AXSalert

Transcription

AXSalert
AXSalert
User Guide
Building Automation
Management System
2005
AXSalert
DE6323U (REV. 3, 03/2005)
VT UK (Visonic Technologies UK: Fraser Road, Priority Business Park, Bedford MK44 3WH ENGLAND.
Tel: 44-870-730-0840 Fax: 44-870-730-0839
Internet: www.visonictech.com
 VisonicTechnologies
Visonic Technologies: 30 Habarzel St. Tel Aviv 69710 ISRAEL
Tel: 972 3 768 1400 Fax: 972 3 768 1415
Technical Support Email: [email protected]
VTA (Visonic Technologies Americas): 65 West Dudley Town Road, Bloomfield CT. 06002-1911.
Tel: (860) 243-0833, (800) 223-0020 Fax: (860) 242-8094
Email: [email protected]
Contact Information
Should you have any questions regarding our services, please feel free to contact us directly or visit
our Internet home page or contact our local distributors.
Web: http://www.visonictech.com
Visonic Technologies Ltd.
30 Habarzel St.
Tel-Aviv 69710 ISRAEL
Tel: 972 - 3 - 768 1400
Fax: 972 - 3 - 768 1415
[email protected]
VT UK (Visonic Technologies UK
Fraser Road, Priority Business Park
Bedford MK44 3WH
ENGLAND.
Tel: 44-870-730-0840
Fax: 44-870-730-0839
VTA (Visonic Technologies Americas)
65 West Dudley Town Road
Bloomfield CT. 06002-1911.
Tel: (860) 243-0833, (800) 223-0020
Fax: (860) 242-8094
[email protected]
Copyright and Warranty _________________________________________________________i
© Copyright 2005 by VisonicTechnologies Ltd., 30 Habarzel Street, Tel-Aviv 69710, ISRAEL. All Rights
Reserved.
No part of this publication may be reproduced or distributed in any form or by any means, electronic or
mechanical, for any purpose, without the express written permission of VisonicTechnologies Ltd.
TRADEMARKS
VisonicTechnologies, AXSalert, AXS-100 are registered trademarks of VisonicTechnologies Ltd.
Microsoft is a registered trademark of Microsoft Corp.
All other products or services referred to in this manual are the trademarks, service marks, or product
names of their respective holders.
DISCLAIMER: The information, products and specifications, configurations, and other technical
information regarding the products contained in this manual are subject to change without notice. All the
statements, technical information, and recommendations contained in this manual are believed to be
accurate and reliable but are presented without warranty of any kind, and users must take full responsibility
for the application of any products specified in this manual.
IN NO EVENT SHALL VISONICTECHNOLOGIES OR ITS SUPPLIERS BE LIABLE FOR ANY
INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR
INABILITY TO USE THIS MANUAL, EVEN IF VISONICTECHNOLOGIES HAS BEEN ADVISED
OF THE POSSIBILITY OF SUCH DAMAGES.
WARRANTY
VisonicTechnologies Ltd. and/or its subsidiaries and its affiliates ("the Manufacturer") warrants its products
hereinafter referred to as "the Product" or "Products" to be in conformance with its own plans and
specifications and to be free of defects in materials and workmanship under normal use and service for a
period of 12 months from the date of shipment by the Manufacturer. The Manufacturer's obligations shall
be limited within the warranty period, at its option, to repair or replace the product or any part thereof.
This warranty does not apply in the following cases: improper installation, misuse, failure to follow
installation and operating instructions, alteration, abuse, accident or tampering.
This warranty is exclusive and expressly in lieu of all other warranties, obligations or liabilities, whether
written, oral, express or implied, including any warranty of merchantability or fitness for a particular
purpose, or otherwise. In no case shall the Manufacturer be liable to anyone for any consequential or
incidental damages for breach of this warranty or any other warranties whatsoever, as aforesaid.
This warranty shall not be modified, varied or extended, and the Manufacturer does not authorize any
person to act on its behalf in the modification, variation or extension of this warranty. This warranty shall
apply to the Product only. All products, accessories or attachments of others used in conjunction with the
Product, including batteries, shall be covered solely by their own warranty, if any.
The Manufacturer shall not be liable for any damage or loss whatsoever, whether directly, indirectly,
incidentally, consequentially or otherwise, caused by the malfunction of the Product due to products,
accessories, or attachments of others, including batteries, used in conjunction with the Products.
The Manufacturer does not represent that its Product may not be compromised and/or circumvented, or that
the Product will prevent any death, personal and/or bodily injury and/or damage to property resulting from
unauthorized entry, burglary, robbery, or otherwise, or that the Product will in all cases provide adequate
warning or protection. User understands that a properly installed and maintained access control system may
only reduce the risk of unauthorized entry without warning, but it is not insurance or a guarantee that such
will not occur or that there will be no death, personal damage and/or damage to property as a result.
ii_________________________________________________________ Copyright and Warranty
The Manufacturer shall have no liability for any death, personal and/or bodily injury and/or damage
to property or other loss whether direct, indirect, incidental, consequential or otherwise, based on a
claim that the Product failed to function. However, if the Manufacturer is held liable, whether directly or
indirectly, for any loss or damage arising under this limited warranty or otherwise, regardless of cause or
origin, the Manufacturer's maximum liability shall not in any case exceed the purchase price of the Product,
which shall be fixed as liquidated damages and not as a penalty, and shall be the complete and exclusive
remedy against the Manufacturer.
Contents ____________________________________________________________________ iii
CONTENTS
Copyright and Warranty....................................................................................................................... i
SOFTWARE LICENSE AGREEMENT ........................................................................................... ix
LIMITED WARRANTY AND LIMITATION OF LIABILITY...................................................... x
PREFACE............................................................................................................................................. xi
About This Manual ................................................................................................................................ xi
Who Should Use this Manual ................................................................................................................ xi
Document Conventions......................................................................................................................... xii
About VisonicTechnologies ................................................................................................................... xii
Available Access Control Software Products ...................................................................................... xiii
CHAPTER 1 INTRODUCTION TO AXSALERT......................................................................... 1-1
1.1 System Overview ........................................................................................................................... 1-1
1.2 AXSalert Application..................................................................................................................... 1-1
1.2.1 RDR-PXT .............................................................................................................................. 1-3
1.2.2 Door Configurations .............................................................................................................. 1-3
1.2.3 Additional System Features ................................................................................................... 1-4
1.3 Multi-Site Edition .......................................................................................................................... 1-4
1.3.1 Site Properties........................................................................................................................ 1-5
1.3.2 Phone/IP Number Rules ........................................................................................................ 1-5
CHAPTER 2 AXSALERT INSTALLATION ................................................................................. 2-1
2.1 General ........................................................................................................................................... 2-1
2.2 PC Requirements............................................................................................................................ 2-1
2.3 Software Installation ...................................................................................................................... 2-2
CHAPTER 3 INITIAL ACCESS TO AXSALERT SOFTWARE................................................. 3-1
3.1 General ........................................................................................................................................... 3-1
3.2 Initial Entry with VisonicTechnologies supplied............................................................................ 3-1
3.3 Changing the Initial Password ....................................................................................................... 3-4
CHAPTER 4 AXSALERT BASICS ................................................................................................. 4-1
4.1 Application Concept ...................................................................................................................... 4-1
4.2 Menu Bar ....................................................................................................................................... 4-2
4.2.1 File ......................................................................................................................................... 4-2
4.2.1.1 Login ........................................................................................................................... 4-2
4.2.1.2 Logout ......................................................................................................................... 4-2
4.2.1.3 Exit .............................................................................................................................. 4-2
4.2.2 View ...................................................................................................................................... 4-2
4.2.2.1 Toolbar ........................................................................................................................4-2
4.2.2.2 Status Bar .................................................................................................................... 4-2
4.2.2.3 Maps............................................................................................................................ 4-2
4.2.2.4 User Trace ................................................................................................................... 4-2
4.2.2.5 Status ........................................................................................................................... 4-3
4.2.2.6 Counters ...................................................................................................................... 4-3
4.2.2.7 Monitors ...................................................................................................................... 4-3
4.2.2.8 Doors Control.............................................................................................................. 4-3
iv ____________________________________________________________________ Contents
4.2.3 Setup ...................................................................................................................................... 4-3
4.2.3.1 Options ........................................................................................................................ 4-3
4.2.3.2 Access Levels.............................................................................................................. 4-3
4.2.3.3 Holidays ......................................................................................................................4-3
4.2.3.4 Time Zones.................................................................................................................. 4-3
4.2.3.5 Users............................................................................................................................ 4-4
4.2.3.6 Doors ........................................................................................................................... 4-4
4.2.3.7 Privileges..................................................................................................................... 4-4
4.2.3.8 Events Setup................................................................................................................ 4-4
4.2.3.9 Multi-computer ........................................................................................................... 4-4
4.2.4 Operation ............................................................................................................................... 4-4
4.2.4.1 Upload / Download ..................................................................................................... 4-4
4.2.4.2 Backup / Restore ......................................................................................................... 4-4
4.2.4.3 Map Generator ............................................................................................................ 4-4
4.2.4.4 Reports ........................................................................................................................ 4-4
4.2.5 Help ....................................................................................................................................... 4-5
4.2.5.1 Help ............................................................................................................................. 4-5
4.2.5.2 Register .......................................................................................................................4-5
4.2.5.3 About AXSalert........................................................................................................... 4-5
4.3 Main Toolbar.................................................................................................................................. 4-5
4.4 Setup Toolbars ............................................................................................................................... 4-6
4.5 Customizing Window .................................................................................................................... 4-7
4.5.1 Scroll Bars ............................................................................................................................. 4-7
4.5.2 Changing Column Width....................................................................................................... 4-7
4.5.3 Sorting Users (Ascending / Descending)............................................................................... 4-8
4.5.4 Color Coding Events.............................................................................................................. 4-8
4.5.5 Color Coding Key Holders .................................................................................................... 4-8
CHAPTER 5 SETUP ......................................................................................................................... 5-1
5.1 General ........................................................................................................................................... 5-1
5.2 Preparations.................................................................................................................................... 5-1
5.3 Setting Up Computer Serial Ports .................................................................................................. 5-2
5.4 Doors Setup ................................................................................................................................... 5-3
5.5 Holidays Setup ............................................................................................................................... 5-5
5.6 Time Zones Setup .......................................................................................................................... 5-6
5.7 Access Levels................................................................................................................................. 5-7
5.8 Events Setup................................................................................................................................. 5-10
5.9 Enrolling New Keys and Users .................................................................................................... 5-11
5.9.1 Enrolling a New Key ........................................................................................................... 5-12
5.10 Assigning Privileges .................................................................................................................. 5-13
5.11 Download Procedure.................................................................................................................. 5-15
5.12 Multi-computer Setup ................................................................................................................ 5-16
CHAPTER 6 OPERATING AXSALERT ...................................................................................... 6-1
6.1 Viewing Events .............................................................................................................................. 6-1
6.1.1 Color-coding Events .............................................................................................................. 6-3
6.1.2 Event Reports ........................................................................................................................ 6-4
6.1.2.1 One-time Only Reports ............................................................................................... 6-4
Contents ____________________________________________________________________ v
6.1.3 Report Templates................................................................................................................... 6-5
6.1.4 Printing and Saving Reports .................................................................................................. 6-7
6.2 Viewing and Managing User Keys ................................................................................................ 6-8
6.2.1 User Data Description............................................................................................................ 6-8
6.2.2 Color-coding Key Holders................................................................................................... 6-10
6.2.3 User Properties..................................................................................................................... 6-11
6.2.3.1 Access Button............................................................................................................ 6-11
6.2.3.2 Picture Button............................................................................................................ 6-13
6.2.4 User Trace............................................................................................................................ 6-15
6.2.5 Creating a Report of Users................................................................................................... 6-16
6.2.5.1 General Report .......................................................................................................... 6-17
6.2.5.2 Time and Attendance Report..................................................................................... 6-17
6.2.5.3 Unused Key Report ................................................................................................... 6-19
6.2.5.4 Expired Key Report................................................................................................................ 6-19
6.2.5.5 By Door Report...................................................................................................................... 6-20
6.2.5.6 Generating a Report ............................................................................................................... 6-21
6.2.6 Report Templates, Printing and Saving .............................................................................. 6-21
6.2.7 Modifying User Data ........................................................................................................... 6-22
6.2.8 Deleting a User .................................................................................................................... 6-22
6.2.9 Adding a New User ............................................................................................................. 6-23
6.2.10 Downloading Users ........................................................................................................... 6-23
6.3 Backup / Restore .......................................................................................................................... 6-25
6.3.1 Backup ................................................................................................................................. 6-25
6.3.2 Restore ................................................................................................................................. 6-26
6.4 Door Reports ................................................................................................................................ 6-27
6.5 Holidays Reports.......................................................................................................................... 6-28
6.6 Time Zones Reports ..................................................................................................................... 6-28
6.7 Upload \ Download ...................................................................................................................... 6-29
6.7.1 Upload Procedure ................................................................................................................ 6-30
6.8 Map Generator ............................................................................................................................. 6-31
6.8.1 Opening the Map Generator Application............................................................................. 6-31
6.8.2 Preparing and Retrieving a Map Background...................................................................... 6-31
6.8.3 Toolbox of Objects .............................................................................................................. 6-32
6.8.4 Placing, Sizing and Rotating Objects .................................................................................. 6-33
6.8.5 Adding Captions .................................................................................................................. 6-34
6.8.6 Activating the Map .............................................................................................................. 6-35
6.8.7 Viewing Events with the Map ............................................................................................. 6-36
6.8.8 Right-Click Mouse Functions.............................................................................................. 6-37
6.8.9 Doors Control ...................................................................................................................... 6-38
CHAPTER 7 ADVANCED FEATURES ......................................................................................... 7-1
7.1 Monitors......................................................................................................................................... 7-1
7.2 Status.............................................................................................................................................. 7-2
7.3 Counters ......................................................................................................................................... 7-3
7.4 Setup Options................................................................................................................................. 7-4
7.4.1 Controller Tab ............................................................................................................................. 7-4
7.4.2 Advanced Tab ............................................................................................................................. 7-6
vi ____________________________________________________________________ Contents
7.4.3 Extended Tab .............................................................................................................................. 7-8
7.4.4 Software Tab ............................................................................................................................... 7-9
7.4.5 Communication Tab.................................................................................................................. 7-10
CHAPTER 8 TROUBLESHOOTING ............................................................................................. 8-1
8.1 Controller Not Responding ............................................................................................................ 8-1
CHAPTER 9 FREQUENTLY ASKED QUESTIONS (FAQ) ....................................................... 9-1
GLOSSARY.......................................................................................................................................G-1
APPENDIX List of Events................................................................................................................ A-1
Contents ___________________________________________________________________ vii
LIST OF FIGURES
FIGURE 1 Typical AXS-100 System ................................................................................................. 1-2
FIGURE 2 Possible AXS-100 Door Configurations .......................................................................... 1-3
FIGURE 3 Site Manager for AXSalert Window ................................................................................ 1-4
FIGURE 4 Site Properties Window .................................................................................................... 1-5
FIGURE 5 Splash Window.................................................................................................................3-2
FIGURE 6 Password Window ............................................................................................................ 3-2
FIGURE 7 Initial AXSalert User Window ......................................................................................... 3-3
FIGURE 8 Users Window .................................................................................................................. 3-4
FIGURE 9 User Properties Window................................................................................................... 3-5
FIGURE 10 Adding the First User ..................................................................................................... 3-6
FIGURE 11 Privileges Window ......................................................................................................... 3-6
FIGURE 12 Privilege Level Window ................................................................................................. 3-7
FIGURE 13 Online Register Window ................................................................................................ 4-5
FIGURE 14 About AXSalert Window with Version Information...................................................... 4-5
FIGURE 15 Customizing the Users Window ..................................................................................... 4-8
FIGURE 16 Setup Options - Communication Tab ............................................................................. 5-2
FIGURE 17 Doors Window................................................................................................................ 5-3
FIGURE 18 Holidays Window ........................................................................................................... 5-5
FIGURE 19 Time Zones Window ...................................................................................................... 5-7
FIGURE 20 Access Levels Window .................................................................................................. 5-8
FIGURE 21 Door Groups Window .................................................................................................... 5-8
FIGURE 22 Doors .............................................................................................................................. 5-9
FIGURE 23 Access Levels Window- Completed............................................................................. 5-10
FIGURE 24 Color Palette ................................................................................................................. 5-10
FIGURE 25 Events Messages Displayed with Color........................................................................ 5-11
FIGURE 26 User Properties Window after Key Enrolled ................................................................ 5-12
FIGURE 27 Completed User Properties Window ............................................................................ 5-13
FIGURE 28 Privileges Window ....................................................................................................... 5-14
FIGURE 29 Upload/Download Window .......................................................................................... 5-15
FIGURE 30 Multi-computer Configuration Window....................................................................... 5-16
FIGURE 31 Multi-computer Configuration Window – Server......................................................... 5-17
FIGURE 32 Multi-computer Configuration Window – Clients........................................................ 5-18
FIGURE 33 Events Window............................................................................................................... 6-2
FIGURE 34 Acknowledging Color-coded Events .............................................................................. 6-3
FIGURE 35 Events Report Criteria .................................................................................................... 6-4
FIGURE 36 Events Report ................................................................................................................. 6-5
FIGURE 37 Template Name Window................................................................................................ 6-6
FIGURE 38 Existing Templates Window........................................................................................... 6-6
FIGURE 39 Print and Save As Buttons .............................................................................................. 6-7
FIGURE 40 Users Window ................................................................................................................ 6-8
FIGURE 41 User Properties Window............................................................................................... 6-11
FIGURE 42 User Properties Window - Access Button .................................................................... 6-12
FIGURE 43 Doors Window - Personal Access Level ...................................................................... 6-12
FIGURE 44 Users Window with New Personal Access Level......................................................... 6-13
FIGURE 45 Picture Import Button ................................................................................................... 6-14
viii ___________________________________________________________________ Contents
FIGURE 46 Imported Picture ........................................................................................................... 6-14
FIGURE 47 User Trace Window...................................................................................................... 6-15
FIGURE 48 Users Report Criteria Window ..................................................................................... 6-17
FIGURE 49 Time and Attendance Report ........................................................................................ 6-18
FIGURE 50 Unused Key Report ...................................................................................................... 6-19
FIGURE 51 Expired Key Report ...................................................................................................... 6-20
FIGURE 52 By Door Report ............................................................................................................ 6-21
FIGURE 53 Typical Users Report ................................................................................................... 6-21
FIGURE 54 Delete Users Window ................................................................................................... 6-22
FIGURE 55 Download Users Window - Before Download ............................................................. 6-23
FIGURE 56 Download in Progress Window .................................................................................... 6-24
FIGURE 57 Completion Message .................................................................................................... 6-24
FIGURE 58 Backup / Restore Window ............................................................................................ 6-25
FIGURE 59 Backup Confirm Message............................................................................................. 6-25
FIGURE 60 Backup Folder .............................................................................................................. 6-26
FIGURE 61 Restore Caution Message ............................................................................................. 6-26
FIGURE 62 Door Report .................................................................................................................. 6-27
FIGURE 63 Holidays Report............................................................................................................ 6-28
FIGURE 64 Time Zones Report ....................................................................................................... 6-29
FIGURE 65 Upload/Download Window .......................................................................................... 6-30
FIGURE 66 Map Generator - Opening Window .............................................................................. 6-31
FIGURE 67 Basic Map Background ................................................................................................ 6-32
FIGURE 68 Objects Toolbox ........................................................................................................... 6-32
FIGURE 69 Map with Placed Objects .............................................................................................. 6-33
FIGURE 70 Design Properties Window ........................................................................................... 6-34
FIGURE 71 Map after Adding Captions .......................................................................................... 6-34
FIGURE 72 Design Properties Window with Door Options ............................................................ 6-35
FIGURE 73 Maps Window............................................................................................................... 6-36
FIGURE 74 Map Right-click Mouse Functions ............................................................................... 6-37
FIGURE 75 Doors Control Window ................................................................................................ 6-38
FIGURE 76 Monitors Window........................................................................................................... 7-1
FIGURE 77 Counters Window ........................................................................................................... 7-3
FIGURE 78 Setup, Options - Controller Tab...................................................................................... 7-4
FIGURE 79 Setup, Options - Advanced Tab...................................................................................... 7-6
FIGURE 80 Setup, Options - Extended Tab....................................................................................... 7-8
FIGURE 81 Setup, Options - Software Tab........................................................................................ 7-9
FIGURE 82 Communication Failure Message ................................................................................... 8-1
Software Licensee Agreement ___________________________________________________ ix
SOFTWARE LICENSE AGREEMENT
This is a legal agreement between you (either an individual or an entity) and Visonic Technologies. By
opening the sealed software package and/or by using the software you agree to be bound by the terms
of this Agreement. If you do not agree to the terms of this Agreement, promptly return the disk
package and accompanying items (including printed materials and binders or other containers) to the
place you obtained them for a full refund.
