network based security made easy - access specialties€¦ · for technical assistance or further...

95
Network Based Security Made Easy Installation & User’s Guide Technical Support: (651) 453-1483; Fax: 651-453-1338, http://www.access-specialties.com

Upload: others

Post on 05-Sep-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Network Based Security Made Easy

Installation & User’s Guide

Technical Support: (651) 453-1483; Fax: 651-453-1338, http://www.access-specialties.com

Page 2: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Table of Contents ©Copyright 2009 Access Specialties International, LLC................................................... 1

Software License Agreement.............................................................................................. 1

Technical Support ............................................................................................................... 1

Chapter 1 Welcome to FOCAL POINT.............................................................................. 2 Controlling Access ......................................................................................................... 2 Card Readers and Transactions...................................................................................... 2 Monitoring Activity ....................................................................................................... 2 Commands ..................................................................................................................... 3

Chapter 2 FOCAL POINT Requirements........................................................................... 3 Minimum PC Requirements for SQL Server Host ........................................................ 3 Minimum PC Requirements for Workstations............................................................... 3 Technical Experience..................................................................................................... 4

Chapter 3 System Components........................................................................................... 5 ASIDataServer ............................................................................................................... 5 Workstation.................................................................................................................... 5 SQL Server..................................................................................................................... 5

SQL Server Versions................................................................................................. 5 Installing SQL Server................................................................................................ 5 Scheduling Automatic Database Backups in SQL Server 2005 (Not possible in Express Version) ....................................................................................................... 6 Automatic Database Backups In SQL Server 2005 Express................................... 19

Chapter 4 Install FOCAL POINT..................................................................................... 27 Installation Options ...................................................................................................... 27

Stand-alone.............................................................................................................. 27 Networked ............................................................................................................... 27 Create & Access the File DSN................................................................................ 28

Chapter 5 Upgrade An Existing FOCAL POINT System ................................................ 30 Upgrade the Server Software ....................................................................................... 30 Upgrade the Database .................................................................................................. 31 Upgrade the Workstation Software.............................................................................. 31

Chapter 6 Start Using FOCAL POINT (Main Interface).................................................. 32 Log In To FOCAL POINT........................................................................................... 32 Interacting with FOCAL POINT ................................................................................. 33 Module Icons................................................................................................................ 33 Module Tool Bar .......................................................................................................... 34 Menus........................................................................................................................... 34

File............................................................................Error! Bookmark not defined. View ........................................................................................................................ 34 Help ..........................................................................Error! Bookmark not defined.

ii

Page 3: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Chapter 7 Time Zones....................................................................................................... 35 Add Time Zones........................................................................................................... 40 Edit Time Zones........................................................................................................... 40 Delete Time Zones ....................................................................................................... 41

Chapter 8 Access Point Center ......................................................................................... 42 Zones ............................................................................................................................ 42 Access Points ............................................................................................................... 42 Communication Protocols............................................................................................ 42

TCP/IP..................................................................................................................... 42 Access Point Overview ................................................................................................ 43 Areas ............................................................................................................................ 43 Define Access Points ................................................................................................... 43

Add an Access Point ............................................................................................... 43 Access Point Information ........................................................................................ 43 Connection .............................................................................................................. 44 Notes........................................................................................................................ 44 Advanced Settings................................................................................................... 44

Define Areas ................................................................................................................ 44

Chapter 9 Hardware Information ...................................................................................... 45

Chapter 10 Access Groups................................................................................................ 45 Access Group Definitions ............................................................................................ 45

Add Access Group Definitions ............................................................................... 45 Group Access Assignments ......................................................................................... 47 Elevator Assignments ...................................................Error! Bookmark not defined.

Chapter 11 Holidays ......................................................................................................... 49 Add Holiday Groups .................................................................................................... 49 Add Holidays ............................................................................................................... 50

Chapter 12 Cardholders .................................................................................................... 51 Define Custom Fields................................................................................................... 51

Create Custom Fields .............................................................................................. 52 Add Cardholders .......................................................................................................... 53 Badges .......................................................................................................................... 54

Access Assignments ................................................................................................ 54 Add Additional Badges ............................................Error! Bookmark not defined. Add Cardholder Images .......................................................................................... 56 Where Allowed ....................................................................................................... 56

Chapter 13 Alarms ............................................................................................................ 57 Define Alarm Types..................................................................................................... 57 Define Alarm Instructions............................................................................................ 58 Define Alarms .............................................................................................................. 58

Alarm Source........................................................................................................... 59 Alarm Info ............................................................................................................... 59 Time Zones.............................................................................................................. 60 Alarm Routing......................................................................................................... 61

iii

Page 4: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Chapter 14 Alarm Monitor................................................................................................ 63 Menus ...................................................................................................................... 63 Icons .........................................................................Error! Bookmark not defined.

Monitor View............................................................................................................... 64

Chapter 15 Command Center............................................................................................ 65 Available Commands ................................................................................................... 67

Commands to an Access Point ................................................................................ 67 Define Scheduled Commands ...................................................................................... 67

Command Info......................................................................................................... 67 Time Graph ............................................................................................................. 68

Define Future Commands ............................................................................................ 68 Command Info......................................................................................................... 68

Conditional Response Command................................................................................. 69 Command Info......................................................................................................... 69 Conditions ............................................................................................................... 69 Time Zone ............................................................................................................... 70 Notes........................................................................................................................ 70

Alarm Response Commands........................................................................................ 71 Command Info......................................................................................................... 71 Notes........................................................................................................................ 71 Time Graph ............................................................................................................. 71

Chapter 16 Issue A Command .......................................................................................... 73 Add/Issue a New Command ........................................................................................ 73

Chapter 17 Operators ........................................................................................................ 75 Default Admin Operator .............................................................................................. 75 Add an Operator / Set Password Policies..................................................................... 75

Menus ...................................................................................................................... 76 Icons .........................................................................Error! Bookmark not defined. Operator Information............................................................................................... 77 Copy Permissions.................................................................................................... 78 Operator Permissions .............................................................................................. 78 Zones ....................................................................................................................... 80

Add A Profile ............................................................................................................... 81

Chapter 18 Transaction Monitor....................................................................................... 82 Transaction Tab............................................................................................................ 82

Menus .......................................................................Error! Bookmark not defined. Transaction Color Code .......................................................................................... 83 Display Card Info .................................................................................................... 83 Columns .................................................................................................................. 83 Show Transactions by Panel or Zone.......................Error! Bookmark not defined.

System Status Tab........................................................................................................ 83 Connections............................................................................................................. 84 System Status .......................................................................................................... 84 Current Status .......................................................................................................... 85 Refresh Values ........................................................................................................ 85

iv

Page 5: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

v

Chapter 19 Reports ........................................................................................................... 86 Create a New Report .....................................................Error! Bookmark not defined.

Step 1........................................................................Error! Bookmark not defined. Select Report Type and Subtype (if applicable).......Error! Bookmark not defined. Select Fields .............................................................Error! Bookmark not defined. Define the Display Order of the Report Fields.........Error! Bookmark not defined. Select the sort order..................................................Error! Bookmark not defined. Set Date Range .........................................................Error! Bookmark not defined. Additional Criteria....................................................Error! Bookmark not defined. Save Report ..............................................................Error! Bookmark not defined. Run Report ...............................................................Error! Bookmark not defined. Export Report ...........................................................Error! Bookmark not defined.

Run A Saved Report .....................................................Error! Bookmark not defined. Create A New Query.....................................................Error! Bookmark not defined. Execute A Saved Query ................................................Error! Bookmark not defined. Operator Activity Report ..............................................Error! Bookmark not defined.

Chapter 20 Standalone Reports..........................................Error! Bookmark not defined.

Chapter 21 Event Manager ................................................Error! Bookmark not defined.

Index ................................................................................................................................. 87

Page 6: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

©COPYRIGHT 2009 ACCESS SPECIALTIES INTERNATIONAL, LLC

All Rights Reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying or recording, without the express written permission of Access Specialties, Inc. Information in this document is subject to change without notice and does not represent a commitment on the part of Access Specialties, Inc. Unless otherwise noted, all names of companies, persons, products, and addresses contained herein are part of a completely fictitious scenario or scenarios and are designed solely to document the use of an Access Specialties’ product. Windows is a trademark of Microsoft Corporation.

SOFTWARE LICENSE AGREEMENT

The software described in this document is furnished under a License Agreement. This is a legal agreement between you and Access Specialties, Inc. Opening the CD package indicates that you accept these terms:

Access Specialties, Inc. grants to you the right to use one copy of the enclosed software on a single computer or to a network server. If additional workstation licenses are purchased, you have the right to install the software on as many computers as is validated by the system registration. The software is owned by Access Specialties or its suppliers and is protected by the United States copyright laws and international treaty provisions. You may not rent or lease the software. You may not reverse engineer, de-compile, disassemble, or create derivative works from the software.

