Using triggers and actions



Similar documents
Access Control & Burglar Alarm Integration with KT-300

Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2. Instruction Manual

Volume. EverAccess. User s Manual

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

The FlexiSchools Online Order Management System Installation Guide

Apps for Android. Apps for iphone & ipad INS584-3

The FlexiSchools Online Order Management System Installation Guide

Installation Guide. IDA Indoor Climate and Energy. EQUA Simulation AB January Copyright 2014 EQUA Simulation AB.

Integrating Trend Micro OfficeScan 10 EventTracker v7.x

Manual Password Depot Server 8

Introduction. Before you begin. Installing efax from our CD-ROM. Installing efax after downloading from the internet

ABUS WIRELESS ALARM SYSTEM

IIS, FTP Server and Windows

Basic Mercury Powered NXT Configuration in Doors.NET TM Application Note. 1.0 Adding an NXT-MSC Controller to the NXT Gateway

TSM Studio Server User Guide

User s Manual. Management Software for ATS

Table Of Contents. System Monitoring System Monitoring Display...14 Monitoring Zones...15 About Areas (partitions)...15 Area Status Display...

tattletale User Guide Consumer unit version P a g e

Geotech AEMS Data Centre User Guide

Serenity s Web & Mobile Remote Access Concept

Monitoring Network DMN

Network DK2 DESkey Installation Guide

ImagineWorldClient Client Management Software. User s Manual. (Revision-2)

The FlexiSchools Online Order Management (FOOM) Installation Guide

ViewPower. User s Manual. Management Software for Uninterruptible Power Supply Systems

IsItUp Quick Start Manual

FAX SERVER. User manual. Stonefax user guide

HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE

Crow Limited Warranty. Print Version 017

User s Manual. Management Software for Inverter

AS-525. AxTrax Access Control Management Software. Software Manual

Medical Vacuum Systems-PXMI

Immotec Systems, Inc. SQL Server 2005 Installation Document

Configuration Guide. Remote Backups How-To Guide. Overview

The FlexiSchools Online Order Management System Installation Guide

Apple Mail Outlook Web Access (OWA) Logging In Changing Passwords Mobile Devices Blackberry...

Operating Manual QUESTOR

Kaseya 2. User Guide. for Network Monitor 4.1

Setting up a Scheduled task to upload pupil records to ParentPay

E-Map Application CHAPTER. The E-Map Editor

RoomWizard Synchronization Software Manual Installation Instructions

SPC Connect Configuration Manual V1.0

Scan to Quick Setup Guide

Configuring, Customizing, and Troubleshooting Outlook Express

POP3 Connector for Exchange - Configuration

If you are unable to set up your Linksys Router by using one of the above options, use the steps below to manually configure your router.

System Galaxy Technical Guide CONFIGURATION AND OPERATION

VisiCount Installation. Revised: 8/28/2012

Veritrax. PC interface software For management Access Control Unit AC215. Software Users Guide

BioWin Network Installation

Chapter 4 Control Center

Policy Based Encryption Gateway. Administration Guide

Additional Requirements for ARES-G2 / RSA-G2. One Ethernet 10 Base T/100 Base TX network card required for communication with the instrument.

SNMP Web card. User s Manual. Management Software for Uninterruptible Power Supply Systems

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my ? Q. How do I change or reset a password for an account?

Also you need the C-MOR ISO file. This file you will find following this link:

AusCERT Remote Monitoring Service (ARMS) User Guide for AusCERT Members

How to Program a Commander or Scout to Connect to Pilot Software

SELF SERVICE RESET PASSWORD MANAGEMENT WEB INTERFACE GUIDE

Installing the Microsoft Network Driver Interface

MS Live Communication Server managed by TELUS. Getting Started Guide. v. 1.0

Welcome to Bell Aliant NextGen Home Security

SMS for Outlook. Installation, Configuration and Usage Guide

OnGuard Online User Guide

Pharos Control User Guide

SecuraLive ULTIMATE SECURITY

How To Set A Timer On A Gg System

Using Avaya Flare Experience for Windows

Remote Client Program Web Client... 39

SQL Server Setup for Assistant/Pro applications Compliance Information Systems

Config software for D2 systems USER S MANUAL

PineApp Surf-SeCure Quick

Using AppMetrics to Handle Hung Components and Applications

APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS

DC-8706K Auto Dial Alarm System

Elite 8D/Lite Version 8 Zone Controller. Arrowhead Alarm Products Ltd. Operating Guide. Proudly Designed and Manufactured in New Zealand

IXP120 Alarm Monitor Utility

Quick Scan Features Setup Guide. Scan to Setup. See also: System Administration Guide: Contains details about setup.

