Sei sulla pagina 1di 563

P2000

Security Management System

software
user manual

version 3.14 SP5

24-10832-194 Revision E
December 2017
Copyright 2017
Johnson Controls
All Rights Reserved

No part of this document may be reproduced without the prior permission of Johnson Controls.
If this document is translated from the original English version by Johnson Controls, all reasonable endeavors will be
used to ensure the accuracy of translation. Johnson Controls shall not be liable for any translation errors contained
herein or for incidental or consequential damages in connection with the furnishing or use of this translated material.
Due to continuous development of our products, the information in this document is subject to change without notice.
Johnson Controls shall not be liable for errors contained herein or for incidental or consequential damages in
connection with furnishing or use of this material. Contents of this publication may be preliminary and/or may be
changed at any time without any obligation to notify anyone of such revision or change, and shall not be regarded as
a warranty.

Other Manufacturer’s Documentation


Johnson Controls does not duplicate documentation of other equipment manufacturers. When necessary,
Johnson Controls provides documentation that supplements that of other manufacturers. When unpacking your
equipment, keep all original manufacturer documentation for future reference.

Technical Support
For factory technical support, Johnson Controls authorized field technicians or authorized dealer representatives can
contact Global Security Solutions Technical Support by phone at (866) 893-0423 or (414) 524-1214, or by email at
support.globalsecuritysolutions@jci.com. They can also call the Field Support Center at (800) 524-1330 or (414)
524-5000 and use options 6, 1, 7.
End users and customers should contact their local Johnson Controls branch or authorized dealer for any of their
support needs (technical support, maintenance contracts, on-site field support, P2000 Software Service Agreements,
Service Partnerships, and so on). Visit http://www.johnsoncontrols.com/location-finder to find your local
Johnson Controls office.
For material returns contact the branch if the material was purchased through a Johnson Controls branch or through
the Product Sales Operations Team, if ordered through the Advanced Order Management System (AOMS) and
follow the RMA process; or contact the authorized dealer representative where the material was purchased directly.

Acknowledgment
Metasys® and Johnson Controls® are trademarks of Johnson Controls. All other company and product names are
trademarks or registered trademarks of their respective owners.
i

Table of Contents

Chapter 1: Introduction ..................................................................................................1


Getting Started ........................................................................................................................1
Chapter Summaries ................................................................................................................1
Manual Conventions................................................................................................................2
Basic System Components .....................................................................................................2
Main Menu...............................................................................................................................4
Registration Parameters..........................................................................................................5
System Overview ....................................................................................................................5
P2000 Application Programming Interface........................................................................5
Basic Configuration...........................................................................................................5
Network Communication.............................................................................................5
Communication Modes .....................................................................................................6
Types of Communication ............................................................................................6
Access Requests ..............................................................................................................7
Time and Time Zones.................................................................................................7
Valid or Invalid Badges ...............................................................................................7
Badge Privileges.........................................................................................................7
Controlling Special Access................................................................................................7
Overriding Basic Access.............................................................................................7
Granting Badge Privileges ..........................................................................................8
Alarms...............................................................................................................................8
External Device Alarms ..............................................................................................8
Door Alarms................................................................................................................8
Software-Only Alarms.................................................................................................8
P2000 Host Alarms.....................................................................................................8
Remote Alarms ...........................................................................................................8
Non-alarm Input Points .....................................................................................................8
Output Relays ...................................................................................................................9
Input and/Output Linking.............................................................................................9
Activating Outputs by Events......................................................................................9
Activating Outputs Manually .......................................................................................9
Events ...............................................................................................................................9
Database Partitioning........................................................................................................9
Logging On to the P2000 System Software ..........................................................................10
Changing the Default Login Values.......................................................................................11
Logging Off from the P2000 System Software ......................................................................12
Navigating through the P2000 System..................................................................................12
Mouse Conventions ........................................................................................................12

24-10832-194 Rev. E
ii TABLE OF CONTENTS

Instruction Conventions.........................................................................................................13
Menu Shortcuts...............................................................................................................13
Verification Passwords....................................................................................................14
Context Sensitive Help....................................................................................................14
Online Help .....................................................................................................................14
P2000 Tutorial.................................................................................................................14
Viewing the Toolbar ........................................................................................................15

Chapter 2: Configuring the System .....................................................................17


System Configuration Overview ............................................................................................17
Using the System Configuration Window........................................................................17
Set Up Workstations and Operators......................................................................................19
Set Up Workstations .......................................................................................................19
Workstation Field Definitions ....................................................................................20
Add Operators to the System..........................................................................................21
Creating Permission Groups.....................................................................................21
Assigning Operators .................................................................................................23
P2000 Directory Services Password Validation........................................................27
Changing the User Password...................................................................................28
Set Up User Accounts.....................................................................................................29
Adding a P2000 Login Name and Password into the Operating System .................29
Configure System Components ............................................................................................31
Registration Parameters .................................................................................................31
Site Parameters ..............................................................................................................32
Site Parameters Field Definitions .............................................................................33
Setting Up External IPs...................................................................................................46
Local Site ........................................................................................................................47
Local Configuration .........................................................................................................48
Time Zones .....................................................................................................................49
Configuring Time Blocks...........................................................................................49
Holiday Types ...........................................................................................................51
Holidays ..........................................................................................................................51
Using the Holiday Calendar ......................................................................................52
Assigning Holiday Types ..........................................................................................52
Configure Hardware Components.........................................................................................53
Hardware Configuration Sequence.................................................................................53
Configure Panels ............................................................................................................53
Panel Naming Conventions ......................................................................................53
Panel Configuration ..................................................................................................53
Soft Input Points .......................................................................................................54
Edit Panel Field Definitions.......................................................................................55
Configure Panel Components.........................................................................................61
Configure Panel Time Zones ....................................................................................62
Configure Panel Holidays .........................................................................................63
Configure Air Crew PIN Numbers.............................................................................63

24-10832-194 Rev. E
iii

Configure Panel Card Formats .................................................................................64


Configure Additional Panel Components..................................................................64
Configure Terminals........................................................................................................65
Set up Terminals for each Panel ..............................................................................65
Edit Terminal Field Definitions ..................................................................................66
Use the Add Hardware Module.................................................................................76
Create Terminal Groups ...........................................................................................78
Configure PIN Codes ......................................................................................................78
PIN Only ...................................................................................................................78
PIN + Card ID ...........................................................................................................79
PIN............................................................................................................................79
Four-Digit PINs .........................................................................................................80
PIN Duress ...............................................................................................................80
PIN Retry Alarm........................................................................................................80
Configure Input and Output Points and Groups..............................................................80
Create Output Points and Groups ............................................................................80
Create Input Points and Groups ...............................................................................82
Create Input Points ...................................................................................................82
Input Point Field Definitions ......................................................................................82
Configuring Reader Terminal Hardwired Input Points ..............................................88
Using Reader Terminal Door Contact Input Points...................................................88
Using the Terminal Down Input Point .......................................................................89
Create Input Groups .................................................................................................89
Configure Instruction Text.........................................................................................90
Configure Panel Card Events..........................................................................................91
Panel Card Event Field Definitions ...........................................................................92
Configure Soft Alarms.....................................................................................................93
Soft Alarms Field Definitions.....................................................................................94
Configure OSI Panels and Components.........................................................................95
Unsupported OSI Features.......................................................................................95
Unsupported P2000 Features...................................................................................95
System Architecture..................................................................................................95
Hardware Detection ..................................................................................................96
Badge Access Rights................................................................................................97
Configuration Sequence ...........................................................................................97
Configure OSI Facility Parameters ...........................................................................97
OSI Facility Field Definitions.....................................................................................98
Add New Portals .....................................................................................................102
Configure OSI Panels .............................................................................................103
Configure OSI Terminals ........................................................................................104
OSI Terminal Field Definitions ................................................................................105
Viewing OSI Wireless Devices Status ....................................................................107
Configure S321-IP Panels and Components ................................................................108
S321-IP Naming Conventions ................................................................................108
Configure S321-IP Panels ......................................................................................108
S321-IP Panel Field Definitions ..............................................................................109

24-10832-194 Rev. E
iv TABLE OF CONTENTS

Configure S321-IP Terminals .................................................................................112


S321-IP Terminal Field Definitions .........................................................................113
Configure S321-IP Input Points ..............................................................................116
S321-IP Input Point Field Definitions ......................................................................118
Configure S321-IP Output Points ...........................................................................120
Configure HID Panels and Components.......................................................................122
Hardware Requirements.........................................................................................122
HID Panel Naming Conventions .............................................................................122
Configure HID Facility Parameters .........................................................................123
Configure HID Panels .............................................................................................124
HID Panel Field Definitions.....................................................................................124
Configure HID Terminals ........................................................................................128
HID Terminal Field Definitions ................................................................................128
Configure HID Input Points .....................................................................................131
HID Input Point Field Definitions.............................................................................132
Configure HID Output Points ..................................................................................134
Troubleshooting Misconfigured HID Readers.........................................................135
Override and Lockout Reader Operation................................................................135
Configure Assa Abloy® IP Door Locks and Components.............................................136
Hardware Requirements.........................................................................................136
Assa Abloy Component Naming Conventions........................................................137
Configure Assa Abloy Facility Parameters .............................................................137
Using the Card ID feature with Assa Abloy Locks ..................................................140
Add a Door Service Router (DSR)..........................................................................140
Edit Assa Abloy Panels...........................................................................................143
Assa Abloy Panel Time Zones................................................................................145
Assa Abloy Holiday Definition.................................................................................146
Configure Assa Abloy Terminals ............................................................................146
Assa Abloy Terminal Field Definitions ....................................................................147
Configure Assa Abloy Soft Input Points..................................................................148
Assa Abloy Status Information................................................................................149
Real Time Functions...............................................................................................150
Change of State Reporting .....................................................................................150
Lockout Mode with Assa Abloy PoE Locks.............................................................150
File Maintenance on the DSR Server .....................................................................150
Configure Mercury Panels and Components ................................................................151
Configure Mercury Facility Parameters ..................................................................151
Mercury Facility Field Definitions ............................................................................151
Configure Mercury Panels ......................................................................................156
Mercury Panel Field Definitions ..............................................................................157
Configure Mercury Terminals .................................................................................160
Mercury Terminal Field Definitions .........................................................................163
Configure Mercury Inputs .......................................................................................172
Mercury Input Field Definitions ...............................................................................174
Configure Mercury Outputs.....................................................................................176
Aperio Locks Particularities ....................................................................................177

