AXSalert
Transcription
AXSalert
AXSalert User Guide Building Automation Management System 2005 AXSalert DE6323U (REV. 3, 03/2005) VT UK (Visonic Technologies UK: Fraser Road, Priority Business Park, Bedford MK44 3WH ENGLAND. Tel: 44-870-730-0840 Fax: 44-870-730-0839 Internet: www.visonictech.com VisonicTechnologies Visonic Technologies: 30 Habarzel St. Tel Aviv 69710 ISRAEL Tel: 972 3 768 1400 Fax: 972 3 768 1415 Technical Support Email: [email protected] VTA (Visonic Technologies Americas): 65 West Dudley Town Road, Bloomfield CT. 06002-1911. Tel: (860) 243-0833, (800) 223-0020 Fax: (860) 242-8094 Email: [email protected] Contact Information Should you have any questions regarding our services, please feel free to contact us directly or visit our Internet home page or contact our local distributors. Web: http://www.visonictech.com Visonic Technologies Ltd. 30 Habarzel St. Tel-Aviv 69710 ISRAEL Tel: 972 - 3 - 768 1400 Fax: 972 - 3 - 768 1415 [email protected] VT UK (Visonic Technologies UK Fraser Road, Priority Business Park Bedford MK44 3WH ENGLAND. Tel: 44-870-730-0840 Fax: 44-870-730-0839 VTA (Visonic Technologies Americas) 65 West Dudley Town Road Bloomfield CT. 06002-1911. Tel: (860) 243-0833, (800) 223-0020 Fax: (860) 242-8094 [email protected] Copyright and Warranty _________________________________________________________i © Copyright 2005 by VisonicTechnologies Ltd., 30 Habarzel Street, Tel-Aviv 69710, ISRAEL. All Rights Reserved. No part of this publication may be reproduced or distributed in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of VisonicTechnologies Ltd. TRADEMARKS VisonicTechnologies, AXSalert, AXS-100 are registered trademarks of VisonicTechnologies Ltd. Microsoft is a registered trademark of Microsoft Corp. All other products or services referred to in this manual are the trademarks, service marks, or product names of their respective holders. DISCLAIMER: The information, products and specifications, configurations, and other technical information regarding the products contained in this manual are subject to change without notice. All the statements, technical information, and recommendations contained in this manual are believed to be accurate and reliable but are presented without warranty of any kind, and users must take full responsibility for the application of any products specified in this manual. IN NO EVENT SHALL VISONICTECHNOLOGIES OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF VISONICTECHNOLOGIES HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. WARRANTY VisonicTechnologies Ltd. and/or its subsidiaries and its affiliates ("the Manufacturer") warrants its products hereinafter referred to as "the Product" or "Products" to be in conformance with its own plans and specifications and to be free of defects in materials and workmanship under normal use and service for a period of 12 months from the date of shipment by the Manufacturer. The Manufacturer's obligations shall be limited within the warranty period, at its option, to repair or replace the product or any part thereof. This warranty does not apply in the following cases: improper installation, misuse, failure to follow installation and operating instructions, alteration, abuse, accident or tampering. This warranty is exclusive and expressly in lieu of all other warranties, obligations or liabilities, whether written, oral, express or implied, including any warranty of merchantability or fitness for a particular purpose, or otherwise. In no case shall the Manufacturer be liable to anyone for any consequential or incidental damages for breach of this warranty or any other warranties whatsoever, as aforesaid. This warranty shall not be modified, varied or extended, and the Manufacturer does not authorize any person to act on its behalf in the modification, variation or extension of this warranty. This warranty shall apply to the Product only. All products, accessories or attachments of others used in conjunction with the Product, including batteries, shall be covered solely by their own warranty, if any. The Manufacturer shall not be liable for any damage or loss whatsoever, whether directly, indirectly, incidentally, consequentially or otherwise, caused by the malfunction of the Product due to products, accessories, or attachments of others, including batteries, used in conjunction with the Products. The Manufacturer does not represent that its Product may not be compromised and/or circumvented, or that the Product will prevent any death, personal and/or bodily injury and/or damage to property resulting from unauthorized entry, burglary, robbery, or otherwise, or that the Product will in all cases provide adequate warning or protection. User understands that a properly installed and maintained access control system may only reduce the risk of unauthorized entry without warning, but it is not insurance or a guarantee that such will not occur or that there will be no death, personal damage and/or damage to property as a result. ii_________________________________________________________ Copyright and Warranty The Manufacturer shall have no liability for any death, personal and/or bodily injury and/or damage to property or other loss whether direct, indirect, incidental, consequential or otherwise, based on a claim that the Product failed to function. However, if the Manufacturer is held liable, whether directly or indirectly, for any loss or damage arising under this limited warranty or otherwise, regardless of cause or origin, the Manufacturer's maximum liability shall not in any case exceed the purchase price of the Product, which shall be fixed as liquidated damages and not as a penalty, and shall be the complete and exclusive remedy against the Manufacturer. Contents ____________________________________________________________________ iii CONTENTS Copyright and Warranty....................................................................................................................... i SOFTWARE LICENSE AGREEMENT ........................................................................................... ix LIMITED WARRANTY AND LIMITATION OF LIABILITY...................................................... x PREFACE............................................................................................................................................. xi About This Manual ................................................................................................................................ xi Who Should Use this Manual ................................................................................................................ xi Document Conventions......................................................................................................................... xii About VisonicTechnologies ................................................................................................................... xii Available Access Control Software Products ...................................................................................... xiii CHAPTER 1 INTRODUCTION TO AXSALERT......................................................................... 1-1 1.1 System Overview ........................................................................................................................... 1-1 1.2 AXSalert Application..................................................................................................................... 1-1 1.2.1 RDR-PXT .............................................................................................................................. 1-3 1.2.2 Door Configurations .............................................................................................................. 1-3 1.2.3 Additional System Features ................................................................................................... 1-4 1.3 Multi-Site Edition .......................................................................................................................... 1-4 1.3.1 Site Properties........................................................................................................................ 1-5 1.3.2 Phone/IP Number Rules ........................................................................................................ 1-5 CHAPTER 2 AXSALERT INSTALLATION ................................................................................. 2-1 2.1 General ........................................................................................................................................... 2-1 2.2 PC Requirements............................................................................................................................ 2-1 2.3 Software Installation ...................................................................................................................... 2-2 CHAPTER 3 INITIAL ACCESS TO AXSALERT SOFTWARE................................................. 3-1 3.1 General ........................................................................................................................................... 3-1 3.2 Initial Entry with VisonicTechnologies supplied............................................................................ 3-1 3.3 Changing the Initial Password ....................................................................................................... 3-4 CHAPTER 4 AXSALERT BASICS ................................................................................................. 4-1 4.1 Application Concept ...................................................................................................................... 4-1 4.2 Menu Bar ....................................................................................................................................... 4-2 4.2.1 File ......................................................................................................................................... 4-2 4.2.1.1 Login ........................................................................................................................... 4-2 4.2.1.2 Logout ......................................................................................................................... 4-2 4.2.1.3 Exit .............................................................................................................................. 4-2 4.2.2 View ...................................................................................................................................... 4-2 4.2.2.1 Toolbar ........................................................................................................................4-2 4.2.2.2 Status Bar .................................................................................................................... 4-2 4.2.2.3 Maps............................................................................................................................ 4-2 4.2.2.4 User Trace ................................................................................................................... 4-2 4.2.2.5 Status ........................................................................................................................... 4-3 4.2.2.6 Counters ...................................................................................................................... 4-3 4.2.2.7 Monitors ...................................................................................................................... 4-3 4.2.2.8 Doors Control.............................................................................................................. 4-3 iv ____________________________________________________________________ Contents 4.2.3 Setup ...................................................................................................................................... 4-3 4.2.3.1 Options ........................................................................................................................ 4-3 4.2.3.2 Access Levels.............................................................................................................. 4-3 4.2.3.3 Holidays ......................................................................................................................4-3 4.2.3.4 Time Zones.................................................................................................................. 4-3 4.2.3.5 Users............................................................................................................................ 4-4 4.2.3.6 Doors ........................................................................................................................... 4-4 4.2.3.7 Privileges..................................................................................................................... 4-4 4.2.3.8 Events Setup................................................................................................................ 4-4 4.2.3.9 Multi-computer ........................................................................................................... 4-4 4.2.4 Operation ............................................................................................................................... 4-4 4.2.4.1 Upload / Download ..................................................................................................... 4-4 4.2.4.2 Backup / Restore ......................................................................................................... 4-4 4.2.4.3 Map Generator ............................................................................................................ 4-4 4.2.4.4 Reports ........................................................................................................................ 4-4 4.2.5 Help ....................................................................................................................................... 4-5 4.2.5.1 Help ............................................................................................................................. 4-5 4.2.5.2 Register .......................................................................................................................4-5 4.2.5.3 About AXSalert........................................................................................................... 4-5 4.3 Main Toolbar.................................................................................................................................. 4-5 4.4 Setup Toolbars ............................................................................................................................... 4-6 4.5 Customizing Window .................................................................................................................... 4-7 4.5.1 Scroll Bars ............................................................................................................................. 4-7 4.5.2 Changing Column Width....................................................................................................... 4-7 4.5.3 Sorting Users (Ascending / Descending)............................................................................... 4-8 4.5.4 Color Coding Events.............................................................................................................. 4-8 4.5.5 Color Coding Key Holders .................................................................................................... 4-8 CHAPTER 5 SETUP ......................................................................................................................... 5-1 5.1 General ........................................................................................................................................... 5-1 5.2 Preparations.................................................................................................................................... 5-1 5.3 Setting Up Computer Serial Ports .................................................................................................. 5-2 5.4 Doors Setup ................................................................................................................................... 5-3 5.5 Holidays Setup ............................................................................................................................... 5-5 5.6 Time Zones Setup .......................................................................................................................... 5-6 5.7 Access Levels................................................................................................................................. 5-7 5.8 Events Setup................................................................................................................................. 5-10 5.9 Enrolling New Keys and Users .................................................................................................... 5-11 5.9.1 Enrolling a New Key ........................................................................................................... 5-12 5.10 Assigning Privileges .................................................................................................................. 5-13 5.11 Download Procedure.................................................................................................................. 5-15 5.12 Multi-computer Setup ................................................................................................................ 5-16 CHAPTER 6 OPERATING AXSALERT ...................................................................................... 6-1 6.1 Viewing Events .............................................................................................................................. 6-1 6.1.1 Color-coding Events .............................................................................................................. 6-3 6.1.2 Event Reports ........................................................................................................................ 6-4 6.1.2.1 One-time Only Reports ............................................................................................... 6-4 Contents ____________________________________________________________________ v 6.1.3 Report Templates................................................................................................................... 6-5 6.1.4 Printing and Saving Reports .................................................................................................. 6-7 6.2 Viewing and Managing User Keys ................................................................................................ 6-8 6.2.1 User Data Description............................................................................................................ 6-8 6.2.2 Color-coding Key Holders................................................................................................... 6-10 6.2.3 User Properties..................................................................................................................... 6-11 6.2.3.1 Access Button............................................................................................................ 6-11 6.2.3.2 Picture Button............................................................................................................ 6-13 6.2.4 User Trace............................................................................................................................ 6-15 6.2.5 Creating a Report of Users................................................................................................... 6-16 6.2.5.1 General Report .......................................................................................................... 6-17 6.2.5.2 Time and Attendance Report..................................................................................... 6-17 6.2.5.3 Unused Key Report ................................................................................................... 6-19 6.2.5.4 Expired Key Report................................................................................................................ 6-19 6.2.5.5 By Door Report...................................................................................................................... 6-20 6.2.5.6 Generating a Report ............................................................................................................... 6-21 6.2.6 Report Templates, Printing and Saving .............................................................................. 6-21 6.2.7 Modifying User Data ........................................................................................................... 6-22 6.2.8 Deleting a User .................................................................................................................... 6-22 6.2.9 Adding a New User ............................................................................................................. 6-23 6.2.10 Downloading Users ........................................................................................................... 6-23 6.3 Backup / Restore .......................................................................................................................... 6-25 6.3.1 Backup ................................................................................................................................. 6-25 6.3.2 Restore ................................................................................................................................. 6-26 6.4 Door Reports ................................................................................................................................ 6-27 6.5 Holidays Reports.......................................................................................................................... 6-28 6.6 Time Zones Reports ..................................................................................................................... 6-28 6.7 Upload \ Download ...................................................................................................................... 