter bar. You can click in the filter bar to add filtering criteria to any column ofthe list. For more information about Filtering, see the DynamicViewschapter in theC•CURE9000 Data ViewsGuide.

Name Name of the Group, up to 100 characters.

Description Description of the Group.

186 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 187: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone StatusTab

iSTAR Intrusion Zone Status TabThe iSTAR Intrusion Zone Status tab, shown in Figure 40 on Page 188, provides a read-only listingof critical information about the operational status of this iSTAR Intrusion Zone, including:

• Mode – displays the values: Armed, Disarmed, or Unknown

• Violated State – displays the values: Violated, Not Violated, or Unknown

• Ready To Arm State – displays the values: Ready to Arm, Not Ready to Arm, or Unknown

• First Violating Cause – displays a value indicating the initial cause of the Intrusion Zone beingin a Violated State: Input X, for example

• Mode Changed Method Status– displays a value indicating why the Intrusion Zone’s Modechanged: Host Command, Keypad Command, Card Swipe, or Unknown

• Time of Mode Changed Method – displays the date/time the Intrusion Zone’s Mode changed

You can perform the following task from the Status tab:

l Viewing Intrusion Zone Status on the Status Tab on Page 187

Viewing Intrusion Zone Status on the Status Tab

To View Status on the iSTAR Intrusion Zone Editor

1. In the Navigation Pane of the Administration Workstation, click the Areas and Zones panebutton.

2. Click the Areas and Zones drop-down list and select iSTAR Intrusion Zone.

3. Click to open a Dynamic View showing a list of all existing iSTAR Intrusion Zone Objects.

4. Right-click the iSTAR Intrusion Zone whose status you want to view and click Edit from thecontext menu that appears.

The iSTAR Intrusion Zone Editor opens with the General tab displayed.

5. Click the Status tab to open, as shown in Figure 40 on Page 188.

C•CURE 9000 Areas and Zones Guide Chapter 2 187

Page 188: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone StatusTab

Figure 40: iSTAR Intrusion Zone Editor StatusTab

188 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 189: 9000-Areas-Zones.pdf

iSTAR Intrusion Zone State ImagesTab

iSTAR Intrusion Zone State Images TabThe iSTAR Intrusion Zone State Images tab, shown in Figure 41 on Page 189 provides a means tochange the default images used to indicate states for the iSTAR Intrusion Zone on the MonitoringStation. You can select other images to display for this Intrusion Zone or return to the defaultimages, as described in State Images Tab Tasks on Page 190.

Figure 41: iSTAR Intrusion Zone Editor State ImagesTab

C•CURE 9000 Areas and Zones Guide Chapter 2 189

Page 190: 9000-Areas-Zones.pdf

State ImagesTab Tasks

State Images Tab TasksYou can change the image displayed for any Intrusion Zone state, or restore the default image.

To Change an Image

1. Double-click the default image in the tab to open a Windows file selection dialog box.

2. If necessary, navigate to find the new image.

3. Select the desired replacement image and click Open.

The new image replaces the default image and displays in the State Images tab.

To Restore the Default Image

• Right-click the replacement image in the Intrusion Zone State Images tab and select RestoreDefault.

190 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 191: 9000-Areas-Zones.pdf

Configuring a Person to Arm/Disarm Intrusion Zones

Configuring a Person to Arm/Disarm Intrusion ZonesYou can configure a person to be able to Arm/Disarm Intrusion Zones using the Card swipeArm/Disarm methods even if he or she is not in the Personnel Group configured for that IntrusionZone.

You configure this on the Personnel Editor General tab, as shown in Figure 42 on Page 191.

Figure 42: PersonnelEditor – General Tab

To Configure a Person to Arm/Disarm Intrusion Zones

1. In the Navigation Pane of the Administration Workstation, click the Personnel pane button.

2. Click the Personnel drop-down list and select Personnel.

3. Click New to create a new Personnel record.

- or -

C•CURE 9000 Areas and Zones Guide Chapter 2 191

Page 192: 9000-Areas-Zones.pdf

Configuring a Person to Arm/Disarm Intrusion Zones

Click to open a Dynamic View showing a list of all existing Personnel Objects, right-clickthe Personnel record you want to change, and click Edit from the context menu that appears.

The Personnel Editor opens with the General Tab displayed.

4. In the Options box, click to select the Intrusion Zone Administrator option.

NOTE If this option is selected, this person can Arm/Disarm any IntrusionZone using the Card swipe Arm/Disarm methods regardless of thePersonnel Group configured for that Intrusion Zone.

If this option is not selected, this person can only use the Card swipemethod to Arm/Disarm Intrusion Zones configured:

• For a Personnel Group in which he/she is included.

• With no Personnel Group required with the Card Swipe.

5. To save the Personnel record, click Save and Close.

192 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 193: 9000-Areas-Zones.pdf

Viewing Intrusion Zone Information on the Door Editor

Viewing Intrusion Zone Information on the Door EditorA Door assigned to an iSTAR Intrusion Zone displays read-only assignment information on theDoor Editor on the Areas & Zones tab, as shown in Figure 43 on Page 193.

NOTE If this Door is not assigned to an Intrusion Zone, the Intrusion Zonesbox is blank.

Figure 43: Door Editor –- Areas&ZonesTab

The Areas & Zones tab has the read-only fields shown in Table 38 on Page 196.

C•CURE 9000 Areas and Zones Guide Chapter 2 193

Page 194: 9000-Areas-Zones.pdf

Viewing Intrusion Zone Information on the Door Editor

Fields Description

Intrusion Zone Name of iSTAR Intrusion Zone thisDoor is assigned to.

Zone Direction In indicates that thisDoor is assigned asanEntrance Door for the Intrusion Zone.

Out indicates that thisDoor is assigned asanExit Door for the Intrusion Zone.

DisplayName Displays the name you entered for thisDoor on the iSTAR Intrusion ZonesEditor General tab.

Table 37: Door Editor –- Areas&ZonesTab Fields

To View a Door’s Intrusion Zone Information

1. In the Navigation Pane of the Administration Workstation, click the Hardware pane button.

2. Click the Hardware drop-down list, select iSTAR Door, and click to open a Dynamic Viewshowing a list of all existing iSTAR Doors.

- or -

Expand the Hardware Tree.

3. In the Dynamic View list/Tree, select the iSTAR Door, right-click, and click Edit from the contextmenu that appears.

4. When the iSTAR Door Editor appears, click the Areas & Zones Tab.

194 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 195: 9000-Areas-Zones.pdf

Viewing Intrusion Zone Information on the Input Editor

Viewing Intrusion Zone Information on the Input EditorAn Input assigned as an iSTAR Intrusion Zone Controlled or Protected Input displays read-onlyassignment information on the Intrusion Zone tab of the Input Editor, as shown in Figure 44 onPage 195. This tab only displays when the Input is assigned to a zone. At the same time, the valuein the Type field on the Input General tab changes from ‘General’ to ‘Intrusion Zone’.

Figure 44: iSTAR Input Editor – Intrusion Zone Tab

The Intrusion Zone tab has the read-only fields shown in Table 38 on Page 196.

C•CURE 9000 Areas and Zones Guide Chapter 2 195

Page 196: 9000-Areas-Zones.pdf

Viewing Intrusion Zone Information on the Input Editor

Fields Description

IntrusionZone

Name of iSTAR Intrusion Zone this Input is assigned to.

DisplayName

Displays the name you entered for this Input on the iSTAR Intrusion ZonesEditor Inputs tab in theControlledInputs table.

Table 38: InputsEditor –- Intrusion Zone Tab Fields

To View an Input’s Intrusion Zone Information

1. In the Navigation Pane of the Administration Workstation, click the Hardware pane button.

2. Click the Hardware drop-down list, select iSTAR Input, and click to open a DynamicView showing a list of all existing iSTAR Inputs.