24-10832-194 Rev. E
v

Schlage ENGAGE Particularities............................................................................178


OSDP Reader Particularities ..................................................................................179
Configure Mercury Procedures and Triggers..........................................................180
Configuring Procedures ..........................................................................................180
Configuring Triggers ...............................................................................................182
Configure Mercury Elevators ..................................................................................184
Best Practices.........................................................................................................188
P2000 Badge Format....................................................................................................193
Configure Elevators and Cabinets.......................................................................................196
Elevator Access Control................................................................................................196
General Overview ...................................................................................................196
Basic Definitions .....................................................................................................197
Defining Floor Names ...................................................................................................197
Defining Floor Masks ....................................................................................................198
Configuring Elevators....................................................................................................199
Low Level Interface.................................................................................................199
Configuring Floors ..................................................................................................201
KONE HLI ...............................................................................................................202
Otis EMS - Security / BMS......................................................................................203
Otis Compass .........................................................................................................204
KONE IP .................................................................................................................208
ThyssenKrupp Serial ..............................................................................................213
Otis EMS Serial ......................................................................................................214
Defining Floor Groups...................................................................................................216
Creating Access Groups for Elevator Floors ..........................................................216
Cabinet Access Control.................................................................................................216
Defining Door Names .............................................................................................217
Defining Door Masks ..............................................................................................218
Configuring Cabinets ..............................................................................................218
Cabinet Configuration Field Definitions ..................................................................218
Configuring Doors...................................................................................................220
Defining Door Groups .............................................................................................220
Creating Access Groups for Cabinet Doors............................................................221
Configure Message Filtering and Message Routing ...........................................................221
Operators and Messages..............................................................................................221
Basic Principles and Definitions....................................................................................221
Sequence of Steps........................................................................................................222
Message Filtering..........................................................................................................222
Create Message Filter Groups................................................................................229
Message Routing ..........................................................................................................230
Configure P2000 Remote Servers..........................................................................230
P2000 Remote Server Field Definitions..................................................................230
Set up Access Groups and Cardholders .............................................................................232
Create Access Groups..................................................................................................232
Define Cardholder Options............................................................................................234
Define Companies and Departments......................................................................234

24-10832-194 Rev. E
vi TABLE OF CONTENTS

Create Access Templates.......................................................................................236


Access Template Edit Field Definitions ..................................................................236
Create Badge Formats ...........................................................................................237
Create Badge Purposes .........................................................................................238
Create Badge Reasons ..........................................................................................238
Create Required Cardholder Fields ........................................................................239
Create User Defined Fields ....................................................................................239
Define Automatic Employee IDs .............................................................................241
Entering Cardholders..............................................................................................242

Chapter 3: Operating the System .......................................................................243


Provide Access to Cardholders and Visitors .......................................................................243
Entering Cardholder Information...................................................................................244
Viewing Cardholder Information .............................................................................244
Cardholder Field Definitions ...................................................................................245
Adding a Cardholder Image....................................................................................247
Adding a Cardholder Journal ..................................................................................248
User Defined Fields ................................................................................................249
Entering Badge Information ..........................................................................................251
Badge Field Definitions...........................................................................................252
Viewing Badge Data ...............................................................................................258
Bulk Badge Change................................................................................................259
Entering Visitor Information...........................................................................................261
Add Visitor Field Definitions....................................................................................261
Defining Automatic Badge Numbers.............................................................................264
Synchronizing Badge Status.........................................................................................265
Recalling Images ..........................................................................................................267
Image Recall Filters ................................................................................................267
Image Recall FS (Full Screen)................................................................................268
To Activate Image Recall FS ..................................................................................268
Monitor Alarms ....................................................................................................................270
Alarm Configuration ......................................................................................................270
Alarm Handling .............................................................................................................271
Monitoring Remote Alarms ...........................................................................................272
Alarm Monitor Definitions........................................................................................273
Configuring Alarm Colors..............................................................................................277
Creating Predefined Alarm Response Text ..................................................................279
Monitoring Alarms Using the SIA Interface ...................................................................279
Message Forwarding ....................................................................................................281
Fire Alarm Control.........................................................................................................282
Basic Definitions .....................................................................................................282
Basic Fire Alarm Components ................................................................................283
Fire Alarm Server Configuration .............................................................................283
Fire Alarm Configuration.........................................................................................286
Fire Alarm Management .........................................................................................288

24-10832-194 Rev. E
vii

Monitoring Fire Alarms using the Alarm Monitor Window.......................................289


Viewing Fire Transactions Using the Real Time List ..............................................289
Monitoring Fire Components Using the Real Time Map.........................................289
Viewing Fire Components Using the System Status Window ................................289
Fire Component Events ..........................................................................................289
Perform Operator Controls ..................................................................................................290
Controlling Doors ..........................................................................................................290
Controlling Outputs .......................................................................................................291
Controlling Panel Relays...............................................................................................292
Security Threat Level Control........................................................................................293
Defining Security Levels .........................................................................................293
Applying Security Level ..........................................................................................293
Input Point Suppression................................................................................................295
Control Areas and Muster Zones ........................................................................................296
Area Control..................................................................................................................296
Configuring the Area...............................................................................................296
Controlling the Area ................................................................................................299
Defining Area Filters ...............................................................................................301
Displaying Area Details...........................................................................................301
Area Details Field Definitions..................................................................................302
Area Layout ............................................................................................................303
Area Reports...........................................................................................................304
Mustering ......................................................................................................................305
Basic Definitions .....................................................................................................305
Sequence of Steps .................................................................................................306
Define Risk Areas and Muster Zones .....................................................................306
Muster Zone Definition Fields .................................................................................307
Defining Zone Terminals.........................................................................................310
Defining Muster Terminals......................................................................................310
Defining Sequester Terminals ................................................................................311
Mustering Events ....................................................................................................312
Controlling Muster Zones........................................................................................313
Muster Zone Status and Control Field Definitions ..................................................313
Viewing and Printing Muster Transactions in Real Time ........................................316
Muster Reports .......................................................................................................316
Detect and Control Intrusion................................................................................................317
Basic Definitions............................................................................................................318
Sequence of Steps........................................................................................................319
Intrusion Configuration..................................................................................................319
OPC Aritech Intrusion Interface ..............................................................................319
Bosch Intrusion Interface ........................................................................................320
Mercury Intrusion Interface .....................................................................................323
Configuring Mercury Intrusion Zones......................................................................323
Mercury Intrusion Zone Field Definitions ................................................................323
Configuring Mercury Intrusion Areas ......................................................................324
Mercury Intrusion Area Field Definitions.................................................................325

24-10832-194 Rev. E
viii TABLE OF CONTENTS

Intrusion Alarms ............................................................................................................326


Intrusion Management ..................................................................................................328
Controlling Intrusion Items Using the Intrusion Control Window.............................328
Viewing Intrusion Transactions Using the Real Time List.......................................330
Monitoring Intrusion Using the Real Time Map.......................................................330
Viewing and Controlling Intrusion Items Using the System Status Window ...........330
Intrusion Events ............................................................................................................331
Track Hours On Site............................................................................................................332
Configuring Hours On Site Zones .................................................................................332
Hours On Site Reporting...............................................................................................333
Hours On Site (Detail) Report.................................................................................334
Hours On Site - Simple Report ...............................................................................335
Create Events......................................................................................................................335
Using Event Configuration Dialog Boxes ......................................................................335
Creating Triggers ..........................................................................................................336
Trigger Field Definitions..........................................................................................337
Creating Actions............................................................................................................337
Event Actions Field Definitions ...............................................................................338
OPC Server Event Actions .....................................................................................339
Counting Events............................................................................................................340
Creating Manual Triggers .............................................................................................341
Monitor the System in Real Time ........................................................................................342
Using the Real Time List...............................................................................................342
Monitoring Remote Messages in Real Time...........................................................342
Viewing Real Time List Transactions......................................................................343
To Display Color-Coded Transactions....................................................................345
Printing the Real Time List............................................................................................345
Using the Real Time Map .............................................................................................346
Sub Maps and Attachments....................................................................................346
Unlocking a Door ....................................................................................................348
Activating Events from the Real Time Map.............................................................348
Creating a Real Time Map ............................................................................................348
Set up the Map Maker Window...............................................................................348
Create an Importable Image...................................................................................349
Import an Image to Map Maker...............................................................................349
Place Device Icons on a Real Time Map................................................................350
Handling Alarms from the Real Time Map..............................................................351
Add Map Attachments ............................................................................................352
Duplicate Maps .......................................................................................................352
Adding Image Sets........................................................................................................352