6-29 6.7.1 Upload Procedure ................................................................................................................ 6-30 6.8 Map Generator ............................................................................................................................. 6-31 6.8.1 Opening the Map Generator Application............................................................................. 6-31 6.8.2 Preparing and Retrieving a Map Background...................................................................... 6-31 6.8.3 Toolbox of Objects .............................................................................................................. 6-32 6.8.4 Placing, Sizing and Rotating Objects .................................................................................. 6-33 6.8.5 Adding Captions .................................................................................................................. 6-34 6.8.6 Activating the Map .............................................................................................................. 6-35 6.8.7 Viewing Events with the Map ............................................................................................. 6-36 6.8.8 Right-Click Mouse Functions.............................................................................................. 6-37 6.8.9 Doors Control ...................................................................................................................... 6-38 CHAPTER 7 ADVANCED FEATURES ......................................................................................... 7-1 7.1 Monitors......................................................................................................................................... 7-1 7.2 Status.............................................................................................................................................. 7-2 7.3 Counters ......................................................................................................................................... 7-3 7.4 Setup Options................................................................................................................................. 7-4 7.4.1 Controller Tab ............................................................................................................................. 7-4 7.4.2 Advanced Tab ............................................................................................................................. 7-6 vi ____________________________________________________________________ Contents 7.4.3 Extended Tab .............................................................................................................................. 7-8 7.4.4 Software Tab ............................................................................................................................... 7-9 7.4.5 Communication Tab.................................................................................................................. 7-10 CHAPTER 8 TROUBLESHOOTING ............................................................................................. 8-1 8.1 Controller Not Responding ............................................................................................................ 8-1 CHAPTER 9 FREQUENTLY ASKED QUESTIONS (FAQ) ....................................................... 9-1 GLOSSARY.......................................................................................................................................G-1 APPENDIX List of Events................................................................................................................ A-1 Contents ___________________________________________________________________ vii LIST OF FIGURES FIGURE 1 Typical AXS-100 System ................................................................................................. 1-2 FIGURE 2 Possible AXS-100 Door Configurations .......................................................................... 1-3 FIGURE 3 Site Manager for AXSalert Window ................................................................................ 1-4 FIGURE 4 Site Properties Window .................................................................................................... 1-5 FIGURE 5 Splash Window.................................................................................................................3-2 FIGURE 6 Password Window ............................................................................................................ 3-2 FIGURE 7 Initial AXSalert User Window ......................................................................................... 3-3 FIGURE 8 Users Window .................................................................................................................. 3-4 FIGURE 9 User Properties Window................................................................................................... 3-5 FIGURE 10 Adding the First User ..................................................................................................... 3-6 FIGURE 11 Privileges Window ......................................................................................................... 3-6 FIGURE 12 Privilege Level Window ................................................................................................. 3-7 FIGURE 13 Online Register Window ................................................................................................ 4-5 FIGURE 14 About AXSalert Window with Version Information...................................................... 4-5 FIGURE 15 Customizing the Users Window ..................................................................................... 4-8 FIGURE 16 Setup Options - Communication Tab ............................................................................. 5-2 FIGURE 17 Doors Window................................................................................................................ 5-3 FIGURE 18 Holidays Window ........................................................................................................... 5-5 FIGURE 19 Time Zones Window ...................................................................................................... 5-7 FIGURE 20 Access Levels Window .................................................................................................. 5-8 FIGURE 21 Door Groups Window .................................................................................................... 5-8 FIGURE 22 Doors .............................................................................................................................. 5-9 FIGURE 23 Access Levels Window- Completed............................................................................. 5-10 FIGURE 24 Color Palette ................................................................................................................. 5-10 FIGURE 25 Events Messages Displayed with Color........................................................................ 5-11 FIGURE 26 User Properties Window after Key Enrolled ................................................................ 5-12 FIGURE 27 Completed User Properties Window ............................................................................ 5-13 FIGURE 28 Privileges Window ....................................................................................................... 5-14 FIGURE 29 Upload/Download Window .......................................................................................... 5-15 FIGURE 30 Multi-computer Configuration Window....................................................................... 5-16 FIGURE 31 Multi-computer Configuration Window – Server......................................................... 5-17 FIGURE 32 Multi-computer Configuration Window – Clients........................................................ 5-18 FIGURE 33 Events Window............................................................................................................... 6-2 FIGURE 34 Acknowledging Color-coded Events .............................................................................. 6-3 FIGURE 35 Events Report Criteria .................................................................................................... 6-4 FIGURE 36 Events Report ................................................................................................................. 6-5 FIGURE 37 Template Name Window................................................................................................ 6-6 FIGURE 38 Existing Templates Window........................................................................................... 6-6 FIGURE 39 Print and Save As Buttons .............................................................................................. 6-7 FIGURE 40 Users Window ................................................................................................................ 6-8 FIGURE 41 User Properties Window............................................................................................... 6-11 FIGURE 42 User Properties Window - Access Button .................................................................... 6-12 FIGURE 43 Doors Window - Personal Access Level ...................................................................... 6-12 FIGURE 44 Users Window with New Personal Access Level......................................................... 6-13 FIGURE 45 Picture Import Button ................................................................................................... 6-14 viii ___________________________________________________________________ Contents FIGURE 46 Imported Picture ........................................................................................................... 6-14 FIGURE 47 User Trace Window...................................................................................................... 6-15 FIGURE 48 Users Report Criteria Window ..................................................................................... 6-17 FIGURE 49 Time and Attendance Report ........................................................................................ 6-18 FIGURE 50 Unused Key Report ...................................................................................................... 6-19 FIGURE 51 Expired Key Report ...................................................................................................... 6-20 FIGURE 52 By Door Report ............................................................................................................ 6-21 FIGURE 53 Typical Users Report ................................................................................................... 6-21 FIGURE 54 Delete Users Window ................................................................................................... 6-22 FIGURE 55 Download Users Window - Before Download ............................................................. 6-23 FIGURE 56 Download in Progress Window .................................................................................... 6-24 FIGURE 57 Completion Message .................................................................................................... 6-24 FIGURE 58 Backup / Restore Window ............................................................................................ 6-25 FIGURE 59 Backup Confirm Message............................................................................................. 6-25 FIGURE 60 Backup Folder .............................................................................................................. 6-26 FIGURE 61 Restore Caution Message ............................................................................................. 6-26 FIGURE 62 Door Report .................................................................................................................. 6-27 FIGURE 63 Holidays Report............................................................................................................ 6-28 FIGURE 64 Time Zones Report ....................................................................................................... 6-29 FIGURE 65 Upload/Download Window .......................................................................................... 6-30 FIGURE 66 Map Generator - Opening Window .............................................................................. 6-31 FIGURE 67 Basic Map Background ................................................................................................ 6-32 FIGURE 68 Objects Toolbox ........................................................................................................... 6-32 FIGURE 69 Map with Placed Objects .............................................................................................. 6-33 FIGURE 70 Design Properties Window ........................................................................................... 6-34 FIGURE 71 Map after Adding Captions .......................................................................................... 6-34 FIGURE 72 Design Properties Window with Door Options ............................................................ 6-35 FIGURE 73 Maps Window............................................................................................................... 6-36 FIGURE 74 Map Right-click Mouse Functions ............................................................................... 6-37 FIGURE 75 Doors Control Window ................................................................................................ 6-38 FIGURE 76 Monitors Window........................................................................................................... 7-1 FIGURE 77 Counters Window ........................................................................................................... 7-3 FIGURE 78 Setup, Options - Controller Tab...................................................................................... 7-4 FIGURE 79 Setup, Options - Advanced Tab...................................................................................... 7-6 FIGURE 80 Setup, Options - Extended Tab....................................................................................... 7-8 FIGURE 81 Setup, Options - Software Tab........................................................................................ 7-9 FIGURE 82 Communication Failure Message ................................................................................... 8-1 Software Licensee Agreement ___________________________________________________ ix SOFTWARE LICENSE AGREEMENT This is a legal agreement between you (either an individual or an entity) and Visonic Technologies. By opening the sealed software package and/or by using the software you agree to be bound by the terms of this Agreement. If you do not agree to the terms of this Agreement, promptly return the disk package and accompanying items (including printed materials and binders or other containers) to the place you obtained them for a full refund. VISONIC TECHNOLOGIES SOFTWARE LICENSE GRANT OF LICENSE. This Visonic Technologies License Agreement (“LICENSE”) permits you to use one copy of the specified version of the software product identified above which may include user documentation provided in “online” or electronic form (“SOFTWARE”), on any single computer, provided the SOFTWARE is in use on only one computer at any time. If this package is a License Pack, you may make and use additional copies of the SOFTWARE up to the number of Licensed Copies authorized above. If you have multiple Licenses for the SOFTWARE, then at any time you may have as many copies of the SOFTWARE in use as you have Licenses. The SOFTWARE is "in use" on a computer when it is loaded into the temporary memory (i.e. RAM) or installed into the permanent memory (e.g. hard disk, CD-ROM or other storage device) of that computer except that a copy installed on a network server for the sole purpose of distribution to other computers is not "in use." If the anticipated number of users of the SOFTWARE will exceed the number of applicable Licenses then you must have a reasonable mechanism or process in place to ensure that the number of persons using the SOFTWARE concurrently does not exceed the number of Licenses. COPYRIGHT. The SOFTWARE (including any images, photographs. animations. video, audio, music, and text incorporated into the SOFTWARE) is owned by Visonic Technologies or its suppliers and is protected by United States copyright laws and international treaty provisions. Therefore, you must treat the SOFTWARE like any other copyrighted material (e.g., a book or musical recording) except that you may either (a) make one copy of the SOFTWARE solely for backup or archival purposes, or (b) transfer the SOFTWARE to a single hard disk provided you keep the original solely for backup or archival purposes. You may not copy the printed materials accompanying the SOFTWARE nor print copies of any user documentation provided in "online" or electronic form without a written permission from Visonic Technologies. OTHER RESTRICTIONS. This License is your proof of license to exercise the rights granted herein and must be retained by you. You may not rent or lease the SOFTWARE, but you may transfer your rights under this License on a permanent basis provided you transfer this License the SOFTWARE and all accompanying printed materials, retain no copies, and the recipient agrees to the terms of this License. You may not reverse engineer, decompile, or disassemble the SOFTWARE except to the extent that the foregoing restriction is expressly prohibited by applicable law. x__________________________________________ Limited Warranty and Limitation of Liability LIMITED WARRANTY AND LIMITATION OF LIABILITY DISCLAIMER. Visonic Technologies, AND ANYONE ELSE INVOLVED IN THE CREATION PRODUCTION DELIVERY OR INSTALLATION OF THE SOFTWARE AND DOCUMENTATION, CANNOT AND DO NOT WARRANT THE PERFORMANCE OR RESULTS THAT MAY BE OBTAINED BY USING THE SOFTWARE. THE SOFTWARE IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND (EXCEPT AS DESCRIBED BELOW), EITHER EXPRESSED OR IMPLIED. THIS INCLUDES, BUT IS NOT LIMITED TO, ANY WARRANTY OF PERFORMANCE OR ANY IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. VISONICTECHNOLOGIES DOES NOT WARRANT THE PRODUCT WILL MEET YOUR REQUIREMENTS OR THAT ITS OPERATION WILL BE UNINTERRUPTED OR ERROR FREE. LIMITED WARRANTY. Visonic Technologies warrants that the CD-ROM on which the SOFTWARE is recorded is free from defects in material and workmanship under normal operation and service for a period of ninety (90) days from the date you first obtained the SOFTWARE. This warranty extends only to you, the original customer and may not be transferred. This warranty is exclusive and in lieu of all others oral or written. expressed or implied. Statements or representation which add to, extend, or modify this warranty are unauthorized by Visonic Technologies and should not be relied upon by you. Visonic Technologies reserves the right to change the specifications and operating characteristics of the SOFTWARE it produces over a period of time, without notice. EXCLUSIVE REMEDY. Your sole and exclusive remedy in the event of a defective diskette is either, replacement of the diskette or refund of reseller's purchase price, at Visonic Technologies' sole discretion. To obtain warranty service you must return the defective diskette, postage prepaid, together with your mailing address, telephone number and proof of the date you obtained the SOFTWARE, to Visonic Technologies or its local representative. If Visonic Technologies determines the diskette has been damaged by accident, abuse or misuse, or if the Visonic Technologies’ label or serial number has been removed or defaced, the limited warranty set forth above does not apply, and you accept full responsibility for the SOFTWARE. LIMITATION OF LIABILITY. In no event, whether as a result of breach of contract, warranty, tort (including negligence), strict tort or otherwise, will Visonic Technologies or anyone else involved in the creation, production, delivery or installation of the SOFTWARE be liable to you or any third party for special, incidental or consequential damages arising out of the use or inability to use the SOFTWARE or due to the contents of the SOFTWARE even if Visonic Technologies has been advised of the possibility of such damages. Preface _____________________________________________________________________ xi Preface About This Manual Thank you for choosing the Visonic Technologies AXSalert, Building Automation Management System for your access control needs. We have made every effort to provide a quality product and have subjected AXSalert to extensive testing and quality control procedures prior to release. It is assumed that AXSalert will be installed on a PC and will operate a system of Visonic Technologies AXS-100 controllers. Chapter 1 provides an introduction to the software and presents alternative site and multi-site configurations in which the AXSalert can be implemented. Chapter 2 lists the PC requirements and how to install the AXSalert software. Chapter 3 covers initial access to AXSalert including entry of the initial password. Chapter 4 covers AXSalert basics. Activating the program, application concept, Menu Bar, Toolbar and user customizing options are described. Chapter 5 covers AXSalert setup. All the steps involved in setup are covered including serial ports, doors, holidays, Time Zones, events, users, system privileges. Chapter 6 describes AXSalert operation on a daily basis, including managing users (adding new users and modifying or deleting old users), printing reports, etc. Chapter 7 describes the AXSalert tools available for fine tuning communications equipment and is intended for technical personnel. Chapter 8 provides troubleshooting and maintenance instructions. Chapter 9 provides answers to frequently asked questions. Appendix A provides a list of AXSalert data and its relationship with the AXS-100 controller. Appendix B provides the AXS-100 specifications for local parameters. Appendix C provides a list of system events. At the end of the manual, a glossary of frequently-used terms is provided. Who Should Use this Manual This manual is intended for all user levels. Such personnel may be security or administrative personnel who have to monitor access or generate access reports from the PC. Technical personnel who usually perform activities from the controller in the field will find AXSalert very useful and time saving. xii _____________________________________________________________________ Preface Document Conventions Visonic Technologies emphasizes the importance of carefully following all procedures described in this guide to prevent personal injury or damage to the equipment and to insure maximum efficiency and machine life. The user should pay careful attention to sections that contain the following conventions: Recommended activity. ; i Preliminary installation activity. Important information. Read carefully. About Visonic Technologies Visonic Technologies., a member of the Visonic Group, develops and produces access control products for the commercial market, using mainly RFID technology. Visonic Technologies products are branded under Visonic Technologies and other OEM names. The professional expertise of Visonic Ltd., a leading company in quality security systems and components for more than 25 years, and the practical experience of Visonic Technologies engineers and employees merge to create top-of-the-line access control products and systems. Preface ____________________________________________________________________ xiii Available Access Control Software Products Name 1 2 3 4 5 Software Product Cat. No. AXSalert-100/3 AXSalert-100 AXSalert-100/1 AXSalert-100/2 AXSalert-100M 3-6323-4 3-6323-0 3-6323-1 3-6323-2 3-6323-3 6 AXSalert UPD32 7 AXSalert UPD64 8 AXSalert UPS5 9 AXSalert UPS10 10 AXSalert Client 3-6323-5 3-6323-6 3-6323-7 3-6323-8 3-6323-9 Doors/Sites number 16 doors 32 doors 128 doors 256 doors 1 site, 16 doors Add 32 doors Add 64 doors Add 5 sites Add 10 sites No limit Function Recommended Desktop Reader AXS-100 access control system management software RDR-PXT Multi-Site version of the AXSalert. Basic configuration single site (16 doors) Increase number of doors for AXSalert100/1/2/3 Increase number of sites for AXSalert-100M AXSalert-100 client software (Multi-computer configuration) for AXSalert-100/1/2/3 All software products are protected by an HASP plug. Optional, on request Supplied as a standard HASP-4 USB M1 Protection Plug (USB port) HASP-4 M1 Protection Plug (Parallel port) AXSalert Software Key In order to make the AXSalert running, you need to connect the HASP key to the parallel port (printer port) in the back of the computer. Otherwise AXSalert would run in demo mode only. None Introduction to AXSalert ______________________________________________________ 1-1 CHAPTER 1 Introduction to AXSalert This chapter includes a short description of the AXS-100 system and the advantages of operating the system with the PC application, AXSalert. Other useful literature includes the AXS-100 User Guide, which describes controller programming and operation, and the AXS-100 Installation Guide. 