manual on-site control de acceso

Upload: charlee8123

Post on 09-Apr-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/8/2019 Manual on-Site Control de Acceso

    1/260

    USER'S M

    ACCESS CON

    NUAL

    2.14 L i e b eOn.SiteIG4TM O

    Site/10

    TROL

    t

    -T"

  • 8/8/2019 Manual on-Site Control de Acceso

    2/260

    NOTICE

    The information contained in this manual is subject tochange without notice.

    Liebert Corporation shall not be held liable for technical oreditorial omissions or errors made herein nor for incidental or con-sequential damages resulting from the furnishing, performance, oruse of the material.

    This document contains proprietary information protectedby copyright. All rights reserved. No part of this document may bephotocopied or reproduced by mechanical, electronic or othermeans in any form without prior written permission of Liebert Cor-poration.

    The enclosed materials are provided to you in the ex-pressed condition that you agree to this software license. By us-ing the On-Site software, you agree to the following provisions (ifYou do not agree with these provisions; return the software toyour Liebert representative in the original packaging within 3 daysfrom receipt for a refund):

    1. The On-Site software and the disk(s) on which it is con-tained (the Licensed Software) is licensed to you, the end-user

    only for your own internal use. You may not transfer, sub-license, rent, lease, convey, copy, modify, translate, convert toanother programming language, decompile or disassemble theLicensed Software.

    2. The Licensed Software is provided "as is". All warran-ties and representations of any kind with regard to the licensedsoftware are hereby disclaimed. Under no circumstances will themanufacturer or developer of the licensed software be liable forany consequential, incidental, special, or exemplary damages.

    Liebert, the Liebert logo, and On-Site/64 are registered trade-marks of Liebert Corporation.

    MS-DOS is a trademark of Microsoft Incorporated.

    IBM XT is a trademark ofInternational Business Machines Incorporated.

    Ventra CS is a trademark of Hewlett-Packard Co.

    Sentinel Pro is a trademark of Rainbow Technologies, Inc.

  • 8/8/2019 Manual on-Site Control de Acceso

    3/260

    User's Manual (4/90) i Sievert Incite

    TABLE OF CONTENTS

    SECTION I INTRODUCTION

    Chapter 1 System/Hardware Overview ....................... 1-1Introduction .............................................................................. 1-1The Onsite System .................................................................. 1-1Hardware .................................................................................. 1-4

    Host Processor ..................................................................... 1-4Printer ................................................................................... 1-6Card Readers ....................................................................... 1-6IGMs ..................................................................................... 1-6

    Chapter 2 Software Overview ...................................... 2-1Software Versions .................................................................... 2-1Software Features .................................................................... 2-1Files .......................................................................................... 2-3Commands ............................................................................... 2-5Polling ...................................................................................... 2-5Reports ..................................................................................... 2-6

    SECTION II PLANNING THE SYSTEM

    Chapter 3 Planning the System ................................... 3-1Site Planning 3-1

    Site Diagram ........................................................................ 3-1Access and Monitoring Considerations ................................... 3-2Planning Forms ........................................................................ 3-4

    Chapter 4 Planning the Database OperatingFiles ............................................................... 4-1

    Introduction .............................................................................. 4-1Card Reader Features ............................................................. 4-1

    Toggle Card ......................................................................... 4-1Executive Privilege ............................................................. 4-1Duress ................................................................................. 4-2

    Reader/Door File ...................................................................... 4-3Card Reader Numbers ......................................................... 4-4Door Name ......................................................................... 4-4Unlock Time ........................................................................ 4-4

    Open Time 4-5

  • 8/8/2019 Manual on-Site Control de Acceso

    4/260

    Time Code File ...................................................................... 4-6Time Code name ............................................................... 4-7Active Days ........................................................................ 4-7Start/Stop Times ................................................................ 4-7

    Holiday File ............................................................................ 4-8Access Code File ................................................................... 4-9

    Access Code Name ......................................................... 4-10RDR # and Door Name ................................................... 4-10Time Code Name ............................................................ 4-10

    Card File .............................................................................. 4-11Card Number ................................................................... 4-13Cardholder Name ............................................................ 4-13Access Code .................................................................... 4-13User-Defined Fields ......................................................... 4-13PIN ................................................................................... 4-13

    Chapter 5 Planning Database Monitor andControl Files .................................................... 5-1

    Monitor Point File (IGM Models 45 and 45U Only) 5-1Group Number ................................................................... 5-3IGM/Reader ....................................................................... 5-3Point Number ..................................................................... 5-3Point Name ........................................................................ 5-3Opening Point Message .................................................... 5-3

    Closed Point Message ....................................................... 5-3Alarm Condition ................................................................. 5-3Alarm Message Number .................................................... 5-3Trace To ............................................................................ 5-4

    Alarm Message File (IGM Model 45 Only) ............................ 5-4This Message Number ...................................................... 5-5Alarm Message .................................................................. 5-5Next Message Number ...................................................... 5-5

    Control Relay File (IGM Model 45 Only) ............................... 5-6Group Number ................................................................... 5-7IGM Number ...................................................................... 5-7Relay .................................................................................. 5-7Relay Name ....................................................................... 5-7

    On Message ...................................................................... 5-7Off Message ...................................................................... 5-7Pulse Message .................................................................. 5-7Pulse Time ......................................................................... 5-7

    Timed Command File ............................................................ 5-8Time Code Name .............................................................. 5-9Group Number ................................................................... 5-9Card Reader Number ........................................................ 5-9

    User's Manual (4/90) ii Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    5/260

    Start Command .................................................................... 5-9

    Stop Command .................................................................. 5-10If/Then Command File ........................................................... 5-11

    Group Number ................................................................... 5-13(IGM/Reader Number) ....................................................... 5-13Message

    5-13Then Condition ...................................................................... 5-14

    Group Number ................................................................... 5-14(IGM/Reader Number) ....................................................... 5-14Command .......................................................................... 5-14Time Code Names ............................................................. 5-14

    SECTION III GETTING STARTED

    Chapter 6 System Set-Up ............................................. 6-1Introduction .............................................................................. 6-1Host Processor ........................................................................ 6-1

    IGM to Host Processor Connection ..................................... 6-2Printer ...................................................................................... 6-3Configuring the IGMs ............................................................... 6-3IGM Processor Board Setup .................................................... 6-3

    IGM Address - Switches 1 - 5 ............................................. 6-3

    Card Delete - Switch 6 ......................................................... 6-4Cards/Transaction Capacity - Switch 7 ............................... 6-4Control Relay Y Mode - Switch 8

    (Model 45 IGM Only) ....................................................... 6-5Baud Rate Jumper ............................................................... 6-6Memory Backup Jumper ...................................................... 6-6

    IGM Interface Board Setup ...................................................... 6-6Door Strike Voltage Selection .............................................. 6-6IGM Trouble Alarm - Jumper P13

    (Models 45 and 45U Only) ............................................... 6-7Unit on Battery Alarm - Jumper P14

    (Model 45U Only) ............................................................. 6-7Lock Override - Jumper P11 ................................................ 6-7

    Fire Panel Option - Jumper P12 .......................................... 6-7

    Chapter 7 the Onsite Software ..................................... 7-1I introduction n ......................................................................... 7-1DOS ......................................................................................... 7-1The Onsite Software ................................................................ 7-1Software Protection ................................................................. 7-3

    User's Manual (4/90) iii Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    6/260

    Chapter 8 Initializing the System ....................................... 8-1Introduction ............................................................................ 8-1Initializing the System ............................................................ 8-1Logon the System .................................................................. 8-1Operator Permissions ............................................................ 8-3Set Time and Date ................................................................. 8-6Customer Code ..................................................................... 8-81/0 Port Configuration

    - Hard Wired Loops ............................................................ 8-9Group Number ................................................................. 8-10Communication Port Number .......................................... 8-10

    IGM/Modem Baud Rate ....................................................... 8-111/0 Port Configuration

    - Dial-Up Loops ................................................................ 8-12Group Number ................................................................. 8-12Communication Port Number .......................................... 8-12IGM/Modem Baud Rate ................................................... 8-12Modem Dial Command .................................................... 8-12Remote Site Identify ........................................................ 8-13Remote Site Password .................................................... 8-13Remote Access Telephone Number ................................ 8-13Remote Initial Call Time .................................................. 8-14Remote Call Delay Time .................................................. 8-14

    Remote Wait Time for Answer ......................................... 8-14Remote Retry Dial Count ................................................. 8-14Remote Retry Time Interval ............................................. 8-15

    SECTION IV OPERATING THE DATABASE

    Chapter 9 Database Operating Files ........................ 9-1Introduction ............................................................................ 9-1File Operations ...................................................................... 9-2

    Previous Menu ................................................................... 9-2Modify ................................................................................ 9-3Prior ................................................................................... 9-3Next ................................................................................... 9-3Add ..................................................................................... 9-3Delete ................................................................................ 9-4Print ................................................................................... 9-4Help ................................................................................... 9-5Sort .................................................................................... 9-5Search ............................................................................... 9-5

