Secure Perfect 6.1 What s new in this release? The Secure Perfect Installation CD has been updated to include SP 6.1.1 Service Pack 3. This CD is used for new Secure Perfect installations or for customers that are upgrading from Secure Perfect versions prior to 6.1.1. The Secure Perfect Service Pack 3 Installation CD is included in the media kit and is used to upgrade existing Secure Perfect 6.1.1 systems. Your Secure Perfect 6.1.1 system must be at Service Pack 2 prior to upgrading to Service Pack 3. Refer to Release notes for 6.1.1 SP3 on page 1. Contents of this document 1. Overview on page 1 2. Release notes for 6.1.1 SP3 on page 1 3. Release notes for 6.1.1 on page 2 4. Release notes for 6.1 on page 11 5. What s new in Secure Perfect 6.1.1 on page 12 6. Trademark/disclaimer on page 14 1. Overview This document supplements other printed documentation, and summarizes critical issues that may be encountered. This is not a substitute for any other documents. Changes since the last publication of this document are marked by a change bar, which is a vertical line in the margin that visually identifies significant new or revised material. 2. Release notes for 6.1.1 SP3 Fixes and Enhancements Added support for Windows 2003 Service Pack 2, Windows XP Service Pack 3, and SQL Server 2005 Service Pack 2. Added new firmware version 7.0.01 for the PXN/PX microcontrollers. In prior versions of SP 6.1.1, the host limited the expiration year to 2013 when sending the badge database to the controller. Updates to the host in SP 6.1.1 SP3 along with the PXN/PX 7.0.01 firmware have now changed the maximum expiration year to 2019. Fixed the issue of slow network performance when adding a badge on a remote client via the WAN. Fixed the issue of device redundancy occurring randomly. Fixed the issue of names and descriptions being truncated in the history file when containing an apostrophe. Fixed the issue of newly generated held open alarms not being reported in Alarm History report when filtered by the microcontroller. Fixed the issue of incorrect display of total time in time and attendance reports. Fixed the issue on the Reader Form/Door Functions that if None is selected from the drop-down lists, an error is generated when trying to save the form. Fixed the issue of video files recorded in SP 6.1.1 and saved as *.avi format do not display properly in the Microsoft Media Player. Fixed the issue of the Micro Report displaying a Micro PXN+ as a Micro 6/s. Fixed the issue of the CCTV on/off messages not being displayed in the Diagnostic Viewer if the application is not running. Fixed the issue of not automatically creating the database during installation. Fixed the issue of License failure on Windows 2003 Server with SQL Server 2005 when password policy is enforced. Installing Secure Perfect 6.1.1 Service Pack 3 1. Secure Perfect 6.1.1 Service Pack 3 is a self-installing executable file that should only be applied to a Secure Perfect 6.1.1 system with Service Pack 2.
2 Secure Perfect 6.1 2. The Secure Perfect application and all Secure Perfect services must be stopped on all servers and client workstations before installing the Service Pack, and can only be applied by local or domain account users logged in with Administrator group permissions. 3. Release notes for 6.1.1 Support for DVMRe CTII Digital Video Recorders Integrated digital video surveillance requires its own hardware and software. In addition to the DVRs previously supported, the system now supports the following digital video multiplexer/ recorders: GE DVMRe CT II / StoreSafe Pro II - 4 GE DVMRe CT II / StoreSafe Pro II - 10 GE DVMRe CT II / StoreSafe Pro II - 16 CT II and StoreSafe Pro II series recorders are part of the family of wavejet compression-based technology products. Support for Microsoft SQL Server 2005 Standard Edition Secure Perfect 6.1.1 now supports Microsoft SQL Server 2005 Standard Edition. Refer to Installing Microsoft SQL Server 2005 Standard Edition on page 2 for full details. Signature Capture Display Typical results previously displayed skewed when capturing signatures using the Photo tab of the Personnel form. This has been fixed. Backing up Secure Perfect SQL Server 2000 databases using Enterprise Manager If you are upgrading your system from an earlier version of Secure Perfect, and your previous database platform was Microsoft SQL Server 2000, you need to back up the Secure Perfect databases, restore to SQL Server 2005, and then run a conversion. This document focuses on the backup, restore, and conversion of SQL Server 2000 databases to SQL Server 2005 platform, as shipped with the system that you purchased. You must back up the following databases: SecurePerfect SecurePerfectHistory SecurePerfectArchive Note: Refer to the Secure Perfect Installation Manual for complete and detailed instructions for upgrading your system. Custom stored procedures or triggers added to the Secure Perfect databases need to be removed. You can re-create custom procedures or triggers after the conversion is complete. To back up your SQL 2000 Secure Perfect databases: 1. Click Start, Programs, Microsoft SQL Server, then Enterprise Manager. The SQL Server Enterprise Manager opens to display the Microsoft SQL Servers. 2. Expand the navigation tree and open the Databases folder. 3. Right-click SecurePerfect. The SQL Server Enterprise Manager - Secure Perfect Shortcut menu displays. 4. Click All Tasks, then Backup Database. The SQL Server Backup dialog box displays. 