Section 28 16 00 Intrusion Detection. FiberPatrol RAMS (FPRAMS) Remote Alarm Management System Software Version 4



Similar documents
Section Intrusion Detection. FiberPatrol RAMS (FPRAMS) Remote Alarm Management System Version 3.10

Pearl Echo Installation Checklist

CQG/LAN Technical Specifications. January 3, 2011 Version

TruVision Navigator v6

Software Operations Manual

Central Management System

Remote Backup Software

Purpose Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations Data Encryption...

Sage Grant Management System Requirements

SYSTEM SETUP FOR SPE PLATFORMS

Remote Backup Software User Manual V 2.0

Mediasite EX server deployment guide

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

XProtect Mobile 1. Specification Sheet

Server Software Installation Guide

7 MEGAPIXEL 180 DEGREE IP VIDEO CAMERA

GlobalSCAPE DMZ Gateway, v1. User Guide

VisiCount Installation. Revised: 8/28/2012

CX Series. Video Recording Server. Quick Start Guide CX784 / CX788 / CX7816. Version

Upgrade to Webtrends Analytics 8.7: Best Practices

intertrax Suite resource MGR Web

Product Characteristics Page 2. Management & Administration Page 2. Real-Time Detections & Alerts Page 4. Video Search Page 6

Server Application. ACTi NVR v2.2. Quick Installation Guide

Enterprise Edition. Hardware Requirements

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet

AKCess Pro Server Management Software

Quad Core Intel Xeon Processor E3. 12 x 3.5-inch SATA 6Gb/s, SATA 3Gb/s hard drive. 1. The system is shipped without HDD.

BlackHawk for MAC Software User Guide

Professional and Enterprise Edition. Hardware Requirements

PC-Duo Web Console Installation Guide

The Video Server. IP Video Server (Codec) with H264 compression, Power over Ethernet & SD card recording. Data Sheet.

SiteCount v2.0 Revised: 10/30/2009

Ignify ecommerce. Item Requirements Notes

Receptionist Small Business

A. All equipment and materials used shall be standard components that are regularly manufactured and used in the manufacturer s system.

Practice Management Installation Guide. Requirements/Prerequisites: Workstation Requirements. Page 1 of 5

Server Installation ZENworks Mobile Management 2.7.x August 2013

Brainlab Node TM Technical Specifications

Delphi+ System Requirements

About This Manual. 2 About This Manual


Network device management solution

E2E Complete 4.0. Requirements

Omnicast Migration Guide 5.2. Click here for the most recent version of this document.

Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage.

AxTraxNG Access Control Management Software

1 DVR 670 Series firmware version (date )

Intel Core i processor. 8 x 3.5-inch SATA 6Gb/s, SATA 3Gb/s hard drive. 1. The system is shipped without HDD.

ivms-5200 Professional Web Manager User Manual

CONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS

TRIDENT7 ELEMENT MANAGEMENT SUITE

Creating client-server setup with multiple clients

Enterprise Manager. Version 6.2. Installation Guide

Installation Guide v1.11 and Higher

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DCS110 CATVisor COMMANDER

Network Video Recorder. User s Manual v Model: SVR-504/508/516/516+

SyAM Software* Server Monitor Local/Central* on a Microsoft* Windows* Operating System

Desktop Surveillance Help

Server Installation Procedure - Load Balanced Environment

SNOW LICENSE MANAGER (7.X)... 3

Workflow Solutions Data Collection, Data Review and Data Management

Acronis Backup & Recovery 11

Servers, Clients. Displaying max. 60 cameras at the same time Recording max. 80 cameras Server-side VCA Desktop or rackmount form factor

Recording. Smart recording (depending on the camera models)

Crystal Quality Business Optimization System Installation Guide

Table 1. Requirements for Domain Controller. You will need a Microsoft Active Directory domain. Microsoft SQL Server. SQL Server Reporting Services