If you do not agree to the terms of this Agreement, promptly return the unopened software package and all accompanying items, to the place of purchase for a full refund.

TECHNICAL SUPPORT

For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or (651) 453-9116. Support is available Monday through Friday, 8:00 AM to 5:00 PM, CST. A 24-hour fax line is also available by dialing (651) 453-1338. Written correspondence may be directed to Access Specialties, Inc., 10255 Inver Grove Trail, Inver Grove Heights, MN 55077. Installation guides are also available at www.access-specialties.com.

1

Page 7: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Chapter 1 WELCOME TO FOCAL POINT FOCAL POINT is an inclusive 32-bit Windows based access control software package that is integrated to operate with a Microsoft SQL Server database. Colorful screen graphics, easy-to-use interface, and powerful flexibility make FOCAL POINT essential for managing your facility. When combined with the power of the HID Edge IP based controller, you have state of the art access control at the door… and “Network Based Security made easy.”

CONTROLLING ACCESS Access is controlled throughout your facility by information stored in a SQL database that FOCAL POINT queries for controlling access, and monitoring transactions and alarms. Information stored includes cardholders and access points, as well as Access Groups and Time Zones. Access Groups are created by combining one or more Access Points with the defined Time Zones. Cardholders can have up to 8 assigned Access Groups. This allows each cardholder to have unique access privileges. Zones partition the system allowing access points to be separated into separate zones controlling what information is sent to each access point and what information each system operator can view.

CARD READERS AND TRANSACTIONS FOCAL POINT supports a variety of card technologies, such as proximity, magnetic stripe, barium ferrite, bar code, smart card, biometrics and keypad entry. An Edge controller has either an integrated proximity reader, or is wired to an external Wiegand reader. When a card is presented at a reader, the data is sent from the reader to the Edge controller. The controller holds key information regarding badge access. The controller then opens the contact if the door should be unlocked. The complete transaction is documented and stored for real time display, as well as reports.

MONITORING ACTIVITY Monitoring activity is accomplished via sensing devices. The sensing devices have both an alarm, and non-alarm condition. It should be noted that any monitored condition might be defined as an alarm condition. The Edge reports activity at monitor points only when an alarm condition occurs on the controller, and when the alarm condition resets. Otherwise, no transaction is reported.

2

Page 8: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

COMMANDS The commands available through FOCAL POINT help a facility run more efficiently. Doors may be manually commanded to lock or unlock by a system operator. Doors and areas can also be set to open or close at specific times.

Chapter 2 FOCAL POINT REQUIREMENTS FOCAL POINT offers a wide range of configuration options when creating the security system. The hardware requirements will vary depending on the Security Administrator’s choice of whether to install the application on the same computer as Microsoft SQL Server, or another computer. Below are the minimum recommendations necessary for installing FOCAL POINT.

MINIMUM PC REQUIREMENTS FOR SQL SERVER HOST - Processor: Pentium IV (2.8 GHz or higher) - Display: VGA or higher-resolution monitor (Super VGA recommended) - Operating System: Windows 2000, Windows XP, Windows 2003 Server - Memory: 2048 Megabytes (MB) of RAM - Hard Drive: 40+ GB (depending on estimated size of database) - Disk Drive: CD-ROM Drive - Mouse: Microsoft Mouse or compatible pointing device - Additional space needed for setup files:

- FOCAL POINT: ~ 20 MB - SQL 2005 or 2005 Express ~ 100 MB

- Screen Resolution: 1024 x 768 and greater - Browser: Microsoft Internet Explorer 5.0 or later - .NET Framework version 2.0 - Windows Installer 3.1 or higher - Networking: Windows 2000, Windows XP, Windows 2003 Server built-in

network - Additional network software is not required unless you are using Banyan

VINES or AppleTalk ADSP. Novell NetWare client support is provided by NWLink

- Supported Clients: Windows NT Workstation, Windows 2000, Windows XP, Apple Macintosh (Requires client software from a third party vendor), and OS/2 (Requires client software from a third party vendor).

MINIMUM PC REQUIREMENTS FOR WORKSTATIONS

- Processor: Pentium IV (1 GHz or higher) - Display: VGA or higher-resolution monitor (Super VGA recommended) - Operating System: WindowsNT, Windows 2000, Windows XP, Windows

2003 Server - Memory: 256 megabytes (MB) of RAM - Hard Drive: 40+ GB - Disk Drive: CD-ROM Drive

3

Page 9: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

- .NET Framework version 2.0 - Windows Installer 3.1 or higher - Mouse: Microsoft Mouse or compatible pointing device - Screen Resolution: 1024 x 768 and greater - Browser: Microsoft Internet Explorer 5.0 or later - Networking: Windows 2000, Windows XP, Windows 2003 Server built-in

network - Additional network software is not required unless you are using Banyan

VINES or AppleTalk ADSP. Novell NetWare client support is provided by NWLink

- Supported Clients: Windows NT Workstation, Windows 2000, Windows XP, Apple Macintosh (Requires client software from a third party vendor), and OS/2 (Requires client software from a third party vendor).

TECHNICAL EXPERIENCE There are two different levels of technical experience needed for the installation and operation of the FOCAL POINT security software. Personnel installing the Microsoft SQL Sever software should be familiar with Microsoft SQL Server. The day-to-day operators using FOCAL POINT should have a general level of comfort with the standard Windows environment. Access Specialties offers courses for all types of users and installers covering Microsoft Operating Systems, SQL Server, FOCAL POINT, and Access Specialties hardware. Please see our website for more information. http://www.Access-Specialties.com.

4

Page 10: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Chapter 3 SYSTEM COMPONENTS

FOCAL POINT consists of two main components that have been designed to allow for a number of different installation options. Below is an overview of the purpose of each.

ASIDATASERVER

The ASIDataServer component performs all of the run-time communications between FOCAL POINT and the Focal Point SQL Database. A File DSN establishes the communications link between ASIDataServer and the SQL Database. Contact Access Specialties for specific DSN information. It also controls FOCAL POINT’s communications with the security system’s hardware.

WORKSTATION Workstation is the interface for defining the security system, issuing commands, and viewing real time transactions and alarms.

SQL SERVER

SQL SERVER VERSIONS FOCAL POINT is compatible with either the Express or full version of SQL Server 2005. SQL Server 2005 Express is free and is available on each FOCAL POINT installation CD. Note that SQL Server 2005 Express does not include the SQLAgent scheduling service, which is required to perform automated SQL database backups through Management Studio. There is also an Express version of Management Studio, which is used to configure and modify SQL Server 2005 Express configuration and its databases. There is a 4 GB database limit with the Express version. Once the database grows to approximately 4 GB FOCAL POINT will stop working. Please consult Microsoft for licensing information and options for SQL Server.

INSTALLING SQL SERVER A copy of SQL Server 2005 Express is included on the install CD. Installing the ASIDataServer component on a workstation that does not have SQL installed, will cause SQL Server 2005 Express to be installed automatically on that workstation. Installing a full version of Microsoft SQL Server is outside the scope of this help file. Please consult the Microsoft SQL Server Introduction Manual that came with your purchase of SQL Server. During installation select:

5

Page 11: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Setup Type – Typical Service Settings – Use Local System Account for Mixed Mode Authentication

SCHEDULING AUTOMATIC DATABASE BACKUPS IN SQL SERVER 2005 (NOT POSSIBLE

IN EXPRESS VERSION) 1) Open Management Studio

2) Connect to a Database Engine 3) Explore down the tree to the Management Node

6

Page 12: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

4) If the SQL Server Agent service is not started, right click on it, and select

“Start”. Click on the “Yes” button on the confirmation message, to start the SQL Agent service.

7

Page 13: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

5) Expand the “Management” node 6) Right-click on “Maintenance Plans”, select “Maintenance Plan Wizard”

7) If you receive a message stating that “Agent XPs are not enabled”

- Left-click on the “New Query” button - Copy and paste the following text into the query window:

sp_configure 'show advanced options', 1; GO RECONFIGURE; GO sp_configure 'Agent XPs', 1; GO RECONFIGURE GO

8

Page 14: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

- Execute this query

9

Page 15: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

8) Click “Next” to continue

10

Page 16: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

9) Enter a name for the job, as well as the appropriate credentials. 10) Click “Next”

11

Page 17: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

11) Select “Backup Database (Full), click “Next” 12) Click “Next” on the next screen.

12

Page 18: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

13) Select the database to backup, by clicking on the arrow next to the “Databases” field. This will display a list that contains the defined database. Place a check in the box next to the name of the database you want to back up.

13

Page 19: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

14) Click “OK” to close this screen. 15) Click “Next”

14

Page 20: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

16) Click “Change” to set the options for the job scheduling.

15

Page 21: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

17) Give it a name, and configure the remaining information according to the schedule the backup should be performed on.

18) Click “OK” 19) Click “Next”

16

Page 22: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

20) Click “Next”

17

Page 23: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

21) Click “Finish”

18

Page 24: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

22) Click “Close” Backup job has been created, and saved. It will execute as defined by the schedule.