5. In the Name field, you can keep the default or choose a different name. 6. Select the Database - complete option button. 7. Under the Destination, you can choose either a file name or a device, such as a tape. (The first time you perform this function, you are required to create the device by clicking Add.) We recommend that you select the device or a file on a network. 8. Double-click the file name displayed in the Backup to: list box. The database name displays in the Edit Backup Destination file name window. 9. Edit the file path name as appropriate for the folder that you have created to receive the database. Do not change the database name. Click OK. 10. You may select either Overwrite existing media or Append to media. The latter option is useful when using a tape that can hold a large quantity of data. 11. You can schedule the backup by selecting the Schedule check box. The button with the three dots is now enabled, which allows you to edit the schedule. We recommend that you refer to the SQL Online Help for more information. 12. Click OK to start the backup. 13. A Backup Progress dialog box displays. 14. When the Backup operation has been completed successfully window displays, click OK. 15. Repeat steps 3 through 11 for SecurePerfectHistory and SecurePerfectArchive databases 16. Exit the SQL Server Enterprise Manager. Installing Microsoft SQL Server 2005 Standard Edition Introduction Our systems are now shipping with SQL Server 2005 Standard Edition database. These instructions are designed to assist in installing Microsoft SQL Server 2005, for those systems preparing to install Secure Perfect 6.1.1. Prerequisites Dell 1800 Server Microsoft Windows 2003 operating system with Service Pack 1 installed Installation This document includes information that was not included in the installation manual for your product. Follow instructions in the order presented.
3 Note: To speed up this process, we recommend that you disconnect from the network prior to installation. 1. Insert Disc 1 of Microsoft SQL Server 2005 CD-ROM or the product DVD into the CD-ROM drive and wait as the Microsoft SQL Server 2005 window automatically displays. 2. When the Start window displays, select Server components, tools, Books Online, and samples, as in Figure 1. problems. Do not change anything on this window. When the system check is finished, click Next to continue. 8. A Windows Installer window displays briefly. No user action is required. 9. A Microsoft SQL Server Installation window displays a progress bar as setup is preparing to continue with the installation. No user action is required. 10. The Registration Information window displays as in Figure 3. Figure 1. SQL Server 2005 Start Figure 3. Registration Information 3. When the End User License Agreement window displays, review the agreement, select I accept the licensing terms and conditions and click Next. 4. A window displays a list of prerequisites, required prior to installing SQL Server. Click Install to begin installing the components as in Figure 2: Figure 2. Installing Prerequisites 11. Enter a name, company, and the 25-character Product Key found on the yellow sticker in the CD liner notes or the CD sleeve. Verify your entry and click Next. 12. A Components to Install window displays as in Figure 4. Figure 4. Components to Install Note: This process takes several minutes. When the process is complete, click Next to continue. 5. A System Configuration Check window displays. This window requires no user action. Please wait. 6. A Welcome to the Microsoft SQL Server Installation Wizard displays. Click Next to continue. 7. A second System Configuration Check displays. Please wait as the system processes a list of potential installation Select two items: SQL Server Database Services Workstation components, Books Online and development tools.
4 Secure Perfect 6.1 Click Next. 13. An Instance Name window displays as in Figure 5. Figure 7. Authentication Mode Figure 5. Instance Name Select Named Instance and enter SPSQL. Note: It is very important that you enter the correct instance for the appropriate product. In the example above, the product is Secure Perfect. Click Next. 14. A Service Account window displays as in Figure 6. Figure 6. Service Account Select Mixed Mode and enter the sa password, then enter the password again to confirm. Note: We strongly suggest that you assign a unique password of your choice. This is the sa user password, used later in the installation of your application, during creation of the database. Click Next. 16. A Collation Settings window displays. Leave all default settings. Do not change any selections on this window. Click Next. 17. An Error and Usage Report Settings window displays. Do not change any options on this page. Accept the defaults and click Next. 18. When the Ready to Install window displays, verify the components selections. Click Back to change any of the settings or click Install to continue. 19. An Installing Microsoft SQL Server window displays briefly and automatically moves on to Setup Progress as in Figure 8. If you select Use the built-in System account, verify that Local system displays in the dialog box. In the Start services at the end of setup grouping, select SQL Server and SQL Browser. If you select SQL Server Agent at this time, you do not have to set properties later, as in Setting SQL Server Agent properties on page 5. Click Next. 15. An Authentication Mode window displays as in Figure 7.