    Operating Files ...................................................................... 9-7

    User's Manual (4/90) iv Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    7/260

    Reader/Door File ..................................................................... 9-9Door Name .......................................................................... 9-9Group Number ................................................................... 9-10Reader Number ................................................................. 9-10Unlock Time ....................................................................... 9-10Door Open Time ................................................................ 9-10

    Time Code File ...................................................................... 9-12A Special Note about Time Codes .................................... 9-13Time Code Name ............................................................... 9-13Time code Number ............................................................ 9-13Day of the Week ................................................................ 9-13

    Start Time9-14

    Stop Time9-14

    Holiday File ............................................................................ 9-15Date ................................................................................... 9-15Holiday Name .................................................................... 9-16

    Access Codes ........................................................................ 9-17Access Code Name ........................................................... 9-17Door Name ........................................................................ 9-18Time Code

    9-18Card File ................................................................................ 9-19

    Card Number ..................................................................... 9-20Name ................................................................................. 9-20Access Code ...................................................................... 9-20User Fields

    9-20Trace To ............................................................................ 9-20Status ................................................................................. 9-21

    Chapter 10 Database Monitor and Control Files 10-1I introduction n ....................................................................... 10-1Monitor Point File (Model 45 IGM Only) ................................ 10-1

    Group Number ................................................................... 10-3IGM Number ...................................................................... 10-3Point Number ..................................................................... 10-3

    Point Name ........................................................................ 10-3Opening Point Message .................................................... 10-3Closing Point Message ...................................................... 10-3Alarm Condition ................................................................. 10-4Alarm Message Number .................................................... 10-5Trace To ............................................................................ 10-5

    Alarm Message File (Model 45 IGM only) ............................. 10-6Message Number .............................................................. 10-7Alarm Message .................................................................. 10-7Link to Next Message ........................................................ 10-7

    User's Manual (4/90) v Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    8/260

    Control Relay File (Model 45 IGM Only) .............................. 10-8Group Number ................................................................. 10-9IGM Reader Number ........................................................ 10-9Relay "X" or "Y" ............................................................... 10-9Relay Name ..................................................................... 10-9On Message ..................................................................... 10-9Off Message ..................................................................... 10-9Pulse Message ............................................................... 10-10Pulse Time ..................................................................... 10-10

    Timed Command File ......................................................... 10-11Time Code Name ........................................................... 10-13Group Number ............................................................... 10-13IGM/Reader Number ...................................................... 10-13Start Command .............................................................. 10-13Stop Command .............................................................. 10-13IGM Scheduled Operation ............................................. 10-13

    If/Then Command File ....................................................... 10-14If Group Number ............................................................ 10-15if IGM/Reader Number ................................................... 10-16Sends This Message ...................................................... 10-16Then Group Number ...................................................... 10-16Then IGM/Reader Number ............................................ 10-16Receives This Command ............................................... 10-16

    During This Time Code .................................................. 10-16

    Chapter 11 System Parameters ......................................... 11-1Introduction .......................................................................... 11-1

    Customer Code ................................................................ 11-1Alarm Definitions .............................................................. 11-2Titles ................................................................................. 11-51/0 Port Configuration ...................................................... 11-7

    Operator Permissions File ................................................... 11-8

    SECTION V CONTROLS AND REPORTING

    Chapter 12 System Control/Commands .......................... 12-1

    Introduction .......................................................................... 12-1Printer Toggle ....................................................................... 12-1Date and Time ...................................................................... 12-2

    User's Manual (4/90) vi Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    9/260

    Commands ............................................................................ 12-3

    Reader/Door Commands ...................................................... 12-4Card and PIN Mode ......................................................... 12-5Card Only Mode ............................................................... 12-5Customer Code Only ....................................................... 12-6Customer Code Only

    (Store Transactions) ...................................................... 12-6Enable Anti-Pass back ..................................................... 12-6Disable Anti-Pass back .................................................... 12-6Grant Access ................................................................... 12-6Unlock Door ..................................................................... 12-6Lock Door ......................................................................... 12-6

    Monitor Point Commands ...................................................... 12-7Disable Monitor Point ....................................................... 12-7Enable Monitor Point ........................................................ 12-7

    Control Relay Commands ..................................................... 12-9On .................................................................................... 12-9Off .................................................................................... 12-10Pulse ................................................................................ 12-10

    Anti-Pass back Commands ................................................... 12-11Out ................................................................................... 12-12In ...................................................................................... 12-12Neutral ............................................................................. 12-12

    Load IGM Commands ........................................................... 12-14Logoff .................................................................................... 12-17

    Chapter 13 System History ................................................ 13-1Introduction ........................................................................... 13-1Transaction Reports .............................................................. 13-1

    Transaction Reports Screen Number .............................. 13-2Start Date ......................................................................... 13-3Stop Date ......................................................................... 13-3Start Time ........................................................................ 13-4Stop Time ......................................................................... 13-4Select Name .................................................................... 13-4Select Card ...................................................................... 13-4Select Activities ................................................................ 13-4

    Select Locations ............................................................... 13-5Select Monitor Points ....................................................... 13-5Select Control Relay ........................................................ 13-5Activity Selection Screen ................................................. 13-6Door Selection Screen ..................................................... 13-7Monitor Point Selection Screen ....................................... 13-8Control Relay Selection Screen ....................................... 13-10

    User's Manual (4/90) vii Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    10/260

    Transaction Report Output ................................................. 13-11

    The Printed Report ......................................................... 13-11ASCII File ........................................................................ 13-14

    Chapter 14 System Status .................................... 14-1Introduction ........................................................................ 14-1Reader/Door Status ...................................................... 14-2Monitor Point Status (Model 45 IGM Only) ............... 14-5Control Relay Status (Model 45 IGM Only) ............... 14-7IGM Status ......................................................................... 14-9

    APPENDICES

    APPENDIX A Access Control Planning FormsAPPENDIX B Transaction Reports and File StructuresAPPENDIX C Menu Overview and StructureAPPENDIX D Glossary of Terms

    User's Manual (4/90) viii Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    11/260

    SECTION I INTRODUCTION

    Chapter 1 System/Hardware OverviewChapter 2 Software Overview

  • 8/8/2019 Manual on-Site Control de Acceso

    12/260

  • 8/8/2019 Manual on-Site Control de Acceso

    13/260

    CHAPTER 1 SYSTEM/HARDWAREOVERVIEW

    I introduction n ................................................................ 1-1The Incite system .................................................... 1-1Hardware ........................................................................ 1-4

    Host processor ....................................................... 1-4

    Card Readers ........................................................ 1-6IGMs .................................................................. 1-6

    DIAGRAMS, DRAWINGS, TABLES

    1-1 Basic System Configuration ....................... 1-2

    1-2 Remote System Configuration .................... 1-5

  • 8/8/2019 Manual on-Site Control de Acceso

    14/260

  • 8/8/2019 Manual on-Site Control de Acceso

    15/260

    INTRODUCTION

    This user manual focuses on the proprietary Onsite (TM)software developed by Liebert Corporation for its AccessControl and Monitoring System. The Onsite system softwareis available in two basic models; Onsite/10 and Onsite/64.The Onsite/10 software controls up to 5 IGMs and 10readers per system. The Onsite/64 software controls up to

    32 IGMs and 64 readers per system. All other softwarefunctions and features are the same for both systems. Thismanual applies to Version 1.2 of the Onsite software.

    lt is assumed that the system is completely installed andall wiring is thoroughly checked. If this has not beencompleted, or if there are questions regarding the installationrequirements of the system, consult the Onsite installationmanual.

    THE ONSITE SYSTEM

    The Liebert Access Control System is a microprocessorbased network consisting of a Personal Computer or Host

    Processor, printer and a combination of one or more IGMsand Card Readers. See Figure 1-1.

    The system utilizes a distributed database technique,meaning that the information used to authorize access, thedatabase, is distributed and stored in IGMs throughout thenetwork.

    Each IGM can control two Card Readers. The CardReader translates encoded data from a magnetic stripe thathas been bonded to a plastic card. The cardholder may alsokey in a PIN number (Personal Identification Number) toprovide an additional level of security at Card Readersequipped with an integral keypad.

    The user creates the system datab ase fi les on the

    Personal Computer, referred to as the host or host processor.Once created, the host downloads these files to the networkIGMs where the access decisions are made by comparing thecard information with the stored database. The IGM(s) willthen control access to individual cardholders by time of day,day of week and location at secured doors.

    User's Manual 1-1 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    16/260

  • 8/8/2019 Manual on-Site Control de Acceso

    17/260

    The host processor continuously polls the network IGMs fortransaction data. Depending on the user instructions, thehost will print, display and/or store the transactions on thesystem's hard drive. lf communications with the host arebroken, the network will continue to authorize or deny access,monitor contacts and control devices, and store transactionsfor all events. Once communications are restored, thenetwork IGMs will send their stored transactions back to thehost.

    *** EXCEPTION ***The host must be on-line to perform "IF/THEN" commands

    as explained later in this manual.

