Introduction to FDS Entry Management System
|
|
|
- Bertina Barnett
- 10 years ago
- Views:
Transcription
1 Introduction to FDS Entry Management System <Access Control System> January 2015 Fit Design System Co., Ltd.
2 : Feature and Function of Entry Management System Feature Wiring work is very simple. Function Almost all the functions conceivable in Entry/Exit Management are provided, and cooperation with another system is available. System configuration: A flexible and scalable system configuration from a small system to a large scale system is realized. Door locking/unlocking with External Signal With connection to an external device such as a fire alarm, doors are unlocked/locked when an emergency signal is input. Cooperation with security system A security signal can be sent to a security system connected by starting of security operation. Cooperation with Monitoring Camera Entry management information and Image recording function are uniformly managed by cooperation with Monitoring camera system. Standard Function ACS2 Mid-size Entry Management System Registered users : Up to 50,000 users Controlled doors : Up to 1,800 doors History Preservation : For 2 years Schedule : 2,000 kinds and up to 50,000 events Entry/Exit restriction function Various functions are available including route restriction, occupants limit control, tailgating prevention, antipassback (entered person is allowed for exit only), and interlocking (only one door is opened). History viewing and search function History is displayed with a PC in real time basis and past history is easily listed up by a search function. Administrator operation authority restricting function Operation authority is set for each administrator individually. Payroll accounting and attendance CSV format files are sent to external systems. management Data are sent to an external system for accurate management of even a complicated shiftworking arrangement. Cooperation with another system Import of externally created CSV format files Company staff directory/shift-work schedule/ Calendar Since existing data can be imported, a large volume of information is collectively registered. 1
3 Example of Security Measures Targeted Challenges Yes, FDS Entry Management System can solve the Challenges Who has entered/exited through which door, and when it is? Accurate attendance management of the company staff is desired. Enhancement of the security by preventing unauthorized intrusion of an outsider A scalable system is desired that can be expanded from a single site. Preventing theft of important documents and lead out of information Introduction of important documents and leak out of information History of when and who has entered/exited is checked with a PC in real time. Since the wiring work is quite simple and inexpensive, the introduction is ready at any time. Expansion is available flexibly. Users and utility time are meticulously assigned, consequently outsiders cannot enter the room, and theft and information leakage are prevented. 2
4 Example of Configuration-1 Example of Small System Configuration(ACS1) In a small business institution, a system can be configured with a management PC, one ACU 1, and a required number of DCs. DC #1 Ethernet Isolated Network RS-485 Lock RS-485 Lock DC #2 Hub ACU Hub Ethernet Card Lock RS-232C/485 Card DC #60 Management PC 3
5 Example of Configuration-2 Example of Mid-size System Configuration (ACS2) In a mid-size business institution, an ACS1 system is installed in each floor and the ACS1 systems are connected to each other with an SC. Lock DC #1800 Lock DC # th Floor Isolated network RS-485 Card RS-232C/485 Ethernet Card Hub ACU #30 Management PC#1 Ethernet Lock DC #60 Lock DC #1 1st Floor Hub SC Hub Card RS-232C/485 Card Hub Ethernet RS-485 ACU #1 Management PC#20 4
6 Example of Configuration-3 Example of Large System Configuration(ACS3) For multiple locations, each location has an ACS2 system connected by SC and WAN connection ACS2 system ACS2 system SC#1 SC#512 WAN ACS2 system SC#4 SC#2 ACS2 system SC#3 ACS2 system 5
7 Specifications Items ACS1system ACS2/3 system Number of controllable doors Number of registered users User classes 4 kinds of 999 classes 4 kinds of 999 classes User codes 10 digits of alphanumeric characters 10 digits of alphanumeric characters Number of scheduled items Date types of schedule Time zone in schedule 8 time zones per day 8 time zones per day Number of registered administrator Administrator code 10 digits of alphanumeric characters 10 digits of alphanumeric characters Number of connectable Number of preserved event logs (ACU) Preservation period of event logs (SC/PC) years 2years Number of connectable ACUs 1 30
8 Products for Entry management system RF Reader with Door Controller A door controller (DC) is not necessary for this reader. An RF reader supporting Mifare is prepared. FDV-1000 Vein Authentication + RF Reader + Key Board FDE-1010 RF Reader + Key Board Key board for operation and password input including an LCD An RF reader supporting Felica cards (EI-Wise) is available as an option (sold separately). Door Controller(DC) This door controller(dc)is used in combination with an RF reader. Access Control Unit(ACU) System Controller(SC) FDE When the number of doors is 60 or more, individual control for every floor is necessary, FDE For managing entry/exit of a door without using a vein authentication reader, this control unit is required. FDE RF Reader of Mifare FDE-MURF10 RF Reader An Access control unit is required for controlling a plurality of doors with group control method and can control up to 60 doors. RF Reader for Felica FDE-FRF or control through a WAN s necessary, a system controller is required. 7