AUTOMATIC DATABASE BACKUPS IN SQL SERVER 2005 EXPRESS

Although it is not possible to directly schedule database backups using this version of SQL 2005, it is possible to create a job that runs using the built-in Windows scheduler. On the computer which runs SQL 2005 Express: 1) Open Management Studio Express

19

Page 25: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

2) Provide required login information, and click “Connect” 3) Navigate to required database.

4) Right-click on the database name, select “Tasks”, then “Back Up”

20

Page 26: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

5) Click on the “Script” button 6) Click “Cancel” 7) A new query window should be visible, which contains the statements to

perform the database backup.

8) Click on the “File”, then “Save Query As”. 9) Save the file to an easy to find location, and meaningful name

21

Page 27: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

10) Click “Save” 11) Close Management Studio Express 12) Open Control Panel, Double-click on the “Scheduled Tasks” button 13) Double-click on the “Add Scheduled Task” icon, to start the wizard to create

a new scheduled task

14) Click “Next”

22

Page 28: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

15) Click on the “Browse” button.

16) Select the query file which was created earlier, select “Open”

23

Page 29: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

17) Select the schedule option, click “Next” 18) Depending upon the selected schedule frequency, the information which

needs to be specified, will be slightly different. In this case, Weekly was selected.

19) Set the appropriate time, days, etc 20) Click “Next”

24

Page 30: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

21) Supply a user and password that has sufficient rights to connect to SQL, as well as creating the backup file on the disk, and click “Next”

22) Click “Finish” to complete the process. The new scheduled job will display in the list.

25

Page 31: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

26

Page 32: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Chapter 4 INSTALL FOCAL POINT INSTALLATION OPTIONS

The Security Administrator can install the components of FOCAL POINT as either a stand-alone security system or as part of a networked security system.

STAND-ALONE All FOCAL POINT components and the SQL Database are installed on one computer. A stand-alone security system can be implemented to meet the needs of users that want to localize their security system to one computer because of a smaller facility size or lack of network connections.

NETWORKED Implementing a networked security system is just as easy to accomplish as implementing a stand-alone security system and gives the user a high degree of flexibility in controlling access to key parts of the security system.

For Networked Security Systems, it is necessary to install the ASIDataServer component before installing Focal Point on client workstations. ASIDataServer is only installed on the server machine. Selecting the complete installation, or individually selecting ASIDataServer through the custom installation will accomplish this. For each type of installation you will be given the option of installing shortcuts for Focal Point on the desktop or directly on the Start menu. You will also be

27

Page 33: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

[SETUP Screens/explanation go here] [Not certain if we’ll need this. Right now, Focal Point is using a connection string which is defined in the .Config file] CREATE & ACCESS THE FILE DSN

The File DSN is set up on the computer running ASIDataServer.exe. It establishes the link between ASIDataServer and the SQL database. This link must be established before Focal Point can interact with the database. 1) Open the Control Panel

A) Windows XP – click on Start / Control Panel B) Windows 2000 – click on Start / Settings / Control Panel

2) Open Administrative Tools

3) Open Data Sources (ODBC)

4) Select the “File DSN” tab

5) IF a DSN does exist select Configure and go to step 7 6) IF a DSN for FOCAL POINT does not already exist complete the following

steps: A) Select “Add…”

28

Page 34: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

B) Select Native client from the bottom of the list C) Select “Next”

D) Type FocalPoint E) Select Next

F) Select Finish

7) Select the Microsoft SQL Server with which you would like to connect. If the

Focal Point database resides on the workstation you are using, select or type ‘(local)’

8) Select ‘with SQL Server Authentication using a login ID and password

entered by the user’ 9) Contact Access Specialties for the specific Login ID and Password

10) Change the default database to the name of the ASI database installed on the SQL server

11) Select ‘Next’

12) Select ‘Finish’

13) Select ‘Test Data Source’

29

Page 35: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

[No defined process for doing this, as of yet]

Chapter 5 UPGRADE AN EXISTING FOCAL POINT

SYSTEM Upgrading an FOCAL POINT system can be completed in minutes in just 3 easy steps. Before starting the upgrade, find the following information:

1) Computer name or IP Address of the Server: __________________ 2) Name of the SQL Database: ______________________________

i. Check the File DSN OR ii. Start FOCAL POINT and select View / Check DB / Currently

Connected Database 3) Name and location of all other machines running FOCAL POINT

workstations or Panel Manager:

View the Readme.txt from the cd to see PC requirements or view Server and Workstation Requirements from this manual. See Chapter 2.

UPGRADE THE SERVER SOFTWARE

First make sure that FOCAL POINT is closed on all workstations and on the Server. Check the processes tab in Task Manager and make sure that ASIDataServer.exe is not running. If it is, end the process. Next insert the latest FOCAL POINT CD. If the CD does not automatically run, or if you are installing from a folder, double click on the AutoRun.exe. Select Complete Install to install ASI Server, ASI Launch (workstation) and Panel Manager. Select Custom Install to install individual components. At least ASI Server must be installed on your Server PC (see Chapter 4). Select the workstation and user on which to install FOCAL POINT. Ensure that the user has Administrator permissions. To use a domain account select the computer name or IP address of that Server. Enter the password and click OK. Select Yes to remove previous FOCAL POINT installs.

30

Page 36: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Continue through the installation process, choosing which options best suit your needs. Do NOT try to run FOCAL POINT until the Database has been upgraded.

UPGRADE THE DATABASE Insert the installation cd on the machine running SQL or copy the folder to that machine. If you do not need to install the software on the computer or if you already have, stop the auto-run. Explore to the CD drive or open the software folder. Open the Upgrade folder. Double click on DatabaseUpgrade.exe.

From the drop down menu select the SQL Database name. Select Yes if you are using SQL MSDE. Select No if you are using a full version of SQL Server. Click on Upgrade Database. The upgrade utility will add the necessary components needed to run with the latest version of FOCAL POINT. Custom installs of the software can be completed while the database is being upgraded. Do NOT try to start any FOCAL POINT component until the Upgrade is complete.

UPGRADE THE WORKSTATION SOFTWARE Perform custom installs (see Chapter 4) for each component needed on each workstation. During the installation you will be prompted to enter the IP address or Computer Name of the computer running ASI Server. If this is entered incorrectly you will get an error connecting, error 70. Should this occur, reinstall the workstation pointing at the correct computer.

31

Page 37: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Chapter 6 START USING FOCAL POINT (MAIN

INTERFACE)

LOG IN TO FOCAL POINT Launch FOCAL POINT by clicking on Start/Programs/ASI/Focal Point or by double-clicking on available shortcuts. Contact Access Specialties for the User Name and Password if this is an initial installation. The following two screens will display, before the main logon window:

MAIN LOGIN SCREEN Enter a valid login and password, or select an operator name from the drop-down list. If an operator is selected, a valid password will still have to be provided to complete the login process.

32

Page 38: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Click the “OK” button to enter Focal Point INTERACTING WITH FOCAL POINT

FOCAL POINT allows each operator to have tailored permissions within FOCAL POINT. FOCAL POINT’s modular design makes it easy to grant administrative rights to an operator or restrict an operator to ‘view only’ privileges in any one of the modules. If an operator does not have any permissions within a module the icon button for that module will not appear on the screen.

MODULE ICONS FOCAL POINT uses icons to organize each module of the software.

Access Groups and Access Assignments are defined in this module. Access Assignments determine when a badge can be used at certain readers.

All alarms are defined in this area. Assign priority levels; and identify conditions causing the alarm at a specific device or area. Alarm instructions are also created and assigned here.

he Cardholders module holds information about people, Tbadges and access permissions. It is also where badge layouts are created and printed.

33

Page 39: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

All Immediate, Scheduled, Future, Conditional Response and Alarm Response Commands can be created and issued in the Command Center.

Issue Command allows operators to quickly send commands to devices or areas such as locking or unlocking doors.

Access Point Manager displays Zones, Areas, and Access Points

All Holiday Groups and definitions are created in the Holiday Definition module. Defined holidays can prevent badges from being granted access, and cause commands not to be issued on defined holidays.

licies are also set here.

Unique user names, passwords and permissions are assigned in the Operators module. Other security features, such as password rules, and login po

reports or reate SQL scripts that query the database for virtually any

The Reports Module allows the user to easily create custom reports, save these reports for future use, edit savedcreport needed

Time Zone intervals are defined in this module. This section also displays graphs for visual confirmation of when a Time Zone is active.

MODULE

The Transaction Monitor shows transactions live as they are happening throughout the day.

TOOL BAR Only the modules that an operator has permissions to, will be enabled. The

ining modules will be visible, and greyed out. rema MENUS

VIEW

34

Page 40: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

the descriptions will appear under the icons in the main . Unchecked, the descriptions will be hidden.