1.1 System Overview The AXS-100 controller is fitted into a wall-mounted metal cabinet. One controller unit can manage up to two reader devices, each of which provides access to one door. Eight controllers can be networked together to control a total of 16 doors. The system’s proximity readers are based on advanced RFID technology. Each user is assigned a unique encoded proximity key. When a valid proximity key card or tag is presented to the reader, which is located outside the protected area, the controller relay activates a magnetic lock or an electromagnetic strike (EMS) that releases the door. A single card can be conveniently programmed to open any combination of doors on the system. If a card is lost or stolen, it can easily be deleted from the system, and a new one can be issued. The AXS-100 controller can also operate with a single door with two readers to form an anti-passback configuration. In this configuration, the door lock will not open again for the same card unless the reader has read the card at the exit reader on the other side of the door. 1.2 AXSalert Application AXSalert is a software module that is compatible with Visonic Technologies AXS-100 hardware. AXSalert enables full management of the access control system from a PC. It is not necessary to send a technician into the field to perform current activities such as adding or deleting keys (users). Activities, which previously had to be performed from the keypad and LCD at the site controller box, can now be performed from a PC in the comfort of the central office. 1-2 _______________________________________________________ Introduction to AXSalert The following diagram shows a typical configuration: a PC is connected to a series of controllers, each with two door readers. RS -4 85 2 23 SR Controller # 1 5 48 SR Up To 8 Controllers Controller # 2 5 -48 RS Controller # 3 Figure 1. Typical AXS-100 System All data including system events and key holder information are displayed on-screen and can be viewed, modified, sorted and printed. The user at the security center can observe and monitor unusual events recorded at remote doors and locks. A new feature enables the display of the archived picture of the key holder who accesses the facility including personal data. Introduction to AXSalert ______________________________________________________ 1-3 AXSalert can operate over TCP/IP to enable remote management of doors and access. AXSalert can manage up to 1,500 doors, so it is appropriate for large installations. A multi-computer capability enables supervision of facility access from different computers in a client-server configuration. Thus, different departments can supervise access to their own sites. In addition to online operation, AXSalert can be used offline to analyze, process and print entry data and reports. Modifications to existing key holder data and new key holder data can also be input while in the offline mode and downloaded later to the AXS-100 controllers. 1.2.1 RDR-PXT The RDR-PXT is a desktop proximity reader that is designed for use with a VisonicTechnologies AXS-100 system. It enables quick and convenient enrollment of proximity keys when using AXSalert. The reader connects to the computer's RS-232 COM port. RF RS-232 9-PIN connector DB-9 (female) Coded RF ADP BOX Proximity tag/card AXS-100 AC adaptor Input: 230VAC 50Hz Output: 9VDC 3VA (Europe) (for the US version, see above) 1.2.2 Door Configurations As mentioned above, each AXS-100 controller can control one or two door locks in one of several configurations. AXSalert can manage any combination of those features. The diagram below shows these possible combinations for a single controller: Single door Single door with two readers Two doors, each with one reader Figure 2. Possible AXS-100 Door Configurations 1-4 _______________________________________________________ Introduction to AXSalert 1.2.3 Additional System Features The system allows a key holder to be assigned one or two Time Zones (or work shifts). A maximum of 64 Time Zones can be set to enable a variety of work schedules within a single organization. Additional features include: • Four types of holidays can be set. Holidays (national, religious, etc.) are special days on which a certain worker category is not allowed to enter the facility, whereas others can enter the facility without triggering an unusual system event. • Real-time recording and display of system events on the computer. • Reports on key holders, doors and events can be sent to a local or network printer. • The system operator can program a specific unlock duration (in seconds) for each door. • Doors can be unlocked automatically according to pre-defined time schedules. • Events (some or all) can be defined as alarm events on the PC and can be presented as colorcoded event messages on the PC’s screen, when they occur. 1.3 Multi-Site Edition The Multi-Site version of the AXSalert software enables the user to operate the software with multiple databases; separate database for each site. The following applies: • A site is one loop of AXS-100 controllers (up to 8 controllers, 16 doors). • Each site may me connected to the computer via an RS-232, modem or LAN. • The software handles one site at a time. After selecting a site the database of the site and all its parameters are loaded, and the site is automatically connected. Figure 3. Site Manager for AXSalert Window Introduction to AXSalert ______________________________________________________ 1-5 Buttons from left to right: 1. Add new site – opens and empty Site Properties dialog window. 2. Delete an existing site – deletes the database and all parameters of the selected site. A confirmation is required. 3. Properties – opens the Site Properties dialog window with the properties of the selected site. 4. Connect – activates the selected site. 5. Settings – opens the Com-port settings. 6. Exit – exit from the AXSalert software. 1.3.1 Site Properties The Site Properties dialog window is opened after pressing the "Add" or "Site properties" button. Figure 4. Site Properties Window For each site the following parameters should be entered: 1. Name – any combination of characters (mandatory) 2. Details – free text description (optional). 3. Connection – selects the connection type for this site. Three options are available: Modem, Local, and IP. 4. Phone Number/IP Address – depends on the previous selection of connection type (see rules below) 1.3.2 Phone/IP Number Rules Modem Connection –while connection is Modem, a telephone number should be entered. The characters allowed in the telephone number are: • The digits 0..9. • The characters “w” for “wait for dial-tone”. • The character “,”for delay of 0.2 Sec. • The character “-“. 1-6 _______________________________________________________ Introduction to AXSalert TCP/IP Connection – for IP connection the IP address should be in the format of: aaa.aaa.aaa.aaa:PPP Where aaa is the IP number and the PPP is the port number. Example: 62.0.18.233:3000 It is also possible to enter DHCP domain instead of the IP address. Example: LocalHost:4000 Local Connection – in this type of connection, the application will try to connect to the controller using the Com-Port of the computer. No number is required in this option. AXSalert Installation _________________________________________________________ 2-1 CHAPTER 2 AXSalert Installation 2.1 General This chapter describes how to install AXSalert. The following subjects are covered: • PC and network requirements • Software installation 2.2 PC Requirements I Operating system Windows 98, Windows NT or Windows 2000 Processor Client: Pentium II or higher; Server: Pentium IV Memory Client: 64 MB RAM; Recommended: 128 MB RAM Server: 256 MB Available hard disk space 20 GB Graphics VGA graphical accelerator, 16-bit or higher Communication Multi-serial RS-232 card (for direct communication) or network card for LAN Network protocol: TCP/IP Output Printer Support software PC-Anywhere (optional for remote service and technical support) Note: AXSalert uses the Microsoft Access database. Any application that can view and/or change Microsoft Access database files can be used externally (outside AXSalert) to view and/or change AXSalert data. 2-2 __________________________________________________________ AXSalert Installation 2.3 Software Installation To install the software, do the following: 1. Place the CD in its drive and close. 2. Auto Run will automatically start the installation process. If manual installation is needed, choose Start, Run and Browse to select the CD drive. Click the Setup icon. 3. AXSalert installation will begin. 4. Follow the instructions. 5. Generally, all you will have to do is click Next or Yes. 6. As a default, AXSalert is installed in drive C under Program Files\VisonicTechnologies \AXSalert. 7. You may choose any drive or folder to install the software by clicking the Browse button. If the selected folder does not exist, a message to confirm its creation will be displayed. 8. Take care to select a location with sufficient free disk space to contain the installation files and the database that will be built up over time. The software itself is only 6 MB. However, the database files with user information and event history can reach 1 GB. In addition, by default, files will be installed into the Windows system directory. Verify that the Windows system drive contains enough free space. 9. After determining the installation drive and folder, click Next to continue. 10. Confirm selection of the default AXSalert folder. (Alternatively, you may select any folder, as mentioned). 11. Click Next to continue. 12. A progress bar will appear. In a few seconds, the AXSalert software will be installed. 13. When the Setup Complete window appears, verify that the Yes button is active. 14. Click Finish and drag the icon to the desktop so you can have it available at all times to quick start the AXSalert application. Initial Access to AXSalert Software ______________________________________________ 3-1 CHAPTER 3 Initial Access to AXSalert Software 3.1 General This chapter describes: • First-time entry into the AXSalert application after installation. • Changing the initial password. • Logout. 3.2 Initial Entry with VisonicTechnologies supplied Password i Note: It is necessary to call Visonic Technologies Software Support to obtain the initial one-time only password. After using this “temporary” password to enter the system, the password should be changed to a permanent password, which will then be used to perform system setup and routine activities. The steps below should be performed while on the telephone with a Visonic Technologies support person. From the desktop, double-click the AXSalert icon or select Start>Programs> >VisonicTechnologies > AXSalert and run the axsalert.exe file. 3-2 _______________________________________________Initial Access to AXSalert Software The AXSalert splash screen appears: Figure 5. Splash Window Shortly afterward, the Password Window appears: Figure 6. Password Window In the User Name field, type in “admin” using lowercase letters. Click the Login button. i Not e: The Events button is intended for read-only access to the AXSalert software and does not require a password. Initial Access to AXSalert Software ______________________________________________ 3-3 The following window appears: Figure 7. Initial AXSalert User Window Welcome to the AXSalert software. 3-4 _______________________________________________Initial Access to AXSalert Software 3.3 Changing the Initial Password i Not e: It is necessary to change the initial password and to define a user with system administrator privilege (Admin), i.e., with full access privileges to the AXSalert system. Later on (section 4.2.3.7), other users with different access privileges will be defined. From the Menu Bar, select Setup, Users, or click the Users button on the Icon Bar. The following window appears: Figure 8. Users Window Click the New Users icon (+). The User Properties window appears. Fill in the details of the user. Of special importance are the first and last names, which are used by the system as the “user name” for system login purposes. The first and last names are case sensitive. i Note: If a PC reader is connected to the system, and the user has a key card, pass the key card through the reader. The key and pin code fields will be automatically filled in. Initial Access to AXSalert Software ______________________________________________ 3-5 Refer to the window below: Key and pin code First and last names Master Access Level Status Figure 9. User Properties Window Details of the first user have been filled in. Choose “Master” from the combo drop-down box. This setting will provide the key holder with access to the site twenty-four-hours-a-day, for setup purposes. Later, it can be changed. Note that “Not downloaded” is displayed in the Status field. This means that the recorded data has not yet been downloaded to the controller. Downloading will be automatically performed when the OK button is clicked. Section 5.11 discusses downloading in greater detail. Click OK to continue. You are returned to the Users window. The details of the new user have been added to the window. 3-6 _______________________________________________Initial Access to AXSalert Software Refer to the window below: Figure 10. Adding the First User From the Menu Bar, select Setup, Privileges. The following window appears: Figure 11. Privileges Window Initial Access to AXSalert Software ______________________________________________ 3-7 From the Privileges window, click the Add user privilege (+) icon. Note that the user name is already recorded in the Name field (if not, click on the name field). Select the user privilege from the drop-down box (Events Only, Events & Users, All, Admin). This first user must have “Admin” privilege to perform subsequent setup activities. The significance of the different types of privilege (event only, user and events, all, admin) are discussed in section 5.10. Types of privilege Figure 12. Privilege Level Window Fill in the new password, and confirm the password by re-typing it in the Re-type Password field. Click Set Password. The first user has been entered. This user can now define other system users, and it is no longer necessary to use the one-time-only password. AXSalert Basics_____________________________________________________________ 4-1 CHAPTER 4 AXSalert Basics This chapter provides an overview of the AXSalert software. The following topics are discussed: • Application concept • Activating the program • Menu Bar • Toolbar • Customizing AXSalert windows 4.1 Application Concept AXSalert provides a wide range of tools and flexibility for PC management of a fully equipped access system having many controllers and readers. AXSalert has the capability to supervise up to 1,500 doors, and it can be used in a client-server configuration so that different departments can supervise access to their own sites. All activities that previously could only be performed from a controller by using key sequences can now be performed at the office desktop using the familiar Microsoft Windows graphic environment. In addition, procedures for adding, deleting, and modifying keys, which are time-consuming tasks when performed from a controller, can now be performed from the PC using a desktop reader that connects to the PC. An additional advantage is that using a relatively small number of windows, security personnel can view and manage up to 5000 key holders and their authorization to enter a restricted area. The flexible array of parameters includes split work shifts, holidays, specific doors. The archived picture of the key holder can even be displayed on-screen together with personal data. Unauthorized entry and other unusual system events are recorded by AXSalert and can be viewed from the PC. The record of these events includes the user name and ID, the event description, time, date, reader (door) and door name. A wide range of reports can be generated including sorting according user, doors, dates, etc. Report templates of event parameters can be saved to facilitate generating future reports. Reports can be saved as a spreadsheet file and hard copy printed. All these features combine to provide a powerful tool for managing access to an organization’s sensitive facilities. 4-2 _____________________________________________________________ AXSalert Basics 4.2 Menu Bar 4.2.1 File 4.2.1.1 Login Activates the Password window. This function is useful if the user had logged in with a lower privilege (e.g., as for read-only purposes), and the system must now be used for performing a higher level privilege (e.g., system maintenance to changing a user’s properties). Clicking File, Login from the Menu Bar opens the Login window. Enter the user name and password to login. In this manner, privilege can be changed without having to exit to Microsoft Windows and re-enter the system 4.2.1.2 Logout Logs out of the system and returns the software to read-only status. This function is useful if login was performed for a higher level function and the system must now be returned to a lower level function. 4.2.1.3 Exit Exits the AXSalert software and returns to Windows. 4.2.2 View 4.2.2.1 Toolbar When this item is marked, the Toolbar is active. When this item is unmarked, the Toolbar is not displayed on the desktop. Not marking the Toolbar provides more screen space for viewing database events. 4.2.2.2 Status Bar When this item is marked, the Status Bar is active. When this item is unmarked, the Status Bar is not displayed on the desktop. Not marking the Status Bar can provide more screen space for viewing database events. 4.2.2.3 Maps Opens a window with a list of maps. Refer to section 6.8.7. 4.2.2.4 User Trace Popup of the users pictures when the user key is presented. Refer to section 6.2.4. AXSalert Basics_____________________________________________________________ 4-3 4.2.2.5 Status Activates the Status window. This window shows the status of the controllers in real-time. Refer to section 7.2. 4.2.2.6 Counters Activates the Counters window. The Counters window counts the total number of entries and total number of exits and displays the difference between the two amounts. This feature is useful for parking lot applications, for example, where it is necessary to know how many parking spaces are still available at the site. Refer to section 7.3. 4.2.2.7 Monitors Opens a window showing the current serial communication activity of the controller and/or reader. Refer to section 7.1. 4.2.2.8 Doors Control Provides the capability for user such as security guard or secretary to open up to for specific doors from a client PC. Refer to section 6.8.9. 4.2.3 Setup 4.2.3.1 Options Activates the Setup window for performing setup and fine-tuning communication settings. Refer to section 7.4. 