9 Function of Each Device Management PC Retention of setting and registration information Retention of History Management Software facilitates setting of new user registration, modification of a registered content, history management, antipassback and escort function, etc. SC Setting and registration Information History ACU Retention of setting and registration information Retention of History in case of not connected with SC Vein Database Vein Data Application Authentication data Display of authentication result Administrator Setting, registration, and Viewing Security device Alarming device Fire alarm Unlocking switch Control lock User Authentication data input 8
10 Procedure of Authentication Card Authentication Authentication ACU Retention of card data Vein Authentication ACU Authentication Authentication data Authentication result User code Authentication result Control DCU Personal Identification lock Authentication data Display of authentication result Reader Authentication data input Control lock Retention of vein and card data Display of authentication result Authentication data input user user 9
11 Unlocking by other than Authentication By connecting an external switch, a door can be unlocked by pressing the switch without authentication. ( 1) ( 2) There are other functions to unlock the door without authentication. Remote Locking/Unlocking The door is locked/unlocked by an operation from the management PC. Pass Word The door is unlocked with input of a password for unlocking the door.( 5) とき.ドアの 退 室 側 は 認 証 する 必 要 がない Special wiring for unlocking switch DCU Unlocking switch 例 Eg., in case that authentication is not necessary for exit side of the door Thumb Turn By turning the key of the door, it is unlocked.( 3)( 4) Antipanic By means of a function of an electric lock, one side of the door is unlocked by turning a knob.( 6) 1 One unlock switch is necessary for every door that is unlocked by an unlocking switch. 2 Dedicated wiring is necessary for each of DCUs installed to doors that are unlocked by unlocking switches. 3 This function is available for only electric switches without thumb turn covers. 4 If Permission is not set, Unauthorized door open warning is issued. 5 This function is available for only readers including numerical key pads. 6 This function is available for only antipanic type electric locks. Door unlocking time, etc. after unlock by pressing the switch is the case as the case of ordinary authentication. 10
12 Interlocking With interlocking, when one of two doors in a room is operated, the other door is not allowed to open. ( 1)( 2) When one door is under authentication process, just being unlocked, or opened, the other door indicates Interlocked ( 3) and does not accept authentication request. During interlocking, unlocking is not conducted by not only authentication but also operation other than authentication including remote operation and switch operation. Interlocking Dedicated Wiring Room1 Room2 Vein authentication device Room3 Vein authentication device Under authentication process, just being unlocked, or opened Rejection of authentication request, door locked 1 Dedicated wiring between DCUs respectively installed to the two doors is necessary. 2 Unlocking by unlocking switch, All Rights cooperation Reserved, with Copyright(C) ,FIT security device, and connection Design System with Co.,Ltd alarm device are not implemented for doors that use interlocking function. 3 Available only in a reader including an LCD 11
13 Cooperation with Security Device By cooperation with a security device, the authentication device can be secured (Door is locked, authentication request is rejected.)( 1)( 2) ( 3) ( 4) By cooperation with a fire alarm, the door lock can be unlocked when a fire breads out. ( 1)( 5) ( 6) For both the cases, negotiation with managing companies of the other party devices. Be sure to consult us beforehand. There are cases requiring additional expenses. Managing PC LAN ACU LAN Entry/exit managing software Entry side finger vein authentication device lock Exit side finger vein authentication device 1 Dedicated wiring is necessary for each of authentication devices installed to doors to be cooperated. 2 In the doors that implement security start and release operations, interlocking function and connection to security devices are not available. 3 In a door that shifts to a secured state in connection with start of security operation, interlocking function and unlocking by unlocking switch are not available. 4 When security operation is started by an authentication device, checking of saying user and lock out checking are not conducted. 5 Only when the authentication device is energized, cooperation with a fire alarm is implemented. In case of power failure, the state of the lock is dependent on the function of the electric lock. 6 In an authentication device without dedicated wiring, ordinary operation (authentication to unlock) is implemented in case of fire break out. 12