About

Show Names: If checked,window

kstation: Displays version and license information for this install of Focal Point.

trol when an event will occur or not occur. For

ple, a 24/7 in effect all the time) can be used for alarms, granting

will also delete any dependant ation such as alarms, and access assignments that are using the Time Zone

e application, so use descriptive terms

such as “8am-5pm, Mon-Fri”. The Description and Notes sections are very

es contain zero or more intervals, during which time the time zone is

considered to be active. The times during which the Time Zone is active, are

TIME

About Focal Point Wor

Chapter 7 TIME ZONES

Time Zones are the corner stone of the FOCAL POINT database. Time zones are user-definable periods that conexample, a Time Zone that is defined from 8:00 am – 5:00pm, Monday through Friday can be used to allow certain cardholders to gain access to certain card readers during those times, or to unlock main doors during that time. Each Time Zone can be used for more than one function. For examTime Zone (one that isaccess through doors and scheduled commands Be aware that if a Time Zone is deleted, itinformthat was deleted.

Time Zone names are viewed throughout th

important references explaining the Time Zone, or what the Time Zone may be used for.

Time zon

displayed in green in the graphic underneath the defined interval descriptions ZONE INTERVALS Time zone intervals are entered, updated and deleted individually for each Time Zone definition, using this set of controls on the Time Zone definition form.

35

Page 41: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

You must be either adding or editing an existing Time Zone to change the interval definitions for a Time Zone.

ADD A NEW INTERVAL

Select a Time Zone to edit, or click on “Add” to create a new time Zone definition . Using the left-hand set of controls, select a starting day of the week for this interval.

Select or type the starting hour and minute, as well as AM/PM. Select the Ending day of the week for this interval.

36

Page 42: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Select or type the ending hour and minute, as well as AM/PM.

Click the “Add” button next to the list of defined intervals.

The new interval will then appear in the list: This interval starts Sunday @ 6:00 AM, and ends Sunday @1:00 PM

Note that the graphical representation of the Time Zone will change to reflect the currently defined intervals. Changes will not take affect until the Time Zone is actually saved.

UPDATE AN EXISTING INTERVAL Select a Time Zone to edit Select the interval to be changed from the list of defined intervals in the list below

37

Page 43: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

The start and stop information for that interval, will be loaded into the controls above this list of intervals Make the desired changes to either the start or stop information for that interval, then click the “Update” button.

Here, the start and end time of the interval for Wednesday, was set to start an hour later, and end an hour later.

The changes to the interval will be displayed in the list, as well as the graphical control below the interval, however will not actually take affect until the Time Zone is actually saved.

38

Page 44: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

DELETE AN EXISTING INTERVAL Select a Time Zone to edit Select the interval to be deleted from the list of defined intervals in the list below

The start and stop information for that interval, will be loaded into the controls above this list of intervals Click the “Delete” button. The interval will be removed from the list, and the graphical display will be updated to show the interval has been removed Here, the interval that started on Saturday, and ended on Sunday, was removed from the list.

39

Page 45: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Note that none of these changes will take effect, until the “Save” button is clicked. This will send the new Time Zone definition information to all of the access points that are defined in the system.

ADD TIME ZONES To add a new Time Zone, click on the Time Zones module. Then click on the “Add” button.. Enter the information to define this new time zone, including Name, and defining intervals when the time zone is active. Note that only five intervals can be defined for a specific day of the week within each Time Zone.

A name must be specified for each Time Zone, and must be unique throughout the System.

EDIT TIME ZONES To edit an existing Time Zone, click on the Time Zones module. Then click on the desired Time Zone in the list, then the “Edit” button. Make desired changes to the existing Time Zone, then click on “Save”. Changes will be sent to the controllers immediately upon the save operation.

40

Page 46: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

DELETE TIME ZONES To delete an existing Time Zone, click on the Time Zones module. Then click on the desired Time Zone in the list, then the “Delete” button. A confirmation message will be displayed:

You must select the “Yes” button to actually delete the Time Zone. Deleting Time Zones is not recommended unless you have a thorough understanding of the relationship between that Time Zone and the rest of the database. When a Time Zone is deleted, all associated events, alarms, commands, and Access Groups will also be deleted. To delete a Time Zone, highlight the name in the list, and click on the “Delete” button. A confirmation will appear. Click “Yes” to remove the Time Zone from the database.

41

Page 47: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Chapter 8 ACCESS POINT CENTER The Access Pont Center is where the hardware is defined. This includes Zones, access points and areas. This is also where the TCP/IP communication parameters are defined for each controller. Multiple zones can be used to segment the access control database and hardware at larger installations. [Access point List]

ZONES Zones are used to partition the database. Grouping access points into different zones will help the system run more efficiently by distributing the appropriate cardholder information to the correct controllers. Zones can also be used to restrict which operators can view access points, access groups, alarms, commands, and cardholders who have been assigned access in that zone. Each access point must be assigned to one and only one zone. There is no limit to the number of zones that can be created in the Focal Point database. Careful consideration of how zones are used can increase the effectiveness and efficiency of the access control system. If multiple sites are being controlled from one server, giving each site its own zone can help the system operate more efficiently. Deleting a zone will also delete the hardware associated in that zone as well as any software definitions such as access groups, alarms, commands and areas that reference that zone.

ACCESS POINTS Access Points are defined in each zone.

Each Access Point has memory that holds a portion of the Focal Point database. When communication is lost between the computer running ASIDataServer and the Access Points, the Access Point’s memory allows operation as normal until the communication is restored. Any changes made through the software will not take place until the communication link has been restored. Any transactions that have been stored in the Access Point’s memory while it was not communicating with the host PC, will also be received at that time.

COMMUNICATION PROTOCOLS

TCP/IP TCP/IP is used with an Edge controller. The controller’s TCP/IP connection is configured using the built-in web interface through Internet Explorer. Some of this same information is displayed for reference in Focal Point.

42

Page 48: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

ACCESS POINT OVERVIEW

All access points can be configured to unlock a door for as long as needed. An unlock command will last forever unless power is lost or a new command is issued. Both the go and shunt times have a maximum value of 1,620 seconds, or 27 minutes. The unlock time is how long the door will be unlocked when a valid access has been granted, a “Grant Access” command executed, or the Request To Exit has been activated. The shunt time is used to determine how long the door can remain open beyond the unlock time, before a door held open message is displayed in the Transaction Monitor.

The access point can be configured to require Card Only, Card Plus Pin, or Pin Only mode at any time. PIN entry requires a reader that allows PIN entry. This information is used in conjunction with the Access Mode defined for each cardholder, to determine whether or not enough information has been provided to validate their specific access request.

AREAS

Grouping Access Points into an area allows simple control of all these devices with one command. Areas can include Access Points across multiple zones. Areas can also be used when defining Alarms, and some commands. For example, if 5 external lobby doors need to open at 8am and lock at 5pm, create an area and include these 5 devices. One command can be created to unlock and lock all 5 of these devices creating a more efficient environment.

DEFINE ACCESS POINTS [ACCESS POINT SCREENS] ADD AN ACCESS POINT

Open Access Point Center Click on the “Add” button Enter the required information.

ACCESS POINT INFORMATION Enter the Location, MAC address, unlock and shunt times. The location should be very descriptive as it is viewed throughout the rest of the application when selecting devices. It is also viewed in Transaction Monitor. The Panel Enabled box enables the panel. To disable the panel, uncheck this box.

43

Page 49: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

CONNECTION Configure the options for DHCP or an IP address are given.

SETTINGS

The Time Difference box allows ASIDataServer to process transactions from controllers in different time zones. For example, ASIDataServer could be running from a computer in Minnesota, which is in the Central time zone. The controller could be located in New York, which is in the Eastern time zone. The time difference would then be +1. If the controller were located in California, which is in the Pacific time zone, the time difference would be –2.

The Re-Allocate Panel button is a simple way to re-load the panel with the database definitions. Re-allocation can take up to an hour or more depending on database. Click on Cancel return to the settings tab.

NOTES Click on the Notes tab. Use the notes section to write important information about the exact location of the panel, or any other information that may be useful to someone else who is not as familiar with the system layout. Save the Access Point.

ADVANCED SETTINGS

Advanced Settings allow configuration of advanced settings. Normally, only required for PIN reader definition.

DEFINE AREAS Areas are maintained using the Area Listings tab. To add a new Area, open the Access Point Center and click on the Area Listings tab. Click on the “Add” button, then enter the Area Name and Description. Click on the “Save” button to save the area definition. Select an area and then click on Edit Area. Double click on an Access Point to add it to the area. The Access Points in the area will move to the box on the bottom. Save the area when finished. To delete an area, open the Access Point Center and click on the Area Listings. Click on the area you wish to remove, then click the “Delete” button. Note that deleting an existing area, will also remove any commands or alarms that area is referenced by.