4.2.3.2 Access Levels Activates the Access Levels window. Refer to section 5.7. 4.2.3.3 Holidays Activates the Holidays window. Setting up holidays is covered in section 5.5 and printing holiday reports in 6.5. 4.2.3.4 Time Zones Activates the Time Zones window for determining the different work “shifts” during which users are allowed to enter or exit the doors for which they have been given access rights. Setting up Time Zones is covered in section 5.6 and printing Time Zones reports in 6.6. 4.2.3.5 Users Activates the Users window for setting up new uses or modifying existing users. Setting up Users is covered in section 5.9 and viewing and managing users in 6.2. 4-4 _____________________________________________________________ AXSalert Basics 4.2.3.6 Doors Activates the Doors window. Setting up Doors is covered in section 5.4 and printing Doors reports in 6.4. 4.2.3.7 Privileges Activates the Privileges window for setting up the privilege level of new users or modifying users’ existing privilege level. Refer to 5.10. 4.2.3.8 Events Setup Activates the Events window. Setting up Events is covered in section 5.8 and managing events including color-coding and printing reports in section 6.1. 4.2.3.9 Multi-computer Enables implementing a client-server configuration over TCP/IP to enable different departments to supervise access to their own facilities. Refer to section 5.12. 4.2.4 Operation 4.2.4.1 Upload / Download Enables transferring events data and other system data (keys, Time Zones, holidays, doors) from the controller to the PC and vice versa. For the download procedure, refer to section 5.11. For the upload procedure, refer to section 6.7.1. 4.2.4.2 Backup / Restore Enables performing AXSalert file backup and restoring backed up files. Refer to section 6.3. 4.2.4.3 Map Generator Allows the user to create/build synoptic maps. Refer to section 6.8. 4.2.4.4 Reports Opens the Event report criteria window to generate event reports (refer to section 6.1.2). 4.2.5 Help 4.2.5.1 Help Provides access to AXSalert Help. AXSalert Basics_____________________________________________________________ 4-5 4.2.5.2 Register Opens the Register window for online registration or upgrading AXSalert software. Figure 13 Online Register Window 4.2.5.3 About AXSalert Provides version information. This window is useful when contacting Visonic networks support personnel for technical assistance in order to identify the current version of the AXSalert software. Figure 14 About AXSalert Window with Version Information 4.3 Main Toolbar The Main Toolbar provides access to frequently used functions at the click of a mouse. The icons on the Main Toolbar become active only after login to the system. Otherwise, the icons will be inaccessible to the user. The available icons are detailed in the next table. AXSalert Basics_____________________________________________________________ 4-1 Icon Name Users Description Section Management of users (adding, modifying, 5.9 and deleting), downloading to the controller and 6.2 generating reports. Maps Enables activating the map function for 6.8.7 viewing the location of system events. User Trace Displays the personal details of the last person 6.2.4 entering the facility including his picture if this feature is implemented or of the user responsible for a highlighted past event. Backup/ Enables performing backup of AXSalert data. 6.3 Restore Upload/ Download Reports Enables transferring all user data and system setup data (keys, Time Zones, holidays, doors) from the controller to the PC and vice versa. Enables generating a wide variety of event reports. 5.11 and 6.7 6.1.2 to 6.1.4 4.4 Setup Toolbars In AXSalert application, a consistent set of icon controls is used to enable the user to utilize easily similar functions in different windows such as the Access Levels, Holidays, Time Zones, Users, Doors, as Privileges windows. Of course, only the relevant icons are displayed in a specific window. These icons are described below: Add Adds a new record. Delete Deletes the highlighted record. Delete All Deletes all records from the window. Make Report Makes a report. In some windows a standard window is automatically generated. In other windows, a secondary window opens that enables selecting report parameters. 4-2 _____________________________________________________________ AXSalert Basics Download Downloads the highlighted record. Download All Downloads all records in the window. Time Zones Opens the Time Zones window from the Access Levels window. User Properties Opens the User Properties window from the Users window. Doors Opens the Doors window from the Access Levels window. Door Groups Opens the Doors Groups window from the Access Levels window. Exit Exists the current window and returns to the previous window. 4.5 Customizing Window The displayed columns of the AXSalert database, especially that of the Event and User windows, may exceed the actual visible screen area. The displayed width depends on the width of the data within the fields and/or the titles of the columns. AXSalert provides tools to customize the display of records. 4.5.1 Scroll Bars All database columns or rows can be viewed by sliding the horizontal or vertical scroll bar, as required. However, since this can become quite tedious, it is possible to reduce the space between columns. Refer to the following two sections. 4.5.2 Changing Column Width When the mouse cursor is placed over the dividing line between column names and held down, a double-arrow symbol will appear. Dragging the mouse leftward or rightward will decrease or increase column width. Refer to Figure 15. AXSalert Basics_____________________________________________________________ 4-3 3. Double-click a column to sort 2. Drag line to increase / decrease column width 1. Move cursor between columns Figure 15. Customizing the Users Window 4.5.3 Sorting Users (Ascending / Descending) Users can be sorted by double clicking on the column title of the data in the user window. The sort function is a toggle so that a column can be sorted in ascending or descending order depending on how many times the column title is clicked. Refer to Figure 15. 4.5.4 Color Coding Events The events that are displayed in the Events window can be color-coded. Refer to section 6.1.1. 4.5.5 Color Coding Key Holders The key holders who are displayed in the Users window can be color coded so that they can be easily locate (useful for types of users). Refer to section 6.2.2. Setup _____________________________________________________________________ 5-1 CHAPTER 5 Setup 5.1 General This chapter describes how to set up the AXSalert software including defining ports on the PC. ; Typically, these steps will be performed after the hardware infrastructure (controllers and readers) have been installed and the RDR-PXT reader (for reading keys) has been physically connected to the computer. The following subjects are covered in this chapter: Preparations Events Setting up computer ports Enrolling new keys and users Doors setup Assigning privileges Holidays setup Downloading settings Time zones setup Multi-computer setup Access Levels Inputs setup Recommended: Setup should be performed in the order indicated. 5.2 Preparations Before beginning AXSalert setup on the PC, it is absolutely necessary to know how the organization functions in terms of work shifts and which personnel have access to what facilities (doors), including on holidays. This is not a trivial matter! Ask yourself the following questions: How many shifts do company personnel work? Which days does each employee work? What facilities or doors are accessible to each employee? On which holidays are certain employees likely to work and others not likely to work? Even in an organization with only several dozen workers, this could be a complicated task if homework is not done first. Recommended: A company official or committee with appropriate authority should be vested with the responsibility of gathering and organizing this important setup information. Company officials responsible for initial setup of the system should conduct appropriate discussions with all the company personnel involved: security personnel, human resources, computer administrators, and technical (hardware) personnel. 5-2 _____________________________________________________________________ Setup A correct picture of the organization and its workers should be formulated and written down. All workers should be allocated Time Zones (for example, from 08:00AM to 04:30PM) for their appropriate work shifts and their normal and holiday schedules (AXSalert can easily handle split shifts). Persons with the appropriate authority should be readily available during setup time. System administration, technical personnel and managers will be involved in setting the passwords (determining who can access the system from the PC or controllers in the field), defining the correct COM ports, etc. The other topics (Doors, Holidays and Time Zones) involve familiarity with the organization’s operation and are more properly within the responsibility of the Human Resources or Security Departments. 5.3 Setting Up Computer Serial Ports For an initial installation, COM Ports should be set up first so that the RDR-PXT reader will be available for enrolling keys. To setup computer ports, do the following: • Click Setup, Options. The Setup window opens. • Click the Communication Tab. • Click the Auto detect ports button. Refer to the following window: Figure 16. Setup Options - Communication Tab Setup _____________________________________________________________________ 5-3 • In this example, the AXS-100 controller, through which communication is implemented with remote doors, is connected to port 1 and the RDR-Reader for inputting keys is connected to port 3. If the ports have not been correctly identified, then use the Add port and Remove port buttons to modify port settings as necessary. • Enter the IP address in the IP port field for network communication, and click Write. 5.4 Doors Setup Doors are numbered from 1 to 16 (the maximum number of readers that can be attached in one loop of 8 AXS-100 controllers). The Door window lists the maximum number of doors including the door name, description, unlock duration, etc. of each door. Click Setup, Doors from the Menu Bar. A window similar to the following appears: Download current lock Download new data to controller Shrinks a nameless lock Generate a report Scroll rightward to view all the columns Figure 17. Doors Window Each data entry field is explained in the table below. Data is entered by clicking on the table cell and entering the data into the cell. Generally, doors are given mnemonic names so the user can easily identify the location or the group of employees that use them. It is not necessary to “save” modifications to the door data. Once entered, the system automatically saves the newly entered data when another table row is clicked (for entering data to that row, for example) or when the exiting the window is clicked or after clicking the Download button to send the data to the controller. 5-4 _____________________________________________________________________ Setup Title Description Door Name Generic title of the door. Loop Each group of 8 AXS-100 controllers consists of one loop. Reader The sequential number of the reader within the loop. Time Zone Time zone is used to apply specific functions to a door during the indicated Time Zone. Select a Time Zone from the predefined Time Zones, or 0 for no Time Zone. Then, apply a Time Zone Function (see below). Time zone function To activate Time Zone Function options, a Time Zone must first be entered in the Time Zone field. When clicking in the Time Zone Function, the symbol is displayed, and one of the following functions can be selected for this door: Auto Open: Door is automatically unlocked during the selected Time Zone (for example, an internal door that should remain open during work hours). First Valid Tag: Door is automatically unlocked during the selected Time Zone, starting ONLY after first valid tag presentation (for example, a building entrance door that should remain open in the appropriate Time Zone after the first person has entered). The door will be automatically locked at the end of the scheduled period. Ignore Door Ajar: Allows the door to be left opened during the specified Time Zone, regardless of the door ajar settings. Prevent Entry: Entry and exit is permitted only with a Master Key. Master Exit: Door entry with a Master Key is permitted once but no exits from this door are permitted. The assumption is that exits will be performed through other doors. Master Only: Do not open a lock for any tag which is not a master tag. Exit is not allowed. If a door is not associated with any Time Zone, (Time Zone “0”), the Auto Open and First Valid Tag functions are not applicable and ‘Disabled’ is automatically set. Unlock duration Door unlock duration, 1 - 2370 sec. (39.5 min.), default 5 sec. whenever a valid tag is presented. The time can be changed by highlighting the desired field and entering the new duration. Unlock toggle When double clicking the cell, a check mark is displayed and a value of “0” (sec.) is displayed in the “Unlock duration” column. This means that when a key is presented to the reader, the door remains unlocked until a new key is represented to it. Request to exit (RTE) polarity Request to Exit input device (push-button or PIR detector). Double click on the cell to toggle between N.O. (normally open) and N.C. (normally closed). Door position polarity Door Position input device type. Double click to toggle between N.O. and N.C. Door position function Door Position input Enabled/Disabled. Double click on the cell to toggle between DP (Door Position) and Reader enabled. Door ajar timeout Duration (in seconds) of the time the door (not the lock!) is allowed to be open. The time can be changed by highlighting the desired field and entering the new period. Setup _____________________________________________________________________ 5-5 5.5 Holidays Setup Each day of the year can be defined as a regular workday or as one of four holiday types. The holiday definitions are used in the Time Zones Setup (section 5.6) to prohibit access to certain key holders during these holiday types. (Saturday and Sunday are not considered holidays since they are included in the days of the week definition). Each holiday must have a type (1, 2, 3 or 4) assigned to it. Examples of holiday types may be national holidays, company recreation days, religious holidays, etc. i Note: Although there are only four types of holidays, many holidays can be grouped under a single type. For example, a group of holidays such as Christmas Day, New Year’s Day, and Easter can be assigned the same type number. Workers that are associated with these holidays will not be permitted entrance into the facility on these days. To Set Types and Names for the Holidays, do the following: • Click Setup, Holidays from the Menu Bar. A window similar to the following appears: Click to download the Add Delete Holidays table to the controller holiday(s) holiday(s) Click to return to the main window Holidays grouped as H1 Religious Holidays grouped as H2 Up to 4 types of holidays possible Figure 18. Holidays Window i Not e: AXSalert uses the Windows system’s date format (selected by Start > Settings > Control Panel > Regional Settings > Date > Short date style. When defining a new holiday’s date, do not set the year. Holiday dates that change from year-to-year must be reset each year. 5-6 _____________________________________________________________________ Setup 5.6 Time Zones Setup When this window is opened for the first time, a general “default” Time Zone is appears in the first Time Zone. This Time Zone is set for the hours 00.00 to 23:59. This setting is intended to enable system operation even before all the user Time Zones are set. Fifteen Time Zones are the maximum number that can be set. When Time Zones are set up, information about the “general” operation of the organization is entered. For example, a company may work split shifts and a non-split shift at the same time. Each shift must be entered separately and is a separate Time Zone. A split shift can be defined as a single Time Zone. Figure 19 shows typical company work shifts and how they are represented in the Time Zones window. In a typical set of shifts, there may be day, evening and early morning shifts (Time Zone 2, 3, and 4). In addition, some workers may work a split shift (Time Zone 7). Some personnel may have access only for a couple of hours during the day (Time Zone 6). Senior personnel may have access 24hours a day (Time Zone 5). Day drivers (Time Zone 8) and night drivers (Time Zone 9) have separate Time Zones. To set Time Zones, do the following: • Click Setup, Time Zones from the Menu Bar, or click the Time Zones button on the Toolbar. A window similar to the following appears: • In the title field, enter relevant names for each Time Zone such as “morning shift”, evening shift”, etc. • Set the time range for each Time Zone by clicking on the appropriate “From” and “To” cell. The format is HH:MM. AXSalert automatically adds a colon (“:”) between the hours and minutes. • Place a check mark for each appropriate day of the Time Zone (e.g., Monday through Friday). • H1 - H4 refer to holidays that were previously defined (section 5.5). Place a check mark for the applicable holidays in the Time Zones window. Setup _____________________________________________________________________ 5-7 The following window shows a typical Time Zones window: To download all Time Zones To download the window’s active Time Zone only, press this button. To add/remove a √ mark, double click on the desired cell Figure 19. Time Zones Window In the above example, row number 5 only will be downloaded to the controller. 5.7 Access Levels An Access Level is a field defined using the Access Level window. An Access Level enables specific persons to enter (access) a specific door or group of doors during the time duration specified in up to two Time Zones. The two Time Zones have “and/or” functionality, which means that workers can have access during all hours specified in the Time Zones even if there is some overlap of hours. The Access Level is associated with a specific user in the User Window (refer to Figure 26). Consider the following scenario. Two groups of workers, for example, the day and night drivers in the previous section must access the same door (warehouse) during different Time Zones. In this case, a single Access Level can be created (e.g., Drivers), with the Drivers: Day and Drivers: Night included in that Access Level. The warehouse door can be associated with the Drivers Access Level in both Time Zones. The following is another scenario. Different types of workers may need to access the same doors as well as the specific doors of their own work site. For example, Computer Department personnel may need access Computer Room doors, whereas main office personnel obviously need access to other doors. Some doors, such as the main building entrance, may be common to both departments. In this scenario, two separate Access Levels would be created for each group, designating the specific doors for each group. Multiple doors is handled by the ”door group” function, which is also set from the Access Level window. 5-8 _____________________________________________________________________ Setup The following procedure shows how to use Access Levels. To set the Access Level, do the following: • Choose Setup, Access Levels from the Main Menu. A window similar to the following opens: Download active access level to controller Double click icon to open Door Groups Window with the most recently opened Access Level Download all access levels to controller Double click icon to open Door Groups Window of indicated Access Level Figure 20. Access Levels Window In a new setup, only one Access Level name (“Master”, in this case) will appear (refer also to section 3.3). • Click on the Doors groups icon on the Icon Bar. The following window appears: Figure 21. Door Groups Window Note that all the doors appear as “Selected doors”, i.e., the user with “Master” Access Level can access all the doors. • Exit the window, and return to the Access Levels window (Figure 20). Setup _____________________________________________________________________ 5-9 • • • • In the Access Levels window, fill in the Access Level names for each Access Level (an unlimited amount of Access Level names can be created). In scenario 1 above, the “Drivers” Access Level would be created. In the Time Zone field select up to two Time Zones for the Access Level. In our example, Driver: Day and Driver: Night would be entered in the first and second time Zones, respectively. For each Access Level name that was created, click the Doors groups or Doors icon to access the Doors Groups window (similar to Figure 21). Move the doors from the System Panel, which contains all the available doors, to the Selected Panel, which contains the doors for persons who will be given that Access Level name (to open the doors associated with the Access Level). For example, assuming that day drivers and night drivers will have access to only the warehouse, an Access Level called “Drivers”, move the warehouse door to Drivers Access Level. Refer to the example in the figure below: Name of Access Level Set for Time Zone 1 or 2 Available System Doors Panel Selected Doors Panel Press to move desired doors from the System Panel to the Selected Doors Panel or vice versa Press to move all desired doors from the System Panel to the Selected Doors Panel or vice versa Figure 22. Doors 5-10 ____________________________________________________________________ Setup • The following window shows a completed Access Level window with the Drivers Access level defined. Drivers Access Level Figure 23. Access Levels Window- Completed 5.8 Events Setup AXSalert contains a large number of events that can be recorded by the system (currently, approximately 60 – refer to Appendix C). Some events are displayed for information purposes only, whereas others may indicate a system security breach. Obviously, the significant errors should be prominently displayed. Therefore, AXSalert has provided a color scheme that enables the application of user-defined colors to each event message. To apply colors to event messages, do the following: • On the Menu Bar, click Setup, Events setup. The following color palette opens: Figure 24. Color Palette Setup ____________________________________________________________________ 5-11 • Note that possible messages are listed on the left side of the Color Palette window and the palette on the right. Highlight a message, and click a color from the palette. If such events are already displayed in the Events window, these messages will automatically adopt that color when the color palette is closed. The following window shows color-colored system messages for ease of identification: Figure 25. Events Messages Displayed with Color • To return the color to the default (no color), select each colored event individually, and click the Reset colors button. 