Chapter 4: Advanced Features .............................................................................355


Partitions .............................................................................................................................355
Partition Types ..............................................................................................................356
Creating Partitions ........................................................................................................357

24-10832-194 Rev. E
ix

Video Imaging .....................................................................................................................358


Video Imaging Specifications........................................................................................358
Defining a Video Imaging Workstation..........................................................................358
Badge Design ...............................................................................................................359
Set Up Badge Fields...............................................................................................359
Encode Mag Track Formulas..................................................................................360
Create a Badge Layout...........................................................................................362
Set Up Badge Devices............................................................................................362
Printing a Badge ...........................................................................................................363
Capturing the Portrait and Signature Images .........................................................363
Viewing and Printing the Badge..............................................................................364
MIS Interface .......................................................................................................................365
MIS Prerequisites..........................................................................................................365
Understanding the Input and Output Tables .................................................................366
MIS and Partitioned Systems........................................................................................366
Using the MIS Interface.................................................................................................366
pivCLASS Integration ..........................................................................................................367
Specifications................................................................................................................367
Configure the pivCLASS Integration Component ...................................................367
Metasys System Integration ................................................................................................368
Defining MSEA Graphics ..............................................................................................368
Registering the P2000 Server with a Site Director........................................................368
Defining SNMP Traps ...................................................................................................370
Alarm Forwarding from the Metasys System to the P2000 System .......................371
SNMP Registration .................................................................................................371
SNMP Object Browser............................................................................................372
SNMP Object Properties and Alarm Options..........................................................373
Guard Tour ..........................................................................................................................374
Basic Principles and Definitions....................................................................................374
Sequence of Steps........................................................................................................375
Define System Hardware for Guard Tour Operation.....................................................375
Assign Tour Badges......................................................................................................375
Configure Guard Tours .................................................................................................376
Use the Guard Tour Configuration Window............................................................376
Timezones, Start and Abort Times .........................................................................378
Additional Guard Tour Options ...............................................................................379
Add Stations to the Guard Tour ....................................................................................380
Tour Station Definition Fields..................................................................................381
Control Guard Tours .....................................................................................................383
Guard Tour Handling ..............................................................................................385
Guard Tour Details .................................................................................................386
Guard Tour Notes ...................................................................................................387
View and Print Transactions in Real Time ....................................................................387
Generate Guard Tour Reports ......................................................................................388
Tour Configuration Report ......................................................................................388
Tour Transaction History Report.............................................................................388

24-10832-194 Rev. E
x TABLE OF CONTENTS

Tour Notes Report ..................................................................................................388


CCTV...................................................................................................................................389
DVR/VMS ............................................................................................................................390
Redundancy ........................................................................................................................390
Configuring everRun Enterprise Hosts .........................................................................391
FDA Part 11.........................................................................................................................392
Intercom ..............................................................................................................................393
Hardware Requirements ...............................................................................................393
Intercom System Hardware Verification .................................................................393
Intercom Configuration..................................................................................................394
Intercom Exchange.................................................................................................394
Intercom Stations....................................................................................................397
Intercom Control ...........................................................................................................398
Controlling Intercom Stations using the Real Time Map.........................................400
Intercom Events ............................................................................................................401
Intercom Transaction History Reports ..........................................................................401
P2000 Enterprise.................................................................................................................402
Define Enterprise Parameters.......................................................................................403
Assign Cardholders Enterprise Access.........................................................................404
Define Global Badge Access Rights .............................................................................405
Web Access ........................................................................................................................406
Sequence of Steps........................................................................................................407
Creating and Assigning Web Access Menu Permissions .............................................407
Defining Web Access Options ......................................................................................408
Web Access Options Field Definitions....................................................................408
Defining Request Approvers .........................................................................................410
Submitting Requests using Web Access ......................................................................413
Web Access Functions .................................................................................................413
Employee Services .................................................................................................413
Guard Services .......................................................................................................414
Management Services ............................................................................................415
Visitor Management................................................................................................415
Emergency Access Disable ....................................................................................416
Processing Web Access Requests ...............................................................................416
Visitor Request Management Field Definitions.......................................................418
Customizing the Web Access Interface ........................................................................420
Assigning Styles to Web Access Users ..................................................................420
Configuring the Web Access Smart Card Encoder.......................................................421

Chapter 5: System Maintenance ..........................................................................425


Downloading Data to Panels ...............................................................................................425
Monitoring Downloads.........................................................................................................426
Controlling Smart Download................................................................................................427
Controlling P2000 Services .................................................................................................428
Service Startup Configuration .......................................................................................428

24-10832-194 Rev. E
xi

P2000 Services Definitions.....................................................................................429


Starting and Stopping Service Control..........................................................................432
Controlling Services through the Service Monitor .........................................................432
Viewing Workstation Status.................................................................................................433
Automatic Software Updates.........................................................................................434
Viewing System Status........................................................................................................435
Writing Panel Database to Flash Memory...........................................................................444
Updating CK721-A Panels ..................................................................................................444
Updating Mercury Panels ....................................................................................................446
Performing Database Maintenance.....................................................................................447
To Perform Database Maintenance Functions .......................................................447
Database Maintenance Actions ....................................................................................448
Database Backup..........................................................................................................451
Configuring a Backup Device .................................................................................451
Manual Backups .....................................................................................................452
Advanced Backups .................................................................................................452
Automatic Backups .................................................................................................453
FDA Part 11 Backups .............................................................................................454
Database Restore .........................................................................................................455
System Validation .........................................................................................................457
CK721-A and S321-IP Data Import and Export ............................................................458
Importing CK721-A and S321-IP Data....................................................................458
Evaluating Imported Data .......................................................................................461
Saving the Log File .................................................................................................463
Exporting CK721-A and S321-IP Data ...................................................................463
Evaluating Exported Data .......................................................................................464
Item Synchronization.....................................................................................................464
Viewing Request Queue......................................................................................................466
Searching Specific Requests ........................................................................................468
Viewing Request Details ...............................................................................................469

Chapter 6: System Reports .....................................................................................471


Using P2000 Standard Reports...........................................................................................471
P2000 Standard Report Definitions.....................................................................................474
Selected Sample Reports....................................................................................................479
Run the Alarm History Report.................................................................................479
Run the Cardholders - Preprocessed Report .........................................................481
Run the Cardholders without Badges Report .........................................................483
Run the Panel Report .............................................................................................484
Run the Transaction History Report .......................................................................485
Creating Custom Reports....................................................................................................486
Creating a Custom Report Using SAP Crystal Reports ................................................486
Database Table Definitions.....................................................................................486
To Import a Custom Report into the P2000 System ...............................................486
Editing a P2000 Standard Report in SAP Crystal Reports............................................487

24-10832-194 Rev. E
xii TABLE OF CONTENTS

To Export an Existing Standard Report from the P2000 System............................487


To Edit the P2000 Report in SAP Crystal Reports .................................................487

Appendix A: Event Triggers/Actions ................................................................489


Trigger Types ......................................................................................................................489
Category: Alarm ............................................................................................................489
Category: Area..............................................................................................................490
Category: Audio-Visual .................................................................................................490
Category: Audit .............................................................................................................491
Category: Badge ...........................................................................................................491
Category: Counter.........................................................................................................492
Category: External Trigger............................................................................................492
Category: Fire Detector.................................................................................................493
Category: Fire IO Module..............................................................................................493
Category: Fire Panel .....................................................................................................493
Category: Fire Zone ......................................................................................................494
Category: Inputs............................................................................................................494
Category: Integration Component.................................................................................494
Category: Intercom .......................................................................................................495
Category: Intrusion Annunciator ...................................................................................495
Category: Intrusion Area ...............................................................................................495
Category: Intrusion Device............................................................................................496
Category: Intrusion Zone ..............................................................................................496
Category: Mustering......................................................................................................497
Category: Operator .......................................................................................................497
Category: Outputs.........................................................................................................497
Category: Panel ............................................................................................................498
Category: Terminal .......................................................................................................498
Category: Time Zone ....................................................................................................499
Category: Time/Date.....................................................................................................499
Event Action Types .............................................................................................................499
Category: Audio-Visual .................................................................................................499
Category: Badge ...........................................................................................................500
Category: CCTV............................................................................................................500
Category: Download .....................................................................................................501
Category: Host ..............................................................................................................501
Category: Inputs............................................................................................................504
Category: Intercom .......................................................................................................504
Category: Intrusion Annunciator ...................................................................................504
Category: Intrusion Area ...............................................................................................504
Category: Intrusion Zone ..............................................................................................505
Category: Metasys Interlock .........................................................................................505
Category: Mustering......................................................................................................505
Category: OPC Server ..................................................................................................505
Category: Outputs.........................................................................................................505

24-10832-194 Rev. E
xiii

Category: Panel ............................................................................................................505


Category: Security Level...............................................................................................506
Category: Terminal........................................................................................................506

Appendix B: Message Types and Sub-Types ............................................509

Appendix C: Panel Comparison Matrix ..........................................................513

