Access Control Manager Admin Guide

Admin Guide
Access Control Manager™ Software
Version 5.10.10
© 2018, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, ACCESS CONTROL
MANAGER, ACM, ACM VERIFY AND TRUSTED SECURITY SOLUTIONS are trademarks of Avigilon Corporation.
Other names or logos mentioned herein may be the trademarks of their respective owners. The absence of the
symbols ™ and ® in proximity to each trademark in this document or at all is not a disclaimer of ownership of the
related trademark. Avigilon Corporation protects its innovations with patents issued in the United States of
America and other jurisdictions worldwide (see avigilon.com/patents). Unless stated explicitly and in writing, no
license is granted with respect to any copyright, industrial design, trademark, patent or other intellectual
property rights of Avigilon Corporation or its licensors.
This document has been compiled and published using product descriptions and specifications available at the
time of publication. The contents of this document and the specifications of the products discussed herein are
subject to change without notice. Avigilon Corporation reserves the right to make any such changes without
notice. Neither Avigilon Corporation nor any of its affiliated companies: (1) guarantees the completeness or
accuracy of the information contained in this document; or (2) is responsible for your use of, or reliance on, the
information. Avigilon Corporation shall not be responsible for any losses or damages (including consequential
damages) caused by reliance on the information presented herein.
Avigilon Corporation
avigilon.com
PDF-ACM-ADM-5.10.10-D
Revision: 1 - EN
20180130
2
Table of Contents
Introduction
13
Monitoring
14
Monitoring Events
14
Pause/Resume Events
15
Clear Events
15
View Live Video
15
View Recorded Video
16
Create Event Notes
16
View Event Notes
17
View Event Instructions
17
View Event Identity Details
17
View Event History
17
Change Events List Settings
18
Reconnect to Events List
18
Searching for Events and Alarms
18
View Camera (Search)
20
View Recorded Video (Search)
20
Create Event Notes (Search)
21
View Event Notes (Search)
21
View Event Instructions (Search)
21
View Event Identity Details (Search)
22
View Event History (Search)
22
Change Transactions List Settings
22
Monitor Alarms
23
Acknowledge Alarms
24
View Live Video (Alarms)
24
View Recorded Video (Alarms)
25
Create Event Notes (Alarms)
25
View Event Notes (Alarms)
25
View Event Instructions (Alarms)
26
View Event Identity Details (Alarms)
26
View Event History (Alarms)
26
Change Alarms List Settings
27
Monitor - Verification screen
27
Verifying Cardholders at Doors
28
Verification Events List
28
3
Monitor - Hardware Status Page
29
System Status
29
Door Actions
30
Door Mode
31
Forced
31
Held
31
Door Status
31
Panel Status
32
Subpanel Details
34
Input / Output Details
34
LifeSafety Panels
34
Controlling System Hardware
35
Status Colors
36
Monitor Screen - Map Templates page
37
Using a Map
37
Add Map
40
Monitor Intrusion Panels
40
Monitor Intrusion Panel Status
40
Monitor Intrusion Panel Areas
41
Monitor Intrusion Panel Points
42
Monitor Intrusion Panel Outputs
43
Identities
45
Searching for an Identity
45
Adding an Identity
46
Identities - Assigning Roles
47
Identities - Assigning Tokens
48
Identities - Assigning Groups
48
Capturing an Image of an Identity
49
Uploading a Photo of an Identity
50
Identities - Creating Badges
51
Timed Access
52
Adding Timed Access to an Identity
52
Editing Timed Access
52
Deleting Timed Access
53
Editing an Identity
Reports
Reports - Generating Reports
53
55
55
4
Reports - Report Preview
55
Reports - Editing
56
Reports - Editing Audit Log and Transaction Reports
57
Reports - Creating Custom Reports
58
Reports - Creating Custom Audit Log and Transaction Reports
58
Physical Access
Configuring Doors
59
59
Searching for Doors
59
Controlling Doors
60
Adding Doors
61
Doors - Advanced Filtering
61
Adding Simple Macros
62
Editing Doors
62
Doors - Editing HID® Doors
63
Doors - Editing Mercury Security Doors
63
Deleting Doors
63
Door Modes
64
Access Types
64
ACM Verify™
65
Adding an ACM Verify Door
65
Doors - Avigilon New Parameters page
66
Paired Devices
67
Prerequisites for Pairing Devices
67
Precautions for Paired ACM Verify Stations
68
Pair a Device
68
Using ACM Verify
68
Anti-Passback
69
Anti-Passback Modes
69
Setting Up Anti-Passback
70
Granting a Free Pass
71
Global Anti-Passback
72
Global Anti-Passback Modes
Interlocks
72
73
Accessing Interlocks through Doors
73
Accessing Interlocks from Subpanel Inputs
73
Accessing Interlocks from Subpanel Outputs
74
Adding Interlocks
74
Editing Interlocks
74
5
Configuring Locks
74
Configuring Assa Abloy Aperio® Wireless Lock Technology
75
Configuring Allegion Schlage AD400 Series Locks
75
Configuring Allegion Schlage LE Series Locks
76
Configuring Allegion Schlage NDE Series Locks
78
Configuring SimonsVoss Wireless Locks
79
Doors - Listing page
82
Doors - Add page
84
Doors - HID® New Parameters page
87
Doors - Mercury Security New Parameters page
89
Doors - Edit Screen
Doors - HID VertX® Edit screen
Doors - HID® Parameters page
Doors - HID® Operations page
Doors - HID® Hardware page
Doors - HID® Subpanel Reader Edit page
92
92
92
94
97
99
Doors - HID® Subpanel Input Edit page
100
Doors - HID® Subpanel Output Edit page
Doors - HID® Cameras page
Doors - HID® Events page
101
101
102
Doors - Creating Local Events for HID® Doors
Doors - HID® Access page
Doors - HID® Transactions page
104
105
105
Doors - Mercury Security Edit screen
Doors - Mercury Security Parameters page
Mercury Security Operations page
Doors - Mercury Security Hardware page
106
106
109
111
Doors - Mercury Subpanel Reader Edit page
114
Doors - Subpanel Input Edit page
116
Doors - Subpanel Output Edit page
Doors - Mercury Security Elev page
Doors - Mercury Security Cameras page
117
117
117
Live Video Window
Doors - Mercury Security Interlocks page
120
120
Interlocks - Add page
122
Interlocks - Door Edit page
Doors - Mercury Security Events page
123
124
Doors - Creating Local Events for Mercury Security Doors
125
6
Doors - Mercury Security Access page
Doors - Mercury Security Transactions page
Doors - Access page
Configuring Panels
126
126
127
127
Searching for Panels
127
Adding Panels
127
Adding HID VertX® Panels
128
Adding Mercury Security Panels
128
Configuring the Mercury Security MS Bridge Solution
Editing Panels
128
129
Editing HID VertX® Panels
129
Editing Mercury Security Panels
129
Resetting Anti-Passback from the Panel
130
Downloading Parameters
130
Downloading Tokens
130
Lenel Panel Support
131
Resetting Doors/Subpanels
131
Updating Firmware
131
Updating Panel Time
132
Deleting Panels
132
Subpanels
132
Adding Subpanels
133
Editing Subpanels
134
Inputs
134
Output Modes
135
Operating Mode
135
Outputs
135
Deleting Subpanels
136
Macros
136
Adding Macros
136
Editing Macros
137
Deleting Macros
137
Assigning Macros
137
Assigning a Macro to a Trigger
137
Assigning a Macro to a Macro
138
Assigning a Macro to a Door
138
Sorting Macros
Triggers
138
138
7
Adding Triggers
139
Editing Triggers
139
Deleting Triggers
139
Areas
139
Areas - Adding
141
Areas - Editing
141
Areas - Deleting
141
EOL Resistance
141
Adding EOL Resistance for Mercury Input Points
141
Adding EOL Resistance to HID® Input Points
142
Editing EOL Resistance for Mercury Input Points
142
Editing EOL Resistance for HID® Input Points
142
Mercury Security LED Modes - Listing page
142
Editing Mercury Security LED Modes
143
Mercury Security LED Mode Table screen
143
LED Modes for Mercury Security
144
Card Formats
146
Adding Card Formats
146
Editing Card Formats
146
Deleting Card Formats
146
Events - Introduction
146
Events - Searching
147
Events - Editing
147
Events - Assigning Priority Colors
147
Global Actions
149
Global Actions - Adding
149
Global Actions - Editing
149
Global Actions - Action Types
149
Global Actions - Deleting
150
Global Actions - Intrusion Linkages and Actions
150
Intrusion panel alarm due to an event in the ACM System
150
Disable/enable doors from keypad
150
Disarm Alarm on Access Grant with restricted authorities
151
Global Linkages - Introduction
151
Global Linkages - Adding
151
Global Linkages - Editing
152
Mustering - Introduction
Mustering - Requirements
152
152
8
Mustering - Creating a Dashboard
153
Mustering - Using the Dashboard
153
Mustering - Manually Moving Identities
155
Managing Appliances
Appliances - Changes
156
156
Adding Extra Appliances
156
Editing Appliances
156
Deleting an Appliance
157
Configuring Replication and Failover
Failover/Redundancy Feature
157
158
Automatic failover
158
Manual failover and failback
159
Recommended System Architecture
159
System Architecture for Replication
159
System Architecture for Redundancy
160
Replication and Failover Requirements
161
1. Preparing Appliances for Replication and Failover
163
Setting Up the Primary Appliance
163
Setting Up Additional Appliances
164
2. Setting Up Replication Between Appliances
165
Enabling Replication on the Primary Appliance
166
Enabling Replication on the Second Peer or Standby Appliance
167
3. Adding a Replication Subscription
Testing Replication
168
171
Checking the Appliance Replication Status
171
Testing Two-Way Replication
173
4. Setting Up Failover
174
Configuring Email Notifications for Replication Events
176
Removing Replication and Failover
177
Failing Over and Failing Back
177
Automatic Failover
178
Manual Failover
178
Failback
179
Monitoring Transactional Replication to Hot Standby
180
Configuring Network Connections
180
Configuring Ethernet Ports
180
Adding Ethernet Routes
181
Enabling Serial Ports
181
9
Backups
182
Backing Up System Data
182
Manually Backing Up Data
182
Restoring Backups
182
Logs
Accessing Appliance Logs
Software Updates
Updating the Appliance Software
183
183
183
183
Viewing the ACM™ SSL Certificate
184
Appliances - About
185
Applying License Upgrades
185
Viewing the End User License Agreement
185
Accepting the End User License Agreement
185
Reviewing the Appliance Status
186
Collaboration - Introduction
187
Collaborations - Adding
187
Collaborations - Adding Events XML Collaboration
188
Collaborations - Events XML Definitions
189
Collaborations - Events XML Example
192
Collaboration - Editing
193
Collaboration - Types
193
Collaboration - Running
194
Collaboration - Deleting
194
Collaboration - Assigning Events to a Collaboration
195
Setup & Settings - Main page
Schedules and Holidays - Introduction
196
196
Schedules
196
Holidays
197
Adding Schedules
197
Editing Schedules
198
Deleting Schedules
198
Holidays - Adding
198
Holidays - Editing
199
Holidays - Deleting
199
Holidays and Schedules - Examples
199
Example 1: Part-Day Holiday
199
Example 2: Additional Access Time
200
10
Event Types - Introduction
200
Adding Event Types
202
Editing Event Types
203
Deleting Event Types
203
User Defined Fields - Introduction
203
User Defined Fields - Adding a Field
203
User Defined Fields - Adding User Defined Tabs
204
User Defined Fields - Editing User Defined Tabs
204
User Defined Fields - Deleting Fields
205
User Defined Tabs - Deleting
205
User Lists - Introduction
205
User Lists - Adding Items to a List
205
User Lists - Editing Items
206
User Lists - Deleting Items
206
System Settings
206
System Settings - General page
206
Remote Authentication from External Domains
209
About Certificate Pinning
210
System Settings - Configuring Remote Authentication Using SSL Certificates
210
Using Pinned Certificates
210
Using Trusted Certificates
211
System Settings - Remote Authentication
Badge Templates - Introduction
212
213
Using Badge Templates
213
Adding a Badge Template
214
Editing a Badge Template
215
Duplicating a Badge Template
215
Deleting a Badge Template
215
Badge Designer - Changing the Badge Background Color
215
Color Palette
216
External Systems - Introduction
218
External Systems - Adding
218
External Systems - Editing
219
External Systems - Deleting
219
External Systems - Integrating an ACM Appliance into an ACC™ Site
219
External Systems - Defining the Badge Camera for the System
221
Bosch Intrusion Panels
221
Adding a Bosch Intrusion Panel
221
11
Editing a Bosch Intrusion Panel
222
Synchronizing Bosch Intrusion Panels
223
Deleting a Bosch Intrusion Panel
223
Viewing Bosch Intrusion Panel Areas
223
Viewing Bosch Intrusion Panel Points
223
Viewing Bosch Intrusion Panel Outputs
224
Viewing Bosch Intrusion Panel Users
224
Assigning Bosch Intrusion Panel Users to Identities
Supported Bosch Intrusion Panels
External Systems - ViRDI
External Systems - ViRDI System Settings
Maps - Introduction
224
225
228
228
228
Maps - Creating and Editing a Map
228
Maps - Linking Maps
229
Using a Map
230
Setting Personal Preferences
234
Changing the Password in My Account
234
Scheduling Batch Jobs
234
Generating a Batch Report
234
Applying Identity Profile to Groups
236
Scheduling a Global Action
237
Setting Batch Door Modes
238
Permissions and Rights
240
12
Introduction
This guide provides an overview of the Admin role as defined in the Avigilon Access Control Manager (ACM)
software. This guide is meant to be used and referred to by those assigned the role of an Admin within the ACM
software.
The Admin oversees the ACM system. They are responsible for monitoring and maintaining the ACM system.
For more information, see Permissions and Rights on page 240.
NOTE: This guide does not define the role of an Admin on all sites. Please contact your System Administrator for
more details.
Introduction
13
Monitoring
The Monitoring screen gives you access to view all events and alarms in the system. It also allows you to view
and control connected hardware. An event occurs for changes in the software or hardware. For example, when a
user accesses a door. An alarm occurs when the system detects an unusual event. For example, a forced door.
Hardware can be controlled to grant or restrict access to an area. For example, a door can be disabled to deny
access to a hazardous area.
NOTE: If you do not have the correct delegations, you may not be able to access some of the following pages.
See your System Administrator for details.
Monitoring Events
Events are defined as any activity that is reported between the appliance and the hardware it oversees. An
event includes all alarms, but not all events are alarms. Events can include changes in configuration, a report on
door access, adding a new cardholder to the system, etc. In other words, any transfer of data within the system is
an event.
When you click Monitor, the first page you see is the Events page. This page lists all the events or transactions
as they occur in the system.
To review the events as they appear on the Events page, use any of the following buttons:
NOTE: Some of the buttons are disabled until you select an event that includes the relevant details.
l
Pause — Click this button to pause the flow of events that are displayed on the page.
The flow of events does not actually stop, the system simply pauses the display of live updates until you
click Resume.
l
Resume — Click this button to restart the flow of events that are displayed on the page.
This button only appears when the flow of events is paused.
l
Clear — Click this button to temporarily clear all events from the screen. New events automatically begin
to populate the list. To restore the cleared events, refresh the page.
l
Live Video — Click this button to display live video that is associated with the selected event.
l
Recorded Video — Click this button to display recorded video that is associated with the selected event.
l
l
Notes — Click this button to enter a new note or display any previously saved notes for the selected
event.
Instructions — Click this button to display any instructions that should be completed when the event
occurs. The instructions were added when the event was created.
l
Identity — Click this button to display details about the person that triggered the selected event.
l
History — Click this button to display a detailed history of this event.
l
Save Settings — Click this button to save your current settings for this page. For example, the columns
and order for this page.
Monitoring
14
l
Select Columns — Click this button then choose the information that you want displayed.
Check the box for each column that you want to see, and clear the box for each column that you want
hidden.
Click and drag the columns to move them into the order you want.
l
Reconnect — Click this button to reconnect to the appliance.
This button only appears if your browser has become disconnected from the appliance and an error is
displayed.
Pause/Resume Events
The display of live event updates can be paused. This allows you to view and investigate a specific event
without having to search for it. Once the event has been reviewed, the display of live event updates can be
resumed.
Follow the steps below to pause and resume events.
1. Click Monitor to access the Monitor Events page. For more detail see Monitoring Events on the previous
page.
2. Click Pause to pause the flow of events that are displayed on the page.
The flow of events does not actually stop, the system simply pauses the display of live updates until you
click Resume (this button only appears when the flow of events is paused).
3. Click Resume to restart the flow of events that are displayed on the page.
The list of events will resume updating.
Clear Events
Follow the steps below to clear all displayed events.
1. Click Monitor to access the Monitor Events page.
2. Click Clear to temporarily clear all events from the screen.
The list will be cleared. New events automatically begin to populate the list.
NOTE: This does not delete the events, it just removes the existing events from the view. To restore the
cleared events, refresh the page.
View Live Video
Live video that is associated with a selected event can be displayed from the Monitoring Events page. For
example, if an unusual event occurs, the live video can be viewed to observe the event and determine if any
actions need to be taken.
Follow the steps below to view live video.
1. Click Monitor. The Monitor Events page displays (for more information, see Monitoring Events on the
previous page).
2. Select an event from the list.
Only events or alarms with an
Pause/Resume Events
icon will have video.
15
3. Click Live Video to display live video that is associated with the selected event. (This button only displays
if video is available for this event.)
The Monitor Screen - Live Video window displays. View the live video in this window.
If the window does not display any video in the image panel, you may need to change your browser
settings to allow the display of insecure or mixed content. For more information, see the Help files for
your browser.
View Recorded Video
Recorded video that is associated with a selected event can be displayed from the Monitoring Events page. For
example, if an unusual event occurred the previous day, the recorded video can be viewed to observe event
and determine if any actions need to be taken.
Follow the steps below to view live video.
1. Click Monitor. The Monitor Events page displays (for more information, see Monitoring Events on
page 14).
2. Select an event from the list.
Only events or alarms with an
icon will have video.
3. Click Recorded Video to display recorded video that is associated with the selected event. (This button
only displays if video is available for this event.)
The Monitor Screen - Recorded Video window displays. View the video in this window.
If the window does not display any video in the image panel, you may need to change your browser
settings to allow the display of insecure or mixed content. For more information, see the Help files for
your browser.
Create Event Notes
Notes can be added and viewed for all events that occur in the system. For example, if an observation is made
on an event, a note can be made for that event.
Follow the steps below to create event notes.
1. Click Monitor to access the Monitor Events page.
2. Select the event that you want to create notes for.
3. Click Notes to create notes for the selected event.
The Monitor Screen - Notes Window will display.
4. Enter text in the New Note field.
5. Click
to save the new note.
The note will display in the list below the New Note section. The date, Operator and note will display in
this list.
6. Close the dialog box.
View Recorded Video
16
View Event Notes
Notes that are associated with an event can be displayed from the Monitor Events page. For example, if another
user created a note for an event, you can view the note to get more information about the event.
Follow the steps below to view event notes.
1. Click Monitor to access the Monitor Events page (for more information, see Monitoring Events on
page 14).
2. Select the event that you want to view notes for. (Events with notes will display with
column.)
3. Click Notes to view notes for the selected event. (Alternatively clicking
in the Icon
will do the same thing.)
The Monitor Screen - Notes Window will display. Existing notes will display as a list below the New Note
section. The date, Operator and note will display in this list.
View Event Instructions
Instructions can be viewed for a selected event. The instructions tell the operator what actions need to be taken
when the event occurs. For example, if a user is denied access to a certain area, the action may be to review
their identity, and determine if they have permission to access the area.
Follow the steps below to view event instructions. The instructions were added when the event was created.
1. Click Monitor to access the Monitor Events page (for more information, see Monitoring Events on
page 14).
2. Select the event that you want to view instructions for. (Events with instructions will display with
Icon column.)
in the
3. Click Instructions to view instructions for the selected event.
The Monitor Screen - Instructions Window will display. View the instructions in the table that displays.
4. Close the window to return to the Monitor Events page.
View Event Identity Details
Follow the steps below to view event identity details.
1. Click Monitor to access the Monitor Events page (for more information, see Monitoring Events on
page 14).
2. Select the event that you want to view identity details for.
3. Click Identity to view identity details for the selected event.
The Monitor Screen - Identity Window will display.
4. View the details (e.g. Last Name, First Name, Title, etc.).
5. Close the window to return to the Monitor Events page.
View Event History
Follow the steps below to view event history.
View Event Notes
17
1. Click Monitor to access the Monitor Events page (for more information, see Monitoring Events on
page 14).
2. Select the event that you want to view history for.
3. Click History to view history for the selected event.
The Monitor Screen - History Window will display.
4. View the history details.
5. Close the window to return to the Events Listing page.
Change Events List Settings
Follow the steps below to change the settings of the events list.
1. Click Monitor to access the Monitor Events page.
The list displays in date order, with the most recent events at the top of the list.
2. If you want to re-sort the order of the list:
l
l
Click in the heading of the column to sort by (e.g. Priority). The list will sort in ascending order
based on that column (e.g. ascending order of priority).
To change the sort order to descending, click the column heading again.
3. If you want to re-sort the order of the columns, click on the column you want to move then drag and drop
this to it's new location.
4. If you want to add or remove columns, click Select Columns and:
l
l
Click beside the Column name of any columns to be added so that a check mark displays.
Click beside the Column name of any column to be deleted so that a check mark no longer
displays.
5. Click Save Settings if you want to save the new settings.
A message box displays with the message 'ACM Notification. Successfully saved.'.
Reconnect to Events List
Follow the steps below to reconnect to the Access Control Manager appliance.
1. Click Monitor to access the Monitor Events page (for more information, see Monitoring Events on
page 14).
If your browser loses connectivity with Access Control Manager appliance the Reconnect button
displays.
2. Click Reconnect to reconnect.
Searching for Events and Alarms
The number of alarms and event transactions can total into the thousands depending on the level of activity in
your system. To find specific events, you can perform a search.
Change Events List Settings
18
Searching for specific events allows you to easily find an event in the system. For example, searching for events
can be used in situations where more information is needed on an event thought to be unusual or suspicious.
Once an event has been found, information such as recorded video, or notes can be viewed.
1. Select Monitor > Search.
The Events Search (Transactions) page appears.
2. Scroll to the bottom of the page and click the
icon.
The Search area is displayed:
Figure 1: Search options
3. From the first drop down list, select the data type that you want to search. The options are:
l
Panel Date
l
Last Name
l
Card Number
l
Message
l
Event Name
l
Event Type
l
Source
4. From the second drop down list, select the appropriate argument for your search. The available
arguments change depending on the selected data type.
5. In the text field, enter any text that you want to find in the selected data type. For example, you may enter
"forced door" when performing an Event Type search.
You can enter any number or letter combination and you can use wildcards. The wildcard * character can
be used to help you find events that you do not have all the details for.
For example:
l
s* — will find any word that starts with an "s".
l
*s — will find any word that ends with an "s".
l
*s* — will find any word that has an "s" within the word.
6. If you want to narrow your search further, click
Searching for Events and Alarms
to add another search filter.
19
7. If you want to narrow your search, click
to add another search filter.
7. Add as many search filters as you need to fulfill your search criteria.
8. When you have entered all your search criteria, click
above the search area.
Search. The search results are listed in the table
9. Select any transaction from the search result and use the action buttons at the top of the page to see the
details of the event.
View Camera (Search)
Live video that is associated with a selected event can be displayed from the Monitoring Search page. For
example, if an event is found with live video associated with it, the operator can view the video and determine if
any action needs to be taken.
Follow the steps below to view live video from a camera from the Events Search (Transactions) page.
1. Click Monitor > Search. The Events Search (Transactions) page displays.
2. Select an event from the list.
Only events or alarms with an
icon will have video. The icons are not displayed by default. For more
information, see Change Transactions List Settings on page 22.
3. Click Camera to display live video that is associated with the selected event.
The Monitor Screen - Live Video window displays.
4. View the live video in this window.
If the window does not display any video in the image panel, you may need to change your browser
settings to allow the display of insecure or mixed content. For more information, see the Help files for
your browser.
View Recorded Video (Search)
Recorded video that is associated with a searched event can be displayed from the Monitoring Search page.
For example, if an unusual event is found in the search results, the recorded video can be viewed to observe the
event and determine if any actions need to be taken.
Follow the steps below to view live video from the Events Search (Transactions) page.
1. Click Monitor > Search. The Events Search (Transactions) page displays.
2. Select an event from the list.
Only events or alarms with an
icon will have video. The icons are not displayed by default. For more
information, see Change Transactions List Settings on page 22.
View Camera (Search)
20
3. Click Recorded Video to display recorded video that is associated with the selected event.
The Monitor Screen - Recorded Video window displays.
NOTE: Events with recorded video associated with it may display an error message if the recorded video
is no longer available on the video recorder.
4. View the video in this window.
If the window does not display any video in the image panel, you may need to change your browser
settings to allow the display of insecure or mixed content. For more information, see the Help files for
your browser.
Create Event Notes (Search)
Notes can be added and viewed for all events that occur in the system. For example, if an observation is made
on an event, a note can be created for that event.
Follow the steps below to create event notes from the Events Search (Transactions) page.
1. Click Monitor > Search. The Events Search (Transactions) page displays.
2. Select the event that you want to create notes for.
3. Click Notes to create notes for the selected event.
The Monitor Screen - Notes Window will display.
4. Enter text in the New Note field.
5. Click
to save the new note.
The note will display in the list below the New Note section. The date, Operator and note will display in
this list.
6. Close the dialog box.
View Event Notes (Search)
Notes that are associated with an event can be displayed from the Monitor Search page. For example, if an
event is found with an associated note, you can view the note to get more information about the selected event.
Follow the steps below to view event notes from the Events Search (Transactions) page.
1. Click Monitor > Search. The Events Search (Transactions) page displays.
2. Select the event that you want to view notes for.
3. Click Notes to view notes for the selected event.
The Monitor Screen - Notes Window will display. Existing notes will display as a list below the New Note
section. The date, Operator and note will display in this list.
View Event Instructions (Search)
Instructions can be viewed for a selected event. The instructions tell the operator what actions need to be taken
when the event occurs. For example, if a user is denied access to a certain area, the action may be to review
their identity, and determine if they have permission to access the area.
Create Event Notes (Search)
21
Follow the steps below to view event instructions from the Events Search (Transactions) page. The instructions
were added when the event was created.
1. Click Monitor > Search. The Events Search (Transactions) page displays.
2. Select the event that you want to view instructions for.
3. Click Instructions to view instructions for the selected event.
The Monitor Screen - Instructions Window will display.
4. Close the window to return to the Events Search (Transactions) page.
View Event Identity Details (Search)
Follow the steps below to view event identity details from the Events Search (Transactions) page.
1. Click Monitor > Search. The Events Search (Transactions) page displays.
2. Select the event that you want to view identity details for.
3. Click Identity to view identity details for the selected event.
The Monitor Screen - Identity Window will display.
4. View the details (e.g. Last Name, First Name, Title, etc.).
5. Close the window to return to the Events Search (Transactions) page.
View Event History (Search)
Follow the steps below to view event history from the Events Search (Transactions) page.
1. Click Monitor > Search. The Events Search (Transactions) page displays.
2. Select the event that you want to view history for.
3. Click History to view history for the selected event.
The Monitor Screen - History Window will display.
4. View the history details.
5. Close the window to return to the Events Search (Transactions) page.
Change Transactions List Settings
Follow the steps below to change the settings of the events list.
1. Click Monitor > Search. The Events Search (Transactions) page displays.
The list displays in date order, with the most recent events at the top of the list.
2. If you want to re-sort the order of the list:
l
l
Click in the heading of the column to sort by (e.g. Priority). The list will sort in ascending order
based on that column (e.g. ascending order of priority).
To change the sort order to descending, click the column heading again.
3. If you want to re-sort the order of the columns, click on the column you want to move then drag and drop
View Event Identity Details (Search)
22
this to it's new location.
4. Click Save Settings if you want to save the new settings.
A message box displays with the message 'ACM Notification. Successfully saved.'.
Monitor Alarms
Alarms that occur in the system are listed in the Monitor Alarms page as they occur (accessed through selecting
Monitor > Alarms).
An alarm occurs when the system senses an unusual event such as a forced or held door. Each alarm needs to
be reviewed and responded to. Information on the alarm can be viewed, along with any available video. After
an alarm has been acknowledged, it is moved to the list of acknowledged alarms. This list allows users to view
past alarms and clear them from the system.
To review and acknowledge alarms, select one or more alarms from the Unacknowledged Alarms list then click
one of the following buttons:
NOTE: Some of the buttons are disabled until you select an event that includes the relevant details.
l
l
Acknowledge — Click this button to acknowledge one or more selected alarms. The selected alarms are
moved to the Acknowledged Alarms list.
Acknowledge All — Click this button to acknowledge all alarms that are currently active and
unacknowledged.
l
Live Video — Click this button to display live video associated with the selected alarm.
l
Recorded Video — Click this button to display recorded video associated with the selected alarm.
l
l
Notes — Click this button to enter a new note or display any previously saved notes for the selected
event.
Instructions — Click this button to display any instructions that should be completed when the alarm
occurs. The instructions were added when the event was created.
l
Identity — Click this button to display details about the person that triggered the selected alarm.
l
History — Click this button to display a detailed history of this alarm.
l
l
Save Settings — Click this button to save your current settings for this page. For example, the columns
and order for this page.
Sound Off — Click this button to mute any alarm noises on the device used to monitor Alarms.
When sound is muted, the button changes to Sound On. Click this button to turn the sound back on.
l
Select Columns — Click this button then choose the information that you want displayed.
Check the box for each column that you want to see, and clear the box for each column that you want
hidden.
After an alarm has been acknowledged, the alarm is added to the Acknowledged Alarms list. You can clear the
alarms from the list as needed.
NOTE: Some of the buttons are disabled until you select an event that includes the relevant details.
Monitor Alarms
23
l
Clear — Click this button to clear one or more acknowledged alarms from the list.
l
Clear All — Click this button to clear all alarms from the Acknowledged Alarms list.
l
Select Columns — Click this button then choose the information that you want displayed.
Check the box for each column that you want to see, and clear the box for each column that you want
hidden.
Acknowledge Alarms
When an alarm occurs in the system, an action must be taken. Once the alarm is resolved, it must be
acknowledged. This tells the other users of the system that the alarm has been dealt with and is not a problem.
Follow the steps below to acknowledge alarms.
1. Click Monitor > Alarms. The Monitor Alarms Listing page displays.
2. To acknowledge a single alarm:
l
Select the alarm in the Unacknowledged Alarms list.
l
Click Acknowledge. The alarm will move to the Acknowledged Alarms list.
3. To acknowledge multiple alarms:
l
l
l
l
Select the first alarm in the Unacknowledged Alarms list.
If the alarms to be acknowledged are consecutive in the list, click on the first entry, then hold
SHIFT down and click on the last entry.
If the alarms to be acknowledged are not consecutive, click on the first entry, then hold CTRL
down and click on each entry.
Click Acknowledge. The alarms will move to the Acknowledged Alarms list.
4. To acknowledge all alarms, click Acknowledge All. The alarms will move to the Acknowledged Alarms
list.
View Live Video (Alarms)
Live video that is associated with a selected alarm can be displayed from the Monitoring Alarms page. For
example, if an alarm occurs, the live video can be viewed to observe the alarm and determine if any actions
need to be taken.
Follow the steps below to view live video from the Monitor Alarms page.
1. Click Monitor > Alarms. The Monitor Alarms page displays. For more information see Monitor Alarms on
the previous page.
2. Select an alarm from the list.
Only events or alarms with an
icon will have video.
3. Click Live Video to display live video that is associated with the selected alarm. This button only displays
if video is available for this alarm.
The Monitor Screen - Live Video window displays. View the live video in this window.
If the window does not display any video in the image panel, you may need to change your browser
settings to allow the display of insecure or mixed content. For more information, see the Help files for
your browser.
Acknowledge Alarms
24
View Recorded Video (Alarms)
Recorded video that is associated with a selected alarm can be displayed from the Monitoring Alarms page. For
example, if an alarm occurred the previous day, recorded video can be viewed to observe the alarm and
determine if any further actions need to be taken.
Follow the steps below to view recorded video from the Monitor Alarms Listing page.
1. Click Monitor > Alarms. The Monitor Alarms page displays (for more information see Monitor Alarms on
page 23).
2. Select an event from the list.
Only events or alarms with an
icon will have video.
3. Click Recorded Video to display live video that is associated with the selected event. (This button only
displays if video is available for this event.)
The Monitor Screen - Recorded Video window displays. View the video in this window.
If the window does not display any video in the image panel, you may need to change your browser
settings to allow the display of insecure or mixed content. For more information, see the Help files for
your browser.
Create Event Notes (Alarms)
Notes can be added and viewed for all alarms that occur in the system. For example, if an observation or action
is made on an alarm, a note can be created to document the details.
Follow the steps below to create event notes from the Monitor Alarms page.
1. Click Monitor > Alarms. The Monitor Alarms page displays. For more information see Monitor Alarms on
page 23.
2. Select the event that you want to create notes for.
3. Click Notes to create notes for the selected event.
The Monitor Screen - Notes Window will display.
4. Enter text in the New Note field.
5. Click
to save the new note.
The note will display in the list below the New Note section. The date, Operator and note will display in
this list.
6. Close the dialog box.
View Event Notes (Alarms)
Notes that are associated with an alarm can be displayed from the Monitor Alarms page. For example, if another
user created a note for an alarm, you can view the note to get more information about the alarm.
Follow the steps below to view event notes from the Monitor Alarms page.
View Recorded Video (Alarms)
25
1. Click Monitor > Alarms. The Monitor Alarms page displays. For more information see Monitor Alarms on
page 23.
2. Select the event that you want to view notes for. Events with notes will display with
column.
3. Click Notes to view notes for the selected event. Alternatively clicking
in the Icon
will do the same thing.
The Monitor Screen - Notes Window will display. Existing notes will display as a list below the New Note
section. The date, Operator and note will display in this list.
4. Close the dialog box to return to the Monitor Alarms page.
View Event Instructions (Alarms)
Instructions can be viewed for a selected alarm. The instructions tell the operator what actions need to be taken
when the alarm occurs. For example, if an alarm occurred, the instruction could be to investigate the alarm and
write a note describing the situation.
Follow the steps below to view event instructions from the Monitor Alarms page. The instructions were added
when the event was created.
1. Click Monitor > Alarms to access the Monitor Alarms page displays. For more information see Monitor
Alarms on page 23.
2. Select the event that you want to view instructions for. (Events with instructions will display with
Icon column.)
in the
3. Click Instructions to view instructions for the selected event.
The Monitor Screen - Instructions Window will display. View the instructions in the table that displays.
4. Close the window to return to the Monitor Alarms page.
View Event Identity Details (Alarms)
Follow the steps below to view event identity details from the Monitor Alarms page.
1. Click Monitor > Alarms. The Monitor Alarms page displays. For more information see Monitor Alarms on
page 23.
2. Select the event that you want to view identity details for.
3. Click Identity to view identity details for the selected event.
The Monitor Screen - Identity Window will display.
4. View the details (e.g. Last Name, First Name, Title, etc.).
5. Close the window to return to the Monitor Alarms page.
View Event History (Alarms)
Follow the steps below to view event history from the Monitor Alarms page.
View Event Instructions (Alarms)
26
1. Click Monitor > Alarms to access the Monitor Alarms page. For more information see Monitor Alarms on
page 23.
2. Select the event that you want to view history for.
3. Click History to view history for the selected event.
The Monitor Screen - History Window will display.
4. View the history details.
5. Close the window to return to the Monitor Alarms page.
Change Alarms List Settings
Follow the steps below to change the settings of the alarms lists on the Monitor Alarms page.
1. Click Monitor > Alarms to access the Monitor Alarms page. For more information see Monitor Alarms on
page 23.
The list displays in date order, with the most recent events at the top of the list.
2. If you want to re-sort the order of the list:
l
l
Click in the heading of the column to sort by (e.g. Priority). The list will sort in ascending order
based on that column (e.g. ascending order of priority).
To change the sort order to descending, click the column heading again.
3. If you want to re-sort the order of the columns, click on the column you want to move then drag and drop
this to it's new location.
4. If you want to add or remove columns, click Select Columns and do the following:
l
l
Click beside the Column name of any columns to be added so that a check mark displays.
Click beside the Column name of any column to be deleted so that a check mark no longer
displays.
5. If you want to change the sound settings:
l
If the sound is on, click Sound Off to turn the sound off.
l
If the sound is off, click Sound On to turn the sound on.
6. Click Save Settings if you want to save the new settings.
A message box displays with the message 'ACM Notification. Successfully saved.'
NOTE: To reset default settings, select
default setting.
> Clear Custom Layouts. This resets all customized lists to their
Monitor - Verification screen
When you click Monitor > Verification, the Verification page is displayed.
This page allows a qualified operator to review information, including photos, about card holders entering or
exiting specific doors.
The page is divided into two halves - the top Doors section and the bottom Events section.
Change Alarms List Settings
27
l
l
At the top of the page are four door panes that allow you to select and monitor four doors at a time. After
you assign a door to each pane, you can monitor live event transactions as they occur at each door.
Underneath is a list of live door transactions displayed like the Events page.
Not all door events will display in this list. Only events in the priority number range 300 to 700 display. A
full listing of all events is available on the Monitor Events page.
Verifying Cardholders at Doors
Select Monitor > Verification to open the Verification page in order to verify and confirm the identity of any
cardholder who passes through the selected doors:
1. From one of the Doors drop down lists, select a door.
2. To select another door, repeat previous step in the other panes. The drop down list automatically
updates to filter out the doors that have already been selected.
When a cardholder attempts to enter this door using a card or code, the person's identity information is
displayed:
The window includes the card holder's name, internal token number and the time and date of entry. A
photo is displayed if there is one stored in the Identity record.
At the bottom of the screen are the detailed entry and exit events generated by the cardholders.
Verification Events List
Follow the steps below to add doors to monitor on the Verification page.
1. Click Monitor > Verification. The Verification page displays. For more information see Monitor Verification screen on the previous page.
This page has two sections - doors and an events list. For more information on the doors display see
Verifying Cardholders at Doors above. The events list displays in date order, with the most recent events
at the top of the list.
NOTE: Not all door events will display in this list. Only events in the priority number range 300 to 700
display. A full listing of all events is available on the Monitor Events page.
2. If you want to clear a single event from the list, select the event and click Clear. To clear all events, click
Clear all.
Verifying Cardholders at Doors
28
3. If you want to re-sort the order of the list:
l
l
Click in the heading of the column to sort by (e.g. Priority). The list will sort in ascending order
based on that column (e.g. ascending order of priority).
To change the sort order to descending, click the column heading again.
4. If you want to re-sort the order of the columns, click on the column you want to move then drag and drop
this to it's new location.
5. If you want to add or remove columns, click Select Columns and:
l
l
Click beside the Column name of any columns to be added so that a check mark displays.
Click beside the Column name of any column to be deleted so that a check mark no longer
displays.
6. Click Save Settings if you want to save the new settings.
A message box displays with the message 'ACM Notification. Successfully saved.'.
NOTE: Saving the settings only saves the column configuration. The doors selected for verification will
need to be selected each time you return to the page.
NOTE: To reset default settings, select
default setting.
> Clear Custom Layouts. This resets all customized lists to their
Monitor - Hardware Status Page
When you click the HW Status sub-option from the Monitor screen, the Hardware Status page is displayed.
This page displays the current status of all connected panels, doors, inputs, outputs and associated security
devices. You can also use this screen to control doors in the system.
The current status of the device is indicated by the background color. For more information, see Status Colors
on page 36.
l
System Status below
l
Door Actions on the next page
l
Door Mode on page 31
l
Forced on page 31
l
Held on page 31
l
Door Status on page 31
l
Panel Status on page 32
l
Subpanel Details on page 34
l
Input / Output Details on page 34
l
LifeSafety Panels on page 34
System Status
Monitor - Hardware Status Page
29
The System Status details are described starting from the top-left corner, then continues row by row.
Feature
Description
Appliance
Name
At the top-left corner is the appliance name.
Timestamp
Beside the Appliance Name is the current date and time.
Up
Displays the time this Access Control Manager appliance has been running since the last
reboot.
RAM
Displays the percentage of installed RAM in the Access Control Manager appliance that is
currently unused.
Programs
Displays the number of programs currently running on the appliance.
Database
Displays the percentage of free space currently available on the data (writable) portion of the
disk.
Load
Indicates the current compute load the Access Control Manager appliance is experiencing.
Port
Indicates the port number the appliance may use to connect to the network. The Link, Rx, and
Tx information corresponds to the port number.
Link
Indicates the current state of the network link to the appliance. This is either Normal or None.
Rx
Indicates the number of received data packets by the port.
Tx
Indicates the number of transmitted data packets by the port.
The status of connected doors in these three categories:
Doors
l
Offline
l
Active
l
Masked
The status of connected panels in these categories:
Panels
l
Offline
l
Active
The status of connected inputs in these three categories:
Inputs
l
Offline
l
Active
l
Masked
The status of connected subpanels in these categories:
Subpanels
l
Offline
l
Active
Door Actions
To use the Door Action options, you must select a door before you choose one of the following actions:
Door Actions
30
Grant — Momentarily unlocks a door for the standard access time.
l
Restore — Resets the door mode to its configured value. If the door is in any privacy mode (Privacy, or
Apartment) it will be 'restored' to the non-privacy mode (e.g. if the door is in Privacy mode, and the
Restore option is selected then the mode return to its configured value).
l
Unlock — Unlocks the specified door. This door will remain unlocked until the Restore command is
issued, or until another change of state is directed, either via operator override or scheduled action.
l
Locked No Access — Locks the specified door and denies access for all card reads. This door will remain
locked until the Restore command is issued, or until another change of state is directed, either via
operator override or scheduled action.
l
Disable — Disables the specified door. This keeps it from operating and allows no access.
l
Door Mode
To use the Door Mode options, you must select a door before you choose one of the following modes:
l
Card Only
l
Card and Pin
l
Card or Pin
l
Pin Only
l
Facility Code Only
For more information on door modes refer to Door Modes on page 64
NOTE: The Pin only and Card or Pin door modes will not be available if the 'Allow duplicate PINs' option has
been selected on the System Settings - General page.
Forced
To use the Forced options, you must select a door before you choose one of the following actions:
l
Mask Forced — Masks the Door Forced Open Alarm for this door.
l
Unmask Forced — Unmasks the Door Forced Open Alarm for this door.
Held
To use the Held options, you must select a door before you choose one of the following actions:
l
Mask Held — Masks the Door Held Open Alarm for this door.
l
Unmask Held — Unmasks the Door Held Open Alarm for this door.
Door Status
Feature
Description
Check the box beside the door you want to control through the Door Action buttons.
All / None
If you click on All in the title line, it automatically selects all listed doors; the word changes to
None.
If all doors are currently listed, click None to deselect all listed doors.
Name
Door Mode
The name assigned to this door.
31
Feature
Description
The status of the door's installation:
Installed
(installed) or
(uninstalled).
Click the icon to change the door status.
Manuf
The vendor or manufacturer of the panel that the ACM system is connected to.
Panel
The name of the panel to which the ACM system is connected.
Communications
Status of communications between the ACM system and specified panel. The color
indicates the current status.
Indicates whether this door is unlocked or not. For the color legend, see Status Colors on
page 36.
Lock
Power
Indicates the status of the power input on the panel or subpanel. For the color legend, see
Status Colors on page 36.
Tamper
Indicates the status of the tamper input on the panel or subpanel. For the color legend, see
Status Colors on page 36.
Indicates the status of the battery input on the panel or subpanel. For the color legend, see
Status Colors on page 36.
Battery
Forced
NOTE: For MS-ICS panels the battery alarm status shows the battery status for both the
regular and lithium batteries. When the status requires attention, refer to the events list to
determine which battery requires attention. For more information refer to Monitoring Events
on page 14.
Indicates whether this door is currently in a forced open state. For the color legend, see
Status Colors on page 36.
Indicates whether this door is currently in a held open state. For the color legend, see Status
Colors on page 36.
Held
Mode
Indicates the current door mode (e.g. card only).
Panel Status
As you click the name of each panel, a list of the connected devices is displayed until you see the last input or
output down the line.
Feature
Description
The name of the panel.
Name
Click the name of the panel to see the status of the connected subpanels.
Panel Status
32
Feature
Description
Click the name of the following subpanel to see the status of the connected inputs and outputs.
Installed The status of the panel's installation:
(installed) or
(uninstalled).
Click the icon to change the panel status.
Status of communications between the panel and the ACM system. For the color legend, see Status
Colors on page 36.
Indicates the status of the power input on this panel. For the color legend, see Status Colors on
page 36.
Indicates the status of the tamper switch input on this panel. For the color legend, see Status Colors
on page 36.
Indicates the status of the battery input on the panel. For the color legend, see Status Colors on
page 36.
Subpan Indicates the number of the subpanels attached to this panel. Each relevant subpanel is displayed
el Status together with its current status. The color indicates the current status.
Panel Status
33
Subpanel Details
Click the name of a panel to display the connected subpanel details.
Feature
Subpanel
Description
The name of this subpanel. To drill down into the inputs and outputs associated with this
subpanel, click this link.
Status of communications between the panel and this subpanel. For the color legend, see
Status Colors on page 36.
Indicates the status of the power input on this subpanel. For the color legend, see Status Colors
on page 36.
Indicates the status of the tamper switch input on this subpanel. For the color legend, see Status
Colors on page 36.
Installed
The status of the subpanel's installation:
selectable and can be toggled.
(installed) or
(uninstalled). This field is
Input / Output Details
Click the name of a subpanel to display the connected inputs and outputs.
Feature
Input
Description
This column lists all the inputs controlled by this subpanel, with the name of each input.
The commands available to control the inputs not associated with a door:
Cmd
Output
l
Mask — Click this button to mask the specified input.
l
Unmask — Click this button to unmask a previously masked input.
This column lists all the outputs (including relays and locks) controlled by this subpanel, with
name and address of each output.
The commands available to control the outputs associated with a door:
l
Cmd
l
l
On — Click this button to power the output. If this output is a door, it energizes the circuit.
Off — Click this button to turn off the power to this output. If this output is a door, it deenergizes the circuit.
Pulse — Click this button to alternately energize and de-energize this output. The pulse
interval is determined by the output’s settings.
LifeSafety Panels
The following options are only displayed if you have a LifeSafety Power panel installed in your system.
Feature
Description
The name of the LifeSafety Power panel.
Name
Click this name to display the panel details.
Installed
The status of the panel's installation:
(installed) or
(uninstalled).
This field is not selectable and cannot be toggled.
Subpanel Details
34
Feature
Description
The commands available to control the LifeSafety Power panels:
l
l
Commands
l
Status — Click this button to display the current status of the displayed LifeSafety panel.
Log — Click this button to view the log of events/alarms recorded by the LifeSafety
panel.