5 Figure 8. Setup Progress Install SQL 2005 service pack 1 1. In Internet Explorer or other Web browser, enter http://www.microsoft.com/sql/sp1.mspx 2. Click Update SQL Server 2005 to Service Pack 1 (SP1). Note: Do not install the Express Edition Service Pack. Additional configuration for Global Edition - SQL Server 2005 Each Database Server and each Regional Server in a Global Edition must have the following configuration: 1. Click Start, select Programs, Microsoft SQL Server 2005, Configuration Tools, and then SQL Server Surface Area Configuration to display a window as in Figure 9. Figure 9. SQL Server 2005 Surface Area Configuration A checklist displays as components are configured and validated. A status column indicates the progress. Note: This process takes quite some time. During the process, a message displays, requesting that you insert Disc 2 of the SQL Server 2005. Insert Disc 2 and click OK. Please wait. (This does not apply if you are installing from a DVD.) When the process is finished, click Next. 20. A Completing Microsoft SQL Server 2005 Setup window displays. A list of setup logs displays sources of information describing the configuration. Review the list and click Finish to exit the Installation Wizard. 21. We recommend that you reboot your computer at this time. Setting SQL Server Agent properties By default, the SQL Server Agent service is disabled when SQL Server 2005 is installed. This service must be running to keep the databases in optimal condition. This is one way to set properties. You can also set properties through SQL Services Configuration Manager. Note: See Step 14. A Service Account window displays as in Figure 6. on page 4. If you selected SQL Server Agent on the Service Account window, you do not have to set Server Agent properties at this time. 1. Right-click My Computer on your desktop and select Manage. 2. In the Computer Management window, expand Services and Applications and then expand Services to display the list of services on your computer. 3. Select and right-click SQL Server Agent (SPSQL), where SPSQL is used in this example. 4. Select Properties to open the Properties window. 5. In the Startup type, select Automatic from the drop-down list. 6. Click OK. 7. We recommend that you reboot your computer at this time. Select Surface Area Configuration for Services and Connections. 2. When the Surface Area Configuration for Services and Connections window displays, select Local and remote connections and then Using TCP/IP only, as in Figure 10. Click OK.
6 Secure Perfect 6.1 Figure 10. Local and remote connections 2. Click Start, Programs, Microsoft SQL Server 2005, then SQL Server Management Studio. 3. A Connect to Server window displays. In the Authentication field drop-down list, select SQL authentication. Enter the sa Login and Password. (The default login is sa and password is master.) Click Connect. 4. The SQL Server Management Studio explorer window displays. In the navigation tree, right-click databases to display a shortcut menu. 5. On the shortcut menu, select Restore Database to display a Restore Database window. 3. When you are returned to the SQL Server Surface Area Configuration window as in Figure 9, now select Surface Area Configuration for Features. 4. When the Surface Area Configuration for Features window displays, verify that Enable OPENROWSET and OPENDATASOURCE support is selected as in Figure 11. Figure 11. Surface Area Configuration for Features In the To database field, enter SecurePerfect. Select From device and click to display a Specify Backup window. Select Backup media as File. Click Add and navigate to the location where you stored the SecurePerfect backup database. Select the database and click OK. The database now displays in the Backup location windowpane.click OK to return to the Restore Database window. 6. In the windowpane Restore column, select the checkbox for the SecurePerfect database. 7. In the Select a page navigation pane, select Options to display a pane with the path to which the database is to be restored. Since the previous installation may have been installed to a different folder, you must edit the folder name of the two entries to read GE Interlogix, as in Figure 12. Figure 12. Path to GE Interlogix folder Edit the folder name to read GE Interlogix. Note: Each Database Server and each Regional Server in a Global Editor must have this configuration Restoring Secure Perfect SQL Server 2000 databases to SQL Server 2005 Note: Before restoring the SQL Server 2000 databases, verify that SQL 2005 Standard Edition and Secure Perfect 6.1.1 software are installed. Following a successful installation of Secure Perfect, click Cancel and DO NOT CREATE a database! 8. Do not change anything else on this window. Click OK. 9. In the lower left corner of this window, an icon displays the executing process. 10. Repeat steps 5 through 9 for SecurePerfectHistory and SecurePerfectArchive databases. 1. Verify that all Secure Perfect network clients other than the Enterprise Server computer have logged off and that the Secure Perfect services are shut down.