5.9 Enrolling New Keys and Users In the previous steps, organizational information that forms the basis for inputting individual employees was recorded. It is now time to record the key holders themselves. In the initial setup procedures (section 3.3), only a single user was defined in order to initiate system setup. Now, other key holder will be defined so the system can begin to function. For example, the employees responsible for inputting key holders via the RDR-PXT key reader will have to be defined, as well as other personnel that must have access to sites in which doors are already operational. 5-12 ____________________________________________________________________ Setup This stage involves several steps: • Physically enrolling the key. • Recording user data. • Setting privileges for changing user data at the computer. Before proceeding further, verify that all previous setup activities were completed including: • All the organization’s work shifts have been recorded using the Time Zones window. • Up to four possible holiday types have been recorded in the Holidays window. • Valid doors have been defined using the Doors window. • Access Levels have been defined. • All the personal details of each employee should be readily available for data entry. This information includes: company ID number, first name, last name, job title, location, building, office phone. 5.9.1 Enrolling a New Key Present a new key/card to the RDR-PXT reader. Note that the reader’s LED changes from red to GREEN. If a key is rejected for some reason, the LED will flash red. The User Properties window appears. A new record is added to the data table, and its Status is “Not downloaded”. It will be downloaded later when all user information has been accurately entered, and the OK button or Download user or Download all users buttons clicked. Until then, the controller does not recognize it (Figure 26). Figure 26. User Properties Window after Key Enrolled Fill in data for the first key holder: employee ID number, last name, first name, title, location, building, office phone, expiration date and card number. Set the Access Level that is appropriate for the user. Access Levels for the organization were set in section 5.7. The example user has been set to “Master” Access Level. Note that setting the user’s Access Level also defines doors that he can access and his Time Zones. Setup ____________________________________________________________________ 5-13 All entered information has now been entered for the key holder. Double-check the information to verify that it is correct. A completed window may look as shown in Figure 27. Data read from key Errors can be corrected by clicking this button Status Downloaded / Not downloaded Figure 27. Completed User Properties Window Click OK to finish the procedure for this user. Clicking the OK button also automatically downloads that user’s data to the controller. If new users are being entered and there is no connection to the controller, then downloading users will have to be separately performed (section 5.11). Note that other advanced user properties can also be set at this time by clicking the Advanced button. For a detailed presentation of these properties, refer to the user data description in section 6.2.1. 5.10 Assigning Privileges Privileges determine the extent to which users can perform activities in the system. AXSalert has four levels of privileges: Events only Enables viewing events only. Events and Users Enables viewing events and user data. This privilege enables entering new users (e.g., enrolling via the RDR-PXT), modifying user data and deleting users. All Enables changing all system data except for Privileges and accessing the Setup options window. Admin Enables changing all system settings and all system passwords. 5-14 ____________________________________________________________________ Setup At setup time, it is necessary to define users who will have access to the system at the various levels of privilege. For example, administrative personnel who are responsible for monitoring events and handling users may have “events only” or “events and users” privilege. Managers may have “All” privileges. System administrators who have overall responsibility for the system may have “Admin” privilege. Click here to delete a user privilege Click here to add a new user privilege Select the user’s name from the list Select the appropriate privilege level Type in the new password and retype it Click Set password to finish Figure 28. Privileges Window User names that were input into the system will appear in a drop-down “combo” box when the Add new privilege (plus) button is clicked. Select the user name. Similarly, select the appropriate Privilege level for the user. Type in the password, and retype it to confirm. Click Set password to finish. Setup ____________________________________________________________________ 5-15 5.11 Download Procedure After system setup, the new settings must be downloaded to the remote controllers. Since AXSalert automatically identifies the remote controllers and readers (refer to section 5.3), this is an easy procedure. Note that users were already downloaded when the OK button was clicked after entering user data (section 5.9). To perform download, do the following: Click Operation, Upload/Download from the Menu Bar or click the Upload/Download button on the Toolbar. A window similar to shown in Figure 29 appears. Download button Select the data to download Status after download Figure 29. Upload/Download Window • Mark the data to be downloaded in the appropriate check box. Note that all or some of the following data can be downloaded: setup data, doors, Time Zones, holidays, and users edited or new user data). • Click the Download button. • After the download is performed, download statistics will be displayed in the Status box. • Click Exit to return to the previous window. 5-16 ____________________________________________________________________ Setup 5.12 Multi-computer Setup The multi-computer function enables implementing a client-server configuration on a local area network (LAN) running TCP/IP. For large installations, this enables several departments to supervise their specific installations from their own on-site computer (clients) without having to rely on a single central computer for performing day-to-day operations. Of course, the central events database remains on the central computer or server and is usually maintained by the company’s computer department. Other data such as key holder data can be stored on the client computers. The local client computer communicates directly with the server, which distributes relevant data to other client computers. For the real-time display of events, the server must be running. If the server is turned off, events cannot be uploaded to it from controllers, and in turn, the events cannot be distributed to the relevant client computers. To setup the server, do the following: Click Setup, Multi-computer from the Menu Bar. A window similar to the following appears: Enter “1” for the server Enter the server’s local IP address Leave this field blank Figure 30. Multi-computer Configuration Window Setup ____________________________________________________________________ 5-17 • Each computer must be given a unique number. Begin with the server. For the server, it is mandatory to enter the number “1” in the computer Number field. Do so now. • The host IP address is left blank. • Fill in the loops for the server (this step can be done later). • Mark the Autostart as server check box. Otherwise, the Online button will have to be manually pushed from this screen each time the computer boots in order to enable the computer to operate as a server after the system is booted. • Click the Online button, to activate the server. Online button Figure 31. Multi-computer Configuration Window - Server To configure the clients do the following: • Client computers are numbered from “2” onward. Fill in the computer number now. • Fill in the host IP address. The host IP number of the client computers must be the same as the server’s local IP number. 5-18 ____________________________________________________________________ Setup • The columns numbered consecutively from “1” onward, refer to loop number in the system. A maximum number of 108 loops can exist in the system. On the server mark the loops that each computer supervises. • The following figure shows a client configuration. • Click the Online button, to activate the server. Note that the server and client computers cannot supervise the same loops. Figure 32. Multi-computer Configuration Window – Clients Setup ____________________________________________________________________ 5-19 5.13 Inputs Setup Each sequential input port can be defined to operate in one of several modes in order to activate a specific function. To setup the inputs, do the following: Click Setup, Inputs from the Menu Bar. A window similar to the following appears: Define Output Define Out Time Input Number Click Download after completing Inputs setup. Select Input Function Select Loop Select Input range Figure 31. Input Manager Window 5-20 ____________________________________________________________________ Setup Select the input numbers (range) to be defined. Select the input Function. Each input device can be programmed to operate in one of a few modes: • Disabled – Input is disabled • Allow entry – Allow entry through door 1 or 2 of controller. • Open all – Open all doors in loop while input is active. • Control Reader – Enable/ Disable reader 1 or 2 of controller. • Counter – Up/Down count events. • Output – Output to relay. • Alarm Input – Output to relay after entry delay. Refer to the IOX-4 Installation Instructions, DE6314, for details on these functions. Define the Output as specified in the IOX-4 Installation Instructions. An input may be used to control an output relay on the IOX-4 board. Output numbers define which output relay is to be controlled (1 through 32). Adding 64 to the relay number will cause the input to operate the relay in toggle mode. Adding 128 to the relay number will cause the input triggering and restoring to generate an event message. Set the Out time number as the length of time in seconds for the input relay to be triggered (1 through 2000 secs). Select the loop (e.g. 1. Comm 1). Click on the Download button after completing the Inputs setup for the new settings to be downloaded to the remote controllers. Click OK. Operating AXSalert __________________________________________________________ 6-1 CHAPTER 6 Operating AXSalert This chapter concentrates on familiar day-to-day procedures including maintaining keys (users), generating reports and managing events. All procedures can be accessed from the Menu Bar. I Note: The most frequently used functions are accessible from the Toolbar. For a description of the Toolbar controls, refer to section 4.3. This chapter includes the following topics: • Viewing events, including color-coding, event reports, and printing and saving. • Viewing and managing user keys, including adding, modifying and deleting key holders as well as creating user reports. • Backup / Restore procedures. • Door reports. • Holiday reports. • Time zones reports. • Uploading data from the controller. 6.1 Viewing Events Viewing and examining events is the most frequently performed activity. It may be necessary to examine events several times during the day to verify that there was no occurrence of unauthorized access to the facility. In addition, it is necessary to verify that no communication failures have occurred, which would impair security at the facility. The Events window is the first window displayed after entering the AXSalert. These events are predefined by the software and cannot be modified by the user. For a full list of the event messages (approximately 60), refer to appendix C. 6-2 ___________________________________________________________ Operating AXSalert The following figure shows a typical Events window: i Figure 33. Events Window NOTE: For security reasons, events cannot be deleted. All events are displayed. An event is defined as any occurrence recorded by the system either at a door or at the PC, including hardware and communication problems. For example, a valid entry through a door is recorded as a “Valid key”, and the entry through a door without presenting a key is recorded as a “Forced door”. If all the columns are not displayed on-screen, use the horizontal scroll bar to scroll rightward or adjust column width (section 4.5.2). Note that the field order that appears in the Events window cannot be modified. The Events window provides eight data fields for each event as follows: Operating AXSalert __________________________________________________________ 6-3 Field Name i Description Time The date and time of the event. Description The description of the event as determined by the system. Door The name of the door at which the event occurred. User name The user who “owns” the key that performed the event. Key The key number. Loop The loop number (there are up to 16 doors in a loop). Reader The reader number (0 or 1) of the controller. (Two readers can be attached to a controller) Controller number The controller number within the loop. Not e: AXSalert saves up to 999,999 events in its database. Technical support personnel can change this value. Event 1,000,000 will erase the first event (the event that has earliest date and time signature) in accordance with the FIFO principle (first in, first out). 6.1.1 Color-coding Events Colors of events can be changed as necessary (refer to section 5.8 for opening the color palette and applying colors). Colors are used to highlight key events and call the user’s attention to them for further action. After a specific color-coded event is double-clicked, the user-set color “grays” as an indication that the event has been acknowledged. However, the column at the far left-hand column keeps the user-set color as a reminder of the event’s severity level. Events that are not user-colored do not “gray” when double-clicked. Refer to the figure below: Acknowledged “grayed” events Unacknowledged “colored” event Figure 34. Acknowledging Color-coded Events 6-4 ___________________________________________________________ Operating AXSalert 6.1.2 Event Reports Reports are a useful tool for sorting the myriad of parameters and thousands of events recorded by the system. Reports enable the examination of facility access and identification of trends and specific activities that must be attended to by company security personnel. Reports can be produced on a onetime only basis or in the same format from time to time by using templates. 6.1.2.1 One-time Only Reports To open the Reports Criteria window, choose Operation, Reports from the Menu Bar, or click the Reports button. Reports can include any combination of events, users and doors. Events, users and doors are selected by highlighting them in the appropriate scroll-down list. Refer to Figure 35. Clear All button - erases all highlighted report items Highlighted report items Create report button For a specific time period, click the From radio button, then click either the: Last Week Last Month or Last radio button Fill in the date and hour Figure 35. Events Report Criteria Operating AXSalert __________________________________________________________ 6-5 Select the events to be listed in the report from the events scroll-down list. Select the key holders to be listed in the report. Note that key holders can be sorted according to the following: key number, first name, last name, ID, Access Level. To generate a report, click the Create Report button. A report similar to the following will be generated in the Events Report Criteria window: Figure 36. Events Report Note that the report includes the same fields that were displayed in the Events window, sorted in accordance with the items highlighted in the Events Report Criteria window. 6.1.3 Report Templates If a report of a specific parameter combination is frequently needed, then a template can be generated for that specific combination thereby obviating the need to mark each specific event item each time that a report has to be generated. Using templates not only saves time but can avoid user errors in setting up the report such as forgetting to include a specific item in the report parameters. 6-6 ___________________________________________________________ Operating AXSalert To generate a report using a template, do the following: • Define the report items as in the previous section highlighting events, users, doors. • From the window in Figure 35, select the Save Template button. • The Template Name window opens • Figure 37 Template Name Window Record the name of the new template, and click OK. The new template will be recorded for later use. • • • Now, click the Open Templates button. Note that the new template has been recorded among the other available templates. Figure 38 Existing Templates Window To use the new template, click the Template button. The fields are highlighted in the Events Report Criteria window. Continue by filling in the time period information (By date or Last number of days) as described in the previous section, and generate the report. Operating AXSalert __________________________________________________________ 6-7 6.1.4 Printing and Saving Reports After the report is generated, it can be printed in hard copy or saved to a file. To print a paper copy of the report, click the Print button to open the Microsoft Print window. In addition, AXSalert provides the option to export a report to a Microsoft Excel spreadsheet format (.xls), and text format (.txt). To save your report as a file, click the Export button. The Microsoft Save As window opens. Select the folder of choice, record the file name, and click Save. Refer to the figure below: Export button Print button Figure 39. Print and Save As Buttons 6-8 ___________________________________________________________ Operating AXSalert 6.2 Viewing and Managing User Keys From the Menu Bar, select Setup, Users, or click the Users button on the Toolbar. The Users window opens. Report button Double-click a column name to sort the table by that field. Double-click a single user to open the User Properties window. Refer to Figure 41. Figure 40. Users Window The key holders displayed in the User window can be sorted according to any field (last name key number, update status, etc.) by double-clicking on the column name. The sorted fields can be toggled to ascending / descending order by clicking again on the column name. 6.2.1 User Data Description The Users Table contains 14 fields with information about the user. The Key Index is determined by the system and cannot be accessed by the AXSalert operator. The following table describes the data fields. Note that the system administrator can modify most fields but others are reserved for system use. Operating AXSalert __________________________________________________________ 6-9 Field Description Key Key number, provided by system when initially read into the system. The key number is sequentially-incremented each time a new user is added to the system. This field is “grayed” and cannot be modified. Pin Code A number read from the user’s tag when it is initially read into the system. This field is “grayed” and cannot be modified. Last Name User’s last name. Together with the first name, the last name is part of the employee’s user name for accessing the system from the PC. This field is case sensitive. First Name User’s first name. Together with the last name, the first name is part of the employee’s user name for accessing the system from the PC. This field is case sensitive. Title Free text. Employee’s job title. Location Free text. Regular work location of the employee. Access Access Levels are determined by the user in the Access Level window when the system is set up. The Access Level window enables the user to determine the Time Zones, holidays, and doors and door groups of employee that accesses the facility. It is important that the employee’s Access Level shall accurately reflect his position and authorization to enter restricted areas. Access Button Enables setting a unique Access Level for a specific user. Refer to section 6.2.3.1. Building Free text. The name of the building in which the person is usually located. Office Phone Free text. Business phone or extension where the user can be reached. ID The employee’s ID number in the organization (employee number). Tag type Type of tag that the employee carries. This function is also used for color-coding the key holder (refer to section 6.2.2). Card Type of card that the employee carries: e.g., Magcard. Expiration Expiration date of the card’s validity. As of this date (see note below), the tag will not open any doors. Status Download status, i.e., whether the user data has been downloaded or not downloaded to controller. Picture Button Enables viewing the picture and personal data of the last key holder that entered the facility. Refer to section 6.2.3.2. 