VISONIC TECHNOLOGIES SOFTWARE LICENSE
GRANT OF LICENSE. This Visonic Technologies License Agreement (“LICENSE”) permits you to
use one copy of the specified version of the software product identified above which may include user
documentation provided in “online” or electronic form (“SOFTWARE”), on any single computer,
provided the SOFTWARE is in use on only one computer at any time. If this package is a License
Pack, you may make and use additional copies of the SOFTWARE up to the number of Licensed
Copies authorized above. If you have multiple Licenses for the SOFTWARE, then at any time you
may have as many copies of the SOFTWARE in use as you have Licenses. The SOFTWARE is "in
use" on a computer when it is loaded into the temporary memory (i.e. RAM) or installed into the
permanent memory (e.g. hard disk, CD-ROM or other storage device) of that computer except that a
copy installed on a network server for the sole purpose of distribution to other computers is not "in
use." If the anticipated number of users of the SOFTWARE will exceed the number of applicable
Licenses then you must have a reasonable mechanism or process in place to ensure that the number of
persons using the SOFTWARE concurrently does not exceed the number of Licenses.
COPYRIGHT. The SOFTWARE (including any images, photographs. animations. video, audio,
music, and text incorporated into the SOFTWARE) is owned by Visonic Technologies or its suppliers
and is protected by United States copyright laws and international treaty provisions. Therefore, you
must treat the SOFTWARE like any other copyrighted material (e.g., a book or musical recording)
except that you may either (a) make one copy of the SOFTWARE solely for backup or archival
purposes, or (b) transfer the SOFTWARE to a single hard disk provided you keep the original solely
for backup or archival purposes. You may not copy the printed materials accompanying the
SOFTWARE nor print copies of any user documentation provided in "online" or electronic form
without a written permission from Visonic Technologies.
OTHER RESTRICTIONS. This License is your proof of license to exercise the rights granted herein
and must be retained by you. You may not rent or lease the SOFTWARE, but you may transfer your
rights under this License on a permanent basis provided you transfer this License the SOFTWARE
and all accompanying printed materials, retain no copies, and the recipient agrees to the terms of this
License.
You may not reverse engineer, decompile, or disassemble the SOFTWARE except to the extent that
the foregoing restriction is expressly prohibited by applicable law.
x__________________________________________ Limited Warranty and Limitation of Liability
LIMITED WARRANTY AND LIMITATION OF LIABILITY
DISCLAIMER. Visonic Technologies, AND ANYONE ELSE INVOLVED IN THE CREATION
PRODUCTION DELIVERY OR INSTALLATION OF THE SOFTWARE AND
DOCUMENTATION, CANNOT AND DO NOT WARRANT THE PERFORMANCE OR
RESULTS THAT MAY BE OBTAINED BY USING THE SOFTWARE. THE SOFTWARE IS
PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND (EXCEPT AS DESCRIBED
BELOW), EITHER EXPRESSED OR IMPLIED. THIS INCLUDES, BUT IS NOT LIMITED TO,
ANY WARRANTY OF PERFORMANCE OR ANY IMPLIED WARRANTY OF
MERCHANTABILITY
OR
FITNESS
FOR
A
PARTICULAR
PURPOSE.
VISONICTECHNOLOGIES DOES NOT WARRANT THE PRODUCT WILL MEET YOUR
REQUIREMENTS OR THAT ITS OPERATION WILL BE UNINTERRUPTED OR ERROR FREE.
LIMITED WARRANTY. Visonic Technologies warrants that the CD-ROM on which the
SOFTWARE is recorded is free from defects in material and workmanship under normal operation
and service for a period of ninety (90) days from the date you first obtained the SOFTWARE. This
warranty extends only to you, the original customer and may not be transferred. This warranty is
exclusive and in lieu of all others oral or written. expressed or implied. Statements or representation
which add to, extend, or modify this warranty are unauthorized by Visonic Technologies and should
not be relied upon by you. Visonic Technologies reserves the right to change the specifications and
operating characteristics of the SOFTWARE it produces over a period of time, without notice.
EXCLUSIVE REMEDY. Your sole and exclusive remedy in the event of a defective diskette is
either, replacement of the diskette or refund of reseller's purchase price, at Visonic Technologies' sole
discretion. To obtain warranty service you must return the defective diskette, postage prepaid, together
with your mailing address, telephone number and proof of the date you obtained the SOFTWARE, to
Visonic Technologies or its local representative. If Visonic Technologies determines the diskette has
been damaged by accident, abuse or misuse, or if the Visonic Technologies’ label or serial number has
been removed or defaced, the limited warranty set forth above does not apply, and you accept full
responsibility for the SOFTWARE.
LIMITATION OF LIABILITY. In no event, whether as a result of breach of contract, warranty, tort
(including negligence), strict tort or otherwise, will Visonic Technologies or anyone else involved in
the creation, production, delivery or installation of the SOFTWARE be liable to you or any third party
for special, incidental or consequential damages arising out of the use or inability to use the
SOFTWARE or due to the contents of the SOFTWARE even if Visonic Technologies has been
advised of the possibility of such damages.
Preface _____________________________________________________________________ xi
Preface
About This Manual
Thank you for choosing the Visonic Technologies AXSalert, Building Automation Management
System for your access control needs. We have made every effort to provide a quality product and
have subjected AXSalert to extensive testing and quality control procedures prior to release. It is
assumed that AXSalert will be installed on a PC and will operate a system of Visonic Technologies
AXS-100 controllers.
Chapter 1 provides an introduction to the software and presents alternative site and multi-site
configurations in which the AXSalert can be implemented.
Chapter 2 lists the PC requirements and how to install the AXSalert software.
Chapter 3 covers initial access to AXSalert including entry of the initial password.
Chapter 4 covers AXSalert basics. Activating the program, application concept, Menu Bar, Toolbar
and user customizing options are described.
Chapter 5 covers AXSalert setup. All the steps involved in setup are covered including serial ports,
doors, holidays, Time Zones, events, users, system privileges.
Chapter 6 describes AXSalert operation on a daily basis, including managing users (adding new users
and modifying or deleting old users), printing reports, etc.
Chapter 7 describes the AXSalert tools available for fine tuning communications equipment and is
intended for technical personnel.
Chapter 8 provides troubleshooting and maintenance instructions.
Chapter 9 provides answers to frequently asked questions.
Appendix A provides a list of AXSalert data and its relationship with the AXS-100 controller.
Appendix B provides the AXS-100 specifications for local parameters.
Appendix C provides a list of system events.
At the end of the manual, a glossary of frequently-used terms is provided.
Who Should Use this Manual
This manual is intended for all user levels. Such personnel may be security or administrative personnel
who have to monitor access or generate access reports from the PC. Technical personnel who usually
perform activities from the controller in the field will find AXSalert very useful and time saving.
xii _____________________________________________________________________ Preface
Document Conventions
Visonic Technologies emphasizes the importance of carefully following all procedures described in
this guide to prevent personal injury or damage to the equipment and to insure maximum efficiency
and machine life.
The user should pay careful attention to sections that contain the following conventions:
Recommended activity.
;
i
Preliminary installation activity.
Important information. Read carefully.
About Visonic Technologies
Visonic Technologies., a member of the Visonic Group, develops and produces access control
products for the commercial market, using mainly RFID technology. Visonic Technologies products
are branded under Visonic Technologies and other OEM names.
The professional expertise of Visonic Ltd., a leading company in quality security systems and
components for more than 25 years, and the practical experience of Visonic Technologies engineers and
employees merge to create top-of-the-line access control products and systems.
Preface ____________________________________________________________________ xiii
Available Access Control Software Products
Name
1
2
3
4
5
Software
Product
Cat. No.
AXSalert-100/3
AXSalert-100
AXSalert-100/1
AXSalert-100/2
AXSalert-100M
3-6323-4
3-6323-0
3-6323-1
3-6323-2
3-6323-3
6 AXSalert
UPD32
7 AXSalert
UPD64
8 AXSalert UPS5
9 AXSalert
UPS10
10 AXSalert Client
3-6323-5
3-6323-6
3-6323-7
3-6323-8
3-6323-9
Doors/Sites
number
16 doors
32 doors
128 doors
256 doors
1 site, 16
doors
Add 32
doors
Add 64
doors
Add 5 sites
Add 10
sites
No limit
Function
Recommended
Desktop
Reader
AXS-100 access control system management
software
RDR-PXT
Multi-Site version of the AXSalert. Basic
configuration single site (16 doors)
Increase number of doors for AXSalert100/1/2/3
Increase number of sites for AXSalert-100M
AXSalert-100 client software (Multi-computer
configuration) for AXSalert-100/1/2/3
All software products are protected by an HASP plug.
Optional, on
request
Supplied as a
standard
HASP-4 USB M1
Protection Plug
(USB port)
HASP-4 M1
Protection Plug
(Parallel port)
AXSalert Software Key
In order to make the AXSalert running, you
need to connect the HASP key to the
parallel port (printer port) in the back of the
computer. Otherwise AXSalert would run in
demo mode only.
None
Introduction to AXSalert ______________________________________________________ 1-1
CHAPTER 1
Introduction to AXSalert
This chapter includes a short description of the AXS-100 system and the advantages of operating the
system with the PC application, AXSalert. Other useful literature includes the AXS-100 User Guide,
which describes controller programming and operation, and the AXS-100 Installation Guide.
1.1 System Overview
The AXS-100 controller is fitted into a wall-mounted metal cabinet. One controller unit can manage
up to two reader devices, each of which provides access to one door. Eight controllers can be
networked together to control a total of 16 doors.
The system’s proximity readers are based on advanced RFID technology. Each user is assigned a
unique encoded proximity key. When a valid proximity key card or tag is presented to the reader,
which is located outside the protected area, the controller relay activates a magnetic lock or an
electromagnetic strike (EMS) that releases the door.
A single card can be conveniently programmed to open any combination of doors on the system. If a
card is lost or stolen, it can easily be deleted from the system, and a new one can be issued.
The AXS-100 controller can also operate with a single door with two readers to form an anti-passback
configuration. In this configuration, the door lock will not open again for the same card unless the
reader has read the card at the exit reader on the other side of the door.
1.2 AXSalert Application
AXSalert is a software module that is compatible with Visonic Technologies AXS-100 hardware.
AXSalert enables full management of the access control system from a PC. It is not necessary to send
a technician into the field to perform current activities such as adding or deleting keys (users).
Activities, which previously had to be performed from the keypad and LCD at the site controller box,
can now be performed from a PC in the comfort of the central office.
1-2 _______________________________________________________ Introduction to AXSalert
The following diagram shows a typical configuration: a PC is connected to a series of controllers, each
with two door readers.
RS
-4
85
2
23
SR
Controller # 1
5
48
SR
Up To 8
Controllers
Controller # 2
5
-48
RS
Controller # 3
Figure 1. Typical AXS-100 System
All data including system events and key holder information are displayed on-screen and can be
viewed, modified, sorted and printed. The user at the security center can observe and monitor unusual
events recorded at remote doors and locks. A new feature enables the display of the archived picture
of the key holder who accesses the facility including personal data.
Introduction to AXSalert ______________________________________________________ 1-3
AXSalert can operate over TCP/IP to enable remote management of doors and access. AXSalert can
manage up to 1,500 doors, so it is appropriate for large installations. A multi-computer capability
enables supervision of facility access from different computers in a client-server configuration. Thus,
different departments can supervise access to their own sites.
In addition to online operation, AXSalert can be used offline to analyze, process and print entry data
and reports. Modifications to existing key holder data and new key holder data can also be input while
in the offline mode and downloaded later to the AXS-100 controllers.
1.2.1 RDR-PXT
The RDR-PXT is a desktop proximity reader that is designed for use with a VisonicTechnologies
AXS-100 system. It enables quick and convenient enrollment of proximity keys when using AXSalert.
The reader connects to the computer's RS-232 COM port.
RF
RS-232
9-PIN connector
DB-9 (female)
Coded
RF
ADP BOX
Proximity tag/card
AXS-100
AC adaptor
Input: 230VAC 50Hz
Output: 9VDC 3VA
(Europe)
(for the US version,
see above)
1.2.2 Door Configurations
As mentioned above, each AXS-100 controller can control one or two door locks in one of several
configurations. AXSalert can manage any combination of those features.
The diagram below shows these possible combinations for a single controller:
Single door
Single door with two readers
Two doors, each with one reader
Figure 2. Possible AXS-100 Door Configurations
1-4 _______________________________________________________ Introduction to AXSalert
1.2.3 Additional System Features
The system allows a key holder to be assigned one or two Time Zones (or work shifts). A maximum
of 64 Time Zones can be set to enable a variety of work schedules within a single organization.
Additional features include:
•
Four types of holidays can be set. Holidays (national, religious, etc.) are special days on which
a certain worker category is not allowed to enter the facility, whereas others can enter the
facility without triggering an unusual system event.
