p2000 security management system software user manual · 2020. 4. 9. · p2000 security management...

576
P2000 Security Management System Software User Manual Version 3.10 and higher, October, 2010 24-10515-145 Revision A

Upload: others

Post on 03-Feb-2021

4 views

Category:

Documents


0 download

TRANSCRIPT

  • P2000Security Management System

    Software User Manual

    Version 3.10 and higher, October, 2010 24-10515-145 Revision A

  • P2000Security Management System

    Software User Manual

    Version 3.10 and higher, October, 2010

    24-10515-145 Revision A

    Security Solutions(805) 522-5555

    www.johnsoncontrols.com

  • Copyright 2010Johnson Controls, Inc.

    All Rights Reserved

    No part of this document may be reproduced without the prior permission of Johnson Controls, Inc.

  • Acknowledgment

    Cardkey P2000, BadgeMaster, and Metasys are trademarks of Johnson Controls, Inc.All other company and product names are trademarks or registered trademarks of their respective owners.

    If this document is translated from the original English version by Johnson Controls, Inc., all reasonable endeavors will be used to ensure the accuracy of translation. Johnson Controls, Inc. shall not be liable for any translation errors contained herein or for incidental or consequential damages in connection

    with the furnishing or use of this translated material.

    Due to continuous development of our products, the information in this document is subject to change without notice. Johnson Controls, Inc. shall not be liable for errors contained herein or for incidental or

    consequential damages in connection with furnishing or use of this material. Contents of this publication may be preliminary and/or may be changed at any time without any obligation to notify

    anyone of such revision or change, and shall not be regarded as a warranty.

    Declaration of Conformity

    This product complies with the requirements of the European Council Electromagnetic Compatibility directive 2004/108/EEC and the Low Voltage Directive 2006/95/EEC.This equipment must not be modified for any reason and it must be installed as stated in the Manufacturer’s instruction.If this shipment (or any part thereof) is supplied as second-hand equipment, equipment for sale outside the European Economic Area or as spare parts for either a single unit or system, it is not covered by the Directives.

  • UNDERWRITERS LABORATORIES COMPLIANCE VERIFICATION SHEETP2000 or P2K SYSTEM

    Page 1 of 3

    This product is listed under Underwriters Laboratories UL 1076 for Proprietary Burglar Alarm Units and Systems. When installed at the site the following requirements must be met to comply with this standard.

    1. Transient protection devices that are installed must not be removed or defeated.2. The computers audible alarm indicator must not be disabled.3. All system components must be connected to a UL Listed Uninterruptible Power Supply that provides a

    minimum of 24 hours of AC emergency power.4. The maximum number of Panels that may be connected to the P2000 or P2K system is 1000.5. The P2000 or P2K shall give priority to signals in the order given below and shall annunciate subsequent

    signals at a rate no less than one every 10 seconds.Priority 0 Highest Priority Hold-up or Panic AlarmPriority 1 Second Highest Burglar AlarmPriority 2 Third Highest Burglar Alarm SupervisionPriority 3 Fourth Highest Other Supervisory AlarmsPriority 4 Fifth Highest Guard Tour

    6. The “Pop-up” feature for input points must be enabled.7. At the host computer (Central Station), alarms must not be filtered away from the host using the feature

    “Message Filtering”.8. Alarms must not be forwarded away from the host computer (Central Station) using the feature “Message

    Forwarding”.9. The “Panel Poll Interval” must not exceed 90 seconds.10. The “Host Poll Delay” must not exceed 200 seconds.11. P2000 or P2K server must use transient suppression devices on the LAN interfaces at the computers. The table

    below specifies the devices that must be used for the various types of LAN interfaces.

    LAN Interface Manufacturer of Device Device Part Number10Base-2 Black Box SP350A-R2 (In-line connector)10Base-2 Black Box SP501A (“T” connector)10Base-5 (AUI) Black Box SP36210/100Base-T Black Box SP512A-R3

    12. Systems requiring the use of a network hub, router and/or serial port server shall have that equipment installed in a temperature controlled environment. The temperature controlled environment must be maintained between 13 - 35°C (55 - 95°F) by the HVAC system. Twenty-four hour standby power shall be provided for the HVAC system.

    13. The installer shall incorporate a supply line transient suppression device complying with the Standard for Transient Voltage Surge Suppressors, UL 1449, with a maximum rating of 330 V. Supply line transient suppression device is to be used with the power supply to the network hub, router, serial port server, serial-to-ethernet converter and RS232-to-RS485 converter.

    14. The Hewlett Packard ML370 or ML350 serving as the P2000 or P2K host computer shall be installed in a temperature controlled environment. The temperature controlled environment must be maintained between 13 - 35°C (55 - 95°F) by the HVAC system. Twenty four hour standby power shall be provided for the HVAC system.

    15. The 240 Vac configurations have not been tested by Underwriters Laboratories except for the ML370 G3 and the ML350 G5.

    16. The workstation defined as “Server” must have the alarm monitor parameter set to “always active”.

  • UNDERWRITERS LABORATORIES COMPLIANCE VERIFICATION SHEETP2000 or P2K SYSTEM

    Page 2 of 3

    17. For P2000 or P2K software version 2.5 or later, when configuring “Service Startup” parameters the following services shall not be disabled.

