SE 5850 Security Management System

Size: px
Start display at page:

Download "SE 5850 Security Management System"

Transcription

1 SE 5850 Security Management System DOS-Based Host Software A/E Guideform Specification Version 1.0

2 NOTES: The following A/E Guideform Specification conforms to CSI guidelines to provide Specifiers an easy way to include Westinghouse Security Electronics products in their specifications. The specifier should carefully select the portions of this document that fit the intended application. Feel free to consult with your Westinghouse Security Electronics systems integrator regarding your particular application. Optional feature choices are represented by items enclosed in brackets [ ]. This document is considered accurate through the date on the cover. For updated specifications, call Westinghouse Security Electronics at , or visit the WSE Web page at The following individuals and organizations contributed to this document: Editor/project team leader: - Brent A. Duncan, Marketing Publications Specialist Core team members: - Joe Bridgman, Area Sales Manager - Brian Giampaoli, Area Sales Manager - Joe Oesterle, US Sales Manager With contributions by: - Frank Binzoni, VP Sales & Marketing - Ken Butte, Project Manager/Readers and Cards - Bill Blasdell, VP Engineering - James Collins, Senior Design Engineer - Dana Frischer, Area Sales Manager - Susan Goldin, Technical Writer - Tim Hillbun, System Test & Evaluation Manager - Peter Keep, Marketing Services Manager - Steve Lever, Field Service Engineer - Troy Mickle, Marketing Communications Specialist - Jim Reeve, Software Engineer - Alec Ratliff, Field Service Engineer - Bill Richardson, Technical Instructor - Ping Saye, Design Enginerring Manager - Tony Smith, Software Engineer - George Souza, Project Team Director - Rick Sparks, Project Manager/Controllers - Matt Wenzel, Field Service Manager With special thanks to: - John Suhr, Engineering Director, Tomasi-Dubois & Assoc. Sec. Consultants - Construction Services Institute WSE 3/21/ ii SE 5850 Host Software

3 Table of Contents PART I GENERAL INTRODUCTION...1 A. This document describes the required Electronic Card Access and Security Management Host Management Software (Host Software or SE 5850)....1 B. This specification provides all information necessary to produce a complete proposal for a sophisticated, easy-to-use DOS-based electronic Host Software system. The appendixes contain hardware specifications necessary to select the proper equipment for an installation GENERAL DESCRIPTION...1 A. Host Software: Required Host Software shall: Be powerful and multi-functional with the ability to expand as project needs grow Be simple and economical enough to support a single site, yet powerful enough to manage a multi-site network Allow for future Software features to be added as management recognizes requirements Allow the operation of a Co-Session second terminal as an alternative Software operation or monitoring station Host Software shall be designed to control Westinghouse Security Electronics third and fourth-generation security architecture, and will fully support all of the following Controllers: ALTO 818 Series, SE 422 Series and NexSentry 4100 Series...1 B. Host Computer Hardware: [SE 5850 Host Software shall be bundled with a powerful Hewlett Packard XM3 computer that is configured to give Host Software optimum performance.] or [SE 5850 Host Software shall be a software-only package for use with a DOS-based IBM compatible computer with a Pentium processor.] See PART II.4.A for recommended hardware platform DESCRIPTION OF WORK...1 A. Installation: Installing the Security Management Software and bringing it to operational status requires the following major steps: Determine operational requirements and plan Software to implement them Install Controllers and related hardware Configure Controllers and 5850 to communicate with one another Enter security system database Test security system communications and operation including CO- Sessions second terminal as required Train operators See section 2.03 for an expansion of this work summary SUBMITTALS...1 A. Block Diagram: Submittals shall include a block diagram detailing all connected devices. This document shall be adequate to ensure that all parties involved can determine that the recommended Software meets security system requirements QUALITY ASSURANCE...1 A. Computer workstation: If Software Host is bundled with a Hewlett-Packard PC workstation or approved alternative, hardware shall meet UL and FCC requirements for class A computing devices....1 B. Manufacturer: Manufacturer of products defined in this section must have: Industry experience: Company must have at least 20 years experience in manufacturing and servicing access management systems ISO 9001 Certification: Manufacturing process of company must meet stringent standards of ISO 9001 Certification WARRANTY...2 A. Computer workstation: The Host Computer hardware shall be warranted for at least 15 months from the date of shipment from the factory. The manufacturer shall support hardware repair for the system computer hardware through Hewlett-Packard s worldwide service organization...2 B. Software: The manufacturer shall directly support software for the selected system product family...2 WSE 3/21/ iii SE 5850 Host Software

4 C. Extended warranty: Extended warranty terms at reasonable rates shall be available from the installing dealer...2 D. System integrator: The system integrator shall be the focal point of all service problems or questions (with manufacturer s full support)...2 PART II PRODUCTS MANUFACTURER...2 A. Westinghouse Security Electronics 5452 Betsy Ross Drive Santa Clara, CA Telephone: Fax: B. Approve equal MANUFACTURED UNITS...2 A. The Access Management System shall consist of the following components: Host hardware: IBM compatible PC with Pentium processor running DOS system 3 or later and SE 5850 Host Software CI-1 & CI-8 Multiplexer Remote Interface to Westinghouse Security Adapters: Westinghouse Security Electronics Controller Printer: Parallel printer or serial printer Access Control/Alarm Monitoring: [Alto 818 Series Controller.] [SE 422 Series.] [NexSentry 4100 Series Controller.] EQUIPMENT...2 A. SE 5850 Architecture: Host Computer: CI-1 or CI-8 Multiplexer Adapter: The system may require one or more CI-1 or CI-8 multiplexers to allow the integration of up to 32 remote distributed intelligence Westinghouse Security Electronics Controllers into a multi-location network Communication interface: The SE 5850 shall connect to the Controller via the CI-1 or CI-8 through one of the following interfaces: RS232, RS485, or 20 ma (Controller dependent)....3 B. Software Platform: Operating System: MS-DOS Networking: Large scale or multi-location systems with security devices or computers distributed to remote locations while overall control of the network is maintained at a central location....3 C. Operator interface/operations: The required system shall fulfill the following requirements for operator monitoring and command functions: Sophisticated operator interface: The required Software shall provide a sophisticated, easy-to-operate interface for security operators. Multiple aspects of the system shall contribute to the effectiveness of the operator interface: System Password Protection/Control: Real-time alarm reporting and display: Real-time Status Reports: System status reports shall be available by: Override Command Capability: The system shall provide the operator the ability, based on password authorization, to override pre-set conditions. The overrides shall include: High Resolution Color graphics at operator console: Powerful Security System Diagnostic Software: feature shall provide operators with the ability to examine the status of the system components and communications. These capabilities are particularly useful for diagnosing suspected problems, including: Audit Trail of all Operator Activity:...4 D. System Management: The required system shall perform all of the following functions: Simple System Administration: Security System Hardware Definition: Define Security System Software: Maximum Database Capabilities: Maximum storage capabilities are limited by the application Database Download to Distributed Local Controllers: Powerful and Meaningful Reports: On-line Storage of Security Events: When the database approaches a selected percentage of its limit, the system shall issue an alert to inform the operator(s) of the condition and to recommend that the operator perform an archive to floppy disk Archiving of Security Events: Backup and Restoration of Security System definitions:...6 WSE 3/21/ iv SE 5850 Host Software