14 Alarm When an alarm is generate, an alarm sound is issued from an authentication device and alarm issue log is recorded.( 1) Door Open Warning When the door is kept opened for a prescribed period or more, this warning is issued. Unauthorized Door Open Warning When the door is opened illicitly, this warning is issued. When an alarm is generated, an alarm signal may be outputted to the outside.( 2) ( 3) ( 4) ( 5) Tamper Alarm When an authentication device is illicitly disassembled, this alarm is issued.( 6) Threatened Authentication Alarm When a person who is forced to make an unwanted authentication performs the threatened authentication, this alarm is issued. 1 At threatened authentication alarm, the alarm sound is not emitted from the authentication device. 2 Be sure to consult us beforehand. 3 There are cases requiring additional expenses. 4 Dedicated wiring is necessary for each of doors that issue alarms. 5 Cooperation with a security device and Interlocking are not implemented for doors that output alarms. 6 One unit of separately sold Tamper switch is required for one authentication device. An example of event log screen 13
15 User Registration, Schedule User Registration 1 2 Registration Registration of user information of veins and cards Example of monitor Schedule Calendar settings of holidays, an anniversary of foundation, summer holiday, etc. are implemented. Example of monitor Hourly operation of each door can be set from six kinds of operations. Up to 2,000 patterns of a user schedule in a user available time periods are registered. 1Open 2Close 3Entry 4Exit 5Entry/Exit 6Toggle 14
16 Usage Restriction Function User Usage Term Restriction Function By setting usage term of a user beforehand, the user is not authenticated except in the usage period. Eg. When usage term is predetermined such as for a temporary staff or a student, this function is used. Antipassback Function A user without an entry log is not allowed to exit, and a user without an exit log is not allowed to enter, thus a user is urged to surely conduct authentication at entry/exit. Number of Staying User Control Function This function controls the number of staying users in a room. Eg. This function is used for a room in which the number of containable people is fixed. Route Restriction Function A user who has not followed a predetermined sequence is not allowed to enter a further inner room. Eg. A user who has not entered the room through a predetermined door is not allowed to enter a further inner area. Escort Function Eg. For preventing tailgating and borrowing/lending authentication data, and checking of staying users, this function is used. A user required to be escorted by someone to enter can be registered. Eg. A user such as a visitor or trainee is made not allowed to enter inside the building by this function. Gender Restriction Function A door that restricts its usage according to the gender can be set. Eg. Doors of a Locker room, Bathing facility, etc. can be set. 15
17 Monitoring, History An event occurred in the system is displayed in real time. Monitoring A person and a room where the person is present are displayed in real time. An event (history) is retrieved by designating a condition, and the retrieval result and monthly events can be backed up as CSV files. Operation state of each door is displayed in real time. A CSV file opened by Excel is shown. History The retrieval and back up are conducted by referring to system logs preserved in a PC. Logs preserved in the PC is automatically deleted after two years has elapsed. 16
18 Backup & Restore, Administrator Authority Backup & Restore Setting information and registration information are collectively stored in a back up file of jip file format. Administrator Authority A piece of information to be restored is selected from the backed up information, thus restoration can be made. System administrator All the operations are allowed. Reception Only viewing of stay state information and user information is allowed. Security staff Viewing of event status and remote locking/unlocking are allowed. User registration dedicated terminals Registration of user information and card, and registration/edition of vein can be implemented. Up to ten codes and pass words to log in to an application can be registered. Operation rights and usage terms can be set for each of registered codes. 17
CipherLab 5100 Time Attendance Utility Manual
CipherLab 5100 Time Attendance Utility Manual K:\Products\Product Technical\BI\BI-PC5100T\CipherLab5100TimeAttendnaceUtilityManual0707-process.doc Page 1 / 13 1 Login A popup form as follows will appear
Functional Specification Document
Functional Specification Document Access Control Technology Unit C1 South City Business Centre Tallaght Dublin 24 Ireland Ph: + 353 (0) 1 4662570 Web: www.accesscontrol.ie Index Introduction 1.1 Hardware
Access CONTROL. MANAGEMENT Software
Software Guide Access CONTROL MANAGEMENT Software 21 Personnel Fields Users are provided twenty one fields to record various personnel data such as first name, last name, department, parking spot, and
PoE-Touch Fingerprint and RFID Access Control
-Touch Fingerprint and RFID Access Control Intelligent Security -Touch Fingerprint and RFID Access Control is a new generation access control device of Anviz. The adopts touch activation technologies in
USER GUIDE SERIES 4250 AUDIO ALARM CONFIRMATION SYSTEM CONTROL UNIT
USER GUIDE SERIES 4250 AUDIO ALARM CONFIRMATION SYSTEM CONTROL UNIT CONTENTS Page INTRODUCTION... 2 Security conditions... 3 Full Set (Fully armed)... 3 Part Set (Partially armed)... 3 Unset (Disarmed)...
