JANUS Access Control. User Guide. Version 1.0



Similar documents
Event Viewer User Guide. Version 1.0

OnGuard Online User Guide

NDA ISSUE 1 STOCK # CallCenterWorX-Enterprise IMX MAT Quick Reference Guide MAY, NEC America, Inc.

SMS Database System Quick Start. [Version 1.0.3]

Introduction to MS WINDOWS XP

Functional Specification Document

NETWORK PRINT MONITOR User Guide

TX3 Series TELEPHONE ACCESS SYSTEMS. Configurator Quick Start. Version 2.2 Mircom Copyright 2014 LT-973

AS-525. AxTrax Access Control Management Software. Software Manual

Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents

This page was intentionally left blank.

TC 3/10 Rev. A

DTAP3000 DTSX3000 Control Visualization Software LAS2.0 Data Conversion Guide

2012 November. AxTraxNG Access Control Management Software Software Manual (Version 21.x)

Monitoring Network DMN

EasyLock. User Manual. Intuitive Encryption Application for portable Storage Devices

ViewPower. User s Manual. Management Software for Uninterruptible Power Supply Systems

Titan Security System User Manual

Contents. Hardware Configuration Uninstalling Shortcuts Black...29

Table Of Contents. System Monitoring System Monitoring Display...14 Monitoring Zones...15 About Areas (partitions)...15 Area Status Display...

ArchestrA Log Viewer User s Guide Invensys Systems, Inc.

Legal Notes. Regarding Trademarks KYOCERA Document Solutions Inc.

Getting Started with IntelleView POS Administrator Software

User Guide Win7Zilla

PowerLogic ION Enterprise 6.0

Decision Support AITS University Administration. Web Intelligence Rich Client 4.1 User Guide

Central Management Software CV3-M1024

AXIS Camera Station Quick Installation Guide

Welcome to MaxMobile. Introduction. System Requirements. MaxMobile 10.5 for Windows Mobile Pocket PC

Database Management Tool Software User Guide

Avaya Network Configuration Manager User Guide

Release Information. Copyright. Limit of Liability. Trademarks. Customer Support

LOREX CLIENT Remote Software 4.0

How To Use The Workstation Program On A Pc Or Mac Or Macbook Or Macintosh (Aero) With A Computer Or Ipa (A2) With An Ipa Or Ipad (A3) With The Powerpoint 2.

Hosting Users Guide 2011

Windows XP Pro: Basics 1

SecureLock. User Manual

Password Memory 6 User s Guide

Lenovo Online Data Backup User Guide Version

Personal Call Manager User Guide. BCM Business Communications Manager

CENTAUR. Access Control Software Version 4.2 REFERENCE MANUAL

Features Reference. About Unified Communication System. Before Using This Machine. Starting a Meeting. What You Can Do During the Meeting

Strategic Asset Tracking System User Guide

Volume. EverAccess. User s Manual

Transitioning from TurningPoint 5 to TurningPoint Cloud - LMS 1

1 P a g e. User Guide support.keytime.co.uk

Integrated Accounting System for Mac OS X and Windows

COMSPHERE 6700 SERIES NETWORK MANAGEMENT SYSTEM

Integra32. Integrated Alarm Monitoring and Access Control USER MANUAL

Backups User Guide. for Webroot SecureAnywhere Essentials Webroot SecureAnywhere Complete

OPERATION MANUAL. MV-410RGB Layout Editor. Version 2.1- higher

DDM Distributed Database Manager for SQL and ODBC. Installation and User Guide Version 5.27.xx

PROMISE ARRAY MANAGEMENT (PAM) for

DVR4C Remote Viewer Operation Manual Table of Contents EN 3 1. OVERVIEW MINIMUM PC REQUIREMENTS INSTALLING THE PROGRAM...

System Integration Software

ivms-4200 Client Software Quick Start Guide

Auditing manual. Archive Manager. Publication Date: November, 2015

Access Central 4.2 Tenant Billing

OPTAC Fleet Viewer. Instruction Manual

Kaspersky Password Manager

DCA. Document Control & Archiving USER S GUIDE

ProFiler Client Software User s Guide

Proteus Telephone Management System

OPTAC Fleet Viewer. Instruction Manual

Upgrading to Document Manager 2.7

Setup and Configuration Guide for Pathways Mobile Estimating

Copyright. Disclaimer. Introduction 1. System Requirements Installing the software 4

KViewCenter Software User Manual 2012 / 04 / 20 Version

Basic Mercury Powered NXT Configuration in Doors.NET TM Application Note. 1.0 Adding an NXT-MSC Controller to the NXT Gateway

NETGEAR genie Apps. User Manual. 350 East Plumeria Drive San Jose, CA USA. August v1.0

Amcrest 960H DVR Quick Start Guide

Online Backup Client User Manual

Verizon Remote Access User Guide

SecuraLive ULTIMATE SECURITY

How To Create A Powerpoint Intelligence Report In A Pivot Table In A Powerpoints.Com

Seagate Manager. User Guide. For Use With Your FreeAgent TM Drive. Seagate Manager User Guide for Use With Your FreeAgent Drive 1

VMS A1 Client Software. User Manual (V2.0)

IDDERO HCx-KNX TOUCH PANELS. Quick start guide

StrikeRisk v6.0 IEC/EN Risk Management Software Getting Started

Appointment Scheduler

Word 2007: Basics Learning Guide

NEC Express5800 Series NEC ESMPRO AlertManager User's Guide

FaxFinder Fax Servers

A Guide To Using. Box-Office Version 2. By Nortech Software. The main booking screen

HyperAccess Access Control System

Hamline University Administrative Computing Page 1

Event Record Monitoring and Analysis Software. Software Rev. 3.0 and Up. User s Guide

FUSION Installation Guide

Microsoft Visual Studio Integration Guide

Document Management User Guide

Patriot Systems Limited

Diamante WiFi Wireless Communication User Guide. CradlePoint CTR35

Allworx OfficeSafe Operations Guide Release 6.0

Document Management Quick Start and Shortcut Guide

CMS-DH CENTRAL MANAGEMENT SOFTWARE

Almyta Control System Advanced Reference Contents

Instruction manual. testo easyheat Configuration and Analysis software

PowerLogic ION Enterprise 5.6

Features - Microsoft Data Protection Manager

Transcription:

JANUS Access Control User Guide Version 1.0 August 2010

JANUS Access Control User Guide Issue 1.0, released August 2010 Disclaimer Copyright 2010, Grosvenor Technology. All rights reserved. All brands, names, or trademarks appearing in this document are acknowledged as the trademarks of their respective owners. No part of this document may be reproduced in any form or by any means for any purpose without the written permission of Grosvenor Technology. Whilst we make every effort to ensure the accuracy of our publications, Grosvenor Technology assumes no responsibility or liability for any errors or inaccuracies that may appear in this document. Grosvenor Technology Ltd. Millars Three Southmill Road Bishop s Stortford Herts CM23 3DH Telephone: +44 (0)1279 838000 Fax: +44(0)1279 504776 Email: support@gtl.biz Website: www.gtl.biz JANUS Access Control 2 Version 1.0

Contents Preface...7 About JANUS... 7 About this guide... 7 Technical support... 8 Getting started...9 Overview...10 Key elements...10 How access control works...10 System overview hardware...11 The IDC...11 The IPC...12 System overview software...13 Core applications...13 Extended applications...14 Advanced optional modules...14 Starting the applications...15 Starting the Comms application...15 Starting the Database Update application...15 System security...16 Replacing the default logon...16 Changing your password...17 User interface basics...18 Database Update menus...18 Database Update main toolbar...22 Database Update large toolbar...23 Example window layout...24 Entering data in fields...24 Daily administration... 27 About JANUS basic data...28 Card records...28 Creating a new card record...28 Basing a new card record on an existing record...31 JANUS Access Control 3 Version 1.0

Reviewing existing card records...32 Finding a card record...32 Modifying a card record...33 Suspending cards that have not been used...33 User records...34 Creating a new user record...34 Adding a photo ID or a signature to a user record...36 Reviewing existing user records...38 Access groups and access rights...38 Setting up access rights...38 Setting up access group names...40 Restricting access rights to specified user IDs...40 System modes and mode schedules...41 Creating a new system mode...41 Viewing and modifying a system mode...43 Deleting a system mode...43 Setting up system mode schedules...43 Creating a new time zone...45 Monitoring the system... 47 About the Report/Guard screen application...48 Starting the Report/Guard screen application...48 Viewing alarms...49 Getting the next alarm...49 Reviewing a selected alarm...50 Changing system controls...51 Changing a system mode...51 Controlling outputs...52 Controlling the system state...53 Viewing areas and actions...54 Viewing areas...54 Viewing a user s latest actions...55 Using the graphical tool...56 Reporting... 57 About reporting...58 Reporting basics...58 Starting the Reporting application...58 Reporting the main window...59 Reporting menu options...60 JANUS Access Control 4 Version 1.0

System Report Definitions...62 Reporting filter controls...64 Reporting filter operators...65 Reporting single and double pass reporting...68 Managing report templates...68 Creating a report template...69 Saving a template...70 Copying a report template...71 Modifying a report by changing the filter controls...72 Sharing/restricting a report template...73 Renaming a report template...74 Reassigning a report template...74 Deleting a report template...74 Running and managing reports...75 Running a report...75 Searching a report...76 Printing a report...77 Emailing a report...78 System set up... 79 Communications hardware...80 Setting up the communications hardware...80 Setting up a comms line...80 Setting up a remote line controller...82 Setting up a modem...83 Controllers, doors and readers...84 Setting up a controller...84 Setting up a door...86 Setting up a reader...89 Setting up a reader group...92 Advanced features...93 Setting up anti-passback...93 Setting up an input...96 Setting up an output...99 Setting up actions...100 Reporting and routing of system events...101 Glossary... 109 JANUS Access Control 5 Version 1.0

Preface This User Guide provides information on setting up and maintaining the JANUS access control system. This version of the document relates to Release 4.3.2. It may not include changes incorporated in later versions of the software. Date of latest update: August 2010. About JANUS JANUS is a powerful yet easy-to-use access control system that allows you to control, manage and report on physical access to property, buildings or rooms. The JANUS system includes both hardware and software: The JANUS hardware consists of Intelligent Door Controllers (IDCs) and Intelligent Peripheral Controllers (IPCs). These controllers are responsible for making each decision regarding access to or from an area, automatic control of equipment, and the reporting of alarms and events. The JANUS software is responsible for storing and maintaining the system database, viewing system activity, displaying alarm messages, and transferring control data to and from the IDCs and IPCs. About this guide This User Guide provides an introduction to JANUS and explains how to set up information using the Database Update Program. This manual should be read by anyone who is responsible for the day to day running of the JANUS system and by anyone who is installing and configuring the system. JANUS Access Control 7 Version 1.0

Technical support If you need assistance or technical support for your JANUS system, please contact Grosvenor Technology as follows: Email: Web: Technical website: FTP Site: support@gtl.biz www.gtl.biz www.grostech.com ftp.grostech.com A username and password for the FTP site are available from technical support. JANUS Access Control 8 Version 1.0

Section 1 Getting started This section provides an overview of the JANUS access control system. It includes the following sections: For an overview of the system, see Overview on page 10. For a summary of the system hardware, see System overview hardware on page 11. For a summary of the system software, see System overview software on page 13. For information on starting up the Comms and Database Update applications, see Starting the applications on page 15. For information on passwords and security, see System security on page 16. For an introduction to the Database Update Program, including the options available on the menus and toolbars, see User interface basics on page 18. JANUS Access Control 9 Version 1.0

Overview This section provides a brief overview of the JANUS access control system. Key elements The key elements are as follows: The main PC/server is used to run the core JANUS software, to store and maintain the system database, to view system activity, to display alarm messages, to pass control data to the intelligent controllers on the system and to receive transaction data from them. There may be any number of administrator PCs which can be used for administration, ID card production, alarm management, running reports, and management of various third-party systems. The Intelligent Door Controllers (IDCs) and Intelligent Peripheral Controllers (IPCs) are at the heart of any JANUS access control system. The IDCs and IPCs are connected to the main server via a TCP/IP network or a comms line and store and evaluate the system parameters that have been assigned to it from the server. The IDC or IPC makes every decision regarding access to or from an area, the control of equipment, or when to report alarms and events (including local, remote, audible and visual alarms). Once loaded with configuration data from the server/main PC, the IDC or IDC is capable of executing full security at door level without reference to the server/main PC other than: Receiving updates and alterations to system data. Report transactions to history files, alarm screens or printers. Carrying out global system functions such as anti-passback. How access control works Every person holds a card which is uniquely identified with a card number. Every card belongs to one or more access groups. Each reader on the system belongs to a reader group, normally the name of the area to which the reader controls access (such as Accounts, Maintenance, Directors Offices). Access groups (people) are then given authority to use a specific reader group which will allow them access to each of the readers within that group. When a card is presented to the reader, if the card is valid, the IDC opens the door. The IDC reports the decision, together with date/time details, to the main PC, where details are recorded in the database. Time plays an important role within JANUS. Various time zones are defined with up to three on/off periods per day for every day of the week. JANUS Access Control 10 Version 1.0

JANUS can operate with up to eight system modes, any or all of which can be active at the same time. The link between these elements is made by creating an access right where an access group is linked to a reader group, time zone and mode. This permits the valid access of an access group to all of the readers within the reader group but only within the specified time zone and whilst the mode is active. System overview hardware The Intelligent Door Controller (IDC) and the Intelligent Peripheral Controller (IPC) are the heart of any JANUS system. The IDC An IDC manages door access within the system. Key features of the IDC are as follows: Multi-drop RS485 or TCP/IP connectivity versions. Supports 2 readers with optional PIN; supports 1 or 2 door configuration. Supports any modern reader technology. Supports additional 6 alarm inputs (supervised) and 4 relay outputs. Includes 2A power supply with battery back-up. Tamper to enclosure. 12,000 cards at controller (65,000 or 110,000 with memory expansion). Real-time processing at door. Local LED and sounder outputs. Memory buffer while off-line (up to 4,000 events). Flash memory can be updated while system is working. Comprehensive remote diagnostics. IDC-485 IDC-485 controllers can be connected together with up to 32 IDC nodes forming a JANUS comms line. 2 or 4-wire data cabling interconnects the RS485 IDCs, and a RS232 or USB comms line header connects the entire comms line directly into the server/main PC. Alternatively, a TCP/IP comms line header (Ethernet converter) connects the comms line via a private or corporate network infrastructure. Any number of comms lines can be installed. No matter how small or large, the comms line header is the only variant in the system design. No other controller, reader interface, or hierarchical processor is required. JANUS Access Control 11 Version 1.0

IDCe The IDCe is an Ethernet-ready controller and does not require interconnecting wiring between the IDCe nodes. Each board has its own TCP/IP address and connects directly onto a LAN or WAN via an on-board RJ45 Ethernet adaptor. An IDCe is exclusively tied to its nominated JANUS system and employs the Rijndael advanced encryption standard (AES) to further protect against sabotage and malicious attack. The IPC The Intelligent Peripheral Controller can be used to provide additional peripheral support. It provides a means of connecting any alarm, switch or relay function to the system. Features of the IPC are: Multi-drop RS485 or TCP/IP connectivity versions. Supports up to 16 supervised alarm inputs. Supports up to 16 change-over relay outputs. IPC-485 IPC-485 controllers can be connected together with up to 32 IPC or IDC nodes to form a JANUS comms line. 2 or 4-wire data-cabling interconnects the IPCs and a RS232 or USB Comms line header connects the entire comms line directly to the main server/pc. Alternatively, a TCP/IP comms line header (Ethernet converter) connects the comms line via a private or corporate network infrastructure. IPCe The IPCe is an Ethernet ready controller and does not require interconnecting wiring between the IPCe nodes. Each board has its own TCP/IP address and connects directly onto a LAN or WAN via an on-board RJ45 Ethernet adapter. An IPCe is exclusively tied to its nominated JANUS system and employs the Rijndael advanced encryption standard (AES) to further protect against sabotage and malicious attack. JANUS Access Control 12 Version 1.0