7 Install Secure Perfect 6.1.1 software 1. Install Secure Perfect 6.1.1 Enterprise Edition software. Note: Following a successful installation of Secure Perfect, click Cancel and DO NOT CREATE a database! Refer to the Secure Perfect Installation Manual for complete details. 2. When all Secure Perfect databases are successfully restored as instructed and Secure Perfect is installed, click Start, Programs, Secure Perfect, then Create SP Database. 3. Click Create/Convert Database. The popup Do you wish to convert to the current version of Secure Perfect Database? displays. Click Yes to proceed. The Convert Database window displays. 4. Click Convert Database. A status bar displays the progress of the conversion. Upon completion, the message Secure Perfect Database successfully converted! displays. Click OK. 5. At this time, you must license SP 6.1.1. You can use your original license key. Follow the steps as detailed in Licensing your Secure Perfect System in the Secure Perfect Installation Manual. Figure 14. Subscription status Note status. 2. When the agent is completed, select and return to the All Subscriptions tab. 3. On the All Subscriptions tab, select the error and right-click to display a shortcut menu as infigure 15. Figure 15..Subscription synchronizing Global Edition: Correcting possible errors with history subscriptions After running the Create Database for the Regional Database Server, at the Global Database Server computer, open the Replication Monitor from MS SQL Server Management Studio. Select the history publication for the Regional Database Server. Review the subscription status as in Figure 13. Figure 13. Replication monitor 4. On the shortcut menu, select Start Synchronizing. 5. When the subscription displays Not synchronizing as in Figure 16, the publication subscription was successful. Note error listed. Figure 16. Subscription status - not synchronizing If there is an error displayed in the status of the Subscription, perform the following steps: 1. Select the Warnings and Agents tab in the right windowpane. Note the status as in Figure 14. If the agent displays completed, continue to step 2. If the agent is still running, wait until it is completed before moving to step 2. Quick fix CD now shipping with media kit Your Secure Perfect media kit includes a Quick Fix CD, containing fixes for your Secure Perfect 6.1.1 application. 1. Complete the Secure Perfect installation as instructed in the Secure Perfect 6.1 Installation Manual. 2. Insert the Quick Fix CD, then locate, open, and read the SP 611 Quick Fix Readme.txt file for installation instructions. 3. If you have any questions or experience a problem, contact Technical Support at 1-888-GE SECURITY (437-3287).
8 Secure Perfect 6.1 Upgrading to Secure Perfect 6.1.1 Installation of Secure Perfect 6.1.1 requires a conversion of your database and an upgrade from Secure Perfect 6.1. Follow the sequence of steps in the upgrade chapter of the latest Secure Perfect Installation Manual. Although the chapter covers upgrading from version 6.0 to 6.1, the steps are identical to the process of upgrading version 6.1 to 6.1.1. Upgrading from previous versions earlier than Secure Perfect 6.0 is NOT covered in the Installation Manual. If you are upgrading from Secure Perfect versions earlier than 3.1, GE does not provide you with the media. For a nominal fee, GE provides a service for converting these earlier versions. If you are upgrading from versions 3.1, 4.0, or 5.0, a copy of Secure Perfect Upgrades: Versions 3.1, 4.0, and 5.0 to Secure Perfect 6.1 is required to complete your upgrade process. This document is provided on the Documentation CD shipped with your Secure Perfect system. For users of Windows XP service pack 2 and later and Windows 2003 service pack 1 or later If you installed Secure Perfect on a Windows XP operating system with Service Pack 2 or Windows 2003 operating system with Service Pack 1, the following adjustments must be made to your configuration, in order for Secure Perfect to run successfully. We assume that this is a basic installation of Windows 2003 Service Pack 1, with no other policies configured other than the base configuration within Windows 2003. This process consists of the following items. Complete all items in the order presented: 1. Configuring Windows firewall on page 8 for firewall users 2. Setting dcomcnfg Properties on page 9 3. Restarting computers on page 11 4. Troubleshooting on page 11 1. Configuring Windows firewall To configure your Windows Firewall for access to the Database Server from a Secure Perfect client computer: 1. Log on as a user with administrator permissions. 2. If not already set, right-click Start and select Properties from the shortcut menu. When the Taskbar and Start Menu Properties window displays, select Classic Start menu, click Apply, and click OK. This option uses the menu style from an earlier version of Windows. Close this window. 3. Click Start, Control Panel, Security Center, then doubleclick Windows Firewall. 