INDEX INDEX... INTRODUCTION.... System Requirements.... System Install... 4. How to Login... 5.4 Languages... 6.5 Layout... 7.6 Common Icons... 8 TIME MODELS... 9. Configuring Time Models... 0. Holidays... DOOR GROUPS.... Door Groups and Doors Configuration.... Copy Doors... 6. Service Cards... 6 4 BASIC FUNCTIONALITY... 7 4. How to Import/Restore... 7 4. Import CSV File... 8 5 USERS... 9 5. Add New User... 9 5. Search For User... 0 5. Delete User... 5.4 Modify User... 6 CARDS... 6. Create a Card... 6. Modify Card... 4 6. Suspend Card... 5 6.4 Copy Card... 6 7 E-CYLINDER MANAGEMENT... 7 8 AUDIT TRAILS... 9 9 CLIENT-SERVER CONFIGURATION... 0 9. Server Configuration... 0 9. Client Configuration... 4 9. Potential Issues... 5 0 INTEGRATION WITH PEGASYS CONTROLLER... 6 0. Configuration Procedure... 7 0. Firmware Update... 8 0. Services... 9 CREDENTIAL SYNCHRONIZATION MANAGEMENT... 40 BOOKINGS... 4 NETWORK MONITOR... 4 4 LED SIGNALS... 4 5 GLOSSARY... 44 5. System Cards... 44 5. Common Terms... 45
INTRODUCTION. SYSTEM REQUIREMENTS This software package is composed of Microsoft SQL Server Express 005 and the actual administration software, PegaSys 000. Both components are required for this software package to work. + Processor: at least.4 GHz (see also Operating Systems requirements) Hard Drive needs: GB minimum RAM: 5 MB minimum,.0 GB recommended for Windows XP.0 GB minimum,.5 GB recommended for Windows Vista Web Browser: Internet Explorer 6.0 SP or later Operating Systems: any of the following bit Windows versions below Windows XP SP Windows Vista Windows 7 & COMPATIBLE
. SYSTEM INSTALL INSTRUCTIONS. Insert the CD into the computer drive and run Setup.exe. Windows Vista and Windows 7 users should right-click on Setup.exe and select Run as Administrator. Choose the desired language for the installation procedure.. The PegaSys 000 installation starts. If required, the following components will also be installed: - Windows Installer. - Framework MS.NET.0 SP - Crystal Reports 008 - MS C Runtime Libraries Please, confirm the installation of these components.. If on the local computer there is no SQL database available, install MS SQL Express. In case MS SQL Express is installed on a remote system, skip this step. To start installation, enter the MSSQLExpress 005 folder and run SQLEXPR.exe in the appropriate language. (Windows Vista and Windows 7 users should right-click on SQLEXPR.exe and select Run as Administrator). Note: when performing the MS SQL Express installation, make sure to cut off your connection to the network (i.e. temporarily disconnecting Ethernet cable or turning off the Wi-Fi connection). By doing this, the installation should proceed quicker, also decreasing the chances of failures. In case any issue should arise during the installation of MS SQL Express, please call the support. 4. After the installation of PegaSys 000 and MS SQL Express, restart your PC. Note for Windows Vista and Windows 7 users: The PegaSys 000 Dialog needs to be run as Administrator! 4
. HOW TO LOGIN Click on the green checkmark to accept. Click on red cross to cancel. Enter the User Name and Password. Upon initial launch, the PegaSys 000 software will ask the user to present the facility card on the reader. After presenting the facility card, the main the screen will show up as shown above and request the user to type in the User Name and Password. The default start up User Name is irco and Password is admin. User Name and Password can be changed in the User Administration tabs. If an incorrect password is typed three times, the software will exit automatically. 5
.4 LANGUAGES At any screen click on the Language tab and select the desired language. Current Languages Available: English German French Dutch 6
.5 LAYOUT Main View Panel Side Panel Preview Panel Side Panel: This panel is always visible and allows the user to switch between the different views of the PegaSys 000 software. It also allows the user to logout and exit the program at anytime. Preview Panel: This panel allows the user to edit the parameters that will correspond to the a selected entry in the Main View Panel. Main View Panel: This panel itemizes the different entries in the program such as Doors, Door groups, User, etc. It also allows the user to initiate editing of the entries, delete the entries, suspend the entries and search (filter) for them. Note: from each view, it is possible to call the on-line help by pressing F. The help page will be opened contextually to the view which the user is currently visualizing. 7