5 E. Access Control Operation: Common Requirements: Distributed Processing:...7 F. Alarm Monitoring Operation: When utilizing Westinghouse Security Electronics Controllers, the host computer shall monitor the alarm points in two states: secure or alarm. An end-of line resistance shall indicate the point is secure Configurable Alarm Instructions: Operator Alarm Response: Recall Alarm Activity: Monitor Point Status Display: Shunting/Unshunting Alarms and Alarm Points: The system shall provide the capability to shunt or unshunt alarm points via the following methods: COMPONENT DEFINITION...8 A. Recommended hardware platform: SE 5850 is available as a software-only option or it can be packaged with a Hewlett Packard XM3 PC with the following specifications. A comparable IBM Compatible PC is acceptable: Manufacturer/Model: Hewlett-Packard XM3 PC, or comparable IBM Compatible PC Microprocessor: Pentium, 50 Mhz, 32-bit Monitor: 256 Color, Super Video Graphics Adapter (SVGA); 110/220 VAC selectable, UL listed Input media: 1.44 MB diskette drive Mass Storage: 40 MB hard disk, or greater I/O Ports: 1 parallel port, 3 serial ports Keyboard: 101 enhanced keyboard (QWERTY). Foreign language keyboard options available Communications: RS-232, 3 (three) ports Approvals: UL, FCC Made in USA ACCESSORIES:...8 A. Printer: Parallel printer or serial printer...8 B. Communication Modems: Direct Connection: Conversion devices from 20 ma to RS-232: Power Management:...9 PART III EXECUTION FIELD QUALITY CONTROL:...9 A. Tests: A system integrator shall supply a proposed acceptance test procedure Testing the system shall be the sole responsibility of the system integrator Communications tests: Controllers to central terminal, local controller, or remote local controller...9 B. Inspection: The selected system integrator shall provide, on the job site, a factorytrained technician to assist, advise, or manage installing personnel The manufacturer shall also supply on-site inspection All final connections shall be made under the direct supervision of the system integrator....9 C. Field Service: A system integrator authorized by the manufacturer shall provide support for the selected system System integrator must be supported by large service-oriented manufacturers for the system hardware and software The system integrator shall determine and report all problems to the manufacturers customer service departments Support must be available to the integrator via phone inquiries or on-site visits if conditions require and are approved by the manufacturer s customer service manager If purchased, the manufacturer shall provide reliable field service support for the computer hardware utilizing Hewlett-Packard service The manufacturer shall also participate directly in on-site commissioning of new systems with integrator cooperation...9 WSE 3/21/ v SE 5850 Host Software

6 7. HP field service is available in a variety of forms for the customer. A system manufacturer that determines a hardware problem is occurring will contact HP to assist the integrator and customer to resolve the problem SCHEDULES...9 A. System Integrator Assisted Preparation: Data Requirements Operators & privileges Access Hardware Sensors Monitor Points Keyholders Keyholders security codes Maps Prepare room for system installation Receive equipment...9 B. System Installation: Install security management hardware System Integrator and manufacturer (when ordered) on-site commissioning Initial startup and verification Data entry Data entry listing & verification C. Verify Installation: Connect access control hardware to Security Management System Download data and verify correct operation Testing total access and management system Sample Reports Daily Operation and Monitoring Dealer deliver as built drawings...10 WSE 3/21/ vi SE 5850 Host Software

7 SE 5850 Security Management Host Software Database Capacities Summary Summary: SE 5850 is DOS-based single-user, multisite capable access management host software package designed to manage access and security solutions for small to medium-sized applications. Cardholders: 50,000 1 Key Groups: 250 Access Codes 250 Operator Passwords: 100 Operator instructions: 500 Time Periods (64 or 128 max./controller 2 ): 1,000 Time Groups: 250 Holidays: 50 Floor Plan Maps: 100 On-line Transaction Storage: 1,000,000 minimum 3 Off-line Transaction Storage: Unlimited Controllers: 2, 8, 16, or 32 Card Readers: 256 maximum Monitor Points: 1,024 maximum Monitor Groups: 100 Door Groups: 50 Reports (15 or 32 max. per Controller 4 ): Limited by indivual Controller quantities. 2 See Guideform Specification for individual Controller. 3 Depends on hard drive space available. 4 See Guideform Specification for individual Controller. vii

8

9 PART I GENERAL.1 INTRODUCTION A. This document describes the required Electronic Card Access and Security Management Host Management Software (Host Software or SE 5850). B. This specification provides all information necessary to produce a complete proposal for a sophisticated, easy-to-use DOS-based electronic Host Software system. The appendixes contain hardware specifications necessary to select the proper equipment for an installation..2 GENERAL DESCRIPTION A. Host Software: Required Host Software shall: 1. Be powerful and multi-functional with the ability to expand as project needs grow. 2. Be simple and economical enough to support a single site, yet powerful enough to manage a multi-site network. 3. Allow for future Software features to be added as management recognizes requirements. 4. Allow the operation of a Co-Session second terminal as an alternative Software operation or monitoring station. 5. Host Software shall be designed to control Westinghouse Security Electronics third and fourthgeneration security architecture, and will fully support all of the following Controllers: ALTO 818 Series, SE 422 Series and NexSentry 4100 Series. B. Host Computer Hardware: 1. [SE 5850 Host Software shall be bundled with a powerful Hewlett Packard XM3 computer that is configured to give Host Software optimum performance.] or 2. [SE 5850 Host Software shall be a software-only package for use with a DOS-based IBM compatible computer with a Pentium processor.] 3. See PART II.4.A for recommended hardware platform..3 DESCRIPTION OF WORK A. Installation: Installing the Security Management Software and bringing it to operational status requires the following major steps: 1. Determine operational requirements and plan Software to implement them. 2. Install Controllers and related hardware. 3. Configure Controllers and 5850 to communicate with one another. 4. Enter security system database. 5. Test security system communications and operation including CO-Sessions second terminal as required. 6. Train operators. 7. See section 2.03 for an expansion of this work summary..4 SUBMITTALS A. Block Diagram: Submittals shall include a block diagram detailing all connected devices. This document shall be adequate to ensure that all parties involved can determine that the recommended Software meets security system requirements..5 QUALITY ASSURANCE A. Computer workstation: If Software Host is bundled with a Hewlett-Packard PC workstation or approved alternative, hardware shall meet UL and FCC requirements for class A computing devices. WSE 3/21/ SE 5850 Host Software

10 B. Manufacturer: Manufacturer of products defined in this section must have: 1. Industry experience: Company must have at least 20 years experience in manufacturing and servicing access management systems. 2. ISO 9001 Certification: Manufacturing process of company must meet stringent standards of ISO 9001 Certification..6 WARRANTY A. Computer workstation: The Host Computer hardware shall be warranted for at least 15 months from the date of shipment from the factory. The manufacturer shall support hardware repair for the system computer hardware through Hewlett-Packard s worldwide service organization. B. Software: The manufacturer shall directly support software for the selected system product family. C. Extended warranty: Extended warranty terms at reasonable rates shall be available from the installing dealer. D. System integrator: The system integrator shall be the focal point of all service problems or questions (with manufacturer s full support). PART II PRODUCTS.1 MANUFACTURER A. Westinghouse Security Electronics 5452 Betsy Ross Drive Santa Clara, CA Telephone: Fax: B. Approve equal.2 MANUFACTURED UNITS A. The Access Management System shall consist of the following components: 1. Host hardware: IBM compatible PC with Pentium processor running DOS system 3 or later and SE 5850 Host Software. 2. CI-1 & CI-8 Multiplexer Remote Interface to Westinghouse Security Adapters: Westinghouse Security Electronics Controller. 3. Printer: Parallel printer or serial printer. 4. Access Control/Alarm Monitoring: [Alto 818 Series Controller.] [SE 422 Series.] [NexSentry 4100 Series Controller.].3 EQUIPMENT A. SE 5850 Architecture: 1. Host Computer: a. The host computer shall be the nucleus of the required system. It shall provide all necessary capabilities for one operator to manage access and alarm activity. Specifically, the host computer shall be the single computer that supports all the functions of Access Control and Alarm Monitoring, including file management, reporting, and real-time monitoring/control of security hardware devices. b. The Host Computer shall support a Co-Sessions second terminal for alternate station operation and monitoring. 2. CI-1 or CI-8 Multiplexer Adapter: The system may require one or more CI-1 or CI-8 multiplexers to allow the integration of up to 32 remote distributed intelligence Westinghouse Security Electronics Controllers into a multi-location network. WSE 3/21/ SE 5850 Host Software