- or -

Expand the Hardware Tree.

3. In the Dynamic View list/Tree, select the iSTAR Input, right-click, and click Edit from the contextmenu that appears.

4. When the iSTAR Input Editor appears, click the Intrusion Zone Tab.

196 Chapter 2 C•CURE 9000 Areas and Zones Guide

Page 197: 9000-Areas-Zones.pdf

3

Chapter 3 - Keypad Commands

This chapter explains how to configure Keypad Commands.

In this chapter

• Overview 198• Keypad Command Configuration Steps 203• Keypad Command Configuration Requirements 206• Keypad Command Format 207• Keypad Command Editor 214• Keypad Command General Tab 216• Keypad Command Permissions Tab 219• Keypad Command Groups Tab 221• Keypad Command Tasks 223• Configuring Readers for Keypad Commands 234• Configuring a Person to Use Keypad Commands 236• Enabling/Disabling Keypad Commands at Readers 238

C•CURE 9000 Areas and Zones Guide Chapter 3 197

Page 198: 9000-Areas-Zones.pdf

Overview

OverviewYou can configure Keypad Commands that authorized personnel can execute using the keypad onReaders (RMs) connected to iSTAR Controllers (see Figure 45 on Page 198).

Figure 45: Reader with Keypad

A Keypad Command is a unique (within an iSTAR Cluster) nine-digit number entered on thekeypad (with optional prompting) that activates a specific Event.

Keypad Commands can activate Panel Events that initiate:

• Intrusion Zone Actions, such as arming, disarming, and toggling Intrusion Zones, as well aschecking their status and the status of their Doors and Inputs. These Keypad Commands mustbe entered at Readers that are part of the Intrusion Zone.

• System-wide actions. These actions can control objects in the host and other clusters.

• Local target actions, such as locking/unlocking a door by entering a keypad command on itskeypad. These actions operate on the security device that activated the event, the door that ownsthe reader with that keypad, rather than on a specific target.

Figure 46 on Page 199 illustrates the capabilities of keypad commands.

198 Chapter 3 C•CURE 9000 Areas and Zones Guide

Page 199: 9000-Areas-Zones.pdf

Overview

Figure 46: Keypad Commandsand Associated Events

Keypad Commands activate Events in a special way:

• The Event is activated with no end time, but when the activation is superseded, the KeypadCommand disappears from the Event’s cause list instead of remaining until another causeoverrides it.

• These Keypad Command-activated Events ‘live until overridden’. An Action is required to undoor override a Keypad Command Event.

The recommended procedure is to construct keypad commands in pairs; use one Keypad Commandto activate an object, and another Keypad Command to deactivate the object.

The Keypad Command may be configured to require a card presentation and, optionally, a PIN tovalidate the command. The Keypad Command may also be limited to a specific personnel group’scard numbers. Additionally, the Keypad Command may be limited to specific doors in the cluster,and specific readers may be configured to disallow the use of Keypad Commands.

C•CURE 9000 Areas and Zones Guide Chapter 3 199

Page 200: 9000-Areas-Zones.pdf

Overview

Examples of Keypad Command Use

The following examples show security requirements that are met by creating keypad commands:

• The site, a multi-tenant office building, uses building security personnel to monitor tenants on allfloors. To arm and disarm different intrusion zones, keypad commands initiate events thatactivate local actions.

• The command 110 disarms any zone from a reader on a door that is part of the zone.

• The command 120 arms any zone from a reader on an intrusion zone door.

• The site, a hospital, requires local door locking and unlocking for specific time periods toprovide wheelchair access. In this case, Keypad Commands are created that initiate events withlocal door actions.

• The hospital staff enter the commands at readers outside the door.

• The Keypad Command 100, named “Enter time 15”, unlocks the door for 15 minutes(minimum activation time in Event configuration).

• The Keypad Command 200, named “Enter time 30” unlocks the door for 30 minutes.

• The Keypad Command 300, named “Enter time 00” locks the door.

How Keypad Commands Work

An Event activated by a Keypad Command, once activated, requires a separate action to override(deactivate) it.

The following sections describe the methods you can use to activate and deactivate KeypadCommands.

Method 1

Figure 47 on Page 201 demonstrates using two Keypad Commands to control an Output.

• Keypad Command 1 and Event 1 are used to activate the Output, while Keypad Command 2and Event 2 are used to deactivate it.

• When the Event 2 Action asserts, it overrides the Action of Event 1, and Event 1 is overruled.

200 Chapter 3 C•CURE 9000 Areas and Zones Guide

Page 201: 9000-Areas-Zones.pdf

Overview

This method works well in situations when there are no other controls on the Output. However, thismethod leaves a deactivation on the Output at whatever priority level is set by Event 2. If KeypadCommand 1 asserts again, it will override Event 2.

Figure 47: Method 1 - Controlling anOutput with Two Keypad Commands

Method 2

Figure 48 on Page 202 shows an alternate method that results in deactivation of all KeypadCommand Events.

• Keypad Command 1 causes Event 1 and activates the Output.

• To reset the Output, Keypad Command 2 activates Event 2 which has the following two Actions:

• One Action is to deactivate Event 1.

• The second Action is to deactivate itself.

Event 2 deactivates itself by activating Event 3, which has the Action of deactivating Event 2.

NOTE It is important that Event 3 have a minimum activation time of onesecond and an activation delay of one second.

C•CURE 9000 Areas and Zones Guide Chapter 3 201

Page 202: 9000-Areas-Zones.pdf

Overview

Figure 48: Method 2 - Controlling anOutput with Two Keypad Commands

202 Chapter 3 C•CURE 9000 Areas and Zones Guide

Page 203: 9000-Areas-Zones.pdf

Keypad CommandConfiguration Steps

Keypad Command Configuration StepsTable 39 on Page 203 shows the C•CURE 9000 Editors and activities that create Keypad Commands.

Task C•CURE9000 Editor Configuration Notes AdditionalInformation

Define the KeypadCommand format

Options&Tools>SystemVariables>iSTAR DriverCategory

Defines the number of keypadcharacters in the Command field(required).

Defines the number of keypadcharacters in the Prompt 1 and Prompt2 fields (optional).

See Keypad CommandFormat on Page 207.

Configure anddownload aKeypad Event to aniSTAR Controller

Configuration>Event>New>Event Editor

- or -

Edit an exiting Event

Createsand downloads the event tobe activated by the Keypad Command.

See the Events chapterin theC•CURE9000Software ConfigurationGuide.

Configure a DoorGroup

Configuration>Group>New>Group Editor

- or -

Edit an existing Door Group

Createsa Door Group to which the useof the Keypad Command can belimited.

See theGroupschapter in theC•CURE9000 SoftwareConfiguration Guide.

Configure aPersonnelGroup

(optional,depending onValidation Type)

Configuration>Group>New>Group Editor

- or -

Edit an existing PersonnelGroup

Createsa PersonnelGroup to whosemembersuse of the KeypadCommand can be limited.

See theGroupschapter in theC•CURE9000 SoftwareConfiguration Guide.

Configure theKeypad Command

Areasand Zones>KeypadCommand>New>KeypadCommand Editor

Createsa Keypad Command andassociates it with:

• ACluster

• The Event it activates

• The numerical sequence toexecute the keypad command.

See Keypad CommandEditor on Page 214

Table 39: Creating Keypad Commands

C•CURE 9000 Areas and Zones Guide Chapter 3 203

Page 204: 9000-Areas-Zones.pdf

Keypad CommandConfiguration Steps

Task C•CURE9000 Editor Configuration Notes AdditionalInformation

ConfigureReader(s)

FromHardware Pane>Hardware Tree, either

• Create a new Reader forthe iSTAR Controller

- or -

• Edit an existing Reader.