BUILDING SECURITY & ACCESS CONTROL
Department of Facilities Management BUILDING SECURITY & ACCESS CONTROL OBJECTIVE: PERFORMANCE GUIDELINES AUGUST 19, 2011 The objective of this guideline is to limit the probability that, as a result of
Keyscan Hosted Services A C e n t r a l l y M a n a g e d A c c e s s C o n t r o l S o l u t i o n
Keyscan Hosted Services A C e n t r a l l y M a n a g e d A c c e s s C o n t r o l S o l u t i o n A convenient, new way Since the launch of Keyscan s Centrally Managed Access Control (CMAC), access control
Security Service de Services sécurité. Security Alarm Monitoring Protocol
Security Service de Services sécurité TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings
SECURITY SYSTEM NOTES SPECIAL CODES ENTRY / EXIT DELAY TIMES ARM / DISARM CODES
SECURITY SYSTEM NOTES Installing/Service Company For Service Call SPECIAL CODES "Chime" Digit 1 "Partial Arm" Digit 2 "Quick Arm" Digit 3 ENTRY / EXIT DELAY TIMES Exit Delay Time Entry Delay Time Secondary
$FFHVV&RQWURO6WDUWHU.LW
9LVWD.H\6. $FFHVV&RQWURO6WDUWHU.LW 8VHU*XLGH CARD READER DOOR STRIKE REQUEST TO EXIT VistaKey-SK ALARM SYSTEM CONTROL PANEL DOOR STATUS MONITOR K5398 6/00 TABLE OF CONTENTS OVERVIEW...4 INTRODUCTION...4
IP Access Control Management System
04 BioStar IP Access Control Management System BioStar is a comprehensive access control management software featuring efficient TCP/IP based system architecture with intelligent IP readers. It supports
2012 November. AxTraxNG Access Control Management Software Software Manual (Version 21.x)
2012 November AxTraxNG Access Control Management Software Software Manual (Version 21.x) Copyright 2012 by Rosslare. All rights reserved. This manual and the information contained herein are proprietary
Security Alarm Monitoring Protocol
Security Protocol TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS... Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings Interior Room or
NetworX NX-6V2. LED Keypad User Manual
NetworX NX-6V2 LED Keypad User Manual POWER Light is on when AC power is present; flashes to indicate a low battery condition. ARMED Light is on when armed; off when disarmed; flashes to indicate a previous
AXS Biometric Security System
AXS Biometric Security System The SECU-AXS biometric security system components may be customized and used in numerous configurations to provide a full scale security and access control system to both
SECURITY SYSTEM NOTES. EMERGENCY ACTIVATION KEYS (check if enabled) PROGRAMMED FUNCTIONS
SECURITY SYSTEM NOTES Installing/Service Company For Service Call Installation Date / / Central Station Duress Code EMERGENCY ACTIVATION KEYS (check if enabled) Fire Auxiliary Emergency Police PROGRAMMED
Access Control Unit User s Guide
NetAXS Access Control Unit User s Guide The configurations described in this document have not been reviewed by Underwriters Laboratories Inc. June 2007 2007 Honeywell. All rights reserved. 800-00233,
Understanding Access Control
Understanding Access Control To understand access control, we must understand the language of the industry. Terms like alarm inputs, relays, timezones, anti-passback, shunt, and access levels are commonly
HARDWIRED CONTROL PANELS
USER GUIDE 9651 HARDWIRED CONTROL PANELS Contents 1. Introduction...3 The Alarm System...3 The Keypad...3 About This Guide...5 2. Everyday Operation...6 How Do I Know if the System is Working?...6 Setting
AS-525. AxTrax Access Control Management Software. Software Manual
AS-525 AxTrax Access Control Management Software Software Manual August 2010 Table of Contents Table of Contents 1. Introduction... 5 1.1 System Features... 5 1.1.1. Access Control... 6 1.1.2. Access
F11 User Manual. Version:1.0 Date:Jul. 2010
F11 User Manual Version:1.0 Date:Jul. 2010 Introduction: This document mainly introduces the user s operation of F11. About the device installation please refer to F11 Installation Guide. F11 User Manual
HIPAA Security. assistance with implementation of the. security standards. This series aims to
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
Application Notes. 1.21 Partition Programming (PC1616/1832/1864 V4.2) Page 42. Panels: POWER SERIES (PC1616/1832/1864 V4.
Application Notes 1.21 Partition Programming (PC1616/1832/1864 V4.2) Panels: POWER SERIES (PC1616/1832/1864 V4.2) Overview: The PC1616 supports 2 true partitions. The PC1832 supports 4 true partitions.