•
Real-time recording and display of system events on the computer.
•
Reports on key holders, doors and events can be sent to a local or network printer.
•
The system operator can program a specific unlock duration (in seconds) for each door.
•
Doors can be unlocked automatically according to pre-defined time schedules.
•
Events (some or all) can be defined as alarm events on the PC and can be presented as colorcoded event messages on the PC’s screen, when they occur.
1.3 Multi-Site Edition
The Multi-Site version of the AXSalert software enables the user to operate the software
with multiple databases; separate database for each site. The following applies:
•
A site is one loop of AXS-100 controllers (up to 8 controllers, 16 doors).
•
Each site may me connected to the computer via an RS-232, modem or LAN.
•
The software handles one site at a time.
After selecting a site the database of the site and all its parameters are loaded, and the site
is automatically connected.
Figure 3. Site Manager for AXSalert Window
Introduction to AXSalert ______________________________________________________ 1-5
Buttons from left to right:
1. Add new site – opens and empty Site Properties dialog window.
2. Delete an existing site – deletes the database and all parameters of the selected site. A
confirmation is required.
3. Properties – opens the Site Properties dialog window with the properties of the
selected site.
4. Connect – activates the selected site.
5. Settings – opens the Com-port settings.
6. Exit – exit from the AXSalert software.
1.3.1 Site Properties
The Site Properties dialog window is opened after pressing the "Add" or "Site properties"
button.
Figure 4. Site Properties Window
For each site the following parameters should be entered:
1. Name – any combination of characters (mandatory)
2. Details – free text description (optional).
3. Connection – selects the connection type for this site. Three options are available:
Modem, Local, and IP.
4. Phone Number/IP Address – depends on the previous selection of connection type
(see rules below)
1.3.2 Phone/IP Number Rules
Modem Connection –while connection is Modem, a telephone number should be entered.
The characters allowed in the telephone number are:
•
The digits 0..9.
•
The characters “w” for “wait for dial-tone”.
•
The character “,”for delay of 0.2 Sec.
•
The character “-“.
1-6 _______________________________________________________ Introduction to AXSalert
TCP/IP Connection – for IP connection the IP address should be in the format of:
aaa.aaa.aaa.aaa:PPP
Where aaa is the IP number and the PPP is the port number. Example: 62.0.18.233:3000
It is also possible to enter DHCP domain instead of the IP address. Example:
LocalHost:4000
Local Connection – in this type of connection, the application will try to connect to the
controller using the Com-Port of the computer. No number is required in this option.
AXSalert Installation _________________________________________________________ 2-1
CHAPTER 2
AXSalert Installation
2.1 General
This chapter describes how to install AXSalert.
The following subjects are covered:
•
PC and network requirements
•
Software installation
2.2 PC Requirements
I
Operating system
Windows 98, Windows NT or Windows 2000
Processor
Client: Pentium II or higher; Server: Pentium IV
Memory
Client: 64 MB RAM; Recommended: 128 MB RAM
Server: 256 MB
Available hard disk
space
20 GB
Graphics
VGA graphical accelerator, 16-bit or higher
Communication
Multi-serial RS-232 card (for direct communication) or network
card for LAN
Network protocol:
TCP/IP
Output
Printer
Support software
PC-Anywhere (optional for remote service and technical support)
Note: AXSalert uses the Microsoft Access database. Any application that can view
and/or change Microsoft Access database files can be used externally (outside AXSalert)
to view and/or change AXSalert data.
2-2 __________________________________________________________ AXSalert Installation
2.3 Software Installation
To install the software, do the following:
1. Place the CD in its drive and close.
2. Auto Run will automatically start the installation process. If manual installation is needed,
choose Start, Run and Browse to select the CD drive. Click the Setup icon.
3. AXSalert installation will begin.
4. Follow the instructions.
5. Generally, all you will have to do is click Next or Yes.
6. As a default, AXSalert is installed in drive C under Program Files\VisonicTechnologies
\AXSalert.
7. You may choose any drive or folder to install the software by clicking the Browse button. If
the selected folder does not exist, a message to confirm its creation will be displayed.
8. Take care to select a location with sufficient free disk space to contain the installation files and
the database that will be built up over time. The software itself is only 6 MB. However, the
database files with user information and event history can reach 1 GB. In addition, by default,
files will be installed into the Windows system directory. Verify that the Windows system
drive contains enough free space.
9. After determining the installation drive and folder, click Next to continue.
10. Confirm selection of the default AXSalert folder. (Alternatively, you may select any folder, as
mentioned).
11. Click Next to continue.
12. A progress bar will appear. In a few seconds, the AXSalert software will be installed.
13. When the Setup Complete window appears, verify that the Yes button is active.
14. Click Finish and drag the icon to the desktop so you can have it available at all times to quick
start the AXSalert application.
Initial Access to AXSalert Software ______________________________________________ 3-1
CHAPTER 3
Initial Access to AXSalert Software
3.1 General
This chapter describes:
•
First-time entry into the AXSalert application after installation.
•
Changing the initial password.
•
Logout.
3.2 Initial Entry with VisonicTechnologies
supplied Password
i
Note: It is necessary to call Visonic Technologies Software Support to obtain the
initial one-time only password. After using this “temporary” password to enter the
system, the password should be changed to a permanent password, which will then
be used to perform system setup and routine activities. The steps below should be
performed while on the telephone with a Visonic Technologies support person.
From the desktop, double-click the AXSalert icon or select Start>Programs>
>VisonicTechnologies > AXSalert and run the axsalert.exe file.
3-2 _______________________________________________Initial Access to AXSalert Software
The AXSalert splash screen appears:
Figure 5. Splash Window
Shortly afterward, the Password Window appears:
Figure 6. Password Window
In the User Name field, type in “admin” using lowercase letters.
Click the Login button.
i
Not e: The Events button is intended for read-only access to the AXSalert software
and does not require a password.
Initial Access to AXSalert Software ______________________________________________ 3-3
The following window appears:
Figure 7. Initial AXSalert User Window
Welcome to the AXSalert software.
3-4 _______________________________________________Initial Access to AXSalert Software
3.3 Changing the Initial Password
i
Not e: It is necessary to change the initial password and to define a user with system
administrator privilege (Admin), i.e., with full access privileges to the AXSalert
system. Later on (section 4.2.3.7), other users with different access privileges will be
defined.
From the Menu Bar, select Setup, Users, or click the Users button on the Icon Bar.
The following window appears:
Figure 8. Users Window
Click the New Users icon (+). The User Properties window appears.
Fill in the details of the user. Of special importance are the first and last names, which are used by the
system as the “user name” for system login purposes. The first and last names are case sensitive.
i
Note: If a PC reader is connected to the system, and the user has a key card, pass the
key card through the reader. The key and pin code fields will be automatically filled in.
Initial Access to AXSalert Software ______________________________________________ 3-5
Refer to the window below:
Key and
pin code
First and
last
names
Master
Access
Level
Status
Figure 9. User Properties Window
Details of the first user have been filled in.
Choose “Master” from the combo drop-down box. This setting will provide the key holder with access
to the site twenty-four-hours-a-day, for setup purposes. Later, it can be changed.
Note that “Not downloaded” is displayed in the Status field. This means that the recorded data has not
yet been downloaded to the controller. Downloading will be automatically performed when the OK
button is clicked. Section 5.11 discusses downloading in greater detail.
Click OK to continue. You are returned to the Users window. The details of the new user have been
added to the window.
3-6 _______________________________________________Initial Access to AXSalert Software
Refer to the window below:
Figure 10. Adding the First User
From the Menu Bar, select Setup, Privileges. The following window appears:
Figure 11. Privileges Window
Initial Access to AXSalert Software ______________________________________________ 3-7
From the Privileges window, click the Add user privilege (+) icon.
Note that the user name is already recorded in the Name field (if not, click on the name field). Select
the user privilege from the drop-down box (Events Only, Events & Users, All, Admin). This first user
must have “Admin” privilege to perform subsequent setup activities. The significance of the different
types of privilege (event only, user and events, all, admin) are discussed in section 5.10.
Types of
privilege
Figure 12. Privilege Level Window
Fill in the new password, and confirm the password by re-typing it in the Re-type Password field.
Click Set Password.
The first user has been entered. This user can now define other system users, and it is no longer
necessary to use the one-time-only password.
AXSalert Basics_____________________________________________________________ 4-1
CHAPTER 4
AXSalert Basics
This chapter provides an overview of the AXSalert software. The following topics are discussed:
•
Application concept
•
Activating the program
•
Menu Bar
•
Toolbar
•
Customizing AXSalert windows
4.1 Application Concept
AXSalert provides a wide range of tools and flexibility for PC management of a fully equipped access
system having many controllers and readers. AXSalert has the capability to supervise up to 1,500
doors, and it can be used in a client-server configuration so that different departments can supervise
access to their own sites.
All activities that previously could only be performed from a controller by using key sequences can
now be performed at the office desktop using the familiar Microsoft Windows graphic environment.
In addition, procedures for adding, deleting, and modifying keys, which are time-consuming tasks
when performed from a controller, can now be performed from the PC using a desktop reader that
connects to the PC.
An additional advantage is that using a relatively small number of windows, security personnel can
view and manage up to 5000 key holders and their authorization to enter a restricted area. The flexible
array of parameters includes split work shifts, holidays, specific doors. The archived picture of the key
holder can even be displayed on-screen together with personal data.
Unauthorized entry and other unusual system events are recorded by AXSalert and can be viewed
from the PC. The record of these events includes the user name and ID, the event description, time,
date, reader (door) and door name. A wide range of reports can be generated including sorting
according user, doors, dates, etc. Report templates of event parameters can be saved to facilitate
generating future reports. Reports can be saved as a spreadsheet file and hard copy printed.
All these features combine to provide a powerful tool for managing access to an organization’s
sensitive facilities.
4-2 _____________________________________________________________ AXSalert Basics
4.2 Menu Bar
4.2.1 File
4.2.1.1 Login
Activates the Password window. This function is useful if the user had logged in with a lower
privilege (e.g., as for read-only purposes), and the system must now be used for performing a higher
level privilege (e.g., system maintenance to changing a user’s properties). Clicking File, Login from
the Menu Bar opens the Login window. Enter the user name and password to login. In this manner,
privilege can be changed without having to exit to Microsoft Windows and re-enter the system
4.2.1.2 Logout
Logs out of the system and returns the software to read-only status. This function is useful if login was
performed for a higher level function and the system must now be returned to a lower level function.
4.2.1.3 Exit
Exits the AXSalert software and returns to Windows.
4.2.2 View
4.2.2.1 Toolbar
When this item is marked, the Toolbar is active. When this item is unmarked, the Toolbar is not
displayed on the desktop. Not marking the Toolbar provides more screen space for viewing database
events.
4.2.2.2 Status Bar
When this item is marked, the Status Bar is active. When this item is unmarked, the Status Bar is not
displayed on the desktop. Not marking the Status Bar can provide more screen space for viewing
database events.
4.2.2.3 Maps
Opens a window with a list of maps. Refer to section 6.8.7.
4.2.2.4 User Trace
Popup of the users pictures when the user key is presented. Refer to section 6.2.4.
AXSalert Basics_____________________________________________________________ 4-3
4.2.2.5 Status
Activates the Status window. This window shows the status of the controllers in real-time. Refer to
section 7.2.
4.2.2.6 Counters
Activates the Counters window. The Counters window counts the total number of entries and total
number of exits and displays the difference between the two amounts. This feature is useful for
parking lot applications, for example, where it is necessary to know how many parking spaces are still
available at the site. Refer to section 7.3.
4.2.2.7 Monitors
Opens a window showing the current serial communication activity of the controller and/or reader.
Refer to section 7.1.
4.2.2.8 Doors Control
Provides the capability for user such as security guard or secretary to open up to for specific doors
from a client PC. Refer to section 6.8.9.
4.2.3 Setup
4.2.3.1 Options
Activates the Setup window for performing setup and fine-tuning communication settings. Refer to
section 7.4.
4.2.3.2 Access Levels
Activates the Access Levels window. Refer to section 5.7.
4.2.3.3 Holidays
Activates the Holidays window. Setting up holidays is covered in section 5.5 and printing holiday
reports in 6.5.
4.2.3.4 Time Zones
Activates the Time Zones window for determining the different work “shifts” during which users are
allowed to enter or exit the doors for which they have been given access rights. Setting up Time Zones
is covered in section 5.6 and printing Time Zones reports in 6.6.
4.2.3.5 Users
Activates the Users window for setting up new uses or modifying existing users. Setting up Users is
covered in section 5.9 and viewing and managing users in 6.2.
4-4 _____________________________________________________________ AXSalert Basics
4.2.3.6 Doors
Activates the Doors window. Setting up Doors is covered in section 5.4 and printing Doors reports in
6.4.
4.2.3.7 Privileges
Activates the Privileges window for setting up the privilege level of new users or modifying users’
existing privilege level. Refer to 5.10.
4.2.3.8 Events Setup
Activates the Events window. Setting up Events is covered in section 5.8 and managing events
including color-coding and printing reports in section 6.1.
4.2.3.9 Multi-computer
Enables implementing a client-server configuration over TCP/IP to enable different departments to
supervise access to their own facilities. Refer to section 5.12.
4.2.4 Operation
4.2.4.1 Upload / Download
Enables transferring events data and other system data (keys, Time Zones, holidays, doors) from the
controller to the PC and vice versa. For the download procedure, refer to section 5.11. For the upload
procedure, refer to section 6.7.1.
4.2.4.2 Backup / Restore
Enables performing AXSalert file backup and restoring backed up files. Refer to section 6.3.
4.2.4.3 Map Generator
Allows the user to create/build synoptic maps. Refer to section 6.8.
4.2.4.4 Reports
Opens the Event report criteria window to generate event reports (refer to section 6.1.2).
4.2.5 Help
4.2.5.1 Help
Provides access to AXSalert Help.
AXSalert Basics_____________________________________________________________ 4-5
4.2.5.2 Register
Opens the Register window for online registration or upgrading AXSalert software.
Figure 13 Online Register Window
4.2.5.3 About AXSalert
Provides version information. This window is useful when contacting Visonic networks support
personnel for technical assistance in order to identify the current version of the AXSalert software.
Figure 14 About AXSalert Window with Version Information
4.3 Main Toolbar
The Main Toolbar provides access to frequently used functions at the click of a mouse. The icons on
the Main Toolbar become active only after login to the system. Otherwise, the icons will be
inaccessible to the user.
The available icons are detailed in the next table.
AXSalert Basics_____________________________________________________________ 4-1
Icon
Name
Users
Description
Section
Management of users (adding, modifying, 5.9 and
deleting), downloading to the controller and 6.2
generating reports.
Maps
Enables activating the map function for 6.8.7
viewing the location of system events.
User Trace Displays the personal details of the last person 6.2.4
entering the facility including his picture if this
feature is implemented or of the user
responsible for a highlighted past event.
Backup/
Enables performing backup of AXSalert data. 6.3
Restore
Upload/
Download
Reports
Enables transferring all user data and system
setup data (keys, Time Zones, holidays, doors)
from the controller to the PC and vice versa.
Enables generating a wide variety of event
reports.
5.11 and
6.7
6.1.2 to
6.1.4
4.4 Setup Toolbars
In AXSalert application, a consistent set of icon controls is used to enable the user to utilize easily
similar functions in different windows such as the Access Levels, Holidays, Time Zones, Users,
Doors, as Privileges windows. Of course, only the relevant icons are displayed in a specific window.
These icons are described below:
Add
Adds a new record.
Delete
Deletes the highlighted record.
Delete All
Deletes all records from the window.
Make
Report
Makes a report. In some windows a standard window is
automatically generated. In other windows, a secondary
window opens that enables selecting report parameters.
4-2 _____________________________________________________________ AXSalert Basics
Download
Downloads the highlighted record.
Download
All
Downloads all records in the window.
Time Zones Opens the Time Zones window from the Access Levels
window.
User
Properties
Opens the User Properties window from the Users
window.
Doors
Opens the Doors window from the Access Levels
window.
Door
Groups
Opens the Doors Groups window from the Access Levels
window.
Exit
Exists the current window and returns to the previous
window.
4.5 Customizing Window
The displayed columns of the AXSalert database, especially that of the Event and User windows, may
exceed the actual visible screen area. The displayed width depends on the width of the data within the
fields and/or the titles of the columns. AXSalert provides tools to customize the display of records.
4.5.1 Scroll Bars
All database columns or rows can be viewed by sliding the horizontal or vertical scroll bar, as
required. However, since this can become quite tedious, it is possible to reduce the space between
columns. Refer to the following two sections.
4.5.2 Changing Column Width
When the mouse cursor is placed over the dividing line between column names and held down, a
double-arrow symbol will appear. Dragging the mouse leftward or rightward will decrease or increase
column width. Refer to Figure 15.