44

Page 50: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Chapter 9 HARDWARE INFORMATION

Chapter 10 ACCESS GROUPS

Access Points and Time Zones are uniquely combined into Access Groups, which are assigned to badges. 8 access groups per zone may be assigned to each badge. When an access group has been added to the badge, that badge will work at the Access Points specified in the group during the specified time zone. For example, access group 1 may contain all the exterior doors of a building during a defined time zone of Monday through Friday, 8am to 5pm. Each badge that has been assigned access group 1 will open the exterior doors during that time frame. Access groups cannot span zones, so Access Points in a particular access group must all be in the same zone.

ACCESS GROUP DEFINITIONS

Group definitions are where Access Groups are named.

ADD ACCESS GROUP DEFINITIONS Select Access Groups from the Main Interface. Click on “Access Group Listings” tab. Click “Add” button. Access group names should be very descriptive as they are viewed when assigning them to badges. Descriptions can be used to further specify groups.

45

Page 51: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Access groups can be edited or deleted at any time. Once an Access Group has been deleted, cardholders who were part of that access group will no longer have any access to the access points that group had allowed.

In this example, there are four Access Groups defined in the zone “ASI Sales Office”

Since Access Groups do not span Zones, click on the drop down arrow to select another zone. Define Groups for each Zone.

46

Page 52: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

GROUP ACCESS ASSIGNMENTS

Select Access Groups from the Main Interface. Click on the “Group Access Assignments” tab. Columns indicate the Access Group while rows indicate the devices in that Access Group. Access Groups are defined by zone. The first zone that is defined will be loaded by default. If the Access Groups are defined in a different zone, this zone must be selected before any changes can be made.

Double click in each grid square to add appropriate Time Zones for each Access Point in each Access Group. To exclude an Access Point from an Access Group leave the corresponding grid square blank.

In this example Access Group 1, 3, and 4 contain all the doors during Time Zone 2 (24/7), Access Group 6 contains all the doors during Time Zone 1 (normal work hours) Selecting a cell that contains a number referring to a Time Zone, will display the graphical representation of the time zone below the assignment grid.

47

Page 53: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

The Green area indicates the time period during which a Cardholder with that Access Group will be granted access. Here, the Time Zone is active from 8:00 am to 5:00 pm, Monday – Friday. Clicking on the “Lookup” button at the top of the screen, will allow you to select a specific group or access point to locate in the current Zone in the grid.

Selecting a group name, or Access Point Name, and clicking the “OK” button

will change the information which is selected (highlighted), based upon the selection made, without having to physically scan the list to find it.

Since Access Groups do not span Zones, click on the drop down arrow at the top to select another Zone. Create Access Groups for each Zone.

48

Page 54: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Chapter 11 HOLIDAYS Holidays are defined in Holiday Groups. These groups provide exceptions to Time Zone rules for badge access, scheduled commands, and conditional response commands. Each Holiday must start at 12:00am and end on 11:59pm on the same date. Recurring Holidays occur on the same date every year.

Holiday Groups can be assigned to badges to grant cardholders access on holidays within a certain group. If a badge is not given access to a specific Holiday Group, that badge will not be granted access on the holidays within that group.

ADD HOLIDAY GROUPS From the Main Interface click on the Holidays module. Click on the “Holiday Group Listings” tab.

Select Add or hit F5. Enter the name of the Holiday Group. The description is optional. Click Save. Add as many Holiday Groups as necessary.

49

Page 55: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

ADD HOLIDAYS

From the Main Interface click on the Holidays module. Select Holiday Definition tab. Select Add or hit F5. Enter the name of the Holiday. The description is optional. Enter the date of the Holiday. If this holiday happens on the same day every year, such as July 4th, select recurring holiday. Assign this Holiday to one or more Holiday Groups by checking the box for the appropriate Holiday Groups.

Any badges not assigned to one of these Holiday Groups will not gain access during the holidays defined within the Holiday Group.

50

Page 56: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Chapter 12 CARDHOLDERS

Cardholder Data includes First Name, Last Name, MI (Middle Initial), Photo and Custom Fields. Badge Data includes Encoded, Embossed, Pin #, Activation and Expiration Dates, Active or Inactive flag. A Cardholder is a person who is issued one or more access cards. Each Cardholder has specific information associated with it such as Encoded Number, PIN, Embossed Number, Activation and Expiration Dates, Photo and an unlimited number of user-definable Custom Fields.

Cardholder photos are stored as .jpg files in folders.

DEFINE CUSTOM FIELDS Either click on Add to create a new cardholder, or select one and click “Edit” Click in the “Custom Fields” tab

51

Page 57: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Click on the “Add Custom Field” button to create extra data fields (ex. Address, Phone Number, Social Security Number) called Custom Fields. The number of Custom Fields is unlimited. Lookups create drop down lists, which are customized for each Custom Field. Creating the necessary Custom Fields before entering Cardholder data will save time because each cardholder won’t have to be edited to insert key Custom Field data.

CREATE CUSTOM FIELDS Select Add New Field. Enter the name of the Custom Field (ex, Department). To add a lookup highlight the custom field name on the left side of the screen and select Add Lookup For Selected Field. One at a time, enter the Lookups as shown in the example below. Lookups are optional.

52

Page 58: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Continue adding Custom Fields and Lookups as needed. When lookups are used the only data that can be entered into that field is one of the lookup entries. Custom fields and lookups can be edited or deleted by selecting the corresponding buttons. Deleting lookups will not delete any related data. However, deleting a custom field will delete all related information. Care should be exercised so that important data is not lost. Click “Done” to return to the Cardholders screen. The custom field names and lookups (drop down menus) will now appear.

ADD CARDHOLDERS To add new Cardholders or edit existing Cardholders, click on the Cardholders module. Enter Cardholder data. At a minimum, either a first name or last name is required.

53

Page 59: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Enter Badge data. The encoded number is the unique number on the access card or key fob. The encoded number must be unique but is not required. This allows Cardholder information to be kept even for those who do not have badges. If the encoded number is not used, Access Groups cannot be assigned. The Embossed number is user definable, optional, and can be used as a badge number. The Pin # can be used with devices that have pin pads and is optional. Pin numbers are usually 4 or 5 digits depending on the device type being used. Select Access Mode for this cardholder.

If not specified, is Card Only. This means only a card is required for validating access at any door. Note that the other modes (Card + PIN, Card or PIN, PIN only) require the use of a PIN reader. This is used in addition to the access mode that is configured in the Access Point definition, to verify that the cardholder can get access to a specific door. Changing the Access Mode from Card only to an Access Mode other than Card + Pin, will require that the entire cardholder database be regenerated, and sent to each of the access points that cardholder has access to. In a similar fashion, changing from any access mode other than Card + Pin, to Card Only, will require the cardholder database to be regenerated, and sent to all the access points the cardholder has access to. Enter custom field data as appropriate per cardholder. Drop down menus appear from the defined lookups. Text can be directly typed into any field that does not contain lookups.

BADGES

Activation Date and Expiration Date show the period during which that badge will be active. The default activation date is the date of entry. The default for expiration date is 10 years from the date of entry. The Activation date must be later than 1/1/1990. A badge can be deactivated via the Active check box without changing the expiration date. When the Active box is not checked, the badge is inactive. A text box for corresponding notes will appear just below the check box. Additional detailed notes should be placed in the Badge Notes section.

ACCESS ASSIGNMENTS To assign access to this badge click on the “Access Groups ” tab.

54

Page 60: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

ACCESS GROUPS The Access Groups that have been defined in the Access Groups module will appear on the left side of the Access Groups tab. Select the desired zone from the drop down menu. Double click on the desired Access Group name or highlight the Access Group name and click on the arrow button to put it on the right side. The badge will then have access to the Access Points within the assigned Access Group during the Time Zones defined in the Access Groups module.

Up to 8 Access Groups from each zone can be assigned to one badge.

HOLIDAYS When Holidays are used, the badges that have assigned Holiday Groups will be granted access as usual during the holidays within the assigned group. Badges that do not have Holiday Groups assigned will not be granted access during defined Holidays. Holiday Groups displayed on the right side are the groups that are assigned to that badge. Select Holiday Groups and use the arrows to move them from side to side to grant or remove access. Each badge can have a maximum of 8 assigned Holiday Groups.

55

Page 61: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

GENERAL NOTES Notes allow operators to record specific information about individual badges.

CARDHOLDER IMAGE CARDHOLDERS CAN HAVE AN IMAGE ASSOCIATED WITH THEM, WHICH WILL

DISPLAY IN TRANSACTION MONITOR OR ALARM MONITOR WHEN A CARD

TRANSACTION IS RECEIVED FOR THEIR BADGE.

Click on the “Add Photo” button to associate a new image with this badge. Click on the “Delete Photo” button to associate a new image with this badge.

WHERE ALLOWED Information on where a specific Badge is allowed access, is visible on the “Where Allowed” tab. Note that the actual Access Group Assignment information can not be changed here. This is display-only information.