11 3. Communication interface: The SE 5850 shall connect to the Controller via the CI-1 or CI-8 through one of the following interfaces: RS232, RS485, or 20 ma (Controller dependent). B. Software Platform: 1. Operating System: MS-DOS. 2. Networking: Large scale or multi-location systems with security devices or computers distributed to remote locations while overall control of the network is maintained at a central location. C. Operator interface/operations: The required system shall fulfill the following requirements for operator monitoring and command functions: 1. Sophisticated operator interface: The required Software shall provide a sophisticated, easy-tooperate interface for security operators. Multiple aspects of the system shall contribute to the effectiveness of the operator interface: a. Menu-driven screen selection shall allow even an infrequent operator to move through and manage the functions of the system easily and with a minimum of training. There shall be no need to memorize complicated commands or procedures. b. Function key control of actions must provide the ability to control the system with simple keystrokes. 2. System Password Protection/Control: a. Operator name and password shall control access to all menus and screens and the corresponding capability for each screen. b. The Software shall be able to assign each and every operator a completely unique set of capabilities. c. The Software shall protect the password screen by blanking out the password when the operator enters it. d. Operators supported: 100 maximum. 3. Real-time alarm reporting and display: a. The Software shall process alarms in real time. b. Priority levels defined by system Administrator: 10. 1) The System Administrator shall have the capability to assign the priority levels into categories such as fire, intrusion, or duress. c. Alarms displays: Color. d. The system shall associate color graphic maps with alarm points and must display maps in real time. 4. Real-time Status Reports: System status reports shall be available by: a. Alarm category. b. Security area device. c. Monitor points. 5. Override Command Capability: The system shall provide the operator the ability, based on password authorization, to override pre-set conditions. The overrides shall include: a. Unlock/re-lock doors individually or in logical groups. b. Shunt/unshunt alarm monitor points individually or in logical groups. c. Open, limit, or close the areas covered by specific Controllers. d. Silence latched alarm contacts. e. Forgive anti-passback status in individual Controllers. WSE 3/21/ SE 5850 Host Software

12 6. High Resolution Color graphics at operator console: a. SVGA Resolution with 256 Colors (minimum). b. ASCII Graphics for Maps: 1) Using simple keys to facilitate selection and placement of graphic symbols, the system can define maps representative of the site. 2) The symbols can be associated with alarm points. 3) Mapping supports a map sequence function which allows definition of maps containing greater detail of previously drawn maps. 4) The mapping system shall support output to Okidata 184 parallel or similar printers. 7. Powerful Security System Diagnostic Software: feature shall provide operators with the ability to examine the status of the system components and communications. These capabilities are particularly useful for diagnosing suspected problems, including: a. Card Reader Status: 1) A status screen shall show the condition of all card readers attached to the system. This screen shall show the status of card readers, coaxial cables. b. Card Reader Activity: 1) The system shall display access activity at doors associated with a particular card reader as it occurs. 2) Displays shall include the door name, access time, card number, door status (closed, open, held open, or forced open) and lock status (locked, unlocked, manually unlocked, or auto unlocked). c. Controller Status: 1) Open/Limited/Closed, Shunted/Unshunted, Communications Failure. 2) Power: online vs. backup, and tamper status. d. Monitor Point Status: 1) Active, clear, communications failure, device failure. e. Communications Monitor: 1) Communications between the card readers and the computer must be monitored. 2) This function normally will be used during installation to verify proper connection of communication cables. 8. Audit Trail of all Operator Activity: a. The System Administrator shall be provided with the ability to monitor and to manage all actions performed by operators on the system. b. Audit trail records shall be saved to hard disk and must not be able to be modified. c. The only possible actions for audit records shall be report retrieval and archiving for off-line storage. D. System Management: The required system shall perform all of the following functions: 1. Simple System Administration: a. To administer the Host computer, the system shall provide control of all system administration functions via menu-accessed screens. b. There shall be no need to memorize complicated commands or to learn the syntax of the DOS operating system. c. System administrative functions: 1) Adding and deleting system users and their passwords. 2) Performing system and database backups. 3) Displaying current system activity. 4) Performing transaction archives. WSE 3/21/ SE 5850 Host Software

13 5) Initiating data transfer to remote devices. 6) Defining and maintaining user-controlled fields. 7) Performing alarm transaction clean-up. 2. Security System Hardware Definition: a. Access control/alarm monitoring devices. b. Communication characteristics. c. Grouping of doors and monitor points. d. Defining readers. e. Defining points. f. Defining actions. g. Defining auto activate/open periods: 1) Proximity access control. 2) Keypad access control. 3) Magnetic Stripe access control. 4) Alarm monitor points. 3. Define Security System Software: a. Card number. b. Employee name. c. Card valid date. d. Card expiration date. e. Time Periods: Start time, stop time, and one or more days of the week. f. Holidays: 1) Along with the time zones, days of week, and doors for access control, the system shall allow the System Administrator to add holidays to the access definition. 2) Holiday definition shall allow days defined as holidays to have automatic and access parameters different from their normal definitions. g. Data Grouping: The system shall provide the capability to group the following data items: 1) Time Periods : 4 (four) per time group. 2) Doors: into door groups. 3) Monitor points: into monitor groups. 4) Keyholders into keyholder groups. 4. Maximum Database Capabilities: Maximum storage capabilities are limited by the application. 5. Database Download to Distributed Local Controllers: a. The host computer must download all information pertinent to each particular control unit. b. The system shall execute downloads automatically at pre-defined times or by manual initiation. 6. Powerful and Meaningful Reports: a. The system shall be able to execute reports without impacting the real-time operation of the security system. b. The system shall track and report the dates of archived events available for reporting. It must be able to generate reports for activity spanning any time period, using fixed disk files and high-density 3.5-inch floppy disk files. c. The system shall separate reports by group (door, monitor, time). d. The system shall provide reports for every data file maintained in the system. WSE 3/21/ SE 5850 Host Software

14 e. Pre-defined Reports: 1) Detail activity: Provides detail reports of all activity on the system within specified time intervals. 2) Exception activity: Provides selective reporting of specific types of activity on the system within specified time intervals. 3) Audit trail: Any time any data is changed, the system shall maintain an audit trail of the data changed and who made the change. This report allows management of database changes and is useful in meeting the requirements of most controlling agencies. 4) History reports to be available based on a particular cardholder or door. 7. On-line Storage of Security Events: When the database approaches a selected percentage of its limit, the system shall issue an alert to inform the operator(s) of the condition and to recommend that the operator perform an archive to floppy disk. 8. Archiving of Security Events: a. The system shall provide the ability to backup to floppy disk all events stored in the transaction file. b. In the event of hardware failure or need to execute a report using archived events, the events must be able to be restored to the system. 9. Backup and Restoration of Security System definitions: a. The system shall provide the ability to backup to floppy disk definition, including both hardware and user information. b. In the event of data corruption, tampering, or other loss of data integrity, the security system definitions shall be able to be restored to the on-line system from the floppy disk. E. Access Control Operation: 1. Common Requirements: a. System Designed for Growth: 1) Through addition of Controllers (and possibly software upgrade) the system shall provide support for middle scale applications with a larger number of cardholders, card readers and alarm points. 2) Modular software architecture and performance-oriented programming techniques shall optimize the system to provide minimum response time. 3) From the speed with which doors are unlocked and the speed with which reports are produced, the system software must be able to meet the stringent specification for capacity. b. Capture of all Events from Access Control Units (Controllers): 1) The host computer shall capture all events that occur at local access control. 2) Event capture shall occur real-time. 3) These devices may include multiple switch monitors, Controllers, and alarm monitor units. c. Failsoft Operation: 1) If for any reason, communication between the computer and the Controller is interrupted, the Controller shall continue to make its decisions. 2) While connected to the host computer, the system shall constantly update the Controllers with the information necessary to operate in failsoft mode. Each Controller has its own specific quantitabive limitations. 3) The host computer shall download a maximum of 11,000 card numbers plus 120 access codes to give full decision making capability to each Controller. 4) This capability shall provide for continued operation of distributed card readers at all times. WSE 3/21/ SE 5850 Host Software