Appendix D: Using a Keypad Reader on CK721-A Panels ...............517


Invoking Access Requests from a Keypad..........................................................................517
To invoke access with a Badge: .............................................................................517
To invoke access with PIN Only: ............................................................................517
To invoke access with Card ID: ..............................................................................517
To invoke access with PIN and Card ID: ................................................................517
To invoke access using PIN and Badge: ................................................................518
To invoke access with PIN and Badge, allowing PIN after Badge:.........................518
Invoking Air Crew Access Requests from a Keypad ...........................................................518
To invoke Air Crew access: ....................................................................................518
Invoking Timed Overrides from a Keypad ...........................................................................518
To invoke Timed Override with Badge:...................................................................518
To invoke Timed Override with PIN Only:...............................................................518
To invoke Timed Override with Card ID:.................................................................519
To invoke Timed Override with PIN and Card ID:...................................................519
To invoke Timed Override with PIN and Badge:.....................................................520
To invoke Timed Override with PIN and Badge, allowing PIN after badge: ...........520
Invoking Panel Card Events from a Keypad........................................................................521
To invoke Panel Card Events with Badge: .............................................................521
To invoke Panel Card Events with PIN Only: .........................................................521
To invoke Panel Card Events with Card ID: ...........................................................521
To invoke Panel Card Events with PIN and Card ID: .............................................522
To invoke Panel Card Events with PIN and Badge: ...............................................522
To invoke Panel Card Events with PIN and Badge, allowing PIN after badge: ......523
Quick Guide to Using Keypad Readers...............................................................................523

Appendix E: Troubleshooting ...............................................................................527


Authentication Process........................................................................................................527
Windows Authentication................................................................................................527
SQL Server Authentication............................................................................................527
P2000 Authentication....................................................................................................528
Testing the Workstation ................................................................................................528
Troubleshooting Workstation Problems ........................................................................528
P2000 Login Troubleshooting.................................................................................529

24-10832-194 Rev. E
xiv TABLE OF CONTENTS

P2000 Network Troubleshooting ............................................................................530


CCTV Control Troubleshooting...............................................................................531

Appendix F: Secured Premises Notification Settings .........................533


Configuration.................................................................................................................533
Sequence of Events......................................................................................................534

Appendix G: Secured Premises Notification Settings for Mercury


Panels with Keypad DM-21 (MRDT) ...................................535
Configuration.................................................................................................................535
Sequence of Events......................................................................................................536

Index.........................................................................................................................................537

24-10832-194 Rev. E
1

Chapter 1: Introduction

T Chapter Summaries
he Johnson Controls® P2000 security
management system represents the
latest technology in integrated security
solutions. Using Microsoft®  Chapter 1: Introduction. Presents the con-
Windows® operating systems, operators can ventions used throughout this manual, an
easily configure and use the P2000 software. overview of basic system components, and
menu options available in the system. The
Through its intuitively laid-out menus, users system overview familiarizes you with
can create cardholder records, define hardware P2000 system capabilities and how to log
components, and control access using badging, on, log off, and navigate through the system.
Closed Circuit Television (CCTV), Digital
 Chapter 2: Configuring the System.
Video Recorder (DVR) or Video Management
Directs you through tasks to properly con-
System (VMS), area control, mustering, and
figure your system for operation. Elements
elevator control to name a few, as well as mon-
featured in this chapter include: Worksta-
itor local and remote transactions and alarm
tions, Operators, Permissions, Site Parame-
activity in real time.
ters, Local Configuration, Time Zones,
Holidays, Panels, Terminals, Input and Out-
put definitions, Elevators and Cabinets,
Note: The screen captures shown in this man- Message Filtering and Routing, Access
ual may differ slightly, depending on the software
Groups, and Cardholder Options.
version you are using.
 Chapter 3: Operating the System.
Describes the primary features used to run
the P2000 system. It shows you how to pro-
Getting Started vide access to cardholders and visitors,
monitor alarms, control doors, set outputs
Operators familiar with Windows-based pro- and panel relays, control areas and muster
grams should easily master the P2000 soft- zones, control and detect intrusion in a
ware. This manual provides complete instruc- facility, create events, and monitor the sys-
tions on configuring and operating the system; tem in real time.
and virtually the entire manual content is  Chapter 4: Advanced Features. Describes
accessible from the P2000 online Help. features that provide a more efficient way to
operate and monitor your access control
Take a few moments to review the information system. These include Partitioning, Video
in this chapter and get familiar with the P2000 Imaging, MIS Interface, pivCLASS Integra-
system basics. tion, Metasys® System, Guard Tour, CCTV,
DVR/VMS, Redundancy, FDA Part 11,
Intercom, P2000 Enterprise, and Web
Access.

24-10832-194 Rev. E
2 CHAPTER 1
Introduction

 Chapter 5: System Maintenance. Manual Conventions


Describes the tools available to maintain
your system in optimum operating condition.
 Chapter 6: System Reports. Includes a The following terms and conventions are used
complete list of P2000 Standard Reports, throughout this manual.
along with a brief description of each and
how they might be used. Note: Notes indicate important points or excep-
 Appendix A: Event Triggers/Actions. tions to the information provided in the main text.
Lists all trigger categories, types, condi-
tions, and event action types available for
Event configuration.
Appendix B: Message Types and
TIP: Tips describe time-saving or additional
 information.
Sub-Types. Lists all message types and
sub-types available for Message Filtering.
 Appendix C: Panel Comparison Matrix. IMPORTANT: Important messages remind
Lists the panel types supported by the you that certain actions, if not performed exactly
P2000 system, including their features and as stated, may cause damage to equipment or
capabilities. make your system non-operational.
 Appendix D: Using a Keypad Reader on
CK721-A Panels. Presents the sequence of Provides essential information
actions at a keypad reader. relevant to the program.
 Appendix E: Troubleshooting. Explains
connection problems and how to solve them. APPLICATION NOTE

 Appendix F: Secured Premises Notifica-


tion Settings. Describes the sequence of
actions needed to notify operators when a Basic System Components
panel card event is used to unsuppress alarm
signals.
The following terms describe the P2000 sys-
 Appendix G: Secured Premises Notifica- tem, including hardware and software terms,
tion Settings for Mercury Panels with computer equipment, and field equipment. The
Keypad DM-21 (MRDT). Describes the following illustration displays a basic configu-
sequence of actions needed to notify opera- ration of the P2000 system with CK721-A net-
tors when a Mercury intrusion keypad ter- work panels. For hardware installation infor-
minal is used to unsuppress alarm signals. mation, refer to the instructions provided with
your panel type.

P2000 Server – The main computer in the sys-


tem. The system Server runs the P2000 system
software, stores database information, and com-
municates with the field panels. The P2000
Server may also be referred to as the Database
(DB) and Communications (Comms.) Server.

24-10832-194 Rev. E
3

Figure 1-1.P2000 System with Network Panels

P2000 Enterprise – System that consists of one


IMPORTANT: We recommend the system
or more P2000 sites.
Server be used only as a Server and not as an
additional day-to-day workstation. You must pro-
P2000 Site – Uniquely identified by its local
tect the Server from physical access by unautho-
rized users. Use the Server only for those tasks site name. A P2000 site can have multiple
that must be performed from the Server. locations but only one P2000 Server.

P2000 Location – A physical location or place


Workstations – Workstations allow additional with a P2000 workstation, panel, terminal,
users to monitor and configure the P2000 sys- input, or output point.
tem. Workstations communicate with the
Server via an Ethernet TCP/IP local area net- Encryption – All real-time messages from the
work (LAN). P2000 server to services and workstations are
encrypted using Advanced Encryption Stan-
P2000 Web User Interface (UI) – Web-based dard (AES) with a 256-bit key.
software from Johnson Controls that allows
authorized users to access and use certain System Printer – System printers, connected
P2000 applications via a web browser. Refer to either to the Server or to workstations, provide
the P2000 Web UI Installation Guide for real-time transaction printing or report printing
details. capabilities.

24-10832-194 Rev. E
4 CHAPTER 1
Introduction

Field Panels – This term refers to CK721-A External Device – This general term describes
S321-IP, OSI, HID®, Assa Abloy®, and Mer- any device wired to one of the terminal types,
cury network panels. These connect to termi- such as readers, motion sensors or other input
nals and communicate with the Server. See devices, door strikes, or audible alarm devices.
Appendix C: Panel Comparison Matrix for a
detailed list of features and capabilities.
Main Menu
Terminals – Terminals provide a point of con-
tact with panels to facilitate a variety of func-
tions. Depending on your panel type, some ter- The Main menu is the backbone of the P2000
minal boards can be used to connect readers, system. From here, you select each feature and
input points, and output points and can be option available in the system. While logical
mounted in the basic panel enclosure or an operation of the system does not follow the
expansion enclosure. CK721-A terminals con- Main menu from right-to-left, every menu and
nect to RDR2S-A and RDR8S modules. option is displayed.

24-10832-194 Rev. E
5

Registration Parameters Non-alarm Input Points – Provides a basic


description of input points.