    P2000 RTL Route ServiceP2000 CK720 Download ServiceP2000 CK720 Priority Service v1.0P2000 CK720 Priority Service v2.1P2000 CK720 Upload ServiceP2000 Periodic ServiceP2000 S321 SIO Handler ServiceP2000 S321-IP Interface ServiceP2000 SIO Handler ServiceP2000 Smart Download Service

    18. For Line Security over the Internet, between the P2000 or P2K server and the controllers CK705, CK720, CK721, CK721-A, and S321-IP the following equipment shall be used.

    NetScreen, Model NS-5XT-X0X (where X is any number 0 to 9), 4-Port VPN routerThe P2000 or P2K server and router shall be configured to use an encryption method including an Authentication Header (AH) and an algorithm capable of Triple-DES (3DES) or better that is NIST certified.

    19. For Line Security over the Internet, between the P2000 or P2K server and the controllers D620, D6AP, and S320, the following equipment shall be used.

    NetScreen, Model NS-5XT-X0X (where X is any number 0 to 9), 4-Port VPN router andDigi International, Model EtherLite2 serial port server

    The P2000 or P2K server and router shall be configured to use an encryption method including an Authentication Header (AH) and an algorithm capable of Triple-DES (3DES) or better that is NIST certified.

    20. For Line Security over the Internet, between the P2000 or P2K server and the controller S321-DIN, the following equipment shall be used.

    NetScreen, Model NS-5XT-X0X (where X is any number 0 to 9), 4-Port VPN router andDigi International, Model Digi One SP serial-to-ethernet converter orB&B Electronics Mfg Co., Model 485OT9L RS232-to-RS485 converter

    The P2000 or P2K server and router shall be configured to use an encryption method including an Authentication Header (AH) and an algorithm capable of Triple-DES (3DES) or better that is NIST certified.

    21. The router and serial port server shall be installed within the same room as the controllers S320, D620 and/or D6AP and within 20 feet of the controller when employed for encrypted line security.

    22. P2000 or P2K systems use the Digi International Model Digi One SP converter or B&B Electronics Model 485OT9L converter to communicate to S321-DIN controllers.

    23. The B&B Electronics Model 485OT9L converter shall be installed within the same room as the P2000 or P2K server and within 20 feet of the server under all conditions of use.

    24. The Digi International Model Digi One SP may be mounted at the central supervising station or the protected premise. When used at the central supervising station, a Cylix Model TSP-4B-E transient suppression device shall be used on the RS485 communication line. When used at the protected premise, a Blackbox Model RS512A-R3 transient suppression device shall be used on the LAN communication line.

    25. A spare router, serial port server, serial-to-ethernet converter and RS232-to-RS485 converter shall be available and put in to service within 6 minutes when they are employed for encrypted line security with the controllers CK705, CK720, CK721, CK721-A, S320, S321-DIN, S321-IP, D620 and/or D6AP.

  • UNDERWRITERS LABORATORIES COMPLIANCE VERIFICATION SHEETP2000 or P2K SYSTEM

    Page 3 of 3

    26. P2000 workstations, network hubs, routers, serial port servers, serial-to-ethernet converter and RS232-to-RS485 converters must use signal line transient suppression devices complying with the Standard for Protectors for Data Communications and Fire Alarm Circuits, UL 497B, with a maximum marked rating of 50V.

    27. Alarm signals received at a remote P2000 or P2K server via the Remote Message Services from a different P2000 or P2K server are supplementary.

    28. Alarm signals received at a P2000 workstation are supplementary.29. Alarm signals received at a personal computer or personal digital assistant through the Web Access feature are

    supplementary.30. P2000 or P2K systems use the PC232-S4-1 Protocol Converter to communicate to D620, D6AP and/or S320

    controllers; a controller must be connected to the port defined as Loop 1 at the P2000 or P2K for Protocol Converter’s tamper switch to report as an alarm.

    31. The communication medium between the protected property and communications service provider shall be for the exclusive use of the protected property and is not to be shared with other communications service provider subscriber.

    32. The following features have not been investigated by Underwriters Laboratories:BACNet interfaceDial-UpFire serverIntrusion serverIsonas interface

    33. The following products have not been investigated by Underwriters Laboratories and shall not be used in a listed system:

    P900 product lineOSI product lineAritech® intrusion panelNotifier fire alarm panel

    34. The P2000 or P2K and HID Edge access control unit may be used for access control monitoring purposes only.35. A Panel Down alarm message received at the central station may be an indication of a compromise attempt.36. For the S321-IP, the “Heartbeat Transmit Interval” must not exceed 90 seconds and the “Host Reception

    Timeout” must not exceed 200 seconds.