AXSalert Basics_____________________________________________________________ 4-3
3. Double-click
a column to sort
2. Drag line to
increase / decrease
column width
1. Move cursor
between columns
Figure 15. Customizing the Users Window
4.5.3 Sorting Users (Ascending / Descending)
Users can be sorted by double clicking on the column title of the data in the user window. The sort
function is a toggle so that a column can be sorted in ascending or descending order depending on how
many times the column title is clicked. Refer to Figure 15.
4.5.4 Color Coding Events
The events that are displayed in the Events window can be color-coded. Refer to section 6.1.1.
4.5.5 Color Coding Key Holders
The key holders who are displayed in the Users window can be color coded so that they can be easily
locate (useful for types of users). Refer to section 6.2.2.
Setup _____________________________________________________________________ 5-1
CHAPTER 5
Setup
5.1 General
This chapter describes how to set up the AXSalert software including defining ports on the PC.
;
Typically, these steps will be performed after the hardware infrastructure (controllers and
readers) have been installed and the RDR-PXT reader (for reading keys) has been
physically connected to the computer.
The following subjects are covered in this chapter:
Preparations
Events
Setting up computer ports
Enrolling new keys and users
Doors setup
Assigning privileges
Holidays setup
Downloading settings
Time zones setup
Multi-computer setup
Access Levels
Inputs setup
Recommended: Setup should be performed in the order indicated.
5.2 Preparations
Before beginning AXSalert setup on the PC, it is absolutely necessary to know how the organization
functions in terms of work shifts and which personnel have access to what facilities (doors), including
on holidays. This is not a trivial matter!
Ask yourself the following questions: How many shifts do company personnel work? Which days
does each employee work? What facilities or doors are accessible to each employee? On which
holidays are certain employees likely to work and others not likely to work? Even in an organization
with only several dozen workers, this could be a complicated task if homework is not done first.
Recommended: A company official or committee with appropriate authority should be
vested with the responsibility of gathering and organizing this important setup
information. Company officials responsible for initial setup of the system should
conduct appropriate discussions with all the company personnel involved: security
personnel, human resources, computer administrators, and technical (hardware)
personnel.
5-2 _____________________________________________________________________ Setup
A correct picture of the organization and its workers should be formulated and written
down. All workers should be allocated Time Zones (for example, from 08:00AM to
04:30PM) for their appropriate work shifts and their normal and holiday schedules
(AXSalert can easily handle split shifts).
Persons with the appropriate authority should be readily available during setup time. System
administration, technical personnel and managers will be involved in setting the passwords
(determining who can access the system from the PC or controllers in the field), defining the correct
COM ports, etc.
The other topics (Doors, Holidays and Time Zones) involve familiarity with the organization’s
operation and are more properly within the responsibility of the Human Resources or Security
Departments.
5.3 Setting Up Computer Serial Ports
For an initial installation, COM Ports should be set up first so that the RDR-PXT reader will be
available for enrolling keys.
To setup computer ports, do the following:
•
Click Setup, Options. The Setup window opens.
•
Click the Communication Tab.
•
Click the Auto detect ports button. Refer to the following window:
Figure 16. Setup Options - Communication Tab
Setup _____________________________________________________________________ 5-3
•
In this example, the AXS-100 controller, through which communication is implemented with
remote doors, is connected to port 1 and the RDR-Reader for inputting keys is connected to
port 3. If the ports have not been correctly identified, then use the Add port and Remove port
buttons to modify port settings as necessary.
•
Enter the IP address in the IP port field for network communication, and click Write.
5.4 Doors Setup
Doors are numbered from 1 to 16 (the maximum number of readers that can be attached in one loop of
8 AXS-100 controllers). The Door window lists the maximum number of doors including the door
name, description, unlock duration, etc. of each door.
Click Setup, Doors from the Menu Bar. A window similar to the following appears:
Download
current lock
Download
new data to
controller
Shrinks a
nameless
lock
Generate
a report
Scroll
rightward to
view all the
columns
Figure 17. Doors Window
Each data entry field is explained in the table below. Data is entered by clicking on the table cell and
entering the data into the cell.
Generally, doors are given mnemonic names so the user can easily identify the location or the group of
employees that use them. It is not necessary to “save” modifications to the door data. Once entered,
the system automatically saves the newly entered data when another table row is clicked (for entering
data to that row, for example) or when the exiting the window is clicked or after clicking the
Download button to send the data to the controller.
5-4 _____________________________________________________________________ Setup
Title
Description
Door Name
Generic title of the door.
Loop
Each group of 8 AXS-100 controllers consists of one loop.
Reader
The sequential number of the reader within the loop.
Time Zone
Time zone is used to apply specific functions to a door during the indicated Time
Zone. Select a Time Zone from the predefined Time Zones, or 0 for no Time Zone.
Then, apply a Time Zone Function (see below).
Time zone
function
To activate Time Zone Function options, a Time Zone must first be entered in the
Time Zone field. When clicking in the Time Zone Function, the symbol is
displayed, and one of the following functions can be selected for this door:
Auto Open: Door is automatically unlocked during the selected Time Zone (for
example, an internal door that should remain open during work hours).
First Valid Tag: Door is automatically unlocked during the selected Time Zone,
starting ONLY after first valid tag presentation (for example, a building entrance
door that should remain open in the appropriate Time Zone after the first person has
entered). The door will be automatically locked at the end of the scheduled period.
Ignore Door Ajar: Allows the door to be left opened during the specified Time
Zone, regardless of the door ajar settings.
Prevent Entry: Entry and exit is permitted only with a Master Key.
Master Exit: Door entry with a Master Key is permitted once but no exits from this
door are permitted. The assumption is that exits will be performed through other
doors.
Master Only: Do not open a lock for any tag which is not a master tag. Exit is not
allowed.
If a door is not associated with any Time Zone, (Time Zone “0”), the Auto Open
and First Valid Tag functions are not applicable and ‘Disabled’ is automatically set.
Unlock
duration
Door unlock duration, 1 - 2370 sec. (39.5 min.), default 5 sec. whenever a valid tag
is presented. The time can be changed by highlighting the desired field and entering
the new duration.
Unlock toggle
When double clicking the cell, a check mark is displayed and a value of “0” (sec.) is
displayed in the “Unlock duration” column. This means that when a key is presented
to the reader, the door remains unlocked until a new key is represented to it.
Request to
exit (RTE)
polarity
Request to Exit input device (push-button or PIR detector). Double click on the cell
to toggle between N.O. (normally open) and N.C. (normally closed).
Door position
polarity
Door Position input device type. Double click to toggle between N.O. and N.C.
Door position
function
Door Position input Enabled/Disabled. Double click on the cell to toggle between
DP (Door Position) and Reader enabled.
Door ajar
timeout
Duration (in seconds) of the time the door (not the lock!) is allowed to be open. The
time can be changed by highlighting the desired field and entering the new period.
Setup _____________________________________________________________________ 5-5
5.5 Holidays Setup
Each day of the year can be defined as a regular workday or as one of four holiday types. The holiday
definitions are used in the Time Zones Setup (section 5.6) to prohibit access to certain key holders
during these holiday types. (Saturday and Sunday are not considered holidays since they are included
in the days of the week definition). Each holiday must have a type (1, 2, 3 or 4) assigned to it.
Examples of holiday types may be national holidays, company recreation days, religious holidays, etc.
i
Note: Although there are only four types of holidays, many holidays can be grouped under
a single type. For example, a group of holidays such as Christmas Day, New Year’s Day,
and Easter can be assigned the same type number. Workers that are associated with these
holidays will not be permitted entrance into the facility on these days.
To Set Types and Names for the Holidays, do the following:
• Click Setup, Holidays from the Menu Bar. A window similar to the following appears:
Click to download the
Add
Delete
Holidays table to the controller
holiday(s) holiday(s)
Click to return
to the main
window
Holidays
grouped as H1
Religious Holidays
grouped as H2
Up to 4
types of
holidays
possible
Figure 18. Holidays Window
i
Not e: AXSalert uses the Windows system’s date format (selected by Start > Settings >
Control Panel > Regional Settings > Date > Short date style. When defining a new
holiday’s date, do not set the year. Holiday dates that change from year-to-year must be
reset each year.
5-6 _____________________________________________________________________ Setup
5.6 Time Zones Setup
When this window is opened for the first time, a general “default” Time Zone is appears in the first
Time Zone. This Time Zone is set for the hours 00.00 to 23:59. This setting is intended to enable
system operation even before all the user Time Zones are set. Fifteen Time Zones are the maximum
number that can be set.
When Time Zones are set up, information about the “general” operation of the organization is entered.
For example, a company may work split shifts and a non-split shift at the same time. Each shift must
be entered separately and is a separate Time Zone. A split shift can be defined as a single Time Zone.
Figure 19 shows typical company work shifts and how they are represented in the Time Zones
window. In a typical set of shifts, there may be day, evening and early morning shifts (Time Zone 2, 3,
and 4). In addition, some workers may work a split shift (Time Zone 7). Some personnel may have
access only for a couple of hours during the day (Time Zone 6). Senior personnel may have access 24hours a day (Time Zone 5). Day drivers (Time Zone 8) and night drivers (Time Zone 9) have separate
Time Zones.
To set Time Zones, do the following:
•
Click Setup, Time Zones from the Menu Bar, or click the Time Zones button on the Toolbar. A
window similar to the following appears:
•
In the title field, enter relevant names for each Time Zone such as “morning shift”, evening shift”,
etc.
•
Set the time range for each Time Zone by clicking on the appropriate “From” and “To” cell. The
format is HH:MM. AXSalert automatically adds a colon (“:”) between the hours and minutes.
•
Place a check mark for each appropriate day of the Time Zone (e.g., Monday through Friday).
•
H1 - H4 refer to holidays that were previously defined (section 5.5). Place a check mark for the
applicable holidays in the Time Zones window.
Setup _____________________________________________________________________ 5-7
The following window shows a typical Time Zones window:
To download
all Time Zones
To download the
window’s active
Time Zone only,
press this button.
To add/remove a √
mark, double click
on the desired cell
Figure 19. Time Zones Window
In the above example, row number 5 only will be downloaded to the controller.
5.7 Access Levels
An Access Level is a field defined using the Access Level window. An Access Level enables specific
persons to enter (access) a specific door or group of doors during the time duration specified in up to
two Time Zones. The two Time Zones have “and/or” functionality, which means that workers can
have access during all hours specified in the Time Zones even if there is some overlap of hours. The
Access Level is associated with a specific user in the User Window (refer to Figure 26).
Consider the following scenario. Two groups of workers, for example, the day and night drivers in the
previous section must access the same door (warehouse) during different Time Zones. In this case, a
single Access Level can be created (e.g., Drivers), with the Drivers: Day and Drivers: Night included
in that Access Level. The warehouse door can be associated with the Drivers Access Level in both
Time Zones.
The following is another scenario. Different types of workers may need to access the same doors as
well as the specific doors of their own work site. For example, Computer Department personnel may
need access Computer Room doors, whereas main office personnel obviously need access to other
doors. Some doors, such as the main building entrance, may be common to both departments. In this
scenario, two separate Access Levels would be created for each group, designating the specific doors
for each group. Multiple doors is handled by the ”door group” function, which is also set from the
Access Level window.
5-8 _____________________________________________________________________ Setup
The following procedure shows how to use Access Levels.
To set the Access Level, do the following:
•
Choose Setup, Access Levels from the Main Menu. A window similar to the following opens:
Download active
access level to
controller
Double click icon
to open Door
Groups Window
with the most
recently opened
Access Level
Download all
access levels to
controller
Double click icon
to open Door
Groups Window
of indicated
Access Level
Figure 20. Access Levels Window
In a new setup, only one Access Level name (“Master”, in this case) will appear (refer also to
section 3.3).
•
Click on the Doors groups icon on the Icon Bar. The following window appears:
Figure 21. Door Groups Window
Note that all the doors appear as “Selected doors”, i.e., the user with “Master” Access Level can
access all the doors.
•
Exit the window, and return to the Access Levels window (Figure 20).
Setup _____________________________________________________________________ 5-9
•
•
•
•
In the Access Levels window, fill in the Access Level names for each Access Level (an unlimited
amount of Access Level names can be created). In scenario 1 above, the “Drivers” Access Level
would be created.
In the Time Zone field select up to two Time Zones for the Access Level. In our example, Driver:
Day and Driver: Night would be entered in the first and second time Zones, respectively.
For each Access Level name that was created, click the Doors groups or Doors icon to access the
Doors Groups window (similar to Figure 21).
Move the doors from the System Panel, which contains all the available doors, to the Selected
Panel, which contains the doors for persons who will be given that Access Level name (to open
the doors associated with the Access Level). For example, assuming that day drivers and night
drivers will have access to only the warehouse, an Access Level called “Drivers”, move the
warehouse door to Drivers Access Level.
Refer to the example in the figure below:
Name of
Access Level
Set for Time
Zone 1 or 2
Available System
Doors Panel
Selected
Doors Panel
Press to move
desired doors from
the System Panel to
the Selected Doors
Panel or vice versa
Press to move all
desired doors from
the System Panel to
the Selected Doors
Panel or vice versa
Figure 22. Doors
5-10 ____________________________________________________________________ Setup
•
The following window shows a completed Access Level window with the Drivers Access level
defined.
Drivers
Access Level
Figure 23. Access Levels Window- Completed
5.8 Events Setup
AXSalert contains a large number of events that can be recorded by the system (currently,
approximately 60 – refer to Appendix C). Some events are displayed for information purposes only,
whereas others may indicate a system security breach. Obviously, the significant errors should be
prominently displayed. Therefore, AXSalert has provided a color scheme that enables the application
of user-defined colors to each event message.
To apply colors to event messages, do the following:
•
On the Menu Bar, click Setup, Events setup. The following color palette opens:
Figure 24. Color Palette
Setup ____________________________________________________________________ 5-11
•
Note that possible messages are listed on the left side of the Color Palette window and the palette
on the right. Highlight a message, and click a color from the palette. If such events are already
displayed in the Events window, these messages will automatically adopt that color when the
color palette is closed.
The following window shows color-colored system messages for ease of identification:
Figure 25. Events Messages Displayed with Color
•
To return the color to the default (no color), select each colored event individually, and click the
Reset colors button.
5.9 Enrolling New Keys and Users
In the previous steps, organizational information that forms the basis for inputting individual
employees was recorded. It is now time to record the key holders themselves. In the initial setup
procedures (section 3.3), only a single user was defined in order to initiate system setup. Now, other
key holder will be defined so the system can begin to function. For example, the employees
responsible for inputting key holders via the RDR-PXT key reader will have to be defined, as well as
other personnel that must have access to sites in which doors are already operational.
5-12 ____________________________________________________________________ Setup
This stage involves several steps:
•
Physically enrolling the key.
•
Recording user data.
•
Setting privileges for changing user data at the computer.
Before proceeding further, verify that all previous setup activities were completed including:
•
All the organization’s work shifts have been recorded using the Time Zones window.
•
Up to four possible holiday types have been recorded in the Holidays window.
•
Valid doors have been defined using the Doors window.
•
Access Levels have been defined.
•
All the personal details of each employee should be readily available for data entry. This
information includes: company ID number, first name, last name, job title, location, building,
office phone.
5.9.1 Enrolling a New Key
Present a new key/card to the RDR-PXT reader.
Note that the reader’s LED changes from red to GREEN. If a key is rejected for some reason, the LED
will flash red.
The User Properties window appears.
A new record is added to the data table, and its Status is “Not downloaded”. It will be downloaded
later when all user information has been accurately entered, and the OK button or Download user or
Download all users buttons clicked. Until then, the controller does not recognize it (Figure 26).
Figure 26. User Properties Window after Key Enrolled
Fill in data for the first key holder: employee ID number, last name, first name, title, location,
building, office phone, expiration date and card number.
Set the Access Level that is appropriate for the user. Access Levels for the organization were set in
section 5.7. The example user has been set to “Master” Access Level. Note that setting the user’s
Access Level also defines doors that he can access and his Time Zones.
Setup ____________________________________________________________________ 5-13
All entered information has now been entered for the key holder. Double-check the information to
verify that it is correct. A completed window may look as shown in Figure 27.
Data read
from key
Errors can be
corrected by
clicking this
button
Status Downloaded /
Not downloaded
Figure 27. Completed User Properties Window
Click OK to finish the procedure for this user. Clicking the OK button also automatically downloads
that user’s data to the controller. If new users are being entered and there is no connection to the
controller, then downloading users will have to be separately performed (section 5.11).
Note that other advanced user properties can also be set at this time by clicking the Advanced button.
For a detailed presentation of these properties, refer to the user data description in section 6.2.1.
5.10 Assigning Privileges
Privileges determine the extent to which users can perform activities in the system.
AXSalert has four levels of privileges:
Events only
Enables viewing events only.
Events and
Users
Enables viewing events and user data. This privilege enables entering new users (e.g.,
enrolling via the RDR-PXT), modifying user data and deleting users.