4. When the Windows Firewall window opens, select ONE of TWO configurations options: Select Off. Select On and select the Exceptions tab. 5. If you select Off (turns off Windows Firewall): Click OK to exit this window. Skip Step 6. through Step 20. Continue with Setting dcomcnfg Properties on page 9. If you select On and the Exceptions tab, configure the exceptions: Proceed to Step 6., to add programs as indicated. Add Programs 6. Click Add Program. 7. One at a time, add the following programs to the exceptions list by selecting from the list of programs: Diagnostic Viewer Flashtool (if installed) Secure Perfect SPLicense 8. Click OK to display the selected programs in the Programs and Services list. Add Ports 9. (Windows 2003 service pack 1 or later) Click Add Port. Note: To name the ports, type a short name to help you remember the use for this port. Name the port and enter the SQL Server port number (This port number can be obtained from your Server Computer. At the Database Server computer for this client, click Start, select Programs, Microsoft SQL Server 2005, Configuration Tools, then Microsoft SQL Server Configuration Manager. When the SQL Server (Configuration Manager) opens, expand the navigation tree to display Protocols for SP SQL. Rightclick TCP/IP, select Properties, and then the IP Addresses tab. The SQL port number displays in the IPALL, TCP Dynamic Ports field. Note this port number and return to the client computer.) Add Ports 6700 through 6715 for TCP filtering. Each port must be added individually. Add Ports 6700 through 6715 for UDP filtering. Each port must be added individually. Add Port 1024 for TCP DVR filtering. Add Port 135 for RPC filtering. When all entries are complete, click OK to exit this window. 10. (Windows XP service pack 2 or later) Click Add Port. Note: Note: To name the ports, type a short name for the port to help you remember for what it is used. Name the port and enter the SQL Server port number This port number can be obtained from your Server Computer. At the Database Server computer for this client, click Start, then Run and enter svrnetcn.exe. Click OK. When the SQL Server Network Utility window displays, select TCP/IP and click Properties. The port
9 number displays. Note this port number and return to the client computer.) Add Ports 6700 through 6715 for TCP filtering. Add Ports 6700 through 6715 for UDP filtering. Add Port 1024 for TCP DVR filtering. Add Port 135 for RPC filtering. When all entries are complete, click OK to exit this window. Set Data Sources (ODBC) Note: If the Database Server is not Windows XP, skip Step 11. through Step 20.and continue with Setting dcomcnfg Properties on page 9. 11. In the Control Panel, double-click Administrative Tools, then Data Sources (ODBC). 12. On the ODBC Data Source Administrator window, select the System DSN tab. 13. Select Secure Perfect SQL. 14. Click Configure to display the Microsoft SQL Server DSN Configuration window. Verify that the correct SQL Server displays as the Server to which you want to connect and click Next. 15. Click Client Configuration. 16. De-select Dynamically determine port. 17. Enter SQL Server Port number, as obtained from the Server computer. (See Step 9. or Step 10.above.) Click OK. 18. When the Microsoft SQL Server DSN Configuration window displays as in Figure 17, enter the Login ID as sa and the sa password. Figure 17. Microsoft SQL Server DSN Configuration 2. Setting dcomcnfg Properties Note: The dcomcnfg properties must be configured for all computers, whether or not you are using a firewall. 1. Log on as a user with administrator permissions. 2. Click Start, select Run, enter dcomcnfg, and click OK. (Click Unblock if the Firewall window displays.) The Component Services window displays. 3. Click to expand the Components Services navigation tree. (If the Windows Firewall is On, a window displays the message, Do you want to keep blocking this program? Click Unblock and the window closes.) 4. Again, click to expand Components Services, then Computers, to display My Computer in the right window pane. 5. Right-click My Computer to display a shortcut menu and select Properties. My Computer Properties window displays. Set Default Properties tab 6. Click to display the Default Properties tab of My Computer Properties window. 7. In Default Authentication Level field, select None from the drop-down list. 8. In Default Impersonation Level field, select Identify from the drop-down list. 9. Click Apply. 10. Set COM Security tab 11. Click to display the COM Security tab. 12. In Access Permissions, click Edit Default. 13. Click Add to add anonymous logon. 14. Click Advanced. 15. In the Common Queries dialog box, enter anonymous logon. Click Find Now to display in the windowpane at the bottom of this window. 16. Click OK to accept. 17. Click OK to exit this window. 18. Select to allow Local Access and Remote Access. Click OK. 19. Click Next twice and then click OK in the ODBC Microsoft SQL Server Setup window. 20. Click Finish. Review the Setup window and test your connection. If your test results are successful, click OK and exit out of the ODBC Data Source Administrator window. 19. In Launch and Activation Permissions, click Edit Default. Click Add to add anonymous logon. Click Advanced. If you are asked to log on to the Domain, enter your login ID and password and click OK.