  • Table of Contents

    vii

    This document contai© 2010 Johnson Con

    Chapter 1: Introduction ..................................................................................................1Getting Started ........................................................................................................................1Chapter Summaries ................................................................................................................1Manual Conventions................................................................................................................2Basic System Components .....................................................................................................2Main Menu...............................................................................................................................5Registration Parameters..........................................................................................................5System Overview ....................................................................................................................6

    Basic Configuration ...........................................................................................................6Network Communication.............................................................................................6Loop Communication..................................................................................................6

    Communication Modes .....................................................................................................7Types of Communication ............................................................................................7

    Access Requests ..............................................................................................................8Time and Time Zones.................................................................................................8Valid or Invalid Badges ...............................................................................................8Badge Privileges.........................................................................................................8

    Controlling Special Access................................................................................................8Overriding Basic Access.............................................................................................9Granting Badge Privileges ..........................................................................................9

    Alarms...............................................................................................................................9External Device Alarms ..............................................................................................9Door Alarms................................................................................................................9Software-Only Alarms.................................................................................................9P2000 Host Alarms.....................................................................................................9Remote Alarms .........................................................................................................10

    Non-alarm Input Points ...................................................................................................10Output Relays .................................................................................................................10

    Input/Output Linking..................................................................................................10Activating Outputs by Events....................................................................................10Activating Outputs Manually .....................................................................................10

    Events .............................................................................................................................10Database Partitioning......................................................................................................10

    Logging On to the P2000 System Software ..........................................................................11Changing the Default Login Values.......................................................................................12Logging Out of the P2000 System Software .........................................................................13Navigating through the P2000 System..................................................................................13

    Mouse Conventions ........................................................................................................13

    24-10515-145 Rev. Ans confidential and proprietary information of Johnson Controls, Inc.trols, Inc.

  • viii TABLE OF CONTENTS

    24-10515-145 Rev. A

    Basic Window Components ............................................................................................14Instruction Conventions.........................................................................................................16

    Menu Shortcuts...............................................................................................................17Verification Passwords....................................................................................................17Context Sensitive Help....................................................................................................17Online Help .....................................................................................................................17P2000 Tutorial.................................................................................................................17Viewing the Toolbar ........................................................................................................18

    Chapter 2: Configuring the System.....................................................................19System Configuration Overview ............................................................................................19

    Using the System Configuration Window........................................................................19Set Up Workstations and Operators......................................................................................21

    Workstations ...................................................................................................................21Workstation Field Definitions ....................................................................................22

    Adding Operators to the System.....................................................................................23Creating Permission Groups.....................................................................................23Assigning Operators .................................................................................................25P2000 Directory Services Password Validation........................................................28Changing the User Password ...................................................................................29

    Setting Up User Accounts...............................................................................................30Adding a Login Name and Password for the P2000 System into the Operating System.....................................................................................................30

    Configure System Components ............................................................................................37Registration Parameters .................................................................................................38Site Parameters ..............................................................................................................39

    Site Parameters Field Definitions .............................................................................40Local Site ........................................................................................................................53Local Configuration .........................................................................................................54Time Zones .....................................................................................................................55

    Configuring Time Blocks...........................................................................................55Holiday Types ...........................................................................................................57

    Holiday ............................................................................................................................57Using the Holiday Calendar ......................................................................................58Assigning Holiday Types ..........................................................................................58

    Configure Hardware Components.........................................................................................59Hardware Configuration Sequence.................................................................................59Create Panels .................................................................................................................59

    Panel Naming Conventions ......................................................................................59Loop Configuration ...................................................................................................60Soft Input Points .......................................................................................................62Edit Panel Field Definitions.......................................................................................62

    Configure Panel Components.........................................................................................70Configure Panel Time Zones ....................................................................................71Configure Panel Holidays .........................................................................................72

    This document contains confidential and proprietary information of Johnson Controls, Inc. © 2010 Johnson Controls, Inc.

  • ix

    This document contai© 2010 Johnson Con

    Enable Codes (EC) Definition...................................................................................73Configure Air Crew PIN Numbers.............................................................................73Configure Panel Card Formats .................................................................................74Configure Additional Panel Components..................................................................75

    Create and Configure Terminals .....................................................................................75Set up Terminals for each Panel ..............................................................................75Edit Terminal Field Definitions ..................................................................................76Use the Add Hardware Module.................................................................................88Create Terminal Groups ...........................................................................................90

    Configure PIN Codes ......................................................................................................91PIN Only ...................................................................................................................91PIN + Card ID ...........................................................................................................92PIN............................................................................................................................92Four-Digit PINs .........................................................................................................93PIN Duress ...............................................................................................................93PIN Retry Alarm........................................................................................................93

    Create Input and Output Points and Groups...................................................................93Create Output Points and Groups ............................................................................93Create Input Points and Groups ...............................................................................95Create Input Points ...................................................................................................95Input Point Field Definitions ......................................................................................95Configuring Reader Terminal Hardwired Input Points ............................................101Using Reader Terminal Door Contact Input Points.................................................101Using the Terminal Down Input Point .....................................................................102Create Input Groups ...............................................................................................102Creating Instruction Text.........................................................................................103

    Create Panel Card Events ............................................................................................104Panel Card Event Field Definitions .........................................................................105

    Configure Soft Alarms...................................................................................................107Soft Alarms Field Definitions...................................................................................107

    Configure P900 Panels and Components.....................................................................108P900 to P2000 Terminology Cross Reference .......................................................108Import P900 Sequence Files ..................................................................................109Configure P900 System Parameters ......................................................................109Configure P900 Panels...........................................................................................110Configure P900 Terminals ......................................................................................112P900 Terminal Field Definitions..............................................................................113Configure P900 Input/Output Points .......................................................................117P900 Input Field Definitions....................................................................................117P900 Soft Alarms....................................................................................................119Configuring CLIC Components...............................................................................119P900 Counters........................................................................................................120P900 Flags..............................................................................................................120P900 Trigger Events ...............................................................................................121P900 Trigger Event Field Definitions ......................................................................122P900 Trigger Links..................................................................................................125

    24-10515-145 Rev. Ans confidential and proprietary information of Johnson Controls, Inc.trols, Inc.