15 d. Automated System Control: The system shall provide the ability to automatically change the state of certain devices or areas based on time. e. Multiple Identification Required for Access: 1) Selected entrances and exits may require multiple methods of confirming identity for entry. 2) The required system must support any combination of the following access controlling devices: (i) Analog Proximity Sensors. (ii) Digital Proximity Readers. (iii) Keypads. (iv) Magnetic Stripe Readers. (v) Smart card readers. f. Anti-passback: 1) Ability to forgive passback status shall be available via operator overrides. 2) Passback forgiveness shall be provided to a single cardholder or for all cardholders. 3) Automatically forgive passback at predetrmined time of the day. 4) In the event of Controller failure, the Controller shall automatically forgive all passback status upon return to operational status. g. Trace: 1) The system shall provide the capability to trace activity for specific cardholders at specific doors. 2) For a cardholder, the system shall report activities throughout the system. 3) The system shall display trace activities with the alarm functions to alert the operator. 2. Distributed Processing: a. Distributed Access Control Decision Making: Westinghouse Security Electronics Controllers support distributed processing, with the capability to make access decisions independent of the Host Computer. b. Automated Download of Data to Distributed Controllers: 1) SE 5850 maintains a central database on all access control equipment. 2) Central database includes: (i) Keyholders. (ii) Access levels. (iii) Automatic events (such as auto unlock), etc. 3) SE 5850 shall sort the information in the central database and send it to the appropriate Controller, allowing the local Controller to make all necessary decisions without the SE 5850 central terminal support. F. Alarm Monitoring Operation: 1. When utilizing Westinghouse Security Electronics Controllers, the host computer shall monitor the alarm points in two states: secure or alarm. An end-of line resistance shall indicate the point is secure. 2. Configurable Alarm Instructions: a. Alarm instructions: 500 maximum with up to 228 characters each for each alarm event or monitor point in the system. b. The system shall be able to assign alarm instructions to any monitor point in the system for unique responses to any circumstance. WSE 3/21/ SE 5850 Host Software

16 3. Operator Alarm Response: a. SE 5850 shall prioritize alarm events. b. When acknowledging an alarm, the operator must individually acknowledge the event. c. The system shall save alarm acknowledgment with the respective event for future recall and reference. 4. Recall Alarm Activity: a. The system shall save to disk information associated with each alarm that occurred within the system. b. The operator cannot modify or delete this information. Hence, all information is available to the operator viewing an alarm. 5. Monitor Point Status Display: a. The system shall provide a display that summarizes the current condition of all of the monitor points. b. The status display shall indicate normal, active, shunted, and communication line status. 6. Shunting/Unshunting Alarms and Alarm Points: The system shall provide the capability to shunt or unshunt alarm points via the following methods: a. Automatically, based on time of day, day of week, or holiday. b. Manually by Operator override. The operator must previously have been provided the capability of shunt/unshunt via the password definition..4 COMPONENT DEFINITION A. Recommended hardware platform: SE 5850 is available as a software-only option or it can be packaged with a Hewlett Packard XM3 PC with the following specifications. A comparable IBM Compatible PC is acceptable: 1. Manufacturer/Model: Hewlett-Packard XM3 PC, or comparable IBM Compatible PC. 2. Microprocessor: Pentium, 50 Mhz, 32-bit. 3. Monitor: 256 Color, Super Video Graphics Adapter (SVGA); 110/220 VAC selectable, UL listed. 4. Input media: 1.44 MB diskette drive. 5. Mass Storage: 40 MB hard disk, or greater. 6. I/O Ports: 1 parallel port, 3 serial ports. 7. Keyboard: 101 enhanced keyboard (QWERTY). Foreign language keyboard options available. 8. Communications: RS-232, 3 (three) ports. 9. Approvals: UL, FCC. 10. Made in USA..5 ACCESSORIES: A. Printer: Parallel printer or serial printer. B. Communication Modems: 1. Direct Connection: a. Short distance (max. two miles point-to-point on 22-AWG twisted pair at 9600 baud. Uses Black Box short haul modems). b. Lease line, point-to-point: Modem not defined. 2. Conversion devices from 20 ma to RS-232: a. SE CI-1 or SE CI-8. WSE 3/21/ SE 5850 Host Software

17 3. Power Management: a. UPS: 1) Provides continuous power, without interruption, should primary power be interrupted. 2) Provides 1 hour or more continuous DC power, depending on configuration. PART III EXECUTION.1 FIELD QUALITY CONTROL: A. Tests: 1. A system integrator shall supply a proposed acceptance test procedure. 2. Testing the system shall be the sole responsibility of the system integrator. 3. Communications tests: Controllers to central terminal, local controller, or remote local controller. B. Inspection: 1. The selected system integrator shall provide, on the job site, a factory-trained technician to assist, advise, or manage installing personnel. 2. The manufacturer shall also supply on-site inspection. 3. All final connections shall be made under the direct supervision of the system integrator. C. Field Service: 1. A system integrator authorized by the manufacturer shall provide support for the selected system. 2. System integrator must be supported by large service-oriented manufacturers for the system hardware and software. 3. The system integrator shall determine and report all problems to the manufacturers customer service departments. 4. Support must be available to the integrator via phone inquiries or on-site visits if conditions require and are approved by the manufacturer s customer service manager. 5. If purchased, the manufacturer shall provide reliable field service support for the computer hardware utilizing Hewlett-Packard service. 6. The manufacturer shall also participate directly in on-site commissioning of new systems with integrator cooperation. 7. HP field service is available in a variety of forms for the customer. A system manufacturer that determines a hardware problem is occurring will contact HP to assist the integrator and customer to resolve the problem..2 SCHEDULES A. System Integrator Assisted Preparation: 1. Data Requirements. 2. Operators & privileges. 3. Access Hardware. 4. Sensors. 5. Monitor Points. 6. Keyholders. 7. Keyholders security codes. 8. Maps. 9. Prepare room for system installation. 10. Receive equipment. WSE 3/21/ SE 5850 Host Software

18 B. System Installation: 1. Install security management hardware. 2. System Integrator and manufacturer (when ordered) on-site commissioning. 3. Initial startup and verification. 4. Data entry. 5. Data entry listing & verification. C. Verify Installation: 1. Connect access control hardware to Security Management System. 2. Download data and verify correct operation. 3. Testing total access and management system. 4. Sample Reports. 5. Daily Operation and Monitoring. 6. Dealer deliver as built drawings. WSE 3/21/ SE 5850 Host Software

NexSentry Manager Access Control & Security Management System

NexSentry Manager Access Control & Security Management System NexSentry Manager Access Control & Security Management System Featuring: NexSentry Manager Security Management System, version 3.0 NexSentry Star I Controllers NexSentry Star II Controllers A/E Guideform

More information

APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS

APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS APPLICATION NOTE Contents The DMP Software Family... 1 Stand-Alone Link Software... 1 Add-on Modules for Link Software... 1 System Link End-User Panel Management Software... 2 Simple Registration and Activation...

More information

CMS Central Monitoring System

CMS Central Monitoring System General In This Section CMS for Windows CMS Hardware CMS Functional Spec Relational Database Monitoring Interface Communication Network CMS Central Monitoring System General CMS Central Monitoring System

More information

Alto 818SC / Alto 818SX Security Management System

Alto 818SC / Alto 818SX Security Management System Alto 818SC / Alto 818SX Security Management System 8-door controller A/E Guideform Specification Version 1.0 NOTES: The following A/E Guideform Specification conforms to CSI guidelines to provide Specifiers

More information

Functional Specification Document

Functional Specification Document Functional Specification Document Access Control Technology Unit C1 South City Business Centre Tallaght Dublin 24 Ireland Ph: + 353 (0) 1 4662570 Web: www.accesscontrol.ie Index Introduction 1.1 Hardware

More information

V Series. Intelligent Programmer Software (DOS Version) User Manual

V Series. Intelligent Programmer Software (DOS Version) User Manual V Series Intelligent Programmer Software (DOS Version) User Manual Copyright 1996, 1997, 1999, 2002 Best Lock Corporation dba Best Access Systems. All rights reserved. Printed in the United States of America.