For information, see the iSTARController chapter in theC•CURE9000 HardwareConfiguration Guide

Then,

iSTAR Reader Editor>Keypad Tab

Allowsone or more readers to acceptkeypad commands.

See ConfiguringReaders for KeypadCommandson Page234

ConfigurePersonnel

Personnel>Personnel>New>PersonnelEditor

- or -

Edit an existing PersonnelRecord

Enablesa specific person notnecessarily in the Keypad CommandPersonnelGroup to execute theKeypad Command.

See Configuring aPerson to Use KeypadCommandson Page236

Permissions Required to Configure Keypad Commands

A C•CURE 9000 operator would need the minimum permissions listed in Table 40 on Page 204 tobe able to configure Keypad Commands:

Class Permission

iSTAR Cluster Read

iSTAR Controller Read

ACMBoard Read

iSTAR Reader Edit

Table 40: Permissions for Configuring KeypadCommands

204 Chapter 3 C•CURE 9000 Areas and Zones Guide

Page 205: 9000-Areas-Zones.pdf

Keypad CommandConfiguration Steps

Class Permission

Keypad Command Edit

Personnel Edit

C•CURE 9000 Areas and Zones Guide Chapter 3 205

Page 206: 9000-Areas-Zones.pdf

Keypad CommandConfiguration Requirements

Keypad Command Configuration RequirementsKeypad Commands must follow these guidelines and requirements:

• Keypad Command events must be downloaded to a Cluster.

• Local Keypad Commands for Intrusion Zones must be issued from a Reader that is part of aDoor included in the Intrusion Zone (the local Keypad Command is applied to the IntrusionZone that includes the Door. This allows a given local Keypad Command— for example, “ArmLocal Intrusion Zone”—to be used in many Intrusion Zones). The associated Events for a givenIntrusion Zone must be downloaded to a Controller in the Cluster that contains that IntrusionZone.

• The Event Actions of most Keypad Commands can affect objects anywhere in the system. If theEvent Actions affect objects outside the Cluster and the Cluster becomes disconnected from thehost (a communications failure), the normal algorithms will be used on re-connection. If amomentary activity occurred during the communications failure, there will be no attempt to re-issue the activity. If an activation that is still true was missed during the communicationsfailure, there will be an attempt to re-issue the activation.

• If the Keypad Command requires the swipe of a Card, Personnel must have clearance to a Doorin order to issue a Keypad Command from that Door. This applies even if their Cardconfiguration includes the Keypad Command Administrator option. It does not apply if theKeypad Command does not require card number.

• Keypad Commands can be entered from Doors that are locked, unlocked, or secure. This is doneso a person can arm or disarm an Intrusion Zone from the outside Doors regardless of the Doorstate.

• For security reasons, if the iSTAR Controller does not recognize the first— the Command—portion of the Keypad Command (or if the Keypad Command is disabled), it will still ask for allparts configured for the Keypad Command, as well as for a Card presentation.

If the Keypad Command is disabled, but is configured for a PIN, it will ask for a PIN. Inaddition, if the Keypad Command is recognized but the Card fails some test (Clearance, Lost,etc.) and the Keypad Command is configured for a PIN, the PIN is still requested.

This is done to confuse someone who may be “trying” out the keypad to see if they can figureout the commands.

206 Chapter 3 C•CURE 9000 Areas and Zones Guide

Page 207: 9000-Areas-Zones.pdf

Keypad Command Format

Keypad Command FormatKeypad Commands can be entered on the keypad as a single number or as a two- or three-partnumber. With two- or three-part Keypad Commands, the system helps the person entering theKeypad Command by prompting for the second and third parts.

Figure 49: Keypad Fields

Consequently, the first step in creating keypad commands is to define, system-wide, the commandformat. This involves the following:

1. Deciding whether the command format is to be one-part, two-part, or three-part. (The default isone-part with 9 digits.)

2. Defining the number of keypad characters in the Command Code (required).

3. Optionally, defining the number of keypad characters for Prompt 1.

4. Optionally, defining the number of keypad characters for Prompt 2.

You configure the Keypad Command format as described in Defining Keypad Command Formatson Page 210.

Format Requirements

Keypad Command formats must conform to the following guidelines:

• The combined value for the Command Code, Prompt 1 Code, andPrompt 2 Code can be any combination that adds up to 9 digits.

Command Code is required and accepts a value of 1 to 9; Prompt 1 and Prompt 2 Codes areoptional and accept a value from 0 to 8.

C•CURE 9000 Areas and Zones Guide Chapter 3 207

Page 208: 9000-Areas-Zones.pdf

Keypad Command Format

• The string for Prompt 1 is “ENTER ACCESS”. This is a text only field with no internalsignificance.

• The string for Prompt 2 is “ENTER TARGET”. This is a text only field with no internalsignificance.

• Keypad Command sequences and optional prompts must be unique.

• Personnel entering Command Code at keypads must bracket each code with the CMD/ENT keyand must not use 0 (zero) as the first digit of the code.

Example:

CMD/ENT 222 CMD/ENT is correct;while CMD/ENT 022 CMD/ENT is incorrect.

You should not modify the command formats after you use them tocreate commands. Modifications to the command format cause existingkeypad commands to behave differently.

Example Formats

The following examples show keypad commands that use:

• Command Code only

• Command Code with Prompt 1

• Command Code with Prompt 1 and Prompt 2

Command Code Only

The Keypad Command in this example uses a Command Code format to arm and disarm anintrusion zone.

The format is configured as follows:

Command Code: 9

Prompt 1 Code: 0

Prompt 2 Code:0

• To arm the intrusion zone, the security personnel press CMD/ENT 100 CMD/ENT.

208 Chapter 3 C•CURE 9000 Areas and Zones Guide

Page 209: 9000-Areas-Zones.pdf

Keypad Command Format

• To disarm the intrusion zone, security personnel enter CMD/ENT 101 CMD/ENT.

C•CURE 9000 automatically pads the unused portion of the command field to conform to the nine-digit command code format:

000000100, 000000101

Security personnel need enter only the command portion of this field.

Command Code with Prompt 1

The Keypad Commands in this example arm and disarm Intrusion Zones on two floors. The Prompt1 code expects security personnel to enter the code for the Intrusion Zone floor.

The format is configured as follows:

Command Code: 6

Prompt 1 Code: 3

Prompt 2 Code: 0

• To arm a zone, the security personnel enter CMD/ENT 200 CMD/ENT.

• When the reader displays the Prompt 1 message “ENTER ACCESS”, personnel enter 1 or 2, thecode indicating the first or the second floor.

• To disarm the zone, security personnel enter CMD/ENT 300 CMD/ENT.

• When the reader displays the Prompt 1 message “ENTER ACCESS”, personnel enter 1 or 2, thecode indicating the first or the second floor.

C•CURE 9000 automatically pads the unused portion of the command field and prompt fields toconform to the six-digit and three-digit requirements:

000200, 001 or 002

Security personnel need enter only the non-zero portions of the command

Command Code with Prompt 1 and Prompt 2

The Keypad Commands in this example turn lights on and off on two floors. The Prompt 1 andPrompt 2 code expect security personnel to enter the codes for the floor and light numbers.

The format is configured as follows:

C•CURE 9000 Areas and Zones Guide Chapter 3 209

Page 210: 9000-Areas-Zones.pdf

Keypad Command Format

Command Code: 3

Prompt 1 Code: 3

Prompt 2 Code: 3

• To toggle on/off, the security personnel enter CMD/ENT 1 CMD/ENT or CMD/ENT 2CMD/ENT.

• When the reader displays the prompt 1 message “ENTER ACCESS”, personnel enter 1 or 2, thecode indicating the first or the second floor.

• When the reader displays the prompt 2 message “ENTER TARGET”, personnel enter the roomnumber of the light.

C•CURE 9000 pads the unused portion of the command field and prompt fields to conform to thethree-digit requirement:

001 or 002, 001 or 002, 056.