System overview software The JANUS access control system consists of a number of separate software applications. The core applications are always installed as part of the main install, while the optional applications are installed and licensed separately. The main PC/server is used to run the core JANUS software, to store and maintain the system database, to view system activity, to display alarm messages, to pass control data to the intelligent controllers on the system and to receive transaction data from them. There may be any number of administrator PCs which can be used for administration, ID card production, alarm management, running reports, and management of various third-party systems. Note the following: The system requires a USB dongle. Licence details are provided in a file (*.gtl). If updates are required, a new file can be emailed to you. The system is supported on the following operating systems: XP Professional (SP3), 2003 Server, VISTA (Business), 2008 Server and Windows 7 (32-bit versions). Note: This documentation assumes that the software has already been installed. For installation documents, see the technical website or contact Technical Support. See Technical support on page8. Core applications The Comms application allows the system server/main PC to communicate with the system controllers and other software components. It must run at all times so that messages can be passed between the system components. The Database Update application is used to add, edit and delete system information. It sends data to the Comms application so that system hardware can be updated. The Report/Guard Screen application is used to monitor system events in real-time and control and monitor system equipment. The Report Generator application is used to generate customised on-screen and printed reports. These reports are generated from the JANUS database and archived history and operator activity data. The Licence Manager allows new system applications to be licensed without changes to the system dongle and to update system capabilities without the need for a system reboot. JANUS Access Control 13 Version 1.0

The Archive application is used to archive system history and operator activity information, and to back up the system configuration files. The Engineering Log is used to manually enter system events such as repairs and planned maintenance, so they can be updated, archived and reported on. Examples of entries could include: Installation of new hardware. Firmware updates. Equipment faults. Pictures and Word documents as supporting documentation. The Incident Log is used to manually enter incidents and events that may occur in a busy environment and need to be tracked or logged. They can subsequently be updated, archived and reported on. Examples of entries could include: Lost or stolen money or personal equipment. Health and safety issues such as reported accident details. Regular events such as fire tests or safety checks. Pictures and Word documents as supporting documentation. Extended applications The following are optional modules which can enhance the JANUS access control system: The Card Production application allows you to design and produce ID cards incorporating photographs, signatures and logos. It can interface to live video, digital cameras, scanners and signature tablets, and can import existing files created by other systems The Guard Tour application enables you to create and manage structured tours of premises, and to monitor the progress of guards as they perform those tours. The Pictures application allows you to display photos of cardholders for card transactions in order to verify identity. For example, a guard can view the picture of the cardholder and visually compare it to the person who has entered a door. The Event Relay application allows users to set up actions based on defined events that happen within the access control system, such as locking doors, notifying users by email or interfacing with external systems such as CCTV systems. Advanced optional modules SQLExec. Used to update a JANUS system with data from an external data source, such as an existing personnel database, or student records. It works by executing SQL statements against the source database (either from stored procedures or a text file) and applying the results to the live system. The same results may also be stored in a log file. JANUS Access Control 14 Version 1.0

SMS and Email Messaging JANUS Enterprise solutions. Multiple JANUS systems working together. A common database centrally controls and manages credentials, users and access authorities for any number of JANUS systems located anywhere in the world. Note: These optional applications are not described in this documentation. For relevant documentation, see the technical website or contact Technical Support. See Technical support on page 8. For information about the optional JANUS modules please contact your JANUS system provider or email sales@grosvenortechnology.com. Starting the applications JANUS consists of a number of separate applications, which you need to start separately. Starting the Comms application The JANUS Comms application controls and manages communications between the JANUS server/main PC and the access control equipment. Warning: JANUS Comms only runs on the server/main PC and must be running at all times so that system updates are applied and events/alarms can be passed around the system. To start JANUS Comms 1. Select Start > All Programs > JANUS for Windows Support > JANUS Comms. There is a small delay while system files are configured and applied. 2. When this process is finished, click the minimise button at the top right of the JANUS Comms window. JANUS Comms is now running and an icon will be displayed on the task bar at the bottom of the screen. Starting the Database Update application The JANUS Database Update application is used to enter and edit system data and configuration. It also allows you to generate system and historical reports. To start the JANUS Database Update application 1. Select Start > All Programs > JANUS for Windows > JANUS Database. 2. There is a small delay while the application is loaded and the Database Update Log- On dialog is displayed. 3. Type your system name into the User ID field. If you do not have an ID of your own you may be able to use the default which is JANUS. JANUS Access Control 15 Version 1.0

4. Type your Password into the Password box. If you have used the default ID, you can use the default password which is JANUS. Warning: For the security of your system, we strongly recommend that the default log on is removed immediately after the system has been commissioned. The Database Update application, the Report/Guard screen and the other separate applications are controlled by a system ID and password. Once your system ID and password have been set up, you can use the same ID and password to log on to all applications. System security Note the following important points about security: You need to log in to the JANUS applications, using an ID and a password. Default log in IDs and passwords apply initially, but we strongly recommend that you change them. Never let anyone else use your log in ID or password. For audit purposes, your identity is logged against every action that you take on the system. Keep your password secret and do not write it down. Change your password regularly. Replacing the default logon When the JANUS applications are first installed you can only log on using the default name and password of JANUS /JANUS. One of your first tasks should be to enter your own name and password in place of the default so that you can log on in your own right and also stop unauthorised persons logging on using the default. To set up a new logon to replace the default 1. If the Database Update application is not running, select Start > All Programs > JANUS for Windows > JANUS Database. There is a small delay while the application is loaded and the Database Update Log-On dialog is displayed. Log on as JANUS/JANUS. 2. Once logged on, select Open > System > Logon Authorisation and the Logon Authorisation dialog will open. JANUS Access Control 16 Version 1.0

3. Click Choices/F2 and click on the JANUS entry. 4. Click OK. (Alternatively, you can double-click on the JANUS entry and the JANUS logon record will be displayed.) 5. Delete the word JANUS from the User ID field and type in your own name. 6. Click on the Password field, delete the password (which will appear as asterisks) and type in your own password. 7. Leaving the other fields unchanged, click the Save/F10 button to save the record. The default user JANUS /JANUS has now been replaced by your own name and password and the default has been removed. Warning: Make sure you remember your password. If you forget it there is no way you can log on again. Changing your password For security reasons, we recommend that you change your log-on password regularly. To change your password 1. In the Database Update application, select Program > Change Password or press Alt-P. The Change Password dialog opens. JANUS Access Control 17 Version 1.0

2. Enter your existing password in the Old password field to confirm your current logon. 3. Enter your chosen new password in the New password field and confirm it in the Verify new password field. 4. Click OK to save your changes. User interface basics This section explains the basics of finding your way around the Database Update Program, using the menu and the two toolbars. Database Update menus Within the Database Update Program, all commands and options are available from the menus. Program menu The Program menu includes general options for managing the Database Update Program: Option Shortcut key Description Change Password Alt-P Allows you to change your log in password. See Changing your password on page 17. Logoff Alt-Q Logs off the Database Update Program, redisplaying the Logon dialog. Exit Alt-F4 Closes the Database Update Program. Open menu The Open menu includes options for opening dialog boxes for updating the database: Option Description Cards Users Asset Time Zones Opens the Cards dialog, allowing you to view or edit cards. See Card records on page 28. Opens the Users dialog, allowing you to view or edit users. See User records on page 34. Opens the Asset dialog, allowing you to view or edit details of items marked with asset tags. Opens the Time Zones dialog, allowing you to view or edit time zones. See Creating a new time zone on page 45. JANUS Access Control 18 Version 1.0

Option Description Modes Mode Schedules Access Groups Reader Groups Access Rights Actions Anti-Passback Hardware Opens the Mode dialog, allowing you to view or edit system modes. See System modes and schedules on page 41. Opens the Mode Schedule dialog, allowing you to view or edit mode schedules. See System modes and schedules on page 41. Opens the Access Group dialog, allowing you to view or edit access groups. See Access groups and access rights on page 38. Opens the Reader Group dialog, allowing you to view or edit reader groups. See Setting up a reader group on page 92. Opens the Access Rights dialog, allowing you to set up or view access right combinations. See Access groups and access rights on page 38. Opens the Action dialog, allowing you to view or edit actions. See Setting up actions on page 100. Opens the Anti-Passback dialog, allowing you to view or edit anti-passback configuration. See Setting up anti-passback on page 93. Allows you to select a submenu with the following options to manage hardware elements: Modem. Opens the Modem dialog; see Setting up a modem on page 83. Comms Line. Opens the Comms Line dialog; see Setting up a comms line on page 80. Remote Line Controller. Opens the Remote Controller dialog; see Setting up a remote line controller on page 82. Box > Config. Opens the Box dialog; see Setting up a controller on page 84. Box > Reporting. Opens the Box Reporting dialog; see Setting up controller event reporting on page 102. Door > Config. Opens the Door dialog; see Setting up a door on page 86. Door > Reporting. Opens the Door Reporting dialog; see Setting up door event reporting on page 104. Reader > Config. Opens the Reader dialog; see Setting up a reader on page 89. Reader > Reporting. Opens the Reader Reporting dialog; see Setting up reader event reporting on page 106. Lift Control. Opens the Lift Control dialog. JANUS Access Control 19 Version 1.0

Option Reporting System Suspend unused Cards Description Input > Config. Opens the Input dialog; see Setting up an input on page 96. Input > Reporting. Opens the Input Reporting dialog. See Setting up input event reporting on page 107. Output > Config. Opens the Output dialog; see Setting up an output on page 99. External Alarm. Opens the External Alarm dialog. Allows you to select a submenu with the following options to configure reporting: Devices. Opens the Report Device dialog, allowing you to configure devices that reports are sent to. Messages. Opens the Message dialog, allowing you to configure the messages that are sent. Destinations. Opens the Reporting Destinations dialog, allowing you to configure the destinations for various reporting groups. See Reporting and routing of system events on page 101 for details of configuring JANUS reporting. The system menu option displays a submenu containing various options for setting up new log-ons and editing system database tables. These options are intended for system administrators. Note the following: Logon Authorisation. Displays the Logon Authorisation dialog allowing you to view and create new user log-ons. Logon Level Setup. Displays the Level dialog allowing you to view and define the details of access for different user logon levels. This option allows you to suspend cards that haven t been used for a specified time. See Suspending cards that have not been used on page 33. Report menu When this option is selected, the JANUS Reporting program is opened. See About reporting on page 58. JANUS Access Control 20 Version 1.0

Window menu The Window menu includes options for rearranging open windows. This only appears when windows are open. Option Shortcut Key Description Tile - Rearranges the open windows in tiled formation, so that all windows are fully visible. Cascade - Rearranges the open windows in a stack so that all title bars show. Arrange Icons - Arranges all minimized windows. Close Ctrl+F4 Closes the currently selected window. Edit menu The Edit menu includes options for manipulating text and performing actions. This only appears when windows are open. Option Shortcut Key Description Undo Alt+BkSp Reverses your previous action. Cut Ctrl+X Cuts any highlighted text and saves it to the Windows clipboard. Copy Ctrl+C Copies the selected object to the Windows clipboard. Paste Ctrl+V Pastes current contents of the Windows clipboard. Delete Del Deletes the current object. Record menu The Record menu allows you to manipulate the current record. This only appears when a record is open. Option Shortcut Key Description Find it F4 Displays the Find dialog box, which allows you to locate objects by searching for a text string. Search Alt+F3 Performs a search. Choice F2 Displays the Choice selection box for the currently selected field. Get record Alt+F2 Retrieves the currently selected record. JANUS Access Control 21 Version 1.0

Option Shortcut Key Description New/Duplicate F3 Creates a new record based on the currently selected one. Restore F9 Restores the original record. Save F10 Saves the current record. Delete Alt+F10 Deletes the current record. Next F8 Displays the next record. Previous F7 Displays the previous record. Help menu The Help menu includes options for viewing the help system. Option Description Help About Displays the contents list of the Help system. Displays version information for the software. Database Update main toolbar At the top of the main Database Update window there is a toolbar that you can use to access the most commonly used menu options without having to use the menus. Buttons on this toolbar are as follows: Button Description Closes the Database Update application. Logs you off the application, but leaves it running in a secure state so no one can tamper with it. Opens the help system. Opens the Card dialog. See Card records on page 28. Opens the User dialog. See User records on page 34. Opens the Time Zone dialog. See Creating a new time zone on page 45. Opens the Door dialog. See Setting up a door on page 86. Opens the Reader dialog. See Setting up a reader on page 89. JANUS Access Control 22 Version 1.0

Button Description Opens JANUS Reporting. See About reporting on page 58. Database Update large toolbar Below the main toolbar of small buttons, there is a row of large buttons which are generally used when you are modifying records in the database. Buttons on this toolbar are as follows: Button Description Creates a new record of the currently selected type, e.g. a new card record when you have a card record open. Displays a list of the options for that field. Available when your cursor is in a green coloured field. Enables you to search for a particular record. Enter data you want to search for in the field and click Find again to start the search. (Note that the Find button is slower than using the Choices/F2 button). Discards the changes you have made before you have saved the record. Saves the new record or the changes made to a modified record. Deletes the current record. The application will ask you to confirm the action before the deletion takes place. Closes the current dialog. Displays the previous record in the current selection. This may the entire database or a subset of records. Displays the next record in the current selection. This may the entire database or a subset of records. If a button is greyed out then it is not currently available. JANUS Access Control 23 Version 1.0

Example window layout A typical record window displayed in the Database Update Program is as follows: Note that the status bar at the bottom of the record indicates if you are working with a New or Duplicate record (see bottom-left) and the total number of database records of this type (see bottom-right). Entering data in fields When creating new records or editing existing records, enter or overwrite data in displayed fields as required. Click checkboxes to select/clear them: Click down arrows to select items from drop-down lists: JANUS Access Control 24 Version 1.0

Note the following important points about entering data: Required fields. Some records have mandatory fields, which you must enter. If you try to save the record without entering text in one of these fields an error message appears: Green fields/choices button. When your cursor is in a green field, clicking on the Choices button (F2) displays a list of valid options that you can choose from. Time format. Where a field requires a time value, you can enter a value in any of the following formats: Specify seconds using the s suffix, e.g. 1s = 1 second, 1.5s = 1.5 seconds. Specify minutes using the m suffix, e.g. 3m = 3 minutes. Specify hours using the h suffix, 2h = 2 hours. Combine seconds, minutes and hours as required, e.g. 1h23m4s = 1 hour 23 minutes 4 seconds. Use Cont to indicate Continuous. JANUS Access Control 25 Version 1.0

Section 2 Daily administration This section describes the basic tasks that you may need to do on a regular basis in your JANUS system. For information about setting up the Cards that identify cardholders within the system, see Card records on page 28. For details of setting up the User Records that contain information about people known to the access control system, see User records on page 34. For information about creating the Access Groups and the Access Rights that define the access that particular cardholders have, see Access groups and access rights on page 38. For details of setting up the System Modes that allow you to have a single setting to control cards, actions and time zones, see System modes and mode schedules on page 41. For information about the Time Zones that define weekly time patterns, see Creating a new time zone on page 45. JANUS Access Control 27 Version 1.0

About JANUS basic data This section describes the basic tasks that you may need to do on a regular basis in your JANUS system. This includes setting up the following within the Database Update application: The Cards that identify cardholders within the system. The User Records that contain information about people known to the access control system. The Access Groups that define group of cardholders with the same access, and the Access Rights that define the access that is permitted. The System Modes that allow you to have a single setting to control cards, actions and time zones. The Time Zones that define weekly time patterns. Card records Card records hold information about the cards that permit access, and the associated cardholders. It is possible for one person to hold several cards. The data required for each card is the Surname, First Name, Card Status and a unique Card Number. Valid access groups must also be defined. Creating a new card record A card record is the unique way that a cardholder is identified to the system. You need to set up a card record for each card that will be used on the system. The required fields are Surname, First Name, Card Status and Access Groups. In addition, you must set up a unique Card Number. To configure a card record 1. In the Database Update program, choose Open > Card. 2. Click the New button. The text at the bottom left of the record will change from Enter Record Name to New Record. JANUS Access Control 28 Version 1.0