More information

Topaz. GE Security. Intelligent software for access control. Topaz. Features

Topaz. GE Security. Intelligent software for access control. Topaz. Features GE Security Topaz Integrate access control, video surveillance, alarm monitoring, and photo ID badging with the Topaz Access Control System. Topaz is packaged with everything you need to get your security

More information

ACCESS CONTROL SYSTEM

ACCESS CONTROL SYSTEM ACCESS CONTROL SYSTEM Flexible, Expandable, Economical. The i-pass system comprises of the i-pass controller built with state of the art technology to provide reader access for up to 16 doors and 32 elevator

More information

EQUIPMENT SPECIFICATIONS

EQUIPMENT SPECIFICATIONS EQUIPMENT SPECIFICATIONS IC-1600 Intelligent Controller The IC-1600 Intelligent Controller is a fully intelligent panel that has a complete database on board. It operates in conjunction with the Access

More information

Alliance System Ordering Guide

Alliance System Ordering Guide Alliance System Ordering Guide Multiple Technologies Versatile Hardware Powerful Software One family of parts and accessories Version 12-Nov-03 Alliance System Ordering Guide Table of Contents Controllers

More information

OWNERS MANUAL. Status Monitor. for Windows 95, 98, ME, NT 4, 2000 & XP. SIGNALCRAFTERS TECH, INC. www.signalcrafters.com

OWNERS MANUAL. Status Monitor. for Windows 95, 98, ME, NT 4, 2000 & XP. SIGNALCRAFTERS TECH, INC. www.signalcrafters.com OWNERS MANUAL Status Monitor for Windows 95, 98, ME, NT 4, 2000 & XP SIGNALCRAFTERS TECH, INC. www.signalcrafters.com 57 Eagle Rock Avenue, East Hanover, NJ 07936 Tel: 973-781-0880 or 800-523-5815 Fax:

More information

MINIMUM TOOL REQUIREMENT FOR EPROM UPGRADE

MINIMUM TOOL REQUIREMENT FOR EPROM UPGRADE Installing and Updating SE422 Access Control Units Firmware! Read all procedures before attempting the field replacement of the EPROM firmware in any equipment. Components are static sensitive and care

More information

Overview. Alarm console supports simultaneous viewing of both live and recorded video when alarm events are selected

Overview. Alarm console supports simultaneous viewing of both live and recorded video when alarm events are selected Niagara Security Overview Niagara Security by Tridium, is an open, web-based security management solution that allows you to manage and monitor your facility anytime, anywhere. Built on Tridium s Niagara

More information

Reliable Security Solutions

Reliable Security Solutions Reliable Security Solutions Challenger10 The proven solution for access control, intrusion detection and video integration. An integrated security solution for your most challenging environments The Tecom

More information

PRT-CTRL-SE. Protege System Controller Reference Manual

PRT-CTRL-SE. Protege System Controller Reference Manual PRT-CTRL-SE Protege System Controller Reference Manual The specifications and descriptions of products and services contained in this document were correct at the time of printing. Integrated Control Technology

More information

Time Attendance V1.4

Time Attendance V1.4 Time Attendance V1.4 Installation Manual May 11, 2011 Page 1 TABLE OF CONTENTS 1. TIME ATTENDANCE...5 2. SOFTWARE INSTALLATION...6 3. SETTING UP THE TIME ATTENDANCE SYSTEM...7 3.1 Set Password...7 3.2

More information

Honeywell s WIN PAK SE 2.0 / WIN PAK PE 2.0 Access Control System Guide Specifications in CSI Format SECTION 281300

Honeywell s WIN PAK SE 2.0 / WIN PAK PE 2.0 Access Control System Guide Specifications in CSI Format SECTION 281300 SECTION 281300 INTEGRATED SECURITY MANAGEMENT SYSTEM PART 1 GENERAL 1.1 SECTION INCLUDES A. Provide a modular and network enabled access control system for security management, including engineering, supply,

More information

System Integration Software

System Integration Software System Integration Software Release Notes for Version 6.0.5 1.0 Compatibility Currently, PC9000 is compatible with the following Radionics control/communicators: D7212, D7412, D7412G D9112, D9412 and D9412G

More information

HyperAccess Access Control System

HyperAccess Access Control System Control System We manufacture, an advanced PC based access control solution that will give you control over who has access to your building. With you can control access on hundreds of doors for up to 10,000

More information

Access Easy Controller 2.1

Access Easy Controller 2.1 Systems Access Easy Controller 2.1 Access Easy Controller 2.1 4 readers expandable to 32 readers Supports up to 20,480 card holders and 100,000 transactions Classify cardholders based on 254 access groups

More information

AC-115 Compact Networked Single Door Controller. Installation and User Manual

AC-115 Compact Networked Single Door Controller. Installation and User Manual AC-115 Compact Networked Single Controller Installation and User Manual December 2007 Table of Contents Table of Contents 1. Introduction...5 1.1 Key Features... 6 1.2 Technical Specifications... 7 2.

More information

A Fully Integrated Online Hotel Locking System

A Fully Integrated Online Hotel Locking System ZLock ALV2 Wireless Online System A Fully Integrated Online Hotel Locking System A state-of-the-art integrated real-time access system especially designed for today s demanding Lodging industry. Unlike

More information

APOGEE Security Technology Management Software

APOGEE Security Technology Management Software Technical Specification Sheet Rev 1, July, 1999 APOGEE Security Technology Management Software Figure 1 APOGEE Security Technologies workstation The APOGEE Security Technology System (ASTS) is a family

More information

Controller 5000GL Controller 5000GL provides flexible system architecture with options of GBUS and LOCAL BUS communications to field devices, to meet a wide range of site requirements. GGBUS L LOCAL BUS

More information

Versatility, reliability and expandability are the three main features that make the N-1000 one of the most popular access control panels ever.

Versatility, reliability and expandability are the three main features that make the N-1000 one of the most popular access control panels ever. Versatility, reliability and expandability are the three main features that make the N-1000 one of the most popular access control panels ever. Expandability is the most important feature of any access

More information

Troubleshooting and Diagnostics

Troubleshooting and Diagnostics Troubleshooting and Diagnostics The troubleshooting and diagnostics guide provides instructions to assist in tracking down the source of many basic controller installation problems. If there is a problem

More information

DUKANE Intelligent Assembly Solutions

DUKANE Intelligent Assembly Solutions PC Configuration Requirements: Configuration Requirements for ipc Operation The hardware and operating system of the PC must comply with a list of minimum requirements for proper operation with the ipc

More information

Made in America. Phone: (909) 664-9970 Fax: (909) 627-7449 Website: SmartClock.com

Made in America. Phone: (909) 664-9970 Fax: (909) 627-7449 Website: SmartClock.com Phone: (909) 664-9970 Fax: (909) 627-7449 Website: SmartClock.com 1 Introduction Who is Smart Clock? Formerly Coastal Data Products, Smart Clock is a manufacturer and marketer of computer based automated

More information

The Access Engine. Building Integration System - The Access Engine. Security Systems

The Access Engine. Building Integration System - The Access Engine. Security Systems The Access Engine 1 What is BIS Access Engine? It is one of the central software modules of the Building Integration System It s a fully integrated access control solution with corresponding access hardware

More information

How To Use Safety System Software (S3)

How To Use Safety System Software (S3) SPECIFICATION DATA Safety System Software (S3) APPLICATION Safety System Software (S 3 ) is a robust, full featured configuration, diagnostic, programming and real-time monitoring package for integrators

More information

SiloPatrol. SiloTrack Inventory Management Software Version 3.5 BULLETIN 343B. Interface With Multiple Sensor Technologies

SiloPatrol. SiloTrack Inventory Management Software Version 3.5 BULLETIN 343B. Interface With Multiple Sensor Technologies Setting The Standard For Supplier Excellence SiloPatrol SiloTrack Inventory Management Software Version 3.5 Interface With Multiple Sensor Technologies Simple Local And Remote User Access Vendor/Remote

More information

C CURE 800/8000 Security Management Solution

C CURE 800/8000 Security Management Solution D A T a s h e e t C CURE 800/8000 Security Management Solution Features that make a difference: Advanced event and alarm monitoring solution provides flexible and powerful control Easily integrate with

More information

This page was intentionally left blank.