All
Enables changing all system data except for Privileges and accessing the Setup options
window.
Admin
Enables changing all system settings and all system passwords.
5-14 ____________________________________________________________________ Setup
At setup time, it is necessary to define users who will have access to the system at the various levels of
privilege. For example, administrative personnel who are responsible for monitoring events and
handling users may have “events only” or “events and users” privilege. Managers may have “All”
privileges. System administrators who have overall responsibility for the system may have “Admin”
privilege.
Click here to delete
a user privilege
Click here to add a
new user privilege
Select the user’s
name from the list
Select the
appropriate
privilege level
Type in the
new password
and retype it
Click Set
password
to finish
Figure 28. Privileges Window
User names that were input into the system will appear in a drop-down “combo” box when the Add
new privilege (plus) button is clicked. Select the user name. Similarly, select the appropriate Privilege
level for the user. Type in the password, and retype it to confirm. Click Set password to finish.
Setup ____________________________________________________________________ 5-15
5.11 Download Procedure
After system setup, the new settings must be downloaded to the remote controllers. Since AXSalert
automatically identifies the remote controllers and readers (refer to section 5.3), this is an easy
procedure. Note that users were already downloaded when the OK button was clicked after entering
user data (section 5.9).
To perform download, do the following:
Click Operation, Upload/Download from the Menu Bar or click the
Upload/Download button on the Toolbar. A window similar to shown in Figure
29 appears.
Download
button
Select the data
to download
Status after
download
Figure 29. Upload/Download Window
•
Mark the data to be downloaded in the appropriate check box. Note that all or some of the
following data can be downloaded: setup data, doors, Time Zones, holidays, and users edited or
new user data).
•
Click the Download button.
•
After the download is performed, download statistics will be displayed in the Status box.
•
Click Exit to return to the previous window.
5-16 ____________________________________________________________________ Setup
5.12 Multi-computer Setup
The multi-computer function enables implementing a client-server configuration on a local area
network (LAN) running TCP/IP. For large installations, this enables several departments to supervise
their specific installations from their own on-site computer (clients) without having to rely on a single
central computer for performing day-to-day operations. Of course, the central events database remains
on the central computer or server and is usually maintained by the company’s computer department.
Other data such as key holder data can be stored on the client computers.
The local client computer communicates directly with the server, which distributes relevant data to
other client computers. For the real-time display of events, the server must be running. If the server is
turned off, events cannot be uploaded to it from controllers, and in turn, the events cannot be
distributed to the relevant client computers.
To setup the server, do the following:
Click Setup, Multi-computer from the Menu Bar.
A window similar to the following appears:
Enter “1” for
the server
Enter the
server’s local
IP address
Leave this
field blank
Figure 30. Multi-computer Configuration Window
Setup ____________________________________________________________________ 5-17
•
Each computer must be given a unique number. Begin with the server. For the server, it is
mandatory to enter the number “1” in the computer Number field. Do so now.
•
The host IP address is left blank.
•
Fill in the loops for the server (this step can be done later).
•
Mark the Autostart as server check box. Otherwise, the Online button will have to be manually
pushed from this screen each time the computer boots in order to enable the computer to operate
as a server after the system is booted.
•
Click the Online button, to activate the server.
Online
button
Figure 31. Multi-computer Configuration Window - Server
To configure the clients do the following:
•
Client computers are numbered from “2” onward. Fill in the computer number now.
•
Fill in the host IP address. The host IP number of the client computers must be the same as the
server’s local IP number.
5-18 ____________________________________________________________________ Setup
•
The columns numbered consecutively from “1” onward, refer to loop number in the system. A
maximum number of 108 loops can exist in the system. On the server mark the loops that each
computer supervises.
•
The following figure shows a client configuration.
•
Click the Online button, to activate the server.
Note that the server and client computers cannot supervise the same loops.
Figure 32. Multi-computer Configuration Window – Clients
Setup ____________________________________________________________________ 5-19
5.13 Inputs Setup
Each sequential input port can be defined to operate in one of several modes in order to activate a
specific function.
To setup the inputs, do the following:
Click Setup, Inputs from the Menu Bar.
A window similar to the following appears:
Define Output
Define Out Time
Input
Number
Click Download
after completing
Inputs setup.
Select
Input
Function
Select
Loop
Select Input range
Figure 31. Input Manager Window
5-20 ____________________________________________________________________ Setup
Select the input numbers (range) to be defined.
Select the input Function. Each input device can be programmed to operate in one of a few modes:
•
Disabled – Input is disabled
•
Allow entry – Allow entry through door 1 or 2 of controller.
•
Open all – Open all doors in loop while input is active.
•
Control Reader – Enable/ Disable reader 1 or 2 of controller.
•
Counter – Up/Down count events.
•
Output – Output to relay.
•
Alarm Input – Output to relay after entry delay.
Refer to the IOX-4 Installation Instructions, DE6314, for details on these functions.
Define the Output as specified in the IOX-4 Installation Instructions. An input may be used to control
an output relay on the IOX-4 board. Output numbers define which output relay is to be controlled (1
through 32). Adding 64 to the relay number will cause the input to operate the relay in toggle mode.
Adding 128 to the relay number will cause the input triggering and restoring to generate an event
message.
Set the Out time number as the length of time in seconds for the input relay to be triggered (1 through
2000 secs).
Select the loop (e.g. 1. Comm 1).
Click on the Download button after completing the Inputs setup for the new settings to be downloaded
to the remote controllers.
Click OK.
Operating AXSalert __________________________________________________________ 6-1
CHAPTER 6
Operating AXSalert
This chapter concentrates on familiar day-to-day procedures including maintaining keys (users),
generating reports and managing events. All procedures can be accessed from the Menu Bar.
I
Note: The most frequently used functions are accessible from the Toolbar. For a
description of the Toolbar controls, refer to section 4.3.
This chapter includes the following topics:
•
Viewing events, including color-coding, event reports, and printing and saving.
•
Viewing and managing user keys, including adding, modifying and deleting key holders as well as
creating user reports.
•
Backup / Restore procedures.
•
Door reports.
•
Holiday reports.
•
Time zones reports.
•
Uploading data from the controller.
6.1 Viewing Events
Viewing and examining events is the most frequently performed activity. It may be necessary to
examine events several times during the day to verify that there was no occurrence of unauthorized
access to the facility. In addition, it is necessary to verify that no communication failures have
occurred, which would impair security at the facility.
The Events window is the first window displayed after entering the AXSalert. These events are predefined by the software and cannot be modified by the user. For a full list of the event messages
(approximately 60), refer to appendix C.
6-2 ___________________________________________________________ Operating AXSalert
The following figure shows a typical Events window:
i
Figure 33. Events Window
NOTE: For security reasons, events cannot be deleted. All events are displayed.
An event is defined as any occurrence recorded by the system either at a door or at the PC, including
hardware and communication problems. For example, a valid entry through a door is recorded as a
“Valid key”, and the entry through a door without presenting a key is recorded as a “Forced door”.
If all the columns are not displayed on-screen, use the horizontal scroll bar to scroll rightward or
adjust column width (section 4.5.2).
Note that the field order that appears in the Events window cannot be modified. The Events window
provides eight data fields for each event as follows:
Operating AXSalert __________________________________________________________ 6-3
Field Name
i
Description
Time
The date and time of the event.
Description
The description of the event as determined by the
system.
Door
The name of the door at which the event occurred.
User name
The user who “owns” the key that performed the event.
Key
The key number.
Loop
The loop number (there are up to 16 doors in a loop).
Reader
The reader number (0 or 1) of the controller. (Two
readers can be attached to a controller)
Controller number
The controller number within the loop.
Not e: AXSalert saves up to 999,999 events in its database. Technical support
personnel can change this value. Event 1,000,000 will erase the first event (the event
that has earliest date and time signature) in accordance with the FIFO principle (first
in, first out).
6.1.1 Color-coding Events
Colors of events can be changed as necessary (refer to section 5.8 for opening the color palette and
applying colors). Colors are used to highlight key events and call the user’s attention to them for
further action. After a specific color-coded event is double-clicked, the user-set color “grays” as an
indication that the event has been acknowledged. However, the column at the far left-hand column
keeps the user-set color as a reminder of the event’s severity level. Events that are not user-colored do
not “gray” when double-clicked. Refer to the figure below:
Acknowledged
“grayed” events
Unacknowledged
“colored” event
Figure 34. Acknowledging Color-coded Events
6-4 ___________________________________________________________ Operating AXSalert
6.1.2 Event Reports
Reports are a useful tool for sorting the myriad of parameters and thousands of events recorded by the
system. Reports enable the examination of facility access and identification of trends and specific
activities that must be attended to by company security personnel. Reports can be produced on a onetime only basis or in the same format from time to time by using templates.
6.1.2.1 One-time Only Reports
To open the Reports Criteria window, choose Operation, Reports from the Menu
Bar, or click the Reports button.
Reports can include any combination of events, users and doors. Events, users
and doors are selected by highlighting them in the appropriate scroll-down list.
Refer to Figure 35.
Clear All button - erases
all highlighted report items
Highlighted report items
Create
report button
For a specific
time period,
click the From
radio button,
then click
either the:
Last Week
Last Month
or
Last
radio button
Fill in the
date and hour
Figure 35. Events Report Criteria
Operating AXSalert __________________________________________________________ 6-5
Select the events to be listed in the report from the events scroll-down list.
Select the key holders to be listed in the report. Note that key holders can be sorted according to the
following: key number, first name, last name, ID, Access Level.
To generate a report, click the Create Report button.
A report similar to the following will be generated in the Events Report Criteria window:
Figure 36. Events Report
Note that the report includes the same fields that were displayed in the Events window, sorted in
accordance with the items highlighted in the Events Report Criteria window.
6.1.3 Report Templates
If a report of a specific parameter combination is frequently needed, then a template can be generated
for that specific combination thereby obviating the need to mark each specific event item each time
that a report has to be generated. Using templates not only saves time but can avoid user errors in
setting up the report such as forgetting to include a specific item in the report parameters.
6-6 ___________________________________________________________ Operating AXSalert
To generate a report using a template, do the following:
•
Define the report items as in the previous section highlighting events, users, doors.
•
From the window in Figure 35, select the Save Template button.
•
The Template Name window opens
•
Figure 37 Template Name Window
Record the name of the new template, and click OK. The new template will be recorded for later
use.
•
•
•
Now, click the Open Templates button. Note that the new template has been recorded among the
other available templates.
Figure 38 Existing Templates Window
To use the new template, click the Template button. The fields are highlighted in the Events
Report Criteria window.
Continue by filling in the time period information (By date or Last number of days) as described
in the previous section, and generate the report.
Operating AXSalert __________________________________________________________ 6-7
6.1.4 Printing and Saving Reports
After the report is generated, it can be printed in hard copy or saved to a file. To print a paper copy of
the report, click the Print button to open the Microsoft Print window.
In addition, AXSalert provides the option to export a report to a Microsoft Excel spreadsheet format
(.xls), and text format (.txt). To save your report as a file, click the Export button. The Microsoft Save
As window opens. Select the folder of choice, record the file name, and click Save.
Refer to the figure below:
Export
button
Print
button
Figure 39. Print and Save As Buttons
6-8 ___________________________________________________________ Operating AXSalert
6.2 Viewing and Managing User Keys
From the Menu Bar, select Setup, Users, or click the Users button on the Toolbar.
The Users window opens.
Report
button
Double-click a
column name to
sort the table by
that field.
Double-click a
single user to open
the User Properties
window. Refer to
Figure 41.
Figure 40. Users Window
The key holders displayed in the User window can be sorted according to any field (last name key
number, update status, etc.) by double-clicking on the column name. The sorted fields can be toggled
to ascending / descending order by clicking again on the column name.
6.2.1 User Data Description
The Users Table contains 14 fields with information about the user. The Key Index is determined by
the system and cannot be accessed by the AXSalert operator. The following table describes the data
fields. Note that the system administrator can modify most fields but others are reserved for system
use.
Operating AXSalert __________________________________________________________ 6-9
Field
Description
Key
Key number, provided by system when initially read into the
system. The key number is sequentially-incremented each time a
new user is added to the system. This field is “grayed” and cannot
be modified.
Pin Code
A number read from the user’s tag when it is initially read into the
system. This field is “grayed” and cannot be modified.
Last Name
User’s last name. Together with the first name, the last name is part
of the employee’s user name for accessing the system from the PC.
This field is case sensitive.
First Name
User’s first name. Together with the last name, the first name is
part of the employee’s user name for accessing the system from the
PC. This field is case sensitive.
Title
Free text. Employee’s job title.
Location
Free text. Regular work location of the employee.
Access
Access Levels are determined by the user in the Access Level
window when the system is set up. The Access Level window
enables the user to determine the Time Zones, holidays, and doors
and door groups of employee that accesses the facility. It is
important that the employee’s Access Level shall accurately reflect
his position and authorization to enter restricted areas.
Access
Button
Enables setting a unique Access Level for a specific user. Refer to
section 6.2.3.1.
Building
Free text. The name of the building in which the person is usually
located.
Office Phone
Free text. Business phone or extension where the user can be
reached.
ID
The employee’s ID number in the organization (employee
number).
Tag type
Type of tag that the employee carries. This function is also used for
color-coding the key holder (refer to section 6.2.2).
Card
Type of card that the employee carries: e.g., Magcard.
Expiration
Expiration date of the card’s validity. As of this date (see note
below), the tag will not open any doors.
Status
Download status, i.e., whether the user data has been downloaded
or not downloaded to controller.
Picture
Button
Enables viewing the picture and personal data of the last key holder
that entered the facility. Refer to section 6.2.3.2.
6-10 __________________________________________________________ Operating AXSalert
In addition to these fields the User Properties window contains seven check boxes for fine-tuning user
access. The check boxes are displayed by clicking the Advanced button.
Refer to the following table:
Check Box
Description
Override
APB
If the anti-passback feature is activated, marking this check box
will de-activate it for this specific employee. This feature is
implemented in controller version 2.06 and above.
Increase
unlock
Marking this check box increases the door unlock time for a
specific employee by twice the number of seconds set in the Doors
window (section 5.4). This is a useful service for handicapped
workers, for example.
Double tag
Marking this check box requires persons to enter in pairs. This is
useful when a guests is visiting the site. The guest can enter the
door only when accompanied by another key bearer (e.g., the
hosting employee).
Prevent
entry
Marking this check box prevents the entry of a valid key holder
who ordinarily has access. This is useful in cases of a lost key.
Master tag
Marking this check box enables the employee, e.g., a senior
manager, to access all doors.
Disarm
alarm
Marking this check box, disables the alarm attached to the door if
the employee enters. For this feature to be effective, the employee
must physically use a special arm/disarm tag.
Relay output
When tag is presented, IOX-4 relay #25 is operational.
6.2.2 Color-coding Key Holders
When handling large numbers of key holders, it is useful to “color” the key holder groups (e.g.,
according to position) so that it will be easier to identify key holders and locate key holders of that
class in long lists when performing key holder maintenance functions in the users window. Up to 256
colors can be used according to the spectrum in Figure 24.
To change the color of a key holder’s record, do the following:
•
Highlight the key holder in the User window.
•
Click the User properties button to open the User Properties window.
•
In the Tag type field, enter a color (from 0 to 256).
•
Click OK to finish. In Figure 40, 50 was entered to give the key holder’s record a green color.
Operating AXSalert _________________________________________________________ 6-11
6.2.3 User Properties
The User Properties window opens. Refer to the figure below.
Advanced
user features
Sequentiallyincremented
Read from key
Password data
Click button to
view and select
all Access Levels
Status is “Not
downloaded"
Advanced button toggle
to show/hide check boxes
Figure 41. User Properties Window
6.2.3.1 Access Button
The Access button is used to set a Personal Access Level for the key holder. After the Access Level of
groups of workers has been set, it may be necessary for certain individuals to receive a personal
Access Level, which is similar to a group Access Level but fine-tuned to that person’s specific level of
authority and position. For example, senior management or plant owners might need special access
privileges such as access to extra doors..
This feature saves the time-consuming work involved in building a personal Access Level from
scratch.
To set a personal Access Level, do the following:
•
Open the User properties window (Figure 41). Note that the Access Level is currently set to
“Master”.
•
Now, click the Access button. Note that the Access Level now reads PAL (personal Access Level)
and the user’s name (Figure 42). The Doors window opens (Figure 43).
6-12 __________________________________________________________ Operating AXSalert
Access
button
Figure 42. User Properties Window - Access Button
Figure 43. Doors Window - Personal Access Level
Set the doors for the personal Access Level (refer to section 4.2.3.6 for setting door groups), and click
the Exit button.
The User Properties window opens again. Advanced user properties can be set at this time (Figure 41).
Click OK to finish setting user parameters. The Users window opens. Note that the personal Access
Level is recorded for the key holder.