3. Enter data in the fields described below. Surname* Family name of the new cardholder. This is a required field. First name* Title Emp No User Record Issue Card ID First name of the cardholder. This is a required field. Title of the cardholder (Mr, Ms, Mrs, Dr etc). Employee Number of the cardholder. You can click this button to create a user record associated with this card record. The key fields (Surname, First Name, Title and Employee No) are automatically created in the new user record. See Creating a new user record on page 34. This field can be entered as 1 or can be left blank. This field is used to identify when a cardholder has more than one card and should be incremented by one each time. If the card has an ID or Hot Stamp number it can be entered here. This is not necessarily the same as the encoded card number. Card production design If your system includes the Card Production application, allowing you to print ID cards from your system, you can specify a particular card design to be used for this card. Click on the Choices/F2 button and select the design that you wish to use. Select the Produce Card Next Batch checkbox if you want to include this card when you next do a batch print run. JANUS Access Control 29 Version 1.0

Card status* Department Report grp Card number PIN number Access Groups* Start date/time Select the card status from the drop-down list. A card will not work on the system if anything other than Valid is entered in this box. This is a required field. Note: If any status other than Valid is entered, the status will be reported to the administrator on the Report/Guard Screen if the card is used. Click on the Choices/F2 button. If you have already defined departments, a list of existing departments will be displayed and you can choose one by double-clicking on it. If no departments are set up you can add a new one by clicking the Add button. The Add button opens a new window where you can enter a new department name. If valid access events are not normally sent to your Report/Guard Screen, the Report Grp field allows you to trace the valid transactions of a specific card. Click the Choices/F2 button and choose Access Allowed to direct valid access events to the Report/Guard Screen for this card only. Choose Trace Guard if an alarm is required. Enter the card number if known. If it is unknown, you can click Get Number and show the card to any active reader on the system. If the card is unknown to the system the number will be shown in the Get Number window. Select OK and the number is automatically entered for you. By default, the system generates seven alternative PINs which you can choose from a drop-down list. If you are not using PIN readers, leave this blank. A user-defined PIN is allowed if the system has been set to use Random PIN. See your system provider for more information. Click on the Access Groups button to open the Assign Access Groups window. This window lists all the access groups in the system on the right hand side. Select the access groups to be applied to the current card and click on the arrow between the two window panels to move them to the left hand. Click OK to close the window. This is a required field. This field allows you to define a card on the system days or months before it needs to work. The system automatically invokes the card when required. For this to work the Card Status field must be set to Pending. Leave the fields blank if you want the card to work immediately. JANUS Access Control 30 Version 1.0

Non Enforced APB Extended Unlock Escorted Comments If you select this checkbox, the card will be logged in the normal way for anti-passback but it will not be enforced, meaning the card will never be refused access through a door because of an anti-passback violation. If you select this checkbox, this card will be allowed an extended unlock time at nominated doors. Can be used for cardholders with mobility problems. If you select this checkbox, this cardholder must be accompanied by a valid host card at any reader that has been nominated as an escort reader. A valid host card is defined by the permissions on the 2nd Reader Group on the nominated escort reader (see Setting up a reader on page 89). This means that you can have different people eligible to be the host on different readers. Free text comments. *indicates required fields 4. Click Save/F10 to save the record. Repeat these steps for each card to be configured. Basing a new card record on an existing record Rather than creating a new card record from scratch, it is often quicker to duplicate an existing one and use it as a template for the new one. To use an existing card record as a template 1. Click on the Card button or choose Open > Card from the menu. Select the card record you want to use as your template and open it. 2. Click on the New button. The text at the bottom left of the record will change from Record Unchanged to Duplicate Record. Note: If you click a second time on the New button, all the fields are cleared and the screen status changes to say New Record. 3. Modify the existing record for the next cardholder. The card number and cardholder name must be changed as duplicates will not be accepted by the system. As soon as you make any change the screen status changes to say New Record. 4. Click on the Save/F10 button to save the new card record. Repeat the steps above for each new card required, using the original card as a template. JANUS Access Control 31 Version 1.0

Reviewing existing card records You can easily check the current card records in your system. To review existing card records 1. Click on the Card button or choose Open > Card from the menu. 2. Click on the Choices/F2 button to view available choices. If in view, highlight your choice by clicking on it. If necessary, move up and down the list using the scroll bar. Note: You can speed up your search by entering the first few characters of the Surname after clicking the Choices button. 3. Click on the OK button and the card record of your choice will be displayed. You can see other card records by clicking on the Previous/F7 and Next/F8 buttons. Finding a card record There are two alternative ways of finding an existing record. To find a card record using the Choices button 1. With the cursor in the Surname field, click Choices/F2. The Choices box is displayed containing the list of existing cardholder names. Entering the first few characters of the name you wish to find will limit the choices displayed. Deleting letters with the backspace key will widen the choice. You can also use the arrow buttons at the right of the Choices box to move quickly through the list. 2. Click the entry that you wish to view and click OK. Alternatively, you can doubleclick your choice. 3. Click the Next/F8 and Previous/F7 buttons to see other card records if required. Note: You can also use this method to find a card record by card number. With the cursor in the Card Number field, click Choices/F2 and enter the first few digits of the number. To find a card record using the Find button 1. Click the Find button. The message at the bottom of the Cards window says Enter Data in Required Field. 2. Type the characters that you want to search for in the appropriate field. Wild cards allow you to search for a sequence of characters (letters or numbers) appearing anywhere in the field. For example, entering war* in the Surname field will find surnames of Ward and Edwards. If you don t use a wild card, you need to enter the entire field. Searches are not case-sensitive. JANUS Access Control 32 Version 1.0

3. Click the Find button again to search for the character sequence. The first match will be displayed: if more than one record is found you can use the Next/F8 and Previous/F7 buttons to move through the subset of records. Modifying a card record You can modify the contents of any of the fields in a card record. To edit a record 1. Simply overwrite/change information. 2. Click on the Save/F10 button to save your changes. 3. Close the Card window by clicking on the Close button. Note: If you make a mistake, you can restore the record to its original state by clicking on the Restore button. Suspending cards that have not been used JANUS enables you to check cards that have not been used since a specific date and to suspend all or a selection of them. Note: This option is only available to Administrator log-ins. To check and suspend cards 1. Click Open > Suspend unused Cards. The Suspend Unused Cards window will open. JANUS Access Control 33 Version 1.0

2. By default, the start date is 28 days before the current date. You may change this date if you wish, but you cannot enter a date of less than 7 days before the current date. 3. Click the List button to display all cards that have not been used since the date specified. Note: You can only check card usage as far back as the last time that JANUS Comms was run with the COLD parameter. 4. Select the cards that you wish to suspend. You can use the Select All button to select all items in the list or you can use the standard Windows selection methods of Shift + Click to select a continuous range of displayed cards or Control + Click to select individual records. 5. Click the Select None button to clear your current selections. 6. When you are satisfied with your selection of cards, click the Suspend button. The Card Status of the selected cards will then be changed to Not Used and therefore cannot be used to open doors. If the card is subsequently used it will be reported as Not Valid (Not used) to the History Table and the Report/Guard Screen. User records A JANUS user is any person whose details are held on the system. A user should not be confused with a JANUS system administrator, who could be considered the user of the software application. A user is frequently a cardholder, but it is not a system requirement that a user holds an access card as you may wish to hold personal information about other people, such as ex-employees or contractors. User records are optional within JANUS and the access control functions will work without this feature. Note: In some countries you may be required to register under a data protection act if you hold personal data. Creating a new user record A user record contains personal and general information and can also include the photograph and signature of the person. When associated with a cardholder, the user record can be linked to the card record. There are two ways of setting up a new user record within the Database Update application. The first is via the User button or menu item and the second is from a link on the Card record (both of which are found in the Database Update application). JANUS Access Control 34 Version 1.0

To create a user record via the User button/menu item 1. Click on the User button or choose Open > Users from the menu. 2. Click the New button. The text at the bottom left of the record will change from Enter Record Name to New Record. 3. Enter data in the fields described below. Surname* Family name of the new user. First name* Title Emp No Card Record Picture User defined fields *indicates required fields 4. Click Save/F10 to save the record. First name of the user. Title of the user (Mr, Ms, Mrs, Dr etc). Employee number of the user, if relevant. If you are creating the user record before setting up a card record for the same person, you can click this button to create the associated card record automatically. The key fields (Surname, First Name, Title and Employee No) are automatically created in the new user record. See Creating a new card record on page 28. Use this button to select a picture. See Adding a photo ID to a user record on page 36. Additional fields may have been set up to provide data specific to your system. Enter appropriate information if they have been used. JANUS Access Control 35 Version 1.0

To create a user record via a card record 1. If you are already in a card record and you wish to create a user record for the same person, click the User Record button. 2. A user record will be opened, with the key fields of Surname, First Name, Title and Employee No already completed. A permanent database link is created between the two records. 3. Complete any remaining fields, including any user-defined fields that have been set up on your system. 4. Click Save/F10 to save the record. Adding a photo ID or a signature to a user record Including a user s photograph and signature in a record can provide additional security checks. Note: The description here assumes you already have photos/signatures available on file. To add a photo to a user record 1. Open the user record by clicking on the User button or choose Open > Users from the menu. 2. Click the Choices/F2 button to view available choices. If necessary, move up and down the list using the scroll bar and select the relevant record. 3. Click the OK button to display the user record of your choice. You can see other user records by clicking on the Previous/F7 or Next/F8 buttons. 4. Click the Picture button to display the Picture dialog. If there is already a picture and/or signature they will be displayed in the relevant areas. JANUS Access Control 36 Version 1.0

5. Click the Import button under the Picture display area. This will open the Open window. In the List Files of Type field, click the down arrow and select the type of file that you wish to import, for example *.bmp; *.gif; *.jpg; *.tif. 6. Find and select the appropriate photo file for this user. It appears in the Picture display area. 7. To crop the picture to a passport format, left-click at the top left hand corner of the area you wish to retain and drag the mouse to choose the area required. Note: In order to maintain the passport aspect ratio you are constrained as to where you can release the button. 8. You can also crop the picture to any rectangle without maintaining the correct aspect ratio by dragging with the right mouse button. Note: You should be wary of dragging with the right mouse button because it may result in distorted pictures. 9. If you are not happy with the cropped image, providing the record has not been saved, left-click anywhere in the Picture display area to restore the original image. 10. When you are happy with the picture, click OK button to return to the User record. JANUS Access Control 37 Version 1.0

To add a signature to a user record 1. Repeat steps 1-3 above to display the appropriate user record. 2. Click the Import button under the Signature display area. This will open the Open window. In the List Files of Type field, click the down arrow and select the type of file that you wish to import, for example *.bmp; *.gif; *.jpg; *.tif. 3. Find and select the appropriate signature file for this user. It appears in the Signature display area. 4. You can change the size of the signature as described in adding a photo above. 5. When you are happy with the signature, click the OK button to return to the user record. Reviewing existing user records You can easily check through the current user records in your system. To review existing user records 1. Click on the User button or choose Open > Users from the menu. 2. Click on the Choices/F2 button to view available choices. If in view, highlight your choice by clicking on it. If necessary, move up and down the list using the scroll bar. Note: You can speed up your search by entering the first few characters of the Surname after clicking the Choices button. 3. Step through the other card records in the database by clicking on the Previous/F7 and Next/F8 buttons. Access groups and access rights An access right is a single reader group paired with a single time zone. For example, Car Park - All The Time. An access group is a group of one or more access rights and can be applied to any card on the system. For example, a single access group could contain the following access rights: Car Park - All The Time Main Door - All The Time Works Office - All The Time Setting up access rights In order to set up access rights you must first create the constituent parts: reader group names, time zones, system modes, access group names, etc. Then you can create the pairings in the Access Rights table. JANUS Access Control 38 Version 1.0

To set up constituent parts Reader Group names can be entered via the pull-down menu Open > Reader Groups. They can also be defined whilst entering reader details. See Setting up a reader group on page 92 for more information. Time Zones can be entered via the pull-down menu Open > Time Zones or by clicking on the Time Zone button. See Creating a new time zone on page 45 for more information. Mode names can be entered via the pull-down menu Open > Modes. See Creating a new system mode on page 41 for more information. Access Group names can be entered via the pull-down menu Open > Access Groups. See Setting up access group names on page 40 for more information. To set up pairings in the Access Rights Table 1. Choose Open > Access Rights from the menu. Reader Group names are listed on the left hand side, Access Group names are listed on the top, and Time Zones are inserted where they intersect on the grid. If a Time Zone is not inserted, the access group will not include the relevant reader group. 2. To insert or change a Time Zone in the Access Rights Table, click the cursor into the required cell and click on the Choices/F2 button. Select the desired Time Zone and click on the Save/F10 button. To use the same Time Zone in different cells you can use the quick method of double-clicking until you need to change the Time Zone again. 3. The last element for an Access Group is the system Mode. In the dialog below, the access groups have been defined for when the system is in Nml Access Mode (top left of record). In other words, the described access groups will only be valid whilst the Nml Access Mode is active on the system. JANUS Access Control 39 Version 1.0

Setting up access group names You can set up new access group names from the menu option Open > Access Groups. To create a new access group 1. Choose Open > Access Groups from the menu. 2. Click the Choices/F2 button. 3. Click the Add button. 4. Enter a new access group name; for example, All Doors - All The Time, or Car Park - Mon-Fri 07:00-19:00. 5. Click the Save/F10 button. Restricting access rights to specified user IDs Individual access groups can be restricted to nominated administrators. By default all authorised administrators can allocate an access group to any card on the system. However, some systems may require greater control where application of specific access groups will need to be restricted to specific user IDs. For example, you may require that an access group called All Doors - All The Time is only granted by the Security Manager. To restrict access groups to certain user IDs 1. Choose Open > Access Groups from the menu. 2. Click the Choices/F2 button and select the access group that you wish to edit/restrict, for example All Doors - All The Time. 3. Click the Assign User IDs button. 4. The Assign window will open with a list of available User IDs in the right hand panel. Select the User IDs that are to be allowed to assign this access group to others and click the arrow between the panels to move them to the left hand panel. JANUS Access Control 40 Version 1.0

Note: Make sure that you move your own User ID to the left hand panel or you will not be allowed back in to re-edit. Note that User IDs in RED are not available. 5. Click the Save/F10 button. System modes and mode schedules System modes are a means of making rapid changes to the way in which JANUS operates without having to make substantial changes to the programming of individual cards, access authorities, actions or time zones. For example, you may want the system to automatically unlock the reception doors between 9 am and 5 pm from Monday to Friday. When bank holidays fall on a weekday you do not want the doors to unlock and this can be achieved by the use of system modes. JANUS supports up to eight system modes, any or all of which can be active at the same time. Creating a new system mode System modes allow you to make rapid changes to the way that JANUS operates without having to make substantial changes to the programming of individual cards, access authorities, actions or time zones. Note: System modes should generally reflect when you want something to happen or to be enabled, rather than when you want something not to happen or to be disabled. JANUS Access Control 41 Version 1.0

To create a new mode 1. Choose Open > Modes from the menu. 2. Click on the New button. The text at the bottom left of the record will change from Enter Record Name to New Record. 3. Enter data in the fields described below. Mode name Enter a unique name for the mode. This name should indicate the nature of the mode and describe its function, for example, Normal Access, Normal Alarm Monitoring, etc. Set password Reset password Default state of mode is active Since modes can be activated and deactivated from the Report/Guard Screen you may wish to protect their application by passwords. Enter the password that will need to be entered to set the mode, or leave blank if password protection is not required. Passwords are displayed as asterisks. Enter a password to reset the mode, or leave blank if password protection is not required Select this checkbox if you want the default state of this mode to be set as Active on system start-up. 4. Click Save/F10 to save the record. JANUS Access Control 42 Version 1.0