Security personnel need enter only the non-zero portions of the command.

Defining Keypad Command Formats

To Define Keypad Command Formats

1. In the Administration Station, on the Options & Tools pane, select System Variables.

2. On the General tab, expand the iSTAR Driver category.

3. Scroll down to locate the “Length of Command Code in Keypad entry” system variable in theName column.

This is the first of the three Keypad Command Format system variables, as shown in Figure 50on Page 211.

210 Chapter 3 C•CURE 9000 Areas and Zones Guide

Page 211: 9000-Areas-Zones.pdf

Keypad Command Format

Figure 50: SystemVariables– Keypad Command Formats

4. To edit the Command format:

Double-click in any one of these three Keypad Command System Variable rows.

- or -

Right-click in the row and then click Edit from the Context menu that appears.

The System Variables Editor appears with the Keypad Commands on the iSTAR Variables tab,as shown in Figure 51 on Page 212.

C•CURE 9000 Areas and Zones Guide Chapter 3 211

Page 212: 9000-Areas-Zones.pdf

Keypad Command Format

Figure 51: SystemVariablesEditor – Keypad Command Formats

5. Change the values in these fields according to the information given in this Keypad CommandFormat section on Page 207 thru Page 209 and in System Variables iSTAR Variables Tab Fieldson Page 213.

6. Click Save and Close when you are finished editing the formats.

System Variable iSTAR Variables Tab Definitions

The iSTAR Variables tab has the fields shown in Table 41 on Page 213.

212 Chapter 3 C•CURE 9000 Areas and Zones Guide

Page 213: 9000-Areas-Zones.pdf

Keypad Command Format

Tab Field Description

Keypad Commands

NOTE: The sum of the value of these three fieldsmust equal 9.Important—If you change the values in the fields on thistab, keypad commandsmaynot work. Checkeach keypad command to ensure that it is stillusable.

Commandcodelength

Enter the number of digits used for the “CommandCode”part of the keypad entry. The valid range is 1 to 9, with adefault value of 9.

NOTE: The number you enter in this field controls thenumber of digits you can enter in theCommandCode field on theGeneral tab of theKeypadCommand Editor.

Prompt 1codelength

Enter the number of digits used for the Prompt 1 Codepart of the keypad entry. The valid range is 1 to 8, with adefault value of 0 (zero).

NOTE: The number you enter in this field controls thenumber of digits you can enter in the Prompt 1Code field on theGeneral tab of theKeypadCommand Editor.

This field is unavailable if it hasa value of 0 (zero).

Prompt 2codelength

Enter the number of digits used for the Prompt 2 Codepart of the keypad entry. The valid range is 1 to 8, with adefault value of 0 (zero).

NOTE: The number you enter in this field controls thenumber of digits you can enter in the Prompt 2Code field on theGeneral tab of theKeypadCommand Editor.

This field is unavailable if it hasa value of 0 (zero).

Table 41: SystemVariables iSTAR VariablesTab Fields

C•CURE 9000 Areas and Zones Guide Chapter 3 213

Page 214: 9000-Areas-Zones.pdf

Keypad Command Editor

Keypad Command EditorThe Keypad Command Editor in C•CURE 9000 lets you create and modify Keypad CommandObjects that allow users to activate events through local keypads.

The Keypad Command Editor displays the following tabs for configuring Commands:

• Keypad Command General Tab on Page 216

• Keypad Command Permissions Tab on Page 219

• Keypad Command Groups Tab on Page 221 (when editing an existing Keypad Command)

To use the Keypad Command Editor, see Accessing the Keypad Command Editor on Page 214.

Accessing the Keypad Command Editor

You can access the Keypad Command Editor from the C•CURE 9000 Areas and Zones pane.

To Access the Keypad Command Editor

1. In the Navigation Pane of the Administration Workstation, click the Areas and Zones panebutton.

2. Click the Areas and Zones drop-down list and select Keypad Command.

3. Click New to create a new Command.

- or -

Click to open a Dynamic View showing a list of all existing Keypad Command Objects,right-click the Keypad Command you want to change, and click Edit from the context menu thatappears.

The Keypad Command Editor opens.

The Keypad Command Editor has the buttons described in Table 42 on Page 215 and the fieldsdescribed in Table 43 on Page 217 and Table 44 on Page 220.

214 Chapter 3 C•CURE 9000 Areas and Zones Guide

Page 215: 9000-Areas-Zones.pdf

Keypad Command Editor

Button Description

SaveandClose

Click this button when you have completed any changes to the Keypad Command and wish to save those changes.The Keypad Command closes.

SaveandNew

Click this button when you have completed any changes to the Keypad Command and wish to save those changesand also create a new Keypad Command. The Keypad Command you were editing is saved, and a new KeypadCommand opens (either blankor including template information if you were using a template to create the newKeypad Command).

Click this button when you want to close theKeypad Command Editorwithout saving your changes.

Awarning appears asking whether or not you want to save your changesbefore closing the editor. ClickYes to exitand save andNo to exit and cancel your changes.

Table 42: Keypad Command Editor Buttons

C•CURE 9000 Areas and Zones Guide Chapter 3 215

Page 216: 9000-Areas-Zones.pdf

Keypad CommandGeneral Tab

Keypad Command General TabThe Keypad Command General tab, shown in Figure 52 on Page 217, lets you define the followingfor the Keypad Command:

• Home cluster

• Event which the command activates

• Priority of the Event

• Command Code and optional Prompt Codes

NOTE You can save a Keypad Command configuration without an iSTARCluster and an Event if you do not enable it. An existing KeypadCommand becomes ‘disabled’ when it loses its Cluster and Eventbecause the Event’s Controller is either deleted or becomes‘unassigned.’

216 Chapter 3 C•CURE 9000 Areas and Zones Guide

Page 217: 9000-Areas-Zones.pdf

Keypad CommandGeneral Tab

Figure 52: Keypad Command Editor General Tab

Keypad Command General Tab Definitions

The Keypad Command Editor and the General tab have the fields and buttons shown in Table 43on Page 217.

Fields/Buttons Description

Name Enter a unique name, up to 100 characters, to identify the Keypad Command.

Description Enter a description of the Keypad Command, up to 255 characters.

Table 43: Keypad Command Editor - General Tab Fields

C•CURE 9000 Areas and Zones Guide Chapter 3 217

Page 218: 9000-Areas-Zones.pdf

Keypad CommandGeneral Tab

Fields/Buttons Description

Enabled Select this checkbox to activate the Keypad Command.

Partition A read-only field displaying the name of the Partition to which thisKeypad Command belongs. (This fieldis visible only if theC•CURE9000 system is partitioned.)

NOTE: The Keypad Command belongs to the partition of the iSTAR Cluster selected in the Target Eventbox, not the Operator’sNew Object Partition. On the other hand, if the Keypad Command hasno Cluster and no Event—isnot enabled, when you save it, it belongs to the New ObjectPartition.

Target Event

iSTAR Cluster Select the home cluster for the command. (In a partitioned system, the iSTAR Cluster selection list isnotlimited byPartition, but includesallClusters in the system.)

NOTE: If you select the Event first, the system automatically enters the Cluster to which the Event’sController belongs. This field is then unavailable.

Event Select the Event to be activated by the Keypad command. (In a partitioned system, the Event selectionlist isnot limited byPartition, but includesall panelEvents in the system.) See the “Events” chapter in theC•CURE9000 Software Configuration Guide for information about creating an event.

NOTE: If an iSTAR Cluster is already selected, the available Events are related to that Cluster. If noCluster is selected, all panelEvents are available.

Priority Indicates the priority level the system uses for sorting when displaying on theMonitoring Station andprioritizing actionsassociated with the event. The default priority is 75, Medium Low.