  • x TABLE OF CONTENTS

    24-10515-145 Rev. A

    Configure OSI Panels and Components.......................................................................126Unsupported OSI Features.....................................................................................126Unsupported P2000 Features.................................................................................126System Architecture................................................................................................126Hardware Detection ................................................................................................127Badge Access Rights..............................................................................................127Configuration Sequence .........................................................................................128Configure OSI Facility Parameters .........................................................................128OSI Facility Field Definitions...................................................................................128Adding New Portals ................................................................................................132Configure OSI Panels .............................................................................................134Configure OSI Terminals ........................................................................................135OSI Terminal Field Definitions ................................................................................136Viewing OSI Wireless Devices Status ....................................................................138Rebuilding the WAMS Database ............................................................................138

    Configure S321-IP Panels and Components ................................................................139S321-IP Naming Conventions ................................................................................139Configure S321-IP Panels ......................................................................................139S321-IP Panel Field Definitions ..............................................................................140Configure S321-IP Terminals .................................................................................143S321-IP Terminal Field Definitions .........................................................................143Configure S321-IP Input Points ..............................................................................146S321-IP Input Point Field Definitions ......................................................................148Configure S321-IP Output Points ...........................................................................150

    Configure Isonas Panels and Components ..................................................................152Configure Isonas Panels.........................................................................................152Configure Isonas Terminals....................................................................................153Isonas Terminal Field Definitions............................................................................154Configure Isonas Input Points.................................................................................156Configure Isonas Output Points..............................................................................157

    Configure HID Panels and Components.......................................................................158Hardware Requirements.........................................................................................158HID Panel Naming Conventions .............................................................................159Configure HID Facility Parameters .........................................................................159Configure HID Panels .............................................................................................159HID Panel Field Definitions.....................................................................................160Configure HID Terminals ........................................................................................162HID Terminal Field Definitions ................................................................................163Configure HID Input Points .....................................................................................166HID Input Point Field Definitions.............................................................................167Configure HID Output Points ..................................................................................168Troubleshooting Misconfigured HID Readers.........................................................169

    P2000 Badge Format....................................................................................................170Configure Elevators and Cabinets.......................................................................................174

    Elevator Access Control................................................................................................174General Overview ...................................................................................................174

    This document contains confidential and proprietary information of Johnson Controls, Inc. © 2010 Johnson Controls, Inc.

  • xi

    This document contai© 2010 Johnson Con

    Basic Definitions .....................................................................................................175Low Level Interface.................................................................................................175High Level Interface (KONE HLI/KONE ELINK) .....................................................176High Level Interface (Otis EMS - Security / BMS Protocol) ....................................176High Level Interface (Otis Compass)......................................................................177Defining Floor Names .............................................................................................178Defining Floor Masks ..............................................................................................179Configuring Elevators .............................................................................................180Elevator Configuration Field Definitions..................................................................180Configuring Floors ..................................................................................................183Configuring Otis Unsecured Elevators....................................................................184Defining Floor Groups.............................................................................................185Creating Access Groups for Elevator Floors ..........................................................185

    Cabinet Access Control.................................................................................................185Defining Door Names .............................................................................................186Defining Door Masks ..............................................................................................187Configuring Cabinets ..............................................................................................187Cabinet Configuration Field Definitions ..................................................................187Configuring Doors...................................................................................................189Defining Door Groups .............................................................................................189Creating Access Groups for Cabinet Doors............................................................190

    Configure Message Filtering and Message Routing ...........................................................190Operators and Messages..............................................................................................190Basic Principles and Definitions ....................................................................................190Sequence of Steps........................................................................................................191Message Filtering..........................................................................................................191

    Create Message Filter Groups................................................................................198Message Routing ..........................................................................................................199

    Configuring P2000 Remote Servers .......................................................................199P2000 Remote Server Field Definitions..................................................................199

    Set up Access Groups and Cardholders .............................................................................201Create Access Groups..................................................................................................201Cardholder Options .......................................................................................................203

    Define Companies and Departments......................................................................203Create Access Templates.......................................................................................205Access Template Edit Field Definitions ..................................................................205Create Badge Purposes .........................................................................................206Create Badge Reasons ..........................................................................................207Create Required Cardholder Fields ........................................................................207Create User Defined Fields ....................................................................................208Entering Cardholders..............................................................................................209

    Chapter 3: Operating the System........................................................................211Providing Access to Cardholders and Visitors ....................................................................211

    Entering Cardholder Information...................................................................................212

    24-10515-145 Rev. Ans confidential and proprietary information of Johnson Controls, Inc.trols, Inc.