Edit — Click this button to open the browser page for this remotely connected panel and
make changes to the configuration as required. The page displayed is determined by
the URL specified on the Address field of the LifeSafety Add page.
Controlling System Hardware
While you are monitoring the system, you may sometimes need to override the default door settings to allow a
visitor access to an area, or unlock a door in an emergency situation. You can control doors from the HW Status
page of the Monitor screen.
1. Select Monitor > HW Status.
2. To control a door:
a. In the Doors section of this page, check the box beside each door you want to control.
b. Select the appropriate option:
l
l
l
l
Door Action > Disable — Click this button to disable the specified door. This keeps it from
operating and allows no access.
Door Action > Unlock — Click this button to unlock the specified door. This door will remain
unlocked until the Restore command is issued, or until another change of state is directed,
either via operator override or scheduled action.
Door Action > Locked No Access — Click this button to lock the specified door. This door
will remain locked until the Restore command is issued, or until another change of state is
directed, either via operator override or scheduled action.
Door Action > Grant — Click this button to grant access to the specified door. The door will
be momentarily unlocked to permit single-time entry through the door.
l
Door Action > Restore — Click this button to reset the door mode to its configured value.
l
Held > Mask Held — Click this button to mask the Door Held Open alarm for this door.
l
Held > Unmask Held — Click this button to unmask the Door Held Open alarm for this door.
l
l
Forced > Mask Forced — Click this button to mask the Door Forced Open alarm for this
door.
Forced > Mask Unforced — Click this button to unmask the Door Forced Open alarm for this
door.
The action is performed on the specified device.
3. To change the door mode, select Door Mode, then choose from the following options:
l
Card Only
l
Card and Pin
Controlling System Hardware
35
l
Card or Pin
l
Pin Only
l
Facility Code Only
NOTE: The Pin only and Card or Pin door modes will not be available if the 'Allow duplicate PINs' option
has been selected on the System Settings - General page.
4. To control an input:
a. In the Panel Status area, click the name of the connected panel then click the name of the
connected subpanel.
b. When the required input is displayed, click one of the following buttons:
l
Mask — Click this button to mask the specified input.
l
Unmask — Click this button to unmask a previously masked input.
5. To control an output:
a. In the Panel Status area, click the name of the connected panel then click the name of the
connected subpanel.
b. When the required output is displayed, click one of the following buttons:
l
On — Click this button to power the output.
l
Off — Click this button to turn off the power to this output.
l
Pulse — Click this button to alternately energize and de-energize this output. The pulse
interval is determined by the output’s settings.
6. To install or uninstall a door or subpanel, click on the existing icon (e.g. if Installed is the current status,
click on the installed icon
to change the status to
Uninstalled).
Status Colors
Status colors are used to identify the health of the different devices in the system. The status colors represent
the following states:
Color
Description
The Access Control Manager component is online and working properly.
Normal
The Access Control Manager component has an indeterminate status.
Trouble
Alarm
The Access Control Manager component is experiencing an alarm condition. The delegated
operator should investigate the problem and resolve the issue.
The specified Access Control Manager input is currently masked.
Masked
Status Colors
36
Monitor Screen - Map Templates page
When you click Monitor > Maps, the Map Templates page displays. This page lists all the maps that have been
added to the system.
Feature
Add New Map
Template
Description
Click this button to add a new map template. For more information, see Maps - Creating
and Editing a Map on page 228.
Name
The name of the map template.
A list of all the configured maps is displayed. Also included in the list are configured
Mustering dashboards.
Click the name of the map template to display the configured map or dashboard.
Using a Map
Once a map has been configured, it can be accessed from the Monitor screen and used as a quick visual
reference to all the items that may be installed in a facility.
From the map, you can monitor the status of hardware items, inputs and outputs, control doors and keep track of
identities as they arrive at muster stations from the Mustering dashboard. The map also notifies you if there is an
alarm by displaying a red alarm indicator.
Monitor Screen - Map Templates page
37
1. Select Monitor > Maps. The Map Templates page displays.
2. In the Map Templates Listing page, click the name of a map.
The map is displayed. Some of the displayed elements may not appear in your map.
Figure 2: Example map
To...
Review
hardware
status
Do this...
The colored bar below each item displays an overview of the current communication and
power status. Click the icon on the map to display the control menu.
For more information about the colored hardware status bar, see the specific hardware
status page.
For more information about the status colors, see Status Colors on page 36.
Review an
alarm
If you see a red alarm indicator, the item on the map is in an alarm state. Click the alarm
indicator to see the status details.
For more information about alarm actions, see Monitor Alarms on page 23.
Click
l
Control a
door
l
l
Using a Map
on the map to display the door control menu, then click any of the following:
Disable — disable the door.
Unlock — unlock the door. This door will remain unlocked until the Restore
command is issued.
Lock — lock the door. This door will remain locked until the Restore command is
issued.
38
To...
Do this...
l
Grant — grant access to the person who is at the door. The door is temporarily
unlocked to permit a one time entry through the door.
l
Restore — reset the door mode to its configured value.
l
Mask Held — mask the Door Held Open Alarm.
l
Unmask Held — unmask the Door Held Open Alarm.
l
Mask Forced — mask the Door Forced Open Alarm.
l
Unmask Forced — unmask the Door Forced Open Alarm.
l
Trace — display the event transactions for the door.
Viewing live video, recorded video, notes, instructions, identities, and history can
be performed on the event transactions.
To hide the control menu, click the icon again.
Click the
l
Panels
Control a
panel or
subpanel
l
on the map to display the panel control menu, then click any of the following:
o
Download Params — download the latest system configurations to the
panel.
o
Tokens — download the tokens to the panel.
o
Reset/Download — reset and download the current system configuration to
the panel.
o
APB Reset — resets all panel and area counts to zero.
o
Clock — re-sync the panel time.
o
Trace — display the event transactions for the panel.
Subpanels
o
Trace — display the event transactions for the subpanel.
Viewing live video, recorded video, notes, instructions, identities, and
history can be performed on the event transactions.
To hide the control menu, click the icon again.
Click the
Control an
input
on the map to display the input control menu, then click any of the following:
l
Mask — mask the input.
l
Unmask — unmask the input.
To hide the control menu, click the icon again.
Click the
following:
Control an
output
Using a Map
on the map to display the output control menu, then click any of the
l
On — activate the output.
l
Off — deactivate the output.
l
Pulse — pulse the output.
39
To...
Do this...
To hide the control menu, click the icon again.
Display
video
Click the
Open a
linked map
Click
Execute a
global action Click
on the map to display the Camera Video window.
to display a linked map, or
to display a linked map.
to execute the configured global action.
If there is a Mustering dashboard configured on the map, it may appear as a line of text or
as a shape with text inside.
Monitor the
dashboard
The dashboard displays the number of identities in the area and may include the name of
the area. In the example image, the dashboard is the gray square.
Click the dashboard to see a list of all the identities that are in the area. Click outside the
pop-up dialog to hide the identities list. Click the First Name or Last Name to view the
identity.
Add Map
Follow the steps below to add maps.
1. Click Monitor > Maps. The Map Templates (Monitor) Listing page displays.
2. Click Add New Map Template.
The Map Template: Add New page displays.
3. Enter a name for the Map in the Name field.
4. To:
l
l
upload a file, select File and click Browse then select the file to upload in the Choose File to
Upload dialog box and click Open.
create a blank canvas, select Blank Canvas.
5. To resize the image, enter resizing proportions in the Re-size To fields.
6. Click
to save the map.
The Map Template: Edit page displays.
Monitor Intrusion Panels
The following procedures relate to monitoring Bosch intrusion panels.
Monitor Intrusion Panel Status
The intrusion panel status displays the current status of all connected intrusion panels. For example, if the power
and communications of the intrusion panel is normal, the Online status will be displayed and a message will
appear when you hover over the power and communications icons.
To monitor intrusion panel status:
Add Map
40
1. Select Monitor > Intrusion Status.
The Monitor Intrusion Status - Panels screen displays.
2. View the list that displays.
The following statuses display for panels:
l
Communications
l
Battery
l
Power
l
Tamper
l
Phone Line
The following statuses apply to all of the above:
Online
Alarm
Trouble
NOTE: To view more detail on the status, hover over the status icon to view a pop-up message (e.g.
hovering over an Alarm status indicator in the Comm column might return the message 'Not connected,
verify configured IP and port').
3. If you want to narrow the list that displays use the filter function. Enter a panel name to filter the list results
by panel. Type in the name (or part of the name) of the panel and the list will update as you type.
4. If you want to sort the list, click
column.
to sort in ascending order, or
to sort in descending order in each
Monitor Intrusion Panel Areas
The intrusion panel areas display the current status for all defined areas. For example if an area is armed, the
Armed status will display and a message will appear when you hover over the status icon.
To monitor intrusion panel area status and make updates as required:
1. Select Monitor > Intrusion Status.
2. Click the Areas tab.
The Monitor Intrusion Status - Areas screen displays.
3. View the list that displays. A status is displayed for each area.
The following statuses apply to all of the above:
Armed
Ready to Arm
Not Ready to Arm
Monitor Intrusion Panel Areas
41
Partial Arm
Trouble
Alarm
NOTE: To view more detail on the status, hover over the status icon to view a pop-up message (e.g.
hovering over an Armed status indicator might return the message 'All On Instant Arm').
4. If you want to narrow the list that displays, either:
l
l
Use the filter function. Enter an area name to filter the list results by area. Type in the name (or part
of the name) of the area or panel and the list will update as you type.
Select a single status (e.g. Partial Arm) to view.
5. If you want to sort the list, click
column.
to sort in ascending order, or
to sort in descending order in each
6. To arm an area:
l
Select the areas to be armed.
l
Click Master then select the arming option. Options are:
o
Instant Arm - Arm all points for the selected areas instantly
o
Delay Arm - Arm all points for the selected areas with an entry/exit delay
o
Force Instant Arm - Arm all points for the selected areas instantly, regardless of their current
state
o
Force Delay Arm - Arm all points for the selected areas with an entry/exit delay, regardless
of their current state
7. To arm a perimeter area:
l
Select the areas to be armed.
l
Click Perimeter then select the arming option.
o
Instant Arm
o
Delay Arm
o
Force Instant Arm
o
Force Delay Arm
8. To disarm select the areas to be disarmed and click Disarm.
9. To silence intrusion alarms select the areas to be silenced and click Silence.
10. To reset the sensors select the areas to be reset and click Reset Sensors.
The reset time is 5 seconds. During the reset time, alarms from the points associated with the selected
areas will be ignored.
Monitor Intrusion Panel Points
The intrusion panel points displays the current status of all connected points. For example, if a point has been
bypassed, the bypassed status will display and a message will appear when you hover over the status icon.
To monitor intrusion panel point status:
Monitor Intrusion Panel Points
42
1. Select Monitor > Intrusion Status.
2. Click the Points tab.
The Monitor Intrusion Status - Points screen displays.
3. View the list that displays. A status is displayed for each point.
The following statuses apply to all of the above:
Normal
Faulted
Bypassed
Trouble
NOTE: To view more detail on the status, hover over the status icon to view a pop-up message (e.g.
hovering over an Bypassed status indicator might return the messages such as 'Open', 'Missing' or
'Normal').
4. If you want to narrow the list that displays, either:
l
l
Use the filter function. Enter a point name to filter the list results by point. Type in the name (or part
of the name) of the point, area, or panel and the list will update as you type.
Select a single status (e.g. Faulted) to view.
5. If you want to sort the list, click
column.
to sort in ascending order, or
to sort in descending order in each
6. If you want to bypass or unbypass a point:
l
Select the point (or points) in the list, and
l
Click either the Bypass or Unbypass button.
NOTE: Some points in the system may not be bypassable due to configuration settings. Trying to bypass
these points will result in no state change.
Monitor Intrusion Panel Outputs
The intrusion panel outputs display the current status of all connected outputs. For example, if a output is active,
the Active status will display and a message will appear when you hover over the status icon.
To monitor intrusion panel outputs status:
1. Select Monitor > Intrusion Status.
2. Click the Outputs tab.
The Monitor Intrusion Status - Outputs screen displays.
3. View the list that displays. A status is displayed for each output - the available statuses are:
Inactive
Monitor Intrusion Panel Outputs
43
Active
Trouble
4. If you want to narrow the list that displays, either:
l
l
Use the filter function. Enter an output name to filter the list results by output. Type in the name (or
part of the name) of the output, or panel and the list will update as you type.
Select a single status (e.g. Active) to view.
5. If you want to sort the list, click
column.
to sort in ascending order, or
to sort in descending order in each
6. If you want to activate or deactivate an output:
l
Select the outputs in the list, and
l
Click either the Activate or Deactivate button.
Monitor Intrusion Panel Outputs
44
Identities
The Identities screen gives you access to all tokens and operators of the system. An identity is added to the
system when a new user needs access to the site. For example, when a person is hired. Access to a site may be
physical access to an area or access to the ACM system to manage the site.
Physical access to the site allows a user to access areas and doors. Access to the ACM system allows users to
manage the site, such as adding users or monitoring events.
For a user to have access to the system or physical access to the site, they must have an identity.
l
l
If the user requires access to the system, they are issued a login and password. This allows the user to
access areas of the system. The areas of the system the user has access to depends on their role.
If a user requires physical access to the site, they are issued a token. The token gives the user physical
access to the site. This allows the user to access areas on the site. The areas the user has access to
depends on their role in the system.
NOTE: If you do not have the correct delegations, you may not be able to access some of the following pages.
See your System Administrator for details.
Searching for an Identity
Use the Search feature to find an identity in the database.
1. The Search area is at the top of the Identity Search page. Fill out the following fields:
l
Last Name field.
l
(Optional) The First Name and/ or Internal Number fields.
l
(Optional) The Group field.
2. Add any additional search criteria as follows:
l
Select the criteria from the Search Field drop down list.
l
Enter or select the value to search for in the Search Value field.
l
Click Add Criteria to add an additional search, then repeat the steps in the bullets above for each
additional criteria. Add as many search filters as you need to fulfill your search criteria.
l
At any time, you can click Clear Search to clear all fields.
l
To remove a single criteria row, click Remove.
3. In the drop down list to the right of the Search button, select whether the values entered in the fields
should be combined into a single search criteria (And) or used as separate search criteria (Or).
If And is selected, only the identities that fit all entered criteria will appear. If Or is selected, the identities
that fit one or more of the entered criteria will appear.
4. When you have entered all your search criteria, click Search.
The page refreshes and displays your search results.
NOTE: Always enter data in the Search Value field. Searching using blank entries will return all identities
as the result.
Identities
45
Adding an Identity
When a new user needs access to the ACM system or physical access to the site, they must have an identity. If
the user requires access to the system, they are issued a login and password. This allows the user to access
areas of the system. The areas of the system the user has access to depends on their role.
To add a new identity:
1. Click Identities.
The Identities Search page appears.
2. Click Add New Identity.
If you have defined one or more Identity Profiles for this system, the Identity Profile dialog box will pop up:
l
l
From the Identity Profile drop down list, select the profile you want to assign to this identity, then
click OK.
If you do not want to assign an identity profile to this identity, click Cancel.
The Identity Add page appears. The data from the Identity Profile will be populated on the screen.
3. Fill out the Last Name field, then complete the page with the required details.
NOTE: You can add additional values to some drop down lists using the User Lists feature. For more
information, see User Lists - Editing Items on page 206
4. Click
.
When the page refreshes, you are automatically taken to the Roles page.
5. Assign roles to this identity as required, then click
.
When the page refreshes, you are automatically taken to the Tokens page.
6. Enter the token details as required. By default the Download check box is selected. This downloads the
token to the connected panels and associated doors.
When you are finished, click
Adding an Identity
.
46
7. Navigate through the tabbed pages to add more details about the identity. The tabbed pages include:
l
Roles: use this page to assign a role to this identity.
l
Tokens: use this page to create a token for the identity.
l
Groups: use this page to assign this identity to a group.
l
Capture: use this page to take a photo of the user.
l
Photos: use this page to upload an existing photo of the user.
l
Badge: use this page to assign a badge to this user.
l
Timed Access: use this page to assign timed access to this user.
l
Access: use this page to view this identity's access privileges including roles, access groups, and
doors.
l
Transactions: use this page to view transactional data associated with the identity.
l
Audit: use this page to view a log of all the changes that have been made to this identity.
Identities - Assigning Roles
A role defines what a user has access to. For identities to have access to the system or physical access to the
site, they must be assigned a role. Each role contains access groups and/or delegations. Access groups allow a
user to have physical access to the site. Delegations allow a user to have access to the system. The user will be
assigned a role depending on their position in the organization.
To assign roles to an identity:
1. Click Identities.
The Identities Search page is displayed.
2. From the Identities Search page, perform a search for an identity.
For more information, see Searching for an Identity on page 45.
3. Click on the name of the identity you want to edit.
The Identity Edit screen appears.
4. Select the Roles tab.
5. From the Available list, select all the roles that you want to assign to the user, then click
.
The role is added to the Members list to show that it is now assigned.
To remove a role from the user, select the role from the Members list, then click
.
NOTE: You can select multiple items by using the Ctrl or Shift key.
6. Click
.
Identities - Assigning Roles
47
Identities - Assigning Tokens
Tokens allow users to have physical access to the system. Tokens can be a physical access card. If a user
requires physical access to the site, they are issued a token. The token gives the user physical access to the
site. This allows the user to access areas on the site. The areas the user has access to depends on their role in
the system.
To create tokens and assign them to an identity:
1. Click Identities.
The Identities Search page is displayed.
2. From the Identities Search page, perform a search for an identity.
For more information, see Searching for an Identity on page 45.
3. Click on the name of the identity you want to edit.
The Identities Edit screen appears.
4. Select the Tokens tab.
5. If only one token has been defined, the Tokens Edit page appears.
If more than one token has been defined, the Tokens Listing page appears. Click Add Token.
6. Enter the details as required.
7. Click
.
8. Click Download to download the token to the connected panels and associated doors.
9. To assign this token to a badge, select the Badge tab.
10. From the Badge Token drop down list, select the internal number you want to assign to the badge.
11. Click
(Save).
Identities - Assigning Groups
Groups are used to group physical and/or system components. Groups are assigned to identities primarily for
batch updates. For example, if all the badges are close to expiry and they are assigned to the same group, the
expiration date can be extended through a batch job.
To assign groups to an identity:
1. Click Identities.
The Identities Search page is displayed.
2. From the Identities Search page, perform a search for an identity.
For more information, see Searching for an Identity on page 45.
Identities - Assigning Tokens
48
3. Click on the name of the identity you want to edit.
The Identities Edit screen is displayed.
4. Select the Groups tab.
5. From the Available list, select all the groups that you want to add the user to, then click
.
The group is added to the Members list to show that the user is now a member.
To remove a user from a group, select the group from the Members list, then click
.
NOTE: You can select multiple terms by using the Ctrl or Shift key.
6. Click
.
Capturing an Image of an Identity
You can capture an image of a person to display on the Identity page or print on a badge.
After an image has been captured, a badge with an image can be created for an identity. For more information,
see Identities - Creating Badges on page 51.
There are two types of cameras you can use as a badge camera:
l
Local Camera — Any camera connected directly to your computer or built into your computer or monitor.
NOTE: Images cannot be captured with a local camera from an ACM client running in the Internet Explorer
or Safari web browsers, or running on a mobile device.
l
IP-based camera — Any IP-based camera previously connected to your network and added to your
ACM system.
Specify the camera you want to use in your user profile. For more information, see External Systems - Defining
the Badge Camera for the System on page 221.
1. There are two ways to arrive at the Capture page:
l
From the Identities Search page, click
from the Image Capture column.
l
From the Identities Search page, click on the name of an identity, then select the Capture tab.
2. If you are using:
a. A local camera that you have not used before, this page will not appear unless you allow your web
browser to access your camera. The first time you access the Capture page, you are prompted to
allow your browser to access your local camera. Click Allow.
b. An IP-based camera and the camera requires authentication, this page will not appear until you
have entered your login credentials.
Enter a user name and password, then click OK.
The Capture page appears.
Capturing an Image of an Identity
49
3. Click Capture.
The page refreshes to show the captured image on the left and the live preview on the right.
4. Click and drag the captured image on the left to select the cropping area.
Hold Shift to constrain the area selection to a square.
Use the cursor keys to nudge the area selection by one pixel. Hold Shift to nudge the area selection by
10 pixels.
5. Click
.
Uploading a Photo of an Identity
You can upload images of a person to display on the Identity page or print on a badge.
Once a photo has been uploaded, a badge can be created for the identity. For more information, see Identities Creating Badges on the next page.
NOTE: Ensure the image has the appropriate dimensions to fit on the badge. Most badges are approximately 2 x
3 inches in size. The image must be in JPG format.
To upload an existing photo:
1. Click Identities.
The Identities Search page is displayed.
2. From the Identities Search page, perform a search for an identity.
For more information, see Searching for an Identity on page 45.
Uploading a Photo of an Identity
50
3. Click on the name of the identity you want to edit.
The Identities Edit screen appears.
4. Select the Photos tab.
5. Click Upload Photo.
The screen expands to include more fields.
6. Click Choose File and navigate the directory to find the image you want to upload.
Click Open to select the image.
If you want to delete this dialog box, click
.
If you want this image to appear on the Identity page, select the Primary check box.
7. When you're finished, click
.
The image is saved to the Photos page.
Identities - Creating Badges
Badges are identification cards that are used to verify a user's identity or association to an organization. Badges
may also be used as access cards if they are printed directly on the person's RFID badge.
NOTE: Before you can print a badge, you must connect a badge printer to the network and configure it. For
instructions on how to configure your badge printer, refer to the printer's user guide.
To create a badge for a user:
1. Click Identities.
The Identities Listing page is displayed.
2. From the Identities Listing page, click on the name of the identity you want to edit.
The Identities Edit screen appears.
3. Select the Badge tab.
4. From the Badge Photo drop down list, select a photo for this badge.
Only the photos that have been previously uploaded or captured appear in this list.
5. From the Badge Token drop down list, select the token you want to associate with this badge.
Only the tokens that have been previously defined for this user appear in this list.
6. From the Badge Template drop down list, select the badge template that you want to use for this badge.
Only the badge templates that have been previously defined appear in this list.
7. Click
.
Identities - Creating Badges
51
8. To print the badge, click Create Badge.
The badge appears in a preview window.
9. Click Print.
NOTE: When printing the badge, ensure that the Header and Footer settings are turned off or set to blank.
Timed Access
Timed access is a feature which has been developed to allow one-off ad-hoc assignment of access to individual
identities.
This functionality should only be used in the above circumstances - for multiple identities and/or multiple
instances roles and access groups should be used.
NOTE: All timed access deletions must be done manually. There is no automatic clean-up of timed access
entries.
Adding Timed Access to an Identity
To add a new timed access entry for an identity:
1. Click Identities.
The Identities Search page appears.
2. Search for the identity. For more detail refer to Searching for an Identity on page 45.
3. Click on the name of the identity. The Identity: Edit page displays.
4. Click on the Timed Access tab.
5. Complete the following fields:
l
Name
l
Type
l
Appliance (this defaults)
l
Available/Members
l
Start Day/Time
l
End Day/Time
l
Schedule (if doors are selected as the Type)
6. Click Add.
The newly added timed access entry will display in the timed access list. If the timeframe for an entry is
currently active it will display in green. Note that this does not have a cross-check to schedules. If the
timed access is displayed in green but is not working, check any related schedules.
Editing Timed Access
There is no functionality to edit a timed access entry. If you want to change the details of an entry, then:
l
Delete the timed access entry. For more detail, refer to Deleting Timed Access on the next page.
l
Add a new timed access entry. For more detail, refer to Adding Timed Access to an Identity above.
Timed Access
52
Deleting Timed Access
To delete a timed access entry:
1. Click Identities.
The Identities Search page appears.
2. Search for the identity. For more detail refer to Searching for an Identity on page 45.
3. Click on the name of the identity. The Identity: Edit page displays.
4. Click on the Timed Access tab.
5. View the timed access list.
6. Click
to delete the related timed access entry.
7. Click OK when the message 'Are you want to delete <name>' displays.
The message 'Successfully deleted the timed access entry <name>' displays.
NOTE: All deletions must be done manually. There is no automatic clean-up of timed access entries.
Editing an Identity
An identity must be edited when user information changes. For example if a user changes roles, their identity
would need to reflect this. If the role is not updated, the user would not be able to access areas required for their
new role.
To edit an existing identity:
1. Click Identities.
2. Search on the Identity Search screen, then click on the identity you want to edit.
The Identity Edit screen appears.
3. Navigate through the tabbed pages and make the required changes. The tabbed pages include:
l
Identity: use this page to edit the identity details.
The default Enrollment Operator role cannot edit this page. Contact your System Administrator for
more details.
l
Roles: use this page to assign a role to this identity.
l
Tokens: use this page to create a token for the identity.
l
Groups: use this page to assign this identity to a group.
l
Capture: use this page to take a photo of the user.
l
Photos: use this page to upload an existing photo of the user.
l
Badge: use this page to assign a badge to this user.
l
Timed Access: use this page to assign timed access to this user.
l
Access: use this page to view this identity's access privileges including roles, access groups, and
Deleting Timed Access
53
doors.
l
Transactions: use this page to view past alarms and events that were triggered by this user.
l
Audit: use this page to view a log of all the changes that have been made to this identity.
NOTE: User Defined Tabs with User Defined Fields may be added. These will display at the end of the
list.
NOTE: Remember to click
Editing an Identity
to save the changes on each page.
54
Reports
The Reports screen allows you to create, edit, preview, and generate reports. Reports are used to gather
information from the system in either a PDF or Spreadsheet. Reports can be saved on your local computer and
referred to offline. For example, the Identity/Doors with Access Report can be used to view which doors each
identity has access to. You have the option of using the default system reports or customizing the reports to fit
your needs.
NOTE: If you do not have the correct delegations, you may not be able to access some of the following pages.
See your System Administrator for details.
Reports - Generating Reports
Anytime you see
PDF or
Spreadsheet, you can generate and save a copy of the current report.
You can generate a copy of reports from the Reports Listing page, the Report Edit page or from the Report
Preview page.
Generated reports will only show the filtered information that is displayed. To edit the report before you
generate it, see Reports - Editing on the next page
l
Click
to save the current report as a PDF file.
l
Click
to save the current report as a CSV format spreadsheet.
Most generated reports saved as PDF files contain a maximum of 2,000 records, except the Audit Log Report,
which contains a maximum of 1,000 records. Reports saved as CSV format spreadsheet files contain a maximum
of 2,000 records.
Depending on your web browser, the file may be auto-downloaded or you will be prompted to save the file to
your local computer.
Reports - Report Preview
When you click the name of a report from the Report Listing page and select
report is displayed.
, a preview of the selected
In the preview, you can check the report to see if the report gives you the information you need, search the
report, or generate the report. For example, if you wanted to know the role of an identity, you can preview the
Identity Summary report and search for the specific identity.
You can use the following options to control what is displayed:
Tip: Click
to filter the report. The preview bar expands to display search criteria.
Feature
Description
Generate Report
Reports
55
Feature
Description
The generate report options are displayed in the top left corner of the report preview.
Click this button to generate a PDF copy of the current report.
Click this button to generate a CSV or spreadsheet copy of the current report.
Preview Bar
The preview options are displayed at the bottom of the report page.
Click this icon to filter the report.
The report filter options are displayed. The options change depending on the
report.
l
Click Search to perform a search using the selected filter options.
l
Click Reset to clear the report filter options.
l
l
In the drop down list beside the Reset button, choose if the search will locate
all or any transactions that match the selected report filters.
Click Save to save and apply the selected filters to the default report.
Select the number of items you want to display on a single page.
Click this button to return to the first page of the report.
Click this button to return to the previous page of the report.
Enter the page you want to go to.
Click this button to bring up the next page of the report.
Click this button to go to the last page of the report.
Click this button to refresh the report.
Reports - Editing
All reports can be edited or filtered to only display the information that you need. You can edit default system
reports and custom reports in the same way.
If you plan to use the filtered report frequently, you may want to create a custom report rather than modifying
the default system report every time. For more information see Reports - Creating Custom Reports on page 58.
Most generated reports saved as PDF files contain a maximum of 2,000 records, except the Audit Log Report,
which contains a maximum of 1,000 records. Reports saved as CSV format spreadsheet files contain a maximum
of 2,000 records.
Reports requiring more than 2,000 rows must be scheduled as a batch job for system performance. For more
information, see Generating a Batch Report on page 234.
Reports - Editing
56
1. Display the Reports Listing page.
l
To display the system reports page, click Reports.
l
To display the custom reports page, select Reports > Custom Reports.
2. Click
for the report that you want to edit.
NOTE: The Audit Log Report and Transaction Report do not have
available. To edit, click on the
report name and follow the steps in the related procedure - Reports - Editing Audit Log and Transaction
Reports below.
3. On the following page, select your preferences for the report.
4. Click
to save your changes.
Now you can generate or preview the report with your changes.
Reports - Editing Audit Log and Transaction Reports
The Audit Log and Transaction Reports are edited differently from other reports. There is no edit function
directly available from the Reports Listing page.
Follow the steps below to edit these reports.
1. Display the Reports Listing page.
l
To display the system reports page, click Reports.
l
To display the custom reports page, select Reports > Custom Reports.
2. Click on the name of the report that you want to edit.
3. Click
in the bottom left-hand corner on the following page (either the Grid: Transaction Report or
Grid: Audit Log page).
The Find section opens.
4. Do the following to define criteria for the report:
l
Select an option in the search type field (e.g. Panel Date).
l
Select an option in the search operator field (e.g. greater or equal to).
l
Select an option in the search value field (e.g 12/07/2015 00:00:00).
5. Click
to add more search fields, if required.
Complete step 4 above for each additional field added.
6. Click
to save your changes.
The ACM Notification message displays with the message 'Search Parameters successfully changed'.
Now you can generate or preview the report with your changes.
NOTE: Click
if you want to reset the search criteria.
Reports - Editing Audit Log and Transaction Reports
57
Reports - Creating Custom Reports
A custom report is a system report that has been duplicated and edited to meet your requirements. You can
create a custom report for filtered reports that are used frequently.
1. Click Reports.
2. Click
for the report you want to base the custom report on.
3. On the following Report Edit page, select the Copy Report check box.
4. Give the new report a name.
5. Edit the report options to meet your requirements.
6. Click
to save the new custom report.
The Custom Reports Listing page displays with the new report automatically added to the list.
Reports - Creating Custom Audit Log and Transaction Reports
A custom audit log report lists all the selected recorded system logs. You can create a custom audit log report
to report only a selection of required audit logs. A custom transaction report lists all the selected recorded
system transactions. You can create a custom transaction report to report only a selection of required system
transactions.
1. Click Reports.
2. Click Transaction Report in the Report Name column.
3. Click
at the bottom of the page. The preview bar expands to display search criteria.
4. Enter the details you want to include in the report in the Find section. (Click
to add more fields.)
5. Click Search.
The system transactions are filtered into a report.
6. In the Create Custom Report field, enter a name for the report.
7. Click
Create Custom Report to save the new report.
The new report is automatically added to the Custom Reports Listing page.
Reports - Creating Custom Reports
58
Physical Access
The Physical Access pages allow you to access all connected panels, doors, inputs, outputs and associated
security devices. These devices can be added, modified, and deleted. The status of the hardware can also be
monitored from these pages.
Panels are controllers that connect one or more door controllers (subpanels) and their associated readers to the
appliance. Doors are logical units incorporating one or more components that are connected to a panel. The
configuration of a door allows users to access certain areas.
Inputs are devices associated to panels and doors. For example, motion sensors or smoke detectors. Outputs
are devices that perform tasks in response to input data. For example, unlocking a door or setting off a fire alarm.
NOTE: If you do not have the correct delegations, you may not be able to access some of the following pages.
See your System Administrator for details.
Configuring Doors
Doors are logical units incorporating one or more components that are connected to a panel.
These components could include:
l
Door, gate, elevator, escalator, etc.
l
Lock (such as magnetic or strike) or relay
l
Reader
l
Keypad
l
Contact
l
Panic bar
l
ACM Verify
These items do not need to be physically installed on a door, but should be included if they affect how the door
locks or opens.
Searching for Doors
Many facilities require the control and monitoring of dozens, even hundreds, of doors simultaneously. This can
result in a crowded listing page. You can search for specific doors to narrow the list of doors appearing on the
Door Listing page.
1. Use any (or all) of the following to define your search:
l
Enter your search term in the Search... field. Use any series of letters and numbers to search for the
doors you want to see.
l
If known, select the Device Status.
l
If known, select the Appliance the door is connected to.
l
If known, select the Group the door is included in.
2. Click OK.
The Door Listing page refreshes to show the doors that meet your search criteria.
Physical Access
59
Controlling Doors
From the Door Listing page, you can choose to control the door through the Access Control Manager software.
For example, you can unlock a door to allow unrestricted access to an area.
NOTE: Only the Installed options are available for virtual doors installed for use with ACM Verify readers.
1. Select the check box beside the door you want to control.
If you want to affect all the doors in your system, click All at the top of the left column to select all the
doors.
2. Select any of the following Door Actions if required:
l
l
l
l
l
Grant — Click this button to grant temporary access to the specified door. The door will be
momentarily unlocked to permit entry through the door.
Restore — Click this button to restore the door to its default configuration values. Restoring a Door
that has an activated Lock Function (Classroom, Office, Privacy, or Apartment), will remove the
Lock Function and the door will be reset to its default configuration.
Unlock — Click this button to unlock the specified door. This door will remain unlocked until the
Locked No Access command is issued or until another change of state is directed (either via
operator override or scheduled action).
Locked No Access — Click this button to lock the specified door. This door will remain locked until
the Restore command is issued or until another change of state is directed (either via operator
override or scheduled action).
Disable — Click this button to disable the specified door. This door will stop operating and allow
no access.
3. Select any of the following Door Mode options to change the door mode:
l
Card Only — This door can be accessed using a card. No PIN is required.
l
Card and Pin — This door can only be accessed using both a card and a PIN.
l
Card or Pin — This door can be accessed either by entering a PIN at a keypad or by using a card at
the card reader.
l
Pin Only — This door can only be accessed by entering a PIN at a keypad. No card is required.
l
Facility Code Only — This door can be accessed using a facility code.
NOTE: The Pin only and Card or Pin door modes will not be available if the 'Allow duplicate PINs' option
has been selected on the System Settings - General page.
4. Select either of the following Forced options if required:
l
Mask Forced — Click this button to mask the Forced Door Alarm for this door.
l
Unmask Forced — Click this button to unmask the Forced Door Alarm for this door.
5. Select either of the following Held options if required:
l
Mask Held — Click this button to mask the Door Held Open Alarm for this door.
l
Unmask Held — Click this button to unmask the Door Held Open Alarm for this door.
6. Select either of the following Installed options if required:
l
Install — Click this button to install a door.
l
Uninstall — Click this button to uninstall a door.
Controlling Doors
60
Adding Doors
Doors allow you to control access to certain areas of your site.
To add a new door:
1. Select Physical Access.
The Door Listing page is displayed.
2. On the Door Listing page, click Add Door.
3. On the Door Add page, enter a name for the door.
NOTE: Complete the Alt Name field if required.
4. From the Appliance drop down list, select the related appliance.
5. From the Vendor drop down list, select the manufacturer of the panel that controls the door.
NOTE: Depending on the vendor selected, additional fields will display.
6. Click
to add the door.
NOTE: Once saved the page becomes the Door: Edit page.
7. Navigate through the tabbed pages to configure the door. The tabbed pages include:
l
Parameters: Use this page to set access type, processing attributes, and other options.
l
Operations: Use this page to set simple macros, accepted card formats, and other options.
l
Hardware: Use this page to set reader, door position, strike and request to exit (REX).
l
Elev: Use this page to view elevator door details.
l
Cameras: Use this page to add or remove associated cameras.
l
Interlocks: Use this page to set interlocks.
l
Events: Use this page to view and edit door events.
l
Access: Use this page to view access groups, roles and identities that have door access.
l
Transactions: Use this page to view door transactions.
8. Click
to save your changes.
Doors - Advanced Filtering
In addition to searching you can also use advanced filters to select multiple filters on the Door Listing page.
1. Click Advanced Filters.
The Advanced Filters dialog box displays.
2. Select any required filters:
Adding Doors
l
Alarms—Select the alarms to include from the list of alarms.
l
Masked—Select to include all device statuses, or select from the list of device statuses.
l
Normal—Select to include all properly functioning doors.
l
Door Mode— Select the door modes to include from the list of door modes.
61
NOTE: To unselect all selected filters, click Unselect All. All selections will be removed.
3. If you want to save the selected filters, select Remember Filters.
4. Click OK.
The Door Listing page refreshes to show the doors that meet your filters.
Adding Simple Macros
You can add simple macros, or single action commands, to any door in the system. Simple macros are triggered
by one type of door event. This automatically activates the corresponding output.
For more information about macros, see Macros on page 136.
1. Select Physical Access.
The Door Listing page is displayed.
2. Select a door from the Door Listing page.
3. On the Door Edit screen, select the Operations tab.
At the bottom of the page is the Simple Macros section.
4. Select the Type of door event that will activate the output. The options are:
l
Forced
l
Held
l
Pre-Alarm
5. Select when the simple macro will be active from the Schedule drop down list. Only schedules that have
been configured in the system are listed.
6. Select the output that is activated when the selected type of door event is triggered.
7. Click Save Macro.
A new row is automatically added to the table.
8. If you need to add another simple macro, repeat steps 4 - 7 in the new row.
To remove a configured simple macro, simply click Remove Macro. The row is deleted.
9. Click
to save your changes.
Editing Doors
Doors can be edited after its initial configuration. For example, you may need to change the access type or door
mode to reflect changes on your site.
Adding Simple Macros
62
1. From the Door Listing page, click on the name of an existing door.
The Door Edit screen for that specific door is displayed.
2. Edit each tab as required. The tabbed pages include:
l
Parameters: Use this page to set access type, processing attributes, and other options.
l
Operations: Use this page to set simple macros, accepted card formats, and other options.
l
Hardware: Use this page to set reader, door position, strike and request to exit (REX).
l
Elev: Use this page to view elevator door details.
l
Cameras: Use this page to add or remove associated cameras.
l
Interlocks: Use this page to set interlocks.
l
Events: Use this page to view and edit door events.
l
Access: Use this page to view access groups, roles and identities that have door access.
l
Transactions: Use this page to view door transactions.
3. After editing each tab, click
to save your changes.
Doors - Editing HID® Doors
1. Select Physical Access.
The Doors Listing page is displayed.
2. From the Doors Listing page, click the HID® door name you want to edit.
The Doors Edit screen for that specific door type is displayed.
3. Edit the door by changing values on each of the door option tabs.
4. When you're finished, click
.
You are returned to the Listing page with all changes saved.
Doors - Editing Mercury Security Doors
To edit an existing Mercury Security door:
1. Select Physical Access.
The Doors Listing page is displayed.
2. Click the door name to select the door you want to edit.
The Mercury SecurityDoor Edit screen for that specific door is displayed.
3. When you're finished, click
.
You are returned to the Listing page with all changes saved.
Deleting Doors
To delete a door:
Doors - Editing HID® Doors
63
1. From the Door Listing page, click
for the door that you want to delete.
2. When the confirmation message appears, click OK.
The selected door is now removed from the system.
Door Modes
When you see the Door Mode option on the Door Edit page, the following options are listed:
This same list of options is provided for the Offline Door Mode option.
NOTE: Some of the options are not listed if it is not supported by the door module.
Feature
Description
Disable
This door is disabled for all access.
Locked no access
This door is always locked. No access is allowed through this system.
This door can be accessed using a facility code.
Facility code only
All employees share a single code. This option can be useful in offline situations, when
the door controller is no longer communicating with the Access Control Manager host.
This door can be accessed either by entering a PIN at a keypad or by using a card at the
card reader.
Card or Pin
NOTE: This door mode is not available if the 'Allow duplicate PINs' option has been
selected on the System Settings - General page.
Card and Pin
This door can only be accessed using both a card and a PIN.
Card only
This door can be accessed using a card. (The type of reader used to read this card is
determined in the Reader Type field.)
No PIN is required.
This door can only be accessed by entering a PIN at a keypad.
No card is required.
Pin only
NOTE: This door mode is not available if the 'Allow duplicate PINs' option has been
selected on the System Settings - General page.
Unlocked
This door is always unlocked.
Access Types
When you select an Access Type from the Door Edit page, the listed options include:
NOTE: The options may be different depending on the type of panel that is connected to the door.
Feature
Single
Paired
Master
Door Modes
Description
This is a door with a reader/keypad on only one side, normally entry only.
This indicates that this door possesses a reader/keypad on both sides, entry and exit, and that this
side is the master.
If you select this option, the Paired Door option is automatically displayed for you to specify the
other reader that is installed on the door.
64
Feature
Description
This indicates that this door possesses a reader/keypad on both sides, entry and exit, and that this
side is the slave.
Paired
Slave
If you select this option, the Paired Door option is automatically displayed for you to specify the
other reader that is installed on the door.
Elev no
feedback
This door is an elevator with no feedback input.
Elev
feedback
This door is an elevator with a feedback input.
ACM Verify™
The ACM Verify function allows authorized ACM system users to connect any web browser-enabled mobile
device to the ACM system and use the device as a virtual station for a door configured as an ACM Verify Station.
A virtual station controls access to places that do not have access-controlled doors or locks. Examples are
outdoor mustering stations for fire drills, a bus for school trips or a work area in an open-plan office. People
entering a place controlled by a virtual station must verify they are authorized to access the area by entering
their PIN code on the device. Typically, wireless web browser-enabled devices, such as mobile phones and
tablets, are used as virtual stations although any device with a web-browser can be used.
ACM system users assigned the ACM Verify Administrator role can add and configure doors as ACM Verify
stations, and administer the virtual stations and paired devices in the ACM system. They can also administer
other doors.
ACM system users assigned the ACM Verify User role can access the ACM Verify functionality on their mobile
devices that let the devices act as virtual stations, and can pair their mobile device to the ACM system.
Adding an ACM Verify Door
To set up a door as an ACM Verify Station
1. Add a new door from the Doors listing panel, and complete the Name, Alt Name, Location and Appliance
fields.
2. In the Vendor field, select Avigilon. The Station Type field is automatically set as ACM Verify.
3. Configure the station as either Managed or UnManaged,
l
l
A managed station prompts the operator of the virtual station to verify that the person who enters
a PIN code is using a valid PIN code and it also displays a picture and other information for
additional verification.
An unmanaged station only verifies whether the PIN code the person entered is a valid PIN code
that has access to the virtual station.
4. Set the timezone for the events reported by the virtual station if it needs to be different than the timezone
used by the appliance.
5. Specify an area if you want the virtual station to act as an entrance to the area.
If the virtual station is configured with an area, a valid PIN code entry at the station moves the identity
associated with the PIN code into the area. If it also configured as a managed virtual station, the user can
then view a list of the identities with photos that are in the area.
ACM Verify™
65
6. Configure Station Authorization as Paired or Login
l
l
A paired station is secured by pairing a specific device to the server so that only an ACM software
user in possession of the paired device and one of the required roles, or their equivalent
delegation set can access the ACM Verify station.
A login station is secured only by ACM login credentials and so that any ACM system user with the
required roles, or their equivalent delegation set, can access the ACM Verify station from any
device.
7. If Station Authorization is set to Paired, two lists are displayed. The Available list displays devices paired
to the ACM appliance but not assigned to this door. The Members list displays the paired devices
assigned to this door. Use the
and
keys to move devices between the two lists.
8. To pair a new device to the ACM appliance, click Add Paired Device. For more information, see Paired
Devices on the next page
For more information, see Doors - Avigilon New Parameters page belowDoors - Avigilon New Parameters page
below
Doors - Avigilon New Parameters page
After you save a new door as an ACM Verify Station for the first time, the screen refreshes and displays the initial
Parameters page for the door.
Feature
Description
Name
The name of the door.
Alt Name
The alternative name of the door.
Location
The location of the door.
Appliance
The appliance the door is connected to.
Vendor
The name of the door manufacturer. Select Avigilon for an ACM Verify Station.
Installed
Check this box to indicate the appliance can communicate with the connected device.
Station Type
Displays ACM Verify as the type of station used on the connected devices. A device that
uses this type of station is called a virtual station.
Select if you want the ACM Verify Station managed or not.
l
Managed or
UnManaged
l
A managed station requires the virtual station user to grant or deny access to the
person entering a valid PIN code. It also displays the name and picture of the user
for verification.
An unmanaged station automatically grants or denies access and does not provide
any additional information when a PIN code is entered.
Geographic
Timezone
Select the time zone where the ACM Verify device is used if it is different from the
ACM appliance value.
Into Area
Select the area where the ACM Verify device is used to monitor access. Select the Don't
Care option if the ACM Verify reader is not used to control access to a specific area. You
must specify an area if you want the virtual station to list all the people who have entered
the area.
Station
Authentication
Select Login if the user logs in to the ACM software using the ACM URL from the browser
on the ACM Verify device. Select Paired if the ACM Verify device is paired to ACM
Doors - Avigilon New Parameters page
66
Feature
Description
software.
Tip: If the authentication type is Paired, the Door Add page re-displays with the Add
Paired Device button.
Available
Lists the available ACM Verify devices that have been paired to the ACM system.
Members
Lists the paired ACM Verify devices that are assigned to this station.
Click to move a paired device from the Available list to the Members list.
Click to move a paired device from the Members list to the Available list.
Add Paired Device
Click to add a new paired device. See Add Paired Device for more information.
Click this button to save your changes.
Click this button to discard your changes.
Paired Devices
Pairing devices to the ACM appliance ensures that access to ACM Verify Stations is restricted to authorized
devices.
Pairing must be completed by both the ACM administrator and the user of the connected device. The device
user must be an authorized ACM user with the ACM Verify User role or equivalent at a minimum. The pairing
persists as long as the cookie used for the pairing exists. See Precautions for Paired ACM Verify Stations on the
next page
CAUTION — In a failover deployment of the ACM system, pair the device to both the main server and the
failover server. When a failover occurs, the ACM operator must restore the pairings for all ACM Verify devices to
the failover server, and repeat the process when the main server is back in service.
Prerequisites for Pairing Devices
Before pairing a device:
1. The ACM operator provides the user with the IP address or hostname of the ACM appliance. Do not
provide both. Use one format for the address of the ACM appliance for all pairings.
2. The device user must have the web browser open on their device.
The pairing must be completed within ten minutes of generating the PIN for pairing.
Although the user's device is paired to the ACM appliance, the virtual stations configured for paired
authentication are only active for a device when installed and the user's device is in the Members column for
that station.
A device can be paired to only one active ACM appliance. If a failover ACM appliance is configured, pair all
ACM Verify devices to both servers. If a fail-over occurs, you must reassign devices to the ACM Verify stations
on the fail-over server while it is active, and reassign them back to the main server after it is returned to service.
Pairing devices in advance will make this task much more efficient.
To pair a device, see Pair a Device on the next page.