10 Secure Perfect 6.1 In the Common Queries dialog box, enter anonymous logon. Click Find Now to display in the windowpane at the bottom of this window. Click OK to accept. Click OK to exit this window. Select to allow Local Launch, Remote Launch, Local Activation, and Remote Activation Click OK. Set Default Protocols tab 20. Click to display the Default Protocols tab. 21. When the DCOM Protocols window opens, your window may display as in Figure 18. Figure 18. My Computer Properties - Default Protocols 29. Click Advanced. 30. If you are asked to log on to the Domain, enter your login ID and password and click OK. 31. Click Find Now. 32. When the Name(RDN) list displays in the lower windowpane, select ANONYMOUS LOGON and click OK, then OK in the window that follows. 33. Verify that all permission for ANONYMOUS LOGON are set to Allow. Click OK and OK again. DCOM Machine Access Restrictions... 34. Double-click DCOM Machine Access Restrictions... 35. Click Edit Security and then click Add. 36. Click Advanced. 37. If you are asked to log on to the Domain, enter your login ID and password and click OK. 38. Click Find Now. 39. When the Name(RDN) list displays in the lower windowpane, select ANONYMOUS LOGON and click OK, then OK in the window that follows. 40. Verify that all permission for ANONYMOUS LOGON are set to Allow. Click OK. DCOM Network Access 41. Double-click Network access: Sharing and security model for local accounts. A window display as in Figure 19. Figure 19. Network access: Sharing and security model for local users 22. Only Connection-oriented TCP/IP should be listed. You must remove any other DCOM Protocols. Select, click Remove, and click OK. 23. Select Connection-oriented TCP/IP, click Properties, and then click Remove All to remove any ports. Click OK. 24. Click OK to exit My Computer Properties. 25. Exit to desktop. DCOM Machine Launch Restrictions... 26. Click Start, Settings, Control Panel, and then Administrative Tools. Select Local Security Policy to open the Local Security Settings window. Under Security Settings, open Local Policies folder, and then open the Security Options folder. 27. Double-click DCOM Machine Launch Restrictions... 28. Click Edit Security and then click Add. 42. Verify that access is set to Classic - local users authenticate as themselves. 43. Click OK. 44. Exit to desktop. 45. Continue with Restarting computers.
11 3. Restarting computers Note: This is an important step for successful performance! Any computers that had adjustments to the DCOM configuration must be restarted at this time. 4. Troubleshooting If you have DCOM issues, follow this sequence: 1. Remove all anonymous logons as assigned in dcomcnfg and gpedit.msc. 2. Reboot the machine. 3. Re-apply all settings as stated in this document. 4. Again, reboot the machine. 4. Release notes for 6.1 Alarm routing and bumping: Changing Alarm Routing and Bumping Configuration During a Routing Transaction If you change the configuration of your Alarm Routing and Bumping while you are waiting for a bump to occur, the system follows the original configuration. The new configuration takes effect the next time Routing and Bumping starts over due to purging or acknowledgement of the alarm. Defining Host Modes Host modes have been added to support Alarm Routing and Bumping. Host modes define when a Client Group should switch to a different mode. A host mode is changed under two conditions: 8 to 5 normal = normal alarm processing Mode 1 = 00:00 (midnight) to 00:00 (midnight) Mode Schedule: December 25, 2004, 00:00 from Normal to Mode 1 December 26, 2004, 00:00 from Mode 1 to Normal Assigned Client Group: Client Group 1 Notice that Client Group 1 is assigned to a Mode Schedule instead of Client Group 2. The Client Group that owns the alarms that are being routed and bumped must follow a Mode Schedule. In this scenario, the alarms would route correctly. An alternative to this is to create a Client Group and add all COM clients. This Client Group may be used for mode schedules. Note: You may need to consider COM clients in different time zones. You must follow the time of the COM client that is hosting the alarm. Defining Interval Details on the Time Schedule Form If Alarm Routing is scheduled and the Client Group is in a mode, the alarms do not route unless an Interval is configured for the mode on the Time Schedule assigned to the Alarm Routing and Bumping record on the Time Schedule Form. Defining expressions in badge designer The Define Expression window does not allow selection of expressions that include spaces, multiple expressions (concatenation), or expressions that do not match the list of field names. An error displays as in Figure 20. Figure 20. Define Expression error message 1. When changed manually on the Manual Control form, Mode tab. 2. When the host is a COM client that is hosting the alarm and Routing and Bumping are configured with a time schedule.