AXIS Camera Station Quick Installation Guide

Installation & Configuration Guide

GFI Product Manual. Deployment Guide

JKW-IP. IP Video Entry System. QuikStart Guide

NETWRIX CHANGE NOTIFIER

Kaspersky Endpoint Security 10 for Windows. Deployment guide

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

Mitel Communication Service & Phone Manager Installation Guide OCTOBER 2014 DOCUMENT RELEASE 4.1 INSTALLATION GUIDE

System Requirements and Prerequisites

SQL Server Solutions GETTING STARTED WITH. SQL Safe Backup

Network Client. Troubleshooting Guide FREQUENTLY ASKED QUESTIONS

NETWRIX EVENT LOG MANAGER

Installation Guide. Help Desk Manager. Version v12.1.0

INSTALLATION AND SET UP GUIDE

Cisco MCS 7816-I3 Unified Communications Manager Appliance

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

Microsoft Windows Apple Mac OS X

FAS Asset Accounting FAS CIP Accounting FAS Asset Inventory SQL Server Installation & Administration Guide Version

SNOW LICENSE MANAGER (7.X)... 3

Tekla Structures 18 Hardware Recommendation

System Requirements Table of contents

DNA. White Paper. DNA White paper Version: 1.08 Release Date: 1 st July, 2015 Expiry Date: 31 st December, Ian Silvester DNA Manager.

Install Pocket Inventory in a Windows Server 2008 Standard Environment

Windows Server 2008 R2 Essentials

Sage Timberline Enterprise Installation and Maintenance Guide

Installation Guide: Delta Module Manager Launcher

Quick Start Guide. GV-Redundant Server GV-Failover Server. 1 Introduction. Packing List

Installing an Omnicast System Omnicast version 3.5

Sedao Ltd. SWEP HD Digital Signage Platform Introduction

Grant Management. System Requirements

Transcription:

Section 28 16 00 Intrusion Detection FiberPatrol RAMS (FPRAMS) Remote Alarm Management System Software Version 4 Architectural and Engineering Specifications

TECHNICAL SPECIFICATIONS DIVISION 28 ELECTRONIC SAFETY AND SECURITY SECTION 28 16 00 INTRUSION DETECTION PART 2 PRODUCTS 2.01 GENERAL A. All equipments, software and media used shall be standard components, regularly manufactured, and regularly utilized in the manufacturer s system. B. All systems and components shall have been thoroughly tested and proven in actual use. C. All systems and components shall be provided with the availability of a technical support phone number from the manufacturer. The phone number shall allow for immediate technical assistance for either the dealer/installer or the end user. D. All equipment and media shall be provided with an explicit manufacturer warranty. 2.02 SYSTEM DESCRIPTION A. The system shall be a network-enabled software platform for security system integration and alarm management. B. The system shall promote integration of perimeter intrusion detection and video surveillance across multiple remote sites. C. The system shall be built on a client-server architecture model. D. The system shall combine automated alarm processing with user-driven alarm management and remote system administration. E. The system shall provide an open interface document for integration with and into other security platforms. F. The system shall meet or exceed performance criteria provided by the FiberPatrol Remote Alarm Management System (FPRAMS) as manufactured by Optellios, Inc., 11 Penns Trail, STE 300, Newtown, PA 18940, U.S.A. 2.03 SYSTEM ARCHITECTURE A. The system shall include a central server to coordinate system operation. B. The central server software shall be based on Microsoft Windows service architecture for unattended operation. C. The central server shall maintain a database of configuration information and alarm records. D. The system shall include client software enabling operators to interface with the central server. E. The client software shall be a Microsoft Windows application with a graphical user interface. F. The central server shall be able to advertise its network address to the clients. G. The central server shall support multiple simultaneous client connections. H. The client software configuration shall control which sites a client can monitor and / or manage. I. The client software shall support Microsoft Windows integrated role-based security. J. The client software shall be able to automatically reconnect to the central server when network connection is re-established after a disruption. 2.04 SUBMITTALS Page 2 of 9