6-10 __________________________________________________________ Operating AXSalert In addition to these fields the User Properties window contains seven check boxes for fine-tuning user access. The check boxes are displayed by clicking the Advanced button. Refer to the following table: Check Box Description Override APB If the anti-passback feature is activated, marking this check box will de-activate it for this specific employee. This feature is implemented in controller version 2.06 and above. Increase unlock Marking this check box increases the door unlock time for a specific employee by twice the number of seconds set in the Doors window (section 5.4). This is a useful service for handicapped workers, for example. Double tag Marking this check box requires persons to enter in pairs. This is useful when a guests is visiting the site. The guest can enter the door only when accompanied by another key bearer (e.g., the hosting employee). Prevent entry Marking this check box prevents the entry of a valid key holder who ordinarily has access. This is useful in cases of a lost key. Master tag Marking this check box enables the employee, e.g., a senior manager, to access all doors. Disarm alarm Marking this check box, disables the alarm attached to the door if the employee enters. For this feature to be effective, the employee must physically use a special arm/disarm tag. Relay output When tag is presented, IOX-4 relay #25 is operational. 6.2.2 Color-coding Key Holders When handling large numbers of key holders, it is useful to “color” the key holder groups (e.g., according to position) so that it will be easier to identify key holders and locate key holders of that class in long lists when performing key holder maintenance functions in the users window. Up to 256 colors can be used according to the spectrum in Figure 24. To change the color of a key holder’s record, do the following: • Highlight the key holder in the User window. • Click the User properties button to open the User Properties window. • In the Tag type field, enter a color (from 0 to 256). • Click OK to finish. In Figure 40, 50 was entered to give the key holder’s record a green color. Operating AXSalert _________________________________________________________ 6-11 6.2.3 User Properties The User Properties window opens. Refer to the figure below. Advanced user features Sequentiallyincremented Read from key Password data Click button to view and select all Access Levels Status is “Not downloaded" Advanced button toggle to show/hide check boxes Figure 41. User Properties Window 6.2.3.1 Access Button The Access button is used to set a Personal Access Level for the key holder. After the Access Level of groups of workers has been set, it may be necessary for certain individuals to receive a personal Access Level, which is similar to a group Access Level but fine-tuned to that person’s specific level of authority and position. For example, senior management or plant owners might need special access privileges such as access to extra doors.. This feature saves the time-consuming work involved in building a personal Access Level from scratch. To set a personal Access Level, do the following: • Open the User properties window (Figure 41). Note that the Access Level is currently set to “Master”. • Now, click the Access button. Note that the Access Level now reads PAL (personal Access Level) and the user’s name (Figure 42). The Doors window opens (Figure 43). 6-12 __________________________________________________________ Operating AXSalert Access button Figure 42. User Properties Window - Access Button Figure 43. Doors Window - Personal Access Level Set the doors for the personal Access Level (refer to section 4.2.3.6 for setting door groups), and click the Exit button. The User Properties window opens again. Advanced user properties can be set at this time (Figure 41). Click OK to finish setting user parameters. The Users window opens. Note that the personal Access Level is recorded for the key holder. Operating AXSalert _________________________________________________________ 6-13 Personal Access Level (PAL) Figure 44. Users Window with New Personal Access Level 6.2.3.2 Picture Button The Picture button is used importing the picture of key holders for display with the User Trace feature. (The User Trace feature displays the details and archived picture of a key holder that has entered the facility. Refer to section 6.2.4). Importing a Picture To import a picture, do the following: • From the Main Menu go to Setup, Users or click the Users button on the Toolbar. • Highlight the key holder whose picture is to be imported, and click the Users button. The Users Properties window opens (refer to Figure 42, for example). • Click the Picture button to open the Picture Import window (refer to Figure 45). 6-14 __________________________________________________________ Operating AXSalert Figure 45. Picture Import Button • Click the Import button. • The Find File window opens, which enables opening the folder that contains the picture to be imported. Navigate to the desired picture, and click the Open button. • The picture appears in the Picture Window. Refer to the following figure: • Figure 46. Imported Picture Close the window to finish. You are returned to the User Properties window. • Click OK to finish. This step saves the picture with the key holder’s properties. Replacing a Picture When the Picture button in the User Properties is clicked, a picture will be displayed if a picture has previously been imported for the key holder. To replace the picture, click Import in the Picture window and import a picture according to the procedure in the previous section. Click OK in the User Properties window to finish. Operating AXSalert _________________________________________________________ 6-15 6.2.4 User Trace Enables the display of the picture and details of the key holder highlighted in the Events window. To use this function, highlight the event of interest. Refer to the following figure: From View, click User Trace. The following window opens. Figure 47. User Trace Window Note that the picture of the key holder and six key holder details are displayed. 6-16 __________________________________________________________ Operating AXSalert If the left panel is not already open (refer to above figure), click the Advance button to open. Note that the displayed data are those that are check marked. Up to six items can be displayed at one time. Attempting to mark more than six items will produce an error message. The user can choose any data from the check box list to mark and display. Click the Trace button to view the information about the latest event.. Note that this feature is especially powerful when combined with a real-time video camera at the facility site. In this way, the picture of the actual person entering the facility can be verified against the picture of the person authorized to hold the key. 6.2.5 Creating a Report of Users Reports can be produced on a one-time only basis or using templates. To generate a report, click the Report button (Figure 40) from the Users window. Five types of reports can be generated: • General (section 6.2.5.1). • Time and attendance (section 6.2.5.2). • Unused key (section 6.2.5.3). • Expired key (section 6.2.5.4). • By Door (section 6.2.5.5). • Generating a report (section 6.2.5.6). Depending on the type of report generated, the report can be according to key number, first name or last name, key holder’s title, location, building, ID, expiration, Access Level name. The user can select the Access Level to be included in the report from a list that contains all the current Access Levels. Additional fields for defining the report’s time period are included when the following types are reports are generated: unused key, expired key, time and attendance. Operating AXSalert _________________________________________________________ 6-17 6.2.5.1 General Report Below is a typical Users Report Criteria window. Create report button Choose the type of sorting and report types Choose the Access Levels Figure 48. Users Report Criteria Window To generate a General report, do the following: • Select the type of report (General). • Select one of the eight available parameters to order the report. • Select the Access Levels to be included in the report. • Click the Report generate button. (proceed to section 6.2.5.6). 6.2.5.2 Time and Attendance Report The Time and Attendance report enables using the system for verifying employee attendance at a specific facility. Thus, the system can be used for generating wage slips or for cross-checking with existing salary systems. Reports can be generated by specific users or by Access Level, according to specific historical dates or according to a time period up to the current date, and by a specific entry and exit door. 6-18 __________________________________________________________ Operating AXSalert To generate a Time and Attendance report, do the following: • Select the type of report (Time and Attendance). Refer to the following figure: Users and Access levels radio button Type in the desired dates in the “From” and “To” date fields. Activate either the Last Week Last Month Or Last radio button Indicate the time period. Dates in the “From and “To” fields automatically adjust. Optional: Mark the entry and exit door of the report. • Figure 49. Time and Attendance Report Select either the Users or Access levels radio button, and from the list, highlight the users or Access Levels items to be included in the report. • In the “Order by” field, select one of the available parameters. • Select either the By date or Last Month/Last Week/Last Days radio button. By date enables selecting a specific historical time period for the report. Fill in the desired time period in the “To” and “From” fields. Last days enables selecting a time period based on a number of days up to the current date. If Last days is used, the relevant dates are automatically entered in the “To” and “From” fields when the number of days is entered. • Select the entry and exit doors of the report. • Click the Report generate button. (proceed to section 6.2.5.6). Operating AXSalert _________________________________________________________ 6-19 6.2.5.3 Unused Key Report The Unused Key report is used for control purposes to ensure proper use of keys and to discover possible irregularities. To generate an Unused Key report, do the following: • • • • • Select the type of report (Unused Key). Select the Access Levels to be included in the report. In the “Order by” field, select one of the available parameters. Select either the By date or Last Month/Last Week/Last Days radio button. By date enables selecting a specific historical time period for the report. Fill in the desired time period in the “To” and “From” fields. Last days enables selecting a time period based on a number of days up to the current date. If Last days is used, the relevant dates are automatically entered in the “To” and “From” fields when the number of days is entered. Click the Report generate button. (proceed to section 6.2.5.6). Figure 50. Unused Key Report 6.2.5.4 Expired Key Report The Expired Key report is used for control purposes to ensure proper use of keys and to discover possible irregularities. To generate an Expired Key report, do the following: • • • Select the type of report (Expired Key). Select the Access Levels to be included in the report. In the “Order by” field, select one of the available parameters. 6-20 __________________________________________________________ Operating AXSalert • Select either the By date or Until Week/Until Month/Up until Days radio button. By date enables selecting a specific historical date until which the report will be generated. Fill in the desired time date in the field. Up until days enables selecting a time period based on a number of days up to the current date. If Up until days is used, the relevant date is automatically entered in the “Until date” field when the number of days is entered. • Click the Report generate button. (proceed to section 6.2.5.6). Figure 51. Expired Key Report 6.2.5.5 By Door Report This generates a report of all indicated doors and includes eight preset parameters ordered by the indicated parameter. To generate a By Door report, do the following: • Select the type of report (By Door). • Select one of the eight available parameters to order the report. • Select the Access Levels to be included in the report. • Click the Report generate button. (proceed to section 6.2.5.6). Operating AXSalert _________________________________________________________ 6-21 Figure 52. By Door Report 6.2.5.6 Generating a Report To generate the report, click the Create report button. A report similar to the following is generated: Export button Print button Figure 53. Typical Users Report 6.2.6 Report Templates, Printing and Saving The procedure for creating templates, as well as printing and exporting reports, is similar to that for Events. To use report templates, refer to sections 6.1.3. To print and save reports, refer to section 6.1.4. 6-22 __________________________________________________________ Operating AXSalert 6.2.7 Modifying User Data To modify user data, do the following: • Open the Users window, and double-click on the desired user. • The User Properties window opens. This window contains 14 fields. In addition, there are seven check boxes that refer to the capability of the user to access the facility and the types of messages generated by the user’s activities in the facility. Refer to section 6.2.1 above for a description of the fields and check boxes. • If the check boxes need to be modified, toggle the Advanced button so the Advanced options open. • Perform the necessary modifications. If a mistake is made while entering the data, Cancel will exit the User Properties window without saving the changes. Use Reset to erase pin data. • After performing the necessary changes, click OK. The user data will be downloaded to the controller, and you are returned to the User window. • Perform this procedure for other employees, if necessary. • If it is necessary to download the data to the controller, refer to section 6.2.10 below. Using the download procedure is necessary if modifications were performed offline (the computer was not connected to the controller). 6.2.8 Deleting a User To delete a user, highlight the user in the Users window, and click the Delete button (refer to Figure 54). A confirm message will be displayed. Refer to the figure below. Delete button Figure 54. Delete Users Window Operating AXSalert _________________________________________________________ 6-23 6.2.9 Adding a New User To add a new user, refer to section 5.9. If it is necessary to download the data to the controller, refer to section 6.2.10 below. Using the download procedure is necessary if new users were added offline (the computer was not connected to the controller). 6.2.10 Downloading Users If the computer was offline (no connection to the controller) when new users were added or user data modified, the AXSalert operator must download the new user data to the controller so that the changes will take effect at the doors. In addition, if Access Levels were modified, it will be necessary to perform a specific download procedure. This section describes the procedure. Note that systems with large user databases and many controllers can take several minutes or more to download. It is recommended that large downloads be performed during company “off hours”. To download users to the controller, do the following: If downloading a single user or only a couple of users, it is best to use the Download user button on a user-by-user basis. If downloading the entire user database or many users, use the Download all users button. The following window appears: Download button Figure 55. Download Users Window - Before Download Use the Not downloaded radio button to download only workers that have “Not downloaded” indicated in the Status field of the User Properties window (refer to Figure 41). If all workers defined in the system are being downloaded, activate the All radio button. Click the Download button, to begin. The following window appears: 6-24 __________________________________________________________ Operating AXSalert Figure 56. Download in Progress Window When the download is finished, the following window appears: Figure 57. Completion Message Click OK to finish. Operating AXSalert _________________________________________________________ 6-25 6.3 Backup / Restore After system setup, good computer practice requires that system data be backed up as a precautionary measure against unforeseen events. AXSalert contains a built-in backup function to make easy this tedious procedure. When performing backup, AXSalert asks for the name of the backup folder. By periodically using different backup folders, it is possible to maintain a history of system settings for restoration in the future. A suggestion is to use the current date as the backup folder. In this way, backup versions will be easily identifiable. 6.3.1 Backup To perform backup, do the following: On the Main Menu Bar, click the Backup/Restore button. A window similar to the following appears: Backup button Restore button Select the data to backup Figure 58. Backup / Restore Window • Select the data to backup: database and/or event log. • Click the Backup button. • Use the Browse button to scroll to and select the target backup folder. • A confirm message will appear: Figure 59. Backup Confirm Message 6-26 __________________________________________________________ Operating AXSalert • Click Yes to continue. A backup completion message will appear. A new folder having the same name as the date that the backup was performed (with the following format: DD-MM-YYYY) will be created in the target folder. This folder will contain two files with the following names: “events.backup” and ”vxsdb.backup”. Refer to the following figure: Figure 60. Backup Folder Click OK to exit. 6.3.2 Restore This function enables the restoration of previously-saved AXSalert data files if the current settings have been lost or corrupted. To restore previous settings, do the following: • • • • • On the Main Menu Bar, click the Backup/Restore button. The Backup/Restore window appears (Figure 58). Use the Browse button to select the folder from which the files to restore will be taken (for example, refer to (Figure 60). Mark the Database and/or Event Log check box, for the information to restore. Click the Restore button. A caution message similar to the following will appear: Figure 61. Restore Caution Message Click Yes to continue. After restoring, click OK to exit. Operating AXSalert _________________________________________________________ 6-27 6.4 Door Reports Since AXSalert can manage 1,750 doors over a network, doors reports can be valuable for checking correct settings. Furthermore, door reports can be long and complex. The Doors Report is a standard report that includes all the parameters displayed in the Doors window as follows: door name, loop, reader, unlock duration, unlock toggle, RTE polarity, door position polarity, door position function, door ajar, Time Zone, Time Zone function. To generate a Doors report, open the Doors window by choosing Setup, Doors on the Menu Bar. To generate a report, click the Make a report button. A report similar to the following is generated: Export button Print button Figure 62. Door Report The procedure for printing and exporting reports is similar to that of Events (refer to section 6.1.4). 6-28 __________________________________________________________ Operating AXSalert 6.5 Holidays Reports To generate the report, click Setup, Holidays on the main Menu Bar. The Holidays window opens. Click the Make a report button. A standard report similar to the following is generated: Export button Print button Figure 63. Holidays Report The procedure for printing and exporting reports is similar to that of Events (refer to section 6.1.4). 6.6 Time Zones Reports To generate the report, click Setup, Time Zones on the main Menu Bar. The Time Zones window opens. Click the Make a report button. A standard report similar to the following is generated: Operating AXSalert _________________________________________________________ 6-29 Export button Print button Figure 64. Time Zones Report The procedure for printing and exporting reports is similar to that of Events (refer to section 6.1.4). 6.7 Upload \ Download Uploading data to the PC from the controllers and downloading from the PC to the controller are frequently-performed activities. Downloading activities are performed especially after setup changes. Generally, user data can be downloaded to the controller at a time that is convenient for the system, e.g., during non-peak hours. Downloading was explained in section 5.11 and section 6.2.10. 6-30 __________________________________________________________ Operating AXSalert 6.7.1 Upload Procedure If the PC was shut down for any reason (for example, turning off the computer at night), it is recommended that events be uploaded from controllers after the PC has been rebooted. In addition, in legacy controllers, some user data can be uploaded to AXSalert thereby saving tedious entry chores. Two types of data can be uploaded to controllers: events and system settings (setup, doors, Time Zones, holidays, users). To perform an upload, do the following: Click Operation, Upload/Download from the Menu Bar, or click the Upload/Download button on the Toolbar. A window similar to the following appears: Upload system data Upload events Select the data to download Status after upload Figure 65. Upload/Download Window • Mark the system data to be uploaded in the appropriate check box. Note that all or some of the following data can be downloaded: setup data, doors, Time Zones, holidays, and modified user or new user data), OR if “events only” data is being uploaded (the most frequent type of upload activity), leave all check boxes unmarked. • If system data is being uploaded, click the Upload button, OR if events are being uploaded, click Events Only button. • After the download is performed, the download statistics will be displayed in the Status box. Click Exit to return to the previous window. Operating AXSalert _________________________________________________________ 6-31 6.8 Map Generator AXSalert contains an in-built proprietary program to enable building a graphic map of the facility with active elements such as readers, controllers and peripheral equipment. When events occur, map elements are activated and displayed on-screen showing the event location on the map including a description of the event. In addition, doors can even be opened and closed from the PC workstation. This section shows how to build a basic map and how the map functions. The example below shows a simple map to illustrate the basic principles. Maps can be very complex and can include several floors in a building. 