(the mode is changed by way of mode schedules.) Since Routing and Bumping is hosted by the COM client that hosts those alarms, only the COM client can change modes. A sample scenario follows: Alarm Routing Record description: Route 1 Alarm: 0017-01-01 Reader Forced Clients in Client Group 1: Client 1 Clients in Client Group 2: Client 2 Routing configured to: Client Group 2 (00017-01-01 Reader Forced is normally hosted by Client Group 1.) Time Schedule: If you receive an error message when attempting to define an expression, we recommend the following method. Select the Object menu, then Object Properties. On the Text tab, enter the expressions that you want to display in the Data field name or expression field. When you click OK, the expression displays on your badge design similar to Figure 21:
12 Secure Perfect 6.1 Figure 21. Dynamic Text Properties Global edition: Recovering After a Regional Database Server Failover When a Region failover occurs, we recommend that you do not perform a recovery until the failing Region s database is online for sufficient time for at least one database replication to occur (the default value is five minutes). This prevents a conflict between alarm and client records. Steps for recovery are shown below: 1. Repair the database or network connection and verify that the Database Server is online and can be accessed by the failover client (using ODBC Data Source Administrator in your Control Panel). 2. Confirm that the Global Database Server is communicating with the Regional database. At the Global Database Server, Enterprise Manager, ensure that the publication is not showing any errors for that Region. 3. Wait a length of time equal to a replication interval. (To determine the synchronization interval, open the Region form and select the Region that failed over from the list box on the right. The SP Database Synchronization Interval field displays the number of minutes. The default interval value is five minutes.) 4. After waiting a length of time equal to one replication interval, perform a recovery (using the Client Monitor form shortcut menu). When you initiate a recovery, the Secure Perfect application and services shut down. 5. Services restart. This is an indication that recovery is complete. During a Region failover, alarms and transactions are written to the Database Server that is acting as the Backup Database. When the recovery occurs, the reset alarm for the failover is written to the original Regional Database. The Count column of the Alarm Monitor form for Region failover alarm and Fileserver failover displays a count of 2 when a recovery is performed. (Look for a fix to this in a future Secure Perfect Service Pack.) On a Region failover, you may not always dynamically receive a failover notification or Region failover alarm. The alarm displays by closing and reopening the Alarm Monitor form. Whenever a database failure occurs, transactions processed from the micro are recorded to a text file. The Secure Perfect services automatically shut down. When services restart, the Secure Perfect system services read the text file and process the messages. During a Region failover, it is possible that a transaction could be dropped. Configuring FileServer Redundancy You must have backup Regions configured in order for a FileServer redundancy to take place. FileServer redundancy uses the configured Backup Regions. Complete the Backup Region Tab of the Region form. It is recommended that more than one backup be configured in case the first backup Region is unavailable. Reminder: After assigning backup Regions, restart Secure Perfect services on the clients in the Regions that you configured for backup. Non-English Operating Systems: Note: If your installation CD is the identical language as your operating system, the notes below do not apply. Creating a secure User on a Non-English Operating System On a non-english operating system, in order for the Badge Designer application to function correctly, you must manually add a secure user to the Local Admin Group, if it is not already there. Verify the users in your Local Admin Group following installation and add a secure user if applicable. This procedure allows a non-english operating system to recognize an existing secure user. Licensing a Non-English Operating System On a non-english operating system, in order for a Secure Perfect client to license correctly, the Local Admin Group on the Secure Perfect Server computer LicenseInfo share must be set to full control. In the Secure Perfect\Logs folder of the Server computer, select LicenseInfo and then right-click to view the properties. Select the Security tab, and verify that Permissions are set to allow full control. 5. What s new in Secure Perfect 6.1.1 Configure APB status by region: This feature allows you to configure APB readers across regions or within a specific region only. If configured, entering a region activates the badge only in that region and disables the badge in all other regions.