Paired Devices
67
Precautions for Paired ACM Verify Stations
A paired device uses cookies to connect to ACM. Take the following precautions:
l
l
l
Always use the same device and browser to connect. Cookies are not shared between different devices
or browsers.
Do not pair the device while in private mode on your browser. Cookies are not saved when you are in
private mode.
Cookies are lost if you:
l
Clean up history and cookies in your browser
l
Pair the device using an IP address and then use the host name to access ACM.
If a device browser loses the cookie, it cannot access ACM Verify and you must pair the device again. Before
the device can be paired again, the previous pairing must be deleted from the ACM appliance.
Pair a Device
A device needs to be paired to the ACM appliance to access the ACM Verify function. A device can be paired
to the ACM appliance at any time, or when adding a door as an ACM Verify Station.
To pair a device:
1. The ACM operator navigates to the Add Paired Device panel.
a. If the operator is:
l
l
Pairing a device only, click
> Paired Devices.
Adding a new door as an ACM Verify station, click on Add Paired Device in the Door: Add
New screen. For more information, see Doors - Avigilon New Parameters page on page 66.
b. Enter the name to identify the device, such as "User Name's Smartphone" and click Generate PIN.
Provide the 4-digit PIN to the device user. The PIN is valid for 10 minutes.
2. The device user:
a. Enters the URL to the ACM appliance in the web browser in the format:
https://<ipAddress>/pair
The ACM client log in screen is displayed.
b. Logs in to the ACM client using their username and password.
The user is prompted to enter a name for the device and the 4-digit PIN provided by the
ACM operator.
3. The ACM operator waits until the device is paired and then clicks
To remove a pairing from the ACM appliance, click
.
for the device.
Using ACM Verify
You can use a web browser-enabled device, such as a smartphone or tablet, to connect to ACM, access the
ACM Verify Station functionality and use the device as a virtual station. Virtual stations control access to places
that do not have access-controlled doors or locks. Examples are outdoor mustering stations for fire drills, a bus
for school trips or a work area in an open-plan office. People entering a place controlled by a virtual station must
verify they are authorized to access the area by entering their PIN code on the device.
Precautions for Paired ACM Verify Stations
68
You must be an ACM user to use ACM Verify on your device. To set up a device for ACM Verify, see ACM
Verify™ on page 65.
To use ACM Verify:
1. Use the URL or web link in your web browser provided when your device was set up to launch
ACM Verify from your web browser.
NOTE: If your device is paired to the ACM user, always use the same browser.
2. If the Access Control Manager login page is displayed, enter your ACM Login and Password.
ACM Verify is displayed and the Virtual Stations you can use are listed.
3. Tap to open a virtual station.
A prompt to enter PIN codes appears.
4. Anyone wanting to access the location you are controlling must enter a PIN code on your device and tap
Submit.
l
If the virtual station is managed, the user's picture and name displays, and you are prompted to
grant or deny access.
l
If the virtual station is unmanaged, access is granted if the code is valid.
l
If the PIN code is incorrect or invalid, a message that access is not granted displays.
5. If an area is specified for the virtual station, the number of identities verified is also displayed, and you can
display a list of all the identities who have entered the area by clicking on the Identities Verified: link.
6. To switch to a different virtual station, tap the back button and tap another virtual station.
For example, if you want to have identities enter and exit an area using their PIN codes you need two
virtual stations. One station is configured for the area you want identities to enter into, and the second
station is configured for the area you want identities to exit into. Both virtual stations are accessible on the
same device.
To log out of ACM Verify, tap
and tap Log Out.
Anti-Passback
The anti-passback (APB) feature is used when you want to identify every cardholder that enters a room or area.
This feature can be configured to log or prevent a cardholder from re-entering the same area unexpectedly.
For example, the same card cannot be used to enter the same room twice in a row. If a cardholder enters a room
then passes the card to another potential cardholder to reuse the card at the same door, an APB error is logged
and may be configured to prevent the second cardholder from entering.
Another example is when an access card is also required to exit. If a cardholder holds open a door for another
person, the second person would not be able to exit even if they have an access card because the system
requires the cardholder to log an entrance in the system before they can exit.
To set up this feature, complete the following procedures:
Anti-Passback Modes
When you select the Operations tab on the Door Edit page, one of the options is for APB Mode.
Anti-Passback
69
Anti-Passback (APB) requires that a user must enter and exit a room before they may enter another room. For
example, the typical user of a parking lot would normally swipe their card at the “in” reader to enter the lot and
swipe it at the “out” reader to exit the lot. However, if a user swipes their card at the “in” reader then passes their
card back to a friend, the card would be denied access the second time when it is swiped by the friend.
To track anti-passback, a card reader must be installed on both the inside and the outside of the door. Users are
required to use the card to enter and exit the building.
NOTE: The APB modes may be different depending on the panels you have installed.
Tip: For HID® panel controlled doors, enter a value in the APB delay field to create a time based APB.
Mode
Description
No
APB is not used.
Selection
DoorBased
Timed
APB
TokenBased
Timed
APB
Hard
Door
APB
Allows you to configure APB with just one reader. The door keeps track of each badge to enter and
does not allow the same badge to enter twice in a row unless the APB time limit is reached.
Make sure you specify an APB time limit in the APB Delay field. Do not configure the area entering
or area leaving setting for the door.
Tracks each door a badge has accessed. Once the badge has accessed one door, it must access a
second door or wait until the APB time limit is reached before it may access the first door again.
Make sure you specify an APB time limit in the APB Delay field. Do not configure the area entering
or area leaving setting for the door.
Tracks each badge that enters a door and does not allow the same badge to enter twice in a row.
This badge will not be able to enter through the same door until it has accessed a second door.
NOTE: This mode is only available if using HID® hardware.
Tracks each badge that enters a door and generates a warning transaction if the same badge is
Soft Door used at the same door twice in a row. This badge is still able to enter the door the second time, but
the access is logged as an APB violation.
APB
NOTE: This mode is only available if using HID® hardware.
Tracks each badge that enters a specific area and defines which areas the badge may access next.
Hard
This badge is denied access if it tries to access an undefined area.
Area APB
Make sure you configure the area entering and area leaving setting for the specified door.
Tracks each badge that enters a specific area and defines which areas the badge may access next.
Soft Area The badge is allowed to access the area, but the access is logged as an APB violation.
APB
Make sure you configure the area entering and area leaving setting for the specified door.
Time based hard area APB. When the time limit expires, the hard area APB becomes a soft area
Timed
APB.
Area APB
Make sure you configure the area entering and area leaving setting for the specified door.
Setting Up Anti-Passback
Before you begin, consider what type of anti-passback (APB) mode that you need for each situation. For more
information, see Anti-Passback Modes on the previous page.
Setting Up Anti-Passback
70
To use the APB feature, you must set up at least two doors: one to represent the entrance and one to represent
an exit.
1. Create at least one area.
2. Create two doors that are connected to the same panel.
l
l
If there are two distinct doors in the room (for example, a door on opposite ends of a room), select
Single as the Access Type.
If there is only one door in the room, you still must create two doors in the system. For the entrance
door, select Paired Master as the Access Type. This door will control all the inputs and outputs that
are connected to the door.
For the exit door, select Paired Slave as the Access Type. This door will only control the reader
that allows cardholders to exit the room.
For both doors, assign the other door as the Linked Door.
3. After the doors have been created, assign an APB Mode for each door on the door's Operations tab.
NOTE: Remember to click
to save the changes on each page.
4. Assign the area you created in the first step for the Into Area for each door.
5. If you created more than one area, select the Out of Area for each door. Otherwise, you can leave it as
Don't Care.
6. If you are setting up a timed APB mode, enter the number of seconds before another entry is allowed in
the APB Delay field.
Granting a Free Pass
You can grant a user one free pass to enter a door without generating an anti-passback error. This feature is
useful if a cardholder swiped their card at a card reader but did not actually enter the area.
For example, an employee uses his access card to unlock the office entrance but is distracted by another
employee before he opens the door. The two employees speak for several minutes, and the door automatically
locks after a set amount of time. When the first employee attempts to unlock the office door again, this triggers
an APB alarm and the employee is locked out. The employee contacts the security officer and explains the
situation, the security officer can grant one free pass to allow the employee back into the office area.
To grant a free pass:
1. Click Identities.
The Identities Listing page is displayed.
2. From the Identities Listing page, click on the name of the identity.
The Identities Edit screen is displayed.
3. Select the Tokens tab.
4. Beside the 1 free pass button, select a door.
5. Click 1 free pass.
The cardholder can now enter the door without generating an new anti-passback alarm.
Granting a Free Pass
71
Global Anti-Passback
The anti-passback (APB) feature is used when you want to identify every cardholder that enters a room or area.
This feature can be configured to log or prevent a cardholder from re-entering the same area unexpectedly.
For example, the same card cannot be used to enter the same room twice in a row. If a cardholder enters a room
then passes the card to another potential cardholder to reuse the card at the same door, an APB error is logged
and may be configured to prevent the second cardholder from entering.
Another example is when an access card is also required to exit. If a cardholder holds open a door for another
person, the second person would not be able to exit even if they have an access card because the system
requires the cardholder to log an entrance in the system before they can exit.
Global anti-passback defines an area for which two or more readers are used to access the area, but are
physically wired to different controllers. If any one reader in that same area receives an APB user violation, it will
prevent that user from entering through other doors in same area.
Global Anti-Passback Modes
When you select the Operations tab on the Door Edit page, one of the options is for APB Mode.
Anti-Passback (APB) requires that a user must enter and exit a room before they may enter another room. For
example, the typical user of a parking lot would normally swipe their card at the “in” reader to enter the lot and
swipe it at the “out” reader to exit the lot. However, if a user swipes their card at the “in” reader then passes their
card back to a friend, the card would be denied access the second time when it is swiped by the friend.
To track anti-passback, a card reader must be installed on both the inside and the outside of the door. Users are
required to use the card to enter and exit the building.
NOTE: The APB modes may be different depending on the panels you have installed.
Tip: For HID® panel controlled doors, enter a value in the APB delay field to create a time based APB.
Mode
Description
No
APB is not used.
Selection
DoorBased
Timed
APB
TokenBased
Timed
APB
Hard
Door
APB
Allows you to configure APB with just one reader. The door keeps track of each badge to enter and
does not allow the same badge to enter twice in a row unless the APB time limit is reached.
Make sure you specify an APB time limit in the APB Delay field. Do not configure the area entering
or area leaving setting for the door.
Tracks each door a badge has accessed. Once the badge has accessed one door, it must access a
second door or wait until the APB time limit is reached before it may access the first door again.
Make sure you specify an APB time limit in the APB Delay field. Do not configure the area entering
or area leaving setting for the door.
Tracks each badge that enters a door and does not allow the same badge to enter twice in a row.
This badge will not be able to enter through the same door until it has accessed a second door.
NOTE: This mode is only available if using HID® hardware.
Tracks each badge that enters a door and generates a warning transaction if the same badge is
Soft Door
used at the same door twice in a row. This badge is still able to enter the door the second time, but
APB
the access is logged as an APB violation.
Global Anti-Passback
72
Mode
Description
NOTE: This mode is only available if using HID® hardware.
Tracks each badge that enters a specific area and defines which areas the badge may access next.
Hard
This badge is denied access if it tries to access an undefined area.
Area APB
Make sure you configure the area entering and area leaving setting for the specified door.
Tracks each badge that enters a specific area and defines which areas the badge may access next.
Soft Area The badge is allowed to access the area, but the access is logged as an APB violation.
APB
Make sure you configure the area entering and area leaving setting for the specified door.
Time based hard area APB. When the time limit expires, the hard area APB becomes a soft area
Timed
APB.
Area APB
Make sure you configure the area entering and area leaving setting for the specified door.
Interlocks
NOTE: Only Mercury Security doors support interlocks.
Interlocks are the mechanism that enables a specific event from one element of the system to trigger an action
at another element. Interlocks allow you to set up security routines like man-traps, prison entry points, and
automated building functions.
The interlock feature can be accessed from one of three ways:
l
Accessing Interlocks through Doors below
l
Accessing Interlocks from Subpanel Inputs below
l
Accessing Interlocks from Subpanel Outputs on the next page
Accessing Interlocks through Doors
1. Select Physical Access.
The Doors Listing page is displayed.
2. Select the Mercury Security door that you want to interlock.
The Door Edit screen is displayed.
3. Click the Interlocks tab.
The Door Interlocks Listing page is displayed.
Accessing Interlocks from Subpanel Inputs
1. Select Physical Access > Panels.
The Panels Listing page is displayed.
2. Select the panel you want to interlock.
The Panel Status screen is displayed.
Interlocks
73
3. Click the Subpanels tab.
The Subpanels Listing page is displayed.
4. Click
for the subpanel that is connected to the input you want to interlock.
The Inputs Listing page is displayed.
5. Click the Interlocks link beside the required input.
The Input Interlock Listing page is displayed.
Accessing Interlocks from Subpanel Outputs
1. Select Physical Access > Panels.
The Panels Listing page is displayed.
2. Select the panel you want to interlock.
The Panel Status screen is displayed.
3. Click the Subpanels tab.
The Subpanels Listing page is displayed.
4. Click
for the subpanel that is connected to the output you want to interlock.
The Outputs Listing page is displayed.
5. Click the Interlocks link beside the required output.
The Output Interlock Listing page is displayed.
Adding Interlocks
1. From the Interlock Listing page, click Add New Interlock. For more information about how to access the
different Interlock Listing pages, see Interlocks on the previous page.
2. On the following Interlock Add page, add the required information.
Notice that as you select options, new fields are displayed to help you further define your requirements.
3. When you're finished, click
to save the new interlock.
Editing Interlocks
1. From the Interlock Listing page, click the name of an interlock. For more information about how to access
the different Interlock Listing pages, see Interlocks on the previous page
2. On the following Interlock Edit page, make the required changes.
3. Click
to save your changes.
Configuring Locks
To add locks with built-in card or PIN readers
Accessing Interlocks from Subpanel Outputs
74
To use locks with built-in card or PIN readers, add the related wireless lock subpanel to the system then add the
lock hardware as part of a door. The readers can be either wired or wireless, depending on the lock.
The Access Control Manager application currently supports the following locks:
Configuring Assa Abloy Aperio® Wireless Lock Technology
To use the Assa Abloy Aperio wireless locks, you must have the following panels connected to the system:
l
Mercury EP1501, EP1501 with downstream support, EP1502 or EP2500
l
Assa Abloy Aperio 1 to 8 Hub or 1 to 1 Hub
The wireless lock assembly is installed directly to the door and communicate with the Aperio Hub subpanel
wirelessly.
1. Add a Mercury EP1501 or EP2500 panel to the Access Control Manager system.
For more information, see Adding Panels on page 127.
2. Add the Aperio 1 to 8 Hub or Aperio 1 to 1 Hub as a subpanel to the panel in the previous step.
For more information, see Adding Mercury Security Panels on page 128.
3. Create a door for each wireless lock assembly.
For more information, see Adding Doors on page 61.
4. For each door, select the corresponding Mercury Security panel, Aperio Hub subpanel and Lock Number
that is assigned to the wireless lock assembly.
5. Customize all other door settings to meet your system requirements and save your changes.
Configuring Allegion Schlage AD400 Series Locks
To use Allegion Schlage AD400 series locks, you must have the following panels connected to the system:
l
Mercury EP1501 or EP2500 panel with downstream support
l
PIM400 subpanel that is wired to the Mercury panel
The wireless lock assembly is installed directly to the door and communicates with the PIM400 subpanel
wirelessly.
NOTE: Ensure that the wireless locks have been installed in line with Schlage's installation instructions.
1. Add a Mercury EP1501 or EP2500 panel to the Access Control Manager system.
For more information, see Adding Panels on page 127.
2. Add the PIM400 as a subpanel to the panel in the previous step.
For more information, see Adding Mercury Security Panels on page 128.
3. After the panels have been added to the system, select the Subpanels tab.
4. For each PIM400 subpanel, enter the Low Door and High Door number that is assigned to the subpanel.
Each PIM400 subpanel manages up to 16 wireless doors in a series. You must identify the lowest
numbered door and the highest numbered door managed by each subpanel. The numbered doors
managed by each subpanel cannot overlap.
Configuring Assa Abloy Aperio® Wireless Lock Technology
75
5. Create a door for each wireless lock assembly.
For more information, see Adding Doors on page 61.
6. For each door, select the corresponding Mercury Security panel, PIM400 subpanel and door number that
is assigned to the wireless lock assembly.
7. On the door Parameters tab, you can set the Lock Function for the wireless locks. The options are:
o
None — Use the system default door settings.
o
Privacy — When you press the interior lock button, the door will lock and the exterior lock will not
grant access to any token. To unlock, you must press the interior lock button again or exit the
room.
o
Apartment — Use the interior lock button to toggle between locked and unlocked. When the door
is locked, any valid token will open the door. The door must be manually locked or it will stay
unlocked.
o
Classroom — Classroom/Storeroom. The lockset is normally secure. The inside lever always
allows free egress. Valid toggle credentials (i.e. a valid card that is swiped twice within five
seconds) on the exterior may be used to change to a passage or secured status. Not to be used on
mortise deadbolt. Interior push button not to be used.
o
Office — The lockset is normally secure. The inside lever always allows free egress. An interior
push-button on the inside housing may be used to select a passage or secured status. Meets the
need for lockdown function for safety and security. Valid toggle credentials (i.e. a valid card that is
swiped twice within five seconds) on the exterior may also be used to change status. Not to be
used on mortise deadbolt.
NOTE: There is a Restore door action available on the Door listing page and the Hardware Status page
which resets the Door Mode to its default value.
8. Customize all other door settings to meet your system requirements and save your changes.
Configuring Allegion Schlage LE Series Locks
To use Allegion Schlage LE series locks, you must have the following panels connected to the system:
l
Mercury EP1501 or EP2500 panel with downstream support.
l
ENGAGE™ Gateway subpanel that is wired to the Mercury panel.
NOTE: Ensure that the wireless locks have been installed in line with Schlage's installation instructions.
1. Add a Mercury EP2500 or EP1501 (with downstream) panel to the Access Control Manager system
following the steps below:
l
Select Physical Access > Panels to open the Panels page.
l
Click
l
Enter the Name, Vendor (Mercury Security), Model (2500 or 1501 with Downstream) and select
to add a new panel on the Panel: Add New page.
Installed, then click
Configuring Allegion Schlage LE Series Locks
to save the new panel.
76
2. If you are adding:
l
just ENGAGE Gateway subpanels, then add all required subpanels to the panel created in the
previous step using the Batch Add option and click
.
NOTE: You will still need to manually make sure that the ENGAGE Gateway has matching
configuration as the physical gateway.
l
both Gateway and non-Gateway subpanels, then enter the correct number of Gateway subpanels
and/or PIM400s on the Subpanel: Batch Add page (do not select any other panels at this stage)
and click
. For each other subpanel to be added:
o
Click on the Subpanels tab to open the Subpanel page. If you are adding non-Gateway
subpanels ensure that the subpanels are set to the correct port.
o
Add the subpanel. You can mix and match any subpanels using the same Mercury Security
protocol on the same port (i.e. ENGAGE Gateway and PIM400). For more information, see
Adding Mercury Security Panels on page 128.
For each ENGAGE Gateway subpanel, enter the following and select Installed:
o
Port
o
Address
o
Low Door and High Door number that is assigned to the subpanel.
Each ENGAGE Gateway subpanel manages up to 10 LE wireless doors. You must identify the
lowest numbered door and the highest numbered door managed by each subpanel. The
numbered doors managed by each subpanel cannot overlap.
3. Create a door for each wireless lock assembly.
For more information, see Adding Doors on page 61.
4. For each door, select the corresponding Mercury Security panel, ENGAGE Gateway subpanel and door
number that is assigned to the wireless lock assembly.
5. On the door Parameters tab, you can set the Lock Function for the wireless locks. The options are:.
o
None — Use the system default door settings.
o
Privacy — When you press the interior lock button, the door will lock and the exterior lock will not
grant access to any token. To unlock, you must press the interior lock button again or exit the
room.
o
Apartment — Use the interior lock button to toggle between locked and unlocked. When the door
is locked, any valid token will open the door. The door must be manually locked or it will stay
unlocked.
o
Classroom — Classroom/Storeroom. The lockset is normally secure. The inside lever always
allows free egress. Valid toggle credentials (i.e. a valid card that is swiped twice within five
seconds) on the exterior may be used to change to a passage or secured status. Not to be used on
mortise deadbolt. Interior push button not to be used.
Configuring Allegion Schlage LE Series Locks
77
o
Office — The lockset is normally secure. The inside lever always allows free egress. An interior
push-button on the inside housing may be used to select a passage or secured status. Meets the
need for lockdown function for safety and security. Valid toggle credentials (i.e. a valid card that is
swiped twice within five seconds) on the exterior may also be used to change status. Not to be
used on mortise deadbolt.
NOTE: There is a Restore door action available on the Door listing page and the Hardware Status page
which resets the Door Mode to its default value.
6. Customize all other door settings to meet your system requirements and save your changes.
Configuring Allegion Schlage NDE Series Locks
To use Allegion Schlage NDE series locks, you must have the following panels connected to the system:
l
Mercury EP1501 or EP2500 panel with downstream support.
l
ENGAGE Gateway subpanel that is wired to the Mercury Security panel.
NOTE: Ensure that the wireless locks have been installed in line with Schlage's installation instructions.
1. Add a Mercury EP2500 or EP1501 (with downstream) panel to the Access Control Manager system
following the steps below:
l
Select Physical Access > Panels to open the Panels page.
l
Click
l
Enter the Name, Vendor (Mercury Security), Model (2500 or 1501 with Downstream) and select
to add a new panel on the Panel: Add New page.
Installed, then click
to save the new panel.
2. If you are adding:
l
just ENGAGE Gateway subpanels, then add all required subpanels to the panel created in the
previous step using the Batch Add option and click
.
NOTE: You will still need to manually make sure that the ENGAGE Gateway has matching
configuration as the physical gateway.
l
both Gateway and non-Gateway subpanels, then enter the correct number of Gateway subpanels
and/or PIM400s on the Subpanel: Batch Add page (do not select any other panels at this stage)
and click
. For each other subpanel to be added:
o
Click on the Subpanels tab to open the Subpanel page. If you are adding non-Gateway
subpanels ensure that the subpanels are set to the correct port.
o
Add the subpanel. You can mix and match any subpanels using the same Mercury Security
protocol on the same port (i.e. ENGAGE Gateway and PIM400). For more information, see
Adding Mercury Security Panels on page 128.
For each ENGAGE Gateway subpanel, enter the following and select Installed:
o
Port
o
Address
o
Low Door and High Door number that is assigned to the subpanel.
Configuring Allegion Schlage NDE Series Locks
78
Each ENGAGE Gateway subpanel manages up to 10 NDE wireless doors. You must identify the
lowest numbered door and the highest numbered door managed by each subpanel. The
numbered doors managed by each subpanel cannot overlap.
3. Create a door for each wireless lock assembly.
For more information, see Adding Doors on page 61.
4. For each door, select the corresponding Mercury Security panel, ENGAGE Gateway subpanel and door
number that is assigned to the wireless lock assembly.
5. On the door Parameters tab, you can set the Lock Function for the wireless locks. For the NDE series
there is only one lock function: Classroom — Classroom/Storeroom.
NOTE: There is a Restore door action available on the Door listing page and the Hardware Status page
which resets the Door Mode to its default value.
6. Customize all other door settings to meet your system requirements and save your changes.
Configuring SimonsVoss Wireless Locks
To use SimonsVoss series locks, you must have the following panels connected to the ACM system:
l
l
Mercury EP1501 (with downstream support), EP1502, EP2500, or MS-ICS panel .
SmartIntego GatewayNode subpanel that is connected over an Ethernet network
using TCP. This connection is established after setting up the subpanel in the ACM software.
Ensure that the wireless locks have been installed and configured according to the SimonsVoss installation
instructions. You must have:
l
Configured the hostname, and optionally the IP address, or the MAC address in the SmartIntego
GatewayNode software. For more information, refer to the SimonsVoss documentation for the
SmartIntego GatewayNode software.
NOTE: To use the MAC address of the wireless lock, the hostname must be configures in the format
MAC<nnnnnnnnnnnn>, where nnnnnnnnnnnn is the MAC address without any colons. For example, the
hostname for a lock with MAC address 12:34:56:78:9A:BC is entered MAC123456789ABC.
l
Identified the hexadecimal address for each SmartIntego GatewayNode and each wireless lock before
you can connect them to the ACM software. This information is available from the SmartIntego Tool as
shown in the figures below.
Figure 3: The SmartIntego GatewayNode hexadecimal address in the SmartIntego Manager screen of the SmartIntego Tool.
Configuring SimonsVoss Wireless Locks
79
Figure 4: The SmartIntego lock hexadecimal address in the SmartIntego Manager screen of the SmartIntego Tool.
NOTE: The SmartIntego Tool software and the SmartIntego GatewayNode software are not supported on
Microsoft Windows 10.
To configure a door with a SmartIntego wireless lock in the ACM software, use the following steps:
1. Add a supported Mercury panel to the Access Control Manager system following the steps below:
l
Select Physical Access > Panels to open the Panels page.
l
Click
l
Enter the Name, Vendor (Mercury Security), Model (one of the supported panels) and select
to add a new panel on the Panel: Add New page.
Installed, then click
to save the new panel.
2. Optionally, on the Subpanel: Batch Add panel, enter the number of SmartIntego GatewayNode
subpanels. you want to add using the Batch Add option and click
.
3. Click on the Subpanels tab to open the Subpanel page.
4. Open each SmartIntego GatewayNode subpanel and enter the following:
l
Port—Select Network and select Installed.
l
Enter at least one of the following
l
o
IP Address
o
MAC Address
o
Hostname
Address—enter the hexadecimal address for the SmartIntego GatewayNode.
Each SmartIntego GatewayNode subpanel manages up to 16 wireless doors.
NOTE: You will still need to manually make sure that the subpanel configuration matches the physical
gateway
5. Create a door for each wireless lock assembly. Ensure you specify Mercury Security as the vendor.
For more information, see Adding Doors on page 61.
6. On the Parameters panel for each door, ensure that you do the following:
l
Vendor—Select Mercury Security
l
Panel—Select the panel that is connected to the SmartIntego GatewayNode for the door.
l
Subpanel—Select the subpanel for the SmartIntego GatewayNode that is connected to the door.
l
Door Number—Enter the hexadecimal address for the SmartIntego wireless lock assembly.
Configuring SimonsVoss Wireless Locks
80
l
l
Installed—Click the checkbox.
Don't pulse door strike on REX—For SimonsVoss wireless locks, such as cylinders, that do not
support a door position switch (DPOS) , this box must not be checked.
7. If the SimonsVoss lock on the door does not support a DPOS, the settings in the following fields have no
effect:
l
l
On the parameters tab:
o
Mask Forced Schedule
o
Mask held Schedule
o
Always Mask Forced
o
Always Mask Held
o
Offline Mode
o
Deny Duress
o
Door Forced Filter
o
Enable cipher Mode
o
Use Shunt Relay
o
Detailed Events
o
do Not Log Rex Transactions
o
Log all grants right away
On the Operations tab:
l
APB Mode
l
APB Delay
l
Into Area
l
Out of Area
l
PIN Timeout
l
PIN Attempts
l
LED Mode
l
Held Open Time
l
Held Pre Alarm Access Time
l
Extended Access
l
Extended Held Open Time
l
Simple Macros
l
Strike Mode
Configuring SimonsVoss Wireless Locks
81
l
Access time when open
l
Card Format
l
The Door status will default to Normal Status
8. Customize the other door settings to meet your system requirements and click
.
After the ACM system and the SmartIntego GatewayNode subpanel are connected, the door should be online. If
the door is not online:
l
l
Wait a few minutes: The GatewayNode polls the SimonsVoss wireless lock three times in three minutes,
then polls every three hours, until the door responds. Normally, the door should come online within three
minutes.
If the door is not online within a few minutes: Check all the connections between the ACM system and the
SmartIntego GatewayNode subpanel, including the power.
If you uninstall the door and then reinstall it in the ACM system, the connection between the SmartIntego
GatewayNode subpanel and the SimonsVoss lock is not interrupted. The reinstalled door will appear offline to
the ACM system until the SmartIntego GatewayNode subpanel polls the SimonsVoss lock. This poll happens
once every 12 hours, so you may have to wait as long as 12 hours. During this period, the door will function
normally but the ACM system will not receive any events from the door.
After a power outage to the SmartIntego GatewayNode subpanel, an accurate door status will not be seen in
the ACM system until after the SmartIntego GatewayNode subpanel is online and polling of all the SimonsVoss
doors connected to that subpanel has completed.
Doors - Listing page
The Doors Listing page lists all doors that have been defined in the system. In addition to the doors listing the following features are available:
Feature
Description
Searching
If you have a long list of doors, you can choose to search for a specific door.
For more information, see Searching for Doors on page 59.
Controlling Doors
From this page, you can also control the door through the application. For
more information, see Controlling Doors on page 60.
Advanced Filters
You can also filter the list using advanced filters. For more information, see
Doors - Advanced Filtering on page 61.
Legend
Click Legend to see the list of statuses and the related icons. There are three
groupings which are color-coded — Normal
Doors - Listing page
, Alarms
, Masked
:
82
Feature
Description
The listed doors details include:
Feature
All/None
Description
Click on this to select all doors.
NOTE: If all doors are selected, then the name will change to None. Click this to deselect
all selected doors.
Device status
Displays the device status. Hover the mouse over the related icon to see more details.
NOTE: The tamper icon only appears for OSDP readers, and reports whether the reader
is offline or has been tampered with..
The name assigned to this door.
Name
Panel
Click on this name to bring up the Door Parameters page of the door properties sheet for
this door.
The name of the panel to which this door is connected. Click on this name to bring up the
Configure page of the properties sheet for this panel.
Current state of the related door: Open or Closed.
Door state
NOTE: To properly report the Door State from the Door Position Switch, Detailed Events
must be enabled for the door.
Indicates the door mode — the method by which the door is opened. Options are:
Door mode
l
Disabled
l
Unlocked
l
Locked No Access
l
Facility Code Only
l
Card Only
l
Pin Only
l
Card & Pin
l
Card or Pin
Add Door
Click this button to define a new door.
Create New Report
Click this button to generate a standard report on the doors in this list.
Doors - Listing page
83
NOTE: All columns in the table can be used to sort the display. To do this click in the column heading and click
to sort in ascending order or
to sort in descending order.
Doors - Add page
When you click Add New Door from the Doors Listing page, the Doors Add page is displayed.
NOTE: Some of the listed fields may not be displayed if it is not supported by the door module.
Feature
Description
Name
Enter a name for the door.
Alt. Name
If required, enter an alternate name for the door.
Location
Enter a short description of the door location.
Select one or more partitions.
Partitions
Partitions allow you to define who can see or edit items in the system. If you do not select a
partition, anyone with access to the system can edit the item.
Only the partitions that have been defined in the system appear in this list. You can only see
the partitions that you are a member of. If no partitions are defined for this system, this pane is
hidden.
Panel
Specifies the panel the door is assigned to.
After you make your selection, new options may be displayed to define how the door is
connected to the panel.
Subpanel
Specifies the subpanel that is connected to the door.
This option is only displayed if there is a subpanel connected to the selected main panel.
Lock Number
or
Door Number
Wireless locks only:
l
l
Appliance
Enter the number programmed for the lock. For all locks except SimonsVoss, select the
number from the drop-down list.
For SimonsVoss wireless locks, enter the hexadecimal address assigned by the
SmartIntego Tool. For more information, see Configuring SimonsVoss Wireless Locks
on page 79.
Select the appliance that the door is connected to.
Select the type of panel this door is connected to.
Vendor
The page refreshes to display new options.
Installed
Check this box to indicate that all the door components are installed and can communicate
with the appliance. Avigilon doors:
Station Type
Displays ACM Verify as the type of station used on the connected devices. A device that uses
this type of station is called a virtual station.
Select if you want the ACM Verify Station managed or not.
Managed or
UnManaged
Doors - Add page
l
A managed station requires the virtual station user to grant or deny access to the
person entering a valid PIN code. It also displays the name and picture of the user for
verification.
84
Feature
Description
l
An unmanaged station automatically grants or denies access and does not provide any
additional information when a PIN code is entered.
Geographic
Timezone
Select the time zone where the ACM Verify device is used if it is different from the
ACM appliance value.
Into Area
Select the area where the ACM Verify device is used to monitor access. Select the Don't Care
option if the ACM Verify reader is not used to control access to a specific area. You must
specify an area if you want the virtual station to list all the people who have entered the area.
Station
Authentication
Select Login if the user logs in to the ACM software using the ACM URL from the browser on
the ACM Verify device. Select Paired if the ACM Verify device is paired to the ACM system.
Tip: If the authentication type is Paired, the Door Add page re-displays with the Add Paired
Device button.
HID® and Mercury Security doors:
Access Type
Select the Access Type from the drop down list.
Tip: If the access type is a paired door (paired master or paired slave), the Door Add page redisplays with the additional field, Paired Door. Select the Paired Door option from the drop
down list.
Door Mode
The entry mode for the door when the door controller is online and communicating with the
panel.
Select a Door Mode option from the drop down list.
Offline Mode
The entry mode used for the door if the door controller is no longer communicating with the
panel.
NOTE: In many cases readers in offline mode require a very simple solution for entry or exit
because of the memory limitations. The recommended Offline Mode option is Facility code
only.
Select the Offline Mode option from the drop down list.
Custom Mode
Select any additional door mode the door must support outside the Door Mode and Offline
Mode options.
Custom
Schedule
Define when the Custom Mode would be active.
Select a schedule from the drop down list.
Only schedules that have been defined in the system are listed.
Masked
Forced
Schedule
Define when Door Forced Open alarms from this door will be masked.
Select a schedule from the drop down list.
Only schedules that have been defined in the system are listed.
Masked Held
Schedule
Define when Door Held Open alarms from this door will be masked.
Select a schedule from the drop down list.
Only schedules that have been defined in the system are listed.
Always Mask
Forced
Doors - Add page
Check this box to specify that Door Forced Open alarms at this door are always masked.
85
Feature
Description
Normally, this box is unchecked.
Always Mask
Held
Check this box to specify that Door Held Open alarms at this door are always masked.
Normally, this box is unchecked.
Door Processing Attributes for HID
Select one of the listed options to define the level of door event tracking that is logged in the
Monitor screen.
Door use
Tracking
l
None: only standard door events are logged
l
Used: includes the details of when the door is used
l
Used with pending: includes the events that occur between door use.
These options should only be used when the Detailed events option is enabled.
Deny Duress
If a user indicates duress at a door, checking this box denies access.
Don't Pulse
Door Strike on Check this box to disable the pulse of the door strike when request-to-exit button is activated.
REX
Detailed
Events
Check this box to display the current position of the door position switch (DPOS) in the Door
State column of the Door Listing page. When enabled the column will display “Open” when
the DPOS is in an open state and “Closed” when the DPOS is in a closed state
This feature is useful for circumstances where it is important to know all the details of an event.
Enable Cipher
Mode
Do Not Log
Rex
Transactions
Check this box to enable cipher mode.
Cipher mode allows the operator to enter card number digits at the door’s keypad.
Check this box to disable logging of request-to-exit transactions.
Door Processing Attributes for Mercury Security
Log Grants
Right Away
When this box is checked, the system logs an extra event as soon as there is a grant (that is,
before entry / no entry is determined). This event is not turned into a Access Control Manager
event. Check this box in order to initiate local I/O in the panel using the panel triggers.
Certain customers may have a trigger they want to fire (to execute a macro) as soon as there is
a grant but before entry / no entry is determined.
Deny Duress
Check this box to deny access to a user that indicates duress at a door.
Don't Pulse
Check this box to disable the pulse of the door strike output when the request-to-exit button is
Door Strike on pressed and can be used for a 'quiet' exit.
REX
If this box is not checked, the output is pulsed.
For SimonsVoss wireless lock doors that do not support a door position switch (DPOS) , this
box must not be checked.
Require Two
Card Control
Check this box to specify that two tokens are required to open this door. This enforces twoperson rule at a specified door.
Door Forced
Filter
Check this box to enable the filter feature for door forced alarms.
There are instances when a door is either slow to close or is slammed shut and bounces open
Doors - Add page
86
Feature
Description
for a few seconds. With this filter, the monitor allows three seconds for a door to close before
issuing an alarm.
Log All Access Check this box to log all access grant transactions as if the person used the door. If this box is
as Used
not checked, the door determines if it was opened and will distinguish if the door was used or
not used for grant.
Detailed
Events
Check this box to display the current position of the door position switch (DPOS) in the Door
State column of the door listing screen. When enabled the column will display “Open” when
the DPOS is in an open state and “Closed” when the DPOS is in a closed state.
NOTE: To properly report the Door State from the Door Position Switch, Detailed Events must
be enabled.
Typically, five to ten detailed transactions will be generated for each grant transactions. During
the normal course of operation, most guards don't need to see extensive reports on events;
however, after hours, it is often useful to see every detail.
Enable Cipher
Mode
Check this box to enable cipher mode.
Cipher mode allows the operator to enter card number digits at the door’s keypad.
Use Shunt
Relay
Check this box to enable the use of a shunt relay for this door.
Do Not Log
Rex
Transactions
Check this box to indicate that return-to-exit transactions do not get logged to the database.
Click this button to save your changes.
Click this button to discard your changes.
Doors - HID® New Parameters page
After you save a new door for the first time, the screen refreshes and displays the initial Parameters page for the
door.
Feature
Description
Name
The name of the door.
Alt Name
The alternative name of the door.
Location
The location of the door.
Appliance
The appliance the door is connected to.
Vendor
The name of the door manufacturer.
Installed
Check this box to indicate the appliance can communicate with the connected device.
Select one or more partitions.
Partitions
Partitions allow you to define who can see or edit items in the system. If you do not select a
partition, anyone with access to the system can edit the item.
Only the partitions that have been defined in the system appear in this list. You can only see
the partitions that you are a member of. If no partitions are defined for this system, this pane is
Doors - HID® New Parameters page
87
Feature
Description
hidden.
Specify the panel the door is assigned to.
Panel
After you make your selection, new options may be displayed to define how the door is
connected to the panel.
Specify the subpanel that is connected to the door.
Subpanel
This option is only displayed if there is a subpanel connected to the specified panel.
Enter the number ID for the set of inputs/outputs that are connected from the subpanel to the
door.
Lock Number
This option is only displayed if there are inputs or outputs connected to the specified
subpanel.
Select the Access Type for the door.
Access Type
Door Mode
Tip: If the access type is a paired door (paired master or paired slave), the Door Add page redisplays with the additional field, Paired Door. Select the Paired Door option from the drop
down list.
Select the entry mode for the door when the door controller is online and communicating with
the panel.
Select the entry mode used for the door if the door controller is no longer communicating with
the panel.
Offline Door
Mode
Custom Mode
NOTE: In many cases readers in offline mode require a very simple solution for entry or exit
because of the memory limitations. The recommended Offline Mode option is Facility code
only.
Select any additional door mode the door must support outside the Door Mode and Offline
Mode options.
Define when the Custom Mode would be active.
Custom
Schedule
Select a schedule from the drop down list.
Only schedules that have been defined in the system are listed.
Define when Door Forced Open alarms from this door will be masked.
Mask Forced
Schedule
Select a schedule from the drop down list.
Only schedules that have been defined in the system are listed.
Define when Door Held Open alarms from this door will be masked.
Mask Held
Schedule
Select a schedule from the drop down list.
Only schedules that have been defined in the system are listed.
Always Mask
Forced
Check this box to mask all Forced Door events.
Always Mask
Held
Check this box to mask all Door Held Open events.
Door Processing Attributes
Door use
Select one of the listed options to define the level of door event tracking that is logged in the
Doors - HID® New Parameters page
88
Feature
Description
Monitor screen.
Tracking
l
None: only standard door events are logged
l
Used: includes the details of when the door is used
l
Used with pending: includes the events that occur between door use.
These options should only be used when the Detailed events option is enabled.
Deny Duress
If a user indicates duress at a door, checking this box denies access.
Don't Pulse
Door Strike on Check this box to disable the pulse of the door strike when request-to-exit button is activated.
REX
Detailed
Events
Check this box to generate detailed events of all hardware at the door including door position
masking, timer expiration and output status.
This feature is useful for circumstances where it is important to know all the details of an event.
Enable Cipher Check this box to enable cipher mode.
Mode
Cipher mode allows the operator to enter card number digits at the door’s keypad.
Do Not Log
Rex
Transactions
Check this box to disable logging of request-to-exit transactions.
Click this button to save your changes.
Click this button to discard your changes.
Doors - Mercury Security New Parameters page
After you save a new door for the first time, the screen refreshes and displays the initial Parameters page for the
door.
NOTE: Some of the listed fields may not be displayed if it is not supported by the door module.
Feature
Description
Name
The name of the door.
Alt Name
The alternative name of the door.
Location
The location of the door.
Appliance
The appliance the door is connected to.
Vendor
The name of the door manufacturer.
Installed
Check this box to indicate the appliance can communicate with the connected device.
Select one or more partitions.
Partitions
Partitions allow you to define who can see or edit items in the system. If you do not select a
partition, anyone with access to the system can edit the item.
Only the partitions that have been defined in the system appear in this list. You can only see the
partitions that you are a member of. If no partitions are defined for this system, this pane is
hidden.
Doors - Mercury Security New Parameters page
89
Feature
Description
Specifies the panel the door is assigned to.
Panel
After you make your selection, new options may be displayed to define how the door is
connected to the panel.
Specifies the subpanel that is connected to the door.
Subpanel
This option is only displayed if there is a subpanel connected to the selected main panel.
Door
Number
Enter the number ID for the set of inputs/outputs that are connected from the subpanel to the
door.
This option is only displayed if there are inputs or outputs connected to the selected subpanel.
Select the Access Type from the drop down list.
Access Type Tip: If the access type is a paired door (paired master or paired slave), the Door Add page redisplays with the additional field, Paired Door. Select the Paired Door option from the drop down
list.
Door mode
The entry mode for the door when the door controller is online and communicating with the
panel.
Select a Door Mode option from the drop down list.
The entry mode used for the door if the door controller is no longer communicating with the
panel.
Offline Door NOTE: In many cases readers in offline mode require a very simple solution for entry or exit
Mode
because of the memory limitations. The recommended Offline Door Mode option is Facility
code only.
Select the Offline Mode option from the drop down list.
Select how the interior lock button will function.
l
l
l
Lock
Function
l
Privacy — When you press the interior lock button, the door will lock and the exterior lock
will not grant access to any token. To unlock, you must press the interior lock button again
or exit the room.
Apartment — When you press the interior lock button, the door will lock but any valid
token will open the door. The door must be manually locked or it will stay unlocked.
Classroom — Classroom/Storeroom. The lockset is normally secure. The inside lever
always allows free egress. Valid toggle credentials (i.e. a valid card that is swiped twice
within five seconds) on the exterior may be used to change to a passage or secured
status. Not to be used on mortise deadbolt. Interior push button not to be used.
Office — The lockset is normally secure. The inside lever always allows free egress. An
interior push-button on the inside housing may be used to select a passage or secured
status. Meets the need for lockdown function for safety and security. Valid toggle
credentials (i.e. a valid card that is swiped twice within five seconds) on the exterior may
also be used to change status. Not to be used on mortise deadbolt.
There is a Restore door action available on the Hardware Status page or Door Listing page
which resets the door's configuration values to their default value. If the door is in any mode
(Classroom, Office, Privacy, or Apartment) it will be 'restored' to the opposite status (e.g. if the
door is in Privacy mode then it is locked - if the Restore option is selected then the door will
Doors - Mercury Security New Parameters page
90
Feature
Description
return to its default mode, which is the mode set in the base configuration for the door).
Custom
Mode
Select any additional door mode the door must support outside the Door Mode and Offline
Mode options.
Define when the Custom Mode would be active.
Custom
Schedule
Select a schedule from the drop down list.
Only schedules that have been defined in the system are listed.
Define when Door Forced Open alarms from this door will be masked.
Mask Forced
Select a schedule from the drop down list.
Schedule
Only schedules that have been defined in the system are listed.
Define when Door Held Open alarms from this door will be masked.
Mask Held
Schedule
Select a schedule from the drop down list.
Only schedules that have been defined in the system are listed.
Always Mask Check this box to specify that Door Forced Open alarms at this door are always masked.
Forced
Normally, this box is unchecked.
Always Mask Check this box to specify that Door Held Open alarms at this door are always masked.
Held
Normally, this box is unchecked.
Door Processing Attributes
Log grants
right away
When this box is checked, the system logs an extra event as soon as there is a grant (that is,
before entry / no entry is determined). This event is not turned into a Access Control Manager
event. Check this box in order to initiate local I/O in the panel using the panel triggers.
Certain customers may have a trigger they want to fire (to execute a macro) as soon as there is a
grant but before entry / no entry is determined.
Deny duress Check this box to deny access to a user that indicates duress at a door.
Don't pulse
door strike
on REX
Check this box to disable the pulse of the door strike output when the request-to-exit button is
pressed and can be used for a 'quiet' exit.
If this box is not checked, the output is pulsed.
For SimonsVoss wireless lock doors that do not support a door position switch (DPOS) , this box
must not be checked.
Require two Check this box to specify that two tokens are required to open this door. This enforces twocard control person rule at a specified door.
Check this box to enable the filter feature for door forced alarms.
Door Forced There are instances when a door is either slow to close or is slammed shut and bounces open for
Filter
a few seconds. With this filter, the monitor allows three seconds for a door to close before
issuing an alarm.
Log all
access as
used
Check this box to log all access grant transactions as if the person used the door. If this box is
not checked, the door determines if it was opened and will distinguish if the door was used or
not used for grant.
Doors - Mercury Security New Parameters page
91
Feature
Description
Check this box to display the current position of the door position switch (DPOS) in the Door
State column of the door listing screen. When enabled the column will display “Open” when the
DPOS is in an open state and “Closed” when the DPOS is in a closed state.
Detailed
events
NOTE: To properly report the Door State from the Door Position Switch, Detailed Events must be
enabled.
Typically, five to ten detailed transactions will be generated for each grant transactions. During
the normal course of operation, most guards don't need to see extensive reports on events;
however, after hours, it is often useful to see every detail.
Check this box to enable cipher mode.
Enable
cipher mode
Cipher mode allows the operator to enter card number digits at the door’s keypad.
Use Shunt
Relay
Check this box to enable the use of a shunt relay for this door.
Do Not Log
Rex
Check this box to indicate that return-to-exit transactions do not get logged to the database.
Transactions
Click this button to save your changes.
Click this button to discard your changes.
Doors - Edit Screen
When you click the name of an existing door from the Doors Listing page, the Doors Edit screen is displayed.
For definitions of the relevant fields and pages for each door type, refer to the page specific to your door
vendor.
l
Doors - HID VertX® Edit screen below
l
Doors - Mercury Security Edit screen on page 106
Doors - HID VertX® Edit screen
When you specify HID® as the vendor for a door, the door options change to show what is supported by that
manufacturer.