Operating AXSalert _________________________________________________________ 6-13
Personal Access Level
(PAL)
Figure 44. Users Window with New Personal Access Level
6.2.3.2 Picture Button
The Picture button is used importing the picture of key holders for display with the User Trace
feature. (The User Trace feature displays the details and archived picture of a key holder that has
entered the facility. Refer to section 6.2.4).
Importing a Picture
To import a picture, do the following:
•
From the Main Menu go to Setup, Users or click the Users button on the Toolbar.
•
Highlight the key holder whose picture is to be imported, and click the Users button. The Users
Properties window opens (refer to Figure 42, for example).
•
Click the Picture button to open the Picture Import window (refer to Figure 45).
6-14 __________________________________________________________ Operating AXSalert
Figure 45. Picture Import Button
•
Click the Import button.
•
The Find File window opens, which enables opening the folder that contains the picture to be
imported. Navigate to the desired picture, and click the Open button.
•
The picture appears in the Picture Window. Refer to the following figure:
•
Figure 46. Imported Picture
Close the window to finish. You are returned to the User Properties window.
•
Click OK to finish. This step saves the picture with the key holder’s properties.
Replacing a Picture
When the Picture button in the User Properties is clicked, a picture will be displayed if a picture has
previously been imported for the key holder. To replace the picture, click Import in the Picture
window and import a picture according to the procedure in the previous section. Click OK in the User
Properties window to finish.
Operating AXSalert _________________________________________________________ 6-15
6.2.4 User Trace
Enables the display of the picture and details of the key holder highlighted in the Events window. To
use this function, highlight the event of interest.
Refer to the following figure:
From View, click User Trace.
The following window opens.
Figure 47. User Trace Window
Note that the picture of the key holder and six key holder details are displayed.
6-16 __________________________________________________________ Operating AXSalert
If the left panel is not already open (refer to above figure), click the Advance button to open. Note that
the displayed data are those that are check marked. Up to six items can be displayed at one time.
Attempting to mark more than six items will produce an error message. The user can choose any data
from the check box list to mark and display.
Click the Trace button to view the information about the latest event..
Note that this feature is especially powerful when combined with a real-time video camera at the
facility site. In this way, the picture of the actual person entering the facility can be verified against the
picture of the person authorized to hold the key.
6.2.5 Creating a Report of Users
Reports can be produced on a one-time only basis or using templates.
To generate a report, click the Report button (Figure 40) from the Users window.
Five types of reports can be generated:
•
General (section 6.2.5.1).
•
Time and attendance (section 6.2.5.2).
•
Unused key (section 6.2.5.3).
•
Expired key (section 6.2.5.4).
•
By Door (section 6.2.5.5).
•
Generating a report (section 6.2.5.6).
Depending on the type of report generated, the report can be according to key number, first name or
last name, key holder’s title, location, building, ID, expiration, Access Level name.
The user can select the Access Level to be included in the report from a list that contains all the
current Access Levels.
Additional fields for defining the report’s time period are included when the following types are
reports are generated: unused key, expired key, time and attendance.
Operating AXSalert _________________________________________________________ 6-17
6.2.5.1 General Report
Below is a typical Users Report Criteria window.
Create
report
button
Choose the type
of sorting and
report types
Choose the
Access Levels
Figure 48. Users Report Criteria Window
To generate a General report, do the following:
•
Select the type of report (General).
•
Select one of the eight available parameters to order the report.
•
Select the Access Levels to be included in the report.
•
Click the Report generate button. (proceed to section 6.2.5.6).
6.2.5.2 Time and Attendance Report
The Time and Attendance report enables using the system for verifying employee attendance at a
specific facility. Thus, the system can be used for generating wage slips or for cross-checking with
existing salary systems. Reports can be generated by specific users or by Access Level, according to
specific historical dates or according to a time period up to the current date, and by a specific entry
and exit door.
6-18 __________________________________________________________ Operating AXSalert
To generate a Time and Attendance report, do the following:
•
Select the type of report (Time and Attendance). Refer to the following figure:
Users and Access
levels radio button
Type in the
desired dates
in the “From”
and “To”
date fields.
Activate
either the
Last Week
Last Month
Or
Last
radio button
Indicate the time period.
Dates in the “From and “To”
fields automatically adjust.
Optional: Mark
the entry and exit
door of the report.
•
Figure 49. Time and Attendance Report
Select either the Users or Access levels radio button, and from the list, highlight the users or
Access Levels items to be included in the report.
•
In the “Order by” field, select one of the available parameters.
•
Select either the By date or Last Month/Last Week/Last Days radio button. By date enables
selecting a specific historical time period for the report. Fill in the desired time period in the “To”
and “From” fields. Last days enables selecting a time period based on a number of days up to the
current date. If Last days is used, the relevant dates are automatically entered in the “To” and
“From” fields when the number of days is entered.
•
Select the entry and exit doors of the report.
•
Click the Report generate button. (proceed to section 6.2.5.6).
Operating AXSalert _________________________________________________________ 6-19
6.2.5.3 Unused Key Report
The Unused Key report is used for control purposes to ensure proper use of keys and to discover
possible irregularities.
To generate an Unused Key report, do the following:
•
•
•
•
•
Select the type of report (Unused Key).
Select the Access Levels to be included in the report.
In the “Order by” field, select one of the available parameters.
Select either the By date or Last Month/Last Week/Last Days radio button. By date enables
selecting a specific historical time period for the report. Fill in the desired time period in the “To”
and “From” fields. Last days enables selecting a time period based on a number of days up to the
current date. If Last days is used, the relevant dates are automatically entered in the “To” and
“From” fields when the number of days is entered.
Click the Report generate button. (proceed to section 6.2.5.6).
Figure 50. Unused Key Report
6.2.5.4 Expired Key Report
The Expired Key report is used for control purposes to ensure proper use of keys and to discover
possible irregularities.
To generate an Expired Key report, do the following:
•
•
•
Select the type of report (Expired Key).
Select the Access Levels to be included in the report.
In the “Order by” field, select one of the available parameters.
6-20 __________________________________________________________ Operating AXSalert
•
Select either the By date or Until Week/Until Month/Up until Days radio button. By date
enables selecting a specific historical date until which the report will be generated. Fill in the
desired time date in the field. Up until days enables selecting a time period based on a number of
days up to the current date. If Up until days is used, the relevant date is automatically entered in
the “Until date” field when the number of days is entered.
•
Click the Report generate button. (proceed to section 6.2.5.6).
Figure 51. Expired Key Report
6.2.5.5 By Door Report
This generates a report of all indicated doors and includes eight preset parameters ordered by the
indicated parameter.
To generate a By Door report, do the following:
•
Select the type of report (By Door).
•
Select one of the eight available parameters to order the report.
•
Select the Access Levels to be included in the report.
•
Click the Report generate button. (proceed to section 6.2.5.6).
Operating AXSalert _________________________________________________________ 6-21
Figure 52. By Door Report
6.2.5.6 Generating a Report
To generate the report, click the Create report button. A report similar to the following is generated:
Export
button
Print
button
Figure 53. Typical Users Report
6.2.6 Report Templates, Printing and Saving
The procedure for creating templates, as well as printing and exporting reports, is similar to that for
Events. To use report templates, refer to sections 6.1.3. To print and save reports, refer to section
6.1.4.
6-22 __________________________________________________________ Operating AXSalert
6.2.7 Modifying User Data
To modify user data, do the following:
•
Open the Users window, and double-click on the desired user.
•
The User Properties window opens. This window contains 14 fields. In addition, there are seven
check boxes that refer to the capability of the user to access the facility and the types of messages
generated by the user’s activities in the facility. Refer to section 6.2.1 above for a description of
the fields and check boxes.
•
If the check boxes need to be modified, toggle the Advanced button so the Advanced options
open.
•
Perform the necessary modifications. If a mistake is made while entering the data, Cancel will
exit the User Properties window without saving the changes. Use Reset to erase pin data.
•
After performing the necessary changes, click OK. The user data will be downloaded to the
controller, and you are returned to the User window.
•
Perform this procedure for other employees, if necessary.
•
If it is necessary to download the data to the controller, refer to section 6.2.10 below. Using the
download procedure is necessary if modifications were performed offline (the computer was not
connected to the controller).
6.2.8 Deleting a User
To delete a user, highlight the user in the Users window, and click the Delete button (refer to Figure
54). A confirm message will be displayed.
Refer to the figure below.
Delete
button
Figure 54. Delete Users Window
Operating AXSalert _________________________________________________________ 6-23
6.2.9 Adding a New User
To add a new user, refer to section 5.9. If it is necessary to download the data to the controller, refer to
section 6.2.10 below. Using the download procedure is necessary if new users were added offline (the
computer was not connected to the controller).
6.2.10 Downloading Users
If the computer was offline (no connection to the controller) when new users were added or user data
modified, the AXSalert operator must download the new user data to the controller so that the changes
will take effect at the doors.
In addition, if Access Levels were modified, it will be necessary to perform a specific download
procedure. This section describes the procedure.
Note that systems with large user databases and many controllers can take several minutes or more to
download. It is recommended that large downloads be performed during company “off hours”.
To download users to the controller, do the following:
If downloading a single user or only a couple of users, it is best to use the
Download user button on a user-by-user basis.
If downloading the entire user database or many users, use the Download all
users button.
The following window appears:
Download
button
Figure 55. Download Users Window - Before Download
Use the Not downloaded radio button to download only workers that have “Not downloaded”
indicated in the Status field of the User Properties window (refer to Figure 41). If all workers defined
in the system are being downloaded, activate the All radio button.
Click the Download button, to begin. The following window appears:
6-24 __________________________________________________________ Operating AXSalert
Figure 56. Download in Progress Window
When the download is finished, the following window appears:
Figure 57. Completion Message
Click OK to finish.
Operating AXSalert _________________________________________________________ 6-25
6.3 Backup / Restore
After system setup, good computer practice requires that system data be backed up as a precautionary
measure against unforeseen events. AXSalert contains a built-in backup function to make easy this
tedious procedure.
When performing backup, AXSalert asks for the name of the backup folder. By periodically using
different backup folders, it is possible to maintain a history of system settings for restoration in the
future. A suggestion is to use the current date as the backup folder. In this way, backup versions will
be easily identifiable.
6.3.1 Backup
To perform backup, do the following:
On the Main Menu Bar, click the Backup/Restore button.
A window similar to the following appears:
Backup
button
Restore
button
Select the
data to backup
Figure 58. Backup / Restore Window
•
Select the data to backup: database and/or event log.
•
Click the Backup button.
•
Use the Browse button to scroll to and select the target backup folder.
•
A confirm message will appear:
Figure 59. Backup Confirm Message
6-26 __________________________________________________________ Operating AXSalert
•
Click Yes to continue. A backup completion message will appear. A new folder having the same
name as the date that the backup was performed (with the following format: DD-MM-YYYY) will
be created in the target folder. This folder will contain two files with the following names:
“events.backup” and ”vxsdb.backup”.
Refer to the following figure:
Figure 60. Backup Folder
Click OK to exit.
6.3.2 Restore
This function enables the restoration of previously-saved AXSalert data files if the current settings
have been lost or corrupted.
To restore previous settings, do the following:
•
•
•
•
•
On the Main Menu Bar, click the Backup/Restore button. The Backup/Restore window appears
(Figure 58).
Use the Browse button to select the folder from which the files to restore will be taken (for
example, refer to (Figure 60).
Mark the Database and/or Event Log check box, for the information to restore.
Click the Restore button.
A caution message similar to the following will appear:
Figure 61. Restore Caution Message
Click Yes to continue.
After restoring, click OK to exit.
Operating AXSalert _________________________________________________________ 6-27
6.4 Door Reports
Since AXSalert can manage 1,750 doors over a network, doors reports can be valuable for checking
correct settings. Furthermore, door reports can be long and complex. The Doors Report is a standard
report that includes all the parameters displayed in the Doors window as follows: door name, loop,
reader, unlock duration, unlock toggle, RTE polarity, door position polarity, door position function,
door ajar, Time Zone, Time Zone function.
To generate a Doors report, open the Doors window by choosing Setup, Doors on
the Menu Bar.
To generate a report, click the Make a report button. A report similar to the
following is generated:
Export
button
Print
button
Figure 62. Door Report
The procedure for printing and exporting reports is similar to that of Events (refer to section 6.1.4).
6-28 __________________________________________________________ Operating AXSalert
6.5 Holidays Reports
To generate the report, click Setup, Holidays on the main Menu Bar. The
Holidays window opens.
Click the Make a report button. A standard report similar to the following is
generated:
Export
button
Print
button
Figure 63. Holidays Report
The procedure for printing and exporting reports is similar to that of Events (refer to section 6.1.4).
6.6 Time Zones Reports
To generate the report, click Setup, Time Zones on the main Menu Bar. The Time
Zones window opens.
Click the Make a report button. A standard report similar to the following is
generated:
Operating AXSalert _________________________________________________________ 6-29
Export
button
Print
button
Figure 64. Time Zones Report
The procedure for printing and exporting reports is similar to that of Events (refer to section 6.1.4).
6.7 Upload \ Download
Uploading data to the PC from the controllers and downloading from the PC to the controller are
frequently-performed activities.
Downloading activities are performed especially after setup changes. Generally, user data can be
downloaded to the controller at a time that is convenient for the system, e.g., during non-peak hours.
Downloading was explained in section 5.11 and section 6.2.10.
6-30 __________________________________________________________ Operating AXSalert
6.7.1 Upload Procedure
If the PC was shut down for any reason (for example, turning off the computer at night), it is
recommended that events be uploaded from controllers after the PC has been rebooted. In addition, in
legacy controllers, some user data can be uploaded to AXSalert thereby saving tedious entry chores.
Two types of data can be uploaded to controllers: events and system settings (setup, doors, Time
Zones, holidays, users).
To perform an upload, do the following:
Click Operation, Upload/Download from the Menu Bar, or click the
Upload/Download button on the Toolbar. A window similar to the following
appears:
Upload
system data
Upload
events
Select the data
to download
Status after
upload
Figure 65. Upload/Download Window
•
Mark the system data to be uploaded in the appropriate check box. Note that all or some of the
following data can be downloaded: setup data, doors, Time Zones, holidays, and modified user or
new user data),
OR
if “events only” data is being uploaded (the most frequent type of upload activity), leave all
check boxes unmarked.
•
If system data is being uploaded, click the Upload button, OR if events are being uploaded, click
Events Only button.
•
After the download is performed, the download statistics will be displayed in the Status box.
Click Exit to return to the previous window.
Operating AXSalert _________________________________________________________ 6-31
6.8 Map Generator
AXSalert contains an in-built proprietary program to enable building a graphic map of the facility with
active elements such as readers, controllers and peripheral equipment. When events occur, map
elements are activated and displayed on-screen showing the event location on the map including a
description of the event. In addition, doors can even be opened and closed from the PC workstation.
This section shows how to build a basic map and how the map functions. The example below shows a
simple map to illustrate the basic principles. Maps can be very complex and can include several floors
in a building.
6.8.1 Opening the Map Generator Application
From the Menu Bar, select Operation, Map Generator. The following window opens:
Figure 66. Map Generator - Opening Window
Note that a toolbox of graphic objects is opened together with the main window. The toolbox will be
used shortly to place graphic objects on the map.
6.8.2 Preparing and Retrieving a Map Background
A map of the desired facility should be prepared in graphic form. If only a hard copy exists, then it
should be scanned or redrawn in a computer graphics file format. This map will serve as the
background on which the graphic objects will be placed. For purposes of this demonstration, a simple
map of one floor will be used.
6-32 __________________________________________________________ Operating AXSalert
i
Note: For installations with more than one floor, a map should be prepared for each floor.
Familiar graphic formats such as .bmp should be used for the map background. For any
questions, consult with AXSalert software support. The graphic file should be copied to
the Vissacces\Bams\Smg folder before beginning.
From the Menu Bar, select Options, Background. Select the file: FirstFloor.bmp. a Window similar to
the following opens:
Objects
tool
Figure 67. Basic Map Background
6.8.3 Toolbox of Objects
The toolbox contains the active objects for placement on the graphic map. By using the objects, the
relative location of all detection devices in the system can be constructed.
Currently, the following objects are available for placement on the graphic map background:
Normal Select
Placement Select
Stairs
Camera
Controller
Door
Infra-red reader
RDR reader
Figure 68. Objects Toolbox
In addition, note the Placement Select button for selecting and placing objects and the Normal Select
button for moving and deleting objects on the map background.
Operating AXSalert _________________________________________________________ 6-33
6.8.4 Placing, Sizing and Rotating Objects
To place an object, click the Placement Select button so that it is depressed and then click on the
object to be placed on the map. With the mouse button down, drag the object to its appropriate place
on the map. Repeat this procedure until all the objects have been placed.
If a placement mistake is made, the object can be deleted by clicking it with the Normal Select button
and then pressing the Delete key. If an object has to be moved after it has been placed on the map,
drag it to its new place using the Normal Select button.
It is possible to increase the size of active objects by using the plus ( + ) and minus ( - ), respectively.