    A series of commands may be executed from the hostprocessor to control and monitor devices, determine networkstatus, make inquiries about defined activities and more.Commands may also be programmed to automatically controldoor strikes, output relays, alarm contacts and so on.

    As a user option, every transaction that occurs in thesystem can be printed, displayed and stored on a hard disk.At a later date, a formatted report of all transactions orspecific transactions in a requested time period may be

    made.Transactions accumulated on the computer's hard disk

    form a system log. This collection of data may be off loadedperiodically to floppy diskettes to create a continuoustransaction history.

    User's Manual 1-3 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    18/260

    HARDWARE

    HOST PROCESSORThe "host processor" or PC supplied with the Liebert

    Onsite system uses the MS-DOS version 3.3 or higheroperating system. Memory capacity is 640Kb of RAM withone DS/DD floppy drive and a 20Mb hard disk.

    The host communicates with the network via a 4 wire, 20

    milliamp current loop connected to the host's asynchronouscommunications adapter (ACA), which is configured forcurrent loop protocol.

    As an option, a modem may be connected to the host'sserial port (COM1) to allow communications with remote IGMlocations.

    The host processor uses the hard disk to store the Onsiteprograms, the system database, and to log the systemtransactions. The system can store up to 32,000 transactionson the hard drive. This data may be recalled at any time toproduce reports for activity during any given period. To avoida possible loss of data, t ransactions should periodically beoff-loaded to floppy disks. This also provides a continuous

    history for archives.

    User's Manual 1-4 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    19/260

    COMMUNICATIONS INTERGACE

    CURRENT LOOP - 20 mA MAX/MUM LENGTH -3000 ft

    1174_ MODEM

    IGM TO IGM 111 d I

    Figure 1-2 REMOTE SYSTEM CONFIGURATION

    CPUPRINTER

    1-=-1 1 I

    CARD READERSMODEL 20

    CURRENTLOOP

    CONVERTER

    ODE 1IIODEA

    CARD READER

    mODEL 20

    IG IG IDA

    MODEL 40 IGMOR

    MODEL 45 IGM32 IGIAS MAX

    IG IGM

    I G M T O R E A D E RMAXIMUM LENGTH C)

    1000 11

    dld 1H1

    CARD READER/P/NMODEL 21

    CARP READERS MODEL 20

    User's Manual 1-5 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    20/260

    PRINTERAll system activity is displayed in a scroll area on the

    host's display monitor. As the information scrolls, olderinformation is replaced with new data. A Parallel Printerconnected to the host processor produces a runninghard-copy printout, which allows the user to view theinformation at any time.

    CARD READERSThe Card Reader translates magnetically encoded datafrom a special plastic card. Card Readers are available inboth PIN (Personal Identification Number) and non-PINmodels. The PIN model has an integral keypad on which theuser enters a four-digit identification number. The CardReaders have red and green LED indicator lights to promptthe user to enter a PIN number (on PIN models) and indicatewhether access is granted or denied.

    IGMsThe IGM, or Information Gathering Module, interprets the

    information sent to it by the Card Reader and is the local

    decision maker for granting or denying access, based on itsstored database. One or two Card Readers may beconnected to each IGM and up to 32 IGMs may beconnected to the system network, for a total of 64 CardReaders/doors system wide. The IGM also contains theoutputs to monitor and control the electric locks, door monitorswitches, exit request buttons and alarm relays.

    User's Manual 1-6 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    21/260

    IGMs communicate over a 4-wi re 20ma current loopcommunication line and operate on a poll/response mode.Each IGM has its own unique address and will only respondto messages sent from the host which contains its address.This feature allows the IGMs to be connected on a singleloop and pass data along to subsequent IGMs on the loop orback to the host processor. The four different IGM modelsare as follows:

    Model 40 - Contains: (2) reader inputs,(2) door strike outputs(2) exit request inputs(2) door monitor switch inputs(2) door alarm relay outputs(2) alarm bypass relay outputs(2) outdoor reader heater

    connections(1) host communication input port(1) host communication output port(1) fire panel input

    Model 45 - Contains: Same as Model 40 plus

    (8) inputs for dry contact monitoring(2) additional relay outputs

    Model 40U - Contains: Same as Model 40 plus(1) built-in 12 VDC battery supply(1) built-in battery charging circuit

    Model 45U - Contains: Same as Model 45 plus

    (1) built-in 12 VDC battery supply(1) built-in battery charging circuit

    The IGM model number is stamped on an identificationlabel located on the outside of the unit.

    Any combination of Model 40 and Model 45 IGMs may beconnected to the system as long as the total number of IGMsdoes not exceed the software capacity.

    Throughout this manual, the IGM includes both the Models40, 40U, 45, and 45U IGMs, unless stated otherwise.

    User's Manual 1-7 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    22/260

  • 8/8/2019 Manual on-Site Control de Acceso

    23/260

    CHAPTER 2 SOFTWARE OVERVIEW

    Software Versions ................................................... 2-1Software features ........................................................ 2-1Files ........................................................................... 2-3Commands .................................................................. 2-5Polling ........................................................................ 2-5

    Reports ..................................................................... 2-6

    DIAGRAMS, DRAWINGS, TABLES

    2-1 Screen Layout .......................................... 2-22-2 Software Menu Tree ................................. 2-4

  • 8/8/2019 Manual on-Site Control de Acceso

    24/260

  • 8/8/2019 Manual on-Site Control de Acceso

    25/260

    SOFTWARE VERSIONS

    The Onsite system software is available in two bas icmodels: Onsite/10 and Onsite/64. The Onsite/10 softwarecontrols up to 5 IGMs and 10 readers per system. TheOnsite/64 software controls up to 32 IGMs and 64 readersper system. All other software functions and features are thesame for both systems. This manual applies to Version 1.2of the Onsite software.

    SOFTWARE FEATURES

    The Onsite user-friendly software is menu-driven andutilizes on-the-screen prompts to direct the user to select afunction from a list or menu. After each selection, thesoftware will either execute the selected action or offerprompts for additional choices and request that data beentered. No programming knowledge is required, andsoftware operation can be learned in a short period of time.Figure 2-1 shows the basic screen layout.

    User's Manual 2-1 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    26/260

    Figure 2-1 SCREEN LAYOUT

    The system software performs the following functions:

    a. creates filesb. executes commandsc. polls the networkd. logs transactionse. generates reports

    Function keys, indicated and labeled at the lower left-handcorner of the screen, form the menu structure. The functionkeys are pre-programmed to perform system operations. Forexample, Function key F8 offers "Help" screens which provideon-line assistance that can be called up and exited anytimethe system is in a database file. Some users may find theF9-MenuHelp key useful. This feature uses the screen todisplay the entire menu system in detail.

    User's Manual 2-2 Sievert Incite

    02-26-90 10:38:08 Sievert

    LOGON

    name [Incite/64

    password [

    Operator logged on 1 of1

    1-ALARM 2-CONTROL ACCESS CONTROL3-NISTO6Y 4- 10:09:46 onsite/64 startup on 02-26-905-DBASE 6-Logoff 10:09:46 LIEBERT Incite/64 Version 1.27-PRINT 8-ACC STAT 10:09:46 Copyright (c) 1987 - 1989 All rightsreserved.

    9-Meng H1p 10-Quit 10:09:47 Connected group 01 to COM2

  • 8/8/2019 Manual on-Site Control de Acceso

    27/260

    FILES

    Menu-driven software simplifies the process of creatingfiles. ln each menu, the length of the data entry field isdefined on the screen. Only the number of characters that fitwithin the field length wil l be accepted. As t he usercompletes a field entry, the key will move theprompt to the next entry field.

    F1 ..... move to previous menuF2 ..... modify a recordF3 ..... move to previous recordF4 ..... move to next recordF5 ..... add a recordF6 ..... delete a recordF7 ..... print a record or fileF8 ..... helpF9 ..... sort the records in a fileF10....search for a record

    These function keys help to create and manage thedatabase. The functions of each of these keys will change

    depending on which part of the system is being used, i.e.ALARM, CONTROL, HISTORY or DBASE. Each function keylabel is either in capitalized or lower case letters. Capitalizedkeys indicate further sub-menus under that key. Lower casedkeys do not offer additional menus under that key. Each ofthe possible function keys will be explained in detail later onin this manual. Figure 2-2 shows the software menu tree.

    User's Manual 2-3 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    28/260

    Figure 2-2 SOFTWARE MENU TREE

    User's Manual 2-4 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    29/260

    COMMANDS

    Commands may be executed ei ther manual ly orautomatically. By selecting the COMMANDS menu option,the user can execute commands manually, for example;unlock a door or lock a door. The same commands mayalso be programmed to execute automat ical ly byprogramming a "Timed Command" or "If/Then Command".

    Automatic commands fall into one of two categories:

    "Timed Commands" are programmed to automatically executetasks at specified locations on the start and stop times of agiven Time Code. These commands occur at a given time ofday and day of the week.