6.8.1 Opening the Map Generator Application From the Menu Bar, select Operation, Map Generator. The following window opens: Figure 66. Map Generator - Opening Window Note that a toolbox of graphic objects is opened together with the main window. The toolbox will be used shortly to place graphic objects on the map. 6.8.2 Preparing and Retrieving a Map Background A map of the desired facility should be prepared in graphic form. If only a hard copy exists, then it should be scanned or redrawn in a computer graphics file format. This map will serve as the background on which the graphic objects will be placed. For purposes of this demonstration, a simple map of one floor will be used. 6-32 __________________________________________________________ Operating AXSalert i Note: For installations with more than one floor, a map should be prepared for each floor. Familiar graphic formats such as .bmp should be used for the map background. For any questions, consult with AXSalert software support. The graphic file should be copied to the Vissacces\Bams\Smg folder before beginning. From the Menu Bar, select Options, Background. Select the file: FirstFloor.bmp. a Window similar to the following opens: Objects tool Figure 67. Basic Map Background 6.8.3 Toolbox of Objects The toolbox contains the active objects for placement on the graphic map. By using the objects, the relative location of all detection devices in the system can be constructed. Currently, the following objects are available for placement on the graphic map background: Normal Select Placement Select Stairs Camera Controller Door Infra-red reader RDR reader Figure 68. Objects Toolbox In addition, note the Placement Select button for selecting and placing objects and the Normal Select button for moving and deleting objects on the map background. Operating AXSalert _________________________________________________________ 6-33 6.8.4 Placing, Sizing and Rotating Objects To place an object, click the Placement Select button so that it is depressed and then click on the object to be placed on the map. With the mouse button down, drag the object to its appropriate place on the map. Repeat this procedure until all the objects have been placed. If a placement mistake is made, the object can be deleted by clicking it with the Normal Select button and then pressing the Delete key. If an object has to be moved after it has been placed on the map, drag it to its new place using the Normal Select button. It is possible to increase the size of active objects by using the plus ( + ) and minus ( - ), respectively. In addition, objects can be rotated 90o either leftward or rightward using the left and right brace ( { , } ) keys. Consider the following figure. All available types of objects have been added to the map. The door object has been increased in size so that it is more proportional to the other objects. The camera has been rotated so that it faces the direction of key holders entering the facility. Camera rotated Door size increased Figure 69. Map with Placed Objects 6-34 __________________________________________________________ Operating AXSalert 6.8.5 Adding Captions To add captions to the placed objects, do the following: Go to Options on the SMG Main Menu and select Objects. The Design Properties window opens. In the Text field, fill in the desired text. This text will appear on the map itself when displayed in the program. Click OK to finish entering captions. Refer to Figure 70. Add object text here Figure 70. Design Properties Window Note that text appears for all the objects on the map. Refer to Figure 71. Figure 71. Map after Adding Captions Operating AXSalert _________________________________________________________ 6-35 6.8.6 Activating the Map Objects placed on the map are activated from the Design Properties window (Figure 70). When doors are selected, the More button becomes active, which opens a lower panel enabling the selection of the specific door, loop and reader numbers (Figure 72). Objects such as controllers, readers and cameras must have the appropriate number indicated in the Number field. Peripheral equipment uses the auxiliary (Aux) fields. In buildings with more than one story, the Stairs field is used to activate the maps of other floors. Figure 72. Design Properties Window with Door Options 6-36 __________________________________________________________ Operating AXSalert 6.8.7 Viewing Events with the Map To view events using the user-defined graphic map, do the following: Click View, Maps on the Menu Bar. The following window opens: Active / Inactive button Available maps Available check boxes Figure 73. Maps Window Double-click the map of choice from the available maps. The map opens. The map contains all the objects that were defined in the Map Generator application. The following check box options are available from the Maps window: Pop map when alarmed “Pops up” the map on the desktop when an alarm occurs. Scroll on valid event AXSalert “pops up” the map if a valid event occurs (such as a valid key entry or valid exit). Marking both the Pop map when alarmed and Scroll on valid event check boxes will pop up the map on the desktop when any event occurs. Operating AXSalert _________________________________________________________ 6-37 When the map is active doors can be opened or closed and event messages are displayed on the appropriate access element. “Open Door”. The door is open. The user can open or close doors by rightclicking the mouse and selecting “Open door” or “Close door”. (Refer to section 6.8.8). Event message. If the map is opened or “popped up”, the message text will appear on the map object (if the appropriate check box was marked). The user can choose to turn the map on or off using the Active/Inactive buttons. If the map is off, then the map will not pop up even if the “Pop map when alarmed” check box is marked. 6.8.8 Right-Click Mouse Functions Right-clicking the mouse opens the following window: Figure 74. Map Right-click Mouse Functions Refer to the following table: Properties Shows the properties of the specific object. Open Opens the door. Close Closes the door. Disable Disables the specific object. Enable Enables the specific object. 6-38 __________________________________________________________ Operating AXSalert 6.8.9 Doors Control In large facilities, a guard or secretary may be physically stationed at a local computer with duties that include opening a door manually when entry is requested. This feature is provided by the Doors Control, which is accessed from View, Doors Control on the Menu Bar. A window similar to the following opens. Figure 75. Doors Control Window In the above window, the guard can open either the warehouse door or the computer room door. This feature is generally combined with other AXSalert features, such as checking the identity of the person using the User Trace feature for checking the key holder’s picture and ID data (section 6.2.4) after the key holder has presented a key outside the door. Advanced Features __________________________________________________________ 7-1 CHAPTER 7 Advanced Features This section describes advanced features available with AXSalert software, especially features for fine-tuning remote controller/reader hardware and communications as well as monitoring tools. 7.1 Monitors From the Menu Bar click View, Monitors. The following window appears: Figure 76. Monitors Window Used for technical support, this window monitors the serial communications equipment connected to the computer, i.e., the AXS-100 controller and the RDR-PXT key reader. 7-2 ___________________________________________________________ Advanced Features 7.2 Status From the Menu Bar click View then Status. The following window appears: Refresh button Select the loop and controller The Status window shows the controller(s) status in real time. Controller status is automatically refreshed every few seconds. The user can immediately refresh the window by clicking the Refresh button. Field Description Mode Displays the current AXS-100 operation mode. Refer to the section 7.4.1 for a description of the different possible modes. Keys Number of enrolled keys in the system. AI 1 Analog input 1. AI 2 Analog input 2. AI 3 Analog input 3. AI 4 Analog input 4. Version AXS-100 EPROM firmware version. Internal reader communication Indication of communication between a controller and its in-built reader. Values: Working/Failure. Left/Right reader communication Indication of communication between AXS-100 Reader #1/Reader #2 and the AXS-100. Values: Working/Failure. Advanced Features __________________________________________________________ 7-3 Field Description User interface mode The AXS-100 LCD screen is normally on Idle (time and date are displayed). However, AXS-100 function keys function will cause the user interface mode to be changed. This field shows the user interface mode. Values: Idle/Menu or functions. Left/right door position State of left/right door Values: Open/Closed Alarm relay When set, the values can be Idle or Triggered for special events (e.g., Forced Door, Controller tamper, etc.). Controller tamper status Values displayed are Tamper or Secure. 7.3 Counters From the Menu Bar click View then Counters. The following window appears: Refresh button Reset APB table Check loop Figure 77. Counters Window The Counters window displays the difference between number of entries and exits for the designated loop. This feature is useful in applications where it is important to know, in real-time, the difference between the number of entries and exists. For example, in parking lot applications it is important to know the number of available parking spots at the site, or in other applications, it may be important to know the total number of people in a building at a given time. In this example, each time an entry or exit is performed, the displayed number displayed will increment or decrement, respectively. The Refresh button immediately refreshes the data. Otherwise, the data will refresh every few seconds. 7-4 ___________________________________________________________ Advanced Features 7.4 Setup Options 7.4.1 Controller Tab AXSalert provides the capability to define the parameters of each AXS-100 controller (1 to 8) in each loop. To set local parameters, do the following: Click Setup then Options from the Menu Bar. Click the Controller Tab. The following window appears:. Figure 78. Setup, Options - Controller Tab Advanced Features __________________________________________________________ 7-5 Title Description Mode Description # Doors Readers APB Comments 1 2 2 Hard 2 1 2 No One reader 3 2 2 Soft Entry once but exit many 4 1 2 Soft Entry once but exit many 5 2 2 Yes Both entry in APB mode 6 1 2 Hard For each key entry, there must be a key exit through the same door 7 2 2 No No interaction between the two locks 8 2 2 Yes Both entry in APB mode 9 Elevator For each key entry in 1 door, there must be a key exit through the other door Elevator control using IOX-4 add-on cards APB Reset The actual hour of clearing APB. The time format is European, i.e. 24 hours: 0 - 23. After this hour, the APB is reset. Entering 99 disables the reset feature. APB Timeout Cancels anti-passback rules in durations of half hours. 48 half hours (total of 24 hours) is the default. Alarm RT Alarm relay time. Time that the alarm relay is active for an alarm event. Reader communication The number of times that the reader sends messages to the controller. If the controller has not received the message after this number of times has elapsed, then a communication failure message will be issued. Network transmission The number of times that controllers send messages among themselves. If the controller has not received the message after the indicated number of times has elapsed, then a communication failure message will be issued. Reader loop delay Must be set when two readers are working in a back-to-back configuration, e.g., on either side of a door, so that their transmissions do not interfere with one another. Set in increments of 10 milliseconds. For this function to work, the toggle readers check box must be marked. See below in this table. Door position debounce Amount of time that elapses in increments of 10 milliseconds until another reading can be performed. Intended to prevent a double reading by the sensor in cases where the door physically “bounces” when closed. Printer line pacing Sets the time that elapses in increments of 10 milliseconds when printing is directly performed from the controller. PC ack timeout PC acknowledge timeout. The time that the controller waits to receive an acknowledge signal from the PC. Bolt time relock The period of time that passes from whenever the door is closed until it locks. 7-6 ___________________________________________________________ Advanced Features Title Description Reserved For future use. Door ajar timeout Should be 65535. System number The system number for purposes of modem communications. Usually used for technical support. PC password For future use. 7.4.2 Advanced Tab Click Setup then Options from the Menu Bar. Click the Advanced Tab. The following window appears: Figure 79. Setup, Options - Advanced Tab Title Flag 1 Bit 1 Flag 1 Bit 2 Flag 1 Bit 3 Flag 1 Bit 4 Description Alarm on invalid key - If this flag is set, any invalid key will cause the AXS-100 controller to display an invalid key message and to turn on the alarm relay Display PIN code in the controller - If activated, the PIN code is displayed after adding a new key. This feature should be turned on if an RDK-4 (proximity reader with keypad) is connected to the controller. Following display of the key number, the 4-digit PIN code will display for a few seconds Reserved Enable buzzer on alarm/ trouble - If the buzzer is enabled and there is at least one unacknowledged event, the buzzer will sound every 4 seconds. Default OFF OFF OFF OFF Advanced Features __________________________________________________________ 7-7 Flag 1 Bit 5 Flag 1 Bit 6 Flag 1 Bit 7 Flag 1 Bit 8 Flag 2 Bit 1 Flag 2 Bit 2 Flag 2 Bit 3 Flag 2 Bit 4 Flag 2 Bit 5 Flag 2 Bit 6 Flag 2 Bit 7 Flag 2 Bit 8 Flag 3 Bit 1 Flag 3 Bit 2 Flag 3 Bit 3 Flag 3 Bit 4 Flag 2 Bit 5 Flag 3 Bit 6 Flag 3 Bit 7 Flag 3 Bit 8 Wait for acknowledge - Wait for acknowledgment from software. The AXS-100 controller can upload its setup and key database to the computer via RS-232. If the software in the computer is AXS-100 ready and able to send an acknowledgement for each received message, mark the check box. Half time opening when battery is in use - Causes the controller to shorten open time by half when powered by a backup battery. Alarm relay in alarm/ trouble - Mark the check box if control is by the controller. Unmark the check box if control is by the computer. Door relays direct control - Mark the check box if control is by the controller. Unmark the check box if control is by the computer Dial out when event count exceeds - The controller will attempt to dial out using a modem when the new event count has exceeded the number in the data register. Auto answer after one ring - Auto answer after 1 ring. If an external modem is connected to the AXS-100 RS-232 terminal, the modem will be initialized to answer after ringing once after power up, as well as every time a message fails to be acknowledged by the PC. Dial out on alarm - The controller will attempt to dial out using a modem when an alarm is detected from any controller Send events in text mode - Sends the event messages in text mode. If the flag is cleared, the controller will send messages in numeric mode. Events cause IOX-4 relays 26 to 32 to click - Activate relays 26 to 32 depending on the event type Stop APB decrement - Stops the decrementing of anti-pass back counters Controller #1 catches alarms/troubles - Captures alarm/problem events from other controllers. If cleared, controller #1 will not display and will close the alarm relay upon receipt of an alarm/problem indication from other controllers Allow loop-wide APB operations - Anti-pass back is loop-wide. Controllers #2 to #8 can share entry/exit data between themselves to allow for loop-wide anti-pass back operation. Beep when a key is presented to the RDR-4B - For controlling the buzzer of the RDR-4B while green or red color is displayed Trigger APB only if the door is opened - Delayed anti-passback action when the door opens if the flag is marked. If door is not opened, antipassback is not set. Can also be used for reporting normal entry when the door opens in non-anti-pass back mode. Allow only one lock to be opened - Single lock will open at any one time for both reader and RTE. Reserved Reserved Enable broadcast setup messages to #2-#8 - Enables/disables broadcast of all setup messages from the PC to controllers #2 to #8. Buzzer when key is pressed - Enables/disables key-press buzzer Reserved OFF OFF OFF OFF OFF OFF OFF OFF OFF OFF OFF ON ON ON ON OFF OFF ON ON OFF 7-8 ___________________________________________________________ Advanced Features 7.4.3 Extended Tab Click Setup then Options. Click the Extended Tab from the Menu Bar. The following window appears: Figure 80. Setup, Options - Extended Tab Title Flag 4 Bit 1 Flag 4 Bit 2 Flag 4 Bit 3 Flag 4 Bit 4 Flag 4 Bit 5 Flag 4 Bit 6 Flag 4 Bit 7 Flag 4 Bit 8 Flag 5 Bit 1 Flag 5 Bit 2 Flag 5 Bit 3 Flag 5 Bit 4 Flag 5 Bit 5 Flag 5 Bit 6 Description Alarm Functionality using IOX-4 boards – AXSalert enables connecting up to 4 I/O cards, each with 8 input and 8 output ports. A system of sensors can then be connected to the ports to provide highlevel security. Marking the check box activates these boards (if installed) Global arm/disarm of alarm system – When marked, enables activation of all the controllers in all loops Ignore RTE input Report write operation TO Flash EPPROM Print paper slip if VALID KEY in #2-#8 Alarm relay is used with register 0 as up/down counter Do not use Time Zone in key Add/Modify. Use Access Level instead Enable the use of Prevent Entry bitmap table Enable IOX-4 board #1 Enable IOX-4 board #2 Enable IOX-4 board #3 Enable IOX-4 board #4 Relock after 2-seconds open – If ON, door becomes released and locks again only after entry (for emergency situations such as fire, etc.). Motorized bolt – Motorized bolt door lock functionally for locks witch unlock time of zero seconds. Default OFF OFF OFF OFF OFF OFF OFF OFF OFF OFF OFF OFF OFF OFF Advanced Features __________________________________________________________ 7-9 Flag 5 Bit 7 Flag 5 Bit 8 Use tamper input to relocks both door locks. Reset controller if RDR comm. Faile - Reset controller if any reader is not communication to more then 3 minutes OFF ON 7.4.4 Software Tab Click Setup, Options from the Menu Bar. Click the Software Tab. The following window appears: Figure 81. Setup, Options – Software Tab Title Description Delay after acknowledge This is the time delay before a second message is sent from the PC to controller Delay after event The time delay between the display of two consecutive events. If this setting enables a very short delay other AXSalert features may be impaired such as the display of pictures in the User window. Send timeout The time that the computer waits after sending a command to the controller and before sending the same command a second time. Event remains on map When an event occurs the event window opens and remains on map for the indicated time period (in msec). Maximum events The maximum number of events that can be displayed in the events window (999,999). Pump software events When marked, this enables the display of software events in the Events window. Auto upload events on setup Automatically uploads events from the controller to the computer when the computer is booted. 7-10 __________________________________________________________ Advanced Features Title Description Language Enables changing the AXSalert interface language. After locating the correct .wct language file using the Browse button, click Set language. The program interface changes to the selected language without having to leave the application. Database directory Enables changing the current folder of the AXSalert database. The database location was originally determined when AXSalert software was installed. 7.4.5 Communication Tab This window contains the main parameters for defining the communication between the computer, controller and network (refer to section 5.3). Troubleshooting_____________________________________________________________ 8-1 CHAPTER 8 Troubleshooting 8.1 Controller Not Responding Problem: The following message is displayed: Figure 82 Communication Failure Message Action: 1. Check the cable between the AXS-100 and the PC and verify that its wires are connected correctly on both ends. 2. In the AXSalert click on Setup → Options → Communication and verify that the AXS-100 and the RDR-PXT is connected to the correct COM ports. 