Doors - HID® Parameters page
When you click the Parameters tab on the Door Edit screen, the HID Parameters page is displayed. This page
allows you to define the door connections, door mode, schedule and processing attributes.
Feature
Description
Name
The name of the door.
Alt Name
The alternative name of the door.
Location
The location of the door.
Appliance
The appliance the door is connected to.
Vendor
The name of the door manufacturer.
Doors - Edit Screen
92
Feature
Description
Installed
Check this box to indicate the appliance can communicate with the connected device.
Partitions
Select one or more partitions.
Partitions allow you to define who can see or edit items in the system. If you do not select a
partition, anyone with access to the system can edit the item.
Only the partitions that have been defined in the system appear in this list. You can only see
the partitions that you are a member of. If no partitions are defined for this system, this pane is
hidden.
Panel
Specify the panel the door is assigned to.
After you make your selection, new options may be displayed to define how the door is
connected to the panel.
Subpanel
Specify the subpanel that is connected to the door.
This option is only displayed if there is a subpanel connected to the specified panel.
Lock Number
Enter the number ID for the set of inputs/outputs that are connected from the subpanel to the
door.
This option is only displayed if there are inputs or outputs connected to the specified
subpanel.
Access Type
Select the Access Type for the door.
Tip: If the access type is a paired door (paired master or paired slave), the Door Add page redisplays with the additional field, Paired Door. Select the Paired Door option from the drop
down list.
Door Mode
Select the entry mode for the door when the door controller is online and communicating with
the panel.
Offline Door
Mode
Select the entry mode used for the door if the door controller is no longer communicating with
the panel.
NOTE: In many cases readers in offline mode require a very simple solution for entry or exit
because of the memory limitations. The recommended Offline Mode option is Facility code
only.
Custom Mode Select any additional door mode the door must support outside the Door Mode and Offline
Mode options.
Custom
Schedule
Define when the Custom Mode would be active.
Select a schedule from the drop down list.
Only schedules that have been defined in the system are listed.
Mask Forced
Schedule
Define when Door Forced Open alarms from this door will be masked.
Select a schedule from the drop down list.
Only schedules that have been defined in the system are listed.
Mask Held
Schedule
Define when Door Held Open alarms from this door will be masked.
Select a schedule from the drop down list.
Doors - HID® Parameters page
93
Feature
Description
Only schedules that have been defined in the system are listed.
Always Mask
Forced
Check this box to mask all Forced Door events.
Always Mask
Held
Check this box to mask all Door Held Open events.
Door Processing Attributes
Door use
Tracking
Select one of the listed options to define the level of door event tracking that is logged in the
Monitor screen.
l
None: only standard door events are logged
l
Used: includes the details of when the door is used
l
Used with pending: includes the events that occur between door use.
These options should only be used when the Detailed events option is enabled.
Deny Duress
If a user indicates duress at a door, checking this box denies access.
Don't Pulse
Door Strike on Check this box to disable the pulse of the door strike when request-to-exit button is activated.
REX
Detailed
Events
Check this box to generate detailed events of all hardware at the door including door position
masking, timer expiration and output status.
This feature is useful for circumstances where it is important to know all the details of an event.
Enable Cipher Check this box to enable cipher mode.
Mode
Cipher mode allows the operator to enter card number digits at the door’s keypad.
Do Not Log
Rex
Transactions
Check this box to disable logging of request-to-exit transactions.
Click this button to save your changes.
Click this button to discard your changes.
Create New
Report
Click this button to generate a PDF report on this door.
Add New Door Click this button to add a new door.
Transaction
Report
Click this button to generate a PDF transaction report on this door.
Show Policy
Click this button to generate a PDF report on the current door policy.
Click this button to delete this door.
Click OK in the dialog box that displays to confirm the deletion. The door will be deleted and
you will be returned to the Doors Listing page.
Doors - HID® Operations page
When you click the Operations tab on the Door Edit screen, the HID Operations page is displayed. This page
allows you to edit how the door operates, including the door mode, anti-passback and strike modes.
Doors - HID® Operations page
94
Feature
Description
Name
The name of the door.
Alt Name
The alternative name of the door.
Location
The location of the door.
Appliance
The appliance the door is connected to.
Vendor
The name of the door manufacturer.
Installed
Check this box to indicate the appliance can communicate with the connected device.
Select one or more partitions.
Partitions
Partitions allow you to define who can see or edit items in the system. If you do not select a
partition, anyone with access to the system can edit the item.
Only the partitions that have been defined in the system appear in this list. You can only see the
partitions that you are a member of. If no partitions are defined for this system, this pane is hidden.
Panel
Specifies the panel the door is assigned to.
Specifies the subpanel that is connected to the door.
Subpanel
This option is only displayed if there is a subpanel connected to the selected main panel.
Lock
Number
The number ID for the set of inputs/outputs that are connected from the subpanel to the door.
This option is only displayed if there are inputs or outputs connected to the selected subpanel.
Select the anti-passback mode for the door.
APB Mode
For a description of each option, see Anti-Passback Modes on page 69.
Specifies the number of seconds before another entry is allowed.
APB Delay
Enter the number of seconds.
Identifies the area the user enters when passing through the door. If no area is specified, any
location is valid.
Into Area
Select the area from the drop down list. Only those areas currently defined for this system appear
in this list.
Identifies the area the user moves into when exiting the door.
Out of area
Select the area from the drop down list.
Defines when a door should unlock. Specifies if the strike is deactivated when the door is
opened, when the door is closed, or when the strike timer expires.
Select the strike mode from the drop down list.
Strike Mode
Held PreAlarm
l
Cut short when open — the strike is deactivated on open
l
Turn off on close — the strike is deactivated on close.
l
Full strike time — the strike is deactivated when the timer expires.
Specifies the number of seconds before the held open alarm is generated. Once the number of
seconds is reached, a transaction will be generated which can be used to activate a warning
signal.
Doors - HID® Operations page
95
Feature
Description
Enter the number of seconds.
Specifies the minimum amount of time the door will be unlocked. Each time the door is unlocked
and open, the door will remain unlocked for the set amount of time. If you hold the door open for
Minimum
Strike Time longer than the set amount of time, the door automatically re-locks when it closes.
Enter the number of seconds. Default setting is 0 seconds.
Specifies the standard number of seconds the strike will be activated.
Standard
Access time Enter the number of seconds. If the door is not opened within this interval, the door is
automatically locked.
Held Open
time
Extended
Access
Specifies the number of seconds before the held open door event is generated.
Enter the number of seconds.
Specifies the strike time for a door configured for persons that require more time to enter through
a door.
Enter the number of seconds.
Extended
Held Open
Time
Card
Formats
Specifies the amount of time before the held open door event is generated for tokens marked
with extended access.
Enter the number of seconds.
Specifies the card formats that are compatible with the reader at the door.
Check the box beside the card formats that apply.
Simple Macros
Select from the drop down list a default macro that is triggered when the following conditions are
met for this door. Currently available macros include:
Type
l
Forced
l
Held
l
Pre-Alarm
Select a schedule from the drop down list.
Schedule
Only schedules that have been defined in the system are listed.
Output
From the drop down list, select an output that is activated by the Type condition.
Click Save Macro to save the settings for this canned macro. If this is a new macro, a new row is
automatically added below.
Commands Click Remove Macro to delete a macro. This button only appears if the macro has been saved in
the system.
For more information, see Adding Simple Macros on page 62.
Click this button to save your changes.
Click this button to discard your changes.
Create New Click this button to generate a PDF report on this door.
Doors - HID® Operations page
96
Feature
Description
Report
Add New
Door
Click this button to add a new door to the system.
Transaction
Click this button to generate a PDF transaction report on this door.
Report
Show
Policy
Click this button to generate a PDF report on the current door policy.
Doors - HID® Hardware page
When you click the Hardware tab at the Door Edit screen, the HID Hardware page is displayed. This page allows
you to connect and edit readers, inputs and outputs to the door.
Feature
Description
Name
The name of the door.
Alt Name
The alternative name of the door.
Location
The location of the door. Appliance
The appliance the door is connected to.
Vendor
The name of the door manufacturer.
Installed
Check this box to indicate the appliance can communicate with the connected device.
Select one or more partitions.
Partitions
Partitions allow you to define who can see or edit items in the system. If you do not select a
partition, anyone with access to the system can edit the item.
Only the partitions that have been defined in the system appear in this list. You can only see the
partitions that you are a member of. If no partitions are defined for this system, this pane is hidden.
Panel
Specifies the panel the door is assigned to.
Specifies the subpanel that is connected to the door.
Subpanel
This option is only displayed if there is a subpanel connected to the selected main panel.
Lock
Number
The number ID for the set of inputs/outputs that are connected from the subpanel to the door.
This option is only displayed if there are inputs or outputs connected to the selected subpanel.
To edit one of the readers, inputs or outputs that are connected to the door, click
hardware item:
beside the
l
If you click
beside the Reader or Alternate Reader, the Reader Edit page is displayed.
l
If you click
beside the Door Position, REX #1 or Rex#2, the Input Edit page is displayed.
l
If you click
beside Strike, the Output Edit page is displayed.
Click this button to save your changes.
Doors - HID® Hardware page
97
Feature
Description
Click this button to discard your changes.
Create New
Click this button to generate a PDF report on this door.
Report
Add New
Door
Click this button to add a new door to the system.
Transaction
Click this button to generate a PDF transaction report on this door.
Report
Show
Policy
Click this button to generate a PDF report on the current door policy.
Doors - HID® Hardware page
98
Doors - HID® Subpanel Reader Edit page
When you click the
icon beside the Reader or Alternate Reader field on the Door Hardware page, the
Reader Edit page is displayed. This page allows you to define the options for this reader.
Feature
Name
Description
Enter the name of this reader.
Alt. name Enter an alternative name for this reader.
Location
Enter a brief description of the location of this reader.
From the drop down option list, select the keypad decode/encryption method you want to use for
this reader. Choose from these options:
Keypad
decode
Wiegand
l
Hughes ID 4-bit
l
Indala
l
MR20 8-bit no tamper
Check this box to indicate that this reader supports the Wiegand standard.
NCI
Check this box to indicate that this reader supports the NCI magstripe standard.
magstripe
Select one or more partitions.
Partitions allow you to define who can see or edit items in the system. If you do not select a
Partitions partition, anyone with access to the system can edit the item.
Only the partitions that have been defined in the system appear in this list. You can only see the
partitions that you are a member of. If no partitions are defined for this system, this pane is hidden.
Click this button to save your changes.
Click this button to discard your changes.
Doors - HID® Subpanel Reader Edit page
99
Doors - HID® Subpanel Input Edit page
When you click the
icon beside the Door Position or REX # field on the Door Hardware page, the Input Edit
page is displayed. This page allows you to define the options for this input.
Feature
Description
Input
The name of the input point.
Installed
Check this box to indicate the appliance can communicate with the connected device.
Address
The read-only address of this point.
Supervision
If resistors are used to monitor the input, select the level of resistance expected to indicate open
or closed.
Debounce1
From the drop down list, select the number of units this input should be allowed to debounce. The
units are listed in milliseconds (ms).
Select the camera from the window that this input activates if it goes into alarm.
Cameras
Only the cameras that have been added to the system are listed.
Select one or more partitions.
Partitions
Partitions allow you to define who can see or edit items in the system. If you do not select a
partition, anyone with access to the system can edit the item.
Only the partitions that have been defined in the system appear in this list. You can only see the
partitions that you are a member of. If no partitions are defined for this system, this pane is hidden.
Click this button to save your changes.
Click this button to discard your changes.
Show
Policy
Click this button to display the policies associated with this input module.
1Due to mechanical properties of a switch, when a switch is closed, there is a period of time in which the
electrical connection "bounces" between open and closed. To a microcontroller, this "bouncing" can be
interpreted as multiple button pushes. To suppress the "bouncing" software is designed to anticipate it. This is
known as "debouncing a switch".
Doors - HID® Subpanel Input Edit page
100
Doors - HID® Subpanel Output Edit page
When you click the
icon beside the Strike field on the Door Hardware page, the Output Edit page is
displayed. This page allows you to define the options for this output.
NOTE: HID® output panels do not have an operating mode option because they are automatically energized
when active. You can set the panels to be "not energized when active" if wired in reverse.
Feature
Description
Output
The name of this output point.
Installed
Check this box to indicate the appliance can communicate with the connected device.
Address
The read-only address for this output point.
Select one or more partitions.
Partitions allow you to define who can see or edit items in the system. If you do not select a
Partitions partition, anyone with access to the system can edit the item.
Only the partitions that have been defined in the system appear in this list. You can only see the
partitions that you are a member of. If no partitions are defined for this system, this pane is hidden.
Click this button to save your changes.
Click this button to discard your changes.
Show
Policy
Click this button to display the policies associated with this output module.
Doors - HID® Cameras page
When you click the Cameras tab on the Door Edit screen, the HID Camera page is displayed. From this page,
you can assign specific cameras to record video of the selected door.
Feature
Description
Name
The name of the door.
Alt Name
The alternative name of the door.
Location
The location of the door.
Appliance
The appliance the door is connected to.
Vendor
The name of the door manufacturer.
Installed
Check this box to indicate the appliance can communicate with the connected device.
Select one or more partitions.
Partitions
Partitions allow you to define who can see or edit items in the system. If you do not select a
partition, anyone with access to the system can edit the item.
Only the partitions that have been defined in the system appear in this list. You can only see the
partitions that you are a member of. If no partitions are defined for this system, this pane is hidden.
Panel
Specifies the panel the door is assigned to. This is a display only field when editing the hardware
Doors - HID® Subpanel Output Edit page
101
Feature
Description
(the panel can be changed when editing the door operations).
Subpanel
Specifies the subpanel that is connected to the door. Only subpanels that are connected to the
panel are listed.
Lock
Number
Specifies the number ID for the set of inputs/ outputs that are connected from the subpanel to the
door.
Select the external system that is connected to the camera.
The Available window is populated with those cameras that fit this definition.
Camera
Type
Click the Camera button beside this field to view live video from the camera. For more
information on the video viewer window, see Live Video Window on page 120.
The window displays a list of cameras that have been configured in the system.
Available
To connect a camera to the door, select the camera from the Available list, then click
move it to the Members list.
to
The window displays a list of cameras that are currently connected to the door.
To disconnect a camera from the door, select the camera from the Members list, then click
Members
to move it to the Available list.
If you have more than 10 cameras, the Search feature may be displayed to help you find the
cameras you need.
Search
In the Search field, enter the name of the camera you want to find, then click Filter. You can
narrow your search by selecting the Case-sensitive option. Click Clear to restore the full list of
available cameras.
Click this button to save your changes.
Click this button to discard your changes.
Create New
Click this button to generate a PDF report on this door.
Report
Add New
Door
Click this button to add a new door.
Transaction
Click this button to generate a PDF transaction report on this door.
Report
Show
Policy
Click this link to view a PDF report indicating the current policy associated with this door.
Doors - HID® Events page
When you click the Events tab from the Door Edit screen, the HID Events page is displayed. This page lists all
the local and global events that can be triggered by this door.
The Local Events table is only listed when there are local events configured for the door.
Feature
Description
Local Events
Doors - HID® Events page
102
Feature
Description
This table is only displayed if there are local events for the device.
The name of this event.
Name
Click the name to edit the local event.
Event
The event type.
Source Type
The source of this event.
Has On/Off
Indicates if this event possesses a toggle or on/off characteristic. Yes or No.
Masked
Indicates if this event is masked. Yes (
) or No (
).
Click the icon to change the status.
Logged
Indicates if this event is logged. Yes (
) or No (
).
Click the icon to change the status.
Show Video
Indicates if there is video associated with this event. Yes (
) or No (
).
Click the icon to change the status.
Click this button to delete the local event.
Global Events
This table displays all the global events that are related to this type of device.
Name
The name of this event.
Event
The event type.
Source Type
the source of this event.
Has On/Off
Indicates if this event possesses a toggle or on/off characteristic. Yes or No.
Masked
Indicates if this event is masked. Yes or No.
Logged
Indicates if this event is logged. Yes or No.
Show Video
Indicates if there is video associated with this event. Yes or No.
Create Local
Click this button to create a version of this global event that only applies to the
specific device.
Doors - HID® Events page
103
Doors - Creating Local Events for HID® Doors
When you click the Create Local button from the Door Events page, the local version of the Event page is
displayed. This page is a copy of the global event that can be customized as a local event for this specific door.
NOTE: Changes on this page do not affect the global event.
Make any changes as required.
Feature
Description
Name
The name of the event.
Return
Name
The name used to identify that this event is over, or the return-to-normal (RTN1) name of this
event.
The event type.
Event Type
Only events types that have been defined in the system appear in the drop down list.
Source
Type
Priority
The device that is the source of the event.
Specify the priority of this event. The Alarm Monitor displays alarms according to their priority.
Priority 1 is the highest priority and is always displayed at the top.
The priority range is 1 - 999.
Alarm
Sound
Select an alarm sound that is played when a new alarm occurs while you are monitoring the
Alarms page.
Suppress
Time
Select a schedule when alarm events are not reported.
Only schedules that have been defined in the system are listed.
Enter any instructions that may be required for handling this event.
Instructions
The instructions are made available to the user on the Monitor screen.
Return
Event
Select an event type for the RTN event.
Return
Priority
Enter the priority number for the RTN event.
Has on/off
Check this box to indicate that this event is a toggle, involving an on/off switch logic.
Masked
Check this box to indicate that this a masked event.
The priority range is 1 - 999.
Check this box to log the event.
Logged
Note that if Event Type logging is turned on, then all Events of that Event Type are logged,
regardless of their individual logging configuration. If Event Type logging is turned off, then the
logging configuration of the specific Events of that Event type are adhered to.
Show Video Check this box to auto-launch video from the linked camera feed when the event occurs.
1Return to normal. This is normally associated with an event that effectively cancels an original event. For
example, a door open too long event is canceled by a door closed RTN.
Doors - Creating Local Events for HID® Doors
104
Feature
Description
This feature only works if video is enabled.
Check this box to specify that two people are required to acknowledge and clear this event.
Two Person If this box is checked then the operator that executes the Clear cannot be the same operator that
Required
executes the Acknowledge.
To Clear
If the same operator attempts to clear the alarm, then nothing will happen.
Enter the email address of all the people who should be notified when this event occurs.
Email
You can enter more than one email address separated by a comma.
Roles:
A list of all the roles that are available to you in the system.
To allow specific role to have access to view or edit this event, select a role from the Available
Available
list then click
to add the role to the Member list.
To move one or more roles to the Members window, click to select one role then Ctrl + click to
select a non-consecutive group of roles, or Shift + click to select a consecutive roles.
A list of all the roles that are able to view or edit this event.
Members
If this event is associated with at least one role, then any user who does not have the selected
roles will not be able to view or edit the event.
Click this button to save your changes.
Click this button to discard your changes.
Doors - HID® Access page
When you click the Access tab on the Door Edit screen, the HID Access page is displayed. This page provides a
list of the access groups, roles and identities that have permission to edit or use this door.
Feature
Access
Group
Description
The name of this access group. Click this link to edit the access group.
Lists the roles this access group is a member of.
Roles
Click the + or - symbol beside each role to show or hide the identities that are in the access group
through the role.
Identities
Lists the users who are members of the access group.
Doors - HID® Transactions page
When you click the Transactions tab on the Door Edit screen, the HID Transaction page is displayed.
This page allows you to review events and alarms that have occurred at this door. The table displays the
following information about each event:
Doors - HID® Access page
105
Feature
Description
Panel Date
The date and time when the event occurred.
Priority
The priority of the event. The highest priority is 1 and the lowest priority is 999.
Event
The name of the event.
Last Name
The last name of the person who generated the event.
First Name
The first name of the person who generated the event.
Card Number The internal token number assigned to the person who generated the event.
Message
This displays any messages that may be associated with the event.
Doors - Mercury Security Edit screen
When you specify Mercury Security as the vendor for a door, the door options change to show what is
supported by that manufacturer.
Doors - Mercury Security Parameters page
When you click the Parameters tab on the Door Edit screen, the Mercury Security Parameters page is displayed.
This page allows you to define the door connections, door mode, schedule and processing attributes.
NOTE: Some of the listed fields may not be displayed if it is not supported by the door module.
Feature
Description
Name
The name of the door.
Alt Name
The alternative name of the door.
Location
The location of the door.
Appliance
The appliance the door is connected to.
Vendor
The name of the door manufacturer.
Installed
Check this box to indicate the appliance can communicate with the connected device.
Partitions
Select one or more partitions.
Partitions allow you to define who can see or edit items in the system. If you do not select a
partition, anyone with access to the system can edit the item.
Only the partitions that have been defined in the system appear in this list. You can only see the
partitions that you are a member of. If no partitions are defined for this system, this pane is
hidden.
Panel
Specifies the panel the door is assigned to.
After you make your selection, new options may be displayed to define how the door is
connected to the panel.
Subpanel
Specifies the subpanel that is connected to the door.
This option is only displayed if there is a subpanel connected to the selected main panel.
Lock Number Enter the ID programmed for the lock. For all locks except SimonsVoss, select the number from
or
the drop-down list. For SimonsVoss wireless locks, enter the hexadecimal address assigned by
Door
the SmartIntego Tool.
Number
Doors - Mercury Security Edit screen
106
Feature
Description
Access Type Select the Access Type from the drop down list.
Tip: If the access type is a paired door (paired master or paired slave), the Door Add page redisplays with the additional field, Paired Door. Select the Paired Door option from the drop
down list.
Door Mode
The entry mode for the door when the door controller is online and communicating with the
panel.
Select a Door Mode option from the drop down list.
Offline Mode The entry mode used for the door if the door controller is no longer communicating with the
panel.
NOTE: In many cases readers in offline mode require a very simple solution for entry or exit
because of the memory limitations. The recommended Offline Mode option is Facility code
only.
Select the Offline Mode option from the drop down list.
Lock
Function
Select how the interior lock button will function.
l
l
l
l
Privacy — When you press the interior lock button, the door will lock and the exterior lock
will not grant access to any token. To unlock, you must press the interior lock button
again or exit the room.
Apartment — When you press the interior lock button, the door will lock but any valid
token will open the door. The door must be manually locked or it will stay unlocked.
Classroom — Classroom/Storeroom. The lockset is normally secure. The inside lever
always allows free egress. Valid toggle credentials (i.e. a valid card that is swiped twice
within five seconds) on the exterior may be used to change to a passage or secured
status. Not to be used on mortise deadbolt. Interior push button not to be used.
Office — The lockset is normally secure. The inside lever always allows free egress. An
interior push-button on the inside housing may be used to select a passage or secured
status. Meets the need for lockdown function for safety and security. Valid toggle
credentials (i.e. a valid card that is swiped twice within five seconds) on the exterior may
also be used to change status. Not to be used on mortise deadbolt.
There is a Restore door action available on the Hardware Status page or Door Listing page
which resets the door's configuration values to their default value. If the door is in any mode
(Classroom, Office, Privacy, or Apartment) it will be 'restored' to the opposite status (e.g. if the
door is in Privacy mode then it is locked - if the Restore option is selected then the door will
return to its default mode, which is the mode set in the base configuration for the door).
Custom
Mode
Select any additional door mode the door must support outside the Door Mode and Offline
Mode options.
Custom
Schedule
Define when the Custom Mode would be active.
Select a schedule from the drop down list.
Only schedules that have been defined in the system are listed.
Mask Forced Define when Door Forced Open alarms from this door will be masked.
Schedule
Select a schedule from the drop down list.
Doors - Mercury Security Parameters page
107
Feature
Description
Only schedules that have been defined in the system are listed.
Mask Held
Schedule
Define when Door Held Open alarms from this door will be masked.
Select a schedule from the drop down list.
Only schedules that have been defined in the system are listed.
Always Mask Check this box to specify that Door Forced Open alarms at this door are always masked.
Forced
Normally, this box is unchecked.
Always Mask Check this box to specify that Door Held Open alarms at this door are always masked.
Held
Normally, this box is unchecked.
Door Processing Attributes
Log Grants
Right Away
When this box is checked, the system logs an extra event as soon as there is a grant (that is,
before entry / no entry is determined). This event is not turned into a Access Control Manager
event. Check this box in order to initiate local I/O in the panel using the panel triggers.
Certain customers may have a trigger they want to fire (to execute a macro) as soon as there is a
grant but before entry / no entry is determined.
Deny Duress Check this box to deny access to a user that indicates duress at a door.
Don't Pulse
Door Strike
on REX
Check this box to disable the pulse of the door strike output when the request-to-exit button is
pressed and can be used for a 'quiet' exit.
If this box is not checked, the output is pulsed.
Require Two Check this box to specify that two tokens are required to open this door. This enforces twoCard Control person rule at a specified door.
Door Forced Check this box to enable the filter feature for door forced alarms.
Filter
There are instances when a door is either slow to close or is slammed shut and bounces open
for a few seconds. With this filter, the monitor allows three seconds for a door to close before
issuing an alarm.
Log All
Access as
Used
Check this box to log all access grant transactions as if the person used the door. If this box is
not checked, the door determines if it was opened and will distinguish if the door was used or
not used for grant.
Detailed
Events
Check this box to display the current position of the door position switch (DPOS) in the Door
State column of the door listing screen. When enabled the column will display “Open” when the
DPOS is in an open state and “Closed” when the DPOS is in a closed state.
NOTE: To properly report the Door State from the Door Position Switch, Detailed Events must
be enabled.
Typically, five to ten detailed transactions will be generated for each grant transactions. During
the normal course of operation, most guards don't need to see extensive reports on events;
however, after hours, it is often useful to see every detail.
Enable
Check this box to enable cipher mode.
Cipher Mode
Cipher mode allows the operator to enter card number digits at the door’s keypad.
Use Shunt
Check this box to enable the use of a shunt relay for this door.
Doors - Mercury Security Parameters page
108
Feature
Description
Relay
Do Not Log
Rex
Check this box to indicate that return-to-exit transactions do not get logged to the database.
Transactions
Click this button to save your changes.
Click this button to discard your changes.
Create New
Report
Click this button to generate a PDF report on this door.
Add New
Door
Click this button to add a new door.
Transaction
Report
Click this button to generate a PDF transaction report on this door.
Show Policy
Click this button to generate a PDF report on the current door policy.
Click this button to delete this door.
Click OK in the dialog box that displays to confirm the deletion. The door will be deleted and
you will be returned to the Doors Listing page.
Mercury Security Operations page
When you click the Operations tab on the Door Edit screen, the Mercury Operations page is displayed. This
page allows you to edit how the door operates, including the door mode, anti-passback and strike modes.
NOTE: Some of the listed fields may not be displayed if it is not supported by the door module.
Feature
Description
Name
The name of the door.
Alt Name
The alternative name of the door.
Location
The location of the door.
Appliance
The appliance the door is connected to.
Vendor
The name of the door manufacturer.
Installed
Check this box to indicate the appliance can communicate with the connected device.
Partitions
Select one or more partitions.
Partitions allow you to define who can see or edit items in the system. If you do not select a
partition, anyone with access to the system can edit the item.
Only the partitions that have been defined in the system appear in this list. You can only see the
partitions that you are a member of. If no partitions are defined for this system, this pane is hidden.
Panel
Specifies the panel the door is assigned to.
After you make your selection, new options may be displayed to define how the door is
connected to the panel.
Subpanel
Specifies the subpanel that is connected to the door.
This option is only displayed if there is a subpanel connected to the selected main panel.
Mercury Security Operations page
109
Feature
Lock
Number
Description
The number ID for the set of inputs/outputs that are connected from the subpanel to the door.
This option is only displayed if there are inputs or outputs connected to the selected subpanel.
Door
Number
The number that has been assigned to the door module by the wireless lock configuration
device.
APB Mode
Select the Anti-Passback (APB) mode for the door.
For more information on Anti-Passback modes, see Anti-Passback Modes on page 69.
APB Delay
Enter the number of seconds before another APB entry is allowed.
Into Area
Select the area that the user enters by passing through the door.
Only the areas that have been previously configured in the system appear in this list.
Out of area Select the area that the user exits by passing through the door.
Only the areas that have been previously configured in the system appear in this list.
PIN
Timeout
Enter the number of seconds that a user is allowed to enter multiple PIN attempts before
generating “Deny Count Exceeded” event.
NOTE: If the PIN Timeout is set to 10 (seconds) and then the PIN Attempts is set to two, this tells
the system, if there are two bad PIN attempts within 10 seconds then generate a “Deny Count
Exceeded” event.
PIN
Attempts
Enter the number of times a user can attempt to enter a PIN within the allotted PIN Timeout time
frame before an “Deny Count Exceeded” event is generated.
Strike Mode Select the strike mode.
LED Mode
l
Cut short when open — the strike is deactivated when the door opens.
l
Full strike time — the strike is deactivated when the strike timer expires.
l
Turn off on close — the strike is deactivated when the door closes.
Select the LED mode to specify how the reader LEDs are displayed.
For more information on LED modes, see LED Modes for Mercury Security on page 144.
Held PreAlarm
Enter the number of seconds a door can be held open before a pre-alarm is issued.
Instead of generating an alarm, it sends a warning signal to the Access Control Manager host.
Access time
Enter the number of seconds the door remains unlocked after a card has been swiped.
when open
Standard
Enter the number of seconds the door remains unlocked after access has been granted.
Access time
If the door is not opened within this time, it will automatically lock.
Held Open
Time
Enter the number of seconds the door can be held open before a Door Held Open event is
generated.
Extended
Access
Enter the number of seconds the door remains unlocked after access has been granted to token
holders with extended access permissions.
This feature is useful for users that may require more time to enter a door.
Extended
Held Open
Enter the number of seconds the door can be held open for users with extended access
permissions.
Mercury Security Operations page
110
Feature
Description
Time
This feature is useful for users that may require more time to enter a door.
Card
Formats
Select the card formats that are compatible with the reader at the door.
Simple Macros
Type
Schedule
Select a default macro that is triggered when the following conditions are met for this door.
Currently available macros include:
l
Forced
l
Held
l
Pre-Alarm
Define when this macro can be triggered.
Select a schedule from the drop down list.
Only schedules that have been defined in the system are listed.
Op Type
Select an operation type used by this macro.
Output
Select an output that is activated by the 'Type' condition.
Commands Click Save Macro to save the settings for this canned macro. If this is a new macro, a new row is
automatically added below.
Click Remove Macro to delete a macro. This button only appears if the macro has been saved in
the system.
For more information, see Adding Simple Macros on page 62.
Click this button to save your changes.
Click this button to discard your changes.
Create New
Click this button to generate a PDF report on this door.
Report
Add New
Door
Click this button to add a new door.
Transaction
Click this button to generate a PDF transaction report on this door.
Report
Show
Policy
Click this button to generate a PDF report on the current door policy.
Doors - Mercury Security Hardware page
When you click the Hardware tab at the Door Edit screen, the Mercury Hardware page is displayed. This page
allows you to connect and edit readers, inputs and outputs to the door.
NOTE: Some of the listed fields may not be displayed if it is not supported by the door module.
Feature
Description
Name
The name of the door.
Alt Name
The alternative name of the door.
Doors - Mercury Security Hardware page
111
Feature
Description
Location
The location of the door.
Appliance
The appliance the door is connected to.
Vendor
The name of the door manufacturer.
Installed
Check this box to indicate the appliance can communicate with the connected device.
Select one or more partitions.
Partitions
Partitions allow you to define who can see or edit items in the system. If you do not select a
partition, anyone with access to the system can edit the item.
Only the partitions that have been defined in the system appear in this list. You can only see the
partitions that you are a member of. If no partitions are defined for this system, this pane is hidden.
Specifies the panel the door is assigned to.
Panel
After you make your selection, new options may be displayed to define how the door is
connected to the panel.
Specifies the subpanel that is connected to the door.
Subpanel
This option is only displayed if there is a subpanel connected to the selected main panel.
Lock
Number
or
Door
Number
The number programmed for the lock. For all locks except SimonsVoss, this is a decimal number.
For SimonsVoss wireless locks, this is a hexadecimal number.
Unassign
All
Click this button to reset all of the values below and start over.
To edit one of the readers, inputs or outputs that are connected to the door, click
hardware item:
beside the
l
If you click
beside the Reader or Alternate Reader, the Reader Edit page is displayed.
l
If you click
beside the Door Position, REX #1 or Rex#2, the Input Edit page is displayed.
l
If you click
beside Strike, the Output Edit page is displayed.
Elevators
The following options are only listed if the door is an elevator.
Offline
Access
This identifies the floor that this door reader defaults to if communication between the
panel/subpanel and the door's reader goes offline. The door will automatically provide access to
one or more designated floors or doors, with or without card/code entry, if this condition occurs.
Select the elevator access level from the drop down list.
Only the elevator levels that have been defined in the system are listed.
Facility
Access
This identifies the elevator access level that this elevator defaults to if facility code mode is in
effect.
Select the elevator access level you require from the drop down list.
Doors - Mercury Security Hardware page
112
Feature
Description
Only the elevator levels that have been defined in the system are listed.
Custom
Access
This identifies the elevator access level that this elevator defaults to when custom code mode is
in effect.
Select the elevator access level you require from the drop down list.
Only the elevator levels that have been defined in the system are listed.
Elevator
Outputs
Select the output this elevator uses.
Elevator
Inputs
Select the input this elevator uses.
Click this button to save your changes.
Click this button to discard your changes.
Create New
Click this button to generate a PDF report on this door.
Report
Add New
Door
Click this button to add a new door.
Transaction
Click this button to generate a PDF transaction report on this door.
Report
Show
Policy
Click this button to generate a PDF report on the current door policy.
Doors - Mercury Security Hardware page
113
Doors - Mercury Subpanel Reader Edit page
When you click the
icon beside the Reader or Alternate Reader field on the Door Hardware page, the
Reader Edit page is displayed. This page allows you to define the options for this reader.
Feature
Description
Name
Enter the name of this reader.
Alt.name
Enter an alternative name for this reader.
Location
Enter a brief description of the location of this reader.
Select the communication protocol used by the reader. The options include:
l
OSDP
Avigilon recommends using OSDP for readers, controllers and subpanels
communications. OSDP offers support for bi-directional communication, Secure Channel
Protocol (SCP) to encrypt the traffic, and provides additional status values for readers,
improved LED controls, and simpler wiring.
Reader Type
l
F/2F.
l
D1/D0 (Wiegand )
l
CLK+Data (Mag) ( NCI magnetic stripe standard)
l
Custom (Default)
NOTE: Custom enables all options for all reader types. Readers configured with
versions of the ACM software earlier than Release 5.10.4 are assigned this reader type
when the software is upgraded to ensure that the previous settings are retained.
The following options depend on the selected Reader Type and include:
Select the LED drive mode for this reader. The options depend on the reader model and how
it is wired and include:
LED drive
l
None
l
Gen 1 wire
l
Reserved
l
Sep Red/Grn no buzz
l
Dorado 780
l
LCD
l
OSDP
Format by
nibble
Check this box to indicate that this reader supports the format by nibble.
Bidirectional
Check this box to indicate that this reader can reader bidirectionally.
F/2F
Decoding
Check this box to indicate that this reader uses F or F2 decoding.
Inputs on
reader
Check this box to indicate that this reader provides one or more input ports for serial input
arrays.
Doors - Mercury Subpanel Reader Edit page
114
Feature
Description
Select the keypad decode/encryption method that is used by this reader. The options include:
Keypad
decode
l
MR20 8-bit tamper
l
Hughes ID 4-bit
l
Indala
l
MR20 8-bit no tamper
Wiegand
Check this box to indicate that this reader supports the Wiegand standard.
Trim Zero Bit
Check this box to indicate that this reader supports the trim zero bit standard.
Check this box to enable secure OSDP communication between the reader and the controller.
The reader must support SCP and must be in installation mode. The reader will remain offline if
a secure connection cannot be established.
Secure
Channel
Protocol
CAUTION — Do not enable SCP on readers that support OSDPv1, such as the ViRDI biometric
reader, as this will make the reader inoperable. Secure channel is only supported in by
OSDPv2.
Tip: If a reader with secured OSDP communication has to be replaced, it must be replaced with
a reader that supports OSDPv2. Communication between the replacement reader and the
controller must be secured, and the communication between the controller and the other
OSDPv2 readers must be resecured.
Baud Rate
Set the OSDP baud rate. This must be the same for all readers on a single port. Valid values are
9600 (default), 19200, 38000 or 115200. If blank is selected, the system will use default
settings.
NOTE: Mercury controllers first try the setting provided and if that does not work, the controller
will use default settings,
Set the OSDP address. This must be different for each reader on a single port. Valid values are
0 (reader 1 default), 1 (reader 2 default), 2, and 3. If blank is selected, the system will use default
OSDP Address settings.
NOTE: Mercury controllers first try the setting provided and if that does not work, the controller
will use default settings,
NCI magstripe Check this box to indicate that this reader supports the NCI standard for magnetic stripes.
Supervised
Check this box to indicate that this reader is supervised (outfitted with detection devices)
Select one or more partitions.
Partitions
Partitions allow you to define who can see or edit items in the system. If you do not select a
partition, anyone with access to the system can edit the item.
Only the partitions that have been defined in the system appear in this list. You can only see
the partitions that you are a member of. If no partitions are defined for this system, this pane is
hidden.
Click this button to save your changes.
Click this button to discard your changes.
Doors - Mercury Subpanel Reader Edit page
115
Doors - Subpanel Input Edit page
When you click the
icon beside the Door Position or REX # field on the Door Hardware page, the Input Edit
page is displayed. This page allows you to define the options for this input.
Feature
Description
Input
The name of the input point.
Installed
Check this box to indicate the appliance can communicate with the connected device.
Address
The read-only address of this point.
Select the End of Line resistance of this input.
EOL
resistance
Only the EOL resistance that have been defined in the system are listed.
Debounce From the drop down list, select the number of units this input should be allowed to debounce. Each
1
unit is approximately 16 ms.
Set the amount of time that the alarm will stay in alarm after returning to normal.
Hold time For example, if the input point goes into alarm, then restores, it will hold it in that alarm state for 1 to
15 seconds after it returns to normal before reporting the normal state.
Select the camera from the window that this input activates if it goes into alarm.
Cameras
Only those cameras previously defined for this system appear in this window.
Select one or more partitions.
Partitions allow you to define who can see or edit items in the system. If you do not select a
Partitions partition, anyone with access to the system can edit the item.
Only the partitions that have been defined in the system appear in this list. You can only see the
partitions that you are a member of. If no partitions are defined for this system, this pane is hidden.
Click this button to save your changes.
Click this button to discard your changes.
Show
Policy
Click this button to display the policies associated with this input module.
1Due to mechanical properties of a switch, when a switch is closed, there is a period of time in which the
electrical connection "bounces" between open and closed. To a microcontroller, this "bouncing" can be
interpreted as multiple button pushes. To suppress the "bouncing" software is designed to anticipate it. This is
known as "debouncing a switch".
Doors - Subpanel Input Edit page
116
Doors - Subpanel Output Edit page
When you click the
icon beside the Strike field on the Door Hardware page, the Output Edit page is
displayed. This page allows you to define the options for this output.
Feature
Description
Output
Enter a name for this output.
Installed
Check this box to indicate the appliance can communicate with the connected device.
Address
The read-only address for this output point.
Select how the panel knows when the output point is active.
Operating
Mode
l
l
Energized When Active – a current is expected to pass through the output point when it is
active.
Not Energized When Active – a current expected to pass through the output point when it is
inactive.
Select one or more partitions.
Partitions allow you to define who can see or edit items in the system. If you do not select a
Partitions partition, anyone with access to the system can edit the item.
Only the partitions that have been defined in the system appear in this list. You can only see the
partitions that you are a member of. If no partitions are defined for this system, this pane is hidden.
Click this button to save your changes.
Click this button to discard your changes.
Show
Policy
Click this button to display the policies associated with this output point.
Doors - Mercury Security Elev page
When you click the Elev tab at the Door Edit screen, the Mercury Security Elev page is displayed. This page
allows you to view elevator door details.
Feature
Description
Name
Name of the elevator door. If you click on the name it links back to the Door Edit Parameters page.
Inputs
List of inputs for the related elevator input module.
Outputs List of outputs for the related elevator output module.
Doors - Mercury Security Cameras page
When you click the Cameras tab on the Door Edit screen, the Mercury Camera page is displayed. From this
page, you can assign specific cameras to record video of the selected door.
NOTE: Some of the listed fields may not be displayed if it is not supported by the door module.
Doors - Subpanel Output Edit page
117
Feature
Description
Name
The name of the door.
Alt Name
The alternative name of the door.
Location
The location of the door.
Appliance
The appliance the door is connected to.
Vendor
The name of the door manufacturer.
Installed
Check this box to indicate the appliance can communicate with the connected device.
Select one or more partitions.
Partitions
Partitions allow you to define who can see or edit items in the system. If you do not select a
partition, anyone with access to the system can edit the item.
Only the partitions that have been defined in the system appear in this list. You can only see the
partitions that you are a member of. If no partitions are defined for this system, this pane is hidden.
Specifies the panel the door is assigned to.
Panel
After you make your selection, new options may be displayed to define how the door is
connected to the panel.
Specifies the subpanel that is connected to the door.
Subpanel
This option is only displayed if there is a subpanel connected to the selected main panel.
Lock
Number
Enter the number ID for the set of inputs/outputs that are connected from the subpanel to the
door.
This option is only displayed if there are inputs or outputs connected to the selected subpanel.
Door
Number
The number that has been assigned to the door module by the wireless lock configuration
device.
Select the external system that is connected to the camera.
Camera
Type
The Available window is populated with those cameras that fit this definition.
Click the Camera button beside this field to view live video from the camera. For more
information on the video viewer window, see Live Video Window on page 120.
This window displays a list of cameras that have been configured in the system.
Available
To connect a camera to the door, select the camera from the Available list, then click
move it to the Members list.
to
The window displays a list of cameras that are currently connected to the door.
Members
To disconnect a camera from the door, select the camera from the Members list, then click
to move it to the Available list.
If you have more than 10 cameras, the Search feature may be displayed to help you find the
cameras you need.
Search
In the Search field, enter the name of the camera you want to find, then click Filter. You can
narrow your search by selecting the Case-sensitive option. Click Clear to restore the full list of
available cameras.
Doors - Mercury Security Cameras page
118
Feature
Description
Click this button to save your changes.
Click this button to discard your changes.
Create New
Click this button to generate a PDF report on this door.
Report
Add New
Door
Click this button to add a new door.
Transaction
Click this button to generate a PDF transaction report on this door.
Report
Show
Policy
Click this link to view a PDF report indicating the current policy associated with this door.
Doors - Mercury Security Cameras page
119
Live Video Window
When you click the Camera button from the Cameras page, the Live Video Window is displayed.
NOTE: The window may look different and have different controls depending on the external camera system
that is connected to the Access Control Manager system.
Typically, the Live Video window will include the following elements:
Feature
Description
This area includes all the features that you would need to view and control the related
Camera Controls camera video.
1
Tool Bar
Options typically include switching from live to recorded video, PTZ controls for PTZ
cameras, and changing the video display layout.
This area lists all the cameras that are linked to the event.
2 Camera List
Click the name of a camera to display the video. Use one of the multi-video layouts to
display more than one camera at a time.
This area displays the video stream from the connected cameras.
3 Image Panel
In the top-right corner, you can minimize and maximize the display or close the video.
Doors - Mercury Security Interlocks page
When you click the Interlocks tab on the Door Edit screen, the Mercury Interlocks page is displayed. This page
lists all the Interlocks that have been added to the system.
Feature
Interlocks
Live Video Window
Description
The name of the interlock.
120
Feature
Description
Click the name to edit the interlock.
Enabled
This field indicates if the interlock is enabled. Select either Yes or No.
Schedule
This field indicates what schedule is used to define when the interlock is active.
Delete
Click
Add New Interlock
Click this button to add a new interlock to the system.
Doors - Mercury Security Interlocks page
to delete this interlock from the list.
121
Interlocks - Add page
When you click Add New Interlock from the Interlocks Listing page, the Interlocks Add page is displayed.
Depending on what settings you choose, some of the listed options may not be displayed.
Feature
Description
Identifies the interlock. Name
Enter a unique name for the interlock.
Enabled
Check this box to specify that the interlock is enabled and active.
Select a schedule from the drop down list.
Schedule
Only schedules that have been defined in the system are listed.
Source
Type
Identifies the source type of the interlock.
Select the source type from the drop down list.
Identifies the source of the interlock.
Source
Select the source from the drop down list. Options in this drop down list will vary depending on the
source type specified.
Identifies the event type the interlock is associated with.
Event
Type
Select the Event Type from the drop down list. The options change to match the selected source
option.
Only those Event Types currently defined by the system appear in this list.
Select the event that will trigger the interlock.
Event
Events appearing in this list vary depending on the event and source specified. For more on this,
refer to Event Types - Introduction.
Interlocks with:
Type
Select the type of component that triggers this interlock.
Subpanel If applicable, select from the drop down list the subpanel where this interlock is triggered.
Target
From the drop down list, select the target that is triggered by this interlock.
Command to run:
This identifies the command script to be run.
Command Select an existing command from the drop down list.
Only those commands previously defined by the system appear in this list.
Function
If applicable, select from the drop down list the function to be run.
If the command requires an argument, enter the required argument in this text box.
Arg Text
This option is not displayed if an argument is not required.
Click this button to save your changes.
Click this button to discard your changes.
Interlocks - Add page
122
Interlocks - Door Edit page
When you click the name of an interlock from the Interlocks Listing page, the Interlock Edit page for the door is
displayed.
Feature
Description
Identifies the interlock. Name
Enter a unique name for the interlock.
Enabled
Check this box to specify that the interlock is enabled and active.
Select a schedule from the drop down list.
Schedule
Only schedules that have been defined in the system are listed.
Source
Type
Identifies the source type of the interlock.
Select the source type from the drop down list.
Identifies the source of the interlock.
Source
Select the source from the drop down list. Options in this drop down list will vary depending on the
source type specified.
Identifies the event type the interlock is associated with.
Event
Type
Select the Event Type from the drop down list. The options change to match the selected source
option.
Only those Event Types currently defined by the system appear in this list.
Select the event that will trigger the interlock.
Event
Events appearing in this list vary depending on the event and source specified. For more on this,
refer to Event Types - Introduction.
Interlocks with:
Type
Select the type of component that triggers this interlock.
Subpanel If applicable, select from the drop down list the subpanel where this interlock is triggered.
Target
From the drop down list, select the target that is triggered by this interlock.
Command to run:
This identifies the command script to be run.
Command Select an existing command from the drop down list.
Only those commands previously defined by the system appear in this list.
Function
If applicable, select from the drop down list the function to be run.
If the command requires an argument, enter the required argument in this text box.
Arg Text
This option is not displayed if an argument is not required.
Click this button to save your changes.
Click this button to discard your changes.
Interlocks - Door Edit page
123
Doors - Mercury Security Events page
When you click the Events tab from the Mercury edit screen, the Mercury Security Events page is displayed.
This page lists all the local and global events that can be triggered by this door.
The Local Events table is only listed when there are local events configured for the door.