    " I f /Then Commands" operate on the concept"IF/THEN/WHEN". "IF" a given message is received from agiven location, "THEN" the host issues a specific command tothe same or another specified location, but only "WHEN" agiven Time Code is active.

    Commands will be explained in more detail later in thismanual.

    POLLING

    When on-line with the IGM network, the host continuouslypolls each IGM for transactions and prints, displays or storesthese transactions. The host is dedicated to the accesscontrol system and it is not recommended that it be used forany other purpose. This mode of operation is highlyadvisable, especially in relatively large systems whereimmediate reporting of alarms, continuous display or printoutof transactions is desirable. THIS MODE OF OPERATIONMUST BE USED WHEN "IF/THEN COMMANDS" AREPROGRAMMED INTO THE SYSTEM.

    lf the communication link between the host and network isdisrupted, i.e.; host computer failure or communications wiring

    failure, the IGMs will continue to make all access decisions,and store transactions and alarms. The system may continuein this mode indefinitely.

    User's Manual 2-5 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    30/260

    When the transaction buffer in the IGM becomes full,subsequent transactions will write over and destroy theear l iest t ransact ions. To prevent th is loss of data,communications problems should be corrected as soon aspossible. Once communications are restored, the IGMs willupload their stored transactions back to the host and bedisplayed, printed or stored, depending on how the systemwas programmed to handle these transactions.

    REPORTS

    The software produces formatted transaction reports andfile printouts on the printer, as shown in Appendix B. A log iscreated which autonnatically stores all system activity anddescribes all operator activity while logged-on to the system.

    User's Manual 2-6 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    31/260

    SECTION II PLANNING THE SYSTEM

    Chapter 3 Planning the systemChapter 4 Planning the database operating filesChapter 5 Planning the database monitor and

    control files

  • 8/8/2019 Manual on-Site Control de Acceso

    32/260

  • 8/8/2019 Manual on-Site Control de Acceso

    33/260

    CHAPTER 3 PLANNING THE SYSTEM

    Site planning .................................................................. 3-1Site diagram .................................................................. 3-1Access and Monitoring considerations .......................... 3-2Planning forms ........................................................... 3-4

  • 8/8/2019 Manual on-Site Control de Acceso

    34/260

  • 8/8/2019 Manual on-Site Control de Acceso

    35/260

    SITE PLANNING

    In order to realize maximum benefit from the OnsiteAccess Control System attention should be focused on detailswhen planning the system installation and operationparameters.

    Consult the Onsite installation manual for specificinformation on site preparation and installation. The system

    capabilities and building access control needs should beconsidered before starting a site plan, and all installation andoperational issues should be resolved before beginning tocreate the database.

    SITE DIAGRAMA site plan is recommended when planning the system

    installation. At a minimum, the plan should identify thecontrolled doors, location and logical address of the IGMsand Card Readers. For more information on how eachlogical address is determined, refer to chapter 6.

    When creating the site plan, use a numbering system thatwill identify the IGM and card reader address and label thedoors that each Card Reader will control. For example, on

    the first IGM/READER group "IGM 01" (the first IGM on thegroup 1 loop) controls "reader 01" and "reader 02'', whichmight control the "Front Door" and "Rear Door", respectively."IGM 03" (the second IGM on the group 1 loop) controls"reader 03" and "reader 04" which might control the"Computer Room" and "Tape Library", respectively. If youhave one or more remote IGM locations, repeat this processfor each remote IGM loop. For example, "Group 02" "IGM01" controls "reader 01" and "reader 02" at the first remotesite. This process may be repeated for each remoteIGM/READER group, however, the total number of IGMswithin the system must not exceed 5 for the Onsite/10system and 32 for the Onsite/64 system. This information

    will be required for the Reader/Door file when the database isentered later on.

    User's Manual 3-1 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    36/260

    Other system functions should also be included on the siteplan, if any, that will connect to the system such as alarmdevices, exit push-button or sensors, door monitor contacts,etc. Also, label the IGM input positions for contacts that willbe monitored by the system and include devices that will becontrolled by the IGM output relays. Label the device and theoutput control relay ("X" or "Y") for each IGM.

    ACCESS AND MONITORING

    CONSIDERATIONS

    The intended use of the system is the most importantconsideration when planning the database. Because thesystem controls access and monitors security points, thesefunctions need to be carefully planned to be used to the bestadvantage.

    The following are some basic questions to consider whenplanning the database. Consider:

    How is each access location controlled?Is ingress reader controlled and egress free?lf so, will an exit device be used?

    Or will both ingress and egress be reader controlled?If so, will the anti-pass back mode be utilized?What types of Card Readers? Swipe only or swipe with

    PIN entry?Will the location remain unlocked at certain times?

    When will access be allowed?24 hours a day?Or only certain hours of the day?On certain days of the week?On weekends?On holidays?

    Who will be allowed access to each location?Certain individuals?Certain groups of individuals?All individuals?

    User's Manual 3-2 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    37/260

    Will other non-reader related alarm points bemonitored?What locations will need to be monitored?Will monitoring be continuous?Or will monitoring be required only during restricted hours?Which contact condi t ions wi l l be events? Alarms?What alarm messages will be necessary?

    Will output relays be used to control other non-doorrelated devices?

    Will the output relays be turned "ON", "OFF" or "pulsed"?

    Will they be controlled on a time schedule?Will they operate in response to some specific alarm?

    The answers you develop for these questions will assistyou when developing a database and with overall systemoperation.

    User's Manual 3-3 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    38/260

    PLANNING FORMS

    After determining the "what" and "how" of the system, youwill be ready to build the database. As the heart of thesystem, the database will greatly affect system operation.

    A set of recommended planning forms is included in thismanual to assist in designing database files. Make copies ofthese worksheets and save the originals. After completingthe forms, you will be ready to enter the database into the

    computer and download it to the IGMs.Because the database files are interrelated, files must be

    created and entered in a set order. The following is theorder in which the files should be completed:

    Reader/DoorTime CodeHoliday FileAccess Code FileCard File

    And as an option:

    Moni tor Point Fi le

    Alarm Message FileControl Relay FileAuxiliary Relay FileTimed CommandsIf/Then Commands

    User's Manual 3-4 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    39/260

    CHAPTER 4 PLANNING THE DATABASEOPERATING FILES

    Introduction ............................................................................................ 4-1Card Reader features ........................................................................ 4-1

    Toggle Card ..................................................................................... 4-1Executive Privilege ....................................................................... 4-1Duress 4-2

    Reader/Door file ................................................................. 4-3Card Reader numbers .................................................. 4-4Door name .................................................................... 4-4Unlock time ................................................................... 4-4Open time ..................................................................... 4-5

    Time Code file .................................................................... 4-6Time Code name .......................................................... 4-7Active days ................................................................... 4-7Start/Stop times ............................................................ 4-7

    Holiday file 4-8

    Access Code file ................................................................ 4-9Access Code name ............................................................................... 4-10RDR # and Door name ....................................................................... 4-10Time Code name .................................................................................... 4-10

    Card file ................................................................................................................................ 4-11Card number .............................................................................................. 4-13Cardholder name .................................................................................... 4-13Access code ............................................................................................... 4-13User-defined fields ................................................................................. 4-13PIN ................................................................................................................... 4-13

    DIAGRAMS, DRAWINGS, TABLES

    4-1 Reader/Door File Form ................................ 4-34-2 Time Code File Form ..................................... 4-64-3 Holiday File Form ......................................... 4-84-4 Access Code File Form ................................. 4-94-5 Card File Form ..................................................................... 4-114-6 Card File (continued) ................................................ 4-12

    4-i

  • 8/8/2019 Manual on-Site Control de Acceso

    40/260

  • 8/8/2019 Manual on-Site Control de Acceso

    41/260

  • 8/8/2019 Manual on-Site Control de Acceso

    42/260

    Executive Privilege affects only a keypad Card Readerthat is in the "Card plus PIN" mode. The Card Reader willgrant access to any valid card that has been assigned thePIN number of 0000. No PIN entry is required, and theaccess decision is based on the validity of the card for thatlocation and time.

    DURESSNormally, a cardholder swipes a valid card and enters an

    assigned PIN number to gain access to an area. If acardholder is forced to allow unauthorized personnel nto asecured area under the threat of physical harm, the user canset an alarm with the "duress" feature.

    After swiping a valid card, the cardholder would enter azero followed by the first three numbers of his assigned PINnumber. This immediately tells the IGM that this is a"duress" condition. As the IGM grants access, the alarmrelay is energized which may operate an external alarmdevice.

    ***NOTE***The duress feature cannot be used on cards that are

    assigned "executive privilege"!

    User's Manual 4-2 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    43/260

    READER/DOOR FILE

    The first file to be created is the Reader/Door File. Thisfile associates each Card Reader number with the door nameor location it controls. lt also establishes the times, inseconds, for Unlock Time and Open Time.