.6 COMMON ICONS Common icons are located in the top part of the Main View Panel. Add Used to add a new entry such as a new user to the list. Once clicked, blank fields appear in the preview panel to enable new details to be entered. Edit Used to edit the properties of a selected entry. Once clicked, edits can be made in the preview panel and then a green checkmark or red cross must be checked to accept or decline the edits, respectively. Delete Used to remove an entry from the list in Main View Panel. First click on the desired entry and then click the delete icon. A confirmation pop-up will appear. Filter - Used to search for records by narrowing down the choices that closely match what is typed. Once clicked, an empty row in the Main View Panel will show up at top, to input the search criteria. Read Used when it is necessary to read the contents of a user or system card. Write Used to write a user card or system card. In certain screens when it is necessary to write system cards, there will be drop down box next to the icon that will allow to user to decide which system card is written. Choices are: Door Init Card, Time Init Card, Time Model Card and Blacklist card. 8
TIME MODELS The following example is used to explain the concept of Time Models and how they work in the PegaSys 000 software. Please note that this is just an example and the use of Time models is not limited to this. Let s say there is a building with users: Chris, Bob, and Joe. These users need to have access to three sections of the building: entrance, office, and the canteen, at certain times of the day. The first thing to do is to associate each user with a Time Model. It is possible for more than one user to be associated with the same Time Model but in our example we need different Time Models. After this, it is necessary to associate each door with a Time Model Group. In the case above, the Entrance and Office both have the same opening times. Please note the difference between Time Model and Time Model Group. 9
. CONFIGURING TIME MODELS Click on the Edit button. Click on the desired credential From any screen, click on Card. Click on Access Time Model and scroll down to the desired Time Model to be associated with the credential. 4 Click on the green checkmark to accept. Click on red cross to cancel. 5 8 Click on the Edit button. 6 Click on Access targets. 7 Click on the desired door that is to be added Time Model Group. 9 Select the Time Model Group that is desired for the selected door. 0 Click on the green checkmark to accept. Click on red cross to cancel. 0
From any screen, click on Time Models. Click on the box in the HO column to enable holiday access. 5 Click on the Edit button. Click on the desired square that corresponds to the Time Model Group and Time Model which time has to be changed. Edit the times of access for the corresponding Time Model and Time Model Group combination. 4 6 Click on the green checkmark to accept. Click on red cross to cancel.. HOLIDAYS Click on the Edit button. Click on the green checkmark to accept. Click on red cross to cancel. 4 From any screen, click on Presettings. Edit the desired holidays, so that they can be selected when using Time Models.
DOOR GROUPS The following graphics are designed to help explain the concept of Door Groups. Keep in mind, this is just an example and the use of Door groups is not limited to this. Below is a sample plant that has 4 different levels with Door Groups. In our example, let s say there is a need for different card levels, GUEST, STAFF, and SUPERVISOR. GUEST needs access to the ENTRANCE and room number, STAFF needs access to both the entrance and LEVEL, and SUPERVISOR needs access to everything. Therefore, the access rights of the users need to be the following: USER DOOR GROUP GUEST GROUP, Single Door Access Room # STAFF GROUP & GROUP SUPERVISOR GROUP, GROUP, & GROUP