Viewing and modifying a system mode You may sometimes need to change a system mode. To modify a system mode 1. Choose Open > Modes from the menu. 2. With the cursor in the Mode name field, click the Choices button to list the existing modes. 3. Select the mode you want to view and click OK. 4. Click the Next/F8 or Previous/F7 buttons to see other system mode records if required. 5. If you change any of the records, click the Save/F10 button to save the changes. If you change anything without clicking on the Save button, a message box is displayed when you close the window. Click on the No button to close the Mode window without saving any of the changes. Deleting a system mode To delete a system mode 1. Choose Open > Modes from the menu. 2. With the cursor in the Mode name field, click the Choices button to list the existing modes. 3. Select the mode you want to delete and click OK. 4. To delete the record, click the Delete button. A message box will be displayed asking you if you are sure. Click Yes to complete the deletion. Note: You will not be allowed to delete a record if it is used elsewhere by the system. Setting up system mode schedules Although you can manually set and reset system modes from within the Report/Guard Screen, there are likely to be instances when they need to be set or reset at a predetermined date and time. For example, public holiday dates are known in advance and may require different access permissions and/or different alarm monitoring situations to be active. System mode schedules enable this. You can set a schedule to operate once only at a specific date/time or set it to operate regularly on one or more days of the week at the same time each week. JANUS Access Control 43 Version 1.0

To create a mode schedule 1. Choose Open > Mode Schedules from the menu. 2. Click the New button to create a new record. 3. Enter a name for the schedule. The name should represent the nature of the schedule, for example, Emergency Access, Holiday Alarm Monitoring, etc. 4. Click the Once button to set a schedule to run once, or the Days of Week button to operate regularly on one or more days of the week. If you have chosen the Once button, enter a date in the format dd/mm/yy. If you have chosen the Days of Week button, click the relevant days so that a tick appears against the days that you wish this schedule to take place. 5. Enter a time in the Time of day field, in the format 22:30 or 08:15 (i.e. 24 hour clock with a leading zero for hours before 10 am). 6. In the Modes to be changed section click in the relevant checkboxes to Set or Reset the relevant modes. 7. To save the new Mode Schedule record, click Save/F10 to save the changes. Note: Try not to turn modes On and Off at the same time. JANUS Access Control 44 Version 1.0

Creating a new time zone A time zone defines the periods during which cards in an access group can gain access through doors which are allocated that time zone. Each time zone record consists of the seven days of the week with three time periods for each, although for most time zones you will only need to define one period per day. To create a new time zone 1. Click the Time Zone button or choose Open > Time Zone from the menu. 2. Click on the New button. The text at the bottom left of the record will change from Enter Record Name to New Record. 3. Enter an identifying name for the new time zone. 4. Under Period 1, set a Start time and Stop time for each day of the week. Enter all times in the format hh:mm (using 24 hour clock). 5. If more than one time period is required on the same day, you can enter further Start and Stop times for Period 2 and Period 3. You can set up to three time periods for each day. Note: A Start time of midnight is 00:00 and a Stop time of Midnight is 24:00. 6. Click Save/F10 to save the record. JANUS Access Control 45 Version 1.0

Section 3 Monitoring the system This section describes the use of the Report/Guard screen application that allows you to monitor your access control system. For information about starting up the Report/Guard screen application, see Starting the Report/Guard screen application on page 48. For details of displaying alarms, see Viewing alarms on page 49. For information about reviewing alarms, see Reviewing a selected alarm on page 50. For details of changing system modes, controlling outputs, controlling the system state, see Changing system controls on page 51. For information about viewing APB areas and user actions, see Viewing areas and actions on page 54. For details on using the graphics option of the Report/Guard screen, see Using the graphical tool on page 56. JANUS Access Control 47 Version 1.0

About the Report/Guard screen application The Report/Guard screen application allows you to monitor system events in real-time and control and monitor system equipment. You can use the Report/Guard Screen to acknowledge alarms, review recent events, change system modes, control doors and outputs, review system state, view people in area, and view a user s latest actions. It also provides a real-time graphical environment. System events can be posted to any Report/Guard Screen, a printer, or a system file such as historical data. Buttons at the top of the Report/Guard Screen are used to navigate and control system functionality. Depending upon your individual log on authorities, some buttons may not be available. Starting the Report/Guard screen application You need to open the Report/Guard screen and log in before using the application. To start the Report/Guard screen application 1. Select Start > All Programs > JANUS for Windows > JANUS Report Screen. 2. The Report Screen Logon dialog is displayed. 3. Enter your system ID into the User field. If you do not have an ID of your own you may be able to use the default, which is JANUS. 4. Enter your password in the Password box. If you do not have a Password of your own you may be able to use the default, which is JANUS. Warning: For the security of your system, we strongly recommend that the default log on ID is removed immediately after the system has been commissioned. To close the Report/Guard application Click the Exit button to close the Report/Guard Screen application. JANUS Access Control 48 Version 1.0

Viewing alarms Getting the next alarm You can use the Report/Guard screen to step through the alarms. To view the next alarm 1. Click the Next Alarm/F9 button to display the next highest priority alarm that has not been acknowledged yet. A window will open detailing the time, the event and appropriate instructions to be carried out for that event. 2. In the Your response text box, enter details of your response in free text. 3. Acknowledge the alarm and save the information by clicking on the OK/F10 button. 4. If you need to hold an alarm open while investigations are carried out, you can click the Hold button to keep the alarm in a pending state. If an event is held as pending it will be highlighted on screen with a dark red background. On remote Report/ Guard Screens, the same event will be shown with dark blue highlighting to indicate that another Report/Guard Screen is dealing with the event. JANUS Access Control 49 Version 1.0

Reviewing a selected alarm Alarms and events in the Report/Guard Screen can be recalled for review. To review alarms and events in the Report/Guard 1. Select an event line and click on the Selected Alarm button: 2. The alarm/event window opens and displays the original information including comments and instructions that have previously been entered. 3. You can add additional free-text information about the alarm or event information. You can also hold the alarm for further responses if required. 4. When complete, you can save the alarm information by clicking the OK/F10 button. JANUS Access Control 50 Version 1.0

Changing system controls Changing a system mode You can change the system mode from the Report/Guard screen. To change a system mode 1. Click the Change Mode button to open the Change Mode window. The defined system modes are displayed together with the current status of each. 2. Select the mode that you want to change and: Click Turn mode on to set the mode to Active. Click Turn mode off to set the mode to Inactive. Multiple modes can be active at any time providing flexibility. 3. If you require a password to protect this function you must enter it in the Password field. 4. Click OK to complete the change. Note that only one mode can be changed at a time. JANUS Access Control 51 Version 1.0

Controlling outputs You can control system outputs from the Report/Guard screen. To control an output 1. Click the Control Output button to display a list of the system outputs. 2. Outputs are listed in alphabetical order. Click on an output to select it. You can select multiple outputs. 3. Click Operate to operate the selected output(s). They will remain activated until Reset is clicked. 4. Alternatively, you can operate selected outputs for a brief period by clicking on the Momentary button. This switches each output for its default time or pulse period. When this default or pulse period expires, the output(s) will be reset automatically. Note: Each output may be defined on the system with a different default period. Therefore outputs may operate for different pulse times. JANUS Access Control 52 Version 1.0

Controlling the system state You can control the system state from the Report/Guard screen. To control the system state 1. Click the System State button to open the System State window where system anomalies will be displayed for example, for example, controllers that are off-line, doors that are unlocked and inputs/alarms that are isolated The date and time that each element went into the abnormal state is also shown in the list. 2. Items considered by the system to be important, for example Door Forced or Box Offline, are shown in red, while items relating to normal system operation, for example Door Unlocked, will be shown in black. 3. To isolate an alarm/input, click the Isolate button and select the alarm/input from the window that is displayed. Similarly, to isolate a group of alarms click the Isolate Group button and select the alarm/input group from the window that is displayed. 4. Once selected, click the OK button to Isolate the items selected. 5. To restore an alarm/input, click the Restore button and select the alarm/input from the window that is displayed. Similarly, to restore a group of alarms click the Restore Group button and select the alarm/input group from the window that is displayed. 6. Once selected, click the OK button to restore the items selected. Note: Each output may be defined on the system with a different default period. Therefore outputs may operate for different pulse times. JANUS Access Control 53 Version 1.0

Viewing areas and actions Viewing areas You can view anti-passback areas from the Report/Guard screen, and display a list of cardholders currently in an area. You can also change the status of a cardholder to OUT of the area or to UNKNOWN. You may want to do this to rectify a cardholder s antipassback status if they have tailgated into an area and consequently are failing antipassback, or to make everyone UNKNOWN after a building evacuation. To view the system areas 1. Click the View Area button to list the system anti-passback areas. 2. Areas within the system are listed in alphabetical order. Click on an area to highlight it and click OK to display a list of all cardholders currently in the area. These are grouped by department, and listed in alphabetical order within department. JANUS Access Control 54 Version 1.0

(This window will close automatically when the main View Area window is closed.) 3. To change the status of a single cardholder, click the required cardholder in the list and click the Remove One button. To change the status of all cardholders simultaneously, click the Remove All button. 4. A further dialog is displayed. From here you can do one of the following: Click the Unknown button to set the cardholder s status to Unknown. Click the Out Of Area button to set the cardholder s status to out of this APB. Choose another area from a drop-down list to place the cardholder into. 5. On the Area window, you can print a list of cardholders in an area at any time by clicking on the Print List button. Viewing a user s latest actions You can select a user and view his/her latest actions from the Report/Guard screen. To view a user s action 1. Click the Last Used button to open the Last Used window. 2. Enter a card number or the first few letters of a cardholder s name. 3. Click the Find button and a list will be generated to match your query. Details such as the date and time the card was last used will be listed. 4. You can verify a cardholder ID by selecting a name from the list and clicking on the Picture button. JANUS Access Control 55 Version 1.0

Using the graphical tool In order to use graphics in the JANUS Report/Guard Screen, you need a specific Graphics licence to be installed. If your system is not configured for this option and you wish to include it, contact your JANUS system supplier. The graphics option is primarily used to display and control the status of doors, alarm activity and static assets. You can also use it unlock and lock doors, control outputs, isolate and restore specific alarm points, and to carry out and monitor other control functions on the system. Icons that represent various elements are placed onto maps by drag and drop, and show in real-time the normal or abnormal status of each element. If an input/alarm icon is static it is deemed to be in a Healthy state, if it is animated, it is in an Abnormal state. Maps must be in.bmp format and can be drawn with any suitable graphics package such as Windows Paint or Adobe Photoshop. Multiple maps can be configured to provide varying detail to avoid screen clutter. Normally the highest level map, or Mainsite map gives an overall plan of the site and lower level maps can be selected from this map to give progressively more detailed views. As you move the mouse over a graphics map the cursor may change from a pointer to a hand shape as it moves over a hot spot - an area on the map associated with a separate map. When the cursor is a hand, left-clicking will cause the associated new map to replace the original. If the hand is pointing to an icon rather than a map when the left button is clicked, a window will appear showing the name of the element and additional control buttons appropriate for that element, for example, for a door these will be Momentarily Unlock Door, Unlock Door Period, Lock Door, Isolate and Restore alarm reporting. For an input, only the Isolate and Restore buttons are present. For an output the buttons are Pulse, Operate, Reset, Isolate and Restore alarm reporting. JANUS Access Control 56 Version 1.0

Section 4 Reporting This section describes the use of the reporting features of JANUS. For the basics of reporting, including how to start the program, an introduction to the main screen and details of system report definitions and filter controls, see Reporting basics on page 58. For details of report templates and managing them, see Managing report templates on page 68. For information about running reports and managing them, see Running and managing reports on page 75. JANUS Access Control 57 Version 1.0

About reporting JANUS Reporting is an add-on module to your access control system. It is used to generate on-screen reports before committing them to print. The reports are generated from the JANUS database and archived history and operator activity data. JANUS Reporting provides a number of System Report Definitions which allow you to create report templates. Each template contains a set of filter conditions. In this way, you can customise reports to display only the information required. The main features of the Reporting application are as follows: System Report Definitions are used to create Report Templates. Templates can be Shared or Private. Templates are stored within the main database, therefore reports can be run from any PC that has JANUS Reporting installed. Two interactive user logon levels are supported: Manager and User. Reporting can be started from the JANUS Database Update program by selecting Report from the menu bar. Alternatively it can be started directly from the Windows desktop. Reporting basics This section summarises the basics of JANUS Reporting including how to start the program, an introduction to the main screen and details of system report definitions and filter controls. Starting the Reporting application Reporting is an add-on module to the JANUS access control system and is used to generate reports from the JANUS database and the archived history and operator activity data. Reports can be viewed on screen, printed, and exported in a variety of formats suitable for other applications. To start the Reporting program 1. On the Windows desktop, click Start > Programs > JANUS for Windows > JANUS Reporting. 2. The Reporting Logon window is displayed. 3. Enter your system ID in the User field. If you do not have an ID of your own you may be able to use the default value of JANUS. JANUS Access Control 58 Version 1.0

4. Type your Password into the Password box. If you have used the default ID, you can use the default password which is JANUS (unless this has been changed). Reporting the main window The JANUS Reporting main window is shown below: The menu bar gives access to the full range of options and shortcut keys available for the program. The toolbar gives quick access to the most frequently used options available for the program. The Report Tree pane on the left displays a range of available report templates. The content of the tree is dependent on the log-on level of the user. The Filter Selection Controls allow you to create and maintain a selection of filter conditions associated with a report template. The Filter Hierarchy Tree displays the filters that have been set up as hierarchical data, showing the logical structure of the filter restrictions. The status bar indicates which report template in the Report Tree is currently selected. The content of the report tree is dependent on your logon level. There are two levels of user the User level and the Manager level. User level users must be a member of the Guard or Administrator security groups within the access control system. Manager level users must belong to the Manager or Installer security groups. JANUS Access Control 59 Version 1.0

Reporting menu options Within the Reporting application, all commands and options are available from the menus. File menu The File menu includes general options for managing the Reporting program: Option Description Save Save As Log Off Exit Allows you to save changes made to the current report template. Allows you to save the current report template with another name. Logs out of JANUS Reporting, leaving it in a secure state ready for another user to log on. Exits the Reporting program. Edit menu The Edit menu Includes options for editing report templates: Option Rename Delete Re-assign Share Restrict Description Allows you to change the name of a report template. This option is only available if you own the template, or are logged on with Manager level status. Use this option to delete a selected report template. This option is only available if you own the template, or if you are logged on with Manager level status. This option is not available for System Report Definitions. This option is only available to Manager level users. Use this option to change the ownership of the selected template and also to change its status from Private to Shared, or vice versa. Use this option to change the status of a template that you own from Private to Shared. If you are logged on with Manager status you can use this option to change the status of any template. This option is not available for System Report Definitions. Use this option to change the status of a template that you own from Shared to Private. If you are logged on with Manager status you can use this option to change the status of any template. This option is not available for System Report Definitions. JANUS Access Control 60 Version 1.0

Reporting menu The Reporting menu allows you to run reports. This only appears when windows are open. Option Description Run Runs the report for the currently loaded report template. The report opens in a separate window where you can view and print it. Options menu The Options menu includes optional switches used when running reports. This only appears when windows are open. Option Show Restrictions Enable Two Passes Description This menu item denotes whether or not the current filter conditions are displayed when the report is run. If this setting is active, the menu option will be checked. The setting can be toggled on and off by clicking on the menu item. This menu item denotes whether or not two pass reporting is used. The setting can be toggled on and off by clicking on the menu item. See Single and double pass reporting on page 68. Help menu The Help menu includes options for running reports. This only appears when windows are open. Help Option About Reporting Displays help information. Description Displays version information for the Reporting software. JANUS Access Control 61 Version 1.0