Select a value from the drop-down list or type an integer from 0 to 200 to assign a priority to the Event.The lowest value is 0; the highest is 200.

Definition

CommandCode* Defines the numbers to be pressed bypersonnel on the keypad for the command code (required).

Prompt 1 Code* Defines the numbers to be pressed bypersonnel on the keypad for Prompt 1 (optional).

Prompt 2 Code* Defines the numbers to be pressed bypersonnel on the keypad for Prompt 2 (optional).

*The total keypad command codemust be unique for one cluster—the cluster of the iSTAR that owns the target event.

218 Chapter 3 C•CURE 9000 Areas and Zones Guide

Page 219: 9000-Areas-Zones.pdf

Keypad Command PermissionsTab

Keypad Command Permissions TabThe Keypad Command Permissions tab, shown in Figure 53 on Page 219, lets you define thefollowing for the Keypad Command:

• Doors at which the command will be available.

• Type of validation required once the keypad Command is entered.

Field for this tab are defined in Keypad Command Permissions Tab Definitions on Page 219.

Figure 53: Keypad Command Editor PermissionsTab

Keypad Command Permissions Tab Definitions

The Permissions tab has the fields and buttons shown in Table 44 on Page 220.

C•CURE 9000 Areas and Zones Guide Chapter 3 219

Page 220: 9000-Areas-Zones.pdf

Keypad Command PermissionsTab

Fields/Buttons Description

Door groupallowed to issuecommand

TheReaders at the doors in the specified group can accept keypad commands.

To specify a group, click and select aDoor Group from the dialog box that appears.NOTE: Commandsonly function at doorswithin the home cluster.

Validation typerequired

You can choose one of five validationmodes from the this drop-down box.

None – The Keypad Command doesnot require anyextra validation. This is the default.

Credential Only – The personmust swipe a card with Clearance after entering the command.

NOTE: Even Personnelwith theKeypad Commands Administrator option selected (PersonnelGeneral tab) must have clearance to the door to validly use the command.

Credential and Personnel group – The personmust swipe a card with Clearance after entering thecommand, andmust also belong to the Personnel group designated in the next field.

NOTE: Personnelwith theKeypad Commands Administrator option selected (Personnel Generaltab) who have clearance to the door do not have to be in the PersonnelGroup to validly use thecommand.

Credential and PIN – The personmust swipe a card with Clearance after entering the command, andin addition, must then enter a PIN.

Credential, Personnel Group and PIN – All three of the preceding validationmodesmust bemet bythe person for the Keypad Command to be accepted.

Personnel group NOTE: This field is available only if the Validation type selected in the preceding field specifies aPersonnelGroup.

Click and select aPersonnel Group from the dialog box that appears.NOTE: Personnelwith theKeypad Commands Administrator option selected (Personnel General

tab) can alwaysactivate all commands if theyhave clearance to the door.

Table 44: Keypad Command Editor - PermissionsTab Fields

220 Chapter 3 C•CURE 9000 Areas and Zones Guide

Page 221: 9000-Areas-Zones.pdf

Keypad CommandGroupsTab

Keypad Command Groups TabThe Keypad Command Groups tab, shown in Figure 54 on Page 221, lists the Keypad CommandGroups to which this Keypad Command belongs.

NOTE This tab does not display on the Keypad Command Editor when youare configuring a new Keypad Command. It displays when you areediting an existing Keypad Command.

The Groups table on this tab is a Dynamic View that you can filter, group, print, and view in CardView, using the buttons described in Keypad Command Editor Groups Tab Fields/Buttons on Page222.

You can select any of the Keypad Command Groups in the list and double-click to edit it orright-click to display the Groups Context menu (described in the Groups chapter in the C•CURE9000 Software Configuration Guide). You can also right-click in the Name or Description field of aKeypad Command Group row to display a standard edit menu.

Figure 54: Keypad Command Editor GroupsTab

Keypad Command Groups Tab Definitions

The Keypad Command Groups tab has the buttons and fields shown in Table 45 on Page 222.

C•CURE 9000 Areas and Zones Guide Chapter 3 221

Page 222: 9000-Areas-Zones.pdf

Keypad CommandGroupsTab

Fields/Buttons Name Description

CardView

Click to display the list of Keypad CommandGroups in Card View

Print Click to print the list of Keypad CommandGroups.

Group Click to enable Grouping of the list. You can drag a column heading to the area labeledDragcolumns to group by here to group the list by that heading

Filter Click to display the filter bar. You can click in the filter bar to add filtering criteria to any column ofthe list. For more information about Filtering, see the DynamicViewschapter in theC•CURE9000 Data ViewsGuide.

Name Name of the Group, up to 100 characters.

Description Description of the Group.

Table 45: Keypad Command Editor GroupsTab Fields/Buttons

222 Chapter 3 C•CURE 9000 Areas and Zones Guide

Page 223: 9000-Areas-Zones.pdf

Keypad Command Tasks

Keypad Command TasksYou can perform the following tasks using the Keypad Command Editor.

• Creating a Keypad Command on Page 223

• Creating a Keypad Command Template on Page 224

• Configuring a Keypad Command on Page 225

• Viewing a List of Keypad Commands on Page 228

• Modifying a Keypad Command on Page 231

• Deleting a Keypad Command on Page 231

• Setting a Property for a Keypad Command on Page 232

• Adding a Keypad Command to a Group on Page 232

• Configuring Readers for Keypad Commands on Page 234

• Configuring a Person to Use Keypad Commands on Page 236

Creating a Keypad Command

You can create a new Keypad Command using the Keypad Command Editor.

This procedure assumes that you have already defined the Keypad Command format for the system,configured the iSTAR Cluster and Controllers, configured a Keypad Command Event anddownloaded it to an iSTAR Controller in the Cluster, and configured at least one Door Group—and ifrequired by validation type, have also configured at least one Personnel Group.

To Create a Keypad Command

1. In the Navigation Pane of the Administration Workstation, click the Areas and Zones panebutton.

2. Click the Areas and Zones drop-down list and select Keypad Command.

3. Click New to create a new Command. The Keypad Command Editor opens.

4. You can now configure the new Keypad Command.

5. To save your new Keypad Command, click Save and Close.

- or -

C•CURE 9000 Areas and Zones Guide Chapter 3 223

Page 224: 9000-Areas-Zones.pdf

Keypad Command Tasks

Alternatively, if you want to save the Keypad Command and then create a new one, click Saveand New. The current Keypad Command is saved and closed, but the Keypad Command Editorremains open ready for a new Keypad Command.

Creating a Keypad Command Template

You can create a new template for a Keypad Command. A Keypad Command template saves youtime because you do not have to re-enter the same Command information again.

To Create a Keypad Command Template

1. In the Navigation Pane of the Administration Workstation, click the Areas and Zones panebutton.

2. Click the Areas and Zones drop-down list and select Keypad Command.

3. Click the down-arrow on the New button, and click Template.

The Keypad Command Editor where you can configure the Command template opens.

4. Configure the template to meet your requirements. If you configure values for the Priority andValidation type required fields, these become part of the template; then when you subsequentlycreate a new Keypad Command from that template, these values are already filled in.

5. In the Name field, enter the name you wish to use for the template.

Example:

KPCTemplate1

6. To save the template, click Save and Close.

The template will be available as an option on the pull-down menu on the New button in theAreas and Zones pane.

224 Chapter 3 C•CURE 9000 Areas and Zones Guide

Page 225: 9000-Areas-Zones.pdf

Keypad Command Tasks

Configuring a Keypad Command

This procedure assumes that you have already defined the Keypad Command format for the system,configured the iSTAR Cluster and Controllers, configured a Keypad Command Event anddownloaded it to an iSTAR Controller in the Cluster, and configured at least one Door Group—and ifrequired by validation type, have also configured at least one Personnel Group.