56

Page 62: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Chapter 13 ALARMS

Alarms can be generated from a single event that occurs on an Access Point or from a card swipe. Multiple alarm conditions can also be used to trigger each alarm. Alarms are based on Access Points or areas, combined with Time Zones and pre-defined alarm conditions. Deleting Access Points or areas that are used in Alarms will also delete those associated alarms. Alarm types are first used to distinguish one alarm from another. Types of alarms may include Fire, Security, Smoke or Intrusion. At a minimum, one Alarm Type must be defined before an alarm can be defined. Alarm Instructions are then defined. For each defined alarm up to 3 unique alarm instructions can be selected. An alarm instruction may include information about emergency phone numbers for the dispatchers to call or specific instructions about what to do in the even of a break-in.

Each alarm can be routed to all operators or specific operator(s) only.

DEFINE ALARM TYPES From the main interface click on the Alarms module. Click on the “Alarm Types Listing” tab Select Add or hit F5 to add a new Alarm Type. Enter a name for the alarm type and click Save.

57

Page 63: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

DEFINE ALARM INSTRUCTIONS From the Main Interface click on the Alarms module. Select the “Alarm Instructions Listing” tab. Click on Add or hit F5.

Enter a name for the instruction so that it can be easily called up when defining alarms. Enter specific instructions in the text box. One instruction can be used in multiple alarms. Text instructions can include up to 500 characters. Click OK to save this alarm instruction. Up to 255 alarm instructions can be saved. An Alarm Instruction cannot be deleted if it is used in an alarm.

DEFINE ALARMS From the Main Interface click on the Alarms module again. Select Alarm Definitions Listing tab. Click on Add or hit F5.

58

Page 64: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

ALARM SOURCE First define the source of the alarm. From the drop down menu select a single access point or an area. The area must already be defined in Access Point Center.

ALARM INFO

59

Page 65: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

PRIORITY AND TYPE Setting the priority level determines the order in which the alarm will be displayed in the Alarm Monitor. The Type of Alarm is selected from the previously defined types. Note that use of Alarm Response Commands requires the Priority and Type of the Command to match the Priority and Type of the Alarm.

REQUIREMENTS FOR CLEARING THIS ALARM The ‘Device must return to non-alarm condition’ checkbox works in conjunction with alarms that come from monitor points. For example, if a “Door Held Open” alarm is defined, and this box is checked, the alarm cannot be cleared until the “Door Closed” transaction comes through. The ‘Operator Must Enter Comments’ check box forces the operator to enter comments regarding the alarm before it can be cleared from the Alarm Monitor.

TIME ZONE Select the Time Zone to be used. Alarm transactions will only occur when this Time Zone is active. To verify the Time Zone, click on the Time Zone tab. The corresponding graph will appear. The green area is the active time.

INSTRUCTIONS TO OPERATOR Up to 3 defined alarm instructions can be selected per alarm. From the drop down menu select the instructions that were defined in the Alarm Instructions area. The alarm instructions will appear in the Alarm Monitor in the order that they are displayed.

TIME ZONES This displays the Time Zone that is selected on the Alarm Info tab.

60

Page 66: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

ALARM ROUTING Each alarm can be routed to All Operators or Selected Operators by using the radio buttons. The list of operators is displayed on the left side. Highlight the desired operators and double click or use the arrow buttons to put them on the right side of the screen. The operators on the right side of the screen are the only operators that will see that alarm when Selected Operators is used.

61

Page 67: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Notes

General notes for this alarm can be saved here. Note that there is a limit of 200 characters on this information.

62

Page 68: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Chapter 14 ALARM MONITOR

The Alarm Monitor is a separate interface that shows currently active alarms in its own screen. The Alarm Monitor shows alarm transactions only. These alarm transactions are also displayed in red text in the Transaction Monitor. The alarm monitor cannot be closed. However, an operator’s permissions can be changed to not include the Alarm Monitor. To do this, remove the operator’s permissions for Acknowledge, Clear Active Alarms, Silence, and View Active Alarms under the Alarms tree as shown below. Using Zones also restricts an operator’s ability to only view alarms originating in Zones which they have permission to view.

To Enable or Disable alarms, press F12. When the alarms are disabled, new alarms will not appear in Alarm Monitor for that operator until alarms are enabled again.

MENUS Clear Alarm – Clears the selected alarm Clear All Alarms – Clears all of the alarms in the grid Save Column Widths – Saves the grid column widths

BUTTONS Acknowledge Alarm – Acknowledges the currently selected alarm Acknowledge All Alarms – Acknowledges all alarms displayed.

Enter Comment – Allows entry of a comment prior to acknowledging an alarm

63

Page 69: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

View Comments – Displays the comments associated with an alarm View Instructions – Displays the instructions associated with an alarm Silence Alarms – Stops the audible beep Ignore Displayed Alarms

(1) When checked (enabled) the alarm monitor screen will not pop up over the screen the user is in until a new alarm transaction comes in.

(2) When not checked the screen will pop up every few seconds to remind the Operator that there are alarms that need attention.

Display Card info with Alarms – Displays the card information associated with selected alarm.

MONITOR VIEW

The Alarm Monitor grid gives details on the alarms. When multiple instances of the same alarm come in, the alarm count increases. A new alarm row is not generated.

64

Page 70: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Priority – Priority of alarm as defined in the alarm definition. Higher priority

alarms display at the top of the list. Access Point – Access Point Description

Name – Cardholder name, if the alarm was generated from a badge, and the Encoded – The encoded number if the alarm was generated from a badge Description – Description of the alarm Time – Time the alarm occurred Date – Date the alarm occurred Count – Number of times alarm has occurred

65

Page 71: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Chapter 15 COMMAND CENTER There are several types of commands that can be issued directly to devices or areas. These commands can be used to lock or unlock doors and grant access, among others. These commands can be set to happen on a time schedule, at one point in the future, immediately, based on an event, or based on an alarm.

From the Main Interface click on the Command Center Icon.

Scheduled commands are used to control an area (as defined in the Device Center), individual readers or output points on a time-scheduled basis. Scheduled commands are tied to Time Zones. Future Commands are single occurrence commands. An exact date and time is used with a specific command to control a device or area. Conditional Response Commands are used to control an area (as defined in the Access Pint Center), individual readers or output points based on events occurring. Alarm Response Commands are used to control an area (as defined in the Device Center), individual readers or output points based on alarms occurring. Issue a Command allows the Operator to send immediate commands to a specific access point or area. Issued commands can be saved for quick recall. Issue Command can also be seen directly from the Main Interface.

66

Page 72: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Commands are partitioned by Zones as defined in the Access Point Center. Scheduled Commands, Future Commands, and Alarm Response commands can be defined for Areas, which can also span Zones. Conditional Response Commands cannot span Zones.

AVAILABLE COMMANDS

COMMANDS TO AN ACCESS POINT Grant Access Lock Door Unlock Door

DEFINE SCHEDULED COMMANDS From the Main Interface click on the Command Center module. Select the “Scheduled Commands Listing” tab. Click on Add or hit F5 to define a new scheduled command.

COMMAND INFO ACCESS POINT OR AREA TO COMMAND

Commands can be issued to a single access point or to an Area.

COMMANDS Select from the drop down menus what should happen when the Time Zone is active (on) and inactive (off).

67

Page 73: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

WHEN

Select the Time Zone for the Scheduled Command to use. The command will only occur when that Time Zone is active. Deleting associated Time Zones will delete the Scheduled Command.

HOLIDAY EXCEPTIONS If the Holiday Exception is selected the command will not be issued during Holidays assigned to that Holiday Group.

In this example, the door to Room 330 will be unlocked using the Time Zone Monday through Friday from 8am to 5pm. On the Holidays in the Contractors Holiday Group, the command will not be issued and the door will remain locked.

TIME GRAPH Time Graph shows a visual graph of Time Zone selected on the Command Info tab. Click Save to save and return to the Scheduled Commands screen. All scheduled commands will be listed.

DEFINE FUTURE COMMANDS

From the Main Interface click on the Command Center module. Click on the “Future Commands Listing” tab. Click on Add or hit F5 to define a new future command.

COMMAND INFO Select single Access Point or Area. Select the command to be executed. Select the exact date and time the command should occur. This is a one-time command.

68

Page 74: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Click save. The time and date used will be the system time on the computer running ASIDataServer. All future commands will be listed.

CONDITIONAL RESPONSE COMMAND

From the Main Interface click on the Command Center module. Click on the “Conditional Response Commands Listing” tab. Click on Add or hit F5 to define a new conditional response command.

COMMAND INFO

TRIGGER DEVICE AND EVENT Select the Zone and Access Point to be used as the condition.

RESPONSE COMMAND

Select the specific access point to be controlled. Select which command should occur when the condition (as defined on the Conditions tab) occurs.

CONDITIONS

69

Page 75: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

CONDITIONS The displayed conditions are dependant on the device selected and whether or not an Input Point is used as the Source of Condition on the Command Info tab.