This page was intentionally left blank. WinDSX User s Guide b This page was intentionally left blank. DSX, Our Commitment to Service Our Commitment to service is continually demonstrated through our Training Programs and Technical Support Department.

More information

SiPass Software. Fire Safety & Security Products. SiPass integrated

SiPass Software. Fire Safety & Security Products. SiPass integrated SiPass Software SiPass integrated Flexible structure for each demand Easy installation and administration Expansion modules optionally available High operational ease by Graphic User Interface Access control

More information

AxTraxNG Access Control Management Software

AxTraxNG Access Control Management Software AxTraxNG Access Control Management Software ARCHITECTURAL AND ENGINEERING SPECIFICATIONS April 2013 Experience the Difference www.rosslaresecurity.com 5505-0228701-00 Table of Contents 1. General... 4

More information

Operating Software Service Tool

Operating Software Service Tool 385 Operating Software Service Tool for M-bus central units OZW10 / OZW111 ACS11 ACT110 Software for the remote operation and supervision of one or several plants equipped with an M-bus central unit OZW10

More information

Keyscan Hosted Services A C e n t r a l l y M a n a g e d A c c e s s C o n t r o l S o l u t i o n

Keyscan Hosted Services A C e n t r a l l y M a n a g e d A c c e s s C o n t r o l S o l u t i o n Keyscan Hosted Services A C e n t r a l l y M a n a g e d A c c e s s C o n t r o l S o l u t i o n A convenient, new way Since the launch of Keyscan s Centrally Managed Access Control (CMAC), access control

More information

System i and System p. Customer service, support, and troubleshooting

System i and System p. Customer service, support, and troubleshooting System i and System p Customer service, support, and troubleshooting System i and System p Customer service, support, and troubleshooting Note Before using this information and the product it supports,

More information

CENTAUR. Access Control Software Version 4.2 REFERENCE MANUAL

CENTAUR. Access Control Software Version 4.2 REFERENCE MANUAL CENTAUR Access Control Software Version 4.2 REFERENCE MANUAL Copyright (C) 2006-2008 CDVI Americas LTD. All rights reserved. Centaur access control system software is protected by copyright law and international

More information

Automated Time & Attendance System BIG EFFICIENCY FOR BUSINESS

Automated Time & Attendance System BIG EFFICIENCY FOR BUSINESS Automated Time & Attendance System BIG EFFICIENCY FOR BUSINESS PAYROLL BECOMES A UTOMATIC Business owners used to have little choice when it came to processing time and attendance data either spend a lot

More information

DIVISION 28 ELECTRONIC SAFETY AND SECURITY SECTION 28 13 00 SECURITY AND ACCESS CONTROL SYSTEM

DIVISION 28 ELECTRONIC SAFETY AND SECURITY SECTION 28 13 00 SECURITY AND ACCESS CONTROL SYSTEM DIVISION 28 ELECTRONIC SAFETY AND SECURITY PART 1 GENERAL 1.01 DESCRIPTION A. Division 28 Contractor shall extend a complete Matrix Systems Access Control System as shown on the Drawings and as specified

More information

Tailored integration to suit you

Tailored integration to suit you UTC Fire & Security Integrated Systems Platforms Tailored integration to suit you We listened to you A majority of the Fortune 100 companies have chosen UTC Fire & Security for their integration needs.*

More information

Access Control Software Manual

Access Control Software Manual CONTENTS 1. Function overview...1 2. Installation environment...2 3. Concept description...3 4. Installation and Uninstallation...4 4.1 Installation...4 4.2 Uninstallation...10 5. Function instroduction...11

More information

QuickSpecs. HP Compaq t5525 Thin Client. Overview

QuickSpecs. HP Compaq t5525 Thin Client. Overview Overview 1. 10/100 RJ-45 6. PS/2 Connector 2. Security lock 7. DC Power Input 3. Parallel Connector 8. Video Connector 4. USB Connectors 9. Serial Connector 5. Audio connector (mic in/line out) DA - 12265

More information

NortechCommander Software Operating Manual MAN-00004 R6

NortechCommander Software Operating Manual MAN-00004 R6 NortechCommander Software Operating Manual MAN-00004 R6 If the equipment described herein bears the symbol, the said equipment complies with the applicable European Union Directive and Standards mentioned

More information

Doors.NET Access Control Software. Data Sheet. email: sales@kerisys.com web: www.kerisys.com

Doors.NET Access Control Software. Data Sheet. email: sales@kerisys.com web: www.kerisys.com Doors.NET Access Control Software Data Sheet Software Application to manage Keri s NXT TCP/IP-based, RS-485-based PXL-500 hardware platforms, and additional 3rd party platforms Native Microsoft.NET application

More information

O C M III. Open Channel Flow Monitor

O C M III. Open Channel Flow Monitor O C M III Open Channel Flow Monitor Part 1. General 1.1 Scope A. This section describes the requirements for an ultrasonic flow transmitter with sensor and temperature compensation probe. B. Under this

More information

OnGuard Online User Guide

OnGuard Online User Guide OnGuard Online User Guide T81165/Rev ER-7991-40 Jan 2005 Contents 1 Introduction Related documents 1 1 Navigation of the software 1 2 How to use this guide 1 4 2 Managing Access Holidays and Timezones

More information

Table Of Contents. System Monitoring... 14 System Monitoring Display...14 Monitoring Zones...15 About Areas (partitions)...15 Area Status Display...

Table Of Contents. System Monitoring... 14 System Monitoring Display...14 Monitoring Zones...15 About Areas (partitions)...15 Area Status Display... Quick Start Table Of Contents Getting Started... 2 NEware Editions...2 Installing NEware...3 Installing Languages...3 Connecting to NEware...3 Changing Your IP100 Password...4 User Codes... 5 Master Feature...5

More information

INSTALLATION/PROGRAMMING INSTRUCTIONS E4KP ENTRYCHECK

INSTALLATION/PROGRAMMING INSTRUCTIONS E4KP ENTRYCHECK Security Door Controls 3580 Willow Lane, Westlake Village, CA 91361-4921 (805) 494-0622 Fax: (805) 494-8861 www.sdcsecurity.com E-mail: service@sdcsecurity.com INSTALLATION/PROGRAMMING INSTRUCTIONS E4KP

More information

FVSU-33201301 REPAIR & UPGRADE FIBER OPTIC 280000-1 SECTION 280000 FIRE ALARM SYSTEM CONNECTIVITY

FVSU-33201301 REPAIR & UPGRADE FIBER OPTIC 280000-1 SECTION 280000 FIRE ALARM SYSTEM CONNECTIVITY FVSU-33201301 REPAIR & UPGRADE FIBER OPTIC 280000-1 SECTION 280000 FIRE ALARM SYSTEM CONNECTIVITY PART 1 - GENERAL 1.1 SUMMARY A. Section Includes: 1. Fire-alarm control unit. 2. Addressable interface

More information

DETAIL AUDIT PROGRAM Information Systems General Controls Review

DETAIL AUDIT PROGRAM Information Systems General Controls Review Contributed 4/23/99 by Steve_Parker/TBE/Teledyne@teledyne.com DETAIL AUDIT PROGRAM Information Systems General Controls Review 1.0 Introduction The objectives of this audit are to review policies, procedures,

More information

Updated: May 2008. Copyright 2005-2008 DBA Software Inc. All rights reserved. 2 Getting Started Guide

Updated: May 2008. Copyright 2005-2008 DBA Software Inc. All rights reserved. 2 Getting Started Guide Updated: May 2008 Copyright 2005-2008 DBA Software Inc. All rights reserved. 2 Getting Started Guide Table of Contents Welcome 4 Support Center Subscription 5 1. System Requirements 7 2. Installing the

More information

ACX 780, ACX 781 Access Control Units and Expansion Module

ACX 780, ACX 781 Access Control Units and Expansion Module Infinity ACX 780, ACX 781 Access Control Units and Expansion Module The Infinity ACX 780 is a programmable, stand-alone access controller that is a basic building block of the Infinity Security Management