System Report Definitions A set of System Report Definitions are supplied when the JANUS access control system is installed. These are used as the building blocks for report templates. You cannot change any of these System Report Definitions. Report Name Access by Access Group Access by Reader Group Access Group Members Card Access Cardholder Details Cardholder List (Access Groups) Cardholder List (Alphabetical) Cardholder List (Departmental) Cardholder List (Access Groups) Door Details Engineering History Event Relay History Event Relay Opact Guard Tour History Guard Tour Opact Description Shows the reader groups to which each access group is allowed access. Gives details of the access groups which are allowed access to each reader group. Shows details of cards entered on the system, sorted by access group and department. Shows the access rights stored in the database. For example, which people are allowed through a specified door and during which time zone. Show details of cards entered on the system. Shows details of cardholders on the system including their access groups. Shows details of cardholders on the system in alphabetical order. Shows details of cardholders on the system including their department. Shows details of cards entered on the system in numerical order. Show the configuration of the doors which have been defined on the system. Shows details of incidents from the Engineering Log. Shows historical activity reported from the Event Relay application. Shows operator activity for the Event Relay application. Shows details of incidents reported from the Guard Tour application. Shows operator activity for the Guard Tour application. JANUS Access Control 62 Version 1.0

Report Name Description History IDC/IPC Details Incident History Input List Operator Activity Operator Activity (Descending) Output List Reader Access Reader Details Reporting Destinations Retrieved History Retrieved History (Descending) Retrieved Operator Activity Retrieved OpAct (Descending) Give details of activity on the system, for example, who went through a specified door on a certain day. Show the configuration of the controllers which are used by the system. Shows incident data which has been restored from archive. Shows the definitions for inputs connected to controllers. Shows activity on the Database Update program; for example, who logged on and when, which parts of the program they entered and what was changed. The oldest data is shown first. Shows activity on the Database Update program; for example, who logged on and when, which parts of the program they entered and what was changed. The newest data is shown first. Shows the definitions of outputs connected to controllers. Report which cardholders are allowed access through which doors, sorted by reader group and department. Show the configuration of readers which have been defined on the system. Show how system transactions are routed to system devices such as the History Table and Report Screens. Identical to History reports but operates on data which has been restored from archive. Data is shown in ascending order. Identical to History reports but operates on data which has been restored from archive. Data is shown in descending order. Identical to Operator Activity reports but operates on data which has been restored from archive. Identical to Operator Activity reports but operates on data which has been restored from archive. Data is shown in descending order. JANUS Access Control 63 Version 1.0

System Actions Time Zones Report Name Description Shows the configuration of the automatic control of inputs and outputs by the system, for example the control of lights in an area by using a passive infrared detector to determine when the area is occupied. Shows the start and end times for each day of the week for the time zones used by the system. Reporting filter controls Filter controls are made up of Filter Conditions which can be grouped into Filter Branches. Filter Condition A filter condition is made up of a field name, a filter operator and a value. When used together, they restrict the data retrieved from the database when the report is run. In this way, only the exact information required is shown in the final report. For example, if you were creating a report to search for all members of the sales department, then you would set up a filter condition of: Field Filter Operation Value Department Has in it Sales Filter Branch This is a group of filter conditions that are logically OR ed together. Multiple filter branches are logically AND ed together. This is denoted by an item of And displayed between filter branches in dark red text. The filter conditions and branches are displayed in the Filter Hierarchy Tree as shown below: JANUS Access Control 64 Version 1.0

Up to 50 filter condition branches may be added to the Filter Hierarchy tree, with each branch containing a maximum of 25 filter conditions. See Creating a report template on page 69 for more information. Reporting filter operators Filter operators are used to restrict the amount of information retrieved from the JANUS database when a report is run. In this way, only the exact information required is displayed in the report. The filter operators available to the user are dependent on the type of data contained in the selected field, which can be one of: text, number, date or time. The tables below give details of each filter operator available for the different data types and examples of the data retrieved from the database when the report is run. Text and Number Option has in it same as not same as after Description Only data which contains the number or text entered in the Value field will be included in the report. For example: Card Number has in it 13 means that only card numbers containing 13 will be included in the report, for example, 13, 130, 131, 132, 113, 213, 313, 1130, 1131, 2131, etc. User Name has in it ins means only cardholders whose names contain the text ins will be included in the report, for example, Hawkins, Tomkins, Tomkinson, Instow. Only data that matches what is typed in the Value field will appear in the report. For example: Card Number same as 113 means that only card number 113 will be included in the report. User Name same as Hawkins means that only cardholders called Hawkins will be included in the report. Only data that does not match that typed in the Value field will appear in the report. For example: Card Number not same as 113 means that card number 113 will not be included in the report. User Name not same as Hawkins means that cardholders called Hawkins will not be included in the report. Only data of a greater number, or later in the alphabet, than that entered in the Value field will appear in the report. For example: Card Number after 113 means that only card numbers 114 and above will be included in the report. User Name after Hawkins means that only cardholders that appear alphabetically after Hawkins will be included in the report. JANUS Access Control 65 Version 1.0

Option before same as or after same as or before is null is not null Description Only data of a smaller number, or earlier in the alphabet, than that entered in the Value field will be included in the report. For example: Card Number before 113 means that only card numbers 112 and below will be included in the report. User Name before Hawkins means that only cardholders that appear alphabetically before Hawkins will be included in the report. Only data of the same or a greater number, or the same or later in the alphabet, than that entered in the Value field will appear in the report. For example: Card Number same as or after 113 means that only card numbers 113 and above will be included in the report. User Name same as or after Hawkins means that only cardholders called Hawkins or that appear alphabetically after Hawkins will be included in the report Only data of the same or a smaller number, or the same or earlier in the alphabet, than that entered in the Value field will appear in the report. For example: Card Number same as or before 113 means that only card numbers 113 and below will be included in the report. User Name same as or before Hawkins means that only cardholders called Hawkins or that appear alphabetically before Hawkins will be included in the report. Only null data fields are returned. For example: User Name is null means only records where the user name field has no content will be included in the report. Only data fields that are not null are returned. For example: User Name is not null means that records where the user name field contains anything at all will be included in the report. JANUS Access Control 66 Version 1.0

Date Option Description of not of after before of and after of and before is null is not null Only activity occurring on the date typed in the Value field will be included in the report. For example: Date of 11/6/2009 means that only activity occurring on 11th June 2009 will be included in the report. Date of today means that only today s activity will be included in the report. Date of yesterday means that only yesterday s activity will be included in the report. Only activity not occurring on the date typed in the Value field will be included in the report. For example: Date not of 11/6/2009 means that only activity which didn t happen on 11th June 2009will be included in the report. Only activity occurring after the date typed in the Value field will be included in the report. For example: Date after 11/6/2009 means that only activity after 11th June 2009 will be included in the report. Only activity occurring before the date typed in the Value field will be included in the report. For example: Date before 11/6/2009 means that only activity before 11th June 2009 will be included in the report. Only activity occurring on or after the date typed in the Value field will be included in the report. For example: Date of and after 11/6/2009 means that only activity on and after 11th June 2009 will be included in the report. Only activity occurring on or before the date typed in the Value field will be included in the report. For example: Date of and before 11/6/2009 means that only activity occurring on or before 11th June 2009 will be included in the report. Only null data fields are returned. For example: Date is null means only records where the date field has no content will be included in the report. Only data fields that are not null are returned. For example: Date is not null means that records where the date field contains anything at all will be included in the report. JANUS Access Control 67 Version 1.0

Time The filter operators for time are the same as those for Text and Number. The JANUS system uses a 24 hour clock format, therefore all times should be entered accordingly. For example, 3:15 pm should be entered as 15:15. Times before 10 am must be entered with a leading zero for the hours. (i.e. 07:30 for 7:30 am). If the leading zero is left out the system will not find the appropriate records. All separators between hours and minutes or between minutes and seconds must be a colon (:) with no additional spaces. The use of seconds is optional. Reporting single and double pass reporting When producing a report, you can choose whether a report is generated using singlepass or double-pass reporting. There are pros and cons to each: Method Pros Cons Single pass Double pass The first page of the report appears instantly. Subsequent pages are created as you step through the report. All pages are available to view without additional delays. The total number of pages is calculated and displayed. If you wish to view the last page you still have to wait for all pages to be created. The total number of pages is not calculated until the last page is viewed. For large reports there can be quite a delay before the report can be viewed. To set double pass reporting 1. Choose Enable Two Passes from the Options menu. 2. This is a toggle switch, indicated by a check mark. Choose the menu option again to switch off double-pass reporting. Managing report templates The JANUS Reporting program provides a number of System Report Definitions which allow you to create your own report templates. Each report template contains a set of filter conditions. In this way, you can customise reports to display the specific information required. JANUS Reporting employs templates to allow the user to generate specific reports based on information contained within the database. System The System Reports Definitions are supplied when the JANUS system is installed. They are used as the building blocks for report templates. This list can only be altered by the installation program when an upgrade is performed. See System Report Definitions on page 62 for more details of each system report type. JANUS Access Control 68 Version 1.0

Shared These report templates have been saved for anyone to use. Although any user can create reports from shared templates, only the owner and managers can modify, rename or delete them. Other users are free to copy shared templates. Private These are templates owned by the user currently logged in to JANUS Reporting. These are visible and editable only to the logged-in user and managerlevel users. This section explains how to create and manage report templates. Creating a report template All new report templates must be based on one of the existing System Report Definitions provided when JANUS Reporting was installed, or on an existing template. This section deals with creating a template based on a System Report Definition. See Copying a report template on page 71 for details on using an existing template. The System Report Definition selected for a template is dependent upon the information you want to include in the final report, as each report definition is based on a number of fields in the JANUS database. See System Report Definitions on page 62 for more details on each report definition type. A report template must have filter controls associated with it before a report can be run using that template. The more filter controls that a template has, the more restrictive the final report. The following provides an example of setting up the filter controls for a report template based on a History System Report Definition. Example of setting up filter controls 1. In the Reporting main window, click the History System Report Definition from those listed in the report tree. The database fields available for selection are listed in the Field drop down menu in the Filter Conditions area of the main window. 2. To filter for a particular person: Select User Name from the Field drop down menu. From the operators listed in the Filter drop down menu, select has in it. In the Value field, type in the name or a part of the name of the cardholder. For example, if you type john, it will match anyone called John as a first name, and anyone called Johnson, or Littlejohn, etc. as a surname. Click the Add button. The filter condition is now displayed in the Filter Hierarchy Tree as: User Name has in it 'john' 3. To set a filter for the readers: Select Location from the Field drop down menu. Select an Operator from those listed in the Filter drop down menu. In this case select same as. JANUS Access Control 69 Version 1.0

In the Value field, select one of the readers listed, or type in the name of a reader, e.g. sales. Click the And button. A new filter branch is added to the filter hierarchy tree. 4. To filter for more than one location, a second filter condition must be added to the filter branch. Repeat steps 6 to 8, but this time, type in reception in the Value field and click the Or button. 5. To define a time period for which to filter the data: Select Date from the Field drop down list. Select an operator from the list in the Filter drop down menu, in this case, select of and after. In the Value field type in a date in dd/mm/yyyy format. For this example, type 30/12/2001. Today, Yesterday and Tomorrow are also valid entries in this field. Click the And button. 6. To further restrict the report, you can add a time filter. To do this: Select Time from the Field list. Select after from the Filter list. In the Value field type 08:30. Click the And button. 7. When all filter conditions have been added, save the template with the appropriate visibility. See Saving a template on page 70 for more details. 8. You can then use the template to run a report. See Running a report on page 75 for more details. Saving a template When you have a created or edited a template, you need to save it. To save a template 1. When all the filter controls have been defined click the Save button, or select File > Save from the menu options. The Save dialog opens. JANUS Access Control 70 Version 1.0

2. Enter a Report Name. This can be up to 30 characters in length. 3. Select the required Visibility for this template. If saved as a Private Report template, only the creator (owner) and manager level users will be able to see, modify and run this template. If saved as a Shared Report template, all users will be able to see, copy and run this report. 4. Click OK to save the new template. 5. A message will be displayed if the template is being saved as a private report and the user already has a report of that name, or if the template is being saved as a shared report, and a shared report of that name already exists. 6. Select Yes if the template is to be overwritten; select No to return to the Save dialog and repeat steps 3 to 5 with a different Report Name. 7. The report template can now be run to produce a report. See Running a report on page 75 for more information. Copying a report template You can use a copy of an existing report template, or a System Report Definition, by using the Save As menu option. This is particularly useful if a template already exists which contains filter controls that you wish to use. To copy an existing report template 1. Select the template to be copied by clicking on it in the Report Tree. 2. Choose File > Save As from the menu, or right-click the template and select Save As from the pop-up menu. The Save dialog will open as shown below, with the existing name highlighted. 3. Type in a new Report Name. 4. Change the Visibility of the template if required. If saved as a Private Report template, only the creator (owner) and Manager level users will be able to see, modify and run this template. If saved as a Shared Report template, all users will be able to see, copy and run this report. 5. Click OK to save the copy of the template. JANUS Access Control 71 Version 1.0

6. A message will be displayed if the template is being saved as a private report and the user already has a report of that name, or if the template is being saved as a shared report, and a shared report of that name already exists. Select Yes if the template is to be overwritten; Select No to return to the Save dialog and repeat steps 3 to 5 with a different report name. 7. The report template can now be run as it is to produce a report (see Running a report on page 75 for more information), or it can be further modified (see Modifying a report by changing the filter controls on page 72). Modifying a report by changing the filter controls Altering a report template s filter controls will change the data that the report will display when it is run. This can only be done by the owner of the template, or a Manager level user. For all types of modification, select the required template from the report tree. All filter conditions for that template will be displayed in the filter hierarchy tree. To add a filter condition 1. With the correct template selected, choose an option from those listed in the Field drop-down menu. 2. Select an Operator from those listed in the Filter drop down menu. 3. In the Value field select from the options listed, or type in a new value. 4. Click the And button to add a new filter branch is added to the filter hierarchy tree. 5. Alternatively, click the Or button to add a new filter condition to an existing filter branch. 6. Repeat for all filter conditions to be added. To edit the filter conditions 1. In the filter hierarchy tree, click the filter condition to be modified. It will become highlighted. 2. Change the Field, Filter Operator and Value options as required. 3. Click the Modify button. The updated filter condition will now appear in the filter hierarchy tree. 4. Repeat for all filter conditions to be edited. To delete a filter condition 1. To do this, select the filter condition to be deleted from those displayed in the filter hierarchy tree and click the Delete button. Alternatively, right-click the filter condition and select Delete. 2. The filter condition will be removed from the filter hierarchy tree. 3. Repeat for all filter conditions to be deleted. JANUS Access Control 72 Version 1.0

4. When all modifications are complete, Save the modified template. 5. If another template is selected in the Report Tree before the modified template has been saved, a message will appear requesting that edited filters are saved. Click Yes to save the changes. The newly selected template will now be shown in the main window. Click No to cancel the modifications. The main window will now show the newly selected template. 6. Click Cancel to return to the main window where the modified template will still be displayed. If necessary you can also do the following: Change the visibility of a report template. See Sharing/restricting a report template on page 73 for further information. Change a report name. See Renaming a report template on page 74 for more details. Re-assign a report template to another user. See Reassigning a report template on page 74 for more details. Sharing/restricting a report template Report templates can only be shared or restricted by the owner of the template or a Manager-level user. The visibility of System Report Definitions cannot be changed. Sharing a report template 1. Select the private template to be shared from the report tree. 2. Choose Edit > Share from the menu, or right-click on the template and select Share. 3. The report template will now appear in the report tree under both the owner s node and the Shared Reports node. 4. If a shared template of the same name already exists, then a message will appear indicating that a template with that name has already been published. 5. In this case, click OK to abort the Share command. Rename the template and repeat steps 1 to 3. Restricting a report template 1. Select the shared template to be restricted from the report tree. 2. Choose Edit > Restrict from the menu options, or with the cursor on the template, right-click and select Restrict. 3. The report template will now appear in red in the report tree under the owner s node only. It will be removed from the Shared Reports node and will only be visible to the owner or a manager-level user. 4. The Share or Restrict menu options are only available if the user is the owner of the template, or a manager-level user. JANUS Access Control 73 Version 1.0