  • xii TABLE OF CONTENTS

    24-10515-145 Rev. A

    Viewing Cardholder Information .............................................................................212Cardholder Field Definitions ...................................................................................213Adding a Cardholder Image....................................................................................215Adding a Cardholder Journal ..................................................................................216User Defined Fields ................................................................................................217

    Entering Badge Information ..........................................................................................218Badge Field Definitions...........................................................................................219Viewing Badge Data ...............................................................................................225Bulk Badge Change................................................................................................226

    Entering Visitor Information...........................................................................................227Add Visitor Field Definitions....................................................................................228

    Auto Badge Management .............................................................................................230Badge Resync...............................................................................................................231Image Recall .................................................................................................................233

    Image Recall Filters ................................................................................................233Image Recall FS (Full Screen)......................................................................................234

    To Activate Image Recall FS: .................................................................................234Monitoring Alarms ...............................................................................................................236

    Alarm Configuration ......................................................................................................236Alarm Category.......................................................................................................236

    Alarm Handling .............................................................................................................237Monitoring Remote Alarms ...........................................................................................238

    Alarm Monitor Definitions........................................................................................239Alarm Response Field Definitions...........................................................................242

    Configuring Alarm Colors ..............................................................................................243Creating Predefined Alarm Response Text ..................................................................244Monitoring Alarms Using the SIA Interface ...................................................................245Message Forwarding ....................................................................................................247Fire Alarm Control .........................................................................................................248

    Basic Definitions .....................................................................................................248Basic Fire Alarm Components ................................................................................249Fire Alarm Server Configuration .............................................................................249Fire Alarm Configuration.........................................................................................250Fire Alarm Management .........................................................................................251Controlling Fire Alarm Components........................................................................251Viewing Fire Transactions Using the Real Time List ..............................................253Monitoring Fire Components Using the Real Time Map.........................................253Viewing and Controlling Fire Components Using the System Status Window .......253Fire Component Events ..........................................................................................253

    Operator Controls................................................................................................................254Controlling Doors ..........................................................................................................254Controlling Outputs .......................................................................................................255Controlling Panel Relays...............................................................................................256P900 CLIC Controls ......................................................................................................256

    To Manually Control a P900 Counter: ....................................................................256To Manually Control a P900 Flag: ..........................................................................257

    This document contains confidential and proprietary information of Johnson Controls, Inc. © 2010 Johnson Controls, Inc.

  • xiii

    This document contai© 2010 Johnson Con

    To Manually Control a P900 Trigger Event:............................................................257Security Threat Level Control........................................................................................258

    Defining Security Levels .........................................................................................258Applying Security Level ..........................................................................................259

    Input Point Suppression ................................................................................................260Controlling Areas and Muster Zones...................................................................................261

    Area Control ..................................................................................................................261Configuring the Area...............................................................................................261Controlling the Area ................................................................................................264Defining Area Filters ...............................................................................................266Displaying Area Details...........................................................................................266Area Details Field Definitions..................................................................................267Area Layout ............................................................................................................268Area Reports...........................................................................................................269

    Mustering ......................................................................................................................270Basic Definitions .....................................................................................................270Sequence of Steps .................................................................................................271Define Risk Areas and Muster Zones .....................................................................271Muster Zone Definition Fields .................................................................................272Defining Zone Terminals.........................................................................................275Defining Muster Terminals......................................................................................275Defining Sequester Terminals ................................................................................276Mustering Events ....................................................................................................277Controlling Muster Zones........................................................................................278Muster Zone Status and Control Field Definitions ..................................................278Viewing and Printing Muster Transactions in Real Time ........................................281Muster Reports .......................................................................................................281

    Intrusion Detection ..............................................................................................................282Basic Definitions............................................................................................................283Basic Intrusion Components .........................................................................................283Intrusion Configuration ..................................................................................................283

    Enabling the Intrusion Server .................................................................................284Intrusion Alarms ............................................................................................................284Intrusion Management ..................................................................................................285

    Controlling Intrusion Items Using the Intrusion Control Window.............................285Viewing Intrusion Transactions Using the Real Time List.......................................287Monitoring Intrusion Using the Real Time Map.......................................................287Viewing and Controlling Intrusion Items Using the System Status Window ...........287

    Intrusion Events ............................................................................................................288Hours On Site......................................................................................................................288

    Configuring Hours On Site Zones .................................................................................288Hours On Site Reporting ...............................................................................................289

    Hours On Site (Detail) Report.................................................................................290Hours On Site - Simple Report ...............................................................................291

    Creating Events...................................................................................................................291Using Event Configuration Dialog Boxes ......................................................................291

    24-10515-145 Rev. Ans confidential and proprietary information of Johnson Controls, Inc.trols, Inc.

  • xiv TABLE OF CONTENTS

    24-10515-145 Rev. A

    Creating Triggers ..........................................................................................................292Trigger Field Definitions..........................................................................................293

    Creating Actions............................................................................................................294Event Actions Field Definitions ...............................................................................295OPC Server Event Actions .....................................................................................295

    Counting Events............................................................................................................296Creating Manual Triggers .............................................................................................298

    Monitoring the System in Real Time ...................................................................................299Using the Real Time List ...............................................................................................299

    Monitoring Remote Messages in Real Time...........................................................299Viewing Real Time List Transactions......................................................................300To Display Color Coded Transactions: ...................................................................301

    Printing the Real Time List ............................................................................................302Using the Real Time Map .............................................................................................303

    Sub Maps and Attachments....................................................................................303Opening a Door ......................................................................................................305Activating Events from the Real Time Map.............................................................305