13 Micro connection type network + direct communication: This is a new network configuration option selectable on the Micro form, Micro Definition tab. This selection allows a micro that loses network connection to fail over to a serial connection. On the Micro Utility form, a network micro normally displays an IP address in the Comm device column. When a network micro loses connection, the Alarm Monitor form displays a Host Comm alarm. After approximately two minutes, the alarm resets and the serial connection begins communications. The Micro Utility form Comm device column now displays the Comm port. Micro connection type network + network: This is a new network configuration option selectable on the Micro form, Micro Definition tab. This selection allows a micro that loses network connection to fail over to a secondary network connection. On the Micro Utility form, a network micro normally displays an IP address in the Comm device column. When a network micro loses connection, the Alarm Monitor form displays a Host Comm alarm. After approximately two minutes, the alarm resets and network communications begin. The Micro Utility form Comm device column now displays the backup IP address or network name, as assigned on the Micro form, Port Settings tab. Alarm graphics viewer window: This window launches independently from the Secure Perfect application and can be moved outside of the Secure Perfect window area. This is useful for dual-display monitors or wide monitor display. Suspend badge after invalid PIN attempts: This option is configured on the Reader tab of the Reader form. Select Max Invalid PIN Count and enter a number between 1 and 6 as the number of times an invalid PIN can be entered at a reader before the badge is suspended. The badge must be reset to Active by a system administrator. DVR search - play single recorded frame: The Search Results window pane in DVR Search returns a list of recorded video event tags based on the search parameter criteria specified. Select an event tag from the list and right-click to display a shortcut menu. The shortcut menu has been expanded to include Play Single Recorded Frame. When selected, a single image displays in the video window. This is the first frame of the event recording as a still photo. To play the rest of the video clip, unpause the video on the DVR Viewer. Database connection: This feature is configured on the Parameter form, Settings tab. This feature allows you to configure the amount of time that elapses before your Secure Perfect system detects and advises you that your database is not accessible. Timeout (sec): The default is 30 seconds. The minimum is 3 seconds; the maximum is 120 seconds. In a Secure Perfect Global Edition configuration, this is the amount of time until a Regional failover begins. In a typical Secure Perfect configuration, this is the amount of time before Secure Perfect transactions are saved, Secure Perfect services shut down, and a message advises you to repair your database. Retry: The default is 3 retries. The minimum is 0 retries; the maximum is 5 retries. Enable 'valid no passage': This option is configured on the Reader form, Reader tab. Select this checkbox if you want your Secure Perfect system to notify you when a valid badge read occurs but the door did not open within the configured maximum unlock time. Refer to Figure 22. Figure 22. Enable Valid No Passage The Activity Monitor displays one of two messages: Valid No Passage; or Valid Open message. This may be an indication that someone decided not to pass through the door after a badge was presented, or a badge was read accidentally as they passed a reader. This feature must have an alarm contact configured and wired for this door in order to be notified of a change in state of the door. If the maximum door unlock time expires, the door should be considered closed (even if it is still open). To have a valid card read, someone must close the door, present the badge at a valid reader, and then open the door. Two new micro types: MicroPXNPlus or MicroPXNPlus 2000 are selectable on the Micro form, Micro Definition tab. A board provides direct, dialup, and network capabilities in one board. The network supports Ethernet only. The board also has an integrated modem option which means that the modem is a chip that can be ordered with the board or added at a later date. This modem can also be used as dial-up fallback to a network board. Both boards support the following reader boards, 2RP, 2SRP, 8RP, and CK8RP. The boards provide nonvolatile storage that provides faster reset recovery and allows hostless operation. A new Web Integrated Configuration Tool was created for flashing these micro types, eliminating the need to install Flashtool on each computer in order to download and flash the micros.
14 Secure Perfect 6.1 6. Trademark/disclaimer Secure Perfect is a registered trademark of GE Security Inc. Copyright GE Security Inc. All Rights reserved 460559004F March 2009 USA & Canada T: 888.437.3287 F: 561.998.6244 Latin America T: 305.267.4301 F: 305.267.4300 Australia T: 61.3.9259.4700 F: 61.3.9259.4799 Asia T: 852.2907.8108 F: 852.2142.5063 Europe Contact your local dealer www.gesecurity.com