    READER/DOOR FILE

    GRPNBR

    RDRNHR

    DOOR NAME

    UNLCK

    TIME

    OP EN

    TIME0 1

    10 1

    1F R O N T DO 0 R1 1 1 1 1 1 1 1 1 1 1 1 1 1 l

    051

    10

    I02 B A C K D O 0 R

    1 1 1 1 1 1 1 1 1 1 1 1 1 1 I I051

    1,0

    10 3 C O M P U T E R R OO M

    1 1 1 1 1 1 1 1 1 1 1 1 1 1 I I05 I 10

    0 4 I P H O N E R O O M1 1 1 1 1 1 1 1 1 1 1 1 1 1 I I

    0 51

    0 7 L

    105

    1P R O D U C T I O N1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

    05 I 30 I

    Figure 4-1 READER/DOOR FILE FORM

    User's Manual 4-3 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    44/260

    CARD READER NUMBERSCARD READER NUMBERSCARD READER NUMBERSCARD READER NUMBERSEnter a two-digit Card Reader number on the planning

    form. Card Readers take their assigned numbers from theaddress of the IGM they are connected to . As an example,"Reader A" on the IGM with the address of 05 (IGMaddresses are always "odd") would be "Reader 05". "ReaderB", on the same IGM, would be "Reader 06". The numberassigned to "Reader A" is always the same as the IGMaddress (always "odd"). The number assigned to "Reader B"is always the IGM address, plus one.

    Card Readers which are connected on the samecommunications loop comprise a group. All readersconnected on a local "hard wired" loop would be labeledgroup 01. If there are one or more remote loops on thesystem, then these would be labeled as "group 02", "group03", "group 04", etc. lf you have remote reader groups, besure to label them as such on the top of the planning form.

    DOOR NAMEDOOR NAMEDOOR NAMEDOOR NAMEEnter the name of the door that is controlled by the Card

    Reader number in the left column. Ideally, the name shouldrelate to the door's function or location, such as "front door"

    or "Manager's office," as shown on the sample form.UNLOCK TIMEUNLOCK TIMEUNLOCK TIMEUNLOCK TIMEUnlock Time is the length of time that the IGM energizes

    the Door Unlock Relay which operates the electric door strike.Unlock Time may be programmed for a duration of 1 secondto 99 seconds.

    User's Manual 4-4 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    45/260

    OPEN TIMEOpen Time is the duration of time that a door may remain

    open after access has been granted. lf the door remainsopen after this time expires, the IGM records the transactionas, "Door Open Too Long". This transaction may be definedas an event or an alarm under Alarm Definitions (seeChapter 5).

    The IGM includes an Alarm Relay that can drive anexternal device. If the transaction "door open too long" isdefined as an alarm, the Alarm Relay will energize for 3seconds if a door monitor contact is connected to the DoorMonitor Contact input.

    Open Time also affects the operation of the Alarm BypassRelay. Typical ly , the Alarm Bypass Relay shunts adoor-mounted contact connected to a primary alarm system.Energized at the same time as the Door Unlock Relay, theAlarm Bypass Relay allows access without triggering theprimary alarm system. This relay remains energized untilOpen Time expires. At this point, it triggers the primaryalarm system if the door remains open. Also, the event (oralarm) transaction, "Door Open Too Long" occurs asexplained above.

    Termination of Unlock and Open times is affected by adoor contact connected to the Door Monitor Contact input ofthe IGM. When a valid entry occurs and the door contact isclosed before the expiration of either time, the remainingtime(s) cancels immediately. For example, if the Unlock timeis set for 5 seconds and a cardholder enters and closes thedoor in 3 seconds; the remaining 2 seconds are immediatelycanceled. Someone following close behind the person whogained access can not open the closed door in the tworemaining seconds.

    User's Manual 4-5 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    46/260

    TIME CODE FILE

    The Time Code File sets the time periods for authorizedaccess for hours of the day and days of the week. This filealso provides for the programming of holidays for accessexceptions.

    The Time Code File can accommodate up to 63 TimeCode Names but no more than 99 line entries.

    TIME CODE FILE

    START STOP

    TIME CODE ACTIVE DAYS TIME TIME

    MON TUE WED THU FRI SAT SUN

    A L W A Y S1 1 1 1 1 1 1

    Y I Y I Y I Y I Y I Y I Y I Y 0 ,0 0 1 2 , 4 , , 0 , 0

    MON TUE WED THU FRI SAT SUN

    N O R M A L1 1 1 1 1 1 1

    Y I Y I Y I Y I Y I I I 0 7 : 5 01 1 1

    1 7 : 0 01 1 1

    MON TUE WED THU FRI SAT SUN

    S H I F T 2 Y I Y I Y I Y I Y I I I 1 7 0 01 1 1

    2 14 0

    MON TUE WED THU FRI SAT SU N

    1 1 1 1 1 1 1 I Y I Y I Y I Y I Y I I 0 0 :0 1 1 1 :1 1 1MON TUE WED THU FRI SAT SUN

    C y . F , H . O , U , R , S YIY

    IY

    IY

    IY

    I 1 I7:0 0

    1 1 1:

    1 1 1

    MON TUE WED THU FRI SAT SUN

    1 1 1 1 1 1 1 1 Y 1 Y I Y 1 Y I I 1 0 10 0 11 1:

    1 1 1

    MON TUE WED THU FRI SAT SU N

    1 1 1 1 1 1 1 I [ I I I Y I Y I Y 0 , 0 0 , 1 2 , 4 0 , 0

    Figure 4-2 TIME CODE FILE FORM

    User's Manual 4-6 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    47/260

    TIME CODE NAMETime Code should be identified by an easily recognizable

    name, such as Shift 1, Shift 2, etc., which people cantranslate to understand the Active Days and hoursrepresented.

    ACTIVE DAYSActive days in the TIME CODE FILE are the days of the

    week. A "Y" marks the day as active, when access will be

    authorized; a "blank" represents a nonactive day.This file allows the user to define the holidays observedby the organization (see Holiday File). The user alsodetermines how holidays will be handled by the system. Forexample, in the Time Code Name, "NORMAL", above,Saturdays, Sundays and holidays are nonactive days. Thereis no authorized access from 7:50 to 17:00 hours for anydefined holiday that falls on an Active Day. Compare this tothe "ALWAYS" Time Code which authorizes access 24 hoursa day, 7 days a week and holidays.

    The access code file and the card file need the TimeCode Name to complete their information.

    START and STOP TIMES

    The Start and Stop times establish the hours during theActive Days that access will be authorized. The time periodentered will be effective for each Active Day.

    lf a Time Code requires more than one active time periodper day, a separate entry can be made to handle that timeperiod. The Time Code Name OFF HOURS, for example,includes three different active periods for different days of theweek. Two time periods are accommodated on Mondaythrough Friday, and one time period for Saturday, Sunday,and Holidays. This built-in flexibility may also be used forother applications.

    User's Manual 4-7 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    48/260

    HOLIDAY FILE

    Working in conjunction with the Time Code File, theHoliday File lets the user define holidays which can beprogrammed for the organization's needs. ln effect, theholiday can become the "eighth" day of the week.

    The Holiday File may also be used to identify "special"days, such as a year-end shutdown, when special access

    rules might apply. See Time Code File for details on howthe holiday mode works in the Time Code File. Up to 32holidays or "special" days can be defined in the Holiday Filefor specific access within each time code.

    H O L I D A Y F I L E

    M ON T

    D A

    H O L I D A Y N A M E

    0 1 0 1 N E W Y E A R ' S D A Y1 1 1 1 1 1 1 1 1 1 1 1 1

    0 4 1 3 G O O D F R I D A Y

    1 1 1 1 1 1 1 1 1 1 1 1 10 5 3 0 M E M O R I A L D A Y

    1 1 1 1 1 1 1 1 1 1 1 1 10 7

    I 0 4I N D E P E N D E N C E D A Y1 1 1 1 1 1 1 1 1 1 1 1 1 I

    0 9 0 3 L A B O R D A Y1 1 1 1 1 1 1 1 1 1 1 1 1

    1 1 2 2I

    T H A N K S G I V I NG1 1 1 1 1 1 1 1 1 1 1 1 1

    1 1 2 3

    1 T H A N K S G I V I N G

    1 1 1 1 1 1 1 1 1 1 1 1 1

    1 2 2 4 C H R I S T M A S E V E1 1 1 1 1 1 1 1 1 1 1 1 1

    1 2 2 5 C H R I S T M A S D A Y

    1 1 1 1 1 1 1 1 1 1 1 1 1

    1 2 3 1 N E W Y E A R " S E V E1 1 1 1 1 1 1 1 1

    Figure 4-3 HOLIDAY FILE FORM

    User's Manual 4-8 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    49/260

    Completing the Holiday File is self-explanatory and quiteeasy to do. Simply enter: the day of the month the holiday occurs the month the holiday occurs the name of the holiday

    ACCESS CODE FILE

    The Access Code File establishes a relationship betweeninformation in the Reader/Door File and the Time Code File.Refer to these files for the information needed to completethis file.