More information

Time Attendance V1.0

Time Attendance V1.0 Time Attendance V1.0 User Manual Page 1 TABLE OF CONTENTS 1. TIME ATTENDANCE...5 2. SOFTWARE INSTALLATION...6 3. SETTING UP THE TIME ATTENDANCE System...7 3.1 Set Password...7 3.2 Login...8 3.3 Setup -

More information

Laundry Logic Management System Basic Edition Software

Laundry Logic Management System Basic Edition Software Basic Edition Software The Laundry Logic Basic Edition software was designed for the single site owner. It offers functions needed to review information about a single site View and Tool Options The Basic

More information

ASERIES ATM Access Management System

ASERIES ATM Access Management System ASERIES ATM Access Management System Increase Security. Reduce Operation Costs. Reduce Liability. The A-Series ATM Access Management System from Sargent & Greenleaf increases security and management efficiency

More information

NC State University Design and Construction Guidelines Division 26 Fire Alarm Systems

NC State University Design and Construction Guidelines Division 26 Fire Alarm Systems NC State University Design and Construction Guidelines Division 26 Fire Alarm Systems 1.0 Purpose A. The following guideline provides the minimum standards and requirements for fire alarm systems. 2.0

More information

QuickSpecs. HP IP Console Switch with Virtual Media Overview

QuickSpecs. HP IP Console Switch with Virtual Media Overview Overview HP's IP Console Switch with Virtual Media is a key component in managing the heterogeneous data center and along with the IP Viewer software allows remote access to multiple servers running various

More information

ACCESS CONTROL SYSTEMS USER MANUAL

ACCESS CONTROL SYSTEMS USER MANUAL Ritenergy Pro (Version 3.XX) ACCESS CONTROL SYSTEMS USER MANUAL 1 User Manual Ritenergy International, LLC TABLE OF CONTENTS RITENERGY PRO PROGRAMMING GUIDE 3 System Requirement 3 System Components 3 Basic

More information

HP Hardware Support Onsite 6-Hour Call-to-Repair Service HP Customer Support Contractual Service Package

HP Hardware Support Onsite 6-Hour Call-to-Repair Service HP Customer Support Contractual Service Package HP Hardware Support Onsite 6-Hour Call-to-Repair Service HP Customer Support Contractual Service Package Technical data HP Hardware Support Onsite 6-Hour Call-to-Repair Service provides an IT manager with

More information

COMBINE BURGLARY AND FIRE PROTECTION WITH ACCESS CONTROL IN A SINGLE,

COMBINE BURGLARY AND FIRE PROTECTION WITH ACCESS CONTROL IN A SINGLE, securıty COMMERCIAL the power of integration A truly effective commercial security system must be smart, flexible, and adaptable: Smart to provide a combination of intrusion, fire, access control, and

More information

UniFireNet Facilities Monitoring System MEA GENERAL NETWORK FEATURES

UniFireNet Facilities Monitoring System MEA GENERAL NETWORK FEATURES November 16, 1999 A1-100 UniFireNet Facilities Monitoring System Section: Integrated Systems GENERAL UniFireNet is the next generation in advanced technology to monitor and control security, fire, card

More information

DCS110 CATVisor COMMANDER

DCS110 CATVisor COMMANDER Broadband Cable Networks April 13, 2006 1(5) DCS110 CATVisor COMMANDER Introduction CATVisor Commander is the standalone software tool for configuring, adjusting and monitoring Teleste Headend and HFC

More information

Access CONTROL. MANAGEMENT Software

Access CONTROL. MANAGEMENT Software Software Guide Access CONTROL MANAGEMENT Software 21 Personnel Fields Users are provided twenty one fields to record various personnel data such as first name, last name, department, parking spot, and

More information

Smart Cartridge. Software Guide. UNLOCK dbase MEMORY LEVELS FUNCTIONS HISTORY TASK ACCESS CONTROL SYSTEMS CORPORATION

Smart Cartridge. Software Guide. UNLOCK dbase MEMORY LEVELS FUNCTIONS HISTORY TASK ACCESS CONTROL SYSTEMS CORPORATION Smart Cartridge Software Guide UNLOCK dbase MEMORY LEVELS FUNCTIONS HISTORY TASK DOS CORPORATION TOY E ACCESS CONTROL SYSTEMS Installing the Software UP AND RUNNING IN 5 MINUTES 1. Place the system disk

More information

FLORIDA ATLANTIC UNIVERSITY FIRE ALARM SYSTEM INSTALLATION MANUAL

FLORIDA ATLANTIC UNIVERSITY FIRE ALARM SYSTEM INSTALLATION MANUAL FLORIDA ATLANTIC UNIVERSITY FIRE ALARM SYSTEM INSTALLATION MANUAL January, 2003 Environmental Health and Safety Florida Atlantic University 777 Glades Rd. Boca Raton, FL 33431 Phone: 561-297-3129 Fax:

More information

How To Build A Scada System

How To Build A Scada System SECTION 17902 SCADA SYSTEMS PART 1 - GENERAL 1.01 SCOPE OF WORK A. The work of this section shall be performed by a qualified System Integrator and includes providing and installing SCADA computer system

More information

Meridian 1 Meridian 1 Attendant PC LAN Interface Installation Guide

Meridian 1 Meridian 1 Attendant PC LAN Interface Installation Guide Meridian 1 Meridian 1 Attendant PC LAN Interface Installation Guide Document Number: P0874391 Document Release: Standard 1.00 Date: November 1997 Year Publish FCC TM 1997 All rights reserved Printed in

More information

Gallagher Command Centre

Gallagher Command Centre DATASHEET Gallagher Command Centre security.gallagher.com Gallagher Command Centre is the central management platform for the Gallagher security system. Leveraging a client server architecture, the software

More information

Ovation Operator Workstation for Microsoft Windows Operating System Data Sheet

Ovation Operator Workstation for Microsoft Windows Operating System Data Sheet Ovation Operator Workstation for Microsoft Windows Operating System Features Delivers full multi-tasking operation Accesses up to 200,000 dynamic points Secure standard operating desktop environment Intuitive

More information

High Performance Access Control and Integrated Security Systems

High Performance Access Control and Integrated Security Systems High Performance Access Control and Integrated Security Systems High Performance Access Control and Integrated Security Systems EntraPass Corporate Edition is a powerful multi-user access control system

More information

H ARDWARE C ONSIDERATIONS

H ARDWARE C ONSIDERATIONS H ARDWARE C ONSIDERATIONS for Sidewinder 5 firewall software Dell Precision 530 This document provides information on specific system hardware required for running Sidewinder firewall software on a Dell

More information

DSX-Soft I/O Integration Software

DSX-Soft I/O Integration Software DSX Access Systems, Inc. DSX-Soft I/O Integration Software DSX now has the ability to integrate with various different external devices through serial data streams. This integration allows other systems

More information

Access Professional Edition Selection Guide

Access Professional Edition Selection Guide Access Professional Edition Selection Guide 2 Contents Contents 3 System overview 3 Wiegand based hardware 4 RS485 Bus reader 5 Selection Guide The Seven Steps to your Access System 6 Step 1: Choose Base

More information

SECTION 13421 PROGRAMMABLE LOGIC CONTROLLERS AND COMPUTER CONTROL SYSTEM PART 1 GENERAL. 1.01 Summary. A. Section Includes:

SECTION 13421 PROGRAMMABLE LOGIC CONTROLLERS AND COMPUTER CONTROL SYSTEM PART 1 GENERAL. 1.01 Summary. A. Section Includes: SECTION 13421 PROGRAMMABLE LOGIC CONTROLLERS AND COMPUTER CONTROL SYSTEM PART 1 GENERAL 1.01 Summary A. Section Includes: 1. The ISS shall furnish all labor, materials, equipment, services and incidentals

More information

Technical Manual. For use with Caller ID signaling types: Belcore 202, British Telecom, & ETSI

Technical Manual. For use with Caller ID signaling types: Belcore 202, British Telecom, & ETSI Technical Manual For use with Caller ID signaling types: Belcore 202, British Telecom, & ETSI Caller ID.com WHOZZ CALLING? POS 2 Caller ID Monitoring Unit Technical Manual For use with Caller ID signaling