In addition, objects can be rotated 90o either leftward or rightward using the left and right brace ( { , } )
keys.
Consider the following figure. All available types of objects have been added to the map. The door
object has been increased in size so that it is more proportional to the other objects. The camera has
been rotated so that it faces the direction of key holders entering the facility.
Camera
rotated
Door size
increased
Figure 69. Map with Placed Objects
6-34 __________________________________________________________ Operating AXSalert
6.8.5 Adding Captions
To add captions to the placed objects, do the following:
Go to Options on the SMG Main Menu and select Objects. The Design Properties window opens.
In the Text field, fill in the desired text. This text will appear on the map itself when displayed in the
program. Click OK to finish entering captions.
Refer to Figure 70.
Add object
text here
Figure 70. Design Properties Window
Note that text appears for all the objects on the map. Refer to Figure 71.
Figure 71. Map after Adding Captions
Operating AXSalert _________________________________________________________ 6-35
6.8.6 Activating the Map
Objects placed on the map are activated from the Design Properties window (Figure 70). When doors
are selected, the More button becomes active, which opens a lower panel enabling the selection of the
specific door, loop and reader numbers (Figure 72). Objects such as controllers, readers and cameras
must have the appropriate number indicated in the Number field. Peripheral equipment uses the
auxiliary (Aux) fields. In buildings with more than one story, the Stairs field is used to activate the
maps of other floors.
Figure 72. Design Properties Window with Door Options
6-36 __________________________________________________________ Operating AXSalert
6.8.7 Viewing Events with the Map
To view events using the user-defined graphic map, do the following:
Click View, Maps on the Menu Bar. The following window opens:
Active /
Inactive button
Available
maps
Available
check boxes
Figure 73. Maps Window
Double-click the map of choice from the available maps. The map opens. The map contains all the
objects that were defined in the Map Generator application.
The following check box options are available from the Maps window:
Pop map when alarmed
“Pops up” the map on the desktop when an alarm
occurs.
Scroll on valid event
AXSalert “pops up” the map if a valid event occurs
(such as a valid key entry or valid exit).
Marking both the Pop map when alarmed and Scroll on valid event check boxes will pop up the
map on the desktop when any event occurs.
Operating AXSalert _________________________________________________________ 6-37
When the map is active doors can be opened or closed and event messages are displayed on the
appropriate access element.
“Open Door”. The door is open. The user can open or close doors by rightclicking the mouse and selecting “Open door” or “Close door”. (Refer to
section 6.8.8).
Event message. If the map is opened or “popped up”, the message text will
appear on the map object (if the appropriate check box was marked).
The user can choose to turn the map on or off using the Active/Inactive buttons. If the map is off, then
the map will not pop up even if the “Pop map when alarmed” check box is marked.
6.8.8 Right-Click Mouse Functions
Right-clicking the mouse opens the following window:
Figure 74. Map Right-click Mouse Functions
Refer to the following table:
Properties
Shows the properties of the specific object.
Open
Opens the door.
Close
Closes the door.
Disable
Disables the specific object.
Enable
Enables the specific object.
6-38 __________________________________________________________ Operating AXSalert
6.8.9 Doors Control
In large facilities, a guard or secretary may be physically stationed at a local computer with duties that
include opening a door manually when entry is requested. This feature is provided by the Doors
Control, which is accessed from View, Doors Control on the Menu Bar.
A window similar to the following opens.
Figure 75. Doors Control Window
In the above window, the guard can open either the warehouse door or the computer room door. This
feature is generally combined with other AXSalert features, such as checking the identity of the person
using the User Trace feature for checking the key holder’s picture and ID data (section 6.2.4) after the
key holder has presented a key outside the door.
Advanced Features __________________________________________________________ 7-1
CHAPTER 7
Advanced Features
This section describes advanced features available with AXSalert software, especially features for
fine-tuning remote controller/reader hardware and communications as well as monitoring tools.
7.1 Monitors
From the Menu Bar click View, Monitors. The following window appears:
Figure 76. Monitors Window
Used for technical support, this window monitors the serial communications equipment connected to
the computer, i.e., the AXS-100 controller and the RDR-PXT key reader.
7-2 ___________________________________________________________ Advanced Features
7.2 Status
From the Menu Bar click View then Status. The following window appears:
Refresh
button
Select the
loop and
controller
The Status window shows the controller(s) status in real time. Controller status is automatically
refreshed every few seconds. The user can immediately refresh the window by clicking the Refresh
button.
Field
Description
Mode
Displays the current AXS-100 operation mode. Refer to the section 7.4.1 for
a description of the different possible modes.
Keys
Number of enrolled keys in the system.
AI 1
Analog input 1.
AI 2
Analog input 2.
AI 3
Analog input 3.
AI 4
Analog input 4.
Version
AXS-100 EPROM firmware version.
Internal reader
communication
Indication of communication between a controller and its in-built reader.
Values: Working/Failure.
Left/Right reader
communication
Indication of communication between AXS-100 Reader #1/Reader #2 and
the AXS-100. Values: Working/Failure.
Advanced Features __________________________________________________________ 7-3
Field
Description
User interface
mode
The AXS-100 LCD screen is normally on Idle (time and date are displayed).
However, AXS-100 function keys function will cause the user interface
mode to be changed. This field shows the user interface mode.
Values: Idle/Menu or functions.
Left/right door
position
State of left/right door
Values: Open/Closed
Alarm relay
When set, the values can be Idle or Triggered for special events (e.g., Forced
Door, Controller tamper, etc.).
Controller
tamper status
Values displayed are Tamper or Secure.
7.3 Counters
From the Menu Bar click View then Counters. The following window appears:
Refresh
button
Reset
APB table
Check
loop
Figure 77. Counters Window
The Counters window displays the difference between number of entries and exits for the designated
loop. This feature is useful in applications where it is important to know, in real-time, the difference
between the number of entries and exists. For example, in parking lot applications it is important to
know the number of available parking spots at the site, or in other applications, it may be important to
know the total number of people in a building at a given time.
In this example, each time an entry or exit is performed, the displayed number displayed will
increment or decrement, respectively. The Refresh button immediately refreshes the data. Otherwise,
the data will refresh every few seconds.
7-4 ___________________________________________________________ Advanced Features
7.4 Setup Options
7.4.1 Controller Tab
AXSalert provides the capability to define the parameters of each AXS-100 controller (1 to 8) in each
loop.
To set local parameters, do the following:
Click Setup then Options from the Menu Bar. Click the Controller Tab. The following window
appears:.
Figure 78. Setup, Options - Controller Tab
Advanced Features __________________________________________________________ 7-5
Title
Description
Mode
Description
#
Doors
Readers
APB
Comments
1
2
2
Hard
2
1
2
No
One reader
3
2
2
Soft
Entry once but exit many
4
1
2
Soft
Entry once but exit many
5
2
2
Yes
Both entry in APB mode
6
1
2
Hard
For each key entry, there must be a key exit through
the same door
7
2
2
No
No interaction between the two locks
8
2
2
Yes
Both entry in APB mode
9
Elevator
For each key entry in 1 door, there must be a key
exit through the other door
Elevator control using IOX-4 add-on cards
APB Reset
The actual hour of clearing APB. The time format is European, i.e. 24
hours: 0 - 23. After this hour, the APB is reset. Entering 99 disables the
reset feature.
APB Timeout
Cancels anti-passback rules in durations of half hours. 48 half hours
(total of 24 hours) is the default.
Alarm RT
Alarm relay time. Time that the alarm relay is active for an alarm event.
Reader
communication
The number of times that the reader sends messages to the controller. If
the controller has not received the message after this number of times has
elapsed, then a communication failure message will be issued.
Network
transmission
The number of times that controllers send messages among themselves.
If the controller has not received the message after the indicated number
of times has elapsed, then a communication failure message will be
issued.
Reader loop delay
Must be set when two readers are working in a back-to-back
configuration, e.g., on either side of a door, so that their transmissions do
not interfere with one another. Set in increments of 10 milliseconds. For
this function to work, the toggle readers check box must be marked. See
below in this table.
Door position
debounce
Amount of time that elapses in increments of 10 milliseconds until
another reading can be performed. Intended to prevent a double reading
by the sensor in cases where the door physically “bounces” when closed.
Printer line pacing
Sets the time that elapses in increments of 10 milliseconds when printing
is directly performed from the controller.
PC ack timeout
PC acknowledge timeout. The time that the controller waits to receive an
acknowledge signal from the PC.
Bolt time relock
The period of time that passes from whenever the door is closed until it
locks.
7-6 ___________________________________________________________ Advanced Features
Title
Description
Reserved
For future use.
Door ajar timeout
Should be 65535.
System number
The system number for purposes of modem communications. Usually
used for technical support.
PC password
For future use.
7.4.2 Advanced Tab
Click Setup then Options from the Menu Bar. Click the Advanced Tab. The following window
appears:
Figure 79. Setup, Options - Advanced Tab
Title
Flag 1 Bit 1
Flag 1 Bit 2
Flag 1 Bit 3
Flag 1 Bit 4
Description
Alarm on invalid key - If this flag is set, any invalid key will cause the
AXS-100 controller to display an invalid key message and to turn on the
alarm relay
Display PIN code in the controller - If activated, the PIN code is
displayed after adding a new key. This feature should be turned on if an
RDK-4 (proximity reader with keypad) is connected to the controller.
Following display of the key number, the 4-digit PIN code will display
for a few seconds
Reserved
Enable buzzer on alarm/ trouble - If the buzzer is enabled and there is
at least one unacknowledged event, the buzzer will sound every 4
seconds.
Default
OFF
OFF
OFF
OFF
Advanced Features __________________________________________________________ 7-7
Flag 1 Bit 5
Flag 1 Bit 6
Flag 1 Bit 7
Flag 1 Bit 8
Flag 2 Bit 1
Flag 2 Bit 2
Flag 2 Bit 3
Flag 2 Bit 4
Flag 2 Bit 5
Flag 2 Bit 6
Flag 2 Bit 7
Flag 2 Bit 8
Flag 3 Bit 1
Flag 3 Bit 2
Flag 3 Bit 3
Flag 3 Bit 4
Flag 2 Bit 5
Flag 3 Bit 6
Flag 3 Bit 7
Flag 3 Bit 8
Wait for acknowledge - Wait for acknowledgment from software. The
AXS-100 controller can upload its setup and key database to the
computer via RS-232. If the software in the computer is AXS-100 ready
and able to send an acknowledgement for each received message, mark
the check box.
Half time opening when battery is in use - Causes the controller to
shorten open time by half when powered by a backup battery.
Alarm relay in alarm/ trouble - Mark the check box if control is by the
controller. Unmark the check box if control is by the computer.
Door relays direct control - Mark the check box if control is by the
controller. Unmark the check box if control is by the computer
Dial out when event count exceeds - The controller will attempt to dial
out using a modem when the new event count has exceeded the number
in the data register.
Auto answer after one ring - Auto answer after 1 ring. If an external
modem is connected to the AXS-100 RS-232 terminal, the modem will
be initialized to answer after ringing once after power up, as well as
every time a message fails to be acknowledged by the PC.
Dial out on alarm - The controller will attempt to dial out using a
modem when an alarm is detected from any controller
Send events in text mode - Sends the event messages in text mode. If
the flag is cleared, the controller will send messages in numeric mode.
Events cause IOX-4 relays 26 to 32 to click - Activate relays 26 to 32
depending on the event type
Stop APB decrement - Stops the decrementing of anti-pass back
counters
Controller #1 catches alarms/troubles - Captures alarm/problem events
from other controllers. If cleared, controller #1 will not display and will
close the alarm relay upon receipt of an alarm/problem indication from
other controllers
Allow loop-wide APB operations - Anti-pass back is loop-wide.
Controllers #2 to #8 can share entry/exit data between themselves to
allow for loop-wide anti-pass back operation.
Beep when a key is presented to the RDR-4B - For controlling the
buzzer of the RDR-4B while green or red color is displayed
Trigger APB only if the door is opened - Delayed anti-passback action
when the door opens if the flag is marked. If door is not opened, antipassback is not set. Can also be used for reporting normal entry when the
door opens in non-anti-pass back mode.
Allow only one lock to be opened - Single lock will open at any one
time for both reader and RTE.
Reserved
Reserved
Enable broadcast setup messages to #2-#8 - Enables/disables broadcast
of all setup messages from the PC to controllers #2 to #8.
Buzzer when key is pressed - Enables/disables key-press buzzer
Reserved
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
ON
ON
ON
ON
OFF
OFF
ON
ON
OFF
7-8 ___________________________________________________________ Advanced Features
7.4.3 Extended Tab
Click Setup then Options. Click the Extended Tab from the Menu Bar. The following window
appears:
Figure 80. Setup, Options - Extended Tab
Title
Flag 4 Bit 1
Flag 4 Bit 2
Flag 4 Bit 3
Flag 4 Bit 4
Flag 4 Bit 5
Flag 4 Bit 6
Flag 4 Bit 7
Flag 4 Bit 8
Flag 5 Bit 1
Flag 5 Bit 2
Flag 5 Bit 3
Flag 5 Bit 4
Flag 5 Bit 5
Flag 5 Bit 6
Description
Alarm Functionality using IOX-4 boards – AXSalert enables
connecting up to 4 I/O cards, each with 8 input and 8 output ports. A
system of sensors can then be connected to the ports to provide highlevel security. Marking the check box activates these boards (if installed)
Global arm/disarm of alarm system – When marked, enables
activation of all the controllers in all loops
Ignore RTE input
Report write operation TO Flash EPPROM
Print paper slip if VALID KEY in #2-#8
Alarm relay is used with register 0 as up/down counter
Do not use Time Zone in key Add/Modify. Use Access Level instead
Enable the use of Prevent Entry bitmap table
Enable IOX-4 board #1
Enable IOX-4 board #2
Enable IOX-4 board #3
Enable IOX-4 board #4
Relock after 2-seconds open – If ON, door becomes released and locks
again only after entry (for emergency situations such as fire, etc.).
Motorized bolt – Motorized bolt door lock functionally for locks witch
unlock time of zero seconds.
Default
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
OFF
Advanced Features __________________________________________________________ 7-9
Flag 5 Bit 7
Flag 5 Bit 8
Use tamper input to relocks both door locks.
Reset controller if RDR comm. Faile - Reset controller if any reader is
not communication to more then 3 minutes
OFF
ON
7.4.4 Software Tab
Click Setup, Options from the Menu Bar. Click the Software Tab. The following window appears:
Figure 81. Setup, Options – Software Tab
Title
Description
Delay after
acknowledge
This is the time delay before a second message is sent from the PC
to controller
Delay after event
The time delay between the display of two consecutive events. If
this setting enables a very short delay other AXSalert features may
be impaired such as the display of pictures in the User window.
Send timeout
The time that the computer waits after sending a command to the
controller and before sending the same command a second time.
Event remains on map
When an event occurs the event window opens and remains on map
for the indicated time period (in msec).
Maximum events
The maximum number of events that can be displayed in the events
window (999,999).
Pump software events
When marked, this enables the display of software events in the
Events window.
Auto upload events on
setup
Automatically uploads events from the controller to the computer
when the computer is booted.
7-10 __________________________________________________________ Advanced Features
Title
Description
Language
Enables changing the AXSalert interface language. After locating
the correct .wct language file using the Browse button, click Set
language. The program interface changes to the selected language
without having to leave the application.
Database directory
Enables changing the current folder of the AXSalert database. The
database location was originally determined when AXSalert
software was installed.
7.4.5 Communication Tab
This window contains the main parameters for defining the communication between the computer,
controller and network (refer to section 5.3).
Troubleshooting_____________________________________________________________ 8-1
CHAPTER 8
Troubleshooting
8.1 Controller Not Responding
Problem:
The following message is displayed:
Figure 82 Communication Failure Message
Action:
1. Check the cable between the AXS-100 and the PC and verify that its wires are
connected correctly on both ends.
2. In the AXSalert click on Setup → Options → Communication and verify that the
AXS-100 and the RDR-PXT is connected to the correct COM ports.
3. If the problem persists, after changing the COM ports, the COM ports connections
need to be checked. It can be done using the Hyper Terminal utility provided with the
operating system. (From the Start menu, select Programs → Accessories →
[Communications]→ Hyper Terminal), as follows:
a. Double click on the ‘Hypertrm.exe’ icon
The following window is displayed:
b. Give the connection any name you want and click OK.
The following window is displayed:
8-2 _____________________________________________________________ Troubleshooting
c. Set the COM port to be tested (probably Com1 for the controller and Com2 for the
Reader).
The following window is displayed:
d. Set the following parameters:
Bit per second: 9600
Data bits: 8
Parity: None
Flow control: None
e. Click OK
If all is OK, you should have the following window opened.
Troubleshooting_____________________________________________________________ 8-3
If the port is used by another application the following message is displayed:
Close the other application and run AXSalert again.
f. If no messages are displayed, and you want to check the communication between the
controller and the PC, generate an event in the AXS-100 (e.g. AXS-100 Login and
Logout).
g. Should the connection work well you should see the events displayed on the window’s
client area (the white area).