Renaming a report template Report templates can only be renamed by the owner of the template or a manager-level user, while System Reports Definitions cannot be renamed. To rename a report template 1. Select the template to be renamed from the Report Tree by clicking on it. 2. Choose Edit > Rename... from the menu options, or right-click the template and select Rename. 3. You can then overwrite the report template name. 4. When you press Return the new name will be saved. 5. However, if you already have a report template of the same name, or a shared report exists with the same name, you will be prompted to choose another name. Reassigning a report template Report templates can only be re-assigned by a manager-level user, while System Report Definitions cannot be re-assigned. To reassign a report template 1. Select the template to be re-assigned from the Report Tree. 2. Choose Edit > Re-assign... from the menu options, or right-click the template and select Re-assign... 3. Select a User Name from the drop-down list. 4. Choose the type of Visibility for the template. 5. Select OK to continue. The report template will now appear under the node of the User defined in step 3 and under the Shared Reports node if applicable. However, if the user already owns a report template with the same name as the template being re-assigned, then you will be asked if you want to overwrite the existing report. Click Yes to continue with the re-assignment and overwrite the existing report; click No to return to the Select User Name dialog. Deleting a report template Report templates can only be deleted by the owner of the template or a manager-level user. System Report Definitions cannot be deleted. To delete a report template 1. Select the template that you want to delete from the report tree. 2. Choose Edit > Delete from the menu options, or with the cursor on the template, right-click and select Delete. JANUS Access Control 74 Version 1.0

3. A confirmation box appears asking you to confirm the deletion. 4. Select Yes to delete the template or No to cancel the command. 5. The template is removed from the Report Tree. Running and managing reports Once you have created your report templates, you can run reports. You can also search a report, print a report and export a report in a variety of alternative formats. Running a report You can run a report at any time from a template or a System Report Definition. To run a report 1. Select the template or System Report Definition in the report tree. 2. To run the report, do one of the following: Click on the Run button. Choose Reporting > Run from the menu. Right-click on the template in the report tree and select Run. 3. The program searches the database, selecting all data which matches the conditions set within the filter controls. Any data which matches is displayed in a separate window on the screen. If no matching data is found, a blank report appears. JANUS Access Control 75 Version 1.0

If the report template is based on one of the retrieved System Report Definitions, and the Archive program has not been used to generate retrieved data, a warning message appears advising you to use JANUS Archive first. Navigating the report The window in which the generated report is displayed includes a toolbar which includes the following items: Button Description Prints the generated report. See Printing a report on page 77. Emails the report as an attachment in a selected format. See Emailing a report on page 78. Displays the Find Text dialog. Resizes the report to fit the whole page in the display. Resizes the report so that the width of the page fits in the display. Resizes the displayed report to 100% Displays the current magnification of the report and allows you to change it. Displays the first page of the report. Displays the previous page of the report. Displays the next page of the report. Displays the last page of the report. Searching a report Generated reports can often be very large in size, so you may need to search for particular text. To search using a text string 1. Run the required report. With the report open, click on the Find Text button on the toolbar. The following dialog appears: 2. Enter the text string you want to search for and click the Find Text button. 3. If matching text is found in the report, it will be highlighted. JANUS Access Control 76 Version 1.0

4. Click the Next arrow to find the next occurrence of the text string. You can also click the Previous, First or Last buttons to move backwards and forwards in the report finding occurrences of the search string. Printing a report If necessary, you can print a report- either directly to a printer or to a file in a format suitable for printing later. To print a report 1. After running a report, click the Print button. 2. The standard print dialog will open. 3. By default All pages in the report will be printed. To select a specific page range, click Pages and enter the first and last page number to be printed. 4. Select the number of Copies of the report to be printed. 5. Click OK to start printing; click Cancel to abandon the printing and return to the report window. To print a report to file 1. After running a report, click the Print button. 2. Select the Print to File checkbox at the bottom of the dialog. 3. Choose the Type of file to be output from the drop-down list (Report Emulation Text, PDF, Lotus, Quattro, Excel, Graphic, HTML, XHTML, RTF or Printer file). JANUS Access Control 77 Version 1.0

4. Click the following button and choose the location of the output file. 5. Click OK to output the print file to the specified location. Emailing a report Once you have produced a report, you can export it as an email attachment in the following formats: PDF Lotus Quattro Excel RTF To email a report 1. Click the Email button. The Attachment Types window opens. 2. Select the appropriate attachment file type: Excel, Lotus, PDF, Printer, Quattro or RTF. 3. Click OK. The report will be added to an email message as an attachment. JANUS Access Control 78 Version 1.0

Section 5 System set up This section describes how to set up the basic system data. This is normally set up when the system is first configured, but changes may be required later, so it is included here for completeness. For information about setting up communications hardware, including comms lines and remote line controllers, see Communications hardware on page 80. For details of setting up controllers, doors and readers, see Controllers, doors and readers on page 84. For information about creating APB areas, inputs, outputs and actions, see Advanced features on page 93. JANUS Access Control 79 Version 1.0

Communications hardware Setting up the communications hardware When setting up system hardware, you may need to configure the following: The Comms Lines that connect the controllers to the main computer. (IDCe and IPCe boxes do not need comms lines as they connect directly via a LAN or WAN). Some legacy systems may use dial-up communications, which require you to use a dial-up Modem and a Remote Line Controller. Setting up a comms line The main JANUS PC/server communicates with system controllers using various methods of connectivity. For smaller systems, the hard-wired or local comms port connection is most commonly used via one of the USB or RS232 serial ports. Multiple COM ports can be used and each is considered to be a separate JANUS comms line. Other comms line types include Network and Dial Up connectivity, or TCP/IP connectivity directly onto an eseries controller. A JANUS comms line can have up to 32 x RS485 controllers connected which can be either Intelligent Door Controllers (IDCs) or Intelligent Peripheral Controllers (IPCs). JANUS comms lines ultimately connect to the main PC/server with up to 8 comms lines being supported if directly hard-wired. There is no limit to the number of TCP/IP (Ethernet converters) that can be used. To configure a JANUS comms line 1. In the Database Update Program, choose Open > Hardware > Comms Line from the menu. 2. Click the New button. The text at the bottom left of the record changes from Enter Record Name to New Record. JANUS Access Control 80 Version 1.0

Note: Normally, fields in the comms line record become available or remain greyed out depending upon choices made. For example the Telephone Number field only becomes available if Local Modem is selected as the Line Type. For clarity, the record shown here has all fields shown without being greyed out. 3. Enter data in the fields as described below. Line name Enter a name for the comms line. A widely used naming convention is: When eseries controllers are installed, the comms line is named by Building Name-IP Address, e.g. Tower A-169.254.117.220 When RS485 controllers are installed, the comms line is named by Building Name-Line No, e.g. Tower A-Line 01. Port 1 Com N Speed Choose the appropriate Line Type: Local Comms Port, Network Comms Port, Local Modem, Ethernet Comms Server or eseries. If you choose Network Comms Port, Ethernet Comms Server or eseries you will need to enter the TCP/IP Host Name or the IP address in the field provided. Refer to your Network Administrator or the system installer if necessary. If you choose Local Modem, you must enter the Telephone Number of the remote modem and an Outgoing Group Number between 1 and 9 to determine which modem(s) to try when connecting. The COM Port number of the main PC/server to which this comms line is attached; for example 2 for COM Port 2. Select the baud rate at which you want this comms line to operate. This setting must be matched on every controller on this comms line by setting the appropriate dip switches on the controller boards. See the data sheet supplied with each controller for more information. JANUS Access Control 81 Version 1.0

Note: Comms lines are normally configured with only one connection point at the head of the line but they can be configured with up to three connections per comms line to offer superior system resilience in the event of comms routing failures. If a controller cannot be contacted through the primary route (because of a fault), another route can automatically be initiated by the system. Follow the steps above for Port 2 and Port 3 if required. 4. Click the Save/F10 button to save the new record and activate it immediately. Setting up a remote line controller If the system is to use dial up comms lines, the controllers at the remote site will be controlled by a remote line controller (RLC) while the line is disconnected. Note: This is used in legacy systems only; this hardware has been discontinued. To configure a Remote Line Controller 1. In the Database Update Program, choose Open > Hardware > Remote Line Controller. 2. Click the New button. The text at the bottom left of the record will change from Enter Record Name to New Record. 3. Enter data in the fields described below. Line name The name of the comms line. Because this field is green, use the Choices/F2 button to choose a line name that has already been configured or to configure a new comms line on the fly. Telephone number The telephone number that the RLC will dial to connect to the incoming modem on the main PC/server. JANUS Access Control 82 Version 1.0

Trigger dialup group Reporting category If communications to the main PC/server are to be initiated by an event or alarm at the remote site, click on the Choices/F2 button and select an output group that when triggered will initiate the dial up. Usually a critical alarm at the remote site will be set up to cause a system action to trigger the output group, causing the dial up to commence. Click on the Choices button to choose a reporting category that defines the event reporting from this RLC or to configure a new reporting category on the fly. You can also define a new reporting category by selecting Open > Hardware > Box > Reporting. 4. Click Save/F10 to save the record. Repeat these steps for each remote line controller to be configured. Setting up a modem If the system is to use dial-up communications (legacy systems only), the associated modems must be defined. To configure a modem 1. In the Database Update program, choose Open > Hardware > Modem. 2. Click the New button. The text at the bottom left of the record will change from Enter Record Name to New Record. 3. Enter data in the fields described below. Modem name The name of the modem, for example Modem 01 Port Com'N' The number of the main PC/server s COM Port (serial port) to which this modem is attached. JANUS Access Control 83 Version 1.0

Port Speed Group Numbers I/C Group Numbers O/G The baud rate at which the modem will communicate with the main PC/server - dependent upon the capability of the modem. The baud rate speed should not be confused with the JANUS communications speed to the controllers on this line. When a remote line controller (RLC) dials back to the main PC/server and there is a pool of modems associated with the number dialled, i.e. a hunting group, all of the modems must belong to the same incoming group number. Enter 1 in this field. If the modem does not belong to a hunting group enter 0. When the main PC/server dials a remote modem, if there is a pool of modems available for the PC to use, all of the modems must belong to the same outgoing group. Enter a number between 1 and 9 in this field to specify the outgoing group to which this modem belongs. If you wish to prevent a modem being used for outgoing calls so that it is always available for incoming calls, enter 0. 4. Click Save/F10 to save the record. Repeat these steps for each modem to be configured. Controllers, doors and readers When setting up system hardware, you may need to configure the following: The controllers or boxes the IDCs and IPCs within the system. The doors that can be controlled by the access control system. The readers that control access to an adjacent door. Setting up a controller You need to configure the controllers (IDCs and IPCs) in your system. In the JANUS Database program, these are known as boxes. To configure a system box/controller 1. In the Database Update Program, choose Open > Hardware > Box > Config from the menu. 2. Click the New button. The text at the bottom left of the record changes from Enter Record Name to New Record. JANUS Access Control 84 Version 1.0

3. Enter data in the fields as described below: Box name Enter any text that will identify the controller/box to the system operators. A recommended naming convention is Building Name-Level-Location-Enclosure ID. For example, where the controller/box will be installed in Tower A, Floor 08, in the Electrical Riser, Enclosure No. 1 its name could be TA- F08-ERISER-01. Address Line name Box type Poll box The address is an identification number that identifies the controller/box to the system. The number you enter here has to be set on the controller/box board itself. The default values are 1-63 for IDC-485 controllers and 1 for IDCe controllers. The name of the comms line on which the controller/box resides. Click the Choices/F2 button to display available records. If necessary, move up and down the list using the scroll bar and highlight your choice by clicking on it. Select whether the controller/box is an IDC or IPC by clicking on the appropriate radio button. This must correspond to the controller/box type fitted at the address specified in the Address field. Select the Poll Box checkbox if you want the controller/box to be polled by the system. Use this feature to pre-define the system software before the hardware is installed. If the Poll Box checkbox is not selected, off-line alarms will be inhibited making the commissioning process easier to manage. JANUS Access Control 85 Version 1.0

Box reporting category Physical location Click the Choices/F2 button to choose a box reporting category that defines the event reporting from this controller/box or to configure a new reporting category onthe-fly. You can also define a new reporting category by clicking on the pull-down menu Open > Hardware > Box > Reporting. For details, see Setting up controller event reporting on page 102. Specify where this controller is physically located. This will help future maintenance engineers to find it. 4. Click Save/F10 for the record to be saved and activated immediately. Setting up a door You need to configure the doors that can be controlled by the access control system. To configure a door 1. In the Database Update Program, click the Door button or choose Open > Hardware > Door > Config. 2. Click the New button. The text at the bottom left of the record will change from Enter Record Name to New Record. 3. Enter data in the fields described below. JANUS Access Control 86 Version 1.0

Door name Box name Sub-addr Unlock period Max. open Sensr. abn. reminder Door sensor Switch used for exit Two readers Inter-locked Enter any text that will identify the door to the system operators. A recommended naming convention is by Building Name-Level-Location, e.g. where the door is located in Tower A, Floor 08, Electrical Riser Cupboard, the name would be Tower A-08-Elect Riser Click the Choices/F2 button and select the box/controller that will be controlling this door. The sub-address is either 1 or 2, depending upon which set of terminations is being used at the controller for this door. The length of time that the relay controlling the door lock will activate when access is granted. If left blank, the default time is 5 seconds. See Entering data in fields on page24 for details of entering times. The length of time that the door sensor can be open before the door is deemed to be wedged open. If left blank, the default is 30 seconds. See Entering data in fields on page24 for details of entering times. If the door sensor is in an active state for longer than the length of time you type here, a reminder will be displayed. The sensor may be faulty. Enter Cont in this field (for Continuous) if you never want a reminder. See Entering data in fields on page24 for details of entering times. If a door sensor is connected to monitor whether the door is open or closed then select this checkbox. If a door egress button is installed, select this checkbox. If this checkbox is cleared, it will not prevent the egress switch from working, it will however, inhibit door forced alarms but retain door wedged alarms. Thus enabling the use of a handle for egress purposes whilst still allowing the use of an egress switch if required. If this door has two readers controlling it, one in and one out, select this checkbox. If the two doors on the same box/controller are never to be unlocked at the same time by valid cards, select this checkbox. JANUS Access Control 87 Version 1.0

Re-lock when opened Monitored Indicate forced Indicate wedged Indicate invalid card Indicate valid card If you wish the lock to re-lock when the door sensor detects that the door has opened, select this checkbox. This can prevent the door bouncing open if the door closer is too strong. If the lock is a magnetic type and the door sensor is the type that detects the completion of the magnetic circuit, do not select this option or the door will not unlock. If the door sensor is wired with line monitoring/supervising resistors, select this checkbox. Select this checkbox to operate a local alarm sounder if the door sensor says that the door has been opened without either a valid card read or the exit button being pressed. Select this checkbox to operate a local alarm sounder if the door sensor remains open after a valid card read for more than the length of time specified in the Max. Open field. Select this checkbox to operate a local alarm sounder if an attempt is made to use a card that does not have permission for this door. Select this checkbox to operate a local alarm sounder whenever a valid card is used at this door. Note: The Sounder Forced/Wedged Period is a special field which is normally hidden from view. To view this field, press ALT-F5. It is only applicable for controllers with firmware dated prior to January 1996. For later firmware this parameter is controlled from the reader configuration. This value specifies how long the local alarm sounder will operate when a door is forced or wedged. The default is 10 seconds. Lock O/P group Door reporting category Click the Choices/F2 button and select the output group to which you wish this lock to belong. (Whenever this output group becomes active, the lock will unlock. As used with fire alarms, etc.) Click the Choices/F2 button and select the name of the reporting category that defines the events and messages that you want from this door. The fields in the door reporting category record are described in Setting up door event reporting on page 104 4. Click Save/F10 to save the record. Repeat these steps for each door to be configured. JANUS Access Control 88 Version 1.0