. DOOR GROUPS AND DOORS CONFIGURATION DOOR GROUPS It is possible to edit Click on Door the names of the Door Groups tab. Groups as well as to search for them. Click on Access targets. 4 When a Door Group is selected, all doors belonging to it are listed. DOORS Click Doors tab. Click on desired door and then click edit icon. Select the desired door groups in the left box and click the right arrow to attach them to this door. Click on the Green button to accept, on the red one to cancel. 4
Note: when adding or editing a door, the available fields are: name and description; time model table; opening time: amount of seconds for which the door remains open after presenting a valid card; auto open function: the door will be always open. This feature will be enabled depending on the selected the time model; constant mode: after a valid card is presented, the door remains open. This feature will be enabled depending on the selected the time model; available door groups to which the door will belong. DOOR INITIALIZATION Once both the Door Groups and the single Doors have been configured, it is necessary to communicate the new settings to the stand-alone PegaSys devices. Put a Door Init Card on the read/write unit. Click on the arrow next to the Write icon. Click on Door Init Card Note: when a door characteristics are changed, the checkbox in the Last PC Encoding column remains unchecked until a new, updated, Init Card is created. 4 Present the new Door Init Card to the stand-alone PegaSys device to be initialized. 4
PEGASYS MOBILE WITH NFC INTERFACE This features allows the user to configure one or more stand-alone PegaSys devices, using a PC instead of service cards. The PC reads an XML file, previously created through the Pegasys 000 software, containing operations which emulate the use of the desired service cards, i.e.: door init card; black list card; diagnostic card; audit trail card. The creation path of the XML file can be set in the Presettings panel. The file then has to be opened with the NoC Manager software and sent to the stand-alone PegaSys device through the proper USB communicator. Select the doors to be configured. Click on the XML icon. Select the operations to be performed. Click on green icon to accept changes or on the red one to cancel. 4 5
. COPY DOORS 4 Click on the Clone icon. Click Doors tab. Select the door that is needed to copy. Click on Access targets. Click on green checkmark to accept changes. Click on red cross to cancel. 5. SERVICE CARDS (see section 5.) Click Doors tab. Click on Access targets. Click on Write Service Card icon and follow the instructions to write the card. 6
4 BASIC FUNCTIONALITY 4. HOW TO IMPORT/RESTORE Click on File, Import Database or Restore. The software will force the user to logout from the current screen. Browse the PC for a.mdb file. Import vs. Restore Import is used to import database files from PegaSys 000 v.0 Restore is used to import files from PegaSys 000. 7
4. IMPORT CSV FILE Click on Import from file. Choose the data to import. ID Name Surname Department Creation date Info Info Info Note This is the format of the CSV (Comma Seperated Values) file needed in order to import into the PegaSys 000). 8
5 USERS Click on Users. 5. ADD NEW USER Click on Add icon. Insert the information about the new user that is being added. Click on the green checkmark to accept. Click on red cross to cancel. 9
5. SEARCH FOR USER Click on Filter icon. An empty row will appear. Type in any of the empty fields to search for the desired record. 0
5. DELETE USER Click on the row that is to be deleted. Click the delete icon. 5.4 MODIFY USER Click on the edit icon. Click on the row of the user which needs to be modified. Modify the desired information with regards to the user. Click on the green checkmark to accept. Click on red cross to cancel. 4
6 CARDS Click on Cards. Note: It is also possible to access the Card menu by selecting a user in the Personnel view and then clicking on Show Credential. See below. Click on Users. Click on desired User. Click on Show in card view.
6. CREATE A CARD Add new user, as described in Section.. Click on Add new Card. The Credential screen will then show up. Click on the Write icon. Make sure a blank card is present on the external reader. 4 Make any edits to the new credential and then click on the green check mark to accept changes.