More information

Integrated Building Management and Security System. Building Automation & Security. www.coba-group.com

Integrated Building Management and Security System. Building Automation & Security. www.coba-group.com Integrated Building Management and Security System Building Automation & Security www.coba-group.com INTEGRATED BUILDING MANAGEMENT AND SECURITY SYSTEM INDEX 1 GENERAL... 3 1.1 SYSTEM INTEGRATION... 3

More information

Access Control Management Software

Access Control Management Software ACCESS CONTROL MANAGEMENT SOFTWARE Access Control Management Software System VII - meeting today s demands and tomorrow s challenges. Supports multiple-monitor workstations Compatible with Microsoft s

More information

Access Control. Intrusion Alarms. Elevator Control CCTV & DVR. Photo ID. Building Automation. Visitor Management. On & Offsite Monitoring

Access Control. Intrusion Alarms. Elevator Control CCTV & DVR. Photo ID. Building Automation. Visitor Management. On & Offsite Monitoring Access Control Intrusion Alarms Elevator Control CCTV & DVR Photo ID SECURITY MANAGEMENT SYSTEM Building Automation Visitor Management On & Offsite Monitoring BUILDING SECURITY WORLDWIDE Our Corporate

More information

Quick Installation. A Series of Intelligent Bar Code Reader with NeuroFuzzy Decoding. Quick Installation

Quick Installation. A Series of Intelligent Bar Code Reader with NeuroFuzzy Decoding. Quick Installation Quick Installation A Series of Intelligent Bar Code Reader with NeuroFuzzy Decoding This chapter intends to get your new FuzzyScan scanner working with your existing system within minutes. General instructions

More information

Emerson Smart Firewall

Emerson Smart Firewall DeltaV TM Distributed Control System Product Data Sheet Emerson Smart Firewall The Emerson Smart Firewall protects the DeltaV system with an easy to use perimeter defense solution. Purpose built for easy

More information

T a b l e o f C o n t e n t s

T a b l e o f C o n t e n t s w w w. g e n t e c h e a l t h c a r e. c o m M E D I C A L M O N I T O R I N G, A L A R M A N D C O N T R O L S Y S T E M S I n t e r n a t i o n a l E d i t i o n Technology for a Better Future Company

More information

SECTION 13850 DETECTION AND ALARM

SECTION 13850 DETECTION AND ALARM SECTION 13850 DETECTION AND ALARM PART 1 GENERAL 1.01 SUMMARY A. Section Includes 1. Control Panel 2 Associated Equipment B. Products Installed But Not Supplied Under This Section 1. Section 16140 - Wiring

More information

PARTNER ACS R4.0 Remote Administration R4.0. Getting Started

PARTNER ACS R4.0 Remote Administration R4.0. Getting Started PARTNER ACS R.0 Remote Administration R.0 Getting Started 8-6-66 700080 Issue May 00 Copyright 00, Avaya Inc. Document 8-6-66 All Rights Reserved 700080 Printed in USA Issue May 00 Notice Every effort

More information

SECTION 16911 WEB-BASED POWER MONITORING COMMUNICATIONS SYSTEM

SECTION 16911 WEB-BASED POWER MONITORING COMMUNICATIONS SYSTEM WEB-BASED POWER MONITORING COMMUNICATIONS SYSTEM PART 1 GENERAL 01 02 03 04 SCOPE This section describes the metering, communications, and visualization requirements for a modular, scalable Web-based Power

More information

INTELLIGENT CONTROL MODULE SA-2000-II HARDWARE MANUAL. Access Technologies International, Inc.

INTELLIGENT CONTROL MODULE SA-2000-II HARDWARE MANUAL. Access Technologies International, Inc. SA-2000-II HARDWARE MANUAL Access Technologies International, Inc. 1 Table of Contents 1. Introduction 3 2. Features 3 3. Specification 4 4. Identifying Supplied Parts 4 5. Panel Description 5 6. Connection

More information

Electronic Access Control Solutions

Electronic Access Control Solutions Electronic Access Control Solutions Access Control Access Control Digitus BIOMETRIC ACCESS CONTROL Secure every access point The new db (Digitus Biometric) Biolock Technology paired with our Electromechanical

More information

REQUEST FOR PROPOSALS SECURITY SYSTEMS MIDDLETOWN PUBLIC SCHOOLS MIDDLETOWN, RHODE ISLAND 02842

REQUEST FOR PROPOSALS SECURITY SYSTEMS MIDDLETOWN PUBLIC SCHOOLS MIDDLETOWN, RHODE ISLAND 02842 REQUEST FOR PROPOSALS SECURITY SYSTEMS MIDDLETOWN PUBLIC SCHOOLS MIDDLETOWN, RHODE ISLAND 02842 1. Middletown Public Schools is seeking bids for security systems for the Gaudet Middle school: 1113 Aquidneck

More information

Server Manual. For Administrators of Cameleon Version 4

Server Manual. For Administrators of Cameleon Version 4 Server Manual For Administrators of Cameleon Version 4 Cameleon Version 4 Server Manual For Administrators of Cameleon Version 4 R4-07OCT04 Copyright 2004 360 Surveillance Inc. Camera Cameleon is a trademark

More information

Control Technology Corporation CTC Monitor User Guide Doc. No. MAN-1030A Copyright 2001 Control Technology Corporation All Rights Reserved Printed in USA The information in this document is subject to

More information

Operation Guide. Systems Integration Software

Operation Guide. Systems Integration Software Operation Guide Systems Integration Software Trademarks Microsoft, Windows, Windows NT are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

More information

USB Secure Management for ProCurve Switches

USB Secure Management for ProCurve Switches ProCurve Networking USB Secure Management for ProCurve Switches Introduction... 2 A simple solution with multiple uses... 2 Staged deployment... 2 Remote deployment or upgrade... 3 Troubleshooting... 3

More information

Global Water Instrumentation, Inc.

Global Water Instrumentation, Inc. Global Water Instrumentation, Inc. 151 Graham Road P.O. Box 9010 College Station, TX 77842-9010 Telephone : 800-876-1172 International : (979) 690-5560, Fax : (979) 690-0440 e-mail : globalw@globalw.com

More information

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date: A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine

More information

Time Clock V1.2 User Manual. Time Clock V1.2. User Manual. Page 1. www.avea.cc

Time Clock V1.2 User Manual. Time Clock V1.2. User Manual. Page 1. www.avea.cc Time Clock V1.2 User Manual Page 1 TABLE OF CONTENTS 1. TIME CLOCK...4 2. SOFTWARE INSTALLATION...5 3. SETTING UP THE TIME CLOCK SYSTEM...6 3.1 Set Password...7 3.2 Login...8 3.3 Setup - Auto IN/OUT Time

More information

Network Client. Troubleshooting Guide FREQUENTLY ASKED QUESTIONS

Network Client. Troubleshooting Guide FREQUENTLY ASKED QUESTIONS Network Client Troubleshooting Guide 1 Network Client Troubleshooting Guide The first section of this guide answers some frequently asked questions (FAQs) about the operation of Intellex and the Network

More information

Updated: April 2010. Copyright 2005-2010 DBA Software Inc. All rights reserved. 2 Getting Started Guide

Updated: April 2010. Copyright 2005-2010 DBA Software Inc. All rights reserved. 2 Getting Started Guide Updated: April 2010 Copyright 2005-2010 DBA Software Inc. All rights reserved. 2 Getting Started Guide Table of Contents Welcome 4 Support Center Subscription 5 1. System Requirements 8 2. Installing the

More information

Documentum Management & Imaging System Overview

Documentum Management & Imaging System Overview Documentum Management & Imaging System Overview Introduction The University of Tennessee is in the process of purchasing an electronic document management system (EDMS) that will enable Graduate Admissions

More information

3.11 System Administration

3.11 System Administration 3.11 The functional area is intended to contribute to the overall flexibility, efficiency, and security required for operating and maintaining the system. Depending on the architecture of the system, system

More information