A. System data sheet B. System operation manual C. Supported 3 rd -party equipment, software, and protocol list C. System configuration plan (after site information submission) 2.05 SYSTEM PERFORMANCE A. The system shall be capable of automated alarm processing, including 1. Graphical alarm annunciation on site map display. 2. Audible alarm annunciation. 3. Automated alarm recording into alarm database. 4. Activating PTZ presets for one or more cameras associated with the reported alarm location. 5. Displaying on-screen live video from one or more cameras associated with the reported alarm location in client application. 6. Alarm notification via email or text message (SMTP server required). 7. Alarm notification to other alarm management platforms based on supported protocols. 8. Application of zone masking schedules. B. The system clients shall provide 1. Graphical representation of each monitored site, containing active links to intrusion detection systems, perimeter detection zones, security cameras, and 3 rd party sensors. 2. Means to annotate and acknowledge / clear alarms. 3. Multi-camera live security video display on demand with on-screen PTZ controls for supported PTZ cameras. 4. Simultaneous multi-camera video playback referenced to past alarms. 5. Alarm database tools for alarm loading, sorting, grouping, and report generation. 6. Alarm history tools for alarm review and perimeter security assessment. 7. Equipment operating status and network connection status indicators. 8. Basic system configuration tools. C. The system clients should provide user authentication including 1. Integrated Microsoft Windows security with support for Windows domain security. 2. Multiple access levels for role-based security administration. 3. Access rights configuration tools. 4. Operator logon, logoff, and impersonation. 2.06 SYSTEM COMPATIBILITY A. The system is compatible with 1. Microsoft Windows 7 Professional 32-bit and 64-bit 2. Microsoft Windows XP Professional 2002 SP3 3. Microsoft Windows 2003 Server SP1 4. The system requires Microsoft.NET framework 2.0 B. The system shall be capable of broadcasting alarm information using the following protocols Page 3 of 9

1. FiberPatrol Alarm Protocol 2. ICD-0100 and ICD-0101 from SEIWG 3. CAP v1.1 and V1.2 from OASIS C. The system shall be compatible with the following security equipment 1. Alarm inputs via relay contacts 2. Intrusion Detection Systems a. Optellios FiberPatrol 3. Digital Video Recorders a. See supported equipment list for up-to-date information 4. Video Matrix Switchers a. Pelco CM6700 b. Pelco CM6800 c. Pelco CM9700 5. IP Cameras a. Sony b. Axis Communication 6. Alarm Management Platforms a. Lenel OnGuard 5.12.110 b. Lenel OnGuard 6.0.148 c. Other alarm management platforms via supported standard alarm protocols D. The system manufacturer shall have available integration support services for integrating additional and future models of security equipment and communication protocols. 2.07 SYSTEM SERVER A. The system server shall include 1. Server computer 2. SQL service and database 3. System services 4. Service Manager software 5. System configuration data B. The system server software shall be pre-installed, configured, and tested by the manufacturer. C. The system server software for reinstallation shall be provided on a compact disk. D. System Server Computer shall have the following specifications (or equivalent) 1. Hardware Specifications a. Processor: 1.86 GHz Intel Nehalem CPU b. Hard Disk Drive: Two 500 GB 7,200 RPM SATA HDD Raid 1 c. Memory: 4.0 GB DDR3-1333 ECC RAM d. Built-in dual 10/100/1000base-T Ethernet interface e. 550W redundant universal power supply 2. Software Specifications a. Operating System: Windows 7 Pro 32/64-bit, Windows XP Pro 2002 SP3 or Windows 2003 Server SP1 Page 4 of 9