Parameters associated with your system, such Output Relays – Provides a basic description
as maximum number of badges, terminals, and of output relays.
workstations are enabled via the entry of a Events – Describes how input points and out-
Registration Key. Also, if your system takes put relays can be manipulated automatically or
advantage of advance features such as Enter- manually in various ways to create events.
prise or integrate with third-party hardware
such as OSI devices, it requires the entry of Database Partitioning – Provides an over-
Option Keys to control those features (some of view of how database partitioning is used
these features must be selected during installa- within the P2000 system.
tion). Both the Registration and Option keys
are provided by Johnson Controls and are
associated with your purchase contract. Refer P2000 Application Programming
to the P2000 Software Installation manual for Interface
instructions.
Various published P2000 Application Pro-
gramming Interfaces (APIs) are available for
third-party integrations into the P2000 system.
System Overview The APIs published by Johnson Controls are
product features that are tested and validated;
This section is designed to help P2000 users customer issues related to their use can be
understand basic concepts before configuring resolved through Hotfixes and Service Packs
the system. The following topics are covered: by raising cases through the appropriate sup-
port channels. Full technical support is avail-
P2000 Application Programming Interface able for tickets associated with P2000 system
– Provides information on P2000 application APIs published by Johnson Controls.
programming interfaces.

Basic Configuration – Describes an overview


of system configuration. IMPORTANT: Direct database manipulation
may void all warranties, and may render the
Communication Modes – Describes P2000 P2000 system unsupportable.
system operating modes and communications
types.
Basic Configuration
Access Requests – Shows how the system
determines whether a cardholder is granted or
denied access at a door. Network Communication

Controlling Special Access – Describes fea- CK721-A panels support terminals, readers,
tures that can override normal system opera- input, and output devices, and connect to the
tion. P2000 Server via a network card. Each panel
has an embedded 32-bit processor, with
Alarms – Describes various types of alarms. 64-reader capability.

24-10832-194 Rev. E
6 CHAPTER 1
Introduction

You can configure an entire system using Central – This mode is useful when you want
CK721-A panels, or use them in combination to assign access restrictions on a global scale
with S321-IP panels; or use third-party devices (throughout the entire system). All access
such as OSI, HID, Assa Abloy, or Mercury requests are forwarded to the Server for an
panels. access grant or deny decision. Central mode
has the most impact on system performance
A single workstation is shown in Figure 1-1 on (the slowest), and should be used only when
page 3; however, a fully configured Server can necessary.
support multiple workstations. The number of
workstations (including the Server) depends on Shared – Access decisions are made either at
the type of system you purchased. the panel level or by the Server. Field panels
first search for a badge in their memory, as in
If Integrated Video Imaging is part of the con- Local mode. If a badge’s record is not found at
figuration, the Video Imaging workstation is the panel level, the access request is then for-
attached to the network similarly to the work- warded to the Server, as in Central mode.
stations. Shared mode is useful when a panel’s badge
capacity is exceeded.
Communication Modes Shared mode is the preferred method of opera-
The P2000 Server communicates with panels tion. This mode not only gives you the high
that provide reader interfaces, input points, or performance of Local mode for badges stored
output relays. Communication is bi-direc- in the panel memory, but also gives proper
tional, some messages are sent from the Server access to all badges even if they are not stored
to the field panels, other messages are sent in the panel memory.
from the panels to the Server, and then can be
distributed within the system (through work- Types of Communication
stations). The volume of messages across the
communication link depends, in part, on the The P2000 Server communicates with system
overall operating mode of the system. field panels via Transactions, Downloads, and
Commands.
While several factors affect overall system per-
formance (performance is defined as the speed Transactions – Transactions indicate some
with which communication occurs between the form of system activity. They can include
Server, workstations, and field panels), the items such as access requests and general sys-
most significant factor is operating mode, tem messages such as when a panel loses com-
which is defined when configuring the system. munication with a reader. Typically, transac-
The P2000 system provides the following three tions represent communication initiated at field
operating modes for CK721-A panels: panels and sent to the P2000 Server.

Local – In this mode, the field panels make all Downloads – Downloads refer to the transfer of
access decisions. This eliminates the need for system configuration information from the
panels to communicate with the Server every P2000 Server to the memory of the field pan-
time an access request is presented at a reader. els. This includes information such as badge
Local mode provides the best overall system records and access rights. Network panels can
capability; however, access is denied to those be downloaded in minutes using the download
badges not stored in the panel memory. feature.

24-10832-194 Rev. E
7

Commands – Commands, such as opening a Badge Privileges


door manually, are initiated at the Server and
sent to the appropriate panels. Badge privileges relate to the time of day,
areas, and access groups a cardholder can be
granted access. A badge can be valid in all
Access Requests other respects, but the cardholder can be
restricted as to the times and days they can
The basic function of the P2000 system is to enter your facility, or an area within the facil-
grant or deny cardholders access to areas in
ity. The P2000 system also provides the means
and around your facility or facilities.
to grant cardholders special privileges, which
The P2000 system makes access decisions is also described as special access.
based on:

 Time and time zones Controlling Special Access


 Valid or invalid badges In addition to basic access, operators can con-
 Badge privileges trol special access for overriding the normal
operation of the system. The two main catego-
ries for special access are:
Time and Time Zones
Almost every P2000 system feature can be  Overriding basic access
controlled by time. This includes basic access  Granting badge privileges
where readers and badges can be enabled or
disabled. By configuring time zones, you can Overriding Basic Access
determine the following:
In most cases, you may want to configure the
 when any reader-controlled door in your P2000 system for basic access control. You
facility can grant access to a valid badge can also configure the system for special
 at which times during a 24-hour period a access, which may be necessary at predeter-
cardholder can be granted access at a mined times. The P2000 system allows you to
reader-controlled door account for both, with features such as the fol-
 reader override lowing:

 Timed Override – A door can be automati-


Valid or Invalid Badges cally unlocked between specified times.
The P2000 system provides many methods for  Extended Access – A door can be manually
you to determine what constitutes a valid unlocked and propped open as needed.
badge in your system. These include the use of  Auxiliary Access – An external device, such
the following: as a push button, can temporarily open a
door without the use of a badge or PIN
 Facility codes
code.
 Encoded badge number
 Issue level
 Expiration date
 Badge time zones
 Badge access groups

24-10832-194 Rev. E
8 CHAPTER 1
Introduction

Granting Badge Privileges Door Alarms

The other means of providing special access is When a door is unsecured because of unautho-
through badge privileges. Privileges are con- rized activities, the door is considered to be in
figured as part of a badge’s definition. Badge a forced alarm state and is reported to the sys-
privileges allow the cardholder the following tem. The system can also monitor cases where
access: the door is propped open after a valid access
grant.
 access to the facility outside normal operat-
ing hours.
Software-Only Alarms
 access using different access times, to sat-
isfy the requirements for assisted access Software-only alarms are unlike external
according to ADA (Americans with Dis- device alarms in that software alarms are trig-
abilities Act). gered by system activities (such as when a
 extended access by manually executing panel loses AC power), rather than by external
override features. devices, which are wired to the system panels
and terminals.
Alarms
P2000 Host Alarms
Another fundamental principle of P2000 sys-
tem operation is to report alarm activities. The P2000 system also reports host alarms,
Alarms can be triggered by several methods such as alarms originated by P2000 event
including the following: actions, mustering alarms, or FDA record
retention alarms.
 External device alarms
 Door alarms
Remote Alarms
 Software-only alarms
 P2000 host alarms These are external device alarms, door alarms,
software-only alarms, and host alarms that are
 Remote alarms
generated at remote sites.

External Device Alarms


Non-alarm Input Points
External devices, such as motion or glass break
sensors, can be wired to P2000 input points. The P2000 system allows you to use input
When these devices become active, as in a points for activities other than alarms. For
motion sensor detecting movement, they trig- example, a motion sensor wired to an input
ger the input point, which causes an alarm. You might be used to turn on lights.
can define how input points respond when acti-
vated, whether or not they trigger output
relays, and at which times an alarm can be acti-
vated. This offers you the flexibility of auto-
mating the alarm operation.

24-10832-194 Rev. E
9

Output Relays Events


Where input points are triggered by external Events are sequences of system commands or
devices, output relays allow you to trigger actions that may be activated at a predefined
external devices using the P2000 system. time or on an as-needed basis. You can use the
These devices might include warning indica- P2000 system to activate and deactivate events
tors for alarm situations or non-alarm related either manually or automatically. Examples of
functions such as lighting or environment con- events include the following:
trol. In general, output relays are activated by
Card Events – A badge is assigned event privi-
one of the following:
leges and may execute an event from a reader
 Input and output linking equipped with a keypad.
 Events Timed Events – Events are assigned specific
 Manually activation dates and times, and are activated or
deactivated automatically by the P2000 system.
Input and/Output Linking System Events – Event triggers can be based
on a variety of system activities, such as when
The P2000 system allows you to form individ- an operator attempts to log on with an invalid
ual output relays into groups (as a note, you user name or password.
can also group input points). The primary pur-
pose of linking inputs to output relays is to
trigger external devices, such as: Database Partitioning
 in emergency situations, using room light- You can divide the P2000 database into
ing or warning indicators like flashing smaller sections that can be individually man-
lights or sirens, aged. Database partitioning structures define
what data is accessible by an individual opera-
 automatically activating a building function
tor, or by a group of operators. You can create
such as lighting or environment control.
as many partitions as you need, depending on
your system requirements. After partitions are
Activating Outputs by Events created, they can be assigned to all major sys-
tem components. See Partitions on page 355
As an alternative to input and output linking, for more information.
output relays can also be activated either man-
ually or automatically by events. There are two types of partitions:

Super User – This partition is automatically


Activating Outputs Manually created by the system and is the main partition
in the database. Only one Super User partition
Operators can manually activate outputs using can be defined. This partition can be assigned
the P2000 Output Control application. to multiple operators and has access to all par-
titions of the system.