Security System User Guide
Security System User Guide Contents 1. Introduction... 1 Controls and Displays... 3 Displays... 3 Controls:... 4 2. Everyday Operation... 5 Access to the System... 5 Entering and Leaving the Protected
KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control
Software Guide KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control For Keyscan, Aurora is the dawn of a new age for access control. It is the culmination of over 25
WITURA CORPORATION SDN BHD
WT 1010SA Stand Alone GSM Alarm System User Manual and Installation Instructions Version: 1.2 Updated: 4 JAN 2012 WITURA CORPORATION SDN BHD Stand Alone GSM Alarm System Instruction Manual 1 Introduction:
FALCO IP: The True Network Access Control Solution. Building Our Future On IP
FALCO IP: The True Network Access Control Solution Building Our Future On IP FALCO Integrated Security Access Control System The Falco IP System is a premier integrated security management system for your
Embedded Web Server. User Guide. General usage guide lines to the ISONAS Embedded Web Server available on all ISONAS PowerNet reader-controllers
Embedded Web Server User Guide General usage guide lines to the ISONAS Embedded Web Server available on all ISONAS PowerNet reader-controllers 06/12/09 Contents Revision history... 4 Scope... 4 Introduction...
KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control
Software Guide KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control For Keyscan, Aurora is the dawn of a new age for access control. It is the culmination of over 25
SECURITY SYSTEM NOTES
SECURITY SYSTEM NOTES Installing/Service Company For Service Call Central Station Duress Code FUNCTION CODES Function Code Controls Function EMERGENCY ACTIVATION KEYS (check if enabled) Fire Auxiliary
Volume. EverAccess. User s Manual
Volume 1 EverAccess User s Manual FLEX Series Access Control Management Software Flex1.0 EVERFOCUS ELECTRONICS CORPORATION Flex1.0 Instruction Guide 2004 Everfocus Electronics Corp 1801 Highland Ave Duarte
TX3 Series TELEPHONE/CARD ACCESS SYSTEMS. System Introduction (Sales Training)
TX3 Series TELEPHONE/CARD ACCESS SYSTEMS System Introduction (Sales Training) The new TX3 is designed to provide the best performance and value in stand alone or fully integrated system configurations:
CITY UNIVERSITY OF HONG KONG Physical Access Security Standard
CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication
Edge Metrics Data Center User Manual
Edge Metrics Data Center User Manual Introduction EMDC is an Internet based, Facility Access Control Solution for small to medium size businesses, property management firms, schools, religious facilities,
PC4020 v3.3 Instruction Manual
PC4020 v3.3 Instruction Manual WARNING: This manual contains information on limitations regarding product use and function and information on the limitations as to liability of the manufacturer. The entire
V2.0 Attendance System Hardware Suite Guide Instructions Manual
CONTENTS TA920 V2.0 Attendance System Hardware Suite Guide Instructions Manual Chapter One - Introduction 1.1 Communication Port 5 1.2 Power Source Control. 5 1.3 Attendance Users. 6 1.4 Registering Ways..
HyperAccess Access Control System
Control System We manufacture, an advanced PC based access control solution that will give you control over who has access to your building. With you can control access on hundreds of doors for up to 10,000
Integrated Security System
Integrated Security System Door Access Control System Elevator Access Control System Elevator Vandalism Protection System Car Park Control System Time Attendance System A Simple Building Integration System
Network Management System (NMS) FAQ
Network Management System (NMS) FAQ Q: How does the NMS work? A: The Cooper NMS is a powerful, flexible and highly scalable wireless and fixed network management solution for thousands of network nodes
Accenta/Optima. User Guide. Servicing Organisation (Installer) name: Telephone Number: Date of Installation: Account Number: Honeywell Security
Accenta/Optima User Guide ZONE 1 2 3 4 5 6 7 8 9 Chime Omit Prog PA 0 1 2 3 4 5 6 7 8 9 CHIME OMIT RESET PROG SET Accenta + TA PA DAY POWER PA! " # $ % & 0 1 2 3 5 6 7 8 Chime Omit Reset Prog 4 9 Set PA
Solution Ultima ICP-CC488 Home security you can rely on
Solution Ultima ICP-CC488 Home security you can rely on Keeping your home and family safe doesn t need to be complicated. That s why we ve made the Ultima security system so easy to use all it takes is
Access Control Management System User s Manual
Access Control Management System User s Manual V1.0.0 Table of Contents 1 Product Overview... 3 1.1 Overview... 3 1.2 System Requirement... 3 2 Client Installation... 4 3 Login System... 7 3.1 Login...