    A C C E S S C O D E F I L E

    A C C E S S C O D E

    N A M ED O O R N A M E T I M E

    C O D E NAMM A S T E R

    1 1 1 1 1 1 1 1F R O N T D O 0 R

    1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1A L W A Y S

    1 1 1 1 1 1

    I I I I I IB A C K D O O R

    1 1 1 1 . 1 1 1 1 1 1 1 1 1 1 1 1

    A L W A Y S1 1 1 1 1 1

    I I I I I IC O M P U T E R R O O M

    1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1A L W A Y S

    1 1 1 1 1 1

    I I I I I I

    P H O N E R O O M

    1 1 1 1 1 1 I 1 1 1 1 1 1 1 1 1

    A L W A Y S

    1 1 1 1 1 1

    I I I I I IP R O D U C T I O N

    1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1A L W A Y S

    1 1 1 1 1 1

    O F F I C EI I I I I I

    F R O N T D O O R 1 1 1 1 1 1 1 1 1 1 1 1 i I I

    N O R M A L1 1 1 , 1 1

    I I I I I IB A C K D O 0 R

    1 1 1 1 1 1 1 1 1 1 1 I IN O R M A L1 1 1 1 1 1

    I I I 1 1 1 1R O D U C T I O N

    1 1 1 ( 1 1 1 1 1 1 1 I I I IN O R M A L1 1 1 1 1 1

    L A N T 11 1 1 1 1 1 1 1 1

    B A C K D O 0 R 1 1 1 1 1 1 1 1 1 1 1 I I I I

    N O R M A LI l l I t l

    1 1 1 1 1 1 1 1 1R O D U C T I O N

    1 1 1 1 1 1 1 1 1 1 1 I I I IN O R M A L1 1 1 1 1 1

    P L A N T 21 1 1 1 1 1 1 1 1

    B A C K D O O R 1 1 1 1 1 1 , 1 1 1 1 1 I I I

    S H I F T 21 1 1 1 1 1 1

    1 1 1 1 1 1 1 1 1R O D U C T I O N

    1 1 1 1 1 1 1 1 1 1 1 I I IS H I F T 2

    1 1 1 1 1 1

    M I S D E P T1 1 1 1 1 1 1

    F R O N T D O O R 1 1 1 1 1 1 1 1 1 1 1 1 1 I I

    N O R M A L1 1 1 1 1 1

    1 1 1 1 1 1 1 1 1B A C K D O O R 1 1 1 1 1 1 / 1 1 1 1 1 1 I I

    A L W A Y S1 1 1 1 1 1

    1 1 1 1 1 1 1 1 1C O M P U T E R R O O M1 1 1 1 1 1 1 1 1 1 1 1 1 I I

    A L W A Y S1 1 1 1 1 1

    1 1 1 1 1 1 1 1 l

    P H O N E R O O M

    1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

    A L W A Y S

    1 1 1 1 1 1

    Figure 4-4 ACCESS CODE FILE FORM

    User's Manual 4-9 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    50/260

  • 8/8/2019 Manual on-Site Control de Acceso

    51/260

    CARD FILE

    The Card File contains information for every card enteredinto the system. At a minimum, this file contains:- the encoded number on the magnetic stripe card the cardholder's name the cardholder's assigned access code the cardholder's assigned PIN number

    Information from the Access Code File will be necessaryfor this file.

    C A R D F I L E

    C A R D N A M E A C C E S S

    1 1 1 1 1

    0 0 0 0 0 1 C L A R K ,H A L

    1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

    M A S T E R 1 1 1 1 1 1 1 1

    t 1 1 1 1

    ,M I K E

    M A S T E R 1 1 1 1 1 1 1 1

    1 1 1 1 1

    ,K U R T

    M A S T E R 1 1 1 1 1 1 1 1

    1 1 1 1 1

    ,K E N

    O F F I C E1 1 1 1 1 1 1 1

    1 1 1 1 1

    ,T I M

    O F F I C E1 1 1 1 1 1 1 1

    1 1 1 1 1 0 N, P A U L AO F F I C E

    1 1 1 1 1 1 1 1

    1 . 1 1 1 1

    ,M I D G E

    O F F I C E1 1 1 1 1 , 1 1 1

    i l l 1 1,

    M A T TP L A N T 1

    1 1 t 1 1 1 1 1

    1 1 1 1 1

    ,J E F F

    P L A N T 11 1 1 1 1 1 1 1

    1 1 1 1 1

    ,R I C K

    P L A N T 11 1 1 1 1 1 1 1

    1 1 1 1 1

    0 0 0 0 1 1 S H E E H A N ,

    P A U LP L A N T 2

    1 1 1 1 1 1 1 1

    1 1 1 1 1

    ,J O H N

    P L A N T 21 1 1 1 1 1 1 1

    1 1 1 1 1

    ,D O N

    M I S D E P T1 1 1 1 1 1 1 1

    S A R K ,1 1 1 1 1

    S T E V E1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

    M I S D E P T1 1 1 1 1 1 1 1

    1 1 1 1 1,

    E R I CM I S D E P T1 1 1 1 1 1 1 1

    Figure 4-5 CARD FILE FORM

    User's Manual 4-11 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    52/260

    The Card File contains four (4) user-defined fields. In theorder shown on the form, the f ields are four (4), twelve (12),twelve (12) and six (6) characters in width, respectively. Withthe exception of assigning PINs (Personal IdentificationNumbers), the fields may be used to store any information.See the chapter on Titles f or details about changing theuser-defined field headings.

    *** NOTE ***When assigning PIN numbers, reserve the four (4)

    character field for that purpose only.

    C A R D F I L E( n e e r - d e f i n e d f l e l d s )

    P I N 2 n d F I E L D 3 r d F I E L D 4 t h

    # D E P A R T M E N T1 1 1 1 1 1 1 1 1 ' 1 1C A R D S E R I A L #

    1 1 1 1 1 1 1 / 1 1 1 1 1 1 1 1 1 1 1

    1 0 1 0 0 1 5 4 11 1 1 1 1 1 1 1 1

    2 1 0

    1 1 1

    1 0 1 2 M A N A G E R S1 1 1 1 1 1 1 1 1 1 1

    0 0 1 5 4 21 1 1 1 1 1 1 1 1

    2 1 2 81 1 1 1

    1 1 11 0 1 0 0 1 5 4 3

    1 1 1 1 1 1 1 1 12 1 0

    1 0 1 41 1 1

    S A L E S1 1 1 1 1 1 1 1 1 1

    0 0 1 5 6 11 1 1 1 1 1 1 1 1

    2 1 1 31 1 1 1

    1 0 1 51 1 1

    S A L E S1 1 1 1 1 1 1 1 1 1

    0 0 1 5 6 21 1 1 1 1 1 1 1

    2 1 1 41 1 1 1

    1 0 1 6

    A L E S1 1 1 1 1 1 1 1 1 1

    0 0 1 5 6 31 1 1 1 1 1 1 1

    2 1 1 51 1 1 1

    1 0 1 7I I I

    S A L E S1 1 1 1 1 1 1 1 1 1

    0 0 1 5 6 71 1 1 1 1 1 I I

    2 1 1 61 1 1 1

    1 1 1

    1 08 P R O D U C T I 0 0 1 5 7 0

    1 1 1 1 1 1 1 14 1 4 8

    1 1 1 1

    1 0 1 9

    P

    R O D U C T I O N1 1 1 1 1 1 1 1 1 1

    0 0 1 5 7 11 1 1 1 1 1 1 1

    4 1 4 91 1 1 1

    1 0 R O D U C T 1 0 61 1 1 1 1 1 1 1 1 1

    0 0 1 5 7 21 1 1 1 1 1 1 1 1 1 1

    4 1 5 01 1 1 1

    1 0 R O D U C T I0N1 1 1 1 1 1 1 1 1 1

    0 0 1 5 7 31 1 1 1 1 1 1 1 1 1 1

    4 1 4 81 1 1 1

    1 1 1 I 0 N0 0 1 5 7 4

    1 1 1 1 1 1 1 1 1 1 14 1 5 0

    1 1 1 1

    1 0 2 3

    . P .1 1 1 1 1 1 1 1 1 1 1

    0 0 1 5 7 51 1 1 1 1 1 1 1 1 1 1

    5 4

    1 0 2 . P .1 1 1 1 1 1 1 1 1 1 1

    0 0 1 5 7 61 1 1 1 1 1 1 1 1 1 1

    5 4 5 61 1 1 1

    1 0 2 5

    D

    . P .1 1 1 1 1 1 1 1 1 1 1

    0 0 1 5 7 71 1 1 1 1 1 1 1 1 1 1

    5 4 5 81 1 1 1

    Figure 4-6 CARD FILE (continued)

    This example of user-defined fields shows the PINnumber, social security number, home telephone number anddepartment name of each cardholder in the file.

    User's Manual 4-12 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    53/260

    CARD NUMBERThe Card Number is the six digi t number that is

    magnetically encoded on the card. Cards are encoded by aspecial Encoder/Reader at the factory. Consult the card datasheet supplied with your encoded cards for the sequencing ofcard numbers for your system.