Feature
Description
Local Events
This table is only displayed if there are local events for the device.
The name of this event.
Name
Click the name to edit the local event.
Event
The event type.
Source Type
The source of this event.
Has On/Off
Indicates if this event possesses a toggle or on/off characteristic. Yes or No.
Masked
Indicates if this event is masked. Yes (
) or No (
).
Click the icon to change the status.
Logged
Indicates if this event is logged. Yes (
) or No (
).
Click the icon to change the status.
Show Video
Indicates if there is video associated with this event. Yes (
) or No (
).
Click the icon to change the status.
Click this button to delete the local event.
Global Events
This table displays all the global events that are related to this type of device.
Name
The name of this event.
Event
The event type.
Source Type
the source of this event.
Has On/Off
Indicates if this event possesses a toggle or on/off characteristic. Yes or No.
Masked
Indicates if this event is masked. Yes or No.
Logged
Indicates if this event is logged. Yes or No.
Show Video
Indicates if there is video associated with this event. Yes or No.
Create Local
Click this button to create a version of this global event that only applies to the
specific device.
Doors - Mercury Security Events page
124
Doors - Creating Local Events for Mercury Security
Doors
When you click the Create Local button from the Door Events page, the local version of the Event page is
displayed. This page is a copy of the global event that can be customized as a local event for this specific door.
NOTE: Changes on this page do not affect the global event.
Make any changes as required.
Feature
Description
Name
The name of the event.
Return
Name
The name used to identify that this event is over, or the return-to-normal (RTN1) name of this
event.
The event type.
Event Type
Only events types that have been defined in the system appear in the drop down list.
Source
Type
Priority
The device that is the source of the event.
Specify the priority of this event. The Alarm Monitor displays alarms according to their priority.
Priority 1 is the highest priority and is always displayed at the top.
The priority range is 1 - 999.
Alarm
Sound
Select an alarm sound that is played when a new alarm occurs while you are monitoring the
Alarms page.
Suppress
Time
Select a schedule when alarm events are not reported.
Only schedules that have been defined in the system are listed.
Enter any instructions that may be required for handling this event.
Instructions
The instructions are made available to the user on the Monitor screen.
Return
Event
Select an event type for the RTN event.
Return
Priority
Enter the priority number for the RTN event.
Has on/off
Check this box to indicate that this event is a toggle, involving an on/off switch logic.
Masked
Check this box to indicate that this a masked event.
The priority range is 1 - 999.
Check this box to log the event.
Logged
Note that if Event Type logging is turned on, then all Events of that Event Type are logged,
regardless of their individual logging configuration. If Event Type logging is turned off, then the
logging configuration of the specific Events of that Event type are adhered to.
1Return to normal. This is normally associated with an event that effectively cancels an original event. For
example, a door open too long event is canceled by a door closed RTN.
Doors - Creating Local Events for Mercury Security Doors
125
Feature
Description
Check this box to auto-launch video from the linked camera feed when the event occurs.
Show Video
This feature only works if video is enabled.
Check this box to specify that two people are required to acknowledge and clear this event.
Two Person If this box is checked then the operator that executes the Clear cannot be the same operator that
Required
executes the Acknowledge.
To Clear
If the same operator attempts to clear the alarm, then nothing will happen.
Enter the email address of all the people who should be notified when this event occurs.
Email
You can enter more than one email address separated by a comma.
Roles:
A list of all the roles that are available to you in the system.
To allow specific role to have access to view or edit this event, select a role from the Available
Available
list then click
to add the role to the Member list.
To move one or more roles to the Members window, click to select one role then Ctrl + click to
select a non-consecutive group of roles, or Shift + click to select a consecutive roles.
A list of all the roles that are able to view or edit this event.
Members
If this event is associated with at least one role, then any user who does not have the selected
roles will not be able to view or edit the event.
Click this button to save your changes.
Click this button to discard your changes.
Doors - Mercury Security Access page
When you click the Access tab on the Mercury Edit screen, the Mercury Access page is displayed. This page
provides a list of the access groups, roles and identities that have permission to edit or use this door.
Feature
Access
Group
Description
The name of this access group. Click this link to edit the access group.
Lists the roles this access group is a member of.
Roles
Click the + or - symbol beside each role to show or hide the identities that are in the access group
through the role.
Identities
Lists the users who are members of the access group.
Doors - Mercury Security Transactions page
When you click the Transactions tab on the Door Edit screen, the Mercury Transaction page is displayed.
This page allows you to review events and alarms that have occurred at this door. The table displays the
following information about each event:
Doors - Mercury Security Access page
126
Feature
Description
Panel Date
The date and time when the event occurred.
Priority
The priority of the event. The highest priority is 1 and the lowest priority is 999.
Event
The name of the event.
Last Name
The last name of the person who generated the event.
First Name
The first name of the person who generated the event.
Card Number The internal token number assigned to the person who generated the event.
Message
This displays any messages that may be associated with the event.
Doors - Access page
The door access page is found on every version of the door. The access page for each manufacturer is:
l
Doors - Mercury Security Door Access
l
Doors - HID VertX® Access
Configuring Panels
Panels are controllers that connect one or more door controllers (subpanels) and their associated readers to the
appliance. Through an Ethernet cable or encrypted wireless connection, panels send information about the
state of the doors back to the appliance.
Searching for Panels
If you have many panels in your system, you can choose to search for the panel you want to see or edit.
1. From the Panels Listing page, enter a panel name in the Criteria field.
2. If you have more than one appliance in your system, select the appliance the panel is connected to in the
Appliance drop down list.
3. If you have sorted your panels into groups, select the group containing the panel in the Groups
4. From the Installed drop down list, you can select Yes or No to indicate if the panel is installed and able to
communicate with the appliance.
5. Click Search.
The Panel Listing page filters the panels and displays the ones that meet your search criteria.
Adding Panels
Panels connect door controllers and their readers to the appliance. Adding a panel to the ACM system allows
the appliance to gather information on the connected doors.
To add a panel to the system:
Doors - Access page
127
1. Select Physical Access > Panels.
The Panels Listing page is displayed.
2. Click Add New Panel.
The Panel Add page is displayed.
3. Complete the Vendor and Model fields. Depending on the selected Vendor and Model, different options
are displayed.
4. When you're finished, click
to save your changes.
The Properties screen for this specific panel expands to display the complete list of available properties.
Depending on the vendor and model that was selected, a specific set of tab options are displayed.
Adding HID VertX® Panels
If you selected HID® as the panel vendor in the Panel Add page, complete the following procedure:
1. After you save the new panel, the Subpanels: Batch Add page is displayed.
2. Select the number of each subpanel model that is installed at each port then click
.
The HID Panel Configure page is displayed.
3. Select the Host tab.
4. Enter the IP address for this panel.
5. Click
to save your changes.
Adding Mercury Security Panels
If you selected Mercury Security as the panel vendor in the Panel Add page, complete the following procedure:
1. After you save the new panel, the Subpanels: Batch Add page is displayed.
NOTE: The listed subpanel models will be different depending on the Mercury panel model that was
selected on initial Panel Add page.
2. Select the number of subpanel models that are installed.
3. Click
.
The Mercury Security Panel Edit page is displayed.
4. Select the Host tab.
5. Enter the IP address for this panel.
6. Click
to save your changes.
Configuring the Mercury Security MS Bridge Solution
To use the Mercury Security MS Bridge controllers and subpanels, you must have at least the following
connected to the system:
Adding HID VertX® Panels
128
l
Mercury MS-ICS panel with downstream support.
l
MercuryMS-ACSsubpanelthatiswiredtotheMercurypanel.
1. Add a Mercury MS-ICS panel to the Access Control Manager system.
For more information, see Adding Panels on page 127.
2. Add all required subpanels (the maximum number of subpanels is 32) to the panel created in the previous
step using the Batch Add option.
For more information, see Adding Mercury Security Panels on the previous page.
NOTE: Add at least one MS-ACS (maximum two) as a subpanel.
NOTE: You can add any Mercury panels that use the same protocol.
3. After all subpanels have been added to the system, select the Subpanels tab and click in the Installed
column of the displayed table for each subpanel so that a
displays.
4. Create the related doors. Ensure that for each door you select the corresponding Mercury panel and
subpanel.
For more information, see Adding Doors on page 61.
5. Customize the door settings to meet your system requirements and save your changes.
Editing Panels
To edit an existing panel, select the type of panels that you have installed.
Editing HID VertX® Panels
To edit an existing HID® panel:
1. On the Panels Listing page, select the panel you want to edit.
The HID Panel Status page is displayed.
2. If necessary, download configuration data, user data, or updated firmware to this panel.
3. Navigate the tabs on the screen to make the required changes.
l
Configure – select this tab to change the panel properties.
l
Host – select this tab to change the panel's network address.
l
Subpanels – select this tab to configure the subpanels that are connected to the panel.
l
Events – select this tab to review and configure the events that are associated with the panel.
4. Click
at the bottom of each page to save your changes.
Editing Mercury Security Panels
To edit an existing Mercury Security panel:
Editing Panels
129
1. On the Panels Listing page, select the panel you want to edit.
The Mercury Security Panel Status page is displayed.
2. If necessary, download configuration data, user data, or updated firmware to this panel.
3. Select the any tabs on the screen to make the required changes.
l
Configure – select this tab to change the panel properties.
l
Host – select this tab to change the panel's network address.
l
Subpanels – select this tab to configure the subpanels that are connected to the panel.
l
Macros – select this tab to add or configure the macros used to perform system actions.
l
Triggers – select this tab to define what must occur before a macro is called into action.
l
Access Levels – select this tab to review the access levels that have been defined for the panel.
l
Events – select this tab to review and configure the events that are associated with the panel.
4. Click
at the bottom of each page to save your changes.
Resetting Anti-Passback from the Panel
In the event of an emergency, all the people in a building may leave an area at once and arrive at a mustering
area together without using their access card at each door they encounter. This may cause the system to detect
multiple anti-passback conditions.
To avoid granting each individual a free pass, you can reset the anti-passback condition for the panel.
1. On the Panels Listing page, select the panel you want to update.
2. On the Panel Status page, click APB Reset.
A confirmation message is displayed when APB is reset. Cardholders can return to their regular stations and the
system will resume normal operations.
Downloading Parameters
Any changes you make to the panel configuration or related events are automatically downloaded to the panel
daily. However, you can manually download the parameters to immediately activate the updated configurations .
1. On the Panels Listing page, select the panel you want to update.
2. On the Panel Status page, click Parameters.
The application downloads the configured parameters to the panel.
Downloading Tokens
Whenever you add new identities or update door access information in the system, the system automatically
downloads the new details to the panels and doors. However, if the auto-download is unsuccessful, you can
download tokens to the panel manually.
1. On the Panels Listing page, select the panel you want to update.
2. On the Panel Status page, click Tokens.
The tokens are downloaded to the panel.
Resetting Anti-Passback from the Panel
130
Lenel Panel Support
Access Control Manager appliances support Lenel panels but you must configure the Lenel panels as Mercury
Security panels in the system.
The following table shows the equivalent Mercury Security panel for each supported Lenel panel.
Mercury Security
Panel Model
Lenel Panel
Model
SCP-C
LNL-500
SCP-2
LNL-1000
SCP-E
LNL-2000
EP1502
LNL-2220
EP2500
LNL-3300
EP1501
LNL-2210
MR16in
LNL-1100
MR16out
LNL-1200
MR50
LNL-1300
MR52
LNL-1320
For example, you have installed a Lenel LNL-1000 panel. As you complete the procedure to add the new panel,
you would select Mercury Security as the vendor and select the SCP-2 as the model.
Since the SCP-2 and the LNL-1000 use the same parameters, the Access Control Manager appliance can
communicate with the panels in the same way.
Resetting Doors/Subpanels
To reset all the doors that are connected to a specific panel:
1. On the Panels Listing page, select the panel you want to reset.
2. Click the Reset/Download button.
All the subpanels that are connected to the panel are reset and the latest configurations from the Access Control
Manager system are downloaded. Doors connected to this panel are now updated with the most recent
configuration.
Updating Firmware
Panel firmware is downloaded from the panel manufacturer.
1. On the Panels Listing page, select the panel you want to update.
2. On the Panel Status page, click Firmware.
The Firmware Listing page is displayed.
3. Perform any of the following:
Lenel Panel Support
131
l
l
To apply a firmware update that is already available in the system, click
update file.
beside the firmware
To add a new firmware update provided by the panel manufacturer, click Add Firmware.
a. On the following Firmware Upload page, click Choose File then locate the firmware file.
b. Click
to upload the new firmware to the system.
NOTE: If you click
, the Identity Import Type: will be set to Auto and any attached CSV
files will be deleted.
c. On the Firmware Listing page, click
panel.
l
To delete an existing firmware update file, click
confirmation message is displayed, click OK.
beside the new firmware update to apply it to the
beside the firmware file. When the
Updating Panel Time
Each panel typically tells time by synchronizing with a time server (NTP Server) that is accessible on the network.
In the event of an unexpected power or network failure, the panel may be running independently for a while and
will need to be re-synchronized when everything is back online.
NOTE: Not all panels support this feature. This procedure can only be performed if the panel status page
displays the Clock button.
1. On the Panels Listing page, select the panel you want to update.
2. On the Panel Status page, click Clock.
The panel connects and synchronizes with a time server that is accessible on the network.
Deleting Panels
1. From the Panels Listing page, click
for the panel you want to remove.
2. When the confirmation message appears, click OK.
Subpanels
Some panels support hierarchical connections. These panels can be connected in a master-slave relationship
where one panel is the master and all the panels connected to it are slaves. These slave panels, or subpanels,
transmit their data to the Access Control Manager appliance through the master panel.
One master panel can be connected to a large number of specialized subpanels.
Updating Panel Time
132
Adding Subpanels
Subpanels are typically batch added when a panel is first added to the system. For more information, see
Adding Panels on page 127.
If a new subpanel is installed later, you can add the subpanel to the panel on the Panel screen.
NOTE: PIM400, Engage Gateway, and AD300 subpanels share the same protocol and can be connected to the
same port. If you are adding these subpanels you cannot add any other subpanel models to the same port. If
you have already physically wired any other model of subpanel to the same port on the controller panel as well,
you will need to connect the other subpanels to another port or panel.
Adding Subpanels
133
1. Select Physical Access > Panels.
2. Click the name of the panel that the new subpanel is physically connected to.
3. Select the Subpanels tab.
4. Click Add New Subpanel.
5. Complete the details for the new subpanel.
6. Click
to save your changes.
Editing Subpanels
To edit an existing subpanel:
1. Select Physical Access > Panels.
2. Click the name of the panel the subpanel is connected to.
3. Select the Subpanels tab.
4. From the Subpanels Listing page, perform any of the following:
l
To edit the subpanel details, click the subpanel name.
l
To edit the inputs connected to the subpanel, click
l
To edit the outputs connected to the subpanel, click
l
To edit the readers connected to the subpanel, click
for that subpanel.
for that subpanel.
for that subpanel.
5. On the following listing page, select the specific device you want to edit.
6. Make the required changes to the device edit page.
7. Click
to save your changes.
Inputs
Inputs are associated with panels or doors and can include:
l
Motion sensors
l
Door contacts
l
Smoke detectors
l
REX (request to exit) buttons
l
Perimeter and fence alarms
l
Break glass window sensors
l
Crash bars
l
Capacitance duct sensors
l
Device tamper switches
Inputs can be controlled in two ways:
Editing Subpanels
134
l
Masking
l
Unmasking
Masked inputs do not trigger any corresponding outputs.
Unmasked inputs function normally.
The state may change according to several actions, including entry of a proper code or card, or operator
override.
Output Modes
Outputs operate in Operating mode. Operating mode describes how the output behaves during normal
operation.
Operating Mode
By choosing the Operating Mode option when editing an output, you can set one of the following options to
define how the output behaves when it is active:
Feature
Energized When
Active
Description
An electrical current is expected to pass through the output point when it is active.
Not Energized When
An electrical current is expected to pass through the output point when it is not active.
Active
Outputs
Outputs are devices that perform tasks in response to input data. This includes unlocking a door, setting off a fire
alarm, activating an elevator or turning off air conditioning. Output devices include:
l
Strikes
l
Magnetic locks
l
Fire alarms
l
Klaxons
l
Motors of any sort
l
HVAC
In general, these devices are activated by door controllers, panels, or subpanels that use relays to initiate
activation. Output devices can have one of the following states:
l
On (energized)
l
Off (de-energized)
l
Pulse (intermittently on and off)
Locks (in general) and strikes (specifically) come in several varieties that support a locked state that is either
energized or de-energized, with a default state that is either locked or unlocked. This is for safety reasons. In the
case of power outages and emergency shutdowns, many doors must 'fail open', meaning that they unlock
Output Modes
135
whenever the power goes off, allowing people to exit an area. Other doors, such as bank vaults and secured
areas, must 'fail close', meaning that a de-energized state requires the bolt to remain in place. For more on this,
refer to Configuring Doors on page 59 and Configuring Panels on page 127.
Many outputs, such as sliding doors, alarms or warning lights need to be turned on and off. In order to do this,
relays on many panels also provide a pulse feature that energizes the output for a specified amount of time then
de-energizes the output for a specified amount of time.
Doors and other outputs can be activated by the user following a successful card or code entry. Alternatively,
the operator can override normal operation or control the output through the Subpanel Status page.
Deleting Subpanels
To stop a panel from communicating to a subpanel, you can delete it from the system.
1. Select Physical Access > Panels.
2. Click the name of the panel the subpanel is connected to.
3. Select the Subpanels tab.
4. Click
for the subpanel you want to remove from the system.
5. When the confirmation message appears, click OK.
Macros
NOTE: Only Mercury Security panels support macros.
Macros are commands, or sequences of commands, that can control the activity of devices connected to a
door, panel, or group of panels.
Macros can be extremely simple, such as turning out lights or masking an input. Or, they can be sophisticated
multi-step procedures. For example, you can define a macro that closes down the air conditioning system,
unmasks the alarms, locks all the doors connected to a panel, turns out the lights, then emails the operator for
more instructions.
In the Avigilon Access Control Manager application, macros can be activated by:
l
Triggers
l
Interlocks
All doors (not limited to Mercury Security) support simple macros. Simple macros are triggered by a single door
event and activate one output in response. For more information, see Adding Simple Macros on page 62.
Adding Macros
1. Select Physical Access > Panels.
2. Click the name of the panel that you want to add a macro to.
3. On the Macros page, click Add New Macro.
4. On the following Macro Command Listing page, click the Macro link to change the macro name. In the
new text field, enter a new name for the macro then click OK.
5. Click Add New Macro Command.
6. Give the macro command a name.
7. From the Command drop down list, select a macro command.
Deleting Subpanels
136
8. If extra options are displayed after you select a macro command, choose the options you need.
9. From the Group drop down list, select the group you want to assign this macro to.
10. Click
to save your changes.
11. Back at the Macro Command page, repeat the previous steps until you've added all the commands that
are required for this macro.
To apply this macro to a specific situation, see Assigning Macros below.
To create quick macros that are specific to a particular door (simple macros), see Adding Simple Macros on
page 62
Editing Macros
1. Select Physical Access > Panels.
2. Click the name of the panel with the macro you want to edit.
3. On the Macros page, click the name of the macro you want to edit
4. On the following Macro Command Listing page, perform any of the following:
l
To change the macro name, click the Macro name link. Enter a new name then click OK.
l
To add a new macro command, click Add New Macro Command.
l
To edit a macro command, click the command type name.
l
To delete a macro command, click
l
To change the order of the macro commands, click Sort.
for the command.
Deleting Macros
1. Select Physical Access > Panels.
2. Click the name of the panel with the macro you want to delete.
3. On the Macros page, click
for the macro you want to delete.
4. When the confirmation message appears, click OK.
Assigning Macros
NOTE: Only Mercury Security doors and panels support macros.
Once you have created a macro, you can assign them to specific triggers or other macros so that they can
automatically perform a series of actions under the right conditions.
Assigning a Macro to a Trigger
When you add a trigger to a panel, assigning a macro is part of the process. Triggers and macros work together
as a cause and effect pair. When the all the triggering conditions are met, the macro is automatically initiated.
To assign a macro to a trigger:
Editing Macros
137
1. Add a macro. For more information, see Adding Macros on page 136
2. Add a trigger. For more information, see Adding Triggers on the next page
3. In the Trigger Add page, assign the new macro to the trigger.
4. Click
.
Assigning a Macro to a Macro
You can activate a macro as part of a macro command to generate a complex series of actions.
To assign a macro to a macro command:
1. Add a macro. For more information, see Adding Macros on page 136.
2. When you add a new macro command, select Macro Control from the Command drop down list.
3. When the related options are displayed, select the macro you want from the Macro drop down list and
select a specific Command for the macro to perform.
4. When you're finished, click
.
Assigning a Macro to a Door
You can also assign a macro to a specific door by using the Simple Macro feature on the Door Operations page.
For more information, see Adding Simple Macros on page 62 and Mercury Security Operations page on
page 109
Sorting Macros
By default, when you add macro commands, the command actions are activated in the order they are added. If
you need to change the sequence of the macro commands, you can sort it into the order you want.
1. From the panel's Macros page, select the macro you want to sort.
2. On the following Macro Command Listing page, click Sort. This button only appears if you have two or
more macro commands.
Each of the macro commands are highlighted in gray.
3. Click and drag the macro commands into the order you want.
4. Click Return when you are done.
Triggers
NOTE: Only Mercury Security panels support triggers.
Triggers work with macros to generate a set of cause and effect events. Triggers are the specific sequence of
events that must occur before a macro will be activated.
For example, you might define a trigger to be a tamper alarm issued by a specific subpanel. The macro linked to
that trigger will then automatically lock the door associated with that panel and sound the alarm.
Triggers are usually defined through the Triggers page on a specific panel or subpanel properties sheet.
Assigning a Macro to a Macro
138
Adding Triggers
1. Select Physical Access > Panels.
2. Click the name of the panel that you want to add a trigger to.
3. On the Triggers page, click Add New Trigger.
4. Enter all the parameters that are required of the trigger.
5. Click
to save the new trigger.
Editing Triggers
1. Select Physical Access > Panels.
2. Click the name of the panel that your trigger is on.
3. On the Triggers page, click the name of the trigger you want to edit.
4. On the following page, make the required changes.
5. Click
to save your changes.
Deleting Triggers
1. Select Physical Access > Panels.
2. Click the name of the panel that your trigger is on.
3. On the Triggers page, click
for the trigger you want to delete.
4. When you see the confirmation message, click OK.
Areas
Areas are zones that the Access Control Manager system assigns to define a physical area within a secured
location. This area can be relatively small, like a lab or a store room; or large, like a collection of buildings. Areas
often incorporate one or more doors with their attached inputs and outputs. You can define areas to track
cardholder location, for example in a mustering scenario, or to control access to specific areas, for example in an
anti-passback configuration to limit user access within a building or facility.
For example, an anti-passback configuration can be used in a laboratory facility to restrict access to a specific
room.
Adding Triggers
139
The laboratory is divided into Area A and Area B. To secure Area B, only lab personnel who are permitted into
both Area A and B can access the lab in Area B. To allow this, the doors are configured as follows:
l
l
The door between the smaller room in Area A and Area B is configured as Out of Area A/Into Area B. It is
the entry door for Area B.
The door between the larger room in Area A and Area B is configured as Out of Area B/Into Area A. It is
the exit door for Area B.
l
The right-side of the double door when entering Area A is configured as an Into Area A door.
l
The right-side of the double door when exiting Area A is configured as an Out of Area A door.
Lab personnel with permission to enter Area A are admitted through the right side of the double door when they
swipe their entry card on the door reader. The ACM system records they are "Into Area A". Lab personnel with
permission to enter Area A and Area B can then enter Area B at the door between the smaller room in Area A
and Area B when they swipe their entry card on that door's reader. The ACM system records they are "Out of
Area A" and "Into Area B". After they have entered Area B, they can exit from the other door to Area A. The ACM
system records they are "Out of Area B" and "Into Area A". Lab personnel exiting Area A swipe their entry card
on the reader on the right side of the double door. The ACM system records they are "Out of Area A".
Defined areas are added to the Area into area and Area out of area option list on the Doors Operations page.
For more information, see Configuring Doors on page 59.
Areas
140
Areas - Adding
1. Select Physical Access > Areas.
The Areas Listing page is displayed.
2. From the Areas Listing page, click Add New Area.
3. Enter a name for the area.
4. Select the appliance that will maintain the area details.
5. Select the Enable Area check box to activate the new area.
6. Fill in the other options as required.
7. Click
.
The new area is added to the Area Listings page.
Areas - Editing
1. Select Physical Access > Areas.
The Areas Listing page is displayed.
2. Click the name of the area you want to edit.
3. On the following page, make the required changes.
If you want to change the doors that are connected to the area, you must do so from the door's
Operations page.
4. Click
.
Areas - Deleting
1. Select Physical Access > Areas.
The Areas Listing page is displayed.
2. From the Areas Listing page, click
for the area you want to delete.
3. When the browser displays a pop-up message to ask Are you sure?, click OK.
EOL Resistance
End-of-line (EOL) resistance refers to the resistance levels that must be maintained for input points. Input devices
used with doors often measure circuit resistance in ohms. This measurement is used to determine the normal
resistance level. If the resistance drops across the circuit, an alarm is sent back to the Access Control Manager
application.
For example, if resistance for a particular device has been set at 2000 ohms and the circuit's resistance
suddenly drops to 1000 ohm, an alarm is issued by the application.
Adding EOL Resistance for Mercury Input Points
To add an EOL Resistance definition for a Mercury input device:
Areas - Adding
141
1. Select Physical Access > EOL Resistance. Make sure the Mercury tab is selected.
2. From the Mercury EOL Resistance Listing page, click Add-Normal or Add-Advanced.
3. On the following EOL Resistance Add page, enter the required details.
4. Click
to save your changes.
Adding EOL Resistance to HID® Input Points
To add an EOL Resistance definition for an HID® input point:
1. Select Physical Access > EOL Resistance > HID.
The HID Listing page is displayed.
2. From the HID Listing page, click Add.
The EOL Resistance Add page appears.
3. Enter the required details.
4. Click
to save your changes.
Editing EOL Resistance for Mercury Input Points
To edit an EOL Resistance definition for a Mercury input device:
1. Select Physical Access > EOL Resistance. Make sure the Mercury tab is selected.
2. Select the EOL Resistance definition that you want to edit.
3. On the following page, make the required changes.
4. Click
to save your changes.
Editing EOL Resistance for HID® Input Points
To edit an EOL Resistance definition for an HID® input point:
1. Select Physical Access > EOL Resistance > HID.
The HID Listing page is displayed.
2. On the HID Listing page, select the EOL Resistance definition that you want to edit.
3. On the following page, make the required changes.
4. Click
to save your changes.
Mercury Security LED Modes - Listing page
The Mercury LED Modes Listing page lists the available Mercury Security LED modes. To make alterations to any of the available custom LED modes select that mode from the available listed
options to open the mode on the Mercury LED Mode Table <number> page. For more detail, see Editing
Mercury Security LED Modes on the next page.
Adding EOL Resistance to HID® Input Points
142
Before making any changes ensure that the related doors and subpanels are correctly configured and wired,
including:
l
l
Ensure that the LED drive field on the Reader: Edit screen has a valid entry (e.g. Gen 1 wire, Sep Red/Grn
no buz, OSDP).
Ensure that the LED Mode field on the Mercury Security Operations page is set to match the table (1, 2 or
3) that you want to use.
Editing Mercury Security LED Modes
1. Select Physical Access > Mercury LED Modes.
2. Review the table details.
3. For any Door state, any of the following can be updated:
l
To change the color that display when the state becomes active, select the color by clicking
inside the circle of the desired color (e.g.
l
l
) in the On Color column.
To edit the time that the On color will display for, enter the new value in the On Time (1/10s)
column. (The time is in 1/10th second ticks.)
To change the color to display when the door state is not active, select the color by clicking inside
the circle of the desired color (e.g.
) in the Off Color column.
l
To edit the repeat count (where this is possible), enter the new value in the Repeat Count column.
l
To edit the beep count (where this is possible), enter the new value in the Beep Count column.
4. Click
at the bottom of each page to save your changes.
Mercury Security LED Mode Table screen
The Mercury LED Mode Table <number> screen allows you to edit any of the available LED Mode tables.
NOTE: The actual output from the selections below (in terms of colors and beeps) may vary from those selected
depending on panel, reader type and configuration.
For more information on Mercury Security LED Modes, see LED Modes for Mercury Security on the next page.
Feature
Description
LED ID
Unique identifier for the LED state.
State
Door state that you can set a custom LED mode for.
Select the color to display when the door state is active.
On Color
The options are green, amber, red or all off (
desired color to select it (e.g.
On Time (1/10s)
Time
in 1/10th second
). Click inside the circle of the
).
ticks that the On color will display for.
Select the color to display when the door state is not active.
Off Color
The options are green, amber, red or all off (
desired color to select it (e.g.
Off Time (1/10s)
). Click inside the circle of the
).
Time in 1/10th second ticks that the Off color will display for.
Editing Mercury Security LED Modes
143
Feature
Description
Select the number of repeats for the on and off colors.
Repeat Count
NOTE: This will not be editable for some states.
Select the number of beeps to sound when the related state becomes active.
Beep Count
NOTE: This will not be editable for some states.
Click this button to save your changes.
Click this button to discard your changes.
Restore to Default
Click this to restore the selections for all states to the default setting.
LED Modes for Mercury Security
For Mercury Security door controllers, there are three reader LED modes.
The Door mode has function IDs 1 to 8. These are used when the reader is idle. Repeat and beep counts can not
be set for these function IDs.
The Door Processing Attributes have function IDs 11 to 16. These are used when a card or pin is presented at
the reader. Repeat count can be set for function IDs 11 and 12 only. Beep counts cannot be set for any of these
function IDs.
Mercury Security has 3 built-in LED modes. The following tables describe the settings for each mode.
LED
On
Off
On
ID
Color
Color
Time
Default Settings for LED Mode 1
Off
Repeat
Beep
Time
Count
Door Mode or
Count
State of Door
1
Red
Off
29
1
0
0
Disable
2
Green
Off
29
1
0
0
Unlocked
3
Red
Off
29
1
0
0
Exit Only
4
Red
Off
1
29
0
0
Facility Code Only
5
Red
Off
1
29
0
0
Card Only
6
Green
Off
1
29
0
0
PIN Only
7
Red
Off
1
29
0
0
Card and PIN
8
Green
Off
1
29
0
0
Card or PIN
11
Red
Off
2
2
5
3
Deny
12
Green
Off
2
2
7
1
Granted
13
Green
Off
1
14
0
2
User Command
14
Green
Red
1
4
6
2
Require two card control
15
Green
Red
4
1
25
2
Second User PIN
16
Green
Red
1
4
6
2
Wait
LED Modes for Mercury Security
144
LED
On
Off
On
ID
Color
Color
Time
Default Settings for LED Mode 2
Off
Repeat
Beep
Time
Count
Door Mode or
Count
State of Door
1
Red
Off
29
1
0
0
Disable
2
Green
Off
29
1
0
0
Unlocked
3
Red
Off
29
1
0
0
Exit Only
4
Red
Off
24
1
0
0
Facility Code Only
5
Red
Off
24
1
0
0
Card Only
6
Red
Off
24
1
0
0
PIN Only
7
Red
Off
24
1
0
0
Card and PIN
8
Red
Off
24
1
0
0
Card or PIN
11
Red
Off
2
2
5
3
Deny
12
Green
Off
2
2
7
1
Granted
13
Green
Off
1
14
0
2
User Command
14
Green
Red
1
4
6
2
Require two card control
15
Green
Red
4
1
25
2
Second User PIN
16
Green
Red
1
4
6
2
Wait
LED
On
Off
On
ID
Color
Color
Time
Default Settings for LED Mode 3
Off
Repeat
Beep
Time
Count
Door Mode or
Count
State of Door
1
Red
Off
29
1
0
0
Disable
2
Green
Off
29
1
0
0
Unlocked
3
Green
Off
29
1
0
0
Exit Only
4
Green
Off
29
1
0
0
Facility Code Only
5
Green
Off
29
1
0
0
Card Only
6
Green
Off
29
1
0
0
PIN Only
7
Green
Off
29
1
0
0
Card and PIN
8
Green
Off
29
1
0
0
Card or PIN
11
Red
Off
2
2
5
3
Deny
12
Green
Off
2
2
7
1
Granted
13
Green
Off
1
14
0
2
User Command
14
Green
Red
1
4
6
2
Require two card control
15
Green
Red
4
1
25
2
Second User PIN
16
Green
Red
1
4
6
2
Wait
For example, all three LED Modes have the same functionality for access grants, and the LED does not follow
the strike time.
LED Modes for Mercury Security
145
The Reader LED will flash to Green for seven repeat counts of 2.1 second ticks (2/10th seconds) on, 2.1 second
ticks (2/10th seconds) off.
Card Formats
Readers that control access to doors come in many varieties and use many different card protocols. The most
commonly used card formats have been Wiegand and magnetic stripe. However, newer cards that use
embedded chips and proprietary formats have become more popular with the increase of security
requirements.
The Access Control Manager application supports the most popular card formats and enables the qualified
operator to define custom card formats.
Adding Card Formats
1. Select Physical Access > Card Formats.
2. Click Add New Card Format.
3. In the Card Format Add page, enter the required details for the new card format.
4. Click
to save the new card format.
This new card format is now available and can be assigned to doors in the system.
Editing Card Formats
1. Select Physical Access > Card Formats.
2. On the Card Formats Listing page, click the name of the card format that you want to edit.
3. On the Card Format Edit page, make the required changes.
4. Click
to save the new card format.
Deleting Card Formats
1. Select Physical Access > Card Formats.
2. Click
for the card format that you want to delete.
3. When the confirmation message is displayed, click OK.
Events - Introduction
The system will generate events to notify you of issues that may require your attention. Events include
messages and alarms issued by specific devices in the Access Control Manager system.
You cannot create new events but can customize the existing system events to monitor what you are most
concerned about.
Events can be made into an alarm when they are assigned to an alarmed Event Type. For more information, see
Event Types - Introduction on page 200.
Card Formats
146
Events - Searching
The Access Control Manager system provides many events, so it may sometimes be easier to search for the
specific event that you want to customize. For example if you are looking for an event related to failures in the
system, you can search for events containing the word failure.
1. At the top of the Event Listing page, enter the name of the event in the Name field.
Tip: Use any series of letters and numbers to search for the events you want to see.
You can also use the drop down list options to specify that the name of the event Starts With, Equals,
Contains or Ends With your search term.
2. If you know the event type that is assigned to the event, select one of the options in the Event Type drop
down list.
3. Click Search.
The page refreshes to show your search results.
Events - Editing
Events can be edited to reflect your needs. For example, if an action needs to be taken when a specific event
occurs, instructions can be placed in the event. These instructions will be displayed when the event is triggered.
1. Select Physical Access > Events.
The Events Listing page is displayed.
2. On the Events Listing page, click the name of the event you want to edit.
The Event Edit page is displayed.
3. Make the required changes.
4. Click
to save your changes.
Events - Assigning Priority Colors
You can assign a color to any priority level. The colors are used to highlight events with the same priority on the
Alarms page in the Monitor screen.
The alarm priority is assigned to events on the Event Edit page or the Event Type Edit page.
1. Select Physical Access > Events.
2. Select the Colors tab.
3. On the Colors Listing page, do one of the following:
l
To add a new color, click Add New Color.
l
To edit a priority color, click a listed priority number.
l
To delete a priority color, click
.
4. On the following page, enter the priority number that this color set should be assigned to.
Events - Searching
147
5. For each of the color options, click the color field to display the color map.
6. To use this palette to select a specific color:
a. From the HSV or RGB color fields, enter the general color you require.
All possible tints and variations of this color appear to the left in the tint area.
The new color you have selected appears on the right side of the horizontal bar above the color
element fields. The original color appears to the left.
b. To fine-tune the color, click within the tint area.
A cross appears. Drag the cross through the area to determine the exact color you want. indicating
the exact tint and shade you have selected like the following example:
The number in the Color field changes to reflect your choice.
c. If required, slide up or down the vertical slide bar to change the color still further.
d. When you're finished with this palette, click OK.
7. Click
to save.
Events - Assigning Priority Colors
148
Global Actions
Global actions allow you to perform one or more actions simultaneously at a large number of doors connected
to more than one panel. These actions can be triggered in three ways:
l
Manually, from the Global Actions Listing page.
l
By schedule, configured from the Global Actions Listing page.
l
Automatically, when used in a Global Linkage.
One or more global actions must be defined before you can create Global Linkages.
Global Actions - Adding
1. Select Physical Access > Global Actions.
The Global Action Listing page is displayed.
2. On the Global Action Listing page, click Add New Global Action.
3. Enter the required details for this new global action.
4. Click
to save.
Once you've defined all the global actions that you need, proceed to the Global Linkages feature to create a
chain of actions together.
Global Actions - Editing
1. Select Physical Access > Global Actions.
The Global Actions Listing page is displayed.
2. Click the name of the global action you need to modify.
3. Make the required changes.
4. Click
to save your changes.
Global Actions - Action Types
Feature
Description
Access Group
Install/Uninstall
Specifies that one or more designated access groups are installed/uninstalled.
Action Group
Specifies action groups that are executed.
Door Install/Uninstall
Specifies that a designated door will be either installed or uninstalled.
Door Mode
Specifies the mode one or more designated doors will enter.
Door Grant
Specifies that entry is granted at one or more designated doors.
Door Mask
Specifies that alarms are forced to a masked/unmasked state at one or more
designated doors.
Email
Specifies email addresses and sends a predefined to those recipients.
Exacq Soft Trigger
Specifies a soft trigger that is executed on the Exacq camera system by the global
action.
Global Actions
149
Feature
Description
Input
Specifies that one or more designated inputs are masked/unmasked.
Intrusion Areas
Specifies all available commands for intrusion areas.
Intrusion Outputs
Specifies all available commands for intrusion outputs.
Intrusion Points
Specifies all available commands for intrusion points.
Output
Specifies that one or more designated outputs are activated/inactivated.
Panel Install/Uninstall
Specifies that one or more designated panels are installed/uninstalled.
Panel Macro
Specifies a macro routine to be run on a designated execute group.
Policy Install/Uninstall
Specifies that one or more designated policies are installed or uninstalled.
Schedule Set Mode
Specifies that one or more schedules are activated/inactivated/scanned.
Global Actions - Deleting
1. Select Physical Access > Global Actions.
The Global Actions Listing page is displayed.
2. From the Global Actions Listing page, click
for the global action that you want to delete.
3. When the browser displays a pop-up message to ask Are you sure?, click OK.
Global Actions - Intrusion Linkages and Actions
Noted below are some examples of setting-up intrusion linkages and actions.
Intrusion panel alarm due to an event in the ACM System
An ACM system event can trigger an intrusion alarm point. To set-up so that an alarm condition is generated at
the intrusion panel (notifying the monitoring center etc.) due to an ACM system event (e.g. a forced door), ensure
that the intrusion panel has a point with source "output" - select an index that is unused both as a point and as an
output. Follow the steps below:
1. Create global actions to activate and deactivate the output.
2. Create a global linkage to the Forced Door event, to activate the output.
3. Create a global linkage to a NORMAL Forced Door event to deactivate the output.
When the related event occurs in the ACM system, the corresponding point will be triggered at the intrusion
panel, and control over the event (e.g. silencing an alarm) can be made via intrusion panels.
Disable/enable doors from keypad
Arming an alarm at the intrusion keypad can also lock a door within the ACM system.
1. Create global actions to lock and restore the door.
2. Create a global linkage to the area arming events, to lock the door.
3. Create a global linkage to the area disarming events, to unlock the door.
It is best to set this action up with a single area as different combinations of arming and disarming could leave
the door unexpectedly locked or unlocked.
Global Actions - Deleting
150
Alarms/access will be accessible from the keypad and from the Monitor > Intrusion Status > Areas section of
the ACM system.
NOTE: Keypad access will be limited by the tokens assigned to the identity.
Disarm Alarm on Access Grant with restricted authorities
Accessing an area via a valid the ACM system card access can automatically disarm an area.
To allow a scenario where entry to an area via a valid card access disarms an intrusion area based on the
cardholder's intrusion authorities, follow the steps below:
1. Create a global action to disarm an area. Action type of 'Intrusion Area', Subtype 'Master Disarm' and the
relevant areas as the Members.
2. Create a global linkage to door access events.
l
Devices tab: Door as the Type and the target doors as Members.
l
Events tab: Local Grant.
l
Actions tab: Disarm All.
Areas can be armed/disarmed from the keypad (depending on the tokens assigned to the identity) and from the
Monitor > Intrusion Status > Areas section of the ACM system.
Global Linkages - Introduction
Global linkages are the final step in the process that defines specific actions for triggering events at specific
doors. What separates this procedure from the Macro or Trigger features available for specific doors or panels,
is that this feature is capable of connecting many doors and inputs spread across many panels.
For example, you could lock down an entire building simply by issuing a single trigger. At a more sophisticated
level, you can use global linkages to plot a complex scenario, like a sally port or a man trap, in which a series of
doors are opened in sequence, inputs associated with those doors are sequentially masked and unmasked, and
cameras are turned on as each door is opened.
Global linkages allow you to plan a cascade of triggers and their resulting actions with only a single code entry
or command.
Global Linkages - Adding
1. Select Physical Access > Global Linkages.
The Global Linkage Listing page is displayed.
2. On the Global Linkage Listing page, click Add New Global Linkage.
The Global Linkages Add page is displayed.
3. Enter the required details then click
.
The screen refreshes to display the Global Linkage Edit page.
4. Edit each tab to add the required events, devices, identities and actions.
5. Click
to save your changes on each page.
Disarm Alarm on Access Grant with restricted authorities
151
Global Linkages - Editing
1. Select Physical Access > Global Linkages.
The Global Linkage Listing page is displayed.
2. On the Global Linkage Listing page, click the name of the global linkage that you want to edit.
The Global Linkages Edit page is displayed.
3. Edit each tab as required.
4. Click
after editing each page to save your changes.
Mustering - Introduction
In emergency situations, employees and other personnel in your building may be required to gather at specific
locations so emergency response teams can work quickly to ensure that everyone is safe. For example in a fire
drill you may be asked to wait at a specific spot, or muster station, until the drill is over. This would be the same
spot you would gather in an actual fire.
To help track the location of users in emergency situations, Access Control Manager offers the Mustering
feature. Mustering allows you to create a dashboard to quickly monitor who has arrived at their muster station
and who is still in danger during emergency situations.
Mustering - Requirements
To use the Mustering feature, you must configure each muster station and give users access to it in the Access
Control Manager system.
1. Create an area for each muster station. For more information, see Areas - Adding on page 141.
2. To organize related areas together, you can combine them into groups.
3. Identify all the doors that lead to the muster station area, then make sure the correct area is assigned to
each door.
a. In the Access Control Manager software, select Physical Access > Doors.
b. Click the name of the door that should be in the area, then select the Operations tab.
c. From the Into Area drop down list, select the area the door enters into.
d. From the Out of area drop down list, select the area the door exits from.
e. Click
.
4. Create an access group that includes all the doors in the muster station area.
5. Assign the access group to a role that would need access to the mustering area.
Tip: Create a role for each mustering area. If users physically move locations within an organization, they
can be easily assigned to new mustering stations without impacting their primary role in the system.
6. Assign the role to each identity that would need access to the muster station.
Next, create a dashboard to track identities as they arrive at the appropriate muster station in emergency
situations.
Global Linkages - Editing
152
Mustering - Creating a Dashboard
A Mustering dashboard is a map that contains a quick view of who has entered each muster station area.
The dashboard can be a simple list of all the Mustering areas, or it can be configured into color coded shapes for
quick identification.
You can add a dashboard to any map, or you can create a blank map to host the dashboard.
1. Select
> Maps.
The Map Templates Listing page is displayed.
2. In the Map Templates Listing page, decide if you want to add a dashboard to an existing map or create a
blank map.
l
To add the dashboard to an existing map, click the name of the map you want to use.
l
To create a blank map, click Add New Map Template then check the Use Blank Canvas box.
Complete the other details and click
.
3. On the Map Template Edit page, click Add beside Dashboard Elements.
4. Enter a title for the dashboard element. The map automatically updates with each change that you make.
5. Click the Title Font Color field to change the text color.
6. In the Title Font Size drop down list, select the size. The options are Small, Medium and Large.
7. For the Opacity option, choose how transparent you want the dashboard element to be. You can enter a
percent number, or move the slider to set the opacity. 100% is opaque and 0% is transparent.
8. In the Location field, enter where you want the dashboard element to appear on the map. You can also
move the dashboard element directly on the map.
9. In the Element Type drop down list, select if you want the dashboard element to appear as Text Only or
Graphic & Text.
If you choose Graphic & Text, the following options are displayed:
a. In the Area Group/Area drop down list, select the muster area this dashboard element represents.
You can select a specific area or a group of areas.
b. From the Graphic Shape drop down list, select Circle or Square.
c. Click the Graphic Color field to change the graphic shape color.
d. For the Graphic Size option, choose how big you want the graphic to be. You can enter the size in
pixels, or use the slider to adjust the size.
10. Click
to save your changes.
To use the dashboard, see Using a Map on page 230.
Mustering - Using the Dashboard
Once you have the Mustering dashboard set up, you can monitor access to each muster station area in the event
of an emergency.
Mustering - Creating a Dashboard
153
1. Select Monitor > Maps.
2. Select the Mustering dashboard from the Map Listing page.
NOTE: Depending on how your dashboard is set up, your map may look different. Dashboard elements
may appear as a line of text or as a shape with text inside.
Each dashboard element is labeled in this format: <# people> <Area Name>. The title of each dashboard
element displays the total number of people that are in the grouped area, and listed below the title is a
list of each area within the group.
As people move from one area to the next, you can track who is still in the danger area and who has
arrived in a safe area.
3. Click a dashboard element to display a list of all the people who are in an area.
Mustering - Using the Dashboard
154
Click the name of a person on the list to go to their Identity page. The Identity Edit page will tell you the
last door and area this person accessed.
4. To generate a report of all the people in each area, select Reports > Area Identity Report.
By default, the report displays a list of identities that are in each configured area, but you can filter the list
to display only specific areas.
Mustering - Manually Moving Identities
In an emergency situation, it is hard to anticipate how people will move and arrive at their mustering stations. If
someone chooses to follow another to their mustering station and does not check-in with their badge, you can
manually set the identity as having arrived to a safe Mustering area.
NOTE: Confirm the location of the person before you reset their actual location in the system.
1. Select Identities. Click the name of an identity.
In the Identity Information area, the last door and area accessed by the person is displayed.
2. Select the Tokens tab.
3. In the Last Area drop down list, select the specific area that the person is currently located.
4. Click
.
Mustering - Manually Moving Identities
155
Managing Appliances
When you log in to the Access Control Manager application, you are accessing an appliance that is set up in your
network. The appliance configures and directs communication between all the elements in the access control
system.
After you have connected your appliance to the network, you can further customize and set up your appliance
to meet your system requirements.