[FAQ] Troubleshooting Access Control Issues
[FAQ] Troubleshooting Access Control Issues Article ID: GV4-14-06-16-t Release Date: 06/16/2014 Applied to GV-ASManager GV-AS Controller GV-Reader Summary When you encounter problems with GV-ASManager,
Access Control. Intrusion Alarms. Elevator Control CCTV & DVR. Photo ID. Building Automation. Visitor Management. On & Offsite Monitoring
Access Control Intrusion Alarms Elevator Control CCTV & DVR Photo ID SECURITY MANAGEMENT SYSTEM Building Automation Visitor Management On & Offsite Monitoring BUILDING SECURITY WORLDWIDE Our Corporate
User s Guide. Security Operations. 2013. 5 Ver. 1.02
User s Guide Security Operations 013. 5 Ver. 1.0 Contents 1 Security 1.1 Introduction... 1- Compliance with the ISO15408 Standard... 1- Operating Precautions... 1- INSTALLATION CHECKLIST... 1-3 1. Security
SECURITY SYSTEM NOTES
SECURITY SYSTEM NOTES Installing/Service Company For Service Call Central Station Duress Code FUNCTION CODES Function Code Controls Function This system is is not partitioned. EMERGENCY ACTIVATION KEYS
Information Systems Security Assessment
Physical Security Information Systems Security Assessment 1. Is the server protected from environmental damage (fire, water, etc.)? Ideal Answer: YES. All servers must be housed in such a way as to protect
VR8. User Guide Intruder Alarm System
VR8 EN User Guide Intruder Alarm System VR8 User Guide Notices EN 2 Copyright Notice Unless otherwise indicated, this publication is the copyright of Bosch Security Systems Pty Ltd ( Bosch ). All rights
Kaba Electronic Access Control Keyscan Aurora Software Guide. Powering the future of access control.
Kaba Electronic Access Control Keyscan Aurora Software Guide Powering the future of access control. Keyscan Aurora Access Control Management Software Powering the future of access control For Kaba EAC,
User s Guide [Security Operations]
User s Guide [Security Operations] 010. 6 Ver. 1.01 Contents 1 Security 1.1 Introduction... 1- Compliance with the ISO15408 Standard... 1- Operating Precautions... 1- INSTALLATION CHECKLIST... 1-3 1. Security
Solution 144 The Integrated Access Control & Alarm System made for your business
Solution 144 Access Control & Alarm System 1 Solution 144 The Integrated Access Control & Alarm System made for your business The Solution 144 Integrated Access Control & Alarm System offers an extensive
CONSULTANT PROCEDURES & DESIGN GUIDELINES 28 13 00 ACCESS CONTROL SYSTEM
GENERAL: To provide minimum standards for Access Control Systems. PART 1 Common Work Results for Access Control System 1.1 Owner will provide server and software for connecting control panels through the
Integra32. Integrated Alarm Monitoring and Access Control USER MANUAL
Integra32 Integrated Alarm Monitoring and Access Control USER MANUAL C o p y r i g h t N o t i c e Copyright 1995 2010 by All rights reserved Worldwide. Printed in Canada. This publication has been provided
SECURITY SYSTEM NOTES AREA LISTINGS SPECIAL CODES ENTRY / EXIT DELAY TIMES ARM / DISARM CODES ZONE DESCRIPTIONS
SECURITY SYSTEM NOTES Installing/Service Company For Service Call Area 1 Area 2 Area 3 AREA LISTINGS SPECIAL CODES "Quick Arm" Digit "Partial Arm" Digit "Chime" Digit ENTRY / EXIT DELAY TIMES Exit Delay
Software License Registration Guide
Software License Registration Guide When you have purchased new software Chapter 2 Authenticating a License When you would like to use the software on a different PC Chapter 3 Transferring a License to
F454. Web Server. User Manual 05/12-01 PC
F454 Web Server User Manual 05/2-0 PC 2 Web Server Contents Introduction and basic functions 5. Connection modes 6.. Connection to the data network 6..2 Remote connection 6.2 Using the Web Server with
Solution Ultima ICP-CC488 Home security you can rely on
Solution Ultima ICP-CC488 Home security you can rely on Keeping your home and family safe doesn t need to be complicated. That s why we ve made the Ultima security system so easy to use all it takes is
Introducing Your Cisco IP Phone
CHAPTER 1 A Cisco IP Phone is a full-feature telephone that provides voice communication over the same data network that your computer uses. This phone functions much like a traditional analog phone, allowing
VisorALARM-Manager Application Quick Guide. (Ver. 1.3) Dm 380-I. V:3.0
VisorALARM-Manager Application Quick Guide. (Ver. 1.3) Dm 380-I. V:3.0 1. Installation Requirements 1.1. PC Pentium III processor or higher. Minimum RAM memory: 128 Mbytes Operating system: Windows XP
FireSeeker Fire Alarm Control Panel Model FS-250 Programming Manual
FireSeeker Fire Alarm Control Panel Model FS-250 Programming Manual P/N 315-049403-1 Siemens Building Technologies Fire Safety Table Of Contents Introduction...1 The Access levels...1 User Level...1 Maintenance
Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL
AU7087_C013.fm Page 173 Friday, April 28, 2006 9:45 AM 13 Access Control The Access Control clause is the second largest clause, containing 25 controls and 7 control objectives. This clause contains critical
Biometrics in Physical Access Control Issues, Status and Trends White Paper
Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry
Building Technologies. Access Control. SiPass integrated Fully expandable system that grows with your business
s Building Technologies Access Control SiPass integrated Fully expandable system that grows with your business SiPass integrated : a system, that leaves nothing to be desired. SiPass integrated is the
Access Control Management Software
ACCESS CONTROL MANAGEMENT SOFTWARE Access Control Management Software System VII - meeting today s demands and tomorrow s challenges. Supports multiple-monitor workstations Compatible with Microsoft s
Access Professional Edition Selection Guide
Access Professional Edition Selection Guide 2 Contents Contents 3 System overview 3 Wiegand based hardware 4 RS485 Bus reader 5 Selection Guide The Seven Steps to your Access System 6 Step 1: Choose Base
K1 Access Control Management System User s Manual
Table of contents K1 Access Control Management System User s Manual Aug 2010 1 Table of contents Table of Contents Chapter 1 System Installation and Configuration 1.1 System Operation Flow Chart... 1 1.2
Table Of Contents. System Monitoring... 14 System Monitoring Display...14 Monitoring Zones...15 About Areas (partitions)...15 Area Status Display...