Regular – Regular partitions are assigned to


operators. These partitions allow the operator
to add, modify, delete, or view records within
their assigned partition.

24-10832-194 Rev. E
10 CHAPTER 1
Introduction

If you are new to the P2000 system or new to


security management in general, it is important
you have at least a basic understanding of these
principles before configuring the system. What
is important to keep in mind is the relationship
between the various system features.

As you work through Chapters 2 and 3, these


principles are reinforced as you learn which
options relate to which specific system fea-
tures.

Logging On to the P2000


System Software

The P2000 system uses a user name and


unique password to establish each authorized
user. Passwords are used to protect access
within a database or system. A password is a 2. Place the cursor in the User Name field and
unique combination of alphanumeric charac- enter Cardkey.
ters, such as in a string of letters and numbers. 3. Press <Tab> to move to the Password field
and enter master.
Logging on to the P2000 system is similar for
the Server and for a workstation. 4. Click OK or press <Enter> to continue.
The P2000 Main menu bar displays.
1. Double-click the P2000 icon on your Win- 5. The Partition selection box that appears
dows desktop, on the right side of the P2000 toolbar,
shows Super User as the default Partition
option. Operators that belong to the Super
User partition have access to all areas of
the P2000 program, see Partitions on
page 355.
or, from your Windows desktop, select
Start>Programs>Johnson Controls>
Note: The Lock icon on the right hand corner of
P2000>P2000. The Login window opens. the P2000 menu bar indicates that all real-time
messages from the P2000 server to the worksta-
tion are operating in Encrypted mode.

Note: By default, the Alarm Monitor window


automatically opens when logging on to the
Server. For detailed information, see Monitor
Alarms on page 270.

24-10832-194 Rev. E
11

Changing the Default Login 3. The Operator Account/Profile window dis-


plays.
Values

By using the default User Name and Password,


whether at the Server or at a workstation, you
are logging on to the system with Super User
privileges. This account has, by default, full
privileges for viewing and changing system
parameters. After initially logging on to the
4. Select Cardkey and click Edit. The Edit
system, you have the option to change the
Operator dialog box opens.
default login User Name and Password to pre-
vent unauthorized users full access to the sys-
tem.

You cannot remove the default account from


the system. Instead, use the following steps to
change the default user name and password,
thereby restricting access to the Super User
account.

To Change the Default User Name and


Password

1. From the P2000 Main menu, select Opera-


tor>Operator Account/Profile. 5. Information for the Cardkey user displays.
To change the User Name and Password,
go to each field and enter the new informa-
tion.
6. Re-enter the password in the Confirm
Password field.

2. The password verification dialog box dis-


IMPORTANT: Once you change the default
plays. Type master and click OK or press login password, you can only use the new User
<Enter> to continue. Name and Password to access the Super User
account.

24-10832-194 Rev. E
12 CHAPTER 1
Introduction

7. You may also enter the Full Name of the Navigating through the
operator assigned to the User Name. For
more details on adding operator informa-
P2000 System
tion into the P2000 system, see Add Opera-
tors to the System on page 21. The P2000 system provides an easy-to-use
8. Click OK to save your settings. graphical user interface (GUI) for making
selections and entering data.
9. Click Done to close the window.

Mouse Conventions
Note: You must log off from the P2000 system
for the changes to take effect (see the following The standard pointing device for the P2000
section for details). Server and workstations is a two-button
mouse. The left mouse button is the primary
mouse button. The following terms are used
throughout this manual to describe how you
Logging Off from the P2000 navigate through the P2000 system.
System Software
Pointer – The pointer may display differently
depending on the action that you are perform-
After changing the default User Name and ing. For example, the pointer is normally an
Password, you must log off from the P2000 arrow, but changes to an hourglass to denote
system. You are not required to shut down the the system is saving, retrieving, or compiling
Server or workstation. information. When in a text field, the pointer
changes to a cursor.
To Log Off from the P2000 System: Select – This term directs you to select a menu,
1. From the P2000 Main menu, select submenu, or list item. For example, select
Exit>Exit. Control>Output Control means to click on the
Control option from the Main menu bar, then
click on the Output Control submenu.

Clear – Click again on a selected radio button


or check box to clear the option.

Click – Press and release the left mouse button


2. The system prompts for logoff verification. once. Note that click always refers to the left
mouse button, unless the right mouse button is
specifically called out in the text.

3. Click Yes or press <Enter>. The system


returns to the Windows desktop.

24-10832-194 Rev. E
13

Selected Cleared

Double-click – Quickly press twice and release


the left mouse button. An arrow indicates there are
submenus for this menu item.
Click and Drag – Press and hold down the left
mouse button to select an item, drag and point
to where you want to place the object; then Menu Shortcuts
release the mouse button.
In the P2000 system the mouse is normally
used, but you may also use key combinations
Instruction Conventions to select the menus and submenus from the
Main menu bar, or to open windows.

For clarity, the following convention is used


throughout the manual for selecting P2000 To Select Menus or Submenus Using a
menus, submenus, and options: Menu Shortcut:

From the P2000 Main menu, select Config> 1. Select the P2000 Main menu bar as the
Cardholder Options>Company. active window.
2. Press <Alt> + <the underlined letter
In this example, click the Config option from shown on the Main menu bar>.
the P2000 Main menu bar, then click the
Cardholder Options menu, and then click the 3. Once a Main menu is open, simply press
Company submenu item to open the Company the underlined letter of the submenu item
dialog box. you wish to select.

To Tab through Open Windows on the


Screen:

1. When you have several windows open,


you can press <Alt> + the Tab key to bring
open windows forward and make them
active, including the P2000 window.

24-10832-194 Rev. E
14 CHAPTER 1
Introduction

To Tab through Fields on a Window: Online Help


1. Once an active window is selected, you can The P2000 software contains virtually the
use the Tab key to tab through fields on the entire User’s Guide in online documentation
window. accessed via the Help option on the Main
menu. You can also press F1 for context-sensi-
tive help from most windows in the program
Verification Passwords and most individual fields.
The P2000 software offers added security by
Access information under Introduction, Sys-
requiring operators to verify their login pass-
tem Configuration, System Operation,
word when performing certain system-critical Advanced Features, System Maintenance, or
functions. If the Verify Password for Critical System Reports; or use the Index to search for
Functions option is selected in the Edit Opera-
specific topics.
tor dialog box (see User Info Tab on page 24),
when operators access some functions, a pass-
word verification dialog box displays for the P2000 Tutorial
operators to enter their login password.
The tutorial presents an overview of the P2000
security system’s major features and options. It
also covers several system configuration,
installation, and troubleshooting tips. Adobe®
Flash is required to run the tutorial and can be
installed when you start the tutorial program
from the Help option in the P2000 menu bar.

The modular design enables navigation to all


or specific tutorial topics. The tutorial intro-
duces topics and sub-topics, which are dis-
The purpose of a verification password is to cussed through Flash presentations that pro-
prevent unauthorized users from performing vide audio narration (with matching text if
system-critical functions at unattended PCs. desired) to guide users on how to make the
most of P2000 main popular features. Software
screenshots are used to walk the user through
Context Sensitive Help actual configuration and installation steps.
Help is available from most P2000 windows or
dialog boxes by pressing F1. Once you press
F1, help text for the selected item displays in a
separate window.

24-10832-194 Rev. E
15

Viewing the Toolbar 3. To open a dialog box from the toolbar,


click the desired icon. Choices are: Access
The toolbar gives you easy access to the more Cardholder, Alarm Monitor, Real Time
commonly used windows in the P2000 system. List, Real Time Map, System Configura-
tion, System Status, Security Level Con-
To Use the Toolbar: trol, and Launch AV Player (if the
DVR/VMS option is available in your
1. If the toolbar is not visible, from the P2000 facility).
Main menu select View>Toolbar. The
4. To position the toolbar anywhere on the
toolbar displays.
screen, double-click the left handle, click
the title bar and drag it to the desired posi-
tion.
5. To close the toolbar, click the Close button,
or select View>Toolbar from the P2000
Main menu.
Click and drag to another position

2. Place the mouse over an icon to display the Note: A Partition selection box is available on
name of the icon. the right side of the toolbar and can also be posi-
tioned anywhere on the screen

24-10832-194 Rev. E
16 CHAPTER 1
Introduction

24-10832-194 Rev. E
17

Chapter 2: Configuring the System

T
o operate your P2000 Security Manage- After you configure your system components,
ment System, you must set up and con- these items are available to you as you work
figure the software to communicate your way through hardware configuration. The
with the system hardware. After you parameters set up during hardware configura-
complete all hardware installations, you are tion are accessible when you begin creating
ready to configure the P2000 software. Config- your database. As soon as the system is com-
uration is typically performed by a System pletely configured, you are ready to begin sys-
Engineer or System Administrator. tem operation.