Appliances - Changes
Changes to appliances, including additions and deletions may be required after the original installation.
Adding Extra Appliances
NOTE: You can only add appliances if the system license supports multiple appliances.
Adding appliances increases the number of panels the system can support, and provides more storage for user
data. Additional appliances are a requirement for replication and failover.
After you connect the new appliance to the network, complete the following steps to add the new appliance to
the system:
1. In the top-right, select
> Appliance.
The Appliance Listing page is displayed.
2. Click the Add Appliance button.
The Appliance Add page is displayed.
3. Enter a new hostname for the appliance.
By default, the hostname for all appliances is the ACM system. You will need to set a new hostname for
the appliance if an existing appliance already uses this hostname on the network.
4. Click
.
The new appliance automatically restarts. When you next log in to the system, you will see the new appliance in
the Appliance Listing page.
Editing Appliances
After the appliance has been set up according to the Getting Started Guide included with the appliance, the
Access Control Manager system is ready for use. But if you want to customize your appliance further, you can
edit the system's default settings and set up the appliances backup and redundancy features.
Managing Appliances
156
1. In the top-right, select
> Appliance.
If there is only one appliance in this system, the Appliance Edit page is displayed.
If there is more than one appliance in this system, the Appliance Listing page is displayed. Select the
appliance you want to edit.
2. Navigate through the tabbed pages to configure this appliance. The tabbed pages include:
l
l
l
Appliance: Use this page to edit the appliance properties, as well as shutdown or restart the
appliance remotely.
Access: Use this page to specify and enable the controller panel types.
Ports: Use this page to specify how the appliance Ethernet ports are used to communicate with
access control devices.
l
Replication: Use this page to set up system replication and redundancy.
l
Backups: Use this page to set up scheduled backups for this appliance.
l
Logs: Use this page to access the system logs.
l
Software Updates: Use this page to update the appliance software.
l
About: Use this page to see the current licenses, version numbers, and status of this appliance.
3. Click
to save your changes.
Deleting an Appliance
Appliances may need to be deleted in certain cases. If you want to disconnect an appliance that is no longer
needed, delete it from the system before physically removing it. If you want to take an appliance that is being
used for replication or redundancy and use it as a primary appliance, the appliance must be deleted first.
NOTE: You can only delete an appliance if your system has more than one appliance.
1. In the top-right, select
> Appliance.
2. From the Appliance Listing page, click
beside the appliance that you want to delete.
3. When the confirmation message is displayed, click OK.
The selected appliance is removed from the list.
Configuring Replication and Failover
NOTE: Only the default Admin identity can edit the appliance Replication settings.
The Replication tab on the Appliance: Edit page allows configuration and monitoring of LDAP data replication
and optionally redundancy/failover of the ACM application so that monitoring and hardware control is not lost
even if an appliance fails.
Tip: It is recommended that replication be set up on all appliances before adding panels, other hardware or user
details to the system. Once replication is configured, it is possible to configure system hardware and identity
information from one of the replicated appliances on the network rather than having to connect directly to each
Deleting an Appliance
157
individual appliance to make changes to its installed hardware. However, it may be necessary to perform a
download of the hardware configuration from the appliance where the hardware is installed in order to update
the hardware with the latest configuration data changes made from another appliance.
The replication feature allows two or more appliances to be set up to share a single set of LDAP1 configuration
data, where the appliances would be able to share identities and other system details. Any change made to
configuration data on one appliance would automatically be copied (“replicated”) to the other appliances. This
replication configuration is referred to as a “Peer to Peer” configuration. In this configuration, each appliance
“owns” the hardware installed on it, and events and status information sent from that hardware can only be
viewed on the hardware owner appliance. All panel hardware added in a replicated environment must be
assigned upon creation to one of the available Peer to Peer appliances. A panel and its subpanels cannot be
split across multiple appliances, but will be installed on one of the Peer appliances.
Failover/Redundancy Feature
The failover, or redundancy, feature of replication allows a “Hot Standby” appliance to be set up to take over
control and event monitoring when the Primary appliance used in daily operations fails. This configuration is
referred to as Primary/Hot Standby. To use the failover feature, both appliances are originally configured with
Peer to Peer replication so that each appliance will share a common LDAP configuration database. The Hot
Standby appliance is then configured as such, and then will not have its own hardware or collaborations, and will
not appear in the list of replicated appliances available for assignment when these items are created.
Each Primary appliance can only be assigned one Standby appliance, but the same Standby appliance can be
assigned to more than one Primary appliance. However, if two or more Primary appliances fail at the same time,
the Standby appliance will replace the first appliance that it knows is offline (if configured for automatic failover),
and will not be available for failover of the other Primary appliances while it is standing in.
The following types of failover and failback are supported:
l
Automatic failover
l
Manual failover
l
Manual failback
Automatic failover
Automatic failover is controlled by the Standby appliance by monitoring the health of the Primary appliance. If a
Primary appliance is found to be unresponsive by the Standby appliance within a set period of time, the Standby
appliance will automatically initiate failover of the Primary appliance and will begin to control the hardware
installed on that Primary appliance, and will begin to receive events and status from this hardware.
There are two settings that control automatic failover - Heartbeat count and Heartbeat time. The Heartbeat
count is the number of health checks the inactive hot standby appliance makes to see if the active primary
appliance is alive. If this number of failures occurs in a row, the hot standby will do an automatic failover. The
Heartbeat time is the time between health checks (regardless of if the previous check was successful or failed).
1Lightweight Directory Access Protocol is an open, industry standard application protocol for accessing and
maintaining distributed directory information services over a network. An LDAP database in the Access Control
Manager system typically includes user details, connected hardware details, events, alarms and other system
configuration details.
Failover/Redundancy Feature
158
It is not necessarily possible to calculate specifically how long it would take to failover. It is not simply a matter of
multiplying the Heartbeat count by the Heartbeat time (for example Heartbeat count of two and Heartbeat time
of 30 seconds does not necessarily mean failover in about one minute of the primary going down, however one
minute would be the best/shortest case). This is because the time it takes each check to fail may depend on a
network time-out in the case of the hot stand by machine no longer having network connectivity to the primary
machine. Typically, a worst case network time-out is approximately two minutes - however this may possibly
vary. A health check may also fail immediately depending on network considerations/status.
It is recommended to set the Heartbeat count to at least a value of two so that a short network glitch does not
cause a premature failover. A Heartbeat count of two and a Heartbeat time of 30 seconds should typically
ensure that a failover is initiated within one to about five minutes of the primary going down.
Manual failover and failback
A manual failover can be initiated through from the Replication tab on the Appliance: Edit page on the Standby
appliance. This is usually done to test functionality or if a Primary appliance is going to be down for scheduled
maintenance.
Once the Primary appliance is back online and fully functional, you can then manually initiate failback of the
Standby appliance over to the Primary appliance, which restores hardware control and event and status
reporting to the Primary appliance.
Read through all of the following procedures before configuring replication and redundancy. If any detail is
unclear, contact Avigilon Technical Support for more information before you begin.
Recommended System Architecture
System Architecture for Replication
Replication works by automatically copying the LDAP1 configuration databases from one appliance to another.
Changes made in one appliance’s database are automatically replicated to the all of the other appliances.
Replication can occur between two or more Peer to Peer appliances, or it can occur between a Primary
appliance and its Standby appliance, and a mix of both configurations is possible.
If you only have one appliance in your system, replication is not possible. In this situation, performing periodic
backups is the recommended method of ensuring appliance recovery after a failure.
When two appliances exist, they can start replicating information.
Once replication is set up, any identity or other system configuration data that is added to or edited on one
appliance is automatically copied to the other appliances. Be aware that each appliance will be responsible for
1Lightweight Directory Access Protocol is an open, industry standard application protocol for accessing and
maintaining distributed directory information services over a network. An LDAP database in the Access Control
Manager system typically includes user details, connected hardware details, events, alarms and other system
configuration details.
Manual failover and failback
159
their connected panels, subpanels, and other hardware. Configuration and viewing of all system hardware is
possible from any replicated Peer appliance, but you will not be able to see the hardware status or events from
any appliance other than the one the hardware is installed on.
When more than two replicated Peer appliances exist, it is recommended that Peer to Peer replication be set up
in a mesh formation, where every Peer appliance has links (“subscriptions”) to all of the other Peer appliances.
This allows system configuration to be performed from one Peer appliance and have the details automatically
replicated to all the other Peer appliances, while providing multiple paths for this data to replicate among the
participating appliances. The exception to this is a Standby appliance, which only needs to have replication
subscriptions with its Primary appliance.
NOTE: Up to 99 appliances can be connected together for Peer-to-Peer replication, and this limit includes any
Hot Standby appliances in the environment.
System Architecture for Redundancy
Redundancy works by having a configured Hot Standby appliance automatically or manually replace a failed
Primary appliance. Redundancy requires Peer to Peer replication between the Primary and the Standby
appliances to be configured and tested first to function properly. Once this is in place, the Standby appliance is
then designated as such and the software configures it for that role.
When configured and in standby mode, the Standby appliance is essentially a blank appliance that only has
basic system settings. The Standby appliance has its own configuration for appliance related attributes such as
host name, ports, time zone (etc.), but it does not have any hardware configuration of its own. It only has that
hardware data which is replicated from the Primary appliance that owns it. When a Standby appliances takes
over for a Primary appliance, the operating system settings on the Standby appliance (such as host name and IP
address) do not change to match the Primary appliance’s settings. Instead, the applications running on the
Standby appliance begin to service the records (including doors, panels, video servers, collaborations and so
on) previously controlled by the Primary appliance. Note that this requires a different URL for clients to be able
to access the Hot Standby appliance – this is not handled automatically by the ACM system.
If one Primary appliance (1) exists for everyday operations and one Hot Standby appliance (*) is available, set up
the Standby appliance to subscribe to and receive replicated configuration data and transactional data from the
Primary appliance. If the Primary appliance fails, the Standby can automatically step-in and maintain daily
operations.
System Architecture for Redundancy
160
If more than one Primary appliance exists for a Hot Standby appliance, the Hot Standby appliance still remains
separate from daily operations but must receive replicated configuration and transaction data from all Primary
appliances it is configured to failover for. Be aware that the Standby appliance can only stand-in for one failed
Primary appliance at a time.
If the replicated environment with multiple appliances is configured in a mesh formation for replication where
possible, but due to some physical limitation such as a Wide Area Network (WAN) being involved one or more of
the appliances is a single point of failure for propagation of replicated data, it is recommended that each of
these appliances have its own Hot Standby appliance. In the event of a failure of one of these critical Primary
appliances, the environment is guaranteed to have a Hot Standby appliance available to ensure that all
replicated Peer appliances are able to continue to synchronize configuration data amongst themselves.
Replication and Failover Requirements
WARNING — Make sure your system meets all the following requirements before you set up replication and
failover or the system may lose configured system data.
Replication and Failover Requirements
161
l
License requirements:
l
l
The application license agreement must be entered on all appliances. The license key is tied to a
specific machine. When using redundancy, a license and key must be separately installed on both
the Primary and Standby appliances. The license features on a Standby appliance needs to
include all the features used by the Primary appliances it may replace.
Network infrastructure:
l
l
l
DNS registered host names for each appliance in the enterprise. Each appliance must be able to
connect to the other appliance by host name. There must be static or reserved IP addresses,
proper netmask, and network gateway for each appliance.
Name server IP address for host name resolution. All appliances must be able to resolve all of the
other appliances by host name. Each appliance must either have a named server configured for
this purpose, or a host file can be used for name resolution on each appliance if a DNS server is not
available.
Time Server IP address or host name. All appliances must be synchronized for time and date. This
is crucial for proper replication processing. Each must utilize a time server for this purpose. The
Open LDAP multi-master replication used by the ACM software synchronizes a LDAP directory
tree across multiple appliances. Each appliance supports read/write operations across an
enterprise system. Conflicts are handled using a timestamp to determine the most recent record.
All appliances must use a common clock base to synchronize their clocks to ensure the conflict
resolution works correctly.
NOTE: Time is based on UTC (Coordinated Universal Time) to ensure consistency across the ACM
system. UTC time is transferred from the client to the server when the date/time is set.
l
Defined and open TCP ports:
l
l
l
l
l
l
Web Server Port / Replication Subscriptions Web Port (default 443). Certain replication options
require each appliance to contact each other through the web service port.
LDAP Connect Port / Replication Subscription LDAP Port (should be a unique, open TCP port that
nothing else uses). This is a TCP port used for Open LDAP replication between appliances.
Event Replication Port (default 6052). Once a Primary/Standby appliance relationship is
established, the Primary appliance will automatically transfer event transactions to the Standby
appliance so event data will be available when a failover occurs. Connectivity is required for both
Primary and Standby appliances using the Event Replication Port (this is a TCP port used for open
SSL socket communication).
Replication Failover Port for heartbeat (default is NONE but should be a unique, open TCP port that
nothing else uses). This is a TCP port (used for open SSL socket communication) defined on the
Primary appliance only. The Standby appliance uses it to communicate with the Primary to check
its health status in order to determine if an automatic failover is required, if monitoring is enabled
on the Standby appliance.
These ports must be open across the network between the two appliances.
Appliance replication address. A unique numeric address number must be reserved and configured for
each appliance, starting at 1 and extending to 99 (confirm max count). These addresses need not be in
sequence.
NOTE: You can have up to 99 appliances connected together for replication, including any Standby
appliances configured for failover.
Replication and Failover Requirements
162
l
l
Software updates. When software updates are installed, they should be installed on all appliances in a
timely manner (i.e. one after the other). Note that the appliance with address 1 should always be the first
appliance in the environment to have software upgrades applied to it, as any LDAP schema and data
changes (adding deleting system records, massaging of data) involved are performed there and
replicated out to the other appliances. The other non-address 1 appliances will not have these LDAP
schema changes applied by the upgrade, so it is essential to upgrade the address 1 appliance first. The
remaining appliances can be upgraded in any order once the address 1 appliance is back online after its
upgrade completes.
Recommended SMTP settings. The SMTP settings configure which mail server should be contacted to
send out email and which account should be used. This is configured separately per appliance. When the
Primary and Standby appliances are physically separated, sometimes by considerable distances, it is
recommended to assign local mail servers for each. A mail server must be set up on both Primary and
Standby appliances if you want to send email notifications for failover and failback occurrences.
1. Preparing Appliances for Replication and Failover
Before you can set up replication and failover, you must set up the appliances to use the required network
infrastructure and assigned ports. For more information, see Replication and Failover Requirements on page 161.
Setting Up the Primary Appliance
Whether you are configuring two or more appliances to replicate to each other in a Peer to Peer system, or
configuring a Primary/Hot Standby redundant failover system, designate one appliance as the replication
address 1 appliance. This appliance should not be used as a Standby appliance, and will be the first appliance to
have software updates applied to it.
1. Log in to the appliance that will use replication address 1.
2. On the Appliance Edit page, enter values for the following fields in the Appliance tab:
l
Name – give the appliance an appropriate name so that you can identify it on sight.
l
Host Name – the appliance's hostname on the network.
l
l
Name Server – the name or IP address of the DNS server used to resolve the appliance identity. If
a DNS server is not available, then this can be left blank, and hosts file will need to be created on
the appliance containing all the replicated appliance IP addresses and host names.
Time Server – enter the name or IP address of a time server that is accessible on the network. The
time on all connected appliances must be in sync. This setting is crucial for a replicated appliance.
NOTE: Time is based on UTC (Coordinated Universal Time) to ensure consistency across the ACM
system. UTC time is transferred from the client to the server when date/time is set.
l
l
3. Click
Web Server Port – enter the port number used for accessing the appliance web service.
LDAP Connect Port – enter the port number used for accessing the LDAP database on the
appliance. This port will be used by replication to update LDAP data and will be used when other
appliances are added to the replicated environment.
to save your changes.
The appliance will automatically restart if changes are made to the above fields and saved.
1. Preparing Appliances for Replication and Failover
163
Figure 5: Primary Appliance Tab
Setting Up Additional Appliances
Complete this procedure for all the other appliances in your system. Besides the name and hostname, it is
recommended that if possible all other settings be the same as the primary appliance, as that will avoid
confusion on what ports are used and what network resources are used for time setting and name resolution.
1. Log in to the appliance
2. On the Appliance Edit page, enter values for the following fields in the Appliance tab:
l
Appliance Name – give the appliance an appropriate name so that you can identify it on sight.
l
Host Name – the appliance's hostname on the network.
l
l
Name Server – the name or IP address of the DNS server used to resolve the appliance identity
(use the same value as the replication address 1 appliance if possible), or blank if a hosts file will be
created on the appliance containing all the replicated appliance IP addresses and host names.
Time Server enter the name or IP address of a time server that is accessible on the network (use
the same value as the replication address 1 appliance if possible).
NOTE: Time is based on UTC (Coordinated Universal Time) to ensure consistency across ACM.
UTC time is transferred from the client to the server when date/time is set.
Setting Up Additional Appliances
164
l
l
Web Server Port – enter the port number used for accessing the appliance web service.
LDAP Connect Port – enter the port number used for accessing the LDAP database on the
appliance (use the same value as the replication address 1 appliance if possible).
3. If this is a Standby appliance, select the Hot Standby check box. Also, ensure that the Stored
Transactions setting is at least as large as the sum of this setting for all Primary appliances that the Hot
Standby will be backing up.
NOTE: Do not select this check box if the appliance will not be used as a Standby.
4. Click
to save your changes.
The appliance will automatically restart if changes are made to the above fields and saved.
Figure 6: Hot Standby Appliance tab
2. Setting Up Replication Between Appliances
Before the appliances can automatically replicate data between themselves, you must set up each appliance to
accept replication.
2. Setting Up Replication Between Appliances
165
Enabling Replication on the Primary Appliance
1. Log in to the appliance that is to be assigned a Replication Address of 1.
2. In the top-right, select
> Appliance.
3. In the Replication tab, enter the following settings:
a. Enable Replication: select this check box.
b. Enable Encryption it is recommended that you select this check box to allow the open LDAP
servers to use OpenSSL TLS encryption when replication data is transferred between appliances.
c. Address: enter 1 for this appliance. If multiple appliances exist in the system, each must have a
unique two digit number replication address, with this appliance being set to "1".
d. Identity Password: enter a password for securing LDAP data replication. This password should be
the same across all the appliances in the replicated environment.
e. Event Replication Port: enter a port number that will be used by this appliance to replicate data to
the other appliances. Default is 6052.
f. Other Fields in Replication Settings section: leave Initial Retry Time, Initial Retry Count, Last Retry
Time, Last Retry Count, Timeout, Network Timeout, and Keep Alive at their default values. These
will only need to be adjusted in consultation with Avigilon Technical Support to resolve replication
problems.
4. Click
to save your changes.
Enabling Replication on the Primary Appliance
166
Figure 7: Primary Replication tab
Enabling Replication on the Second Peer or Standby Appliance
Perform this procedure for all other appliances in the system.
1. Log in to the appliance.
2. In the top-right, select
> Appliance.
3. In the Replication tab, enter the following settings:
a. Enable Replication: select this check box.
b. Enable Encryption: it is recommended that you select this check box to allow the open LDAP
servers to use open SSL TLS encryption when replication data between appliances.
c. Address: if you have only one secondary/standby appliance, enter 2 for the appliance. If you have
multiple appliances in your system, you must enter a number from 2 to 99. You cannot use the
same address twice for different appliances.
NOTE: Up to 99 appliances can be connected together for replication, including the primary
appliance and standby appliances.
d. Identity Password: enter the same password as used in the primary appliance.
Enabling Replication on the Second Peer or Standby Appliance
167
e. Event Replication Port: enter a port number that will be used to replicate data to the primary
appliance. Default is 6052.
f. Other Fields in Replication Settings section: leave Initial Retry Time, Initial Retry Count, Last Retry
Time, Last Retry Count, Timeout, Network Timeout, and Keep Alive at their default values. These
will only need to be adjusted in consultation with Avigilon Technical Support to resolve replication
problems.
4. Click
to save your changes.
Figure 8: Hot Standby Replication tab
3. Adding a Replication Subscription
Before adding a replication subscription between the two appliances, double-check to make sure the network
requirements have been met:
l
The appliances are on the same network and are able to communicate with each other. Make sure the
appliances are able to ping each other by host name.
l
Each appliance has a time server and a name server configured for them.
l
A Web Server Port, LDAP Connect Port, and Event Replication Port are configured for the appliances.
3. Adding a Replication Subscription
168
Make sure these ports are open between the appliances.
l
l
Replication has been enabled on both appliances. Both appliances have a replication identity password
configured for them.
The clocks on both appliances are in sync. The current running time can be seen on the appliance page
for each appliance.
Always add the replication subscription to the first (replication address 1) appliance while logged into the second
appliance and from the Hot Standby’s Replication tab. As the second and subsequent appliances first subscribe
to and receive replicated data from the first (replication address 1) appliance, the existing LDAP database on
each subscribing appliance is overwritten by the replicated data from the first (replication address 1) appliance,
so that each subscriber appliance has its LDAP data properly initialized.
Note that this overwrite of the subscriber LDAP database only occurs when the first subscription is added on a
subscribing appliance. Subsequent subscriptions created on this subscriber appliance do not perform the
overwrite of LDAP data that the first subscription, as the database is already initialized. This is why it is
recommended that replication (and redundancy if used) is set up for each subscriber before adding hardware,
user identities or system configurations to avoid data being overwritten and lost.
Do not add the first replication subscription to the address 1 appliance, or all configured data on that appliance
will be overwritten as part of the initialization process described above.
1. Log in to the secondary or standby appliance. You must use the "admin" user name and password or you
will not be able to make changes to the Replication tab.
2. In the top-right, select
> Appliance.
3. In the Replication tab, click New in the Replication Subscriptions area.
4. Complete the following fields:
a. Host – enter the replication address 1 appliance’s host name.
b. Web Port – enter the replication address 1 appliance’s web port number.
c. Ldap Port – enter the replication address 1 appliance LDAP Connect Port value. This is highly
recommended to be the same as the LDAP Connect Port number on the current appliance.
d. Login – enter an account with the proper delegations for the default administrator identity. This
can be the admin account, or a different identity, can be used, but it must be an identity with the
proper delegations available in its role. Delegation required for this login are Appliance Repl
Subscription Add (remote), Appliance Repl Subscription Remove (remote), Appliance Replication
Update and Appliances Show.
e. Password – enter the password for the Login identity.
5. Click
to save your changes.
3. Adding a Replication Subscription
169
Figure 9: Second appliance subscribing to first appliance
The Replication Setup Process Log is automatically displayed if this is the first replication subscription. Click the
Continue button that is displayed.
3. Adding a Replication Subscription
170
Figure 10: Log file on subscribing appliance
The replication set up process includes the following:
l
l
l
The subscribing appliance connects to the primary appliance and copies the entire LDAP database from
the primary.
The replication subscription from the subscribing appliance to the primary is added to the LDAP
configuration database.
A replication subscription from the primary to the subscribing appliance is automatically created and
added to the LDAP configuration database.
Now, complete the following tests to confirm that replication is functioning correctly.
Testing Replication
After setting up replication between a two or more appliances, complete the following procedures to confirm
that replication was set up correctly.
Checking the Appliance Replication Status
Once the Replication Subscription is complete, open a browser for each appliance that is set to replicate to
each other.
Testing Replication
171
After you have the browsers open, display the Appliance Replication page for the appliances. Confirm that the
following settings are the same for all appliances:
NOTE: The Status and System Entries area are only displayed if the primary and subscribing appliance details
are accessed together.
l
l
l
l
Under the Status area, 1 and 2 are listed in the RID column. 1 should be the primary appliance and 2 should
be the secondary or standby appliance. There may be other numbers listed if you have more appliance
subscriptions.
Confirm that the date and time listed in the CSN column is the same for all appliances.
Under the System Entries area, there should be at least one entry to show that the primary appliance has
replicated data to the other appliances.
When you click Appliance In the top-right Setup links area, the Appliance Listing page should be
displayed and list all appliances.
Figure 11: Appliance List page
Checking the Appliance Replication Status
172
Figure 12: Primary Replication tab showing status
Testing Two-Way Replication
1. Make a small change in the primary appliance. For example, update an address for an identity.
2. Access a subscribing appliance and check if you can see the change.
3. Make a small change in the subscribing appliance. For example, update an address for a different
identity.
4. Access the primary appliance and check if you can see the change.
If the changes you made appear in both appliances, then replication was set up successfully.
Testing Two-Way Replication
173
4. Setting Up Failover
NOTE: Do not perform this procedure until after replication has been correctly set up. This step assumes that the
checkbox for Hot Standby on the Appliance tab has been checked for the appliance serving as the Hot Standby
appliance.
1. Log in to the primary appliance. This procedure can only be performed on the primary appliance.
2. In the top-right, select
> Appliance.
3. Select the primary appliance from the Appliance list.
4. In the Replication tab, enter the following settings in the Failover Settings area:
a. Standby Appliance: Select a standby appliance from the list. You can have more than one standby
appliance set up in the system, but only appliances identified as a standby will appear on the list.
b. TCP Port: Enter the primary appliance's TCP port to communicate its health status to the standby
appliance.
c. Monitor On: Check this box to turn-on the redundancy monitor. This allows the standby appliance
to check the health of the primary appliance and automatically take over if the primary appliance
unexpectedly loses network connectivity.
d. Heartbeat Time: Enter how often, in seconds, the secondary appliance should check the health of
the primary appliance. If you leave the setting at 0, the system defaults to 60 seconds.
NOTE: A Heartbeat Count of two and a Heartbeat Time of 30 seconds should typically ensure that
a failover is initiated within one to about five minutes of the primary going down. For more
information, refer to Configuring Replication and Failover on page 157.
e. Heartbeat Count: Enter the number of failures in a row before the secondary appliance takes over
for the primary appliance.
Tip: It is recommended to set this to at least two so that a short network glitch does not cause a
premature failover.
5. Click
4. Setting Up Failover
to save your changes.
174
Figure 13: Primary Replication tab, with Hot Standby configured
4. Setting Up Failover
175
Figure 14: Hot Standby replication tab showing Primary being backed up
Configuring Email Notifications for Replication Events
An event is logged every time a failover or failback occurs. You can configure email to be sent to one or more
email addresses whenever a failover and failback event is logged.
The events are:
l
l
l
Appliance automatic failover completed—After an automatic failover to the Hot Standby appliance this
event is logged by the Hot Standby appliance when it is up and running on behalf of the Primary
appliance.
Appliance manual failover completed—After a manual failover this event is logged by the Hot Standby
appliance after it is up and running on behalf of the Primary appliance.
Appliance manual failback completed—After a manual failback this event is logged by the Primary
appliance after it is up and running again as the Primary appliance.
Before configuring email notifications for these events:
l
Set up and test the SMTP settings configured on both the Primary and Standby appliances.
l
Access the Events Listing page and verify that these events are defined.
Configuring Email Notifications for Replication Events
176
You can specify the email addresses to which notifications are sent for each event, or you can configure a
custom event type for the three events and specify the email addresses to which notifications are sent for the
event type.
1. To specify email addresses to which notifications are sent for each event:
a. Click Physical Access > Events to open the Events Listing page and search for the three events.
Tip: Search for events containing "Appliance".
b. Open the first event. The Event: Edit panel opens.
c. Enter one or more email addresses in the Email field. Separate email addresses with commas.
d. Click
.
e. Repeat for the remaining events.
2. To create an event type for the three events and then specify email addresses to which notifications are
sent for the event type:
a. Click
and then Event Types to open the Event Types panel.
b. Click the Add Event Type button. The Event Type: Add panel appears.
c. Enter a name for the Event type. Complete the other options as required.
d. Enter one or more email addresses in the Email field. Separate email addresses with commas.
e. Click
.
f. Click Physical Access > Events to open the Events Listing page and search for the three events.
Tip: Search for events containing "Appliance".
g. Open the first event. The Event: Edit panel opens.
h. In the Event Type option, select the new event type from the drop-down list.
i. Click
.
j. Repeat for the remaining events.
Removing Replication and Failover
Important: Call Avigilon Technical Support before you attempt to remove or delete the replication and failover
settings.
Depending on your system configuration, it may require careful planning before you are able to successfully
disable replication and failover on your system. To avoid possible data loss, contact Avigilon Technical Support
to help guide you through the process.
Failing Over and Failing Back
If you've set up replication and failover, the access control system will keep running during planned or
unplanned system outages. In the event of a system outage, an appliance may go offline and fail-over to a
standby appliance that can take over regular operations until the original appliance comes back online.
In an unplanned system outage, the system will automatically failover. In a planned system outage, you can
manually failover an appliance so that the system can continue to run. Once the original appliance is ready to
come back online, you can tell the replacement appliance to failback and allow the original appliance to resume
normal operations.
Removing Replication and Failover
177
Automatic Failover
If the Monitor On option is enabled in the Primary appliance's Failover Settings area on its Replication tab, the
Hot Standby appliance will automatically try to communicate with the Primary appliance periodically. If the
Primary appliance does not respond in the set amount of time, the Hot Standby appliance assumes that the
Primary appliance has failed, and automatically takes-over for the Primary appliance.
If the Monitor On option is disabled in the appliance's failover settings, the Primary appliance will simply fail and
the Hot Standby will not stand-in unless it is manually told to do so.
To check if a Primary appliance has failed-over to a Hot Standby appliance, confirm the following details:
l
l
You are unable to connect to the primary appliance through the web browser.
When you log in to the Hot Standby appliance, you see that the Hot Standby has started logging
hardware events on its Event Monitor screen.
Hot Standby appliances do not have any connected panels or other hardware until they take over from a
Primary appliance, so there should not be any hardware events listed on the Event Monitor screen unless
the Hot Standby appliance has stood in for its Primary appliance.
l
When accessing the Appliance > Replication page on the Hot Standby appliance, it is listed as Active:
Yes beside the name of the inactive Primary appliance.
Manual Failover
If there is a planned system outage, like an appliance upgrade, you may want to have the primary appliance
manually failover to the standby appliance so that the system can continue to function while the upgrade occurs.
In anticipation of a planned system outage, Monitor On failover option should be disabled so that a Primary
appliance does not failover until it is instructed to do so.
To manually failover an appliance, complete the following:
1. Log in to the Hot Standby appliance.
2. Access the Appliances > Replication page.
3. In the Failover Settings area, click the Take Over button beside the Primary appliance to instruct the Hot
Standby appliance to stand in for the Primary appliance.
After a few moments, the Active status will change to Yes beside the Primary appliance that the Hot Standby has
replaced and the Take Over button is replaced by the Fail Back button. Notice that once the standby appliance
has replaced an appliance, it cannot be set to take over for another Primary appliance until after it has failed
back to the Primary appliance that it is standing in for.
Automatic Failover
178
Figure 15: Hot Standby after taking over from Primary
Failback
After a failover has occurred, you can set the standby appliance to failback once the primary appliance is ready
to return to normal operations.
1. Log in to the Hot Standby appliance.
2. Access the Appliances > Replication page.
3. In the Failover Settings area, click the Fail Back button next to the failed over Primary appliance.
Failback
179
Monitoring Transactional Replication to Hot Standby
As part of the redundancy design, Postgres transactional data is replicated from a Primary appliance to its Hot
Standby appliance. This is so that if a failover of the Primary appliance occurs all of the transactional history will
be available on the Hot Standby. The status of this replication can be observed for the appliances in the
Transaction Replication Status section of the Replication tab on the Appliance: Edit page.
For the Primary appliance, this section contains information about the last row of Postgres transactional data
replicated from the Primary to its Hot Standby, including rowid of record in basetrx table (Last Trx ID), date that
transaction occurred (Last Trx Date), the last attempted replication time (Last Attempt Time), and its status (Last
Attempt Status). For the Hot Standby this information is displayed for the Postgres transactional data it has, with
transaction data displayed for the last transaction replicated to the Hot Standby for each Primary it is backing up.
Figure 16: Primary transaction replication status
Figure 17: Hot Standby transaction replication status
Configuring Network Connections
You can set up how appliances are connected to panels and associated doors. From the Appliance Ports tab,
you can set up virtual ports and routes for each Ethernet port. You can also set up serial ports.
Configuring Ethernet Ports
Appliances can have up to eight RJ-45 Ethernet ports. These high-speed ports can be configured to connect to
a series of interlinked door controllers or panels.
NOTE: You cannot add or remove an Ethernet port from the appliance but you can add virtual ports.
To enable and configure an Ethernet port:
1. From the Appliance Edit page, select the Ports tab.
The Port Listing page is displayed.
2. Click the name or port number from the Ethernet Ports list.
The Port: Edit page is displayed.
Monitoring Transactional Replication to Hot Standby
180
3. Make the required changes.
4. Click
.
NOTE: If you assign or change the IP address, make sure that any switches or routers connected to the
appliance recognize the changed address. To do this, perform one of the following:
l
Reboot the appliance.
l
Unplug the Ethernet cable that is connected to the appliance, wait a few seconds, then plug it back in.
If the switch or router is not able to detect the appliance's new IP address, you may need to manually update the
switch or router. Refer to the switch or router documentation for more details.
Adding Ethernet Routes
If you prefer not to use the default Ethernet route set by the appliance, you can add a new Ethernet route for
appliance and controller panel communication.
1. From the Appliance Edit page, select the Ports tab.
The Port Listing page is displayed.
2. In the right most column of the Ethernet Ports list, click Routes.
The Routes Listing page is displayed.
3. From the Routes Listing page, click Add New Route.
The Route Add page is displayed.
4. Complete the fields as required to define the new Ethernet route.
5. Click
.
6. Repeat this procedure to add all the routes that are required.
Enabling Serial Ports
Each appliance includes one or more serial ports for connecting devices via RS-232 or RS-485. Serial ports can
be used to connect troubleshooting consoles or to connect panels that do not have Ethernet connections.
To enable a serial port on an appliance:
1. Connect the appliance to one or more panels via the appropriate serial port.
Note the port number for each serial cable connection.
2. From the Appliance Edit page, select the Ports tab.
The Ports Listing page is displayed.
3. At the bottom of the page, click the serial port you want to enable.
The Serial Port Edit page is displayed.
Adding Ethernet Routes
181
4. Select the Enable check box.
5. Complete the remaining fields as required to define the serial connection.
6. Click
.
Backups
Backups can be used to restore information if an appliance's configuration or transaction data ever becomes
corrupted. Backups can either be scheduled or manually initiated .
Backing Up System Data
You can set up the appliance to automatically backup system configuration settings and transaction event
details. More than one backup event can be created, and each backup can be stored in a different location.
NOTE: Configuration data (including tokens) and transactions data must be backed up separately.
When you configure the backup settings, you can also assign a schedule for when backups automatically occur
each week.
1. From the Appliance Edit page, select the Backups tab.
2. Click Add New Appliance Backup.
The Appliance Backup: Add New page is displayed.
3. Enter a name for the back up.
4. Select the preferred Backup Type.
Some of the other settings change to match the selected option. Complete the new settings as required
to use the preferred Backup Type.
5. From the Data Type drop down list, select the type of data that is in this backup.
6. Click Browse to select where the back up files will be stored.
7. In the Schedule area, select the days of the week when the back up will occur then enter the preferred
backup time in 24 hour format.
8. Click
.
Manually Backing Up Data
After you've set up a backup event, you can manually initiate a system backup outside the configured schedule.
1. From the Appliance Edit page, select the Backups tab.
The Appliance Backup Listing page displays.
2. Click Backup Now for the backup event that you want to initiate.
The backup for this operation is initiated.
Restoring Backups
If the appliance's configuration or transaction data ever becomes corrupted, you can restore a backup.
Backups
182
NOTE: You cannot restore configuration or transaction data if no backups exist.
Important: Backups created in versions prior to the ACM software release 5.8 may not be compatible with
version 5.8. If a restore is required it is recommended that this is completed this before upgrading to ACM 5.8.
1. From the Appliance Edit page, select the Backups tab.
The Appliance Backup Listing page displays.
2. Click File List beside the backup that you want to restore.
The Backup File List is displayed.
3. In the far right column, click Restore beside the copy of the backup that you want to restore.
The selected file is copied to the appliance and replaces the existing configuration or transaction
information on the appliance.
Logs
Appliance logs are automatically generated to monitor communications between panels and devices.
Accessing Appliance Logs
The appliance logs are automatically generated and monitor the communications between panels and devices.
They can be used to help diagnose appliance issues.
1. From the Appliance Edit screen, select the Logs tab.
The Logs Listing page is displayed.
2. Click the log you want to view.
The Appliances Log page displays.
Software Updates
Software updates are available for download and installation.
Updating the Appliance Software
Avigilon Access Control Manager software updates are available for download from the Avigilon website:
avigilon.com.
Once you've downloaded the latest version of the software, you can install the update to the appliance from any
browser on the network.
Logs
183
1. From the Appliance Edit page, select the Software Update tab.
The Software Update Listing page is displayed.
2. Upload the latest version of the Access Control Manager software to the appliance.
a. Click Add New Software Update.
The Software Update: Add New page is displayed.
b. In the Upload Software file area, click the Browse button then locate the latest software file that
was downloaded from the Avigilon website.
c. Click
to upload the file to the appliance. It may take several minutes for the upload to
complete. Do not navigate away from the page during the upload or the upload is automatically
canceled.
The Software Update Listing page is automatically displayed when the software file has
successfully uploaded to the appliance.
3. On the Software Update Listing page, click
appliance.
beside the software file that you want to install on the
4. When the confirmation message is displayed, click OK.
The update progress is displayed in Applying License Upgrades on the next page. When the update is
complete, the appliance will automatically reboot. You will need to log in to the appliance again.
Viewing the ACM™ SSL Certificate
Each ACM appliance in your network is assigned a self-signed Secure Socket Layer (SSL) certificate. When the
SSL protocol is enabled on the appliance, this certificate can be used to verify the identity of an ACM appliance
and securely encrypt the data traffic between the ACM appliance and other servers in your network.
An SSL certificate contains a SHA-1 fingerprint and a SHA-256 fingerprint. For authentication purposes, the SHA256 fingerprint is used to verify the validity of a certificate. Any time an ACM appliance enabled to use the
SSL protocol connects to another SSL-enabled server, it presents its SSL certificate. The first time it is
presented, an administrator of the other server must accept, or trust, that certificate. From then on, as long as the
ACM appliance presents the certificate with the same SHA-256 fingerprint, it can automatically connect.
However, if ever the fingerprints do not match, the connection is denied until the reason for the mismatch is
understood.
Only ACM system administrators with the delegation "SSL Certificate List" assigned to their role can view the
SSL Certificate of the ACM server.
To view the SSL certificate,:
1. In the top-right, select
>Appliance.
2. Select the SSL Certificate tab.
The SSL certificate is displayed.
Viewing the ACM™ SSL Certificate
184
Appliances - About
The About section for appliances provides access to:
l
review the appliance status
l
the end user license agreement, and
l
license and license key details.
Applying License Upgrades
When you purchase the appliance, it arrives licensed to support the features that you have ordered. As you set
up and use your system, you may find that you need additional features.
To upgrade the system license, complete the following:
1. Purchase a license upgrade from Avigilon. You will be given a new license and license key file.
2. Copy the license (.lic) and license key (.key) files to your desktop.
3. Log in to the Access Control Manager appliance.
4. In the top-right, select
> Appliance.
5. Select the About tab.
The About page is displayed.
6. In the License area, click the file navigation button then locate the license (.lic) file.
7. In the License Key area, click the file navigation button then locate the license key (.key) file.
8. Click
.
If the license provides access to new features, you may be asked to accept a new End User License
Agreement. For more information, see Accepting the End User License Agreement below.
Viewing the End User License Agreement
Follow the steps below to view the End User License Agreement:
1. Select Appliance > About.
2. Click View End User License Agreement Terms and Conditions on the Appliance: Edit page.
3. Review the license agreement on the Appliance: Edit (End User License Agreement) page.
4. Click Back to return to the Appliance: Edit page.
Accepting the End User License Agreement
Before you can use the Access Control Manager system, you must accept the End User License Agreement.
You may have noticed this error message that is displayed on each page:
END USER LICENSE NOT YET ACCEPTED, SYSTEM WILL NOT RUN PROPERLY! PLEASE ACCEPT EULA TO
STAY IN COMPLIANCE!
Appliances - About
185
1. To access the End User License Agreement, click the link under the error message or select Appliance >
About > View End User License Agreement Terms and Conditions.
2. On the End User License Agreement page, review the license agreement.
3. After reviewing the license agreement, select the check box next to the message I accept the terms of
the License Agreement.
4. Click Submit.
The error message is removed and you can begin to configure the Access Control Manager system.
Reviewing the Appliance Status
From the Appliance Edit page, select the About tab.
At the bottom of the About page are the appliance status details. Each item listed in the Appliance Diagnostic
Information area is highlighted in a specific color to identify its status. For more information about the status
colors, see Status Colors on page 36.
You can also review the appliance hardware status from the Monitor screen. For more information, see Monitor Hardware Status Page on page 29.
Reviewing the Appliance Status
186
Collaboration - Introduction
Collaborations allow the Access Control Manager to exchange data with third party databases and applications.
Possible functions include:
l
l
Pulling identity information from an external database to populate identity fields in the Access Control
Manager.
Pushing identities and events from the Access Control Manager to third party applications such as video
management software.
NOTE: Any date fields in Collaboration files (e.g. Last Access, Expire Date, Activate Date, Issue Date) will display
as blank if there is no information recorded for that field.
Collaborations - Adding
To add a collaboration:
1. Select
> Collaboration.
The Collaborations Listing page appears.
2. Click Add New Collaboration.
The Collaboration Add New page appears.
3. Fill out the Name, Appliance and Type fields. Depending on the type of collaboration selected, additional
fields will display.
4. Select the Installed checkbox, if required.
5. Complete the remaining fields as required. The fields will vary depending on the collaboration type:
Collaboration type
Additional fields
Events - Generic XML; Events - Splunk
Host; Port Number; Require TCP
Identity CSV Export
Partitions to Export; Include Primary Photo; Include
Roles; Location Type; Host; Port Number; User Name;
Password; Location; Domain Name (Windows Share)
Identity CSV one-time Long format
Delimiter; Text Qualifier; Date Format; CSVFile
Identity CSV one-time Short format
CSVFile
Identity CSV Recurring
Include Primary Photo; Location Type; Host; Port
Number; User Name; Password; Location; Delimiter;
Text Qualifier; Date Format; Domain Name (Windows
Share)
Identity LDAP pull
Host; Bind DN; Password: Port Number; SSL?, Validate
Certificate
Identity Oracle RDBMS pull
Host; User Name; Instance; Port Number; Password
Identity SQL Server pull
Host; User Name; Database; Port Number; Password
Collaboration - Introduction
187
NOTE: Ensure any individual images to be imported
are not over 1MB.
6. Click
.
The Collaboration: Edit screen appears.
7. Navigate through the tabbed pages and fill out the details as required.
8. Click
.
Collaborations - Adding Events XML Collaboration
To add an Events XML collaboration:
1. Select
> Collaboration.
The Collaborations Listing page appears.
2. Click Add New Collaboration.
The Collaboration: Add New page appears.
3. Complete the following fields:
Field
Description
Name
Name for the collaboration.
Appliance
Select the appropriate Appliance, if more than one appliance is available.
Select Events – Generic XML.
NOTE: The following additional fields display once the type is selected:
Type
l
Host
l
Require TCP
l
Port Number
Installed
Select this checkbox to enable the collaboration.
Host
IP address of the XML receiver.
Require TCP
Select this checkbox.
Port Number
TCP port relating to the Host IP address.
4. Click
.
The message 'Collaboration entry was successfully created' displays on the Collaboration: Edit screen.
5. Click the Events tab.
6. Complete the following fields:
Field
Description
Schedule
Select a Schedule for when the XML events collaboration will be active.
Send Acknowledgments
Select this checkbox to include acknowledgments.
Collaborations - Adding Events XML Collaboration
188
Send Clears
Select this checkbox to include clears.
Send Notes
Select this checkbox to include notes created by Alarm Monitor
operators when processing alarms.
7. Select the desired event types to be included in the XML data feed from the Available list and move
them to the Members list.
NOTE: Hold the SHFT key down and select the first and last entries to select multiple consecutive entries.
Hold the CTRL key down to select multiple non-consecutive entries.
8. Click
.
Collaborations - Events XML Definitions
Definitions for the individual attributes of the XML events stream are noted below:
To see a typical example, refer to Collaborations - Events XML Example on page 192.
XML
Definition
<plasectrxGatewayDN>
cn=544de4aa06914073,ou=gateways
,dc=plasec
</plasectrxGatewayDN>
An internal reference for the ACM appliance that this
XML came from.
<cn>38901f4a95d14013</cn>
The unique row identifier for this particular event.
Corresponds to the ID column in the history tables.
<plasectrxRecdate>20140610055028-0700
</plasectrxRecdate>
Time the event was logged into the ACM system
history – adjusted for ACM local time.
<plasectrxPanel date>20140610085028-400
</plasectrxPanel date>
The UTC time the event actually happened. It is the
timestamp of the event being reported up from the
field hardware. Adjusted for field hardware local time.
<plasectrxRecdateUTC>20140610125028Z
</plasectrxRecdateUTC>
Time the event was logged into the ACM system
history.
<plasectrxPanel dateUTC>20140610125028Z
</plasectrxPanel dateUTC>
The UTC time the event actually happened. It is the
timestamp of the event being reported up from the
field hardware.
<plasectrxLastacc>
19700101000000Z</plasectrxLastacc>
Last Access time and date of the Token that is
associated with this event. Example – the last
recorded valid access of the card that was used at a
door causing a ‘Local Grant’ event.
<plasectrxEvtypename>
Intrusion</plasectrxEvtypename>
ACM event type category for this event. Corresponds
to one of the event types defined in the ACM system
in Settings: Event Types.
<plasectrxBackgroundColor>
</plasectrxBackgroundColor>
Color assigned to the event background color (if any)
for display in the ACM monitor.
<plasectrxForegroundColor>
</plasectrxForegroundColor>
Color assigned to the event foreground color (if any)
for display in the ACM monitor.
<plasectrxAckBackgroundColor>
</plasectrxAckBackgroundColor>
Color assigned to the event background color (if any)
for display in the ACM monitor. This color corresponds
Collaborations - Events XML Definitions
189
XML
Definition
to an ‘acknowledged alarm’ on the Alarms page.
<plasectrxAckForegroundColor>
</plasectrxAckForegroundColor>
Color assigned to the event foreground color (if any)
for display in the ACM monitor. This color corresponds
to an ‘acknowledged alarm’ on the Alarms page.
<plasectrxEventname>
Input point in alarm
</plasectrxEventname>
Name of the event. Corresponds to one of the events
defined in the ACM system in Physical Access: Events.
<plasectrxPanel name>elevator test
</plasectrxPanel name>
Name of the panel that the event originated from.
<plasectrxSourcename>
Input on subpanel 0 Address 1
</plasectrxSourcename>
Name of the source of the event.
<plasectrxSourcelocation>
</plasectrxSourcelocation>
Location of the source of the event, as defined in the
‘Location’ field on the various hardware property
pages.