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

How To Use Exhange On Outlook On A Pc Or Macintosh Outlook 2007 On Your Pc Or Ipad (For Windows Xp) On Your Ipad Or Ipa (For Your Windows Xp). (For A Macintosh) On A

TRILOGI 5.3 PLC Ladder Diagram Programmer and Simulator. A tutorial prepared for IE 575 by Dr. T.C. Chang. Use On-Line Help

Quick Start Guide.

User Manual WatchPower

Phone: Fax: Box: 230

Configuring Network Load Balancing with Cerberus FTP Server

Kaseya 2. User Guide. Version 1.0

HL2170W Windows Network Connection Repair Instructions

Access Central 4.2 Tenant Billing

MobileStatus Server Installation and Configuration Guide

2012 November. AxTraxNG Access Control Management Software Software Manual (Version 21.x)

2 4PI175 issue 1_6/01. How to unset system in alarm. Programs 1, 2 and 3. Access codes. How to operate Personal Attack

ONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0

CHAPTER 2: USING THE CAMERA WITH THE APP

B.A.S.I.S. G and V Offline Setup Guide

Network Setup Instructions

Shellfire L2TP-IPSec Setup Windows XP

Welcome to a whole new level of interactive home security

XR1. Intruder alarm system Operating Instructions. Unset system indications. Set System indication

Copy Audit Touch Installation and Operating Guide

Transcription:

Using triggers and actions Important For Triggers and Actions to function correctly, the server PC must be running at all times. Triggers and Actions is a powerful feature. It can be used to report on specific events as they occur via email, SMS or by playing a sound file. When used in conjunction with I/O boards or spare Plus relays, it will enable the to automatically control various systems around a building. For example, when a user enters the building, can be configured to automatically turn on the lights. It can even be used for more complex tasks. (AN1076 - Integrating with Lift control systems - < http://paxton.info/842 >) To use Triggers and Actions, you will need to enable it from the menu below: Email and SMS text messages With Triggers and Actions, it is possible to send an email or SMS in response to a pre-defined trigger. For instance, if an ACU goes off line, an email can be sent to the system engineer to investigate the problem. Email and SMS servers must be configured in the Server Configuration Utility before these options will appear in the Triggers and Actions wizard. See the last section of this document for more information. 1

Rules The Triggers and Actions feature is based around user defined rules. When an event occurs (Trigger) that is defined in a rule, a specific action is performed. 1. Select Triggers and Actions from tree view. Click 'Add' 2. Then choose the Trigger that will cause this rule to be run. A list of the triggers and some possible applications are listed below: Triggers and possible applications: Trigger - When a user is granted access through a door. Application - Notification when an important person enters the building. T - When a user is denied access through a door. A - Keep track of those users who attempt to break access rules. T - When a token is presented to a door. A - As above, but capture both denied and granted events in 1 trigger T - Upon double presentation of a valid token. A - Any normal token can instantly perform any action if presented twice within 3 seconds. T - When the intruder alarm is armed. A - Use this to ensure lights are switched off when the building is empty T - When the intruder alarm is disarmed. A - Engage building functions when the first person enters T - When an exit button is pressed. A - Create a log of access where a token isn t used T - When a door bell button is pressed. A - Trigger a additional relay when the bell button on a keypad is pressed T - When an input on an IO board is pressed. A - Provide the trigger through direct hardware input. T - When an input on an IO board is released. A - Provide the trigger through direct hardware input. T - When a system setting is changed. A - Monitor changes to the software to keep tabs on operators T - When an IO board goes offline. A - Send an Email/SMS to keep alerted about access control system health. T - When an IO board goes online. A - Send an Email/SMS to keep alerted about access control system health. T - When a control unit goes offline. A - Send an Email/SMS to keep alerted about access control system health. 2

T - When a control unit goes online. A - Send an Email/SMS to keep alerted about access control system health. T - When the fire alarm goes off. A - Email a roll call report T - When a local alarm occurs at a control unit. A - Monitor local door status - Mains fail/tamper or door forced events T - When a timezone becomes active. A - To link an action to the beginning of a timezone. T - When a timezone becomes inactive. A - To link an action to the end of a timezone. T - When the on screen lockdown button is activated. A - Allows lockdown to be activated from a single software click T - When the on screen lockdown button is deactivated. A - Allows lockdown to be deactivated from a single software click T- When a low battery status is reported. A - For battery powered devices, allows warning to book maintenance visits T - When a critical battery status is reported. A - For battery powered devices, allows warning to book maintenance visits T - When a keypad is reported as hacked. A - Alerts for when a keypad reports 20 incorrect key presses T - At a specific time. A - Email a report to senior staff at regular intervals. T - Run immediately. A - Great to test an action, or to trigger something off without any delay T - When an event occurs on the entry system. A - Run triggers based on Entry activity - Events include: Call made Door unlocked Door not unlocked following a call Call not answered Video viewed Door unlocked while viewing video 3. Follow the wizard through the next screens to configure any additional parameters (user group, door names, time zones, etc) that will further define that particular trigger event. 4. The wizard will now ask for the action(s) to be performed. These options are detailed in the following sections. Click 'Next' on the wizard to select and configure the required options. 5. Give the rule a descriptive name and click 'Finish' to save. 3