3. If the problem persists, after changing the COM ports, the COM ports connections need to be checked. It can be done using the Hyper Terminal utility provided with the operating system. (From the Start menu, select Programs → Accessories → [Communications]→ Hyper Terminal), as follows: a. Double click on the ‘Hypertrm.exe’ icon The following window is displayed: b. Give the connection any name you want and click OK. The following window is displayed: 8-2 _____________________________________________________________ Troubleshooting c. Set the COM port to be tested (probably Com1 for the controller and Com2 for the Reader). The following window is displayed: d. Set the following parameters: Bit per second: 9600 Data bits: 8 Parity: None Flow control: None e. Click OK If all is OK, you should have the following window opened. Troubleshooting_____________________________________________________________ 8-3 If the port is used by another application the following message is displayed: Close the other application and run AXSalert again. f. If no messages are displayed, and you want to check the communication between the controller and the PC, generate an event in the AXS-100 (e.g. AXS-100 Login and Logout). g. Should the connection work well you should see the events displayed on the window’s client area (the white area). 8-4 _____________________________________________________________ Troubleshooting For example: To check the reader’s communication: Perform the above steps a - e. Present a tag/card to the reader. Make sure the reader’s LED turns green once you present the tag. If the connection to the reader is OK the window’s contents should be filled with hexadecimal digits (0-9 and A-F). For example: If any of the connections does not work – you don’t see anything on the screen, recheck your connections. If the problem persists, contact your administrator or PC vendor. If data is displayed on the Hyper Terminal screen but the connection between AXSalert and AXS-100 still can’t be established, check the connection wires between the controller and the PC. Make sure all wires are connected as specified in the AXS-100 Installation Manual (or on the inner side of the AXS-100 box door). Troubleshooting_____________________________________________________________ 8-5 Problem On startup the following error message is displayed: Action Another application uses the controller’s Com port. Close this application and restart AXSalert. Problem On startup the following error message is displayed: Action Another application uses the reader’s Com port. Close this application and restart AXSalert. Problem When the Users screen is displayed, the database navigation buttons blink. Action Make sure there is no key around the RDR-PXT. Problem Holiday date – Setting the holiday date to the desired date is done with no problems. However, when the holidays row is not highlighted any more, its date format is changed. Action To set the Windows date format, click My Computer → Control Panel → double click Regional Settings icon. 8-6 _____________________________________________________________ Troubleshooting The following window is displayed: This is the date format currently set in Windows Select the date tabulator. Write down the date format used by your PC (either dd/MM/yy for European date format or MM/dd/yy for American date format). Run AXSalert. Problem Missing Events - The AXSalert was working all night, but events that happened during the night were not saved to the PC. Action The PC’s power management is set to be turned off after a predefined time. Set the Power Management’s (under the Control Panel) parameters to be always on. Problem Password forgotten - The password is forgotten. Action You need to call VisonicTechnologies for a new password. VisonicTechnologies 30 Habarzel St. Tel Aviv 69710 ISRAEL Tel: 972 – 3 - 768 1400 Fax: 972 - 3 - 768 1415 [email protected] Frequently Asked Questions ___________________________________________________ 9-1 CHAPTER 9 Frequently Asked Questions (FAQ) This chapter contains questions that are frequently asked by users regarding AXSalert. We recommend that you consult this chapter first for answers to your questions before referring to your distributor or to VisonicTechnologies technical support. This is not a FAQ of the entire AXS-100 system. For answers to questions about the system, refer to the documentation that accompanies the system components. What are the advantages of AXSalert compared with AXSoft-100? AXSalert has several very important advantages. First, the maximum number of doors in a AXSalert system is 1,750. Therefore, AXSalert is appropriate for even large sites. Second, AXSalert can operate over TCP/IP so it integrates well with the existing site network. Third, AXSalert is user-friendly and day-to-day use is intuitive. Fourth, many types of reports can be generated. These reports cover the entire range of AXSalert operation. I am presently using AXSoft-100. Can I upgrade to AXSalert? Yes. To upgrade, contact your supplier or VisonicTechnologies directly. Is AXSalert suitable for multiple sites? Yes. AXSalert has a built-in client/server capability. Each site can supervise access to its own facilities. Does AXSalert perform all the programming activities that the AXS-100 controller performs? Yes. You will be able to perform all programming activities from the desktop, without having to send a technician into the field to handle a AXS-100 controller. These activities include adding, deleting and modifying details of keys (users), viewing system events (such as violations of access privileges), setting door parameters, generating reports of system activity. Are there any instances for which a technician will have to perform activities at the controller box? The AXSalert system is hardware based. Readers and doors are connected by wires to the controller, and the controllers are connected to one another serially by cable and finally to the PC. Therefore, if there is a hardware failure, a technician will have to be sent into the field to solve it. When setting up AXSalert, how do I know which doors recorded in the PC refer to which readers in the field? Generally, in a single controller, Reader 1 is connected at the left side of the controller and Reader 2 to the right side. However, for larger systems, it is recommended that the doors recorded at setup time be cross-checked with someone at the controller site. Can I determine in advance the types of system events that will be displayed? No. All events received from the controller are automatically displayed in the AXSalert Events window (the AXSalert opening window). A full list of all possible events is presented in appendix C in this manual. Can I determine in advance how different kinds of system events will be displayed? 9-2 ____________________________________________________Frequently Asked Questions Yes. AXSalert enables the user to color-code different types of events such as “forced door”, invalid key”, etc. Does AXSalert have a graphic map display capabilities? Yes. AXSalert contains a capability for building maps on which access objects (such as controllers, readers, cameras, etc.) can be placed. When an event occurs, the event message is displayed on the specific access object on the map. The map can be set to “pop up” on-screen when an event occurs, showing the event’s location. How can I backup AXSalert files? AXSalert has an in-built Backup and Restore function to make this procedure easy. You can selectively backup and restore events or system data. It is not necessary to use any third-party backup software. What database does the AXSalert use? The database currently used by AXSalert is Microsoft Access. Can I export the database to other applications? Yes. Reports generated in AXSalert can be saved as Microsoft Excel-compatible files and opened in Microsoft Excel file for further analysis. How does the AXSalert software know how many controllers are currently in the system? The software will identify the number of installed controllers because the addresses of each controller are set by dip switches when the hardware is first installed. (Refer to the AXS-100 Installation Instructions). AXSalert polls each controller and receives status messages including the controller number. The ‘Controller(s) status’ window shows a tabulator for each controller connected in the network, along with its number. What happens if the system does not recognize an employee’s password? Company personnel with “Admin” privilege can change the password of any user, even those employee’s who have forgotten their passwords. What happens if the system does not recognize any passwords? Call VisonicTechnologies Technical Support. This problem can easily be handled in a short telephone call. What is anti-passback? This feature enables two readers to be used at a single door – one outside and the other inside. After entry, the door will lock and not open again for the same key unless the key was read by the reader on the inside of the door. In this manner, an authorized person who is inside cannot enter again until he/she passes the card again from the inside when leaving. This is intended to restrict the habit of passing cards between workers. Frequently Asked Questions ___________________________________________________ 9-1 CHAPTER 9 Frequently Asked Questions (FAQ) This chapter contains questions that are frequently asked by users regarding AXSalert. We recommend that you consult this chapter first for answers to your questions before referring to your distributor or to VisonicTechnologies technical support. This is not a FAQ of the entire AXS-100 system. For answers to questions about the system, refer to the documentation that accompanies the system components. What are the advantages of AXSalert compared with AXSoft-100? AXSalert has several very important advantages. First, the maximum number of doors in a AXSalert system is 1,750. Therefore, AXSalert is appropriate for even large sites. Second, AXSalert can operate over TCP/IP so it integrates well with the existing site network. Third, AXSalert is user-friendly and day-to-day use is intuitive. Fourth, many types of reports can be generated. These reports cover the entire range of AXSalert operation. I am presently using AXSoft-100. Can I upgrade to AXSalert? Yes. To upgrade, contact your supplier or VisonicTechnologies directly. Is AXSalert suitable for multiple sites? Yes. AXSalert has a built-in client/server capability. Each site can supervise access to its own facilities. Does AXSalert perform all the programming activities that the AXS-100 controller performs? Yes. You will be able to perform all programming activities from the desktop, without having to send a technician into the field to handle a AXS-100 controller. These activities include adding, deleting and modifying details of keys (users), viewing system events (such as violations of access privileges), setting door parameters, generating reports of system activity. Are there any instances for which a technician will have to perform activities at the controller box? The AXSalert system is hardware based. Readers and doors are connected by wires to the controller, and the controllers are connected to one another serially by cable and finally to the PC. Therefore, if there is a hardware failure, a technician will have to be sent into the field to solve it. When setting up AXSalert, how do I know which doors recorded in the PC refer to which readers in the field? Generally, in a single controller, Reader 1 is connected at the left side of the controller and Reader 2 to the right side. However, for larger systems, it is recommended that the doors recorded at setup time be cross-checked with someone at the controller site. Can I determine in advance the types of system events that will be displayed? No. All events received from the controller are automatically displayed in the AXSalert Events window (the AXSalert opening window). A full list of all possible events is presented in appendix C in this manual. Can I determine in advance how different kinds of system events will be displayed? 9-2 ____________________________________________________Frequently Asked Questions Yes. AXSalert enables the user to color-code different types of events such as “forced door”, invalid key”, etc. Does AXSalert have a graphic map display capabilities? Yes. AXSalert contains a capability for building maps on which access objects (such as controllers, readers, cameras, etc.) can be placed. When an event occurs, the event message is displayed on the specific access object on the map. The map can be set to “pop up” on-screen when an event occurs, showing the event’s location. How can I backup AXSalert files? AXSalert has an in-built Backup and Restore function to make this procedure easy. You can selectively backup and restore events or system data. It is not necessary to use any third-party backup software. What database does the AXSalert use? The database currently used by AXSalert is Microsoft Access. Can I export the database to other applications? Yes. Reports generated in AXSalert can be saved as Microsoft Excel-compatible files and opened in Microsoft Excel file for further analysis. How does the AXSalert software know how many controllers are currently in the system? The software will identify the number of installed controllers because the addresses of each controller are set by dip switches when the hardware is first installed. (Refer to the AXS-100 Installation Instructions). AXSalert polls each controller and receives status messages including the controller number. The ‘Controller(s) status’ window shows a tabulator for each controller connected in the network, along with its number. What happens if the system does not recognize an employee’s password? Company personnel with “Admin” privilege can change the password of any user, even those employee’s who have forgotten their passwords. What happens if the system does not recognize any passwords? Call VisonicTechnologies Technical Support. This problem can easily be handled in a short telephone call. What is anti-passback? This feature enables two readers to be used at a single door – one outside and the other inside. After entry, the door will lock and not open again for the same key unless the key was read by the reader on the inside of the door. In this manner, an authorized person who is inside cannot enter again until he/she passes the card again from the inside when leaving. This is intended to restrict the habit of passing cards between workers. Appendix __________________________________________________________________ A-1 APPENDIX List of Events Valid key Presentation of a valid key to a key reader and entry of a key holder through a door using a valid key. Invalid key Presentation of an invalid key to a key reader. Add key Add new key to the user database. Modify key Modify data of a user who has a key already existing in the user database. Delete key Delete a key currently in the database. Set setup A setup change performed at the controller. Generally, a download using Advanced functions or a download of doors setup data. Erase DB Erasing of the database from the controller. Forced door The door was opened even though the lock was not.. Door left open Door was left open after a valid entry. Door restored Closing the door at the site or from the PC. Press to exit Button at site must be pressed to exit. Login Login performed at controller. Logout Logout performed at controller RC Comm error Communication error between controllers. RC Comm restored Communication error between controllers was corrected. RDR Comm failed Failure in communication between reader and controller. RDR Comm restored Communication error between controllers and reader was corrected. Time zone failed Key holder with valid key attempted to enter at a time when he was not permitted. Invalid door Key holder with valid key attempted to enter a door that was not defined for him. Power failed Electrical power has failed. Generally, battery power would begin to operate in this case. Power restored Electrical power has been restored. Battery failed Controller battery power has failed. Battery restored Controller battery power has been restored. A-2___________________________________________________________________Appendix T&A Exit Current mode of the system when operating as a worker attendance time clock is set for exit. T&A Entry Current mode of the system when operating as a worker attendance time clock is set for entry. Valid exit Valid exit by key holder. Ctrl tamper Controller door has been opened. This function is generally connected to an alarm. Download Data download to the controller performed. Download failed Download of data to controller failed. Key expired The key’s date has expired. It must be renewed. Invalid APB The key has been presented to the reader, but the user has already passed through the current door. Other lock open One door is still open while trying to open a second door. (Doors have been defined to be opened consecutively.) Long read Tag can be continuously presented to the reader for more than 3 seconds. Auto open Door is automatically opened at a given time as a result of predefinition. Auto close Door is automatically closed at a given time as a result of predefinition. Open lock externally Door opened from the PC. Input trouble Problem in transfer of input from an external device (IOX-4) or controller input to the controller itself. Input restored Problem in transfer of input from external device to controller was corrected. Flash write error Problem with writing to flash memory of the controller. Input normal External device transmitting input normally. Input triggered Input from external device was triggered for setting off an alarm. Alarm armed The alarm device was armed. Alarm disarmed The alarm device was disarmed. Double tag Two tags are required to enter the facility. Notified event Acknowledgement was performed from the PC (event was doubleclicked and “grayed”). Software login Login performed from the PC. Software logout Logout performed from the PC. Appendix __________________________________________________________________ A-3 Enter privileges PC software event. Upload PC software event. Data uploaded from controllers. Download PC software event. Data downloaded to controllers. Restore PC software event. Database restored from backup file. User Added PC software event. New user added. User deleted PC software event. Current user deleted. Users downloaded PC software event. Only user data downloaded to controller. Access level added PC software event. A new Access Level has been added. Access level deleted PC software event. A current Access Level has been deleted. Door deleted PC software event. A current door has been deleted. Doors downloaded PC software event. Doors data has been downloaded to controller. Time zone deleted PC software event. A current Time Zone has been deleted. Time zones downloaded PC software event. Time Zones data has been downloaded to the controller. Holiday added PC software event. A new Holiday has been added. Holiday deleted PC software event. A current Holiday has been deleted. Holidays downloaded PC software event. Holidays data has been downloaded to the controller. Setup download PC software event. Setup data (entered at the Advanced menu) has been downloaded to the controller. Glossary __________________________________________________________________ G-1 GLOSSARY Access Level An Access Level is the right given via AXSalert for personnel to access a certain door or set of doors during specific time durations (Time Zones). Anti-passback (APB) This feature enables two readers to be used at a single door – one outside and the other inside. After entry, the door will lock and not open again for the same key unless the key was read by the reader on the inside of the door. In this manner, an authorized person who is inside cannot enter again until he/she passes the card again from the inside when leaving. This is intended to restrict the habit of passing cards between workers. Backup An AXSalert feature that enables copying the current AXSalert user and event databases to another folder for reference if the current files are destroyed or corrupted. Download The process of transmitting data from the PC to the controller. Downloading is performed if the computer was offline and user data changed, if Access Levels were changed or if system settings were changed. Enrolling keys The procedure for inputting key data into the system using a key reader such as VisonicTechnologies RDR-PC. Event Any occurrence that has an effect on system access. This includes simple events from opening a door to complex hardware and communication problems. For example, a valid entry through a door is recorded as a “Valid key”, and the entry through a door without presenting a valid key is recorded as “Forced door”. Currently, approximately 60 types of events are recorded by AXSalert (appendix C). Holidays Designated dates on which key holders are denied access to doors to which they usually have access. Loop A loop can contain a maximum of 8 controllers and 16 readers. Offline Performing activities when the PC is not connected to the controller. Offline operation has implications for certain activities. If users were added, modified or deleted offline, it will be necessary to perform a special download procedure when the computer goes online. G-2 __________________________________________________________________ Glossary Online Performing activities when the PC is connected to the controller. Online operation has implications for certain activities. If users were added, modified or deleted online, it is unnecessary to perform a special download procedure. PAL Refer to Personal Access Level. Personal Access Level An Access Level that applies to a single key holder. Privilege The right to perform activities on the AXSalert system either from the PC or from the controller. AXSalert has four levels of privilege: Events only, Events and Users, All, and Admin. Reader A device for identifying keys. The most common type of reader are those on doors to permit entry/exit. Restore AXSalert feature that enables copying the backed up user and event database files to the current AXSalert folder. This is usually performed if the current files are destroyed or corrupted. Time Zone A designated time period in which the key holder can freely enter and exit the door to which he has access. Upload The process of transmitting data from the controller to the PC. Uploading is usually performed after the computer has been offline or shut down and the new events have to be transferred from the controllers to the PC for examination.