WHEN Select the Time Zone for the Conditional Response Command to use. The command will only occur when that Time Zone is active. Deleting associated Time Zones will delete the Conditional Response Command.

HOLIDAY EXCEPTIONS If the Holiday Exception is selected the command will not be issued during Holidays assigned to that Holiday Group.

TIME ZONE Time Graph shows a visual graph of the Time Zone selected on the Command Info tab.

NOTES Notes allow the Operator to enter comments to be stored with the command.

Click Save to save and return to the Conditional Response Commands screen. All conditional response commands will be listed.

70

Page 76: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

ALARM RESPONSE COMMANDS

From the Main Interface click on the Command Center module. Click on the “Alarm Response Commands Listing” tab. Click on Add or hit F5 to define a new alarm response command.

COMMAND INFO ACCESS POINT OR AREA TO COMMAND

Select the Access Point or Area radio button. Next, select the Zone and Access Point to command.

COMMANDS Select the command to be issued when the alarm occurs, and the command to be issued when the alarm is cleared. .

ALARM CONDITIONS Select the same Alarm Type to be used to activate this command. Select the same Priority and Time Zone as the Alarm Definition. All Alarm Types that correspond to this Alarm Response command must be using the same Priority and Time Zone.

NOTES

Notes allow the Operator to enter comments to be stored with the Command.

TIME GRAPH Time Graph shows a visual graph of the Time Zone selected on the Command Info tab.

71

Page 77: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Click Save to save and return to the Alarm Response Commands screen. All alarm response commands will be listed.

72

Page 78: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Chapter 16 ISSUE A COMMAND

Issue a Command allows the Operator to send immediate commands to devices or areas. Issued commands can be saved for quick recall. Issued Commands can also be seen from the Command Center.

ADD/ISSUE A NEW COMMAND

From the Main Interface click on the Issue a Command module. Click on Add or hit F5 to define a new command.

73

Page 79: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Select the Access Point or Area radio button. Select the Zone and Access Point to command. The Lookup feature can help find the correct Access Point. Next select the command to issue. Click Save to save this command for future use. Click Issue Command to issue it immediately.

Once a command has been saved, highlight it in the Issue Command screen and hit F11 to send the command quickly. Click Save to save and return to the Issue a Command screen. All issued commands will be listed.

74

Page 80: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Chapter 17 OPERATORS

Anyone who needs to log into the Focal Point application can be an Operator. Operators are not associated with Cardholders. Operators must have a unique User Name and Password. Deleting an Operator prevents reports being run on that Operator at a future date. Suspending an operator’s permissions will make it impossible for that operator to login. Do not change the user name for the System Administrator account (admin). Each Operator can have unique permissions controlling what they can see and do within the application. To perform some duties Operators must have certain permission combinations in various modules. For example, an operator must have permission to view Cardholders in order to get into the Cardholder module. When a check is present next to a given module function, the operator will have permission to perform that function. Double click on a specific function to grant or remove permissions individually.

DEFAULT ADMIN OPERATOR User Name – admin Password – asi The admin operator has most permissions and the Default Zone. The other permission, Restricted by Zone, is also in Cardholders. When this is enabled, the operator will only be able to see the cardholders who have badge permissions in the specified zones on the right. Profiles can also be saved. A profile consists of a name and specific permissions. When adding new operators the permissions from a Profile can be copied. This is a very efficient way to add new operators who have similar permissions. Once the basic profile permissions have been copied, the operator’s permissions can be further tailored. ADD AN OPERATOR / SET PASSWORD POLICIES

From the Main Interface click on the Operators module. Click on Add or hit F5 to add a new operator.

75

Page 81: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

MENUS Operators – save or clear operator settings

View – expand or collapse permissions tree

POLICIES TAB

76

Page 82: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

PASSWORDS ARE CASE-SENSITIVE

Check this box to force the exact match of upper and lower case letters in the entered password for the operator. Operator must enter the password in the exact same case to log on.

FORCE PASSWORD EXPIRATION

Check this box to force password to expire after the set number of days. Operator would have to enter a new password when the number of days expires.

LIMIT LOGON ATTEMPTS

Check this box to enforce a limit on the number of times an operator can fail subsequent login attempts.

PERMISSIONS TAB

77

Page 83: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

OPERATOR INFORMATION

Check the radio button for Operator. Enter the rest of the information specific to each operator.

First Name Last Name MI User Name – Required and must be unique Password – Required Confirm password – retype the password for confirmation Suspend this account – deactivates the operator, preventing login

COPY PERMISSIONS When defining a new operator or editing an existing operator, permissions can be copied from another operator or profile. Select the operator or profile to copy and click on the “Copy Permissions” button.

OPERATOR PERMISSIONS

Check the box next to the permission(s) you wish to grant the operator, for each module.

78

Page 84: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

COMMON PERMISSIONS: VIEW

Operator can look at the information in this module, but is not allowed to change anything. Minimum required to have access to a specific module.

EDIT Operator can perform Add, Edit and Delete of information in this

Module ADDITIONAL PERMISSIONS CARDHOLDERS – RESTRICTED BY ZONE Operator will only be able to see cardholders which are included in

Zones the operator is allowed access to.

COMMAND CENTER – ISSUE COMMAND

Operator will not be able to actually send (issue) and defined Issue Commands to devices, unless this permisson is checked.

ALARMS

79

Page 85: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

ACKNOWLEDGE Operator will not be able to acknowledge an alarm, unless

this permission is checked.

EDIT Operator will not be able to Add, Edit or Delete existing alarm definitions, unless this permission is checked.

SILENCE

Operator will not be able to check the “Silence Alarm” option in Alarm Monitor, unless this permission is checked.

VIEW ACTIVE ALARM

Operator will not be able to see incoming alarm transactions, unless this permission is checked.

CLEAR ACTIVE ALARM Operator will not be able to clear any existing alarms, unless this permission is checked.

ZONES Select the zones in which the operator has permissions. Zone partitioning affects which cardholders and devices an operator has permission to view. Operators will only be able to view Access Points that are in the specified zone(s). If the Restrict by Zone permission is selected the operator will only be able to see the Cardholders who have access assignments in the specified zone(s).

80

Page 86: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

ADD A PROFILE The only difference between a Profile and an Operator is that the Profile needs only a profile name. All other menu options, icons, and permissions are the same. A Profile cannot be used as a login.

81

Page 87: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Chapter 18 TRANSACTION MONITOR The Transaction Monitor displays real time what is going on within the software and at the Access Points. It shows card reads, alarms, operators logging on and off, updates to cardholders and badges, and commands.

TRANSACTION TAB

CLEAR BUFFER This button removes undisplayed transactions from a temporary table in the SQL

database. CLEAR PENDING This button removes any unsent commands which are going to an access point,

from a temporary table in the SQL database.

FILTERS Allows the Operator to determine which transactions will show up in transaction monitor Show Cardholder Transactions Show System Transactions Show Operator Actions

82

Page 88: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

TRANSACTION COLOR CODE

Blue – Operator Transaction Bright Red – Alarm Black – System and/or Cardholder

DISPLAY CARD INFO Check the Display Card Info with transactions box to show cardholder images and certain cardholder and badge data with associated transactions.

COLUMNS Access Point – Gives the name of the Access Point on which the transaction occurred. A ‘0’ appears when a transaction is not associated with a panel, such as operator transactions.

Name – Gives the name of the operator if it is an operator transaction. If the transaction occurred from an Access Point it will say “Access Point”. Encoded – Shows encoded numbers for cardholder transactions. It is also a descriptive reference for other uses. Description – Shows the event that occurred. Time – Time transaction occurred corresponding to the system time on the computer running ASIDataServer. Date – Date transaction occurred corresponding to the system time on the computer running ASIDataServer.

SYSTEM STATUS TAB The system status tab shows a summary of information in the database.

83

Page 89: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

CONNECTIONS Clicking on the Connections radio button gives a listing of the current Access Points. The Zone and Panel names are shown with the status.

SYSTEM STATUS System status gives an overview of the Access Points and Cardholders that are defined in the system. The Use Date check box allows the operator to select a Date Range to use. The operator can then see transaction details during that time frame including Number of Access Granted, Number of Access Denied, Number of Alarms, Total Transactions, Buffered Transactions, and Pending Records.

84

Page 90: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

CURRENT STATUS Current Status shows specific information as shown.

REFRESH VALUES Retrieves current data from the database and refreshes the values. Use this button to retrieve up to date information or when changing the date range.