Action delay timer An action can be delayed by setting a value in this screen. Affect a relay With the addition of I/O boards you can provide output relays to control other systems. (Lights, heating, etc) As well as I/O Boards, any spare relay 2 outputs on plus that are not used for other purposes can be set in the same way. - Select the I/O board and relay that will perform the action and what that action is to be. (AN1066 - Installing an I/O board - < http://paxton.info/506 >) 4

Play a sound (WAV file) A sound can be played when an event matches the rule. Browse to the sound (*.WAV) file that you wish to play. You can find all windows sounds in the \Windows\ Media folder. Click Test to verify the sound. Select the client computer(s) that you want the sound file to play on by entering the computer name into the middle box and click Add. If you wish the sound to play on the server machine, place a check in the box. Email option Enter the email address of the recipient, sender and subject in the fields. Multiple email addresses can be used by inserting a ; between each address. Type the message in the box. You can add event detail by selecting the required data field and clicking insert. Example: On {date} at {time}, {username} had an {description} event at the {doorname} This would be sent as: On 22/04/2007 at 11:00, Joe Bloggs had an Access Denied event at the Back Door. The Highlight button will show the inserted fields, to help you check the final layout. 5

SMS option Enter the number that the SMS is to be sent to and then enter the message text in the same format as described previously for email messages. Multiple SMS numbers can be used by inserting a ; between each number in the list. Example: On {date} at {time}, {username} had an {description} event at the {doorname} This would be sent as: On 22/04/2007 at 11:00, Joe Bloggs had an Access Denied event at the Back Door. Lockdown Lockdown is the facility to secure the site through a single action by disabling access through selected doors. This includes disabling exit buttons and relocking doors held open by time zones. For a description of this special security feature see: AN1122 - How to configure Security Lockdown < http://paxton.info/1743 > 6

Control a Door You can directly control a door lock by selecting an action on this screen. The open door function allows you to select any particular door open time you wish. This is particularly useful if you need to allow certain groups of people extra time to get through a door. For example, disabled users could be nominated under the When a user is granted access through a door trigger to allow greater flexibility when gaining access to building areas. The Hold Door Open function unlocks the door and must be reset with another T&A rule using the 'Close Door' function to relock the door. The toggle door output simply changes the current state of the door. If open the door will close and vice versa. Note: The close or toggle door options will not override a door that is currently held open via a Timezone. Run an.exe file You can directly run an.exe program from a trigger. Browse for the program, select the PC you require this to run on and click ' Next'. 7

Email and SMS servers must be configured in the Server Configuration Utility before these options will appear in the Triggers and Actions wizard. Setting up the email server Run the Server Configuration Utility. Click on the email tab and enter the relevant details for the email server. This is normally the exchange servers name or IP address. Select the port number default is 25. If authentication is being used select Basic or NTLM authentication, enter the account name and password. Check that the email configuration is correct by sending a test email. Apply your changes, restart the server, enter your email address into the box and click the Send button. A test email should be received, confirming that the settings are correct. If the test email fails, check that any anti-virus software is not blocking the configured port. It is possible to test whether the port is available using HyperTerminal. Open HyperTerminal through Start/ Programs/Accessories/Communications/HyperTerminal. Create a new connection. Connect using TCP/IP (Winsock). The Host address is the email server and the port number needs to be set to the correct port. If the port is available, details of the server will be shown on the screen. 8

Setting up the SMS server Run the server configuration utility. In the SMS tab click the Create button which will connect you to the Textanywhere website. Follow the instructions to complete the account set up process. Log in to the Textanywhere website through the client log in link and enter your email and password. You need to note the Client_ID and Client_Pass as shown in the account details page. In the Server Configuration Utility enter your Client_ID into the field named Account and Client_Pass into the field named Password. The Originator field (e.g. ) and a billing reference, (e.g. Access Control) must also be entered. Send a test SMS by entering a telephone number into the box and clicking the Send button. A test SMS should be received to confirm that the settings are correct. 9