    CARDHOLDER NAMEEnter the cardholder's name, preferably in "last name,

    first name" order. By entering data in this format, it ispossible to sort the file and obtain a hard printout of thecard file in alphabetical order.

    ACCESS CODEEach cardholder must be assigned an Access Code

    Name. Enter the appropriate Access Code Name form theAccess Code File. The Access Code Name chosen for eachindividual should provide access authorization at the properdoor or location during the desired time period.

    USER-DEFINED FIELDSFour fields in the card file have been reserved for the

    specific needs for the user. Pertinent cardholder informationcan be stored in the card file for quick reference. Remenberto reserve the four character field for PIN numbers if you will beusing that feature un the system. If the PIN feature will not beused, this field must still contain numeric information.PERSONAL IDENTIFICATION NUMBER (PIN)The user creates the 4-digit PIN num ber that is assignedto each cardholder. Although the number MAY be any fourdigits, it is suggested that the number have some significancefor the cardholder, such as a birthday, house number, etc.The cardholder enters the PIN at the keypad Card Readers.

    User's Manual 4-13 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    54/260

    When a cardholder is assigned a PIN number of zero(0000), the IGM does not prompt the cardholder for a PINnumber. Instead, access is granted immediately, as long asthe parameters for time and location are satisfied. Therefore,any cardholder who is assigned the PIN number 0000 willenjoy "Executive Privilege".

    The user-defined PIN number is not encoded on the cardso it may be quickly and easily changed or canceled, ifnecessary.

    User's Manual 4-14 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    55/260

    CHAPTER 5 PLANNING DATABASEMONITOR and CONTROL FILES

    Monitor point file (IGM models 45 and 45U only) 5-1

    Group number ............................................................ 5-3IGM number ............................................................... 5-3

    Point number .............................................................. 5-3Point name ................................................................. 5-3Opening point message ............................................. 5-3Closed point message ............................................... 5-3Alarm condition .......................................................... 5-3Alarm message number ............................................. 5-3Trace to ...................................................................... 5-4

    Alarm message file (IGM models 45 and 45U only) 5-4This message number ............................................... 5-5Alarm message .......................................................... 5-5Next message number ............................................... 5-5

    Control relay file (IGM models 45 and 45U only) . 5-6Group number ............................................................ 5-7

    IGM number ............................................................... 5-7Control relay ............................................................... 5-7Control relay name .................................................... 5-7On message ............................................................... 5-7Off message ............................................................... 5-7Pulse message .......................................................... 5-7Pulse time .................................................................. 5-7

    Timed command file .......................................................... 5-8Time code name ........................................................ 5-9Group number ............................................................ 5-9Card reader number .................................................. 5-9Start command ........................................................... 5-9Stop command .................................................................................... 5-10

    If/then command file................................................................................................ 5-11

    IF condition ........................................................................................................ 5-13Group number ...................................................................................... 5-13(IGM/reader number) ...................................................................... 5-13Message .................................................................................................. 5-13

    Then condition ................................................................................................ 5-14Group number ...................................................................................... 5-14(IGM/reader number) ...................................................................... 5-14Command ............................................................................................... 5-14Time code names .............................................................................. 5-14

    5-i

  • 8/8/2019 Manual on-Site Control de Acceso

    56/260

    DIAGRAMS, DRAWINGS, TABLES

    5-1 Monitor Point File Form .............................. 5-2

    5-2 Alarm Message File Form ........................... 5-55-3 Control Relay File Form .............................. 5-65-4 Timed Command File Form ........................ 5-85-5 If/Then Command File Form ..................... 5-12

  • 8/8/2019 Manual on-Site Control de Acceso

    57/260

    MONITOR POINT FILE(IGM models 45 and 45U only)

    The Monitor Point File supports sensing or monitoringdevices that provide a dry contact output. Each IGM canmonitor up to eight (8) contacts. The user createsdescriptions for the "open" and "closed" conditions of thecontact. (See figure 5-1, page 5-2).

    An IGM may be programmed to report, or not report, anychange in the contact condition (open to closed, or closed toopen) to the host processor. The monitor point transactionscan be programmed as "events" or "alarms".

    ***SPECIAL NOTE***

    MP #6 - IGM tamper switch

    MP #7 or #8 - IGM troubleMP #8 - Unit on Battery (45U Only)

    If desired, these monitor points may be used for otherexternal alarms and the built-in alarms disabled. For details,consult the IGM and Reader Installation Manual.

    User's Manual 5-1 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    58/260

    Figure 5-1 MONITOR POINT FILE FORM

    User's Manual 5-2 Sievert Incite

    MONITOR POINT FILE

    HROUP IG PT, 0 1 0 1 61 _ _ _ _ _ , _

    POINT NAMEI G M # 1 T A M P E R1 1 1 1 1 1 1 / 1 1 1 1 1 1 1 1 1

    I M

    OPENING POINT MESSAGEN O R M A L

    1 1 1 1 1 1 1 1 1 I I

    CLOSING POINT MESSAGEL I D O P E N

    I t J IJ I I I I I0IIION:(0)pen/(C)

    losed/(B)oth/(N)o

    ne:

    C ALARM MESSAGE

    S E

    P

    i - IGROUP IGM #PT1 1 1 7

    POINT NAMEI G M T R

    1 1 1

    2 M

    /ITION:(0)pe

    n/(C

    OPENING POINT MESSAGEC L E A R1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

    CLOSING POINT MESSAGE

    A L A R M C O N D I T I O N

    losed/(B)oth/(N)one : C ALARM MESSAGE

    NUMBER:

    TRACE TO:

    0 1

    S 1 F P

    GROUP IGM PT

    01 0 1 8

    POINT NAMEI G M # 1 P O W E R

    1

    RM

    O PENIN G PO INT ME OOA OE U N I T 0N 1 A /

    1 1 I I

    CLOSING POINT MESSAGEU N I T 0 N B A T T E R Y[ ] I I I I I l i i iDITION:(0)pen/(C)losed/

    (B)othhhijone:

    C ALARM MESSAGENUMBER:

    TRACE TO:

    0 1

    S F

    P

    AIACON

    ALACON

    ALACON

  • 8/8/2019 Manual on-Site Control de Acceso

    59/260

    GROUP NUMBERIf your system has more than one group of IGMs, be sure

    to identify the group number that contains the monitor pointsyou want to define.

    IGM NUMBEREnter the address of the IGM that will monitor the contact

    number identified below.

    POINT NUMBERThis contact to be monitored must be connected to one of

    the IGM contact monitor inputs. Enter the number of theIGM contact input (1 through 8).

    POINT NAMEEnter a description of the contact to be monitored.

    OPENING POINT MESSAGEWhen the IGM senses a contact opening, it will send the

    transaction to the host processor where the software willattach an Open Contact Description. Enter the description tobe displayed on the processor.

    CLOSED POINT MESSAGEWhen the IGM senses a contact closure, it will send the

    transaction to the host processor where the software willattach a closed contact description. Enter the description tobe displayed on the processor.

    ALARM CONDITIONEnter the contact description to be identified as an alarm

    (0 = open, C = closed, B = both, N = none). Accordingly,the IGM will create an alarm transaction and give it priorityfor transmission to the host processor.

    ALARM MESSAGE NUMBERAn alarm message may be created to supplement the

    alarm condition. If so, an alarm message file will be createdalong with this file. As the alarm conditions are created,alarm messages need to be assigned. Enter the messagenumber from the alarm messages file to be assigned to theAlarm condition you just established.

    User's Manual 5-3 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    60/260

    TRACE TOEnter the appropriate "Trace To" codes. An "S" (screen)

    displays the transaction to the screen, and an "F" (file) logsthe transaction to the log file on the hard drive, and a "P"(printer) prints the transaction to the printer. Any combinationof "S", "F", and "P" may be entered.

    ALARM MESSAGE FILE(IGM models 45 and 45U only)

    The Alarm Message File stores the alarm m essagescreated and assigned to the contact monitor alarm conditionsin the Contact Monitor File. By carefully structuring this file, itis possible to "link" message segments. To avoid causing amessage loop, do not link alarm messages so the Next MSG.No. is that of a previous message in the same chain. Also,for the last message in the chain, leave the NEXT MSG NO.blank.

    One approach to managing the creation of this file is towrite down all of the alarm messages on paper first. Whenthat is completed, pick out those messages that repeat in two

    or more messages. Enter those "trailers" in the file. W hatremains are the primary alarm messages. Through "linking"the trailing messages to the appropriate primary alarmmessages, the original messages will be re-composed.

    User's Manual 5-4 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    61/260

    ALARM MESSAGE FILE

    M S GN B R

    A L A R M M E S S A G E L I N

    KT O

    C A L L ,S E ,R ,V ,I C E F y , E X T E N S I 1

    0 N 6 3 2 7 .1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

    I N T R U S I O N A L E R T I N B A S E1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

    M E N T A R E A !1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

    W A T E R U N D E R F L O O R ! P L E A1 1 1 1 1 1 1 1 1 1 1 1 1

    S E I N V E S T I G A T E .1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

    0 4

    N E C E S S A R Y , C A L L S E R V1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

    V I d N T 8 4 1 6 3 2 71 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

    Figure 5-2 ALARM MESSAGE FILE FORM

    THIS MESSAGE NUMBERAlarm messages can be numbered in any order or

    scheme. Use only digits, no alphabetic or special characters.