6. MODIFY CARD Select the desired credential to edit, and click the edit button. 4 Click on the green checkmark to accept. Click on red cross to cancel. Edit the various parameters Click on the door groups that are desired to be associated with this credential. 4
6. SUSPEND CARD Select the desired credential Click on the Suspend icon. Repeat steps and to to add more cards to the blacklist. Click on Access targets. 4 Click the Write icon. Present the blacklist card to the external reader. Once the card is written, present it to the standalone PegaSys device. 5
6.4 COPY CARD Select the desired credential to copy. Click on the copy button. Click on a different card where the copied information needs to be pasted, and click the Edit icon. Click on the Paste button. 4 6
7 E-CYLINDER MANAGEMENT Click Doors tab. Click on Access targets. Click on Write Service Card icon and follow the instructions after to write the card. The Create battery changing card and the Create mounting Card are cards used for doors with the E-Cylinder. Create battery changing card This card will need to be presented before changing the battery of the E-Cylinder. Create mounting card This card will need to be presented to dismount the E-cylinder from the door. Both the E-Cylinder management cards described above have Card version number associated with it. This version number can be incremented as described in the screen shot below. By assigning a version number, it allows the history of the card to be tracked. 7
Click on the edit button. Click on the green checkmark to accept. Click on red cross to cancel. 4 Change the the Diag. Card version as desired. From any screen, click on Presettings. 8
8 AUDIT TRAILS Present a Download card to the stand-alone PegaSys device and allow it to transmit the history information. Click on the Read Card icon. Make sure the Download card is present on the external reader. Click on Audit trails. 4 The lock history will then populate. It is possible to print, delete, or search using the icons above. 9
9 CLIENT-SERVER CONFIGURATION This configuration is used to for configurations where more than one PC (clients) is connected to the MS SQL backbone on a separate PC (server). Note: This configuration requires setting changes to MS SQL. If the user is not familiar with this, it is best to contact technical support or the IT department for consultation. 9. SERVER CONFIGURATION. During the installation of the MS SQL, there will be a screen that is called Authentication Mode. The default option is Windows Authentication Mode. Change to Mixed Mode and then below enter a password. Type in the same password in the Confirm password field below.. After the MS SQL and PegaSys 000 is installed, it is necessary to enable remote connections for SQL Server 005. To do this follow the instructions below. In Windows, click Start->Programs->Microsoft SQL Server 005->Configuration Tools->SQL Server Surface Area Configuration. 0
Click on Surface Area Configuration for Services and Connections. On the left panel, expand Database Engine and then click Remote Connections. Click Local and Remote connections and select the appropriate protocol that is required in this user s specific setup. Then click Apply.
4 In the same screen, click on Service instead of Remote Connections. Click Stop and wait until the MSSQL service stops. Then click Start again to restart the MS SQL service. Click OK.. It is now necessary to enable the SQL Browser service. Just like in Step, enter SQL Server 005 Surface Area Configuration and click on Surface Area Configuration for Services and Connections.
On the left panel, click on SQL Server Browser. Verify that Startup type in the right portion of the screen is set to Automatic. After this, click Stop and then Start again, just like in the previous step.
9. CLIENT CONFIGURATION The client configuration is much simpler than the one of the server. The PC where the client is located does not need to have MS SQL installed, just the PegaSys 000. The point of this configuration is to connect to the SQL server of the server.. Launch PegaSys 000 software from the desktop.. Enter in Database Settings. Click on Options, then Database Settings.. Edit the database settings so the Client can connect to the Server. Click on Use local host, and then type in the IP address of the computer that has the server in the adjacent field. Click on Windows Authentication, and enter sa as the User ID. The Password is the same password that the user assigned in the MS SQL installation of the Server (Section 9. Step ). 4