To Configure a Keypad Command

1. Create a new Keypad Command or modify an existing Keypad Command.

NOTE If you are modifying an existing Keypad Command, you cannotchange the iSTAR Cluster field.

2. Type a Name and Description for the Keypad Command that sufficiently identifies this KeypadCommand and its purpose.

3. In the Target Event box on the General tab, enter information as follows:

a. In the iSTAR Cluster field, click and then select the home Cluster for the KeypadCommand’s Event from the Selection list that appears.

NOTE If you select the Event first, the system automatically enters theCluster to which the Event’s Controller belongs.

b. In the Event field, click and then select the Event to be activated by the KeypadCommand from the Selection list that appears.

C•CURE 9000 Areas and Zones Guide Chapter 3 225

Page 226: 9000-Areas-Zones.pdf

Keypad Command Tasks

NOTE If an iSTAR Cluster is already selected, the available Events arerelated to that Cluster. If no Cluster is selected, all panel Events areavailable.

c. To change the Priority level assigned to the Keypad Command’s Event action from theMedium Low 75 default,

Click the Priority down-arrow to select a new value.

- or -

Type an integer from 0 (zero) to 200 in the related numeric field.

4. In the Definition box on the General tab, configure the Keypad Command Code as follows:

a. In the Command Code field, enter the numbers that personnel will enter on the Keypad toactivate the Command.

b. If the Keypad Command format defined for the system includes the optional Prompt 1 Codeor both Prompt 1 and Prompt 2 Codes, the field(s) will be available for you to type thenumbers for personnel to enter on the Keypad.

NOTE Make sure that the total Keypad Command Code is unique for onecluster—the cluster of the iSTAR that owns the target Event.

For detailed formatting information, see Keypad Command Formaton Page 207.

226 Chapter 3 C•CURE 9000 Areas and Zones Guide

Page 227: 9000-Areas-Zones.pdf

Keypad Command Tasks

5. Click the Permissions tab. The fields on this tab allow you to control the access to KeypadCommands.

a. In the Door group allowed to issue command field, click and then select the Door Groupfrom the Selection list that appears. (This list only includes the “All Doors Group” and iSTARDoor Groups.)

Keypad Commands will be allowed at those Doors in the selected group that are within theCluster selected for the Keypad Command on the General tab.

b. To specify additional validations for this Keypad Command when it is entered on a keypad(the default is None), click the down-arrow in the Validation type required field and select anoption from the drop-down list.

If you select either Clearance and Personnel Group or Clearance, Personnel Group and PIN,the Personnel group field becomes available. You must then select the group whose memberswill be allowed to use this Keypad Command.

c. If required, in the Personnel group field, click and then select a Personnel Group from theSelection list that appears.

C•CURE 9000 Areas and Zones Guide Chapter 3 227

Page 228: 9000-Areas-Zones.pdf

Keypad Command Tasks

NOTE Personnel who have the Keypad Command Administrator optionselected on their record can issue the Keypad Command even if theyare not in the selected Personnel Group. For information, seeConfiguring a Person to Use Keypad Commands on Page 236.

6. Enable the Keypad Command by selecting the Enabled check box on the top of the Editor.

7. To save the configured Keypad Command, click Save and Close.

- or -

Alternatively, if you want to save the Keypad Command and then create a new one, click Saveand New. The current Keypad Command is saved and closed, but the Keypad Command Editorremains open ready for a new Keypad Command.

8. You can optionally configure specific Readers to allow the entry of Keypad Commands, disallowthem, or allow them during certain time periods. For configuration information, see ConfiguringReaders for Keypad Commands on Page 234.

9. As mentioned in the note above, you can optionally configure certain Personnel as KeypadCommand Administrators, which allows them to use Keypad Commands without being in adesignated Personnel Group. For configuration information, see Configuring a Person to UseKeypad Commands on Page 236.

Viewing a List of Keypad Commands

You can display a list of the Keypad Commands you have created by opening a Dynamic View ofKeypad Commands.

To View a List of Keypad Commands

1. In the Navigation Pane of the Administration Workstation, click Areas and Zones to open theAreas and Zones pane.

2. Select Keypad Command from the Areas and Zones drop-down list.

3. Click to open a Dynamic View listing all Keypad Command Objects, as shown in Figure55 on Page 229. (You can also click the down-arrow of this button to either view the list in thecurrent tabbed view or open a new tabbed view).

228 Chapter 3 C•CURE 9000 Areas and Zones Guide

Page 229: 9000-Areas-Zones.pdf

Keypad Command Tasks

Figure 55: Keypad CommandsList

You can sort, filter, and group items in the list. You can right-click a Keypad Command in thelist to open the Keypad Command Context menu and perform any of the functions on thatmenu.

For more information on using Dynamic Views, see the Dynamic Views chapter in the C•CURE9000 Data Views Guide.

NOTE If you or another Operator add new Keypad Commands to thedatabase while you have a Keypad Commands Dynamic View open,

click to refresh the list to see the new Keypad Commands.

Keypad Command List Context Menu

The context menu that opens when you right-click a Keypad Command in the Keypad CommandDynamic View includes the selections described in Table 46 on Page 229.

MenuSelection

Description

Edit Click thismenu selection to edit the selected Keypad Command. TheKeypad Command Editor opens. Youcan rename the Keypad Command, change the description and anyother attributeswith the exception of theiSTAR Cluster.

Table 46: Keypad Command List Right-ClickContext MenuOptions

C•CURE 9000 Areas and Zones Guide Chapter 3 229

Page 230: 9000-Areas-Zones.pdf

Keypad Command Tasks

MenuSelection

Description

Setproperty

Click thismenu selection to change the value of the selected properties in the selected Keypad Command(s).

A dialog boxappears asking you to select a property to change. Click to open a selection list and click theproperty you wish to change. You can then change the value of the following properties:

• Description – You can change the textual description of the Keypad Command(s) by selecting thisproperty and typing in a new value.

• Enabled – You can determine whether or not the Keypad Command(s) are activated on the system byselecting this property and selecting/clearing theValue checkbox.

• Priority – You can change the priority level for the Keypad Command(s) by selecting this property andclicking the up/down arrowsnext to theValue field.

• Validation Type – You can change the validation type for the Keypad Command(s) by selecting thisproperty, then clicking the down-arrow in the Value field, and selecting an option from the drop-down list.

Add toGroup

You can add one or more selected Keypad Commands to aGroup of Keypad Commands.When you click thismenu choice, a dialog boxappears for you to select the Group to which to add the Keypad Command.When youclick a Group of Keypad Commands in the list, the selected Keypad Command is added to theGroup.

Exportselection

Click thismenu selection to Open an Export...to XML or CSV file dialog box to export one or more of the selectedKeypad Command records to either an XML or a CSV file. This allowsyou to quickly and easily create XML/CSVreports on the selected data.

NOTE: Although XML is the initial default file type, once you choose a type in theSave as type field, whetherXML or CSV, that becomes the default the next time this dialog boxopens.

• When you export to an XML file, all available data for the selected object(s), whether displayed in theDynamicView or not—aswell as all the child objects of the selected record(s), is exported.

• When you export to a CSV file, only data in the columnsdisplaying in the DynamicView is exported, and inthe order displayed. This allowsyou to both select and arrange data fields for your report. In addition,exporting to a CSV file allowsyou to view the exported data in an Excel spreadsheet and further manipulateit for your use.

For more information, see the DynamicViewschapter in theC•CURE9000 Data ViewsGuide.

NOTE:When you clickExport Selection, you are running the export on the client computer. Consequently, thesystem doesnot use the Default Export DirectoryPath—which is on the server. It opensa directory onthe client, reverting to the last directory used. You can navigate to the default export server directory, ifyou wish. Or to avoid confusion or use the same destination folder for both client and server computers,you can use UNC (UniversalNaming Convention) paths, for example: \\Computer Name\Program Files\Software House\SWHouse\SWHSystem\Export.