Setting up a reader A reader is a device that controls access to an adjacent door. Readers come in a variety of types: swipe cards, contactless proximity, biometric, PIN based, etc. (They are often known as card readers even if cards are not used.) Two readers can be attached to a door, one in and one out. To configure a reader 1. In the Database Update Program, click the Reader button or choose Open > Hardware > Reader > Config. 2. Click the New button. The text at the bottom left of the record will change from Enter Record Name to New Record. 3. Enter data in the fields described below. Reader name Enter any text that will identify this reader to the system operators (usually the same as the door name). A recommended naming convention is by Building Name- Level-Location, e.g. where the reader is located in Tower A, Floor 08, Electrical Riser Cupboard it could be named TA-08-ERiser. Box name Sub-addr Click the Choices/F2 button and select the box/controller that will be controlling this reader. The sub-address is either 1 or 2, depending upon which set of terminations is being used at the controller for this reader. JANUS Access Control 89 Version 1.0

Rdr group 2nd Rdr Grp Escort Reader Click the Choices/F2 button and select the Reader Group to which this reader belongs. Each reader belongs to a reader group which is normally given the name of the area to which the reader controls access for example, Car Park, Accounts Office, Sales Office, Store, etc. All readers in the same reader group will have the same access authorities. This field is used for high security doors where two cardholders must be valid at the reader before the door will unlock. This is often referred to as a Dual Read. When a card that has permission for the first reader group is read, the LED turns green for ten seconds without unlocking the door. During this time a card that has permission for the second reader group must be read before the door will unlock. The second reader group can be the same as the first but the door will only unlock if two different cards with permission for that reader group are used. Leave the field blank if the door is to unlock with one card. Select this checkbox if you want this reader to be an escort reader. If a card that has been marked as an escorted card is seen at a nominated escort reader, it will also require a host card (a valid card for the reader s 2nd reader group) to be shown. If not, the door will not unlock. If anti-passback is being used, both cards will be put into the area when the valid host card is shown at the reader. Note: Any card that is valid for the reader s Second Reader Group can act as the host card. 2nd Read Only Authorises When this checkbox is selected, the host card only authorises the escort card and does not put the host card into the area when using anti-passback. This can be used with turnstiles where the host card wants to authorise and allow an escort card to pass through the turnstile. The host has to then show their card again to pass through the turnstile in the normal way. Note: Another use for 2nd Read Only Authorises is when a guard is posted at a door. The guard can authorise escorted cards without being logged as going through the door himself. Reader type Click the Choices/F2 button and select the Reader Type for this reader. The list gives a choice for various manufacturers and technologies. JANUS Access Control 90 Version 1.0

Reader on Enter/Vrfy out Exit/Vrfy in Verification Reader Invalid LED/Sounder on periods PIN Keypad and time-out When active Select Door 1 or Door 2 to define which door will be controlled by this reader. For anti-passback, both readers on the same controller will control the same door. If this reader controls entry to an anti-passback area, click the Choices/F2 button and select the appropriate anti-passback area. If this reader controls exit from an anti-passback area, click the Choices/F2 button and select the appropriate anti-passback area. If this reader is physically situated inside an antipassback area and is not an exit reader this setting can provide additional security for this reader. Select the Verification Reader checkbox. In the Exit/Vrfy In field use the Choices/F2 button to select the anti-passback area in which this reader is located. When a card is used at this reader the system will check that it has previously been used to enter the anti-passback area and will refuse access (generating an anti-passback event) if the card is not registered as being in the area. This prevents a cardholder who has gained access to an area by tailgating from using their card at another reader within the area. You can also set the Verification Reader in combination with the Enter/Vrfy Out setting to verify that a user is outside an area. There are four fields here referring to Door Forced, Door Wedged, Invalid Card and Valid Card. They are only applicable if the corresponding checkbox has been ticked in the configuration for the door that this reader controls. For each field, enter the length of time you wish the LED/sounder to operate. If you leave a field blank, the default time settings will apply. The default settings are 10 seconds for Door Forced and Door Wedged, 2 seconds for Invalid Card and 1 second for Valid Card. Select the Used checkbox if this door has a PIN keypad fitted. In the Time-Out Period field enter the length of time that the system should allow for a valid PIN to be entered. Select this checkbox to operate a local alarm sounder if an attempt is made to use a card that does not have permission for this door. JANUS Access Control 91 Version 1.0

Rpt category Click the Choices/F2 button and select the name of the Reporting Category that defines the events and messages that you want from this reader. The fields in the Reader Reporting Category record are described in Setting up reader event reporting on page 106. 4. Click Save/F10 to save the record. Repeat these steps for each reader to be configured. Setting up a reader group A reader group is the name allocated to a reader or group of readers to describe the regions to which they control access. For example: Car Park Main Door Works Office Readers in the same group will have the same access authorities. Individual reader groups can be restricted to nominated administrators. By default all authorised administrators can allocate any reader group in the access rights table to make an access group. To configure a Reader Group 1. In the Database Update Program, choose Open > Reader Groups. 2. Click the New button. The text at the bottom left of the record will change from Enter Record Name to New Record. 3. Type in a suitable name for the Reader group, such as Car Park. 4. Click Save/F10 to save and close the record. To restrict Reader Groups to specified user IDs 1. Choose Open > Reader Groups. JANUS Access Control 92 Version 1.0

2. Click the Choices/F2 button and select the Reader Group that you wish to edit/restrict, for example Car Park. 3. Click the Assign User IDs button. Note: This button will only be visible if you have permission to assign this reader group. 4. The Assign window will open with a list of available user IDs in the right hand panel. Select the user IDs that are to be allowed to use this reader group when configuring the access rights Table. Click the arrow between the panels to move them to the left hand panel. Warning: Make sure that you move your own User ID to the left hand panel or else you will not be allowed back in to re-edit. In order to implement reader group restrictions properly, only the main system administrator should be allowed to edit the reader group field in the reader record. 5. Click OK to save and close the record. Advanced features This section describes how to set up some of the advanced features of the JANUS access control system: Configuring the anti-passback feature which tracks whether a card is inside or outside a secure area and apply system rules if a violation occurs. Setting up the devices that provide inputs to the system, such as fire alarm sensors or passive infrared detectors. Configuring the outputs that trigger device such as a lighting system or an alarm. Setting up actions, which link specific inputs to outputs. Configuring how system events are to be reported. Setting up anti-passback Passback violation, sometimes known as tailgating, is when one or more additional people follow a legitimate cardholder into an area without using their cards. Antipassback can be implemented to track whether a card is inside or outside a secure area and apply system rules if a violation occurs. To implement anti-passback, readers must be installed at each entrance to the controlled area. To set up anti-passback 1. In the Database Update Program, choose Open > Anti-Passback. 2. Click the New button. The text at the bottom left of the record will change from Enter Record Name to New Record. JANUS Access Control 93 Version 1.0

3. Enter data in the fields described below: APB area name Enter any text that will identify the anti-passback area to the system operators. Forgiveness (HH:MM) Time out-period (HH:MM) This value is used to clear all cards from an antipassback area at a specific time of each day. At the specified time, any card present within an anti-passback area is removed and deemed to be of UNKNOWN whereabouts by the system. The next use of a card at any reader associated with the anti-passback area will place it back into the correct side of the anti-passback area. When a card enters into an anti-passback area it will be removed and deemed to be of UNKNOWN whereabouts by the system after the Time out period has passed. For example, a value of 00:01 would cause a card to be returned to the UNKNOWN state one minute after entering the area. JANUS Access Control 94 Version 1.0

Non enforced APB Local to one IDC Non enforced when IDC off-line Print List Of People In Area... Make All Unknown... Operate This Output Group... Minimum Maximum When this checkbox is selected, the anti-passback state for this area is monitored. In this case, cards can be IN, OUT, or UNKNOWN, but the normal anti-passback rules are not enforced so that cards will be allowed access to the area even if they have violated the anti-passback rules. When this checkbox is selected, the anti-passback status will only be held in the one IDC. This is used if there is only one door into an area and the In and Out reader are on the same IDC. In this case other IDCs do not need to know the real-time APB status of this area, which saves system Comms traffic. When this checkbox is selected, anti-passback will not be enforced by an IDC if it cannot communicate with the main PC/server. When the IDC comes back on-line, its APB status is automatically updated. If you leave this box cleared, the IDC will apply anti-passback rules as per the system settings. If you specify an output group in this field, the names of cardholders deemed to be in the anti-passback area will be printed if the output group becomes active. This is used, for example, if a fire panel activates an input which in turn triggers this output group. If you specify an output group in this field, the antipassback status of all cards will be made unknown when this output group becomes active. If the anti-passback status of a card is unknown it will be allowed to pass in either direction without failing the normal anti-passback rules. Once a card has been used whilst in the unknown state it is automatically entered into the correct side of the anti-passback area concerned. If you specify an output group in this field, the output group will become active whenever people are in the anti-passback area. Specify the minimum number of people that are permitted in this anti-passback area. Leave it blank if there is no minimum. Specify the maximum number of people that are permitted in this anti-passback area. Leave it blank if there is no maximum. Choose or define a suitable reporting group for each of the fields described below: JANUS Access Control 95 Version 1.0

Number OK Number too few Number too many Single person false Single person true Occupied false Occupied true Select Printer Reports if the number of cardholders in the antipassback area is OK (based on the Minimum and Maximum fields). The default Reporting Destination would be Area - Number OK. Reports if the number of cardholders in the antipassback area is too few (based on the Minimum field). The default Reporting Destination would be Area - Too Few. Reports if the number of cardholders in the antipassback area is too few (based on the Maximum field). The default Reporting Destination would be Area - Number Too Many. Reports if a Single Person condition has been rectified. The default Reporting Destination would be Area - Single Person False. Reports if there is a single person is in this anti-passback area. The default Reporting Destination would be Area - Single Person True. Reports when the last cardholder leaves this antipassback area. The default Reporting Destination would be Area - Occupied False. Reports when the first cardholder enters this antipassback area. The default Reporting Destination would be Area - Occupied True. Click the Select Printer button to determine and set up the anti-passback printer. This will be used for muster reports as described in the Print List Of People In Area... field. 3. Click Save/F10 to save and close the record. Setting up an input You need to set up all input devices on the system such as external contacts and passive infrared detectors (PIRs). An IDC/IDCe provides 6 inputs that can be used for any type of input functionality on the system. An IPC/IPCe can provide up to 16 inputs. To set up an input 1. In the Database Update Program, choose Open > Hardware > Input > Config. JANUS Access Control 96 Version 1.0

2. Click the New button. The text at the bottom left of the record will change from Enter Record Name to New Record. 3. Enter data in the fields as described below. Input name Box name Sub-addr Input group Enter any text that will identify the input to the system operators. Click the Choices/F2 button and select the box/controller that will be controlling this input. The sub-address is the input number, 1-6 on an IDC or 1-16 on an IPC. Click the Choices/F2 button and select the input group to which this input belongs. If in view, highlight your choice by clicking on it. If necessary, move up and down the list using the scroll bar. JANUS Access Control 97 Version 1.0

Input type Click the Choices/F2 button and select the input type. The choices available are: Normal for a normal input switch or dry contact. Output pulse when triggered this triggers the equivalent output on the same board for a 1 second pulse. For example, when input 5 is activated, output 5 on the same controller would be pulsed for 1 second. PIR detector This type is used primarily for passive infrared detectors and is used to prevent or dampen multiple alarms occurring for the same event. This input type will only report once every 30 seconds after the initial alarm has been detected (see Aux 1 Period parameter below). Note: If a PIR detector input remains in the active state for more than one minute it will be reported as a faulty sensor (see Aux 2 Period parameter below). Sense period Aux 1 period Aux 2 period Normally open Monitored Input reporting category Activate description Enter the length of time to wait after an input becomes active before generating an alarm. For PIR detectors, this is the length of time that the input will be inhibited after an initial alarm. The default time is 30 seconds. For PIR detectors, if a PIR remains in the active state for the length of time entered here, it will be deemed to be faulty. The default time is 1 minute. Select this checkbox if the input will be open while in its normal state and closed in the active state. Leave this unchecked if the contact is closed in its normal state and open in its active state. Select this checkbox if the contact is wired with endof-line resistors to monitor for circuit tamper and fault. Click the Choices/F2 button and select the name of the input reporting category that defines the event reporting required with this input or configure a new reporting category on the fly. You can also define a new reporting category by clicking on the pull-down menu Open > Hardware > Input > Reporting. For details, see Setting up input event reporting on page 107. Information entered here is reported when this input is activated. JANUS Access Control 98 Version 1.0

Reset description Information entered here is reported when this input is reset. 4. Click Save/F10 to save the record. Repeat these steps for each input to be configured. Setting up an output You need to set up all output devices that can be activated in order to trigger a device such as a lighting system or an alarm. An IDC provides 4 relay outputs that can be used for any type of functionality on the system. An IPC can be used to provide 16 relay outputs. To set up an output 1. In the Database Update Program, choose Open > Hardware > Output > Config. 2. Click the New button. The text at the bottom left of the record will change from Enter Record Name to New Record. 3. Enter data in the fields as described below. Output name Enter any text that will identify the output to the system operators. Box name Sub-addr Output group Click the Choices/F2 button and select the box/controller that will be controlling this output. The sub address is the output number, 1-6 on an IDC or 1-16 on an IPC. Click the Choices/F2 button and select the Output Group to which this output belongs. If in view, highlight your choice by clicking on it. If necessary, move up and down the list using the scroll bar. JANUS Access Control 99 Version 1.0

Pulse length The length of time that this individual output will trigger when pulsed by the system or manually. 4. Click Save/F10 to save the record. Repeat these steps for each output to be configured. Setting up actions An action is a link between an input and output. When an input activates it can trigger a group of outputs to change state. To set up an action 1. In the Database Update Program, choose Open > Actions. 2. Click the New button. The text at the bottom left of the record will change from Enter Record Name to New Record. 3. Enter data in the fields as described below. Action name Enter text that will identify the action to the system operators. Input group Mode Time period Click the Choices/F2 button and select the input group which when active, will trigger this action. If this field is left blank, the action will be triggered by the time zone specified in the time period field. Click the Choices/F2 button and select a mode status. This action can only be triggered when this mode is active on the system. Click the Choices/F2 button and select a time zone. This action can only be triggered during the times specified in this time zone. JANUS Access Control 100 Version 1.0

Preset period for output Select this checkbox if you want each output in the output group to be switched for the length of time specified in its Pulse Length field. (See Setting up an output on page 99.) As above but cancel if input resets Output follows input Output group Select this checkbox if you want each output in the output group to be switched for the length of time specified in its Pulse Length field, or when the input group ceases to be active, whichever is soonest. Select this checkbox if you want each output in the output group to be switched while the input group is active, and off while the input group is inactive. If the action record does not specify an input group then the output will follow the time zone specified in the time period field. Click the Choices/F2 button and select the output group that this action will trigger. This can be a Lock output group. 4. Click Save/F10 to save the record. Repeat these steps for each action to be configured. Reporting and routing of system events When system events occur in JANUS, information can be sent to various destinations: the Report/Guard screen, a history file, a printer, an email, an SMS or any combination of these devices. Note: The output of events to email or SMS may need additional software. System controllers the IDCs and IPCs attached to the system report information to the main PC/server. For example a controller may report that the mains power has failed or that a door connected to it is wedged open. The main PC/server needs to know what to do with this information and what priority to allocate to it. This is done by a predefined set of rules known by the system as a reporting category. Every controller, door, reader and input is allocated a reporting category. System defaults include Normal Box Reporting, Normal Door Reporting, Normal Reader Reporting and Normal Input Reporting. These are typical for most systems but you can set up others to suit your needs. Each of these hardware elements (box, door, reader and input), has a range of conditions that when triggered, pass details to the main PC/server. For example, input conditions can be Activated, Reset, Circuit Fault, Circuit Fault Clear, Tamper and Tamper Reset. Any change in these conditions may need to be reported to several devices. For example an Input Activated condition may need to be sent to the Report/Guard Screen and a History file. JANUS Access Control 101 Version 1.0