Quick Start Table Of Contents Getting Started... 2 NEware Editions...2 Installing NEware...3 Installing Languages...3 Connecting to NEware...3 Changing Your IP100 Password...4 User Codes... 5 Master Feature...5
Remote Client Program... 3. Web Client... 39
Remote Client / Web Client USER MANUAL T Series Digital Video Recorder Remote Client Program... 3 Remote Client Program Installation... 4 Remote Client... 6 Main Window... 6 Site Registration... 7 Group
Honeywell s WIN PAK SE 2.0 / WIN PAK PE 2.0 Access Control System Guide Specifications in CSI Format SECTION 281300
SECTION 281300 INTEGRATED SECURITY MANAGEMENT SYSTEM PART 1 GENERAL 1.1 SECTION INCLUDES A. Provide a modular and network enabled access control system for security management, including engineering, supply,
VOICE PROCESSING SYSTEM KX-TVM50AL KX-TVM200AL. the voice of business
VOICE PROCESSING SYSTEM the voice of business SYSTEM HIGHLIGHTS The human voice is still the best way to communicate. With the Panasonic and KX- TVM200AL, Panasonic introduces two feature-packed Voice
Access Easy Controller 2.1
Systems Access Easy Controller 2.1 Access Easy Controller 2.1 4 readers expandable to 32 readers Supports up to 20,480 card holders and 100,000 transactions Classify cardholders based on 254 access groups
Access Control Unit User s Guide
NetAXS Access Control Unit User s Guide If this panel is to be added to an existing loop, then all panels need to be upgraded. Please see www.honeywellaccess.com. April 2009 2009 Honeywell. All rights
32 Transferring Projects and Data
32 Transferring Projects and Data This Chapter explains how to transfer GP-Pro EX project files to the GP and how to transfer the project files stored on the GP to your PC. Please start by reading 32.1
AxTraxNG Access Control Management Software
AxTraxNG Access Control Management Software ARCHITECTURAL AND ENGINEERING SPECIFICATIONS April 2013 Experience the Difference www.rosslaresecurity.com 5505-0228701-00 Table of Contents 1. General... 4
Service Manual Advantage Access Systems
Service Manual Advantage Access Systems [AAM4-A and AAM4C-A] May 1996 P/N 09830003 Revision B Advantor Corporation 6101 Lake Ellenor Drive Orlando, FL 32809 Copyright Notice and Software License Copyright
Access Control System Document Number: 620-100240, Rev. D. User Programming Guide. Essential Essential Plus Elite
Essential Essential Plus Elite Access Control System Document Number: 620-100240, Rev. D User Programming Guide USA & Canada (800) 421-1587 & (800) 392-0123 (760) 438-7000 - Toll Free FAX (800) 468-1340
Access control designed simply for you
TruPortal Access control designed simply for you QUICK START GUIDE Introduction TruPortal access control solutions have been engineered and designed to install quickly and easily right out of the box.