85

Page 91: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Chapter 19 REPORTS [NOT IMPLEMENTED YET]

86

Page 92: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

INDEX Access Groups.............................................................................................................................................. 68 Alarm Monitor...........................................................................................................31, 98, 99, 100, 102, 104 Alarms .......................................................................................................................................................... 93

Define ...................................................................................................................................................... 97 Instructions .............................................................................................................................................. 96 Maps ...................................................................................................................................................94, 99 Routing .................................................................................................................................................. 100 Toggle...................................................................................................................................................... 34 Type Definitions ...................................................................................................................................... 93

Anti-Passback............................................................................................................................................... 52 Define ...................................................................................................................................................... 58 Hard ......................................................................................................................................................... 52 Soft .......................................................................................................................................................... 52

Areas........................................................................................................................................................52, 62 ASI Launch....................................................................................................................................6, 12, 13, 34 ASI Server ...............................................................................................................................6, 12, 13, 30, 32 Associated Layout ........................................................................................................................................ 85 Badge Layouts.............................................................................................................................................. 87

Create....................................................................................................................................................... 89 Print ....................................................................................................................................................88, 92 Printer Settings ........................................................................................................................................ 88 Printer Type ............................................................................................................................................. 88

Badges .......................................................................................................................................................... 79 Access Assignments ................................................................................................................................ 79 Anti-Passback .......................................................................................................................................... 81 Associated Layout ................................................................................................................................... 85 Holidays................................................................................................................................................... 80 Magnetic Encoding.......................................................................................................................76, 87, 89 Multiple Badges..................................................................................................................................76, 82

Cable Connections........................................................................................................................................ 63 Cable Diagram.............................................................................................................................................. 66 Cardholders .................................................................................................................................................. 75

Access Assignments ................................................................................................................................ 79 Anti-Passback .......................................................................................................................................... 81 Associated Layout ................................................................................................................................... 85 Client Image Path ...............................................................................................................................76, 87 Client Signature Path ............................................................................................................................... 87 Custom Field Creation............................................................................................................................. 78 Custom Fields .......................................................................................................................................... 75 Employee ID.........................................................................................................................32, 75, 79, 128 Enable Signature Pad............................................................................................................................... 83 Global Image Path ..............................................................................................................................32, 76 Global Signature Path .............................................................................................................................. 32 Holidays................................................................................................................................................... 80 Images...................................................................................................................................................... 82 Search ...................................................................................................................................................... 77 Signature.................................................................................................................................................. 83

CCTV ..................................................................................................................................................161, 174 Channel Expander .............................................................................................................................48, 50, 54 Client Image Path ......................................................................................................................................... 76 Client Monitor .............................................................................................................................................. 30 Client Signature Path.................................................................................................................................... 76 Commands

87

Page 93: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

Alarm Response..................................................................................................................................... 112 Command Center ................................................................................................................................... 105 Conditional Response .....................................................................................................................105, 109 Future..............................................................................................................................................105, 108 Issue................................................................................................................................................105, 114 Scheduled........................................................................................................................................105, 106

Communication Protocols ............................................................................................................................ 48 RS-232 Dial-Up....................................................................................................................................... 49 RS-232 Direct .......................................................................................................................................... 48 RS-485..................................................................................................................................................... 49 TCP/IP ..................................................................................................................................................... 49

Comtrol....................................................................................................................................................47, 63 Contact Points............................................................................................................................................... 51 Custom Fields............................................................................................................................................... 77 Database Info................................................................................................................................................ 30 Database Installation / Upgrade.................................................................................................................... 17 DCOM...............................................................................................................................................13, 15, 23 Device Center ............................................................................................................................................... 46

Areas...................................................................................................................................................52, 62 Panels....................................................................................................................................................... 47 Zones ....................................................................................................................................................... 46

Devices Define ...................................................................................................................................................... 55

Dial-Up......................................................................................................................................................... 65 Door controls................................................................................................................................................ 66 DVR ....................................................................................................................................................161, 176 Elevator Control Module.............................................................................................................48, 50, 51, 59 E-Mail..................................................................................................................................................165, 175 Employee ID........................................................................................................................32, 33, 75, 79, 128 Event Manager ........................................................................................................................................... 161

Configure Pagers ................................................................................................................................... 161 Define Events ........................................................................................................................................ 176 E-Mail.............................................................................................................................................165, 175 E-Mail Message..................................................................................................................................... 167 Response................................................................................................................................................ 173 Rules ...................................................................................................................................................... 170

File DSN....................................................................................................................................................... 18 Change..................................................................................................................................................... 18 Create....................................................................................................................................................... 18

Global Image Path ........................................................................................................................................ 32 Global Signature Path................................................................................................................................... 32 Grounding..................................................................................................................................................... 64 Hardware ...................................................................................................................................................... 63 Holidays ....................................................................................................................................................... 72 Image Paths

Client Image ............................................................................................................................................ 36 Client Signature ....................................................................................................................................... 36 Global ...................................................................................................................................................... 35 Local ........................................................................................................................................................ 35 Set ............................................................................................................................................................ 35 Workstations............................................................................................................................................ 87

Install FOCAL POINT ................................................................................................................................. 12 Complete.................................................................................................................................................. 13 Custom................................................................................................................................................14, 15 Options .................................................................................................................................................... 12

Installing FOCAL POINT

2

Page 94: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

PC Requirements ....................................................................................................................................... 4 Local Settings ............................................................................................................................30, 31, 94, 129 Magnetic Encoding............................................................................................................................76, 87, 89 Main Interface .............................................................................................................................................. 28

Icons ........................................................................................................................................................ 28 Tool Bar................................................................................................................................................... 29

Memory Configuration................................................................................................................................. 54 Monitor Point ............................................................................................................................................... 51 Operator Activity...................................................................................................................................33, 141

Log......................................................................................................................................................32, 33 Reports................................................................................................................................................... 141

Operators .................................................................................................................................................... 116 Add ........................................................................................................................................................ 117 Create Profile......................................................................................................................................... 120 Password Policies .................................................................................................................................. 117 Permissions............................................................................................................................................ 119

Output Point ................................................................................................................................................. 51 Pagers ..................................................................................................................................................161, 162 Panel Manager............................. 6, 12, 13, 47, 52, 54, 63, 121, 122, 123, 124, 125, 126, 127, 129, 131, 161 Panels ........................................................................................................................................................... 47

Communication Protocols ....................................................................................................................... 48 Define ...................................................................................................................................................... 52 IC-1600.................................................................................................................................................... 47 IC-1600 Devices ...................................................................................................................................... 50 Memory Configuration ............................................................................................................................ 54 Re-Allocate.............................................................................................................................................. 55 UP-2000................................................................................................................................................... 48 UP-2000 Devices ..................................................................................................................................... 51

Password Server....................................................................................................................................................... 23

PC Requirements............................................................................................................................................ 4 Reader Interface ......................................................................................................................2, 48, 50, 64, 67

Reset Memory.......................................................................................................................................... 64 Readers

Define ...................................................................................................................................................... 57 Re-Allocate Panel......................................................................................................................................... 55 Reports ....................................................................................................................................................... 133

Create New Query ................................................................................................................................. 139 Create New Reoport .............................................................................................................................. 133 Operator Activity Report ....................................................................................................................... 141 Run Saved Query................................................................................................................................... 140 Run Saved Report .................................................................................................................................. 139 Standalone Reports ................................................................................................................................ 146

Requirements.................................................................................................................................................. 4 Reset Memory .............................................................................................................................................. 64 Server Info.................................................................................................................................................... 30 Short Haul Modems...................................................................................................................................... 65 Signature Pad...........................................................................................................................................77, 83

Enable Signature Pad............................................................................................................................... 83 Signature Pad Type.................................................................................................................................. 84 Supported Models.................................................................................................................................... 84

Social Security Number Tracking ................................................................................................................ 33 SQL Server ........................................................................................................................................2, 6, 7, 17 Standalone Reports..................................................................................................................................... 146

Cardholder Image Path .......................................................................................................................... 148 Create Queries to Schedule.................................................................................................................... 149

3

Page 95: Network Based Security Made Easy - Access Specialties€¦ · For technical assistance or further information, call the Tech Support Hot Line at (651) 453-1483, (651) 453-0581, or

4

Create Reports to Schedule.................................................................................................................... 148 Delete a Schedule .................................................................................................................................. 159 Edit Existing Schedules ......................................................................................................................... 158 Increment Date Ranges.......................................................................................................................... 156 Initial use ............................................................................................................................................... 147 Schedule Reports and Queries ............................................................................................................... 151 Setup on a workstation........................................................................................................................... 147 Setup on the SQL Server ....................................................................................................................... 146 View Existing Schedules ....................................................................................................................... 157

System Status ............................................................................................................................................. 131 Time Zones................................................................................................................................................... 39

Add .......................................................................................................................................................... 40 Delete....................................................................................................................................................... 44 Edit .......................................................................................................................................................... 43 View ........................................................................................................................................................ 44

Transaction History ...................................................................................................................................... 33 Transaction Monitor ........................................................................ 31, 33, 49, 50, 52, 81, 102, 127, 128, 129 Upgrade ........................................................................................................................................................ 26

Database .................................................................................................................................................. 27 Server Software ....................................................................................................................................... 26 Workstation Software .............................................................................................................................. 27

Zones ............................................................................................................................................................ 46