Find inAudit Log

Click thismenu selection to Open aQuery Parameters dialog box in which you can enter prompts and/or modifythe Query criteria to search for entries in the Audit Log that reference the selected Keypad Command.Whenfound the results display in a separate DynamicView.

230 Chapter 3 C•CURE 9000 Areas and Zones Guide

Page 231: 9000-Areas-Zones.pdf

Keypad Command Tasks

MenuSelection

Description

Find inJournal

Click thismenu selection to Open aQuery Parameters dialog box in which you can enter prompts and/or modifythe Query criteria to search for entries in the Journal that reference the selected Keypad Command.Whenfound the results display in a separate DynamicView.

Modifying a Keypad Command

You can modify an existing Keypad Command by editing it using the Keypad Command Editor.

To Modify a Keypad Command

1. In the Navigation Pane of the Administration Workstation, click Areas and Zones to open theAreas and Zones pane.

2. Select Keypad Command from the Areas and Zones drop-down list.

3. Click to open a Dynamic View showing all Keypad Command Objects.

4. Right-click the Keypad Command in the list that you want to change and select Edit from thecontext menu that appears.

- or -

Double-click the Keypad Command you want to change.

The Keypad Command Editor opens for you to edit the Keypad Command making changes asyou wish in the fields on the top of the editor, and on the General and Permissions tabs (withthe exception of the iSTAR Cluster).

5. To save the modified Keypad Command, click Save and Close.

- or -

Alternatively, if you want to save the Keypad Command and then create a new one, click Saveand New. The current Keypad Command is saved and closed, but the Keypad Command Editorremains open ready for a new Keypad Command.

Deleting a Keypad Command

You can delete a Keypad Command.

C•CURE 9000 Areas and Zones Guide Chapter 3 231

Page 232: 9000-Areas-Zones.pdf

Keypad Command Tasks

To Delete a Keypad Command

1. In the Navigation Pane of the Administration Workstation, click Areas and Zones to open theAreas and Zones pane.

2. Select Keypad Command from the Areas and Zones drop-down list.

3. Click to open a Dynamic View showing all Keypad Command Objects.

4. Right-click the Keypad Command in the list that you want to delete and select Delete from thecontext menu that appears.

5. Click Yes on the “Are you sure you want to delete the selected Keypad Command?” messagebox.

Setting a Property for a Keypad Command

You can use Set Property to quickly set a property for a Keypad Command without opening theKeypad Command Editor. You use Set Property for mass updates.

To Set a Property for Keypad Commands

1. In the Navigation Pane of the Administration Workstation, click Areas and Zones to open theAreas and Zones pane.

2. Select Keypad Command from the Areas and Zones drop-down list.

3. Click to open a Dynamic View showing all Keypad Command Objects.

4. Right-click the Keypad Command in the list for which you want to set the property and selectSet Property from the context menu.

5. Specify the property for the Keypad Command. Click the drop-down button to see a list ofproperties.

6. Enter the value for the property and click OK.

7. Click OK on the Setting Properties of Keypad Command message box.

Adding a Keypad Command to a Group

You can use Add To Group to add the Keypad Command Object to a Group.

232 Chapter 3 C•CURE 9000 Areas and Zones Guide

Page 233: 9000-Areas-Zones.pdf

Keypad Command Tasks

To Add Keypad Commands To a Group

1. Make sure that the Group is already configured for the Keypad Command to be added to it.

2. In the Navigation Pane of the Administration Workstation, click Areas and Zones to open theAreas and Zones pane.

3. Select Keypad Command from the Areas and Zones drop-down list.

4. Click to open a Dynamic View showing all Keypad Command Objects.

5. Right-click the Keypad Command in the list that you want to add to a Group and select Add ToGroup from the context menu.

6. When the Group list displays, select the Group you want to add the Keypad Command to.

C•CURE 9000 Areas and Zones Guide Chapter 3 233

Page 234: 9000-Areas-Zones.pdf

Configuring Readers for Keypad Commands

Configuring Readers for Keypad CommandsYou can configure a Reader to allow/disallow the use of Keypad Commands as the default at thatReader. You can also specify that Keypad Commands can only be used at the Reader duringparticular times.

You configure these properties on the Keypad Tab of the iSTAR Reader Editor, as shown in Figure56 on Page 234.

Figure 56: iSTAR Reader Keypad Tab

NOTE You can also manually enable/disable the use of KeypadCommands at selected Readers for a specified time: in theAdministration application from either the Readers Dynamic View orHardware Tree or in the Monitoring Station from the Status List forReaders. For information, see Enabling/Disabling KeypadCommands at Readers on Page 238.

234 Chapter 3 C•CURE 9000 Areas and Zones Guide

Page 235: 9000-Areas-Zones.pdf

Configuring Readers for Keypad Commands

To Configure Keypad Command Use for an iSTAR Reader

1. In the Navigation Pane of the Administration Workstation, click the Hardware pane button.

2. Click the Hardware drop-down list, select iSTAR Reader, and click to open a DynamicView showing a list of all existing iSTAR Readers.

- or -

Expand the Hardware Tree.

3. In the Dynamic View list/Tree, select the iSTAR Reader for which you want to set the use ofKeypad Commands, right-click, and click Edit from the context menu that appears.

4. When the iSTAR Reader Editor appears, click to open the Keypad Tab, shown in Figure 56 onPage 234.

5. In the Options box, click the down-arrow in the Keypad Commands Allowed field and selectNot Allowed, Always Allowed, or Allowed during specified schedule from the drop-down list.(The default is Not Allowed.)

If you select Allowed during specified schedule, the Schedule for Keypad Commands fieldbecomes available. (The default is Always.)

a. Click to open a Schedule selection list.

b. Click to select the desired Schedule.

6. To save these Reader Keypad Command properties, click Save and Close.

C•CURE 9000 Areas and Zones Guide Chapter 3 235

Page 236: 9000-Areas-Zones.pdf

Configuring a Person to Use Keypad Commands

Configuring a Person to Use Keypad CommandsYou can configure a person to be able to use Keypad Commands even if he or she is not in aPersonnel Group granted the Keypad Command permission.

You configure this on the Personnel Editor General tab, as shown in Figure 57 on Page 236.

Figure 57: PersonnelEditor – General Tab

To Configure a Person to Use Keypad Commands

1. In the Navigation Pane of the Administration Workstation, click the Personnel pane button.

2. Click the Personnel drop-down list and select Personnel.

3. Click New to create a new Personnel record.

- or -

236 Chapter 3 C•CURE 9000 Areas and Zones Guide

Page 237: 9000-Areas-Zones.pdf

Configuring a Person to Use Keypad Commands

Click to open a Dynamic View showing a list of all existing Personnel Objects, right-clickthe Personnel record you want to change, and click Edit from the context menu that appears.

The Personnel Editor opens with the General Tab displayed.

4. In the Options box, click to select the Keypad Commands Administrator option.

NOTE If this option is selected, this person can use any Keypad Commandsregardless of the Personnel Group the command is validated for.

If this option is not selected, this person can only use KeypadCommands configured:

• For a Personnel Group in which he/she is included.

• Without any types of validation.

5. To save the Personnel record, click Save and Close.

C•CURE 9000 Areas and Zones Guide Chapter 3 237

Page 238: 9000-Areas-Zones.pdf

Enabling/Disabling Keypad Commandsat Readers

Enabling/Disabling Keypad Commands at ReadersYou can manually enable/disable Keypad Commands at one or more selected Readers whether ornot Keypad Commands are allowed at the Reader by default. You can also view a Reader’s KeypadCommand Cause to see both the default/current Keypad Command state and enable/disable fromthere. You can perform these actions in several different places:

• Administration application

• Reader Dynamic View

• Hardware Tree – Reader Object

• Monitoring Station

• Reader Status List

To View the Reader Keypad Command Cause List

1. In the Navigation Pane of the Administration Workstation, click the Hardware pane button

.