9. POTENTIAL ISSUES After completing the steps outlined in Section 8. and Section 8., the Client should be able to connect to the Server. However, if errors appear, it may be there is a problem with a firewall. In order to solve this problem, please follow the steps below. It is recommended to apply these steps in both the Client and Server.. Create an exception for SQL Server 005 in Windows Firewall. In the Windows Control Panel, click on Windows Firewall. Click on Exceptions tab, and then click Add Program. In the Add a Program window, click Browse. Open the C:\Program Files\Microsoft SQL Server\MSSQL.\MSSQL\Binn\sqlservr.exe, click Open, and then click OK. (The file path sqlservr.exe may be different than the path on each PC).. Create an exception for SQL Server Browser service in Windows Firewall. In the Windows Control Panel, click on Windows Firewall. Click on Exceptions tab, and then click Add Program. In the Add a Program window, click Browse. Open the C:\Program Files\Microsoft SQL Server\90\Shared\sqlbrowser.exe, click Open, and then click OK. (The file path sqlservr.exe may be different than the path on each PC).. If completing the two steps above does not solve the connection problem between the Client and the Sever, then most likely there is another type of firewall that was not disabled. To solve this issue, repeat the steps above also for the other firewall. If you still have problems, please contact local IT department. 5
0 INTEGRATION WITH PEGASYS CONTROLLER When a connection between a PegaSys Controller and the PegaSys 000 is implemented, all the basic features remain available, with the addition of several advanced features, such as: rewriting: from the PegaSys 000 it is possible to select an existing credential and to change some of its parameters (access rights, validity period, groups, etc.); once the card is presented to the validator, the new profile is written into the card. recoding: from the PegaSys 000 it is possible to change the format of an existing credential (this implies a modification in the card data structure); in order to complete this operations, it is necessary to present the card to the USB reader connected to the PC with PegaSys 000. validation: every credential has a validation period written on it; once the validation has expired, the card will not open the stand-alone PegaSys devices until it is re-validated. This type of control forces the users to periodically present their credentials to an on-line validator that can be directly controlled by the PegaSys 000. automatic bookings collection: the list of the operations done on the PegaSys Controller is automatically transmitted to the PegaSys 000. Note: in order to use the advanced features for on-line systems, it is necessary to initialize the PegaSys 000 with a facility card version.. 6
0. CONFIGURATION PROCEDURE Make sure that the SQL Server is properly installed and running. Start the PegaSys 000. 4 Click on the Add button and choose Add Controller. 5 Select controller name, description and IP address or network name (which must belong to the same subnet of the Host PC). Click on Controller Settings. Confirm creation. 6 8 7 Click on the Add button and choose Add Terminal. Select terminal name, description and other parameters. Confirm creation. 9 7
Note: in the definition of an on-line terminal, it is possible to set the Enable Door Relay checkbox. If this feature is active, the terminal relay is powered on for the time set as Door Relay Timeout; after this time is elapsed, the relay is powered off again. Select the PegaSys Controller. 0 Click on the Send Configuration button (active only if the PK communication service is not running). Press the Start Service button. 0. FIRMWARE UPDATE From the same page (Controller Settings), it is possible to update the firmware installed on both the PegaSys Controllers and the Terminals included into the network. Eventually, a user can also set one or more devices off-line, by selecting them and clicking on the correspondent buttons. To update a PegaSys Controller firmware: Click on Send Controller firmware Click on the PegaSys Controller 8
To update a Terminal firmware: Click on Send terminal firmware Click on the Terminal 0. SERVICES With PegaSys 000, two Windows Services are also installed; they are only used when a PegaSys Controller is connected to the PegaSys 000. IRFileserver: this service manages the file exchange between the PegaSys Controller and the PegaSys 000; PegaSys 000 Service: this service acts as a scheduler to synchronize data between the PegaSys Controller and the PegaSys 000. There are two ways to start (or stop) this service: ) by clicking on the apposite button in the Controller Settings page; ) by right-clicking the system tray icon. 9
CREDENTIAL SYNCHRONIZATION MANAGEMENT When using the PegaSys 000 on-line with a PegaSys Controller, all the credentials may have 4 possible synchronization statuses. These are used to keep track of the synchronization between the physical supports (badges, cards) and its representation inside the system (the logical credential). Icon Status Description Unassociated Associated To be rewritten To be recoded The logical credential has been created and saved in the PegaSys 000 but it has not been written into a physical support yet. The logical credential has been written into a physical support. The logical credential has been modified (but not its format) and has not been rewritten into the physical support through either the PegaSys 000 or the PegaSys Controller yet. The logical credential format has been changed (sector layout, etc..) and must be re-encoded into the same physical support through the PegaSys 000 only (this operation cannot be done by the PegaSys Controller). The synchronization is represented as an additional column in the Cards view: 40