b..net Framework: v2.0 c. SQL Server: Microsoft SQL Server 2005 Express 3. Mechanical Specifications a. Width: 19 inches (483 mm) b. Depth: 19 inches (483 mm) c. Height: 3RU (5.25 inches, 133 mm) d. Weight: 30 lbs (13.6 kg) 4. Network Specifications a. Multicast enabled b. ICMP enabled c. Static IP address required d. The following TCP-IP ports shall be used by system server i. (optional) 25 notification ii. (optional) 123 time service iii. (reserved) 4120, 4121 iv. 4122 alarm proxy v. 4123 camera control vi. 4124 data service vii. (optional) 4125-4129 protocol translation viii. (reserved) 4130-4135 E. System Server Database 1. The following database software shall be pre-installed a. Microsoft SQL Server 2005 Express b. Microsoft SQL Server Management Studio Express 2. System server database shall be set up using mixed mode security 3. System server database shall be pre-configured with information provided by customer, including a. Intrusion Detection System information i. Model and serial number ii. IP address and port iii. Physical location (e.g. GPS) of the unit b. Site perimeter information i. Perimeter definition ii. Perimeter zone definition iii. Perimeter zone status (enabled/disabled) iv. Perimeter zone schedules (optional) v. Zone camera preset assignments (if applicable) c. CCTV system information (if applicable) i. DVR/NVR and camera brands and models ii. IP address, port, and login credentials for DVR/NVR/IP cameras iii. Physical locations (e.g. GPS) of security cameras F. System Server Services 1. The following System Server Services shall be pre-installed a. Alarm Proxy Service (port 4122) for alarm report aggregation, filtering, distribution, and automated alarm processing b. Data Service (port 4124) for database operation and client remote access authentication Page 5 of 9

c. (optional) Camera Service (port 4123) for enabling remote access to serial camera control devices, such as Video Matrix Switchers d. (optional) Relay Service (port 4128) for enabling remote access to contact closure interfaces e. (optional) Notification Service for sending alarm messages via an SMTP server provided by customer f. (optional) Protocol Translation Service (ports 4125-4129) for rebroadcasting alarm reports using 3 rd party alarm protocols g. (optional) WMI Service for sending alarm reports using WMI technology 2. All services shall be configured as follows a. Startup Type: Automatically b. Logon Account: NT AUTHORITY\NetworkService c. Recovery: Take No Action for all d. Dependency: Data Service only SQL Server (SQLExpress) 3. The Camera Service shall require a connection between the system server and Video Matrix Switchers via RS232 serial ports or equivalent. 4. Service events shall be stored in system event log under a dedicated key. 5. Proxy Service shall support alarm zone masking a. Alarm received from the masked zone shall be marked with Disabled status b. Alarm received from the masked zone shall not trigger any automated action. c. Alarm zone masking shall support a one-time schedule d. Alarm zone masking shall support the following re-occurring patterns 1. Daily 2. Weekly 3. Monthly 4. Yearly e. Re-occurring alarm zone masking shall support termination, including 1. Fixed date/time 2. Number of occurrences 3. Manual termination G. Service Manager software shall enable a system administrator to 1. Start and stop any pre-installed services 2. Configure any pre-installed services, including a. TCP/IP connection parameters b. Service specific parameters 3. View service event log in real time. 4. View details of any service event 5. Download, view, modify and upload system configuration data 6. Back up and restore the system database 7. View current client connection status a. Number of active client connections b. Client IP address c. Client security token 8. Enable limited user access using access key-based feature control 2.08 SYSTEM CLIENT Page 6 of 9