System Configuration Note: We recommend you develop a naming


Overview convention plan to apply to panels, terminals,
inputs, outputs, and other system components
when you configure the P2000 software. The fol-
Configuration should progress in a logical lowing characters are not allowed when defining
sequence. For example, you must configure the P2000 components: @ . , ? * # : ' " / \ [ ] < > | $.
system site parameters before you can assign
them to panels; you must configure panels
before you can assign terminals to them; and Using the System Configuration
you must configure terminals before you can Window
create terminal groups, inputs, and outputs.
The System Configuration window provides
This chapter guides you through a logical pro-
quick access to many component configura-
gression. After you configure the system, you
tions. Select Config>System from the P2000
always have the option to return to a compo-
Main menu bar and enter your password if
nent and make changes if necessary.
prompted. The System Configuration window
The following elements must be set up to com- opens, as shown in the following page. All root
plete system configuration: items in the system configuration tree display
on the left side of the window (windowpane).
 Set Up Workstations and Operators A plus (+) sign next to an item indicates that
 Configure System Components branches exist beneath them. When you select
 Configure Hardware Components a branch in the tree, the detailed settings and
values relating to that selection are listed on
 Configure Elevators and Cabinets
the right windowpane.
 Configure Message Filtering and Message
Routing You can add as many items to the configura-
tion as you need, depending on your Registra-
 Set up Access Groups and Cardholders
tion Parameters. After you add items to the
system, you can modify them as desired.

24-10832-194 Rev. E
18 CHAPTER 2
Configuring the System

To Add an Item to the System 3. Continue to add items in this manner until
Configuration all components and their related controls
are configured in the P2000 system.
1. From the configuration tree, select the item
you wish to add, and either click Add at
the bottom of the window, or right-click to To Edit System Configuration Items
access a shortcut menu and select Add.
1. From the configuration tree, select the item
The appropriate dialog box opens.
you wish to modify and click Edit at the
bottom of the window (or right-click the
item and select Edit from the shortcut
menu). The Edit dialog box opens.
2. After you complete your changes, click
OK to save the settings and return to the
2. After you add the information according to System Configuration window. The
the field definitions, click OK to return to changes are reflected on the right window-
the System Configuration window. When pane.
dialog boxes offer several configuration
tabs, such as in the Panel or Terminal Edit
dialog boxes, continue to the next tab, as
applicable. After you enter all settings,
click OK to save your data and return to
the System Configuration window. The
settings for the new item are listed on the
right windowpane.

24-10832-194 Rev. E
19

To Search for System Configuration Set Up Workstations and


Items
Operators
1. If you wish to search for a specific item,
enter the name of the item in the Search
Before configuring system and hardware com-
field at the top right corner of the System
ponents, Workstations and Operators should
Configuration window.
be properly set up to communicate with the
You can enter complete or partial words; Server. While Workstations are assigned from
no wildcards are needed, and this field is the System Configuration window, Operators
not case sensitive. are assigned via the P2000 Main menu. The
2. Click Search. The System Configuration following sections describe how to:
window displays the match entered in the
 Set Up Workstations
search field.
 Add Operators to the System
3. Continue clicking Search until you find
the item you are looking for.  Set Up User Accounts

Refreshing the System Con- Set Up Workstations


figuration Window: The Re-
fresh button is used to update Workstations communicate with the Server via
changes made at the Server the network. The Server can communicate
APPLICATION NOTE
or other workstations. with a maximum number of Workstations con-
currently, based on your registration options.
Workstations are assigned a partition, a name,
To Print System Configuration Items a time zone, and designated as public to make
the workstation visible to all partitions. A
1. From the configuration tree, select the item
workstation must be configured as a Badge
you wish to print. The settings associated
Station if it operates Video Imaging. When
with the selected item are listed on the
you click a Workstation on the System Config-
right windowpane.
uration window, the current settings display on
2. Click Print at the bottom of the window. the right windowpane.
3. Select a printer name and any other infor-
mation for the printer to be used. Printers
must first be set up using the Windows Note: To log on from a workstation to the
Printer Settings dialog box. See your sys- P2000 system, you must set up user accounts in
tem administrator if you need more infor- the Windows operating system. See Set Up User
mation, or refer to your Microsoft Accounts on page 29.
Windows documentation.
4. Click OK to print. To Add a Workstation

1. In the System Configuration window,


expand Site Parameters.
2. Select Workstation and click Add to
access the Workstation dialog box.

24-10832-194 Rev. E
20 CHAPTER 2
Configuring the System

Note: A workstation must be made Public to


allow users from different partitions to log on at
that workstation.

Name – Enter the name of the Workstation.


This must be the name of this workstation, as
configured in the Windows operating system.
You can also click the [...] button to find a
workstation on your network (see your system
administrator).

Location – Enter the location of the worksta-


tion. If you define this as a Badge Station (see
page 358), this field describes the location
where badges are issued. You can also enter
the name of the local site (see page 47).

Inactivity Timeout – Enter the number of min-


3. Enter the information required. (See Work- utes (between 0 and 480) that this workstation
station Field Definitions for detailed infor- waits without any activity. When this time
mation.) elapses, the currently logged in operator is
4. Click OK to save your entries and return to automatically logged out of this workstation
the System Configuration window. The (all P2000 applications, including the P2000
new Workstation displays beneath the main Main menu are automatically closed). A higher
Workstation icon. value gives the workstation more time to
5. Click the new Workstation icon to display respond. The default value of 0 indicates that
the current settings on the right window- this feature is disabled.
pane. It may be necessary to click the plus Enable – Click to have the system recognize
(+) sign to display all configured Worksta- this Workstation.
tions on the system.
Badge Station – Click to define this worksta-
Note: Only operators that belong to the Super tion as a Video Imaging station.
User partition can add, edit, or delete any worksta-
Server – Identifies the workstation that oper-
tion. In addition, operators cannot delete their cur-
rently logged on workstation; however, an operator ates as the system Server.
can delete other workstations that are currently
active. A message displays to confirm the deletion.
Alarm Monitor – Settings in this box define
whether or not the Alarm Monitor window dis-
plays at the workstation after logging on.
Workstation Field Definitions Select one of the following options:

Partition – Select the partition to which the  Normal – Default option for workstations.
Workstation has access. See Partitions on Enables an authorized operator to open and
page 355. close the Alarm Monitor window on this
workstation.
Public – Click this check box to make this
Workstation visible to all partitions.

24-10832-194 Rev. E
21

 Launch Automatically – The Alarm Monitor


Note: You can also use Active Directory
window automatically starts after logging accounts (user or group accounts) to provide
on. Operators with the appropriate permis- operator access to the P2000 system.
sions can open and close the Alarm Monitor
window, if required.
 Always Active – Default option for Server Creating Permission Groups
stations. The Alarm Monitor automatically
starts after logging on and cannot be closed Menu permissions define the system elements
by the operator. This is the required option to which an operator has access. For example,
for UL listed sites, where all alarms must a guard operating a P2000 workstation at a
always be visible at the Server to meet UL warehouse gate may need to have access to
requirements. alarm monitoring, but may not need access to
the Cardholder functions. Some operators may
Timezone – Assign a time zone to the worksta- need to view system functions, but are not
tion to define the days and hours it can be allowed to edit features, and some operators
used. See Time Zones on page 49 for detailed may need full permissions such as a system
information. administrator or designee.

The P2000 software is delivered with a default


Note: After your change the time zone, you operator (Cardkey) that can be used to config-
must close all P2000 applications and restart all ure the system, and therefore has all menu per-
P2000 services. missions. You can completely configure the
system using only the default operator, or you
Message Filter Group – Assign a Message Fil- can create additional groups that include vari-
ter Group to define which messages are trans- ous combinations of permissions depending on
mitted to this workstation. Select <none> if the responsibilities and access needs of the
you wish to transmit all messages to this work- individual operators. Once permission groups
station. See Configure Message Filtering and have been created, they are accessible from the
Message Routing on page 221 for detailed Edit Operator dialog box. Menu Permission
information. Groups are password protected.

Menu permission groups can also be created


Add Operators to the System for cardholders. These are assigned via the
Cardholder Edit dialog box and provide per-
Access to the system is controlled by operators missions to Web Access functions; see Web
that have been assigned system privileges and Access on page 406.
permissions that allow them to perform vari-
ous system functions. Therefore, you must
first create operator records for each person To Create a Permission Group
who operates the Server or a workstation in the
1. From the P2000 Main menu, select Opera-
P2000 system. The operator record consists of
tor>Menu Permission Groups.
the operator’s login name, password, menu
permissions, and other features that determine 2. Enter your password if prompted. The
how this person operates. Menu permissions Menu Permission Groups dialog box
are assigned by group and must be created opens.
before they can be available for assignment to
the operators.

24-10832-194 Rev. E
22 CHAPTER 2
Configuring the System

– Web icon to indicate items that are


defined for cardholders who require
permissions to Web Access functions; see
Web Access on page 406.
– Web UI icon to indicate items that
are accessible from P2000 Web User
Interface applications. Refer to the P2000
Web UI Installation Guide for details on
the different permission levels.
– Web API icon to indicate items that
are defined for users who require per-
missions to interact with Web API func-
tions. You cannot use Web UI features
All currently defined menu permission without enabling the appropriate Web API
groups are listed here. permissions. Refer to the P2000 Web UI
Installation Guide for details.
3. Click Add. The Menu Permission Group
Edit dialog box opens. 5. Click the check boxes for the items you
wish to include in the permission group.
Each column provides the following per-
mission levels:
View – The operator can see the element in
the system, but cannot edit, add, or delete
items.
Edit – The operator can view and make
changes to entries in these items, but can-
not add or delete.
Add – The operator can view, edit, and add
records, but cannot delete.
4. Enter the Permission Group Name. The Delete – The operator can view, edit, add
list box displays menu items preceded by new, and delete existing items.
the following icons:
6. To assign all items with the same permis-
– Menu list icon to indicate items that
sion level, select the desired function but-
are accessible from the P2000 Main menu.
ton at the bottom of the screen.
– Sub-menu list icon to indicate items 7. To clear your selections, click None and
that are accessible from the application. reselect the items individually.
– Tool icon to indicate items that are 8. Click OK. The new permission group is
accessible from the System Configuration added to the Menu Permission Groups list.
or CCTV/AV Configuration window.
9. Click Done. The new permission group is
– Sub-tool icon to indicate items that now accessible from the Permissions tab in
are accessible from the application in the the Edit Operator dialog box. See Assign-
System Configuration window. ing Operators for more information.