Reporting Groups Within the relevant reporting category, each condition is assigned a suitable reporting group. A reporting group can inform multiple device destinations when a condition changes. For example, for input reporting there is a reporting group called Normal Input Reporting. If the input is Activated, the reporting group called Input Activated will be applied. All reporting categories are constructed in the same way. Reporting Destinations Reporting groups are defined in the reporting destinations record which is on the menu Open > Reporting > Destinations. For each device destination a separate Reporting Destination record must be completed. In the two examples shown below, the first defines that the reporting group Input Activated goes to Screen 1 with an event priority of 5. The second record shows that the same reporting group of Input Activated will go to the History File with a priority of 99. If the Mode and Time zone fields are left blank, the reporting destination for each instance will trigger at all times and during all mode settings. Setting up controller event reporting Events that occur at a box/controller can be sent to various destinations: the Report/Guard screen, a history file, a printer, an email, an SMS or any combination of these devices. This is controlled by the Box Reporting rules. It is possible to have different reporting rules per box/controller although it is sensible, for system administration reasons, to use the same box reporting category wherever possible. See Reporting and routing of system events on page 101 for more information. JANUS Access Control 102 Version 1.0

To configure box reporting 1. Choose Open > Hardware > Box > Reporting from the menu. 2. Click the New button. The text at the bottom left of the record changes from Enter Record Name to New Record. 3. Enter data in the fields as described below. Apart from the Box Reporting Category name, all data can be entered into this record with the Choices/F2 button. Box reporting cat Enter a name that will identify the Box Reporting Category to the system administrator. For example, High Security Box Reporting. Choose or define a suitable Reporting Group for each of the types of event described below. Mains power on Mains power off Box opened Mains power has been restored after a period of being without power. Mains power has been disconnected (the system is running on battery). Lid of box has been opened. Box closed Box off-line Box startup Error information Flash information Lock power fault Lid of box has been closed. Box has lost communications from JANUS Comms. Box has been switched on and is initiating. Manufacturer s use only. Manufacturer s use only. Power to locks has been lost. JANUS Access Control 103 Version 1.0

Lock power OK Ext power shutdown Ext power restored Ext 5 volts low Ext 5 volts good Power to locks has been restored after a period of being without lock power. Power being provided from the box to external equipment (readers, locks, etc.) has been shut down because of a mains failure and subsequent battery depletion. Power being supplied from the box to external equipment (readers, locks, etc.) has now been restored. A fault condition has caused the power being provided from the box to external equipment (readers, locks, etc.) to go low. The fault condition on power being supplied from the box to external equipment (readers, locks etc.) has now cleared. Note: The external power supplied from the box to readers and locks etc. is nominated as being 5v. However, this condition monitors the 12v rail as well. 4. Click the Save/F10 button to save the record. It is activated immediately. Setting up door event reporting Events that occur at a door can be sent to various destinations: the Report/Guard screen, a history file, a printer, an email, an SMS or any combination of these devices. This is done by a predefined set of rules known as door reporting. It is possible to have different reporting rules per door although it is sensible, for system administration reasons, to use the same door reporting category wherever possible. See Reporting and routing of system events on page 101 for more information. To configure door reporting 1. Choose Open > Hardware > Door > Reporting from the menu. 2. Click the New button. The text at the bottom left of the record changes from Enter Record Name to New Record. JANUS Access Control 104 Version 1.0

3. Enter data in the fields as described below. Apart from the Door reporting category name, all data entered into this record is done with the Choices/F2 button. Door reporting category Enter a name that will identify the box reporting category to the system administrator. For example, High Security Door Reporting. Choose or define a suitable reporting group for each of the types of event described below: Wedged door Forced door Closed door Switch pressed Suspect door bug Door unlocked Door locked Sensor fault This event occurs when the door has been held open for longer than the length of time specified in the Max Open Time field of the door record. This event occurs if the door opens without first being unlocked by the system. This event occurs when the door closes (i.e. resets) after being forced or wedged open. This event occurs when the door egress switch is pressed. This event occurs when a valid card read or egress switch is pressed but the door is not opened. The system does not see the contact change state so assumes that the sensor/switch may be faulty. This event occurs when the lock is unlocked. This event occurs when the lock is secured after a period of being unlocked. If a door sensor continues to be in the open condition it may be that the door is wedged or that the sensor is faulty. This reporting group can be used as a reminder of the condition in addition to the Door Wedged condition. JANUS Access Control 105 Version 1.0

Sensor flt clr The Sensor Fault Clear condition occurs when a door sensor returns to normal after being in the Sensor Fault condition. 4. Click the Save/F10 button to save the record. It is activated immediately. Setting up reader event reporting Events that occur at a reader can be sent to various destinations: the Report/Guard screen, a history file, a printer, an email, an SMS or any combination of these devices. This is done by a pre-defined set of rules known as reader reporting. It is possible to have different Reporting Rules per reader on the system although it is sensible, for system administration reasons, to use the same reader reporting category wherever possible. See Reporting and routing of system events on page 101 for more information. To configure reader reporting 1. Choose Open > Hardware > Reader > Reporting from the menu. 2. Click the New button. The text at the bottom left of the record changes from Enter Record Name to New Record. 3. Enter data in the fields as described below. Apart from the Reader Reporting Category name, all data entered into this record is done with the Choices/F2 button. Reader reporting category Enter a name that will identify the Reader Reporting Category to the system administrator. For example, High Security Reader Reporting. JANUS Access Control 106 Version 1.0

Choose or define a suitable reporting group for each of the types of event described below: Access allowed No authority Wrong time Wrong mode Wrong PIN Card not valid Anti-passback Duress PIN No access group No reader group Dual read failure A valid card read (with PIN if enabled). Access is denied because the card is not authorised for the reader group to which this reader belongs. Access is denied because the card is not valid for the current time - as defined by the time zone. Access is denied because the card is not valid for any of the currently active system modes. Access is denied because of an incorrect PIN or no PIN has been entered. Access is denied because the word Valid does not appear in the card status field of the card record. Access is denied because of an anti-passback violation. The duress PIN has been entered. Access will be granted but the cardholder requires assistance. A card has been read that does not have permission for the readers connected to the box. A card has been read before sufficient data has been downloaded to the box. Where the reader has been configured for dual read and a second card has not been read within ten seconds of the first. The event reported will be 2nd Reader Timeout. 4. Click the Save/F10 button to save the record. It is activated immediately. Setting up input event reporting Events that occur at an input can be sent to various destinations: the Report/Guard screen, a history file, a printer, an email, an SMS or any combination of these devices. This is done by a predefined set of rules known as Input Reporting. It is possible to have different reporting rules per door although it is sensible, for system administration reasons, to use the same input reporting category wherever possible. See Reporting and routing of system events on page 101 for more information. To configure input reporting 1. Choose Open > Hardware > Door > Reporting from the menu. 2. Click the New button. The text at the bottom left of the record changes from Enter Record Name to New Record. JANUS Access Control 107 Version 1.0

3. Enter data in the fields as described below. Apart from the Input Reporting Category name, all data entered into this record is done with the Choices/F2 button. Input reporting cat Enter a name that will identify the input reporting category to the system administrator. For example, Fire Alarm Reporting. Choose or define a suitable reporting group for each of the types of event described below: Activated Reset Circuit fault Circuit fault clear Tamper Tamper reset This event occurs when the input goes active. This event occurs when the input is cleared. This event occurs when the input has gone open or short circuit. This event occurs when the input fault has been cleared. This event occurs when the circuit is being tampered with. This event occurs when the tamper condition has been cleared. 4. Click the Save/F10 button to save the record. It is activated immediately. JANUS Access Control 108 Version 1.0

Glossary A Access control Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles in, out and around a building or site. Access group Action AES A group of cardholders who all have access to the same reader groups at the same times. An action is a link between an input and an output. When an input activates it can trigger a group of outputs to change state. Advanced Encryption Standard, a world-wide standard for advanced data encryption, based on the Rijndael algorithm. Anti-passback APB Archive Passback violation, sometimes known as tailgating, is when one or more additional people follow a legitimate cardholder into an area without using their cards. Antipassback can be implemented to track whether a card is inside or outside a secure area and apply system rules if a violation occurs. To implement full anti-passback, in and out readers must be installed at each entrance to the controlled area. See Anti-passback. Storing data elsewhere in a form which allows its subsequent retrieval. The JANUS Archive application is used to archive system history and operator activity information, and to back up the system configuration files. JANUS Access Control 109 Version 1.0

B Backup Box C Card The process of copying data while leaving the original untouched. The backup copy is stored elsewhere to allow data to be restored from the backup if necessary. See Controller. This term is used to cover a variety of devices which contain an encoded number as an identifier. A card is allocated to a cardholder within the JANUS system. When a card is presented to a reader will grant the cardholder access through the door depending on which access rights are assigned to the cardholder. Card access rights Card ID A record that links the access group, the reader groups and the time zones. Defines which doors each group is allowed through and what times. The number that is printed or stamped on a card to physically identify it. This is usually different from the Card Number which is internally coded in the card. Card number The number that is internally coded in the access control card. Each card in the system must have a unique number. Card reader See Reader. Cardholder An individual defined within a JANUS system who is assigned to a card group which confers access rights. Choices button Comms When your cursor is a green-coloured field, clicking on the Choices button (F2) displays a list of available options for that field for you to choose from. Comms is short for communications. JANUS Comms is the main program within JANUS. It runs continually in the background enabling the various software components to communicate. Comms Line The Comms Line connects a controller to the PC/Server. A Comms Line need only defined if 485 IDCs/IPCs are used; if eseries controllers are installed they are connected directly to the network. Up to 8 Comms lines are supported if directly hard-wired. JANUS Access Control 110 Version 1.0

Controller D The device that manages access (sometimes known as a Box). A controller is either a type of IDC (Intelligent Door Controller)or a type of IPC (Intelligent Peripheral Controller). All access decisions are made by the controller. Database The permanent store of information for your access control system, consisting of tables and records. The database is edited and viewed using the Database Update program. Database Update Program Door This application is used to add, edit and delete system information. It sends data to the Comms application so that the system hardware can be updated. In the hardware hierarchy, a Door is attached to an IDC. Each controller can control one or two doors. Duress PIN E eseries The duress PIN is a special PIN which cardholders can use if they are threatened by an intruder. Access will be granted but the use of the duress PIN indicates that the cardholder needs assistance. Ethernet-ready controllers: IDCe or IPCe controllers. eseries controllers do not require a Comms Line Header because they connect directly to the network. Every eseries controller has its own IP address. Escort reader Event An escort reader is used to ensure that certain cardholders are accompanied by an escort at certain readers. If a card has been marked as an escorted card, it will also require an additional card to be read in order to allow access when it is read at a nominated escort reader. This host card must be a valid card for the reader s 2nd reader group. An event in the access control system is either a combination of a monitored device (such as a specific door) and a reporting group associated with that device (such as Door Wedge), or a time trigger. The defined event is the trigger for an action. Event Relay An optional application within JANUS that allows users to set up actions based on defined events that happen within the access control system. These actions can include locking doors, notifying users by email or interfacing with external systems such as CCTV systems. JANUS Access Control 111 Version 1.0

F Field An individual item of information within a record, such as a name or a card number. Some fields (such as names or descriptions) contain text, some (such as the card numbers) contain numbers and others are merely switches to turn options on or off. Filter branch This is a group of filter conditions that are logically OR ed together. For example, you could have filter conditions of field name of Department, an operator of Has In It and a value of Sales field name of Department, an operator of Has In It and a value of Marketing This would produce a report where the Department was either Sales or Marketing. Filter condition H Filter conditions are used to restrict the data retrieved from the database when the report is run. A filter condition is made up of a field name, a filter operator and a value. For example a field name of Department, an operator of Has In It, and a value of Accounts. In this way, only the exact information required is shown in the final report. History data The history data is a log of all of the events that have happened in a JANUS system for any specific day. This information is contained in the JANUS History Database where it can be archived and used to run reports. Host card I IDC IDCe A host card is a additional card that needs to be read at a nominated escort reader, in addition to an escorted card. The host card must be a valid card for the reader s 2nd reader group. If a host card is not presented within a certain time period, the door will not unlock. Intelligent Door Controller: a type of controller (sometimes called a box) that manages access to doors in a JANUS system. Each controller can support up to 65000 cardholders (with memory expansion). Ethernet-ready Intelligent Door Controller: a type of IDC. Supports up to 65000 cards per controller (with memory expansion). Each board has a TCP/IP address and connects directly onto a LAN or WAN via the on-board RJ45 Ethernet adaptor. JANUS Access Control 112 Version 1.0

Input An input device, such as a fire alarm or a passive infrared detector. An IDC/IDCe provides 6 inputs that can be used for any type of input functionality on the system. An IPC/IPCe can provide 16 inputs. Input group IPC IPCe J Every input must belong to an input group. If any input becomes active, the input group of which it is a member becomes active. Intelligent Peripheral Controller: Provides a means of connecting any alarm, switch or relay function to the system. Supports up 16 alarm inputs and 16 outputs. Ethernet-ready Intelligent Peripheral Controller: a type of controller (sometimes called a box) that controls alarms, switches or relays. Supports up 16 alarm inputs and 16 outputs. Each board has a TCP/IP address and connects directly onto a LAN or WAN via the on-board RJ45 Ethernet adaptor. JANUS Comms M Mode O Output See Comms. A mode is a means of rapid changes to the way that JANUS operates without having to make substantial changes to the programming of individual cards, access rights, actions or time zones. For example you may wish to enable or disable alarm monitoring manually each day rather than having pre-defined set times You may also wish to enable a system mode that unlocks internal doors during normal working hours but disable the mode during holidays. Up to 8 system modes can be set. Any output that can be activated in order to trigger a device such as a lighting system or an alarm. An IDC provides 4 relay outputs that can be used for any type of functionality on the system. An IPC can be used to provide 16 relay outputs. Output group Every output must belong to an output group. If any output becomes active, the output group of which it is a member becomes active. An output group is triggered by an action. JANUS Access Control 113 Version 1.0

P Password PIN R Reader A security measure used to restrict access to the JANUS system and resources. This is a unique string of characters that must be provided before a User ID is authorised. Personal Identification Number, a secret identifying number that may be associated with a card. If PINs are used, the cardholder has to enter the PIN at a keypad associated with the reader. A card reader attached to a door. Up to two readers can be attached to a door. Can be one of a variety of readers including swipe cards, contactless proximity, biometric, PIN based, etc. Reader group Record Every reader belongs to a reader group which is normally given the name of the area to which the reader controls access for example, Car Park, Accounts Office, Sales Office, Stores. All readers in a reader group will have the same access permissions. A record represents a single, implicitly structured data item held in the database. Examples include Card records and Time zone record. A record is a collection of fields. System records are updated using the Database Update program. Remote line controller Report If a system uses dial up communications the controllers at the remote site will be controlled by a Remote Line Controller (RLC) while the line is disconnected. A report is a listing of information, either on screen, or on paper. The type of information displayed is dependent on the query used to interrogate either the JANUS History database, or the JANUS system database. Report Generator The Report Generator application is used to generate on-screen reports before committing them to print. Report/Guard Screen RLC This application is used to monitor system events in real-time and control and monitor system equipment. See Remote Line Controller. JANUS Access Control 114 Version 1.0

S Service A Windows executable which runs in the background and is designed not to require user intervention. System mode See Mode. System Report Definitions T The System Report Definitions are a set of report building blocks that are supplied when the Reporting system is installed. New report templates must be based on one of the existing System Report Definitions. Template A standardised example of the information that is required by the system. Time zone A time zone is a time pattern set out in a weekly format. Each day can have up to three on/off periods. Time zones are used with access groups to limit access to doors and also to automatically switch alarm monitoring on/off. Trigger event U User User ID W Wizard An event occurring somewhere within the access control system that triggers an action. A JANUS user is a person whose details are held on the system. A user should not to be confused with a system administrator, who could be considered the user of the system. A user is frequently a cardholder, but it is not a system requirement that a user holds an access card as you may wish to hold personal information about other people, such as ex-employees or contractors. This defines the logon level of a JANUS user and so determines the degree of access to the JANUS system resources. It is used in conjunction with a password. A wizard is sequence of dialogs that take you though the steps required to complete a task. JANUS Access Control 115 Version 1.0