A. System client shall be a Windows application with a graphical user interface that enables an operator to communicate with the System Server. B. System Client software shall be able to operate at any location, provided it has a network connection through the appropriate ports to the System Server and (if applicable) to the CCTV system and / or other integrated components. C. System Client software installation 1. System client software installation shall require the current logon user to have system administrative privilege. 2. System client software installation shall support Microsoft Windows Installer Engine 3.1 or above. 3. System Client software shall provide an MSI package for silent installation. 4. System Client software installation package shall include the Microsoft.NET framework, Microsoft Installation Engine, Video SDK, and other required components. D. Recommended Hardware Configuration 1. Processor: 1.8 GHz or better 2. Hard Disk Space: 100 MB minimum required for software installation 3. Memory: 2 GB minimum 4. Display Adapter: Radeon X1650 Series, 250 MB Video Memory or equivalent recommended 5. Display: 1024x768 minimum, 1280x1024 or higher recommended 6. Network: 100Base-T minimum, 1000base-T recommended E. Software Specifications 1. Operating System: Windows 7 Professional 32/64-bit, Windows XP Professional 2002 SP3 or Windows 2003 Server SP1 2..NET Framework: v2.0 F. Computers running system clients shall not run other programs, with the exception of standard anti-virus software from a reputable company. It is recommended that the computer running the system client software be tested for compatibility. G. Role-Based Security 1. Role Based Security shall be based on windows active directory user group. 2. Role Based Security shall support the following roles, each with its own set of accessible features: a. Administrator b. Supervisor c. Operator d. Guest 3. Role Based Security shall support operator logon, logoff, and impersonation. 4. Role Based Security shall be able to be enabled / disabled by authorized personnel. 5. Role Based Security feature access list shall be configurable. 6. Role Based Security shall support windows domain active directory. H. Event Logging 1. System Client shall log events in system event log under a dedicated key. 2. System Client Event Log shall have a maximum log size capacity of 512kB. Page 7 of 9

I. System Client shall provide the following features: 1. GPS-enabled interactive perimeter map 2. Role-based security and feature control 3. System event log 4. On-the-map alarm display 5. Audible alarm annunciation 6. Remote alarm acknowledgement / clearing 7. Alarm history / assessment tools 8. Alarm report generation 9. Site configuration report generation 10. FiberPatrol sensor status monitoring 11. FiberPatrol sensor communication monitoring 12. Automated multi-camera preset activation 13. Multi-camera live alarm video 14. Live video on-demand 15. Video referencing, search, and playback 16. Universal on-screen camera PTZ control J. System client shall be able to automatically reconnect to the system server when network connection is restored following a disruption. K. System client shall include a client configuration tool 1. Client configuration tool shall be protected by an access code, which shall be a. saved in a machine-specific encrypted form b. able to be changed by authorized personnel 2. Client configuration tool shall be able to a. Enable/disable automatic server discovery b. set the IP address and port of the system server c. set which sites this client can monitor/manage d. set default alarm database downloading filter e. enable / disable role-based security f. change feature access list for each role g. set default map and library path L. System client shall require a valid license key to communicate with system server 1. A valid license key shall be required for each instance of system client software 2. A valid license key shall be issued by the manufacturer and shall contains the following information a. License serial number b. Private key for validation c. Licensed customer name d. Client software edition indicator e. Feature control list f. (Optional) trial time period and/or max number of usage 3. A unique valid license key shall be required for a client to communicate with the system server. Concurrent duplicate use of the same license key shall be rejected by the server. 2.10 PRODUCT AVAILABILITY Page 8 of 9

A. The system as described herein is manufactured by Optellios, Inc. 11 Penns Trail STE 300 Newtown, PA 18940 U.S.A. phone: 267.364.5298 fax: 267.364.5357 email: info@optellios.com 2.11 WARRANTY AND SERVICE A. The system shall be free of defects in workmanship and material under normal operating conditions for a period of one year from the date of shipping. B. Any parts shown defective in workmanship or material during the warranty period shall be repaired, replaced or adjusted free of charge. C. The system shall be supported with service and replacement parts available for a period of 5 years from the date of shipping. D. Warranty and general service shall be provided by Optellios Inc. 11 Penns Trail STE 300 Newtown, PA 18940 U.S.A. phone: 267.364.5298 fax: 267.364.5357 email: info@optellios.com END OF SECTION Page 9 of 9