    Creating a Real Time Map ............................................................................................305Adding Map Attachments..............................................................................................308Duplicating Maps ..........................................................................................................309Adding Image Sets........................................................................................................309

    Chapter 4: Advanced Features .............................................................................311Partitions .............................................................................................................................311

    Partition Types ..............................................................................................................312Regular Partitions ...................................................................................................312The Super User Partition ........................................................................................312

    Creating Partitions ........................................................................................................313Video Imaging .....................................................................................................................313

    Video Imaging Specifications........................................................................................314Defining a Video Imaging Workstation..........................................................................314Printing a Badge ...........................................................................................................315

    Capturing the Portrait and Signature Images .........................................................315Viewing and Printing the Badge..............................................................................316

    MIS Interface .......................................................................................................................317MIS Prerequisites..........................................................................................................317Understanding the Input and Output Tables .................................................................318Partitioned Systems ......................................................................................................318Using the MIS Interface ................................................................................................318

    Metasys Integration (BACnet) .............................................................................................319Overview .......................................................................................................................319Theory of Operation ......................................................................................................319System Setup................................................................................................................321

    Setting Up BACnet Site Options .............................................................................321BACnet Site Field Definitions..................................................................................321

    This document contains confidential and proprietary information of Johnson Controls, Inc. © 2010 Johnson Controls, Inc.

  • xv

    This document contai© 2010 Johnson Con

    Setting Up External IPs...........................................................................................322Configuring Hardware Components for BACnet Interface......................................323Setting Up BACnet Action Interlocks ......................................................................323Action Interlock Operation ......................................................................................323

    M3/M5 Setup.................................................................................................................324Troubleshooting ............................................................................................................324

    Duplicate Object Name Errors ................................................................................324Msg Rejected Errors ...............................................................................................324Action Interlock Errors ............................................................................................325

    Metasys System Extended Architecture..............................................................................325Defining MSEA Graphics ..............................................................................................325Registering the P2000 Server with a Site Director........................................................326

    Guard Tour ..........................................................................................................................328Basic Principles and Definitions ....................................................................................328Sequence of Steps........................................................................................................329Defining System Hardware for Guard Tour Operation ..................................................329Assigning Tour Badges.................................................................................................329Configuring Guard Tours...............................................................................................330

    Using the Guard Tour Configuration Window .........................................................330Timezones, Start and Abort Times .........................................................................332Additional Guard Tour Options ...............................................................................333

    Adding Stations to the Guard Tour................................................................................334Tour Station Definition Fields..................................................................................335

    Controlling Guard Tours................................................................................................337Guard Tour Handling ..............................................................................................339Guard Tour Details .................................................................................................340Guard Tour Notes ...................................................................................................341

    Viewing and Printing Transactions in Real Time...........................................................341Guard Tour Reports ......................................................................................................342

    Tour Configuration Report ......................................................................................342Tour Transaction History Report.............................................................................342Tour Notes Report ..................................................................................................342

    CCTV...................................................................................................................................343Using P2000 functions with the CCTV Feature.............................................................344CCTV Configuration Overview......................................................................................344

    Points to Note .........................................................................................................345Using the CCTV/AV Configuration Window............................................................345

    Defining System Hardware for the CCTV Feature ........................................................346Namespace and Database .....................................................................................346Relationship Between the Namespace and Database ...........................................347CCTV Naming Conventions....................................................................................347Naming Items for the CCTV Server Namespace....................................................347Defining the Number of Namespace Items.............................................................348Number of Default Items Permitted ........................................................................348Changing the Number of Namespace Items...........................................................349Switch Protocols .....................................................................................................349

    24-10515-145 Rev. Ans confidential and proprietary information of Johnson Controls, Inc.trols, Inc.

  • xvi TABLE OF CONTENTS

    24-10515-145 Rev. A

    Tristate Check Boxes..............................................................................................349CCTV Components.......................................................................................................350CCTV Server.................................................................................................................351

    Create and Configure the CCTV Server .................................................................351Edit Server Field Definitions ...................................................................................352

    Switches........................................................................................................................352Create and Configure Switches ..............................................................................352Edit CCTV Switch Field Definitions.........................................................................353

    Alarms, Auxiliaries, Macros and Tours .........................................................................355Alarms.....................................................................................................................355Auxiliaries ...............................................................................................................355Macros ....................................................................................................................355Tours.......................................................................................................................355Edit CCTV Alarm, Auxiliary, Macro and Tour Field Definitions...............................356

    Monitors ........................................................................................................................356Create and Configure Monitors...............................................................................356Edit CCTV Monitor Tabs.........................................................................................357

    Sequences ....................................................................................................................358Edit CCTV Sequence Field Definitions ...................................................................359

    Cameras .......................................................................................................................359Create and Configure Cameras..............................................................................359Edit CCTV Camera Tabs ........................................................................................360

    Camera Auxiliaries, Patterns and Presets ....................................................................362Camera Auxiliaries..................................................................................................362Patterns ..................................................................................................................362Presets....................................................................................................................362Edit CCTV Named Camera Item Field Definitions..................................................363

    CCTV Control................................................................................................................363CCTV Standard Controls ..............................................................................................364