OPEN PARK. Automatic Number Plate Recognition that works worldwide including Egypt Number plates
Automatic Number Plate Recognition that works worldwide including Egypt Number plates Free subscription lane, ticket dispenser for nonmembers, ticket readers, e- payment with NFC OPEN PARK INTEGRATED PARKING
Access Control Software Manual
CONTENTS 1. Function overview...1 2. Installation environment...2 3. Concept description...3 4. Installation and Uninstallation...4 4.1 Installation...4 4.2 Uninstallation...10 5. Function instroduction...11
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Product Guide. Product Guide 2014 EMKA, Inc. Page 1 of 12
Product Guide 2014 Product Guide 2014 EMKA, Inc. Page 1 of 12 Digitus BIOMETRIC ACCESS CONTROL Secure every access point EMKA's proven manufacturing process and Digitus Biometric's Superior Engineering
DSX-Soft I/O Integration Software
DSX Access Systems, Inc. DSX-Soft I/O Integration Software DSX now has the ability to integrate with various different external devices through serial data streams. This integration allows other systems
Nicholas Mezei CSCI 6448 OOA&D Homework #3: Use Cases. Use Case Diagram: Home Security System. Alarm System
Nicholas Mezei CSCI 6448 OOA&D Homework #3: Use Cases Use Case Diagram: Home Security System Alarm System Use Case #1: Issue Smoke Alarm Primary Actor: Smoke detector Goal in Context: Smoke detector detects
Data Security Kit (E) Operation Guide (for Printer)
Data Security Kit (E) Operation Guide (for Printer) Introduction This Operation Guide explains the procedures for installing and operating the optional Data Security Kit (E) (hereinafter called Security
APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS
APPLICATION NOTE Contents The DMP Software Family... 1 Stand-Alone Link Software... 1 Add-on Modules for Link Software... 1 System Link End-User Panel Management Software... 2 Simple Registration and Activation...
Galaxy 2 Series. User Guide. Honeywell Security
Galaxy 2 Series User Guide Honeywell Security Table of Contents Table of Contents... iii Introduction...1 Controlling Your Alarm System...2 Users... 2 Groups... 2 Keypads...3 Prox Tags/Cards... 3 Wireless
Physical Security for Companies that Maintain Social Infrastructure
249 Hitachi Review Vol. 63 (2014), No. 5 Featured Articles Physical Security for Companies that Maintain Social Infrastructure Shinsuke Kanai Kenji Nakamoto Akio Takemoto Masatoshi Furuya OVERVIEW: While
The Challenger Version 8 User Guide
Issue III : October 1997 The Challenger Version 8 User Guide CONTENTS Introduction... 3 Glossary... 4 The Challenger Console.. Liquid Crystal Display... 6 Keypad... 7 Indicator Lights... 8 User Identification...PIN...
GV-AS/EV Controller. User s Manual
GV-AS/EV Controller User s Manual Before attempting to connect or operate this product, please read these instructions carefully and save this manual for future use. AS100.110.120.210.400.410.810-EV48-A
The Access Engine. Building Integration System - The Access Engine. Security Systems
The Access Engine 1 What is BIS Access Engine? It is one of the central software modules of the Building Integration System It s a fully integrated access control solution with corresponding access hardware
3 Specification. Master Chip Broadcom 1190. Keys Direct-button 1. Microphone 1. Amplifier 0.5W Speaker 0.5W. Voice
I20-T Door Phone 1 Description I20-T Voice Access control is a digital IP door phone with Fanvil Voip Solutions (Broadcom chip 1190), stable and reliable. FDSP ensure voice loud and clear. Good looking,
ZKAccess User Manual. Version: 1.1 Software Version: For ZKAccess 4.1.8/5.0.8 and above Version Date: June, 2011
ZKAccess User Manual Version: 1.1 Software Version: For ZKAccess 4.1.8/5.0.8 and above Version Date: June, 2011 About This Manual This document introduces the main functions, the user interface and operations
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
How To Get A Cell Phone With A Video Camera And A Speaker Phone (For A Premium) For A Small Price (For An Extra $100) (For The Premium) ( For A Long Time) (With A Long Distance) (To
IP Video Door Phone Solution AP-VP280 AP-ACS1000 (Door Access Control Server) AddPac Technology 2011, Sales and Marketing AP-VAC20 AP-VAC50 AP-VAC100 AP-VAC200 www.addpac.com Contents IP Video Door Phone
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
RAD-SYS-NEMA4X-SMS Control Cabinet. Solution guide for SMS-based remote access control and intrusion detection system
Solution guide for SMS-based remote access control and intrusion detection system Contents Application: Remote access control and intrusion detection Page 1 Solution: SMS Relay control cabinet Page 2 System
National Security Systems Inc (800)457-1999. Security System User's Guide
National Security Systems Inc (800)457-1999 Security System User's Guide Security System Glossary As security system technology has evolved, a special jargon has developed. Some terms widely used within
Export of audit trail events from Salto software. Version 2.0
Export of audit trail events from Salto software Version 2.0 Historic of changes Version Status Date Author Change description 1.0 Stable 20/12/2011 Mikel Larreategi First version of the specs. 2.0 Stable
Access to the Lift Data Menu is via The Challenger User Menu option - Program Door Data.
LIFT DATA MENU How to access the Lift Data menu: Access to the Lift Data Menu is via The Challenger User Menu option - Program Door Data. 1. The display will show: Program Door Data Enter Door No. (17-64):?