8-4 _____________________________________________________________ Troubleshooting
For example:
To check the reader’s communication:
Perform the above steps a - e.
Present a tag/card to the reader. Make sure the reader’s LED turns green once you
present the tag.
If the connection to the reader is OK the window’s contents should be filled with
hexadecimal digits (0-9 and A-F). For example:
If any of the connections does not work – you don’t see anything on the screen, recheck your connections. If the problem persists, contact your administrator or PC
vendor.
If data is displayed on the Hyper Terminal screen but the connection between
AXSalert and AXS-100 still can’t be established, check the connection wires
between the controller and the PC.
Make sure all wires are connected as specified in the AXS-100 Installation Manual
(or on the inner side of the AXS-100 box door).
Troubleshooting_____________________________________________________________ 8-5
Problem
On startup the following error message is displayed:
Action
Another application uses the controller’s Com port. Close this application and restart
AXSalert.
Problem
On startup the following error message is displayed:
Action
Another application uses the reader’s Com port. Close this application and restart
AXSalert.
Problem
When the Users screen is displayed, the database navigation buttons blink.
Action
Make sure there is no key around the RDR-PXT.
Problem
Holiday date – Setting the holiday date to the desired date is done with no problems.
However, when the holidays row is not highlighted any more, its date format is
changed.
Action
To set the Windows date format, click My Computer → Control Panel → double
click Regional Settings icon.
8-6 _____________________________________________________________ Troubleshooting
The following window is displayed:
This is the date
format currently
set in Windows
Select the date tabulator.
Write down the date format used by your PC (either dd/MM/yy for European date
format or MM/dd/yy for American date format).
Run AXSalert.
Problem
Missing Events - The AXSalert was working all night, but events that happened
during the night were not saved to the PC.
Action
The PC’s power management is set to be turned off after a predefined time.
Set the Power Management’s (under the Control Panel) parameters to be always on.
Problem
Password forgotten - The password is forgotten.
Action
You need to call VisonicTechnologies for a new password.
VisonicTechnologies
30 Habarzel St.
Tel Aviv 69710 ISRAEL
Tel: 972 – 3 - 768 1400
Fax: 972 - 3 - 768 1415
[email protected]
Frequently Asked Questions ___________________________________________________ 9-1
CHAPTER 9
Frequently Asked Questions (FAQ)
This chapter contains questions that are frequently asked by users regarding AXSalert.
We recommend that you consult this chapter first for answers to your questions before referring to
your distributor or to VisonicTechnologies technical support.
This is not a FAQ of the entire AXS-100 system. For answers to questions about the system, refer to
the documentation that accompanies the system components.
What are the advantages of AXSalert compared with AXSoft-100?
AXSalert has several very important advantages. First, the maximum number of doors in a AXSalert
system is 1,750. Therefore, AXSalert is appropriate for even large sites. Second, AXSalert can operate
over TCP/IP so it integrates well with the existing site network. Third, AXSalert is user-friendly and
day-to-day use is intuitive. Fourth, many types of reports can be generated. These reports cover the
entire range of AXSalert operation.
I am presently using AXSoft-100. Can I upgrade to AXSalert?
Yes. To upgrade, contact your supplier or VisonicTechnologies directly.
Is AXSalert suitable for multiple sites?
Yes. AXSalert has a built-in client/server capability. Each site can supervise access to its own
facilities.
Does AXSalert perform all the programming activities that the AXS-100 controller performs?
Yes. You will be able to perform all programming activities from the desktop, without having to send
a technician into the field to handle a AXS-100 controller. These activities include adding, deleting
and modifying details of keys (users), viewing system events (such as violations of access privileges),
setting door parameters, generating reports of system activity.
Are there any instances for which a technician will have to perform activities at the controller
box?
The AXSalert system is hardware based. Readers and doors are connected by wires to the controller,
and the controllers are connected to one another serially by cable and finally to the PC. Therefore, if
there is a hardware failure, a technician will have to be sent into the field to solve it.
When setting up AXSalert, how do I know which doors recorded in the PC refer to which
readers in the field?
Generally, in a single controller, Reader 1 is connected at the left side of the controller and Reader 2 to
the right side. However, for larger systems, it is recommended that the doors recorded at setup time be
cross-checked with someone at the controller site.
Can I determine in advance the types of system events that will be displayed?
No. All events received from the controller are automatically displayed in the AXSalert Events
window (the AXSalert opening window). A full list of all possible events is presented in appendix C
in this manual.
Can I determine in advance how different kinds of system events will be displayed?
9-2 ____________________________________________________Frequently Asked Questions
Yes. AXSalert enables the user to color-code different types of events such as “forced door”, invalid
key”, etc.
Does AXSalert have a graphic map display capabilities?
Yes. AXSalert contains a capability for building maps on which access objects (such as controllers,
readers, cameras, etc.) can be placed. When an event occurs, the event message is displayed on the
specific access object on the map. The map can be set to “pop up” on-screen when an event occurs,
showing the event’s location.
How can I backup AXSalert files?
AXSalert has an in-built Backup and Restore function to make this procedure easy. You can
selectively backup and restore events or system data. It is not necessary to use any third-party backup
software.
What database does the AXSalert use?
The database currently used by AXSalert is Microsoft Access.
Can I export the database to other applications?
Yes. Reports generated in AXSalert can be saved as Microsoft Excel-compatible files and opened in
Microsoft Excel file for further analysis.
How does the AXSalert software know how many controllers are currently in the system?
The software will identify the number of installed controllers because the addresses of each controller
are set by dip switches when the hardware is first installed. (Refer to the AXS-100 Installation
Instructions). AXSalert polls each controller and receives status messages including the controller
number.
The ‘Controller(s) status’ window shows a tabulator for each controller connected in the network,
along with its number.
What happens if the system does not recognize an employee’s password?
Company personnel with “Admin” privilege can change the password of any user, even those
employee’s who have forgotten their passwords.
What happens if the system does not recognize any passwords?
Call VisonicTechnologies Technical Support. This problem can easily be handled in a short telephone
call.
What is anti-passback?
This feature enables two readers to be used at a single door – one outside and the other inside. After entry,
the door will lock and not open again for the same key unless the key was read by the reader on the inside
of the door. In this manner, an authorized person who is inside cannot enter again until he/she passes the
card again from the inside when leaving. This is intended to restrict the habit of passing cards between
workers.
Frequently Asked Questions ___________________________________________________ 9-1
CHAPTER 9
Frequently Asked Questions (FAQ)
This chapter contains questions that are frequently asked by users regarding AXSalert.
We recommend that you consult this chapter first for answers to your questions before referring to
your distributor or to VisonicTechnologies technical support.
This is not a FAQ of the entire AXS-100 system. For answers to questions about the system, refer to
the documentation that accompanies the system components.
What are the advantages of AXSalert compared with AXSoft-100?
AXSalert has several very important advantages. First, the maximum number of doors in a AXSalert
system is 1,750. Therefore, AXSalert is appropriate for even large sites. Second, AXSalert can operate
over TCP/IP so it integrates well with the existing site network. Third, AXSalert is user-friendly and
day-to-day use is intuitive. Fourth, many types of reports can be generated. These reports cover the
entire range of AXSalert operation.
I am presently using AXSoft-100. Can I upgrade to AXSalert?
Yes. To upgrade, contact your supplier or VisonicTechnologies directly.
Is AXSalert suitable for multiple sites?
Yes. AXSalert has a built-in client/server capability. Each site can supervise access to its own
facilities.
Does AXSalert perform all the programming activities that the AXS-100 controller performs?
Yes. You will be able to perform all programming activities from the desktop, without having to send
a technician into the field to handle a AXS-100 controller. These activities include adding, deleting
and modifying details of keys (users), viewing system events (such as violations of access privileges),
setting door parameters, generating reports of system activity.
Are there any instances for which a technician will have to perform activities at the controller
box?
The AXSalert system is hardware based. Readers and doors are connected by wires to the controller,
and the controllers are connected to one another serially by cable and finally to the PC. Therefore, if
there is a hardware failure, a technician will have to be sent into the field to solve it.
When setting up AXSalert, how do I know which doors recorded in the PC refer to which
readers in the field?
Generally, in a single controller, Reader 1 is connected at the left side of the controller and Reader 2 to
the right side. However, for larger systems, it is recommended that the doors recorded at setup time be
cross-checked with someone at the controller site.
Can I determine in advance the types of system events that will be displayed?
No. All events received from the controller are automatically displayed in the AXSalert Events
window (the AXSalert opening window). A full list of all possible events is presented in appendix C
in this manual.
Can I determine in advance how different kinds of system events will be displayed?
9-2 ____________________________________________________Frequently Asked Questions
Yes. AXSalert enables the user to color-code different types of events such as “forced door”, invalid
key”, etc.
Does AXSalert have a graphic map display capabilities?
Yes. AXSalert contains a capability for building maps on which access objects (such as controllers,
readers, cameras, etc.) can be placed. When an event occurs, the event message is displayed on the
specific access object on the map. The map can be set to “pop up” on-screen when an event occurs,
showing the event’s location.
How can I backup AXSalert files?
AXSalert has an in-built Backup and Restore function to make this procedure easy. You can
selectively backup and restore events or system data. It is not necessary to use any third-party backup
software.
What database does the AXSalert use?
The database currently used by AXSalert is Microsoft Access.
Can I export the database to other applications?
Yes. Reports generated in AXSalert can be saved as Microsoft Excel-compatible files and opened in
Microsoft Excel file for further analysis.
How does the AXSalert software know how many controllers are currently in the system?
The software will identify the number of installed controllers because the addresses of each controller
are set by dip switches when the hardware is first installed. (Refer to the AXS-100 Installation
Instructions). AXSalert polls each controller and receives status messages including the controller
number.
The ‘Controller(s) status’ window shows a tabulator for each controller connected in the network,
along with its number.
What happens if the system does not recognize an employee’s password?
Company personnel with “Admin” privilege can change the password of any user, even those
employee’s who have forgotten their passwords.
What happens if the system does not recognize any passwords?
Call VisonicTechnologies Technical Support. This problem can easily be handled in a short telephone
call.
What is anti-passback?
This feature enables two readers to be used at a single door – one outside and the other inside. After entry,
the door will lock and not open again for the same key unless the key was read by the reader on the inside
of the door. In this manner, an authorized person who is inside cannot enter again until he/she passes the
card again from the inside when leaving. This is intended to restrict the habit of passing cards between
workers.
Appendix __________________________________________________________________ A-1
APPENDIX
List of Events
Valid key
Presentation of a valid key to a key reader and entry of a key holder
through a door using a valid key.
Invalid key
Presentation of an invalid key to a key reader.
Add key
Add new key to the user database.
Modify key
Modify data of a user who has a key already existing in the user
database.
Delete key
Delete a key currently in the database.
Set setup
A setup change performed at the controller. Generally, a download
using Advanced functions or a download of doors setup data.
Erase DB
Erasing of the database from the controller.
Forced door
The door was opened even though the lock was not..
Door left open
Door was left open after a valid entry.
Door restored
Closing the door at the site or from the PC.
Press to exit
Button at site must be pressed to exit.
Login
Login performed at controller.
Logout
Logout performed at controller
RC Comm error
Communication error between controllers.
RC Comm restored
Communication error between controllers was corrected.
RDR Comm failed
Failure in communication between reader and controller.
RDR Comm restored
Communication error between controllers and reader was corrected.
Time zone failed
Key holder with valid key attempted to enter at a time when he was
not permitted.
Invalid door
Key holder with valid key attempted to enter a door that was not
defined for him.
Power failed
Electrical power has failed. Generally, battery power would begin
to operate in this case.
Power restored
Electrical power has been restored.
Battery failed
Controller battery power has failed.
Battery restored
Controller battery power has been restored.
A-2___________________________________________________________________Appendix
T&A Exit
Current mode of the system when operating as a worker attendance
time clock is set for exit.
T&A Entry
Current mode of the system when operating as a worker attendance
time clock is set for entry.
Valid exit
Valid exit by key holder.
Ctrl tamper
Controller door has been opened. This function is generally
connected to an alarm.
Download
Data download to the controller performed.
Download failed
Download of data to controller failed.
Key expired
The key’s date has expired. It must be renewed.
Invalid APB
The key has been presented to the reader, but the user has already
passed through the current door.
Other lock open
One door is still open while trying to open a second door. (Doors
have been defined to be opened consecutively.)
Long read
Tag can be continuously presented to the reader for more than 3
seconds.
Auto open
Door is automatically opened at a given time as a result of
predefinition.
Auto close
Door is automatically closed at a given time as a result of
predefinition.
Open lock externally
Door opened from the PC.
Input trouble
Problem in transfer of input from an external device (IOX-4) or
controller input to the controller itself.
Input restored
Problem in transfer of input from external device to controller was
corrected.
Flash write error
Problem with writing to flash memory of the controller.
Input normal
External device transmitting input normally.
Input triggered
Input from external device was triggered for setting off an alarm.
Alarm armed
The alarm device was armed.
Alarm disarmed
The alarm device was disarmed.
Double tag
Two tags are required to enter the facility.
Notified event
Acknowledgement was performed from the PC (event was doubleclicked and “grayed”).
Software login
Login performed from the PC.
Software logout
Logout performed from the PC.
Appendix __________________________________________________________________ A-3
Enter privileges
PC software event.
Upload
PC software event. Data uploaded from controllers.
Download
PC software event. Data downloaded to controllers.
Restore
PC software event. Database restored from backup file.
User Added
PC software event. New user added.
User deleted
PC software event. Current user deleted.
Users downloaded
PC software event. Only user data downloaded to controller.
Access level added
PC software event. A new Access Level has been added.
Access level deleted
PC software event. A current Access Level has been deleted.
Door deleted
PC software event. A current door has been deleted.
Doors downloaded
PC software event. Doors data has been downloaded to controller.
Time zone deleted
PC software event. A current Time Zone has been deleted.
Time zones downloaded
PC software event. Time Zones data has been downloaded to the
controller.
Holiday added
PC software event. A new Holiday has been added.
Holiday deleted
PC software event. A current Holiday has been deleted.
Holidays downloaded
PC software event. Holidays data has been downloaded to the
controller.
Setup download
PC software event. Setup data (entered at the Advanced menu) has
been downloaded to the controller.
Glossary __________________________________________________________________ G-1
GLOSSARY
Access Level
An Access Level is the right given via AXSalert for
personnel to access a certain door or set of doors during
specific time durations (Time Zones).
Anti-passback
(APB)
This feature enables two readers to be used at a single door –
one outside and the other inside. After entry, the door will
lock and not open again for the same key unless the key was
read by the reader on the inside of the door. In this manner,
an authorized person who is inside cannot enter again until
he/she passes the card again from the inside when leaving.
This is intended to restrict the habit of passing cards between
workers.
Backup
An AXSalert feature that enables copying the current
AXSalert user and event databases to another folder for
reference if the current files are destroyed or corrupted.
Download
The process of transmitting data from the PC to the
controller. Downloading is performed if the computer was
offline and user data changed, if Access Levels were changed
or if system settings were changed.
Enrolling keys
The procedure for inputting key data into the system using a
key reader such as VisonicTechnologies RDR-PC.
Event
Any occurrence that has an effect on system access. This
includes simple events from opening a door to complex
hardware and communication problems. For example, a valid
entry through a door is recorded as a “Valid key”, and the
entry through a door without presenting a valid key is
recorded as “Forced door”. Currently, approximately 60
types of events are recorded by AXSalert (appendix C).
Holidays
Designated dates on which key holders are denied access to
doors to which they usually have access.
Loop
A loop can contain a maximum of 8 controllers and 16
readers.
Offline
Performing activities when the PC is not connected to the
controller. Offline operation has implications for certain
activities. If users were added, modified or deleted offline, it
will be necessary to perform a special download procedure
when the computer goes online.
G-2 __________________________________________________________________ Glossary
Online
Performing activities when the PC is connected to the
controller. Online operation has implications for certain
activities. If users were added, modified or deleted online, it
is unnecessary to perform a special download procedure.
PAL
Refer to Personal Access Level.
Personal Access
Level
An Access Level that applies to a single key holder.
Privilege
The right to perform activities on the AXSalert system either
from the PC or from the controller. AXSalert has four levels
of privilege: Events only, Events and Users, All, and Admin.
Reader
A device for identifying keys. The most common type of
reader are those on doors to permit entry/exit.
Restore
AXSalert feature that enables copying the backed up user and
event database files to the current AXSalert folder. This is
usually performed if the current files are destroyed or
corrupted.
Time Zone
A designated time period in which the key holder can freely
enter and exit the door to which he has access.
Upload
The process of transmitting data from the controller to the
PC. Uploading is usually performed after the computer has
been offline or shut down and the new events have to be
transferred from the controllers to the PC for examination.