    Selecting the Item to Control ..................................................................................364Operating the Controls............................................................................................364Using Switch Controls.............................................................................................365Selecting a Switch ..................................................................................................365Selecting a Tour, Macro or Switch Auxiliary ...........................................................365Using Tour, Macro or Switch Auxiliary Controls .....................................................365Using the Monitor Controls .....................................................................................366Selecting a Monitor .................................................................................................366Selecting a Sequence.............................................................................................366Using Sequence Controls .......................................................................................366Using the Camera Controls ....................................................................................367Selecting a Camera ................................................................................................367Selecting a Pattern, Preset or Camera Auxiliary ....................................................367Using Pattern, Preset or Camera Auxiliary Controls...............................................367

    CCTV Event Actions .....................................................................................................368CCTV Event Action Field Definitions ......................................................................369

    CCTV Reports...............................................................................................................370

    This document contains confidential and proprietary information of Johnson Controls, Inc. © 2010 Johnson Controls, Inc.

  • xvii

    This document contai© 2010 Johnson Con

    CCTV Switch Report...............................................................................................370CCTV Monitor Report .............................................................................................370CCTV Camera Report ............................................................................................370CCTV Summary Report..........................................................................................370

    DVR.....................................................................................................................................370Redundancy ........................................................................................................................371FDA Part 11.........................................................................................................................371Intercom ..............................................................................................................................372

    Hardware Requirements ...............................................................................................372Intercom System Hardware Verification .................................................................373

    Intercom Configuration..................................................................................................373Intercom Exchange.................................................................................................373Intercom Stations....................................................................................................374

    Intercom Control............................................................................................................375Controlling Intercom Stations using the Real Time Map.........................................377

    Intercom Events ............................................................................................................377P2000 Enterprise.................................................................................................................378

    Enterprise Parameters ..................................................................................................379Assign Cardholders Enterprise Access.........................................................................380Define Global Badge Access Rights .............................................................................381

    Web Access ........................................................................................................................382Sequence of Steps........................................................................................................383Creating and Assigning Web Access Menu Permissions .............................................383Defining Web Access Options.......................................................................................384

    Web Access Options Field Definitions....................................................................384Defining Request Approvers .........................................................................................386Submitting Requests using Web Access ......................................................................389Web Access Functions..................................................................................................389

    Employee Services .................................................................................................389Guard Services .......................................................................................................390Management Services ............................................................................................390Visitor Management................................................................................................391Emergency Access Disable ....................................................................................392

    Processing Web Access Requests ...............................................................................392Visitor Request Management Field Definitions.......................................................394

    Customizing the Web Access Interface ........................................................................396Assigning Styles to Web Access Users ..................................................................396

    Web Access Smart Card Encoder Configuration ..........................................................397

    Chapter 5: System Maintenance..........................................................................401Downloading Data to Panels ...............................................................................................401Download Status .................................................................................................................402Smart Download Control .....................................................................................................403Controlling and Monitoring P2000 Services ........................................................................404

    Service Startup Configuration .......................................................................................404

    24-10515-145 Rev. Ans confidential and proprietary information of Johnson Controls, Inc.trols, Inc.

  • xviii TABLE OF CONTENTS

    24-10515-145 Rev. A

    P2000 Services Definitions.....................................................................................405Starting and Stopping Service Control ..........................................................................407Controlling Services through the Service Monitor .........................................................408

    Workstation Status ..............................................................................................................408Automatic Software Updates ........................................................................................409

    System Status .....................................................................................................................410Writing CK7xx Database to Flash Memory .........................................................................417Updating CK7xx Panels ......................................................................................................418Updating S321-DIN Panels .................................................................................................419Database Maintenance .......................................................................................................420

    Database Maintenance Actions ....................................................................................421Database Backup..........................................................................................................424

    Configuring a Backup Device .................................................................................424To Perform Manual Backups: .................................................................................425Advanced Backups .................................................................................................425Automatic Backups .................................................................................................426FDA Part 11 Backups .............................................................................................427

    Database Restore .........................................................................................................427System Validation .........................................................................................................429

    Request Queue View ..........................................................................................................430Searching Specific Requests ........................................................................................432Viewing Request Details ...............................................................................................433

    Chapter 6: System Reports .....................................................................................435Using P2000 Standard Reports...........................................................................................435P2000 Standard Report Definitions.....................................................................................438Selected Sample Reports....................................................................................................443

    Running the Alarm History Report ..........................................................................443Running the Cardholders - Preprocessed Report...................................................444Running the Cardholders without Badges Report ..................................................446Running the Panel Report ......................................................................................447Running the Transaction History Report.................................................................448

    Creating Custom Reports....................................................................................................449Creating a Custom Crystal Report for the P2000 System ............................................449

    Database Table Definitions.....................................................................................449To Import a Custom Crystal Report into the P2000 System:..................................449

    Editing a P2000 Standard Report in Crystal .................................................................450To Export an Existing Standard Report from the P2000 System:...........................450To Edit the P2000 Report in Crystal .......................................................................450

    Appendix A: Event Triggers/Actions................................................................453Trigger Types ......................................................................................................................453

    Category: Alarm ............................................................................................................453Category: Area..............................................................................................................454

    This document contains confidential and proprietary information of Johnson Controls, Inc. © 2010 Johnson Controls, Inc.