BOOKINGS When the PegaSys 000 communication service is running, all the operations done on the PegaSys Controller are automatically collected and reported in the Controller Bookings view. Click on Controller Bookings Also the battery level is collected, and reported in the dedicated tab: Battery Warning Bookings tab. 4
NETWORK MONITOR By clicking on Network Monitor, it is possible to have a complete view of all the devices which are included into the network. In particular: PegaSys Controllers are visualized with their own IP address and description; Terminals include their name, description and ID number. Click on Network Monitor The state of each device can be seen through its icon: A black icon indicates that the device is on-line. A grey overshadowed icon indicates that the device is off-line. A yellow warning triangle on the icon indicates that the device s cover is open. 4
4 LED SIGNALS LED SIGNALS FOR USER CARDS: DOOR OPENED WITH SINGLE CARD. DOOR OPENED WITH TOGGLE CARD. DOOR CLOSED WITH TOGGLE CARD. LOW BATTERY INDICATION WHICH PRECEDES THE EXPECTED LED SEQUENCE SPECIAL SIGNALS: DATA HAS BEEN READ/WRITTEN TO A SYSTEM CARD. NO CARD IN THE ANTENNA RANGE. FAILED TO READ/WRITE DATA FROM A SYSTEM CARD. THE CARD DOES NOT HAVE VALID AUTHORIZATION. TIME INIT CARD IS NECESSARY TO RE-INITIALIZE. DOOR INIT CARD IS NEEDED TO RE-INITIALIZE. FACILITY CARD IS NEEDED TO REINITIALIZE. DATA TRANSMISSION IS OCCURRING. Represents acoustical sound (beep) 4
5 GLOSSARY 5. SYSTEM CARDS Facility Card: This card, which contains the object specific data, is needed when the software is started for the first time. It transfers object specific data to the software. Booking Card: This card can read the booking data stored in the terminal s cache memory. This information can then be loaded in the PegaSys 000 software. One booking card has a capacity to buffer up to 80 bookings. This is why it is necessary to sometime use several bookings to read all the data from the terminal s cache memory. SERVICE CARDS: Door Init Card: This card transfers all the necessary terminal data to the stand-alone PegaSys device such as door number, door groups, door functions, date, and time. Time Model Card: This card uploads the specified date and time as well as the time models that have been created to the door terminals. Time Init Card: This card transfers date and time to the terminals. This date and time is determined when the Time Init Card is created. Blacklist Card: If a card (credential) needs to be de-activated, then it first needs to be added to the blacklist. After this, a card is created (blacklist card) and is then presented to any terminal to deactivate the credential. Battery Changing Card: This card is used to change the battery of the E-Cylinder. This card can be version controlled for an extra level of security. Mounting Card: This card is used to dismount the E-Cylinder from the lock. This card can be version controlled for an extra level of security. See Section 7 for more information about this feature. 44
5. COMMON TERMS Read-Write Device: A device, connected via USB to the computer, in order to read and write system cards and user cards. PegaSys: Electronic device with Inside/Outside Handle, battery operated. E-Cylinder: Electronic cylinder, battery operated. CSV-file (Comma Separated Values): Commonly used to transport large amounts of tabular data between either companies or applications that are not directly connected. The files are easily editable using common spreadsheet applications like Microsoft Excel. User: A user is a person with some access authorization; the user s access rights are stored on a card. Card: It is always associated to a User; it contains the parts of the system for which the User has access rights and the time validity of these rights. Door: A Door is an access point of the system; it could be a PegaSys stand-alone lock or an E- Cylinder. Single Door: A Single Door is a particular kind of Door; it could be accessed by a user card which does not have control over the Door groups. Door group: A Door group is a set of Doors. All the Doors belonging to a Door group can be accessed with a single card with access rights for the Door group. Time model group: A Time model group can include up to 6 time models, with 4 different time intervals each. Each Time model group is registered on the stand-alone PegaSys devices. In most cases, one Time model group per system is enough. Time model: A Time model has 4 time intervals. On the user card, there is reference to the Time model table. Holiday: Holidays or vacation intervals are special days in which the authorization is different with respect to the weekdays. 45
Ingersoll Rand s Security Technologies Sector is a leading global provider of products and services that make environments safe, secure and productive. The sector smarket-leading products include electronic and biometric access-control systems; time-and-attendance and personnel scheduling systems; mechanical locks; portable security; door closers, exit devices, architectural hardware, and steel doors and frames; and other technologies and services for global security markets. www.ingersollrand.com Ingersoll Rand Security Technologies Bescott Crescent, Walsall West Midlands WS 4DL. UK Tel.: +44 (0) 9 707400 Fax: +44 (0) 9 70748 www.pegasys.ingersollrand.com EDV-Nr. 050500 /0/0-0