    ALARM MESSAGEEnter the alarm message as you wish it to appear.

    There is space for 38 characters to compose a message.

    Messages can be extended into longer statements through"linking" (see NEXT MESSAGE NUMBER)

    NEXT MESSAGE NUMBERAlarm messages may be linked together to create

    meaningful instructions. "Linking" is initiated by entering thenumber of the message which is to follow the presentmessage.

    User's Manual 5-5 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    62/260

    CONTRO(IGM mod

    The CONtwo Controlcommands frexternal devic

    Each cont

    response tocommand ONOFF operatecommand eprogrammabl

    Fig

    IG01

    1GRP #CT1

    IG01

    GRP #01

    User's Manu

    L RELAY FILEels 45 and 45U only)

    ROL RELAY FILE supports the operation of tRelays, designated as "X" and Y. Underm the host processor, these relays can controles.rol relay operates a set of dry contacts in

    ommands from the host processor. Theoperates the relay as continuously energized;as continuously de-energized. The PULSE

    nergizes the re lay momentar i ly for ae time from 1 to 99 seconds.

    ure 5-3 CONTROL RELAY FILE FORM

    1 1 1 1

    OFF MESSAGEN O R M A L1 1 1 1

    TIMEPULSE MESSAGEA L A R M T E S T

    1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

    TIME03H E N O F

    1 1 1 1 1

    S, E, C, U, R, I, T, Y,

    ON MESSAGEN , 0 , T I F I E D

    F F1 1 1 1 1 1 1

    PULSE MESSAGEL, I, G, H, T, S,

    # RELAYX

    1 1 1 1 1 1 1 1 1

    RELAY NAME U T S I

    1 1 1 1

    ON MESSAGEN

    1 1 1 1 1 1 1 1 1 1 1

    # RELAY

    al 5-6 evert n

    he

    te

  • 8/8/2019 Manual on-Site Control de Acceso

    63/260

  • 8/8/2019 Manual on-Site Control de Acceso

    64/260

    TIMED COMMAND FILE

    The Timed Command File stores commands that areexecuted automatically under the control of a time code.Timed commands can control Card Readers, monitor pointsand control relays at the start and/or stop times on the activedays of a given time code. The two-letter commands listedbelow represent the actions available for Timed Commands.

    Figure 5-4 TIMED COMMAND FILE FORM

    User's Manual 5-8 Sievert Incite

    TIMED COMMAND FILE

    T/MECODE NAME

    GRP

    #IGMRDR START COMMAND STOP COMMAND

    N O R M A L1 1 1 1 1 1 1

    D l 0 11

    U D1 1 1 1 1 1 1 1 1

    L D1 1 1 1 1 1 1 1 1

    N O R M A L1 1 1 1 1 1 1 1 1 1

    N O N W O R KII 1

    0 10 1

    2- D P 2 -1

    COMMANDS

    GA=gr ant acce ss DA=disabIe antipsbkuD=un lock door EA=enable antipsbkLD =lock door rP=pulse relay X or YCM =card only mode rN=relay X or Y onCP =card = PIN rE=relay X or Y offCU =customer code only r=X or YCS =stor e CU tran sact ions DP 3 -- =disable pnt 3EP ------ 8=enable pnt 8

  • 8/8/2019 Manual on-Site Control de Acceso

    65/260

    TIME CODE NAME51

    The Time Code Name determines the start and stoptimes of the active days the commands will be executed.Enter the Time Code Name that includes the times and daysfor the desired actions to occur. Refer to the time code file.

    GROUP NUMBERIf your system has more than one group of IGMs, be sure

    to identify the group number that you want to define the

    timed commands for.

    CARD READER NUMBEREnter the reader number from the READER/DOOR file

    that will receive the command. If the commands affect theMonitor contacts or Control relays, enter the IGM numberwhere they are located.

    START COMMANDEnter the two-letter command for the desired action to

    occur at the Start Time of the Time Code Name. Whenenabling or disabling a monitor contact, enter the contactnumber in its proper position in th e string following thetwo-letter command. Fill the remainder of the eight positions

    with dashes.For reference, see the Time Code Name "NORMAL" in

    Figure 5-4. Reader number 1 of IGM number 1 wil lUNLOCK at the Start Time of the Time Code and LOCK atthe Stop Time of the Time Code on the active days of theTime Code.

    User's Manual 5-9 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    66/260

    At the Time Code Name "NON WORK", Monitor Pointnumbers 1 and 2 of IGM number 1 will be ENABLED at theStart Time of the Time Code and DISABLED at the StopTime of the Time Code of the active days of the Time Code.Note on the entries for Monitor Point numbers 1 and 2 thatthey occupy position numbers 1 and 2 in the string after thetwo-letter commands EP and DP.

    STOP COMMAND

    Enter the two-letter command for the action you wish tooccur at the Stop Time of the Time Code Name. In the caseof contact Monitor Points, follow the same sc heme asdescribed in Start Command above.

    User's Manual 5-10 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    67/260

    IF/THEN COMMAND FILE

    The IF/THEN Command file executes a command inresponse to a condition during a specified time period and isbased on a "cause and effect" relationship as follows:

    If a specified IGM or Reader sends a specified

    message Then a specified command is send the same or

    another IGM/READER

    When a specified TIME CODE is active.

    *** NOTE ***

    Because this file is not downloaded to the IGMs, the hostprocessor must be on to execute If/Then commands.

    User's Manual 5-11 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    68/260

    Figure 5-5 IF/THEN COMMAND FILE FORM

    User's Manual 5-12 Sievert Incite

    IF/THEN COMMAND FILE

    IF THEN

    GRPNBR

    IGMNBR

    SENDSMSG

    GRPNBR

    IGMNBR

    RECIEVES THISCOMMAND

    DURINGTIME CODE NAME

    0

    5 1 O P 0 1 0 1 X N

    1 1 1 1 1 1 1 1 1N N 0 R K

    I

    0 10 2 I I I

    0 10 1 1 1 1 1 1 1 1 1 1

    N N W O R KI I I

    O 1 O

    1 P O I I 1 1 1 1 1 1 1 1 1A L W A Y S

    ------- MESSAGES -DF =door forced openDO =door open too longDC -door closedP0x=point x openedPCx=point x closedTS =tamper sw. openedTN =tamper sw. normal

    ---------------- COM MAN DS ----------GA=gr ant acces s DA=disable antipsbkUD=un lock door EA-enable antipsbkLD=lo ck door rP=pulse relay X or YCM=card only mode rN=relay X or Y onCP=ca rd PIN rF=relay X or Y offCU-customer code only (r=X or Y)CS=store CU transactionsDP 3 ----- =disable pnt 3EP -------- 8=enable pnt 8

  • 8/8/2019 Manual on-Site Control de Acceso

    69/260

    "IF" CONDITION

    GROUP NUMBERIf your system has more than one group of IGMs, be sure

    to identify the group number of the IGM/READER group thatwill originate the message.

    (IGM/READER NUMBER)

    Enter the IGM or Card Reader number that will originatethe message. All messages are doors-related except for thetwo contact monitor point messages.

    MESSAGEEnter the message that will be sent by the IGM or Card

    Reader identified above. This is the "condition" to which thesystem will react.

    User's Manual 5-13 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    70/260

    "THEN" CONDITION

    GROUP NUMBERIf your system has more than one group of IGMs, be sure

    to identify the group number of the IGM/READER group thatwill receive the Command in response to the "If" condition.

    (IGM/READER NUMBER)

    Enter the IGM or Card Reader number that will receive theCommand in response to the "If" condition.

    COMMANDEnter the command that will perform the desired action.

    When enabling or disabling a monitor contact, remember toplace the contact number in its proper position in the stringfollowing the two-letter command, similar to the procedure inthe previous Timed Command File.

    TIME CODE NAMESThe Time Code Name you enter will define the hours and

    the days that the "conditional" commands will occur. Be surethat the Start and Stop times and the active days satisfy the

    period when you want the "cause and effect" to occur.

    User's Manual 5-14 Sievert Incite

  • 8/8/2019 Manual on-Site Control de Acceso

    71/260

    SECTION III GETTING STARTED

    Chapter 6 System Set-upChapter 7 The Onsite SoftwareChapter 8 Initializing the System

  • 8/8/2019 Manual on-Site Control de Acceso

    72/260

  • 8/8/2019 Manual on-Site Control de Acceso

    73/260

    CHAPTER 6 SYSTEM SET-UP

    Introduction ........................................................................ 6-1Host processor ................................................................... 6-1

    IGM to host processor connection ................................. 6-2Printer

    6-3Configuring the IGMs ......................................................... 6-3IGM processor board setup ............................................... 6-3

    IGM addre