<plasectrxSourcealtname>
</plasectrxSourcealtname>
Applies to doors only - if the event source is a door,
this is the Alt. Name as defined on the Door properties
Configuration tab.
<plasectrxPointaddress>
750</plasectrxPointaddress>
A reference number for the event e.g. ‘Input point in
alarm’.
<plasectrxPointDN>
cn=750,ou=points,dc=plasec
</plasectrxPointDN>
This is the LDAP dn of the ‘Input point in alarm’ event,
for lookup during ACM processing.
<plasectrxEvtypeaddress>5
</plasectrxEvtypeaddress>
This is a reference number for the event type e.g.
‘Intrusion’.
<plasectrxSourceDN>
cn=100,cn=0,cn=9,ou=panels,
cn=544de4aa06914073,ou=gateways,
dc=plasec
</plasectrxSourceDN>
LDAP dn of the source of the event, used in ACM
processing.
<plasectrxSourcetype>40
</plasectrxSourcetype>
An internal reference to the type of hardware the
event source belongs to. Defines what type of
hardware produced the event – an input point in this
case.
<plasectrxOperatorname>
</plasectrxOperatorname>
the ACM system operator that is associated with
certain events e.g. an audit event for a record updated
by an the ACM system user.
<plasectrxPri>10</plasectrxPri>
Priority of the event, as defined on the Event
properties page.
<plasectrxMsg></plasectrxMsg>
Contents of the ‘Message’ column in the Monitor e.g.
the raw card data from an ‘Invalid Card Format’ event.
<plasectrxIdentityDN>
</plasectrxIdentityDN>
The LDAP dn of the identity associated with the event.
Example – the dn of the identity that used their card at
a door causing a ‘local grant’ event.
Collaborations - Events XML Definitions
190
XML
Definition
<plasectrxCardno>0
</plasectrxCardno>
Internal number of the token that is associated with this
event. Example – the card number that was used at a
door causing a ‘local grant’ event.
<plasectrxEmbossedno>
</plasectrxEmbossedno>
Embossed number of the token that is associated with
this event. Example – the card number that was used at
a door causing a ‘local grant’ event.
<plasectrxLname>
</plasectrxLname>
Last name of the identity associated with the event.
Example – the last name of the identity that used their
card at a door causing a ‘local grant’ event.
<plasectrxFname>
</plasectrxFname>
First name of the identity associated with the event.
Example – the first name of the identity that used their
card at a door causing a ‘local grant’ event.
<plasectrxMi></plasectrxMi>
Middle name of the Identity associated with the event.
Example – the middle name of the identity that used
their card at a door causing a ‘local grant’ event.
<plasectrxIssuelevel>-1
</plasectrxIssuelevel>
Issue level of the token that is associated with this
event. Example – the issue level of the card that was
used at a door causing a ‘local grant’ event.
<plasectrxFacilityCode>0
</plasectrxFacilityCode>
Facility code of the token that is associated with this
event. Example – the facility code of the card that was
used at a door causing an ‘invalid facility code’ event.
<plasectrxExpiredat>
19700101000000Z
</plasectrxExpiredat>
Deactivate date of the token that is associated with
this event. Example – the deactivate date of the card
that was used at a door causing a ‘local grant’ event.
<plasectrxActivdat>
19700101000000Z
</plasectrxActivdat>
Activate date of the token that is associated with this
event. Example – the activate date of the card that was
used at a door causing a ‘local grant’ event.
<plasectrxIssuedat>
19700101000000Z
</plasectrxIssuedat>
Issue date of the token that is associated with this
event. Example – the issue date of the card that was
used at a door causing a ‘local grant’ event.
<plasectrxHasCamera>0
</plasectrxHasCamera>
Indicates whether the event has a camera view
associated with it. Used in the monitor to display the
camera icon for an event with a camera association.
<plasectrxHasNotes>0
</plasectrxHasNotes>
Indicates whether there are any notes available for this
event.
<plasectrxHasSoftTriggerSet>0
</plasectrxHasSoftTriggerSet>
Indicates whether there is a soft trigger associated –
currently this applies to Exacq video integration only.
<plasectrxShowVideo>0
</plasectrxShowVideo>
Indicates whether the event is optioned to show popup video of an associated camera.
<plasectrxSeqno>0
</plasectrxSeqno>
Not used.
<plasectrxIsAlarm>1
</plasectrxIsAlarm>
Indicates whether this event is also defined as an
alarm. Alarms appear on the Monitor: Alarms page.
Collaborations - Events XML Definitions
191
Collaborations - Events XML Example
Shown below is an example of a typical 'input point in alarm' XML events stream:
<EVENT>
<plasectrxGatewayDN>cn=544de4aa06914073,ou=gateways,dc=plasec</plasectr
xGatewayDN>
<cn>38901f4a95d14013</cn>
<plasectrxRecdate>20140610055028-0700</plasectrxRecdate>
<plasectrxPanel date>20140610085028-0400</plasectrxPanel date>
<plasectrxRecdateUTC>20140610125028Z</plasectrxRecdateUTC>
<plasectrxPanel dateUTC>20140610125028Z</plasectrxPanel dateUTC>
<plasectrxLastacc>19700101000000Z</plasectrxLastacc>
<plasectrxEvtypename>Intrusion</plasectrxEvtypename>
<plasectrxBackgroundColor></plasectrxBackgroundColor>
<plasectrxForegroundColor></plasectrxForegroundColor>
<plasectrxAckBackgroundColor></plasectrxAckBackgroundColor>
<plasectrxAckForegroundColor></plasectrxAckForegroundColor>
<plasectrxEventname>Input point in alarm</plasectrxEventname>
<plasectrxPanel name>elevator test</plasectrxPanel name>
<plasectrxSourcename>Input on subpanel 0 Address
1</plasectrxSourcename>
<plasectrxSourcelocation></plasectrxSourcelocation>
<plasectrxSourcealtname></plasectrxSourcealtname>
<plasectrxPointaddress> 750</plasectrxPointaddress>
<plasectrxPointDN>cn=750,ou=points,dc=plasec</plasectrxPointDN>
<plasectrxEvtypeaddress> 5</plasectrxEvtypeaddress>
<plasectrxSourceDN>cn=100,cn=0,cn=9,ou=panels,cn=544de4aa06914073,ou=ga
teways,dc=plasec
</plasectrxSourceDN>
<plasectrxSourcetype>40</plasectrxSourcetype>
<plasectrxOperatorname></plasectrxOperatorname>
<plasectrxPri>10</plasectrxPri>
<plasectrxMsg></plasectrxMsg>
<plasectrxIdentityDN></plasectrxIdentityDN>
<plasectrxCardno> 0</plasectrxCardno>
<plasectrxEmbossedno></plasectrxEmbossedno>
Collaborations - Events XML Example
192
<plasectrxLname></plasectrxLname>
<plasectrxFname></plasectrxFname>
<plasectrxMi></plasectrxMi>
<plasectrxIssuelevel> -1</plasectrxIssuelevel>
<plasectrxFacilityCode>0</plasectrxFacilityCode>
<plasectrxExpiredat>19700101000000Z</plasectrxExpiredat>
<plasectrxActivdat>19700101000000Z</plasectrxActivdat>
<plasectrxIssuedat>19700101000000Z</plasectrxIssuedat>
<plasectrxHasCamera>0</plasectrxHasCamera>
<plasectrxHasNotes>0</plasectrxHasNotes>
<plasectrxHasSoftTriggerSet>0</plasectrxHasSoftTriggerSet>
<plasectrxShowVideo>0</plasectrxShowVideo>
<plasectrxSeqno>0</plasectrxSeqno>
<plasectrxIsAlarm>1</plasectrxIsAlarm>
</EVENT>
<?xml version="1.0" encoding="ISO-8859-1"?>
For definitions of the individual attributes, refer to Collaborations - Events XML Definitions on page 189.
Collaboration - Editing
To edit an existing collaboration:
1. Select
> Collaboration.
The Collaborations Listing page appears.
2. Click on the name of the collaboration you want to edit.
The Collaboration Edit screen appears.
3. Navigate through the tabbed pages and make the required changes.
4. Click
.
Collaboration - Types
The types of collaboration available in this application include:
Type
Description
Identity
Collaboration - Editing
193
Type
Description
Identity CSV
Export
Export identities, photos, tokens, groups, and roles using an updated CSV file.
Identity CSV Onetime Long format
Import identities, tokens, groups, roles from a CSV file manually and keep the Access
Control Manager identity database in sync with changes.
Identity CSV Onetime Short format
Import identities, tokens, groups, roles from a CSV file manually and keep the Access
Control Manager identity database in sync with changes.
Identity CSV
Recurring
Import identities, photos, tokens, groups, and roles from an updated CSV file and keep
the Access Control Manager identity database in sync with changes.
Identity LDAP pull
Pull identities, tokens, groups, roles from a directory store and keep the Access Control
Manager identity database in sync with changes.
Identity Oracle
RDBMS pull
Pull identities, tokens, groups, roles from a Oracle RDBMS store and keep the Access
Control Manager identity database in sync with changes.
Identity SQL Server Pull identities, tokens, groups, roles from a Microsoft SQL Server RDBMS store and keep
pull
the Access Control Manager identity database in sync with changes.
Events
Events - Generic
XML
Transmit events in real time using XML.
Events - Splunk
Produces messages in Splunk format. Splunk is a log aggregation product.
Collaboration - Running
To run a collaboration:
1. Select
> Collaboration.
The Collaboration Listing page appears.
2. Click
from the Run column next to the collaboration you want to run.
3. When the confirmation message is displayed, click OK.
Collaboration - Deleting
To delete an existing collaboration:
1. Select
> Collaboration.
The Collaboration Listing page appears.
2. Click
beside the collaboration that you want to delete.
3. When the confirmation message is displayed, click OK.
Collaboration - Running
194
Collaboration - Assigning Events to a Collaboration
To assign an event type to a collaboration:
1. Select
> Collaboration.
2. From the Collaboration Listing page, click on the name of the collaboration you want to edit. It must be an
Event collaboration type.
The Collaboration Edit screen appears.
3. Select the Events tab.
4. From the Available list, select all the events you want to transfer, then click
.
The event is added to the Members list to show that it is now assigned.
To remove an event from the collaboration, select the event from the Members list, then click
.
NOTE: You can select multiple events by using the Ctrl or Shift key.
5. Click
.
Collaboration - Assigning Events to a Collaboration
195
Setup & Settings - Main page
When you click or hover on
l
l
l
l
l
l
l
l
l
l
l
l
, the following options are displayed:
Appliance — This features enables the operator to connect, customize and set up your appliance to meet
your system requirements.
Collaboration — This feature enables the operator to set-up and manage collaborations which exchange
data with third party databases and applications.
Schedules — This feature enables the operator to define periods of time that can be used to control such
things as when a door is accessible, when a card is valid, or when a device is activated.
Holidays — This feature enables the operator to define specific days during which normal rules are
suspended for one or more schedules. Event Types — This feature enables the operator to define additional event types and provide
instructions on how to handle an event generated in the Access Control Manager system.
User Fields — This feature enables the administrator to create fields, in addition to the factory default
fields, that are used for enrolling Identities.
User Lists — This feature enables the operator to define additional options for those fields on the Identity
page with drop down option lists.
System Settings — This feature enables the operator to define basic values within the system, like
system settings language, token expiration time, and required password strength.
Paired Devices —This feature enables the operator to generate a one-time key to connect a browserenabled device such as a smartphone to a door configured as an ACM Verify station so that it can
function as a Virtual Station.
Badge Designer — This feature enables the operator to create and customize a badge layout (a badge
template) for use by badge holders.
External Systems — This feature enables the operator to define and configure a camera or other image
capture device for use by this application.
Maps — This feature enables the qualified operator to create maps and populate them with input, output,
and alarm points.
Schedules and Holidays - Introduction
Schedules
A schedule is a reusable time template that can be used to control when a system setting is active. A user’s
access privileges are the result of a three-way relationship that is created between: (1) a group of users, (2) a
secured device and (3) a schedule.
For example, you can apply a schedule to a group of users and doors to limit their access permissions to the
days and times specified in the schedule.
A door can also be assigned an "Unlock Schedule", which specifies a period of time when no credential is
required to access the door - all users have free access during the Unlock Schedule period. Likewise, a device
may be assigned an "Active Schedule", a period during which the device is in operation.
Setup & Settings - Main page
196
You can also create a holiday list to manage access during holidays or special days when the building is closed.
Before you can create a schedule to handle special occasions, you must set up the holiday list.
NOTE: When a panel appears to be functioning in an unexpected way, check the event log for the “Panel
Schedule Count Exceeded” event. A panel can accommodate a maximum of 255 schedules. This event is
recorded in the system log when the number of schedules configured for a panel exceeds the maximum. To
correct this, fewer schedules need to be assigned to the panel. You can identify unneeded schedules on the
Panels - Schedules tab, or you can move hardware to a different or new panel.
Holidays
Holidays are special days in the year when the standard schedule does not apply, or because a different entry
and exit pattern is observed. New Year's Day and National Day are examples of holidays. The Access Control
Manager is designed to accommodate a large number of diverse holidays.
NOTE: Holidays are set for a specific day in the year. You will need to update the system holidays each year.
Adding Schedules
1. Select
> Schedules.
The Schedules Listing page is displayed.
2. From the Schedules Listing page, click Add New Schedule.
3. On the Schedule Add New page, enter a name for the schedule.
4. Select the schedule mode:
l
l
l
ON – the schedule is constantly on. You do not need to set specific dates or times for the
schedule.
OFF – the schedule is off.
SCAN – the schedule follows the date and time settings defined through the check boxes for each
row of time.
5. Select all the days of the week (Sun-Sat) and holidays (1-8) this schedule applies to.
6. Enter the start (Active) and end (Inactive) time for the specified days for each row. The time must be in 24
hr format.
NOTE: Beware that the time entered includes the full minute. So, if 17:00 was entered as an Inactive time,
the actual inactive time will be 17:00:59. Active times, on the other hand, commence on the time entered.
So, if 09:00 is entered as the Active time, the actual active time will be 09:00:00.
7. If required, you can enter multiple rows of time and days to meet your requirements.
NOTE: Ensure that you consider related Inactive times when entering Active times for alternative
schedules. For example, if you entered a Day Shift schedule for 08:00 to 20:00 and a Night Shift for 20:00
to 08:00, then conflicts will occur. The Night Shift schedule will not commence as scheduled as it will try
to start at 20:00:00 but the Day Shift schedule will still be active until 20:00:59. Similarly, if the Night Shift
Schedule was active then the Day Shift could not commence at 08:00:00.
To solve the above issue the Day Shift schedule would be set to 08:00 to 19:59 and the Night Shift would
be set to 20:00 to 07:59.
8. Click
Holidays
to save the new schedule.
197
Editing Schedules
1. Select
> Schedules.
The Schedules Listing page is displayed.
2. From the Schedules Listing page, click the name of the schedule you want to edit.
3. Edit the schedule as required.
4. Click
to save your changes.
Deleting Schedules
NOTE: When you delete a schedule that is currently used (such as by a door, panel or interlock), all references to
the deleted schedule are replaced by the Never Active schedule.
1. Select
2. Click
> Schedules.
beside the schedule you want to delete.
3. When the browser displays a pop-up message to ask Are you sure?, click OK.
Holidays - Adding
1. Select
> Holidays.
The Holidays Listing page is displayed.
2. From the Holidays Listing page, click Add New Holiday.
3. On the Holiday: Add New page, enter a name for the holiday.
4. Enter the specific date of the holiday.
NOTE: If this is a recurring holiday, you will need to create a holiday for each instance of this holiday or
update the date each year.
5. If the holiday spans more than one day, enter the number of days the holiday spans for in the Additional
Days field.
If the setting is 0, the holiday only spans the one date entered in the previous step.
For example, you entered 01/01/2017 as the date of the holiday and entered 2 for the Additional Days
field. This mean the system expects the holiday to span for January 1, 2 and 3.
6. Enter the Type of holiday. (The holiday type number allows you to group specific types of holidays
together.)
7. Define how you want the holiday schedule to be activated. The holiday must be assigned to a schedule
to initiate any special actions.
l
l
Editing Schedules
Activate only the holiday schedule configured for the holiday dates — leave the Preserve
schedule days check box clear. Only the schedule configured for the holiday will be active on the
dates of the holiday.
Activate the holiday schedule configured for the holiday dates in addition to the regular schedule
for that door — check the Preserve schedule days box. The schedule configured for the holiday
and any other active schedule will be active on the holiday.
198
8. Click
to save the new holiday.
Holidays - Editing
1. Select
> Holidays.
The Holidays Listing page is displayed.
2. On the Holidays Listing page, click the name of the holiday you want to edit.
3. Edit the information about the holiday as required.
4. Click
to save your changes.
Holidays - Deleting
1. Select
> Holidays.
The Holiday Listing page is displayed.
2. On the Holiday Listing page, click
for the holiday you want to delete.
3. When the browser displays a pop-up message to ask Are you sure?, click OK.
Holidays and Schedules - Examples
Noted below are two examples of setting up holidays/schedules.
Example 1: Part-Day Holiday
All staff are attending an afternoon team function on 18 December, with work finishing at noon. On the 18th we
want the doors to unlock from 8am to 12pm, with access by card only mode after 12pm. The normal schedule for
Monday to Friday is for the doors to open from 8am to 5pm. Steps to take are:
1. Select
> Holidays.
2. On the Holiday Listing page, click
to add a new holiday.
3. On the Holiday: Add New screen, enter the following then click
l
Name (e.g. Company Half Day).
l
Date (e.g. 12/18/2016).
l
Type (e.g. 8).
4. Select
to save:
> Schedules.
5. Select the normal schedule on the Schedules Listing page.
6. On the first available free line:
l
Click in the checkbox for the Type selected in step 3 above (e.g. 8), so that a checkmark displays.
l
On the same line enter 08:00 as the Active time, and 11:59 as the Inactive time.
7. Click
Holidays - Editing
to save.
199
Example 2: Additional Access Time
A special delivery in scheduled for December 20, requiring additional access time from 8pm to 12am. In order to
create the additional access time without impacting the normal daily schedule, the Preserve schedule days
option can be used. This option allows you to set separate access schedules for the same day. Steps to take are:
1. Select
> Holidays.
2. On the Holiday Listing page, click
to add a new holiday.
3. On the Holiday: Add New screen, enter the following then click
l
Name (e.g. Late Night Access).
l
Date (e.g. 12/20/2016).
l
Type (e.g. 7).
l
Click in the Preserve schedule days checkbox.
4. Select
to save:
> Schedules.
5. Select the normal schedule on the Schedules Listing page.
6. On the first available free line:
l
Click in the checkbox for the Type selected in step 3 above (e.g. 7), so that a checkmark displays.
l
On the same line enter 20:00 as the Active time, and 23:59 as the Inactive time.
7. Click
to save.
Event Types - Introduction
Event types are classifications of events that may occur during the operation of the Access Control Manager
system. Event types are associated with specific event sources, such as doors, panels, and systems.
A number of event types are defined by default but you can add or delete event types as needed. The default
events are listed below.
Event Type
Communications
Source
Door
Panel
Definition
Events where two or more components cannot communicate with
each other (for example, if a lock is offline with a hub, or if there is
radio interference). Related events include:
Subpanel
Door held open
Example 2: Additional Access Time
Door
l
Lock offline with hub
l
Panel offline
l
Radio disturbance
l
Subpanel communication disabled
l
Subpanel offline
l
Subpanel type mismatch
l
VidProxy Image Service offline
l
VidProxy Service offline
Covers door held events including:
200
Event Type
Forced Door
Intrusion
Source
Door
Panel
Subpanel
Intrusion
Panel
Inputs
Definition
l
Door held masked
l
Door held open
l
Door held open pre-alarm
l
Door held unmasked
l
Extended door held disabled
l
Extended door held enabled
Covers forced door events including:
l
Forced door
l
Forced door masked
l
Forced door unmasked
This event type is used in two circumstances – for Intrusion Panel
events and for general purpose input events from Mercury
Security or HID® (general purpose inputs are inputs that are not
used in a door).
If the source type includes the word ‘Intrusion’ (e.g. Intrusion Point,
Intrusion System, Intrusion Panel etc.) then it relates to intrusion
panels. If the source type is Input, then it relates to an event
generated by a general purpose (non-door) Mercury Security or
HID® input (e.g. Masked input point active, Input point in alarm,
Input point masked).
Invalid Credential
Door
Relates to any door event where access is denied (e.g.
Deactivated card attempt, Invalid card schedule, Access denied
– occupancy level reached etc.).
Maintenance
Door
Primarily developed to cover events where action is required
outside of the system (e.g. uploads, downloads, inconsistencies
between panels etc.).
Panel
Subpanel
Output
Outputs
NOTE: There are other miscellaneous events which are also
assigned to this event type.
Covers general purpose outputs - Mercury Security or HID®
outputs that aren't door strikes, including:
l
Output point active
l
Output point inactive
l
Output point pulsed
Power
Door
Covers only low or critical battery events for doors.
System
System
Primarily used where the system is informing the user of an event.
This includes global actions and linkages.
NOTE: This event type has also been used for other
miscellaneous events (e.g. Card trace and Requests to enter for
doors).
System audit
Event Types - Introduction
System/
Covers events where a record has been added, deleted or
201
Event Type
Source
Definition
Database
updated by the system.
Credentials
Tamper
Door
Panel
Relates to all tamper events for panels or doors, including (but not
limited to):
Subpanel
User audit
l
Area disabled/enabled
l
Lock jammed
l
Occupancy count reached
l
Panel transaction level reached
Door
Panel
Where a user makes a change in the UI or in REST, including (but
not limited to):
Subpanel
Intrusion
Panel
System/
Database
l
APB requests
l
Door-related requests
l
Intrusion panel requests
l
Records changed in database
Valid Credential
Doors
Relates to any door event where access is granted (e.g. local
grant, Opened unlocked door, Facility code grant etc.).
Video
Video
Video-related events, including:
l
Connection Loss
l
Motion Detected
l
Video Loss
NOTE: The Network and Offline lock event types are no longer in use and have been removed from the ACM
system version 5.10.0 onwards.
Adding Event Types
1. Select
> Event Types.
The Event Types Listing page is displayed.
2. From the Event Types Listing page, click Add New Event Type.
3. On the Event Type: Add New page, enter a name for the new event type.
4. Check the Alarm box if this event type will always generate an alarm.
5. Complete the remainder of the page with the required settings.
6. Click
Adding Event Types
to save the new event type.
202
Editing Event Types
1. Select
> Event Types.
The Event Types Listing page is displayed.
2. From the Event Types Listing page, click the name of an event type.
3. On the Event Type Edit page, make any changes that are required.
4. Click
to save your changes.
Deleting Event Types
NOTE: System default event types cannot be deleted. You can only delete event types that have been
manually added to the system.
1. Select
2. Click
> Event Types.
beside the event type you want to delete.
3. When the browser displays a pop-up message to ask Are you sure?, click OK.
User Defined Fields - Introduction
User defined fields are custom fields that you can add to the Identities page to capture organization specific
information for each identity.
To add user defined fields to the Identities page, you must also add a user defined tab to host the fields.
Information captured by user defined fields can be used on badges to display important details about each
identity.
User defined fields can also be used for advanced searching for identities. For more information, see Searching
for an Identity on page 45.
User Defined Fields - Adding a Field
User defined fields are used to collect additional details about users on the Identities page. After you add all the
fields that you need, you will need to add at least one tab to display the new fields. For more information, see
User Defined Fields - Adding User Defined Tabs on the next page.
1. Select
> User Fields.
The User Defined Fields Listing page displays.
2. Click Add New User Defined Field.
The User Defined Field: Add New screen displays.
3. Give the new field a name in the Name field.
4. Select the field Type.
The options are:
Editing Event Types
203
l
String — the field supports words and numbers.
l
Integer — the field supports numbers only.
l
l
5. Click
Boolean — the field is a check box. The system interprets the Boolean field as a Yes or No
question. When you use the field, check the box to indicate "yes" and clear the box to indicate
"no".
Date — the field supports a date only. When you use the field, click the field to display a calendar
then select a date.
to save the new field.
NOTE: User defined fields cannot be edited, only deleted.
NOTE: When searching for identities using user defined fields there may be issues with string and integer
fields. Searches will identify exact matches, but may not operate correctly for 'not equal to' searches. In
order to correct this issue, create an Identity Profile including all relevant identities then complete a Batch
Update.
User Defined Fields - Adding User Defined Tabs
To use user defined fields, you must add a new tab to host the fields before the fields can be used on the
Identities page. It is recommended that you add tabs after you've added all the fields that you need.
1. Select
> User Fields.
The User Fields Listing page is displayed.
2. From the User Fields Listing page, click the Tabs tab.
3. Click Add New User Defined Tab.
The User Defined Tab: Add New page displays.
4. Enter a name for this new tab then click
.
The page refreshes to show a list of all the user defined fields that have been configured in the system.
5. From the Available list, select all the fields that should be displayed on the page, then click
.
The field is added to the Members list to show that it is now part of the page.
To remove a field from the tab, select the field from the Members list and click
6. Click
.
to save your changes.
User Defined Fields - Editing User Defined Tabs
1. Select
> User Fields.
The User Fields Listing page is displayed.
2. From the User Fields Listing page, click the Tabs tab.
User Defined Fields - Adding User Defined Tabs
204
3. Click the name of the tab that you want to edit.
4. Edit the tab details as required.
5. Click
to save your changes.
User Defined Fields - Deleting Fields
NOTE: You cannot delete user defined fields if they are used in a tab. To delete a field, you must remove it from
all tabs first.
1. Select
2. If the
> User Fields.
symbol displays for the field you want to delete:
a. Click
to delete the field.
b. When the browser displays a pop-up message to ask Are you sure?, click OK.
3. If the
symbol does not display for the field you want to delete, this is because the field is currently
used by a tab. To remove a field from a tab:
a. Select the Tabs tab then click the name of the tab that the field appears in.
b. On the following page, select the field from the Members list then click
.
The field is removed from the tab and returned to the Members list.
c. Click
.
User Defined Tabs - Deleting
User defined tabs can be deleted as required. However, you cannot delete user defined fields if they are used
in a tab.
1. Select
> User Fields.
2. Select the Tabs tab.
3. Click
for the tab you want to delete.
4. When the browser displays a pop-up message to ask Are you sure?, click OK.
User Lists - Introduction
Many fields on the Identity page involve selecting a value from a drop down list. While there are several default
values for these fields, you can add more options using the User Lists feature.
For example, if you want to add departments that are specific to your organization, you would use this feature to
add those options to the Departments drop down list.
User Lists - Adding Items to a List
NOTE: Any changes you make to the lists are automatically included in identity related collaborations.
User Defined Fields - Deleting Fields
205
1. Select
> User Lists.
The User Defined Lists Listing page is displayed.
2. On the User Defined Lists Listing page, click the name of the list you want to add items to.
3. On the User List Edit screen, enter a new list option in the New Value field then click
.
The new value is added to the Current Values list.
4. Repeat the previous step until all the new values you want are listed.
5. Click
to save your changes.
User Lists - Editing Items
Any changes you make to the lists are automatically included in identity related collaborations.
1. Select
> User Lists.
The User Defined Lists Listing page is displayed.
2. On the User Defined Lists Listing page, click the name of the list you want to edit.
3. To add a new option, enter the new option in the New Value field then click
.
The new value is added to the Current Values list.
4. To delete a value, select the option from the Current Values list and click
5. Click
.
to save your changes.
User Lists - Deleting Items
1. Select
> User Lists.
The User Defined Lists Listing page is displayed.
2. On the User Defined Lists Listing page, click the name of the list you want to edit.
3. Select the option you want to delete from the Current Values list then click
4. Click
.
to save your changes.
The option you deleted is no longer listed on the Identities page.
System Settings
When you select
> System Settings, you can set your system preferences and configure remote access to
the Access Control Manager system from external domains.
System Settings - General page
In the top-right, select
User Lists - Editing Items
> System Setting to display the System Settings General page.
206
This page allows you to set custom system-wide default values.
Be aware that certain user specific settings configured in the My Accounts page will override the settings on this
page.
Feature
Enhanced Access
Level
Description
Check this box to indicate that this system will use enhanced access levels for Mercury
Security panels. Enhanced access levels allow Mercury Security panels to accept more
access groups per token.
Duplicate PINs is an option available where an organization wants to allow cardholders to
have non-unique PINs. This option cannot be used with the PIN only and Card or PIN door
modes as it does not allow tracking of an individual cardholder.
Important: Once duplicate PINs are allowed, this cannot be reversed. Enabling this will
mean that you will not be able to use the PIN only and Card or PIN door modes. Only
allow this option if you have a specific requirement for duplicate PINs.
Do the following before allowing duplicate PINs to ensure that no doors are in either PIN
only or Card or PIN door modes:
1. Select Physical Access > Doors to navigate to the Door Listing page.
2. For each door currently in either PIN only, or Card or PIN mode:
Allow Duplicate
PINs
l
l
Select the check box beside the door.
Either select Door Action > Restore to restore to the default mode or
select an alternative mode from the Door Mode dropdown list.
To allow duplicate PINs, check this box then:
l
l
Click OK when the message 'Enabling duplicate PINs is an irreversible setting and
cannot be undone. Are you sure you want to continue?' displays.
Click OK when the message 'Proceed with enabling duplicate PINs?' displays.
NOTE: The system will check Door Policies, Global Actions, Scheduled Jobs, Panel
Macros, and Interlocks to ensure there is no conflict with duplicate PINS (e.g. doors are in
PIN only mode). If there are any conflicts these will have to be corrected before allowing
duplicate PINs. If there have been any previously defined linkages, triggers or interlocks
that are based on PIN only or Card OR PIN event types, they will fail to execute.
To set a default time for Hardware Status to refresh at, enter the time in seconds (e.g. 60
HW Status Refresh
Time
for a one minute refresh) then click
.
The default value is 0.
Identity Auto
Increment Field
Check this box to enable the system to automatically increments the read-only
Sequence Number field on the Identity page.
This option is disabled by default.
NOTE: The system will only apply this setting to new identities.
Identity Auto
Increment Start
If you enabled Identity Auto Increment, enter the number the system will start counting
from then click
System Settings - General page
.
207
Feature
Description
The default value is 1.
NOTE: The system will only apply this setting to new identities.
If you enabled Identity Auto Increment, enter the value the system uses to increment the
sequence number then click
Identity Auto
Increment Step
.
For example, if you leave the default value of 1, the identity Sequence Number will count
1, 2, 3 (etc.). If you enter 2, the identity Sequence Number will count 1, 3, 5 (etc.).
NOTE: The system will only apply this setting to new identities.
Select a language that the system will display by default.
Language
Each user with access to the Access Control Manager system will be able to set their
own language preferences from the My Account page.
Click Translate Default Data to translate all of the system default values into the
selected language. It is recommended that you only perform this action once, or your
reports and logs will display values in multiple languages.
Maximum Active
Tokens
Enter the maximum number of tokens that can be active per identity then click
.
Enter the maximum number of attempts a user has to log into the Access Control
Manager system before they are locked out, then click
Maximum Login
Attempts
.
The user is locked out of the ACM system for 10 minutes and further login attempts will
result in the lockout time increasing. Authorized operators can reset the password to
bypass the lockout.
The default value is 5.
Password Strength
Enforced
Check this box to enable a minimum password strength requirement. Weak passwords
(less than four characters) are not accepted.
Post Roll
Enter the number of seconds a camera continues to record after a recorded video
event.
Pre Roll
Enter the number of seconds of video that is automatically added before a recorded
video event.
Private Message
Enter a short message to display on the log in screen.
Show Identity
Photos
Check this box to enable a photo to be displayed beside each identity reference.
Enter a title you want to use for the system then click
System Message
System Support
.
The title is displayed under the Access Control Manager banner on each screen, and the
title is used for all messages sent by the system.
Enter the contact details of your Avigilon support representative then click
.
This information is displayed when a user clicks Support.
Token Expiration
Time
Enter the default number of days before a token expires then click
System Settings - General page
.
208
Feature
Description
Enter the default number of days a token can be unused before it is automatically
Use/Lose Threshold
deactivated, and then click
Video Windows
Count
Create New Report
.
Enter the maximum number of video display windows that can be open at the same time,
then click
.
Click this button to generate a PDF of the values on this page.
Remote Authentication from External Domains
Remote authentication allows you to configure the Access Control Manager appliance to use an external
domain server to authenticate users that need access to the system, or to secure an LDAP Identity pull
collaboration type. Either of these allows users to use their local domain username and passwords to access the
system, and will not need a separate password configured in the ACM appliance. However, user access
permissions are still based on the roles they are assigned within the ACM appliance.
To use remote authentication, you need to:
l
Add one or more external domains
l
Add one or more AD or LDAP servers to each domain to the system
l
Enable each remote host to present its SSL certificate on connection to the ACM server software
l
Enable remote authentication in the ACM appliance
SSL certificates are used to verify remote hosts and to encrypt all traffic between connected hosts. Certificates
can be recognized in two ways:
l
l
Trusted SSL certificates—Certificates from remote hosts in external domains that are imported into the
ACM server software so that the remote host can connect automatically. They are valid until the
certificate expires.
Pinned SSL certificates—Certificates from remote hosts in external domains that are accepted manually
by an ACM system administrator so that the remote host can connect automatically. These certificates
are trusted as long as they are not revoked manually by an ACM system adminstrator.
Only ACM system operators with administrative privilege and the following delegations assigned to their role
can validate SSL certificates:
l
l
External Domains Validate Certificates—delegation required to validate an SSL certificate from a
Windows AD host
Collaboration Validate Certificates—delegation required to validate an SSL certificate from an LDAP
database host in a Collaboration using the Identity Pull LDAP server collaboration type
You can set up different identities to be authenticated by different domains. Each identity must be configured to
choose one of these domains to use for authentication. This is done on the configuration screen for the given
Identity.
CAUTION — Risk of security breaches. When certificate validation is not enabled, certificates are ignored by the
ACM server software. Traffic between the ACM appliance and external domains is unencrypted and can be
easily compromised. To ensure secure connections and encryption of all traffic, enable the Validate Certificate
option on the Remote Authentication tab of System Settings.
Remote Authentication from External Domains
209
About Certificate Pinning
When SSL certificates from a server in an external domain have not been exported from that server and
uploaded to the ACM server they cannot be automatically trusted.
However, a remote server can present its SSL certificate to the ACM server so that an administrator can choose
to trust it based on the administrator's certainty that the certificate is valid. In the ACM server, after an SSL
certificate is accepted manually, it will be trusted as long as the unique fingerprint embedded in the certificate
presented by the remote server each time it is connected to the ACM software is the same as the certificate
originally accepted by the ACM system administrator. A certificate that is trusted in this way is known as a pinned
certificate.
Pinning a certificate allows you to trust a certificate that has not been uploaded from a remote server, however
the responsibility for ensuring that the certificate can be trusted is assumed by the ACM system administrator
who pins the certificate. To ensure that an SSL certificate is valid before it is pinned, the ACM system
administrator should compare the SSL certificate at the remote host to the certificate received from the remote
host to confirm the SHA-256 fingerprints are identical.
System Settings - Configuring Remote Authentication Using SSL Certificates
SSL certificates can be trusted (ar accepted) in two ways: as pinned certificates or fully trusted certificates.
Using Pinned Certificates
Requirements:
On the remote Windows server (for example, an Active Directory (AD) server, if you are enabling remote
authentication using the AD of your company), the following tasks must be completed:
l
Configure a Windows domain controller. For an LDAP collaboration, TLS encryption must be activated.
l
Obtain the fully-qualified domain name of the DNS server for remote server's domain.
l
Enable AD Certificate Services.
l
Create a root certificate and a Domain Controller Authentication certificate.
Once you have all the requirements, log in to the ACM appliance, and complete the following steps:
1. In the top-right, select
>System Settings.
2. Select the External Domains tab.
3. Click Add External Domain.
4. On the External Domain: Add New page, enter a name for this external domain.
5. In the Server field, enter the full DNS name of your domain controller.
6. Click
7. Click
. The domain controller is added to the Current Servers list.
.
8. Select the Remote Authentication tab.
NOTE: The Default Domain and Default Server options are not required for remote authentication.
9. Select the Validate Certificate check box.
10. Click
.
About Certificate Pinning
210
11. Repeat the previous steps on each ACM appliance in your system that requires remote authentication.
12. Enable remote authentication for each identity that will be logging into the ACM appliance:
a. Open the Identity:Edit page for a user who will be using remote authentication.
b. Under the Identity tab, select the Remote Authentication? check box in the Account Information
area.
c. In theLogin field, enter the user's ACM system login name.
d. In the Remote Domain drop down list, select the external domain that you added earlier.
e. In the Remote Login field, enter the user's Active Directory domain identity. Enter the login name
in this format: username@domain.org.
For example: j.smith@avigilon.com
f. Click
.
Next time the user logs in to the ACM appliance, they use their ACM system login name and the password.
Using Trusted Certificates
Requirements:
On the remote Windows server (for example, an Active Directory (AD) server, if you are enabling remote
authentication using the AD of your company), the following tasks must be completed:
l
Configure a Windows domain controller. For an LDAP collaboration, TLS encryption must be activated.
l
Obtain the fully-qualified domain name of the DNS server for remote server's domain.
l
Enable AD Certificate Services.
l
Obtain a root certificate and a Domain Controller Authentication certificate.
l
l
Export the Domain Controller's root CA certificate in Base-64 encoded X.509 (.CER) format. (Do not
export the private key.)
Change the export file extension from .cer to .pem before you upload the file to the appliance.
Once you have all the requirements, log in to the Access Control Manager appliance, and complete the
following steps:
1. In the top-right, select
> Appliance.
2. Under the Appliance tab, enter the IP address of your domain's DNS server in the Name Server field.
3. Click
.
4. In the top-right, select
> System Settings.
5. Select the External Domains tab.
6. Click Add External Domain.
7. On the External Domain: Add New page, enter a name for this external domain.
8. In the Server field, enter the full DNS name of your domain controller.
9. Click
10. Click
. The domain controller is added to the Current Servers list.
.
Using Trusted Certificates
211
11. Select the External Domains tab to display the listing page.
12. Click Certificates (next to the Create New Report button).
13. On the following listing page, click Add Certificates Listing.
14. Click Browse then locate the domain controller CA certificate that you exported. Make sure the file
extension has renamed to .pem.
15. Click
.
16. Select the Remote Authentication tab.
NOTE: The Default Domain and Default Server options are not required for remote authentication.
17. Select the Validate Certificates check box.
18. Click
.
19. Repeat the previous steps on each ACM appliance in your system that requires remote authentication.
20. Enable remote authentication for each identity that will be logging into the ACM appliance.
a. Open the Identity:Edit page for a user who will be using remote authentication.
b. Under the Identity tab, select the Remote Authentication? check box in the Account Information
area.
c. In theLogin field, enter the user's ACM system login name.
d. In the Remote Domain drop down list, select the external domain that you added earlier.
e. In theRemote Login field, enter the user's Active Directory domain identity. Enter the login name in
this format: username@domain.org.
For example: j.smith@avigilon.com
f. Click
.
Next time the user logs in to the ACM appliance, they use their ACM login name and the password.
System Settings - Remote Authentication
When you select the Remote Authentication tab on the System Settings screen, the Remote Authentication
page is displayed.
This page enables the ACM software to provide secure connections and encrypted traffic between servers and
clients.
CAUTION — Risk of security breaches. When certificate validation is not enabled, certificates are ignored by the
ACM server software. Traffic between the ACM appliance and external domains is unencrypted and can be
easily compromised. To ensure secure connections and encryption of all traffic, enable the Validate Certificate
option on the Remote Authentication tab of System Settings.
It also allows you to define the default domain and server that hosts the Active Directory database that the
system uses to authenticate users.
Feature
Default
Domain
Description
Select a domain from the drop down list.
Only the external domains that have been added to the system are listed.
System Settings - Remote Authentication
212
Feature
Default
Server
Description
Enter the name of the default server in the selected domain.
Check this box to enable the system to validate certificates from remote servers before use.
The default setting is not checked. Use the default setting only if you do not need to validate
certificates from remote servers.
Validate
Certificate CAUTION — Risk of security breaches. When certificate validation is not enabled, certificates are
ignored by the ACM server software. Traffic between the ACM appliance and external domains is
unencrypted and can be easily compromised. To ensure secure connections and encryption of all
traffic, enable the Validate Certificate option on the Remote Authentication tab of System Settings.
Click this button to save your changes.
Click this button to discard your changes.
Create
New
Report
Click this button to generate a PDF of the values on this page.
Badge Templates - Introduction
A badge template is a format designed by a qualified operator that is used to generate a physical badge. Using
this procedure, an enrollment officer or administrator can:
l
Enroll an employee using the Identities feature.
l
Assign the new employee to a specific badge template.
l
Generate (print) a badge with all relevant information automatically placed on the badge.
NOTE: Badge templates can be designed as either one- or two-sided. A two-sided badge must be printed by a
badge printer possessing duplex capability.
The Avigilon Access Control Manager application automatically supplies such fields as photos and data with the
relevant information taken from the Identities database. Other fields, such as backgrounds, graphics, and text are
static and are applied to every badge. In addition, the application can change colors and fonts depending on
the values provided. For example, if an employee is specified as part-time, the color used for the employee's
name can be changed from black to orange, making it easier for guards to differentiate between full-time and
part-time employees.
Once you have created one or more badge templates, you can assign them to a user at Identities > Badge.
Using Badge Templates
The Badge Designer is used to design badge templates. You can add photos, logos, text, and database fields to
badge templates and define the layout. Once you assign a badge template to an identity, you can create a
badge that is auto-populated with the identity's details.
Badge Templates - Introduction
213
Adding a Badge Template
Badge templates are used to define the layout of badges or cards that are used to access doors within your
access control system. Each badge template is filled with placeholders that automatically pull the required
information from each identity the template is assigned to.
To add a new badge template to the system, complete the following steps:
1. Select
> Badge Designer.
The Badge Templates Listing page is displayed.
2. On the Badge Templates Listing page, click Add New Badge Template.
3. On the following page, give the badge template a name.
4. Enter the size of the badge in pixels.
5. Click the BG Color field to select a different background color.
When the color palette is displayed, select a color from the palette or manually enter the color in RGB,
HSV or hex code format.
6. In the Opacity field, define how opaque you want the background color to be.
7. If the badge or card will be double-sided, check the Two Sided check box.
NOTE: Only printers that support double-sided printing will be able to print two-sided cards.
If you selected the Two Sided option, click Back Side at any time to add elements to the back of the
badge or card.
8. Add the required badge layout elements.
The elements are placeholders that define what type of information will be used for each identity badge
or card.
l
Click Add Picture to add a photograph of the identity to the badge. You can only add one picture
to the badge template.
l
Click Add Graphic to add any other type of image to the badge. This can include a logo or icon.
l
Click Add DB Field to add specific information about the identity, like their name or department.
l
Click Add Text to add a line of text, like the company name or a slogan.
9. Define the size and location of each element.
l
l
If you can adjust the size of the element, manually enter the size in pixels.
To move the element, you can click and drag the element on the canvas or manually enter the
location in pixels. 0 x 0 would place the element in the top left corner.
10. To remove an element from the canvas, click
11. Click
beside the element details.
to save your changes and update the preview.
Adding a Badge Template
214
Editing a Badge Template
1. Select
> Badge Designer.
The Badge Templates Listing page is displayed.
2. On the Badge Template Listing page, click the name of the badge template that you want to edit.
3. Make any changes that are required.
4. Click
to save your changes and update the preview.
Duplicating a Badge Template
You can duplicate an existing badge template instead of creating one from scratch.
1. Select
> Badge Designer.
The Badge Template Listing page is displayed.
2. On the Badge Template Listing page, click
for the badge template that you want to duplicate.
The Badge Template Listing page refreshes to display a duplicate.
3. Click the name of the duplicate.
4. Rename the badge template.
5. Edit the details as required, then click
to save your changes and update the preview.
Deleting a Badge Template
1. Select
2. Click
>Badge Designer.
for the badge template that you want to delete.
3. When the browser displays a pop-up message to ask Are you sure?, click OK.
Badge Designer - Changing the Badge Background Color
When you open a new badge template or edit an existing one, the canvas background data fields appear at the
top of the left column like this example:
Editing a Badge Template
215
To change the background color and opacity:
1. Click on the BG Color box.
The color palette appears.
2. Change the color as required then click Close Window in the upper right corner to return to the canvas.
3. In the Opacity text box, enter the percentage of opacity your require for this background color.
4. When you are certain of your color and opacity, click
.
The canvas background changes and the preview pane appears with the changes reflected.
Color Palette
When you click a color field, like the Badge Designer background feature, the color palette appears like this
example:
Color Palette
216
To use this palette to select a specific color:
1. From the HSV or RGB color fields, enter the general color you require.
All possible tints and variations of this color appear to the left in the tint area.
The new color you have selected appears on the right side of the horizontal bar above the color element
fields. The original color appears to the left.
2. To fine-tune the color, click within the tint area.
A cross appears. Drag the cross through the area to determine the exact color you want. indicating the
exact tint and shade you have selected like the following example:
Color Palette
217
The number in the Color field changes to reflect your choice.
3. If required, slide up or down the vertical slide bar to change the color still further.
4. When you're finished with this palette, click OK.
5. Click the
icon to impose the new color on the canvas or other element.
External Systems - Introduction
The Access Control Manager system can connect and integrate with external systems to provide video or
power backup support.
NOTE: Some external systems may not be available if your system does not have the required license.
Before you can connect and use the external systems, the external system must be installed and accessible to
the appliance over the local network.
External Systems - Adding
In order to add photos to the Identities database or record video for surveillance, you must first add cameras to
the system.
NOTE: Before you can add a camera or video device, you must first connect a supported device to your
network or server, then configure the device as described in your device user's guide. Make sure to write down
the camera's IP address and onboard URL.
You can add individual cameras or you can add whole network video systems that can be configured to work
with doors and events in the Access Control Manager system.
This procedure also applies to adding LifeSafety power supplies.
External Systems - Introduction
218
1. Select
> External Systems.
2. Select the tab for the external system you want to add.
3. From the External Systems listing page, click
.
4. In the following page, complete the required fields to add the new external system.
5. Click
to save the new external system.
External Systems - Editing
1. Select
> External Systems.
2. Select the tab for the type of external system you want to edit.
3. From the External Systems listing page, click the name or address of the specific system you want to edit.
4. In the following page, make the required changes.
5. Click
to save your changes.
External Systems - Deleting
Deleting an external system does not remove it from your system, it will simply prevent the appliance from
communicating with the external system. You may still need to uninstall the external system as required.
1. Select
> External Systems.
2. Select the tab for the type of external system you want to delete.
3. From the listing page, click
beside the system you want to delete.
4. When the confirmation message is displayed, click OK.
External Systems - Integrating an ACM Appliance into an ACC™ Site
An ACM appliance can be integrated into an ACC site so that events occurring in the ACM software can trigger
rules in the ACC software to initiate actions. For example, door events in the ACM software can trigger a rule that
allows an ACC operator to grant door access, or an input event from a panic button or motion sensor in the ACM
software can trigger a live camera feed, or video recording.