  • xix

    This document contai© 2010 Johnson Con

    Category: Audio-Visual .................................................................................................454Category: Audit .............................................................................................................454Category: Badge ...........................................................................................................455Category: Counter.........................................................................................................456Category: External Trigger ............................................................................................456Category: Fire Detector.................................................................................................456Category: Fire IO Module..............................................................................................457Category: Fire Panel .....................................................................................................457Category: Fire Zone ......................................................................................................457Category: Inputs............................................................................................................457Category: Intercom........................................................................................................458Category: Intrusion Annunciator....................................................................................458Category: Intrusion Area ...............................................................................................458Category: Intrusion Device............................................................................................459Category: Intrusion Zone...............................................................................................459Category: Mustering......................................................................................................460Category: Operator .......................................................................................................460Category: Outputs .........................................................................................................460Category: Panel ............................................................................................................461Category: Terminal........................................................................................................461Category: Time Zone ....................................................................................................462Category: Time/Date .....................................................................................................462

    Event Action Types .............................................................................................................462Category: Audio-Visual .................................................................................................462Category: BACnet .........................................................................................................463Category: Badge ...........................................................................................................463Category: CCTV............................................................................................................464Category: Download......................................................................................................464Category: Fire Detector.................................................................................................464Category: Fire IO Module..............................................................................................465Category: Fire Zone ......................................................................................................465Category: Host ..............................................................................................................465Category: Inputs............................................................................................................467Category: Intercom........................................................................................................467Category: Intrusion Annunciator....................................................................................468Category: Intrusion Area ...............................................................................................468Category: Intrusion Zone...............................................................................................468Category: Metasys Interlock..........................................................................................468Category: Mustering......................................................................................................468Category: OPC Server ..................................................................................................468Category: Outputs .........................................................................................................468Category: Panel ............................................................................................................468Category: Security Level ...............................................................................................469Category: Terminal........................................................................................................469

    24-10515-145 Rev. Ans confidential and proprietary information of Johnson Controls, Inc.trols, Inc.

  • xx TABLE OF CONTENTS

    24-10515-145 Rev. A

    Appendix B: Message Types and Sub-Types ............................................471

    Appendix C: Panel Comparison Matrix ..........................................................475

    Appendix D: CCTV Switch Protocols ...............................................................481Communications ...........................................................................................................481Camera Movement Actions...........................................................................................481Monitor Sequences .......................................................................................................482

    General ASCII Protocol .......................................................................................................482Commands Supported ..................................................................................................482

    American Dynamics ............................................................................................................483The American Dynamics Protocol.................................................................................483Supported CCTV Controls ............................................................................................483Supported CCTV Event Actions....................................................................................483Supported OPCWrite Event Actions .............................................................................484

    Autorepeat Actions .................................................................................................484Automatic Status Update Tags ...............................................................................484

    Maximum and Default Values .......................................................................................484BetaTech .............................................................................................................................485

    Switch Configuration .....................................................................................................485Keyboard 16 Commands ........................................................................................485

    The BetaTech Protocol .................................................................................................485Supported CCTV Controls ............................................................................................485Supported CCTV Event Actions....................................................................................485Supported OPCWrite Event Actions .............................................................................486

    Autorepeat Actions .................................................................................................486Automatic Status Update Tags ...............................................................................486

    Maximum and Default Values .......................................................................................486Geutebrück - GST Interface ................................................................................................487

    The Geutebrück Protocol ..............................................................................................487Supported CCTV Controls ............................................................................................487Supported CCTV Event Actions....................................................................................488Supported OPCWrite Event Actions .............................................................................488

    Macros ....................................................................................................................488Camera Auxiliaries..................................................................................................488Monitor Sequences.................................................................................................489Autorepeat Actions .................................................................................................489Automatic Status Update Tags ...............................................................................489

    Maximum and Default Values .......................................................................................489Panasonic............................................................................................................................490

    Switch Configuration .....................................................................................................490Panasonic SX850 Protocol ...........................................................................................490Supported CCTV Controls ............................................................................................490

    This document contains confidential and proprietary information of Johnson Controls, Inc. © 2010 Johnson Controls, Inc.

  • xxi

    This document contai© 2010 Johnson Con

    Supported CCTV Event Actions....................................................................................491Supported OPCWrite Event Actions .............................................................................491

    Camera Movement Commands..............................................................................491Autorepeat Actions .................................................................................................491Automatic Status Update Tags ...............................................................................491

    Maximum and Default Values .......................................................................................491Pelco ...................................................................................................................................492

    The Pelco 9760 Protocol...............................................................................................492Supported CCTV Controls ............................................................................................492Supported CCTV Event Actions....................................................................................493Supported OPCWrite Event Actions .............................................................................493

    Autorepeat Actions .................................................................................................493Automatic Status Update Tags ...............................................................................494

    Macro Programming......................................................................................................494Recording Patterns .......................................................................................................494Maximum and Default Values .......................................................................................494

    Philips Burle (Bosch) ...........................................................................................................495Switch Macros...............................................................................................................495The Philips Burle Protocol.............................................................................................495Supported CCTV Controls ............................................................................................496Supported CCTV Event Actions....................................................................................496Supported OPCWrite Event Actions .............................................................................496

    Autorepeat Actions .................................................................................................496Automati