2. Click the Hardware drop-down list, select iSTAR Reader, and click to open a DynamicView showing a list of all existing iSTAR Readers.

- or -

Expand the Hardware Tree.

3. In the Dynamic View list or in the Tree, select the iSTAR Reader whose Keypad CommandCause List you want to view and right-click to display the context menu.

238 Chapter 3 C•CURE 9000 Areas and Zones Guide

Page 239: 9000-Areas-Zones.pdf

Enabling/Disabling Keypad Commandsat Readers

4. Click Show Enable Keypad Command Causes to open the dialog box shown in the example inFigure 58 on Page 239.

Figure 58: Reader Keypad CommandCause List Example

The Status Information on the top indicates that this Reader is currently enabled while KeypadCommands are currently not allowed at this reader. Since as shown in the Cause list the KeypadCommand default state at this Reader is Allowed, its current state is the result of the DisableKeypad Command Manual Action at 4:16:38 PM on 4/17/2009 with a Priority of 75.

5. If you want to Enable or Disable Keypad Commands at this Reader, click the Enable KeypadCommands or Disable Keypad Commands button.

A Manual Action dialog box such as that shown in the example in Figure 59 on Page 240displays.

C•CURE 9000 Areas and Zones Guide Chapter 3 239

Page 240: 9000-Areas-Zones.pdf

Enabling/Disabling Keypad Commandsat Readers

Figure 59: Enable Keypad Commands for Reader ManualAction Dialog Box

6. Enter Start and End date/times and a Priority for the Action, as well as the Time Zone and ifnecessary, any instructions.

7. Click Save and Close.

To Manually Enable/Disable Keypad Commands

1. In the Navigation Pane of the Administration Workstation, click the Hardware pane button.

2. Click the Hardware drop-down list, select iSTAR Reader, and click to open a DynamicView showing a list of all existing iSTAR Readers.

- or -

Expand the Hardware Tree.

3. In the Dynamic View list or in the Tree, select the iSTAR Reader at which you want toenable/disable Keypad Commands.

NOTE In the Dynamic View list, you can select multiple Readers at thesame time.

240 Chapter 3 C•CURE 9000 Areas and Zones Guide

Page 241: 9000-Areas-Zones.pdf

Enabling/Disabling Keypad Commandsat Readers

4. Click Enable Keypad Commands/Disable Keypad Commands.

A Manual Action dialog box such as that shown in the example in Figure 59 on Page 240displays.

5. Enter Start and End date/times and a Priority for the Action, as well as the Time Zone and ifnecessary, any instructions.

6. Click Save and Close to save your changes.

C•CURE 9000 Areas and Zones Guide Chapter 3 241

Page 242: 9000-Areas-Zones.pdf

242 Chapter 3 C•CURE 9000 Areas and Zones Guide

Enabling/Disabling Keypad Commandsat Readers

Page 243: 9000-Areas-Zones.pdf

Index

C•CURE 9000 Areas and Zones Guide Index 243

Aaccessing

iSTAR Cluster Area Editor 32iSTAR Intrusion Zone Editor 139Keypad Command Editor 214

activatingkeypad commands 200

Antipassbackcluster 22communication restore 23introduction 19Passback violation 19personnel 17Restoring communication 23Tailgate violation 20

Area, iSTAR Clusteradding to group 47configuring 34creating 32creating template for 33deleting 46groups, for roll call reports 97list context menu 37modifying 45setting property for 46steps to configure 27viewing list of 36viewing occupancy mode causes for 44viewing personnel groups associated with41

viewing personnel in 40viewing status of 42viewing status of on dynamic view 42viewing status of on maps 109

Areas and area groups, for roll call reports 97armed, intrusion zone 115

CCaution symbol 12cluster, antipassback 22communication, restoring in antipassback 23Configuration

requirements for keypad commands 206Configuring

iSTAR cluster areas 34iSTAR intrusion zones 136keypad commands 203readers for keypad commands 234

Conventions used in this manual 12Conventions, documentation 12Creating

iSTAR cluster area 32iSTAR cluster area template 33iSTAR intrusion zone 140iSTAR intrusion zone template 141keypad command 223keypad command template 224

DDanger symbol 12

Page 244: 9000-Areas-Zones.pdf

deactivatingkeypad commands 200

disarmed, intrusion zone 116documentation, conventions 12Door Editor

Area & Zones tabfields/buttons 95

viewing area information for door 95doors

configuring foriSTAR cluster areas 50iSTAR intrusion zones 158

deleting fromiSTAR cluster areas 55iSTAR intrusion zones 160

FFormat

keypad commands 207requirements 207sample 208

GGroups, area, for roll call reports 97

HHow to use this manual 10

IIntrusion zones

modesarmed 115disarmed 116violated 116

understanding 114iSTAR Cluster Area Editor

accessing 32Antipassback tab 55

fields/buttons 56tasks 56

buttons 48fields/buttons 50general information 48General tab 48

fields/buttons 50tasks 49

Groups tab 76fields/buttons 77

Occupancy tab 59fields/buttons 60rules for access 64tasks 60

State Images tab 80icons 80restoring default Image 81tasks 81

Status tab 78fields 78viewing status on 79

Triggers tab 69fields/buttons 70tasks 70

iSTAR Cluster EditorArea tab, fields/buttons 83

Index

244 Index C•CURE 9000 Areas and Zones Guide

Page 245: 9000-Areas-Zones.pdf

iSTAR Door EditorAreas & Zones tab

fields/buttons 193iSTAR Input Editor

Intrusion Zone Tabfields/buttons 195

iSTAR Intrusion Zone EditorGeneral tab 154

fields/buttons 155iSTAR Intrusion Zone Editor

accessing 139Arm-Disarm tab 169

fields/buttons 170buttons 153fields/buttons 155General tab

tasks 155Groups tab 185

fields/buttons 185Inputs tab 162

fields/buttons 163State Images tab 189

restoring default Image 190Triggers tab 178

fields/buttons 179tasks 178

iSTAR intrusion zonesconfigure 136

KKeypad Command Editor

accessing 214buttons 215

fields/buttons 217General tab 216

fields/buttons 217Groups tab 221

fields/buttons 222Permissions tab 219

fields/buttons 219keypad commands

capabilities 198Keypad commands

activate 200configuration, requirements 206configure 203deactivate 200format 207format requirements 207sample formats 208sample uses 200

MManual, how to use 10maps, viewing iSTAR cluster area statusfrom icons

109

OOccupancy mode

how occupancy configuration sets default63-64

Occupancy restrictions for iSTAR cluster areaoverview 24

maximum occupancy 24minimum occupancy 24N-man rule 24

Index

C•CURE 9000 Areas and Zones Guide Index 245

Page 246: 9000-Areas-Zones.pdf

system variables for 91Occupancy testing mode for iSTAR clusterarea

resetting with event actions 87viewing on Status tab 78

Occupancy testing mode for iSTAR clusterarea

viewing causes for 44

Rreaders

configuring foriSTAR cluster areas 52keypad commands 234

deleting from iSTAR cluster areas 55Reports, roll call 18requirements, keypad command formats 207restore, antipassback communication 23Roll Call Reports 18

overview 97

SSample keypad commands

format 208uses 200

setting property foriSTAR Cluster Area 46iSTAR Intrusion Zones 151keypad commands 232

System Variables EditoriSTAR Variables Tab

fields/buttons 212system variables for

area minimum occupancy 91

area personnel tracking 91areas 91reporting 98, 101

UUnderstanding intrusion zones 114

Vviolated, intrusion zone 116Violation

passback 19tailgate 20

WWarning symbol 12

Index

246 Index C•CURE 9000 Areas and Zones Guide