To integrate an ACM appliance, a special identity to interact with the ACC software must be created by an ACM
administrator. This identity must be assigned a special role and delegation with specific rights, and a routing
group that specifies the events that the ACC software recognizes. Only one identity must be created for this
purpose.
A preconfigured role and delegation with the necessary rights are available for this special identity that is
suitable for most integration scenarios. The role and delegation are both called ACC Administrator. However, if
this special identity needs additional rights, you will have to modify the rights associated with the delegation, or
configure a new role and delegation. The routing group has to be configured, and optionally if you plan to
import Active Directory users through ACM, you will have to configure remote authentication.
Use the following steps to configure an identity to interact with the ACC software:
External Systems - Editing
219
1. Examine the rights assigned to the preconfigured ACC Administrator delegation:
l
Appliance Listing
l
Delegations Listing
l
Doors Listing
l
Identities Login - Remote
l
Inputs Listing
l
Panel Listing
l
Roles Listing
l
Subpanel Listing
l
System Summary Listing
2. If additional rights are required, such as the Partitions right because your ACM installation is partitioned
and you want the ACC Client to access the partitions, you must add these rights to this delegation, or
create a new delegation with the rights assigned to the preconfigured ACC Administrator delegation to
use instead of the preconfigured role.
3. Create a routing group for working with the ACC software.
a. Specify the following for the group:
l
Schedule: 24 Hours Active
l
Schedule Qualifier: Appliance
l
The Installed box must be checked
b. Add the following event types to the routing group:
l
Door held open
l
Forced Door
l
Intrusion
l
Invalid Credential
l
Maintenance
l
System
l
Tamper
l
Valid Credential
4. If you created a new delegation to use instead of the preconfigured ACC Administrator delegation, you
also need to modify the preconfigured ACC Administrator role, or create a new role that allows the ACC
software to communicate with the ACM system.
a. If you modify the preconfigured ACC Administrator role, under the role's Delegate tab, assign only
the new delegation that was created to replace the preconfigured ACC Administrator delegation.
b. If you create a new role:
l
l
l
Keep the default Parent and Start Date values for the role.
Under the role's Delegate tab, assign only the delegation that was created in the preceding
steps.
Under the Routing tab, assign only the routing group that was created in the preceding
External Systems - Integrating an ACM Appliance into an ACC™ Site
220
steps.
l
The Installed box must be checked.
5. If you plan to import Active Directory users through ACM, configure remote authentication from external
domains.
6. Create a dedicated identity for interacting with the ACC software.
To protect the security of the connection between the ACM and ACC systems, the dedicated identity
should only have the permissions outlined in this procedure.
l
Assign a Last Name, Login, and Password for the identity.
l
The password should meet the minimum password strength requirements for your ACC site.
The password strength is defined by how easy it is for an unauthorized user to guess. It is highly
recommended that you select a password that uses a series of words that is easy for you to
remember but difficult for others to guess.
l
Under the identity's Roles tab, assign only the role that was created in the preceding step.
7. If your ACM system uses partitions, add the identity as a member of the partitions that you would need
access to from the ACC Client.
Once these settings are applied, an ACC Client can connect to the ACM appliance.
External Systems - Defining the Badge Camera for the System
Once all cameras or other imaging devices have been added as part of an external system, you can set which
camera to use when creating badges for identities.
1. Select
> My Account.
2. Under the Profile tab, select a camera from the Badge Camera drop down list:
l
Local Camera — Any camera connected directly to your computer or built into your computer or
monitor.
NOTE: Images cannot be captured with a local camera from an ACM client running in the Internet
Explorer or Safari web browsers, or running on a mobile device.
l
IP-based camera — Any IP-based camera previously connected to your network and added to
your ACM system.
3. When you're finished, click
.
Next time you create a badge, the selected camera is used to take the identity photo.
Bosch Intrusion Panels
The following procedures relate to Bosch intrusion panels.
Adding a Bosch Intrusion Panel
To add a new Bosch intrusion panel:
External Systems - Defining the Badge Camera for the System
221
1. Select
> External Systems.
2. Click the Bosch Intrusion tab.
3. Click
to add a new panel.
4. Complete the following fields:
l
Panel Name
l
Appliance
l
Address
l
Port
l
Automation Passcode
l
Application Passcode
l
Installed
5. Click Create.
NOTE: The Areas, Points, Outputs and Users are created from the panel, as configured in Bosch's Remote
Programming Software (RPS).
6. Click
beside the Panel name.
7. Select Areas. View the Area details.
8. Select Points. View the Point details.
9. Select Outputs. View the Output details.
10. Select Users. View the User details.
11. Click
.
Editing a Bosch Intrusion Panel
To edit/view a Bosch intrusion panel:
1. Select
> External Systems.
2. Click the Bosch Intrusion tab.
3. Review the panel status indicator to identify the current status of the panel.
4. Edit/view the following fields:
l
Panel Name
l
Appliance
l
Address
l
Port
l
Automation Passcode
l
Application Passcode
l
Installed
5. To view Area details, select Areas.
Editing a Bosch Intrusion Panel
222
6. To view Point details, select Points.
7. To view Output details, select Outputs.
8. To view User details, select Users.
Synchronizing Bosch Intrusion Panels
If intrusion panel information is updated externally to the ACM system (e.g. new identities being added in
Bosch's Remote Programming Software - RPS), then the panel will need to be re-synchronized to the ACM
system. When the panel is out of synch then a warning message (Warning, ACM and the Intrusion Panel are not
synchronized, go to Settings ->External Systems->Bosch Intrusion and resync) will display on the screens
available under the Monitor > Intrusion Status menu path.
To synchronize a Bosch intrusion panel:
1. Select
> External Systems.
2. Click the Bosch Intrusion tab.
3. Either:
l
Click
at the top level to synchronize all panels that are currently out of synch.
l
Click
beside the panel name to synchronize an individual panel.
Deleting a Bosch Intrusion Panel
To delete a Bosch intrusion panel:
1. Select
> External Systems.
2. Click the Bosch Intrusion tab.
3. Select the panel to be deleted.
4. Click
to delete the panel.
NOTE: The panel will be deleted and will disappear from this view.
Viewing Bosch Intrusion Panel Areas
To view Bosch intrusion panel areas:
1. Select
> External Systems.
2. Click the Bosch Intrusion tab.
3. Select a panel and click
.
4. View the areas details that display.
NOTE: Areas are not edited in the ACM system. All editing is done in Remote Programming Software
(RPS) and updated through the panel.
Viewing Bosch Intrusion Panel Points
To view Bosch intrusion panel points:
Synchronizing Bosch Intrusion Panels
223
1. Select
> External Systems.
2. Click the Bosch Intrusion tab.
3. Select a panel and click
.
4. Select Points.
5. View the point details that display.
NOTE: Points are not edited in the ACM system. All editing is done in Remote Programming Software
(RPS) and updated through the panel.
Viewing Bosch Intrusion Panel Outputs
To view Bosch intrusion panel outputs:
1. Select
> External Systems.
2. Click the Bosch Intrusion tab.
3. Select a panel and click
.
4. Select Outputs.
5. View the output details that display.
NOTE: Outputs are not edited in the ACM system. All editing is done in Remote Programming Software
(RPS) and updated through the panel.
Viewing Bosch Intrusion Panel Users
To view Bosch intrusion panel users:
1. Select
> External Systems.
2. Click the Bosch Intrusion tab.
3. Select a panel and click
.
4. Select Users.
5. View the user details that display.
NOTE: Users are not edited in the ACM system. All editing is done in Remote Programming Software
(RPS) and updated through the panel. However, users can be associated to identities tokens. For more
detail, refer to Assigning Bosch Intrusion Panel Users to Identities below.
NOTE: It may take several minutes to retrieve user information from the panel.
Assigning Bosch Intrusion Panel Users to Identities
Bosch intrusion panel users can be assigned to identities in the ACM system. This is done in order to allow users
the ability to arm/disarm areas. This can be done:
l
l
on a one-to-one basis (e.g. user 'Jane Smith' is associated to identity Jane Smith), or
on a one-to-many basis (e.g. user 'Administration Team' is associated to identities Jane Smith, Robert
Jones and Andrew Wilson).
Viewing Bosch Intrusion Panel Outputs
224
To assign users to identities, do the following:
1. Select Identities.
2. Search for the required identity and select it from the list that displays. For more detail, refer to Searching
for an Identity on page 45.
3. Click the Tokens tab.
NOTE: In order to save the changes on this page ensure that the Embossed Number and Internal
Number fields relating to the identity are completed.
4. In the Intrusion Users: Available the list select the user to add.
NOTE: The list displays username, ID of the user and panel name for each user. These details are
displayed to distinguish between users with the same or similar names.
5. Click
.
NOTE: The username, ID of the user and panel name displays in the Intrusion Users: Members list. To
remove an entry from this list, select the member and click
Users: Available list.
6. Click
to move the member to the Intrusion
.
Supported Bosch Intrusion Panels
Noted below are the details of the supported Bosch Intrusion Panels:
Panel
B3512
Details
Areas: 1
Custom Functions: 1
Keypads: 4
Events: 127
Passcode Users (+1 Installer): 10
Points: 16
Programmable outputs: 3
RF Points: 8
SKED Events: 1
Firmware version: 3.0.2 or greater
B4512
Areas: 2
Custom Functions: 2
Keypads: 8
Events: 127
Passcode Users (+1 Installer): 32
Supported Bosch Intrusion Panels
225
Points: 28
Programmable outputs: 27
RF Points: 20
SKED Events: 5
Firmware version: 3.0.2 or greater
B5512
Areas: 4
Custom Functions: 4
Keypads: 8
Events: 255
Passcode Users (+1 Installer): 50
Points: 48
Programmable outputs: 43
RF Points: 40
SKED Events: 5
Firmware version: 3.0.2 or greater
B6512
Areas: 6
Custom Functions: 6
Keypads: 8
Events: 1,000
Passcode Users (+1 Installer): 100
Points: 96 (8 on-board, 88 off-board and virtual)
Programmable outputs: 3
RF Points: 88
SKED Events: 6
Firmware version: 3.0.2 or greater
B9512G
Areas: 32
Custom Functions: 32
Keypads: 32
Events: 10,192
Passcode Users (+1 Installer): 2,000
Points: 599
Programmable outputs: 599
Supported Bosch Intrusion Panels
226
RF Points: 591
SKED Events: 80
Firmware version: 3.0.2 or greater
B8512G
Areas: 8
Custom Functions: 8
Keypads: 16
Events: 2,048
Passcode Users (+1 Installer): 500
Points: 99
Programmable outputs: 99
RF Points: 91
SKED Events: 40
Firmware version: 3.0.2 or greater
D9412GV4
Areas: 32
Custom Functions: 16
Keypads: 16
Events: 1,000
Passcode Users (+1 Installer): 999
Points: 246
Programmable outputs: 131
RF Points: 238
SKED Events: 40
Firmware version: Version 2.0 or greater
D7412GV4
Areas: 8
Custom Functions: 4
Keypads: 16
Events: 1,000
Passcode Users (+1 Installer): 399
Points: 75
Programmable outputs: 67
RF Points: 67
SKED Events: 40
Supported Bosch Intrusion Panels
227
Firmware version: Version 2.0 or greater
External Systems - ViRDI
When you select the ViRDI tab on the External Systems page, the ViRDI System Settings page is displayed.
Only one ViRDI system setting can be configured on an ACM server appliance. If a replication server is
deployed for this ACM server appliance, you can also configure ViRDI system settings for the replication server.
After the ViRDI server is installed, ViRDI Biometrics tokens can be created for identities, and the Biometrics
Enrollment Manager can be accessed to register fingerprints for ACM identities.
External Systems - ViRDI System Settings
When you click the ViRDI tab from the Avigilon Servers page, the ViRDI System Settings page is displayed.
This page allows you to create or delete the ViRDI system setting on an ACM server appliance.
Feature
Description
Appliance The appliance this server is connected to.
User
ID Range
The default minimum and maximum values are displayed. These values can be adjusted to meet
the requirements of your system, but must be within the initial default range of 1 to 99999999.
Avigilon recommends that you reserve a block of numbers within this range for use by the
ACM system and do not assign any of those numbers to real cards.
Accept the default port or enter a new port number.
Web
Service
Port
If you change this port number from the default port (9875), you must also change the
corresponding port number on every Biometric Enrollment (BE) Manager used for identity
enrollment.
Select one or more partitions.
Partitions allow you to define who can see or edit items in the system. If you do not select a
Partitions partition, anyone with access to the system can edit the item.
Only the partitions that have been defined in the system appear in this list. You can only see the
partitions that you are a member of. If no partitions are defined for this system, this pane is hidden.
Delete
Click to delete the server from the system.
Update
Click this button to add the ViRDI server to the system.
Maps - Introduction
Maps are a graphical representation of your access control system. You can import any image of your facility
into the Access Control Manager application then add doors, inputs, outputs and camera shortcuts so that user
access and events can be monitored in reference to where they occur.
Maps - Creating and Editing a Map
Maps can be used to help you visually locate where doors, cameras, inputs and outputs are located in your
facility. You can use any image in BMP, GIF, JPEG, PNG, PDF, TIP and WMF format as the base of the map.
External Systems - ViRDI
228
Maps are also used to display Mustering dashboard elements. For more information about setting up a
Mustering dashboard, see Mustering - Creating a Dashboard on page 153.
1. Select
> Maps.
2. To add a new map, click Add New Map Template.
a. On the following Maps Template: Add New page, enter a name for the map.
b. Click Browse then locate the image file that you want to use for the map.
If you are planning to create a Mustering dashboard, select the Use Blank Canvas check box to
use a blank background.
c. Enter the dimensions of the map in the Re-Size To fields.
NOTE: If you enter a size that matches the image's aspect ratio, the map image is re-sized
accordingly. If you enter a size that does not match the image's aspect ratio, the system centers
the image then crops the sides to match the defined setting.
d. Click
to save the new map template.
The page refreshes and displays the Map Template: Edit page.
3. To edit a map, click the name of a map template. The Map Template: Edit page is displayed.
4. In the Map Details area, click Add beside each item that you want to add to the map.
An icon that represents the new item is automatically added to the top left corner of the map and new
options are displayed.
a. Move the icon to the appropriate location on the map.
Tip: As you add more items, each icon is automatically added to the top left corner of the map. It is
recommended that you move each icon immediately to avoid losing track of each item.
b. In the Map Details area, select what the icon represents. Only items that have been configured in
the system are displayed in the drop down list.
5. Repeat the previous step until you've added all the items that are required.
6. To move an item on the map, click and drag the icon to the appropriate location.
7. To edit what an icon represents, locate the item in the Map Details list and select a new option from the
appropriate drop down list.
8. To delete an item from the map, click
beside the item in the Map Details area.
9. Click
to save your changes. It is recommended that you save frequently. Saving also causes the
page to refresh, so any changes have not been updated in the preview may appear after you save.
10. Click
to return to the Map Templates Listing page.
Maps - Linking Maps
You have the option of linking your maps together to provide different views and different levels of detail of the
same area. After you create each map, you can link them together by using the
option to define how the maps are linked together.
Maps - Linking Maps
Zoom In or
Zoom Out
229
For example, say an operator has detected an alarm in a building. His monitor displays the building's map,
showing the alarmed point, but he needs to get a closer look to confirm the exact position of the alarm. To do
this, he clicks
which is linked to a floor view. The floor view map appears with a closer view of the alarmed
point. Once he has taken care of the alarm, he can then click
resume general surveillance.
to return to the general building map and
Complete the following steps to link maps together:
1. Select
> Maps.
2. Create a map for each view that you want of your facility. For more information, see Maps - Creating and
Editing a Map on page 228.
3. From the Map Template Listing page, click the name of the map with the widest view of the facility.
4. On the Map Template Edit page, click Add beside the Zoom In option in the Map Details area.
5. In the following drop down list, select the map with the close-up view of the facility.
6. From the top left corner of the map, move the
icon to the area that the linked map represents.
7. Click
to save your changes.
8. Click
to return to the Map Template Listing page.
9. Click the name of the next map.
Select the map that you just linked to on the previous map.
10. On the Map Template Edit page, click Add beside the Zoom Out option in the Map Details area.
11. In the following drop down list, select the first map that you added a link from. Now the two maps are
linked back together.
12. From the top left corner of the map, move the
map expands from.
13. Click
icon to the edge of the map to show where the linked
to save your changes.
14. Repeat the previous steps until all your maps are linked together in a logical order.
Always use the
Zoom In icon to link a map with less detail (such as a building or campus) to a map with more
detail (like a floor or room). The
Zoom Out icon is meant to link a detailed map to a wider, less detailed map.
Use this procedure to create a series of links that progressively bore down to greater and greater granularity, or
telescope up to provide a larger view.
Using a Map
Once a map has been configured, it can be accessed from the Monitor screen and used as a quick visual
reference to all the items that may be installed in a facility.
From the map, you can monitor the status of hardware items, inputs and outputs, control doors and keep track of
identities as they arrive at muster stations from the Mustering dashboard. The map also notifies you if there is an
alarm by displaying a red alarm indicator.
Using a Map
230
1. Select Monitor > Maps. The Map Templates page displays.
2. In the Map Templates Listing page, click the name of a map.
The map is displayed. Some of the displayed elements may not appear in your map.
Figure 18: Example map
To...
Review
hardware
status
Do this...
The colored bar below each item displays an overview of the current communication and
power status. Click the icon on the map to display the control menu.
For more information about the colored hardware status bar, see the specific hardware
status page.
For more information about the status colors, see Status Colors on page 36.
Review an
alarm
If you see a red alarm indicator, the item on the map is in an alarm state. Click the alarm
indicator to see the status details.
For more information about alarm actions, see Monitor Alarms on page 23.
Click
l
Control a
door
l
l
Using a Map
on the map to display the door control menu, then click any of the following:
Disable — disable the door.
Unlock — unlock the door. This door will remain unlocked until the Restore
command is issued.
Lock — lock the door. This door will remain locked until the Restore command is
issued.
231
To...
Do this...
l
Grant — grant access to the person who is at the door. The door is temporarily
unlocked to permit a one time entry through the door.
l
Restore — reset the door mode to its configured value.
l
Mask Held — mask the Door Held Open Alarm.
l
Unmask Held — unmask the Door Held Open Alarm.
l
Mask Forced — mask the Door Forced Open Alarm.
l
Unmask Forced — unmask the Door Forced Open Alarm.
l
Trace — display the event transactions for the door.
Viewing live video, recorded video, notes, instructions, identities, and history can
be performed on the event transactions.
To hide the control menu, click the icon again.
Click the
l
Panels
Control a
panel or
subpanel
l
on the map to display the panel control menu, then click any of the following:
o
Download Params — download the latest system configurations to the
panel.
o
Tokens — download the tokens to the panel.
o
Reset/Download — reset and download the current system configuration to
the panel.
o
APB Reset — resets all panel and area counts to zero.
o
Clock — re-sync the panel time.
o
Trace — display the event transactions for the panel.
Subpanels
o
Trace — display the event transactions for the subpanel.
Viewing live video, recorded video, notes, instructions, identities, and
history can be performed on the event transactions.
To hide the control menu, click the icon again.
Click the
Control an
input
on the map to display the input control menu, then click any of the following:
l
Mask — mask the input.
l
Unmask — unmask the input.
To hide the control menu, click the icon again.
Click the
following:
Control an
output
Using a Map
on the map to display the output control menu, then click any of the
l
On — activate the output.
l
Off — deactivate the output.
l
Pulse — pulse the output.
232
To...
Do this...
To hide the control menu, click the icon again.
Display
video
Click the
Open a
linked map
Click
Execute a
global action Click
on the map to display the Camera Video window.
to display a linked map, or
to display a linked map.
to execute the configured global action.
If there is a Mustering dashboard configured on the map, it may appear as a line of text or
as a shape with text inside.
Monitor the
dashboard
The dashboard displays the number of identities in the area and may include the name of
the area. In the example image, the dashboard is the gray square.
Click the dashboard to see a list of all the identities that are in the area. Click outside the
pop-up dialog to hide the identities list. Click the First Name or Last Name to view the
identity.
Using a Map
233
Setting Personal Preferences
To set up your personal preferences, select
> My Account from the top-right. Navigate through the tabbed
pages and edit the details as required. The tabbed pages include:
l
Profile: use this page to edit your account details and preferences.
l
Batch Jobs: use this page to view the batch jobs that have been run from your account.
l
Job Specification: use this page to add, edit, activate/ deactivate, or delete batch jobs.
Changing the Password in My Account
While you are logged into the system, you can choose to change your password any time from the My Account
page.
1. In the top-right, select
> My Account.
2. On the following Profile page, enter your current password in the Old Password field.
3. In the Password field, enter your new password.
As you enter your new password, the status bar underneath will tell you the strength of your password.
Red is weak, while green is very strong. Use a combination of numbers, letters, and symbols to increase
the password strength. The password must be at least four characters long.
4. Click
to save your new password.
A system message tells you that you will be logged out.
5. When the login screen appears, log in with your new password.
Scheduling Batch Jobs
Batch jobs are processes, such as generating reports, that are performed automatically, according to a
schedule.
From the Job Specification page, you can create the following batch jobs:
Generating a Batch Report
Batch reports are custom reports generated on a schedule and which can contain more data than current reports
generated from the rReports Listing page, the Report Edit page or from the Report Preview page.
There are no length limits on any batch reports generated in the CSV spreadsheet format. In PDF format, the
Audit Log report is limited to 13,000 records, the Identity Summary Report is limited to 100,000 records, and the
Transaction Report is limited to 50,000 records.
Perform this procedure to generate a custom report on a schedule.
Setting Personal Preferences
234
1. Select
>My Account and click the Job Specification tab.
The Job Specification page is displayed.
2. Click the
Add button.
The Job Specification - General dialog box is displayed.
3. In the Appliance drop down list, select the appliance on which this job will run.
Only those appliances previously defined for this system appear in this option list.
If only one appliance is used for this system (the default), this field is automatically populated.
4. In the Name field, enter a name for this batch job.
5. From the Type drop down list, select Report.
After you select the job type, additional options are displayed.
l
From the Report drop down list, select the report you want to batch.
Only custom reports appear in this list.
l
From the Output Format drop down list, select the format in which you want this job generated.
6. Click Next.
The following screen shows the select report definition. Click Back to select a different report.
7. Click Next to continue.
8. On the following page, select how often the batch report is generated. From the Repeat drop down list,
select one of the following options:
l
l
l
l
l
Once —- The report will be generated once. Click the On field to display the calendar and select a
specific date and time.
Hourly — The report will be generated at the same minute of every hour. Enter the minute when
the report is generated at each hour. For example, if you want the report generated at 1:30, 2:30,
etc. then you would enter 30.
Daily — The report will be generated every day at the same time. Enter the specific time when the
report is generated in 24 hour time format.
Weekly — The report will be generated each week on the same day and time. Select the check
box for each day the report will be generated, and enter the specific time in 24 hour format.
Monthly — The report will be generated each month on the same day and time. Select the days
when the report is generated and enter the specific time in 24 hour format. Shift + click to select
a series of days, or Ctrl + click to select separate days.
9. Click Next.
A summary is displayed.
Select the Send Email check box if you want to receive an email copy of the report after it has been
generated. In the following field, enter your email address.
10. Click Submit to create this job.
Generating a Batch Report
235
11. To activate or deactivate this job, select the job and click
Activate/Deactivate
Applying Identity Profile to Groups
When you choose to create an Identity Update job, you have the option to apply a new, updated or temporary
identity profile to a group.
After you make changes to an identity profile, the identities created from the identity profile are not
automatically updated, you need to perform this job to apply the changes.
You can apply a temporary identity profile to a group by using the Off Identity Profile option. Once the new
identity profile expires, the original identity profile is applied.
NOTE: The group must be created before the identity profiles can be applied to the group. If the required
groups have not been created, contact your System Administrator.
1. Select
> My Account and click the Job Specification tab.
The Job Specification page appears.
2. Click the
Add button.
The Job Specification dialog box is displayed.
3. In the Appliance drop down list, select the appliance on which this job will run.
Only those appliances previously defined for this system appear in this option list.
If only one appliance is used for this system (the default), this field is automatically populated.
4. In the Name field, enter a name for this batch job.
5. From the Type drop down list, select Identity Update.
After you select the job type, additional options are displayed.
l
l
l
l
From the Group drop down list, select the group of identities that you want to change.
From the Identity Profile drop down list, select the identity profile that you want to apply to the
group.
From the Off Identity Profile drop down list, you have the option to select to an alternative identity
profile when the first identity profile expires.
From the Output Format drop down list, select the format for the report that is generated when
the job is complete.
6. Click Next to continue.
7. On the following page, select how often this batch job is run. From the Repeat drop down list, select one
of the following options:
If you selected an Off Identity Profile, you will have the option to enter when the Off profile is applied.
Otherwise, only the On field is displayed.
Applying Identity Profile to Groups
236
l
l
l
l
l
Once —- The batch job is run once. Click the On field to display the calendar and select a specific
date and time.
Hourly — The batch job is run at the same minute of every hour. Enter the minute when the batch
job is run at each hour. For example, if you want the job to run at 1:30, 2:30, etc. then you would
enter 30.
Daily — The batch job is run every day at the same time. Enter the specific time when the job is run
in 24 hour time format.
Weekly — The batch job is run each week on the same day and time. Select the check box for
each day the job will run, and enter the specific time in 24 hour format.
Monthly — The batch job is run each month on the same day and time. Select the days when the
job will run and enter the specific time in 24 hour format. Shift + click to select a series of days, or
Ctrl + click to select separate days.
8. Click Next.
A summary is displayed.
9. Click Submit to create this job.
10. To activate or deactivate this job, select the job and click
Activate/Deactivate.
Scheduling a Global Action
Perform this procedure to schedule global actions.
NOTE: The global actions must be created before they can be scheduled. If the required global actions have
not been created, contact your System Administrator.
1. Select
>My Account and click the Job Specification tab.
The Job Specification page appears.
2. Click the
Add button.
The Job Specification dialog box is displayed.
3. In the Appliance drop down list, select the appliance on which this job will run.
Only those appliances previously defined for this system appear in this option list.
If only one appliance is used for this system (the default), this field is automatically populated.
4. In the Name field, enter a name for this batch job.
5. From the Type drop down list, select Global Action.
After you select the job type, additional options are displayed.
l
l
From the Global Action drop down list, select global action to perform. Only configured global
actions will appear on the list.
From the Off Global Action drop down list, you have the option to select to a global action that is
Scheduling a Global Action
237
performed after the first global action expires.
l
From the Output Format drop down list, select the format for the report that is generated when
the job is complete.
6. Click Next to continue.
7. On the following page, select how often this batch job is run. From the Repeat drop down list, select one
of the following options:
l
l
l
l
l
Once —- The batch job is run once. Click the On field to display the calendar and select a specific
date and time.
Hourly — The batch job is run at the same minute of every hour. Enter the minute when the batch
job is run at each hour. For example, if you want the job to run at 1:30, 2:30, etc. then you would
enter 30.
Daily — The batch job is run every day at the same time. Enter the specific time when the job is run
in 24 hour time format.
Weekly — The batch job is run each week on the same day and time. Select the check box for
each day the job will run, and enter the specific time in 24 hour format.
Monthly — The batch job is run each month on the same day and time. Select the days when the
job will run and enter the specific time in 24 hour format. Shift + click to select a series of days, or
Ctrl + click to select separate days.
NOTE: If you selected an Off Global Action, you will have the option to enter when the Off action occurs.
Otherwise, only the On field is displayed.
8. Click Next.
A summary is displayed.
9. Click Submit to create this job.
10. To activate or deactivate this job, select the job and click
Activate/Deactivate.
Setting Batch Door Modes
Perform this procedure to change the door mode for a set of doors.
1. Select
>My Account and click the Job Specification tab.
The Job Specification page appears.
2. Click the
Add button.
The Job Specification dialog box is displayed.
3. In the Appliance drop down list, select the appliance on which this job will run.
Only those appliances previously defined for this system appear in this option list.
If only one appliance is used for this system (the default), this field is automatically populated.
4. In the Name field, enter a name for this batch job.
5. From the Type drop down list, select Door Mode.
After you select the job type, additional options are displayed.
Setting Batch Door Modes
238
l
l
l
l
l
From the Available list, select the required doors then click
to add it to the Members list.
From the On Door mode drop down list, select the door mode that you want to apply to the
selected doors.
From the Off Door mode drop down list, select the door mode that you want to apply to the doors
when the On action is complete.
From the Output Format drop down list, select the format for the report that is generated when
the job is complete.
Select the Activate check box to make the door modes active.
6. Click Next to continue.
7. On the following page, select how often this batch job is run. From the Repeat drop down list, select one
of the following options:
l
l
l
l
l
Once —- The batch job is run once. Click the On field to display the calendar and select a specific
date and time.
Hourly — The batch job is run at the same minute of every hour. Enter the minute when the batch
job is run at each hour. For example, if you want the job to run at 1:30, 2:30, etc. then you would
enter 30.
Daily — The batch job is run every day at the same time. Enter the specific time when the job is run
in 24 hour time format.
Weekly — The batch job is run each week on the same day and time. Select the check box for
each day the job will run, and enter the specific time in 24 hour format.
Monthly — The batch job is run each month on the same day and time. Select the days when the
job will run and enter the specific time in 24 hour format. Shift + click to select a series of days, or
Ctrl + click to select separate days.
NOTE: If you selected an Off Door Mode, you will have the option to enter when the Off action occurs.
Otherwise, only the On field is displayed.
8. Click Next.
A summary is displayed.
9. Click Submit to create this job.
Setting Batch Door Modes
239
Permissions and Rights
The following table describes the permissions and rights the default Admin Role allows. All roles are made up of
delegations. Each delegation is made up of rights.
Permissions
Rights
System Summary Listing
System Summary Screen Refresh
System Summary Get Layout
System Summary Update Layout
View Events page
Monitor Listing
Monitor Notes Show
Monitor Instructions Show
Monitor Identity Show
Spork Listing
Spork Search
Search for events
Monitor/Search Filters Save
System Summary Get Layout
System Summary Update Layout
Alarm Monitor Listing
Monitor Notes Show
Monitor Instructions Show
View Alarms
Alarms Code Photo
Monitor View Actions
Maps-Alarms Show
Alarm Monitor Acknowledge
Alarm Monitor Clear
Alarms Create Notes
Respond to alarm activity
Alarm Monitor Acknowledge All
Alarm Monitor Clear All
Alarm Monitor Identity
Swipe & Show
View verifications
Swipe & Show Get Doors
Permissions and Rights
240
Permissions
Rights
Swipe & Show Get Door Name
Get Photo
Monitor Identity Show
System Summary Get Layout
System Summary Update Layout
Monitor Listing
Monitor Panels Status
View the status of assigned hardware
Monitor Periodic Update
Monitor Appliance Status
Doors Grant
Doors Disable
Doors Unlock
Doors Lock
Control assigned hardware
Doors Restore
Doors Mask Held
Doors Mask Forced
Doors Unmask Held
Doors Unmask Forced
Maps Monitor Listing
Maps Show
Maps Show Generate Image
View and monitor status on assigned maps
Maps Show Image
Maps View Listing
Maps Trace
Mustering dashboard drill-down
View the intrusion status
Monitor Intrusion Panel Status
Intrusion Panel Master Instant Arm
Intrusion Panel Master Delay Arm
Intrusion Panel Master Force Instant Arm
Control the assigned intrusion panels
Intrusion Panel Master Force Delay Arm
Intrusion Panel Perimeter Instant Arm
Intrusion Panel Perimeter Delay Arm
Permissions and Rights
241
Permissions
Rights
Intrusion Panel Perimeter Force Instant
Arm
Intrusion Panel Perimeter Force Delay
Arm
Intrusion Panel Away Arm
Intrusion Panel Force Away Arm
Intrusion Panel Disarm
Intrusion Panel Silence
Intrusion Point Bypass
Intrusion Point Unbypass
Intrusion Output Activate
Intrusion Output Deactivate
Cameras Show
View live and recorded video
Cameras Login
Monitor Cameras Show Video
Identities My Account
Identities Listing
Identities Show
Identities Advance Search
Identities Date Search
Identity Profiles Listing
Add new identities. Cannot update fields after initial identity setup
Identity Profiles Show List
Identities New
Identities Create
Identities Edit
Identity Profiles Populate Values
Identities Custom Layout Save
Identities Roles List
Add, modify, and update available roles
Identities Roles Update
Tokens Listing
Add, modify, and update tokens
Tokens Show
Tokens New
Permissions and Rights
242
Permissions
Rights
Tokens Create
Tokens Edit
Tokens Update
Tokens Set Free Pass
Identity Profiles Tokens Listing
Identities Groups List
Add and modify groups
Identities Groups Update
Identities Show Access
View assigned access permissions
Identity Profiles Show Access
Identities Image Capture
Identities Image Save
Capture live photos and save
Identities Code Image
Identities Photo Capture
Identities Photo Edit
Identities Photo Update
Add and upload photos
Identities Photo Render
Identities Upload Photo
View transactional data
Identities Transactions
Identities Badge Show
Identities Badge Screen
Identities Print Badge
Print and issue badges
Identities Badge Render
Identities Update Badge Preview
Identities Update Badge
Identities Photo List REST
Identities Photo Show REST
Identities Photo Create REST
Perform REST actions
Identities Photo Update REST
Identities Photo Delete REST
Appliance REST Generation
Transaction
View Identity Policies
Permissions and Rights
Identities Policies Show
243
Permissions
Rights
Identities Policies Listing
Identities Policies Create
Identities Policies Edit
Add, modify, and delete Identity Policies
Identities Policies New
Identities Policies Update
Identities Policies Delete
Reports Index
Report Show
View reports
Grant Access/Report
Reports Show Grid
Reports Custom Reports
Reports Edit
Reports New
Reports Create
Edit, preview, generate, and delete reports
Reports Get Report Preview
Reports Quick Report
Reports Dynamic Criteria
Reports Destroy
Doors Listing
Doors Show
Interlocks Listing
Doors Show Status
Doors Effective Policy
Doors Events List
View Doors
Doors Policy
Access Levels Listing
Access Levels Show
Firmware Listing
Macro Commands Listing
Macro Commands Show
Panels Listing
View Panels
Panels Show
Permissions and Rights
244
Permissions
Rights
Triggers Listing
Panels Show Status
Panel Effective Policy
Panel Event List
Firmware Apply View Log
View EOL Resistance
Resistance Levels Listing
Areas Listing
View Areas
Areas Show
Card Formats Listing
View Card Formats
Card Formats Show
Doors New
Doors Edit
Doors Create
Doors Update
Doors New/Edit Appliance Change
Doors New/Edit Manuf Change
Doors Grant
Interlocks New
Interlocks Create
Interlocks Edit
Add and modify Doors
Interlocks Update
Interlocks Type Change New/Edit
Interlocks Subpanel Change New/Edit
Interlocks Trans Change New/Edit
Interlocks Command Change New/Edit
Interlocks Arg1 Change New/Edit
Interlocks Arg2 Change New/Edit
Interlock Trx Code Change New/Edit
Doors Disable
Doors Unlock
Doors Lock
Permissions and Rights
245
Permissions
Rights
Doors Download Status
Doors - Download Parameters
Doors - Reset
Doors - Download Tokens
Doors Restore
Doors Mask Held
Doors Mask Forced
Interlocks with Type
Doors Unmask Forced
Doors Unmask Held
Doors Cmacro Save
Doors Cmacro Type Change
Doors Cmacro Op Type Change
Doors Transactions
Doors Assign Camera Type Change
Doors Event Create
Doors Event Edit
Doors New/Edit Avail HW
Doors Elevator I/O Naming
Doors Edit - Panel Change
Firmware New
Firmware Create
Firmware Apply
Macro Commands New
Macro Commands Edit
Macro Commands Create
Macro Commands Update
Panels New
Panels Edit
Add and modify Panels
Panels Create
Panels Update
Permissions and Rights
246
Permissions
Rights
Panels Appliance Change New/Edit
Panels Manf Change New/Edit
Panels Status Details
Panels Send Commands
Panels Parameters Download
Panels Tokens Download
Panels Reset Download
Triggers New
Triggers Edit
Triggers Create
Triggers Update
Triggers New/Edit Macro Change
Triggers New/Edit Type Change
Triggers New/Edit Subpanel Change
Triggers New/Edit TrxType Change
Triggers New/Edit Category Change
Trigger New/Edit Trx Code Change
Panel Rebuild Access Levels
Panel Download Status
Macro Commands Name Change
Panels Model Change New/Edit
Panels Set Free Pass
Panels Event Create
Panels Event Edit
Area New
Area Edit
Add and modify Areas
Area Create
Area Update
Resistance Levels New
Add and modify EOL Resistance
Resistance Levels Edit
Resistance Levels Create
Permissions and Rights
247
Permissions
Rights
Resistance Levels Update
Card Formats New
Card Formats Edit
Card Formats Create
Add and modify Card Formats
Card Formats Update
Card Formats New/Edit Change Format
Card Format Type Change
Doors Delete
Interlocks Delete
Doors Cmacro Remove
Doors Event Delete
Firmware Delete
Delete hardware
Macro Commands Delete
Panels Delete
Triggers Delete
Panel Events Delete
Resistance Levels Delete
Card Formats Delete
Events Listing
Events Show
Events Colors Listing
Events Colors Show
Subpanels Event List
View Events
Inputs Event List
Outputs Event List
Event Logs Show
Event Logs Listing
Event Policies Show
Event Policies Listing
Events New
Edit Events
Events Edit
Permissions and Rights
248
Permissions
Rights
Events Create
Events Update
Event Colors New
Event Colors Edit
Event Colors Create
Event Colors Update
Subpanels Event Create
Subpanels Event Edit
Inputs Event Create
Inputs Event Edit
Outputs Event Create
Outputs Event Edit
Change Event Type
Event Logs Create
Event Logs Edit
Event Logs New
Event Logs Update
Event Policies Create
Event Policies New
Event Policies Edit
Event Policies Update
Events Delete
Events Colors Delete
Subpanels Event Delete
Delete Events
Inputs Event Delete
Outputs Event Delete
Event Logs Delete
Event Policies Delete
Global Action Listing
View Global Actions
Global Action Show
Edit Global Actions
Permissions and Rights
Global Action New
249
Permissions
Rights
Global Action Edit
Global Action Create
Global Action Update
Global Action Edit Type Change
Global Action Execute
Delete Global Actions
Global Action Destroy
Global Linkage Listing
View Global Linkages
Global Linkage Show
Global Linkage New
Global Linkage Edit
Global Linkage Create
Global Linkage Update
Edit Global Linkages
Global Linkage Edit Device Type
Global Linkage Edit Token Search
Global Linkage Edit Token Adv Search
Global Linkage Remote Execute
Delete Global Linkages
Global Linkage Destroy
Roles Listing
Roles Show
View Roles
Roles Show Access
Roles Default Update
Area Policies Listing
Area Policies Show
Area Policies Listing
View Policies
Area Policies Show
Policies Listing
Policies Show
Groups Listing
View Groups
Groups Show
Access Groups Listing
View Access Groups
Access Groups Show
Access Group Show Access
Permissions and Rights
250
Permissions
Rights
Delegations Listing
View Delegations
Delegations Show
Partitions List
View Partitions
Partitions Show
Routing Group Listing
View Routing Groups
Routing Group Show
View Elevator Access Levels
Elevator Access Listing
Roles New
Roles Edit
Roles Create
Add and modify Roles
Roles Update
Roles Assign Ports
Roles Assign Groups
Area Policies New
Area Policies Edit
Area Policies Create
Area Policies Update
Door Policies New
Door Policies Edit
Add and modify Policies
Door Policies Create
Door Policies Update
Policies New
Policies Edit
Policies Create
Policies Update
Groups New
Groups Edit
Groups Create
Add and modify Groups
Groups Update
Groups Member Assign
Groups Policies Assign
Groups/Identity Advanced Search
Permissions and Rights
251
Permissions
Rights
Groups/Identity Advanced Criteria
Access Groups New
Access Groups Edit
Add and modify Access Groups
Access Groups Create
Access Groups Update
Access Groups Door Assign
Add and modify Delegations
Delegations Edit
Routing Group New
Routing Group Edit
Routing Group Create
Add and modify Routing Groups
Routing Group Update
Routing Group Update Groups
Routing Group Update Types
Elevator Access New
Elevator Access Create
Add and modify Elevator Access Levels
Elevator Access Edit
Elevator Access Update
Area Policies Delete
Door Policies Delete
Policies Delete
Delete Policies, Groups, Access Groups, Routing Groups, Elevator
Access Levels
Groups Delete
Access Groups Delete
Routing Groups Delete
Elevator Access Delete
Appliances Listing
Appliances Show
Appliance Ports Listing
Serial Ports Listing
View Appliance
Routes Listing
Routes Show
Appliance Software Listing
Appliance Virtual Port List
Permissions and Rights
252
Permissions
Rights
Appliance Software View Log
Appliance Backup Listing
Appliance Backup Show
Appliance Status Display
Appliance Log Show
Appliance Backup Directory List
Appliances New
Appliances Edit
Appliances Create
Appliances Update
Appliance Ports Edit
Appliance Ports Update
Serial Ports Edit
Serial Ports Update
Routes Edit
Routes New
Routes Create
Routes Update
Add and modify Appliances
Appliance Log
Appliance Log Update
Appliance Software New
Appliance Software Create
Appliance Software Apply
Appliance Set System Date Time
Appliance Backup Edit
Appliance Backup Create
Appliance Backup/Show Files
Appliance Set Free Pass
Appliance Show system Time
Appliance Backup View Log
Appliance Email Test
Permissions and Rights
253
Permissions
Rights
Appliance Repl Subscription Add
Appliance Repl Subscription Add
(remote)
Appliance Repl Subscription Remove
(remote)
Appliance Failover
Appliance Failback
Appliance Replication Update
Appliance Replication Status
Run Backup Now
Appliance Transaction Replication
Status
Appliance Backup Directory List,
remote
Appliance Backup Type USB
Node Server Status Check
Appliances Delete
Delete Appliance
Routes Delete
Appliance Software Delete
Schedules Listing
Schedules Show
Holidays Listing
Holidays Show
View System Setup
Event Types Listing
Event Types Show
Get Event Types for Device
Get Alarm Types for Device
Schedules New
Schedules Edit
Schedules Create
Add and modify System Setup
Schedules Update
Holidays New
Holidays Edit
Permissions and Rights
254
Permissions
Rights
Holidays Create
Holidays Update
Event Types New
Event Types Edit
Event Types Create
Event Types Update
Schedules Delete
Delete System Setup
Holidays Delete
Event Types Delete
User Defined Tabs Listing
User Defined Tabs Show
View User Fields and User Lists
User Defined Fields Listing
User Defined Fields Show
User Lists Index
User Defined Tabs New
User Defined Tabs Edit
User Defined Tabs Create
User Defined Tabs Update
User Defined Tabs Edit/Assign
Add and modify User Fields and User Lists
User Defined Fields New
User Defined Fields Edit
User Defined Fields Create
User Defined Fields Update
User Lists Edit
User Lists Update
User Defined Tabs Delete
Delete User Fields and User Lists
User Defined Tabs Delete
External Domains Show
View System Settings
External Domains Index
System Settings Index
System Settings Update
Add and modify System Settings
System Settings Edit
Permissions and Rights
255
Permissions
Rights
External Domains Update
External Domains Edit
External Domains New
External Domains Create
External Domains List Certificates
External Domains Create Certificates
External Domains Load Certificates
System Settings Edit (in place)
System Settings Enhanced Access
Level
External Domains Destroy
Delete System Settings
External Domains Destroy Certificates
Badge Templates Listing
View Badge Designer
Badge Templates Show
Badge Templates New
Badge Templates Edit
Badge Templates Create
Badge Templates Update
Add and modify badge templates in the Badge Designer
Badge Templates Generate Image
Badge Templates Add Details
Badge Template Copy
Badge Template Preview
Delete badge templates in the Badge Designer
Badge Templates Delete
Image Devices Listing
Image Devices Show
Exacq Server List
Exacq Show
View External Systems
External Systems Listing
External Systems Show
Avigilon Show
Avigilon Server List
Salient Server List
Permissions and Rights
256
Permissions
Rights
Salient Server Show
Salient Cameras List
Milestone Server List
Milestone Server Show
Avigilon Server Camera List
Avigilon Server Status
Intrusion Panel Listing
Intrusion Panel Show
Intrusion Panel Detail Listing
Image Devices New
Image Devices Edit
Image Devices Create
Image Devices Update
Exacq Server Create
Exacq Server Edit
Exacq Server New
Exacq Update
External Systems Edit
External Systems Update
External Systems New
Add and modify External Systems
External Systems Create
Avigilon Server Create
Avigilon Server Edit
Avigilon Server New
Avigilon Update
Salient Server New
Salient Server Create
Salient Server Edit
Salient Server Update
Salient Cameras PTZ Control
Milestone Server New
Permissions and Rights
257
Permissions
Rights
Milestone Server Edit
Milestone Server Create
Milestone Server Update
Avigilon Server Cameras
Avigilon Server Add/Update Cameras
Intrusion Panel New
Intrusion Panel Create
Intrusion Panel Edit
Intrusion Panel Update
Intrusion Panel Detail Update
Image Devices Delete
Exacq Server Delete
External Systems Delete
Delete External Systems
Avigilon Server Remove
Salient Server Delete
Milestone Server Delete
Maps Listing
View Maps
Maps Show
Maps New
Maps Edit
Add and modify Maps
Maps Create
Maps Update
Maps Edit and Add Detail
Delete Maps
Maps Delete
Collaboration Listing
View Collaboration
Collaboration Show
Collaboration New
Collaboration Edit
Collaboration Create
Edit Collaboration
Collaboration Update
Collaboration Type Change New/Edit
Collaboration Assign Event Types
Permissions and Rights
258
Permissions
Rights
Collaboration Connection Test
Collaboration Table Change
Collaboration Database Search
Collaboration Edit (gw-change)
Collaboration Identity Write/Logs
Collaboration Identity Read/Logs
Identity Collabs Preview
Collaboration CSV Recurring, Directory
List
Collaboration CSV Recurring, remote
Delete Collaboration
Collaboration Delete
Identities MyAccount
Batch Job Specification Index
View account details, batch jobs, and job specifications
Batch Job Specification New
Batch Job Index
View Batch Update Schedules
Batch Job Specification Edit
Batch Job Specification Activate
Batch Job Specification PostProcess
Batch Job Specification
JobSpecificationList
Batch Job Specification Create
Batch Job Specification Update
Batch Job Create
Create, edit, and delete batch jobs and job specifications
Batch Job New
Batch Job Update
Batch Job List
Batch Job Output
Custom Report Schedule
Reset Custom UI Settings
System Settings Localize
Batch Job Specification Destroy
Permissions and Rights
259
Permissions
Rights
Batch Job Destroy
Permissions and Rights
260
Download PDF
Similar pages