24-10832-194 Rev. E
23

Note: If you delete a permission group, cur-


rently logged on operators who belong to that
group can continue to access items in the per-
mission group until they log off from the system.

Assigning Operators
After initial login, the system is ready for oper-
ator configuration. Depending on the user 3. To add a new operator, click Add. The Edit
type, an operator is assigned a name, which Operator dialog box opens.
uniquely identifies the user, and is usually the 4. Enter the information in each tab, as
person’s first and last name. The user pass- described in the following tab definitions.
word and name are used to verify access to the You can click Apply to save your entries.
system. Use the Edit Operator dialog box to set
up user information, including menu permis-
sions, partitions to which the user is assigned, Note: If FDA Part 11 Record Retention Policy
and other system functions. is enabled in Site Parameters, you cannot delete
operators for the number of years specified in the
To Add an Operator Retention Period field; see page 39 for details.

1. From the P2000 Main menu, select Opera- 5. After you enter all the information, click
tor>Operator Account/Profile. OK. The operator now has access to sys-
2. Enter your password if prompted. The tem elements as defined.
Operator Account/Profile dialog box 6. Click Done to close.
opens. All operators that have been created
in the system are listed along with their user
name, user type, full name, menu permis-
sions to which the operator has access, and
the partition to which they are assigned.

24-10832-194 Rev. E
24 CHAPTER 2
Configuring the System

User Info Tab User Name – Enter the name the operator must
type when logging on to the system. Although
User Type – Select one of the following user not required, it is recommended that you use
types to be assigned to this operator: the same user name that the operator uses to log
 P2000 Account – This is the default P2000 on to Windows (passwords can be different).
user type. Users can log on to the P2000 Full Name – Enter the operator’s full name.
system by entering their password.
 AD Account – This is an Active Directory Password – Enter the password the operator
user account. Users can log on to the P2000 must type when logging on to the P2000 sys-
system if their user name and password tem. If you wish to change the password at a
combination can be validated by the Direc- later time, see Changing the User Password on
tory Services Password Validation (see page 28. In addition, see Password Policy Tab
Directory Services Password Validation on on page 40 for additional password complexity
page 41), and not by the P2000 system. rules.

Confirm Password – Enter the password again


to confirm.
Note: AD Account and AD Profile user types
require Windows Active Directory to be installed Message Filter Group – Select the Message Fil-
and configured on your network. When you select ter Group that defines which messages the
these user types, other password related fields operator can see. If you select <none> the
are disabled. See P2000 Directory Services operator can see all messages, provided the
Password Validation on page 27 for more infor-
operator has access to the Super User partition
mation.
(or records are marked Public), and the Mes-
sage Filter Group field defined at the worksta-
 AD Profile – This is an Active Directory tion is also set to <none> (see Workstation
Group. Users can log on to the P2000 sys- Field Definitions on page 20). Also, see Con-
tem if their Active Directory account figure Message Filtering and Message Routing
belongs to this Active Directory group and on page 221 and Operators and Messages on
their user name and password combination page 221.
can be validated by the Directory Services
Password Validation (see Directory Ser- Alarm Processing Group – Select the Message
vices Password Validation on page 41), and Filter Group that defines which alarms the
not by the P2000 system. The Active Direc- operator can process (acknowledge, respond,
tory Profile name must match the Active or complete). If you select <none> the opera-
Directory group name. A user can only tor can process all alarms that pass the Mes-
belong to one P2000 AD group; otherwise, sage Filter Group selection. If an operator is
this is considered as an invalid active direc- allowed to receive and process all alarms, then
tory configuration. both the Message Filter Group and Alarm
Processing Group selections should be set to
<none>.
IMPORTANT: Two AD Profile operators are
automatically created during software installation: Note: Message Filtering and Alarm Processing
P2000 Web API AppPool Users and Pegasys- Groups apply on P2000 Workstations only, not on
Services. Do not edit these operator accounts, P2000 Servers. In addition, partitioning rules still
as they are created for internal use only. apply, regardless of filter group selections.

24-10832-194 Rev. E
25

Account Type – Select the type of account that User must change password at next logon – If a
the operator is authorized to access. If FDA user forgets his or her password, the system
Part 11 Password Policy is enabled in Site administrator may grant a temporary password
Parameters (see page 40), then only one and force the user to change the password at
account type can be selected. the beginning of the next login. This option is
only available if the Account Type selected is
Account Disabled – Select this option if you P2000; a password cannot be changed for MIS
wish to disable this account. Once this option or XML RPC users.
is selected, this account can no longer be used
for logging into the P2000 system, until the Password never expires – Select this option to
account is enabled again. A message displays define passwords that never expire, for MIS
at the next login informing the operator that users for example. This option is not available
the account has been disabled. if FDA Part 11 Password Policy is enabled in
Site Parameters (see page 40).
Create NT user account on server – If selected,
a user account is automatically added to the Password expires – If you select this option,
operating system on the Server. You must have the password expires on the displayed date.
administrative rights on the P2000 Server to This date depends on the value defined in Site
select this option. This option is not available Parameters (page 40).
for selection if your Server is part of a domain.
As an alternative, you can manually add the Verify Password for Critical Functions – If
account using the Windows interface; see Set selected, the operator is required to enter the
Up User Accounts on page 29. login password to access certain system-criti-
cal functions.

Allow Multiple Alarm Handling – If selected, the


Note: The Create NT user account on server operator can process more than one alarm at a
option only creates the Windows account and time. This option is always enabled by default.
associated privileges on the P2000 Server and When selected, the operator can acknowledge
Database Server, not on the local Workstation,
or complete multiple alarms in the Alarm
where you need to create the account manually.
 Monitor window.
If you create the account on the P2000 Server,
the account is assigned with Users privileges on
Permissions Tab
the P2000 Server but not on the Database
Server, which means that account can be used to
Permissions determine the functions that an
access Windows on the P2000 Server, but not on
the Database Server.
operator can perform in the system. Each oper-
 ator can be associated with different rights to
If you create the from the Workstation, then the different functions. Menu permissions must be
account is only associated with the Windows defined, otherwise the table is empty. See Cre-
group Pegasys Users on P2000 Server and the ating Permission Groups on page 21 for more
Database Server. information.

24-10832-194 Rev. E
26 CHAPTER 2
Configuring the System

1. Select from the Available Partitions box,


the partition to which this operator can
access. You can select multiple items by
holding down the <Shift> key.
2. Click << to move the partition name to the
Member Of box.

Note: An operator can see alarms and real


time messages that are associated with the parti-
1. Select from the Available Groups box, the tions selected here, unless records are marked
permission group that defines the functions Public or the operator is monitoring the system
that the operator can view or change. You from the Server, where all alarms and real time
can select multiple items by holding down messages are visible, regardless of the partitions
the <Shift> key. selected here. Operators that belong to the Super
User partition have access to all partitions of the
2. Click << to move the permission group to system.
the Member Of box.

Remote Partitions Tab


Note: An operator can perform any function if
at least one menu permission group assigned to
If the operator monitors remote messages, use
the operator allows permission to that function. this tab to define the partitions to which the
operator can access. If you do not enter any
partition names, the operator can monitor all
Partitions Tab messages from the remote site.

Operators can be assigned to single or multiple


partitions and have unique access restrictions, Note: Remote messages are any alarm or
such as the ability to add, modify, or view data- transaction messages originated at another
base information within their assigned parti- P2000 site. See Message Filtering on page 222.
tions. See Partitions on page 355 for more
information.

1. Enter the name of the partition at the


remote site and click Add. The remote par-
tition name displays in the Remote Parti-
tions box.

24-10832-194 Rev. E
27

2. If you wish to modify an existing remote P2000 Directory Services Password


partition name, select the name in the Validation
Remote Partitions box, make the change,
then click Update. Authentication of P2000 operators can now be
handled by a centralized directory service such
3. If you wish to delete a remote partition as Microsoft Active Directory or other direc-
name from the list, select the name in the tory service using the Lightweight Directory
Remote Partitions box and click Delete. Access Protocol (LDAP). This feature pro-
vides a single point of authentication - when a
Concealed UDFs Tab user enters the credentials to log on to the
P2000 system, the P2000 server generates an
Use this tab if you wish to restrict operators authentication request to the LDAP server.
from viewing certain fields in the Cardholder Once the LDAP server authenticates the user,
dialog box. For example, a guard operating a the P2000 server logs on the user and autho-
P2000 workstation at a parking structure may rizes certain permissions, as defined in the
need to have access to car and parking infor- user’s AD account or group operator settings.
mation, but may not need to view personal
Cardholder information.

1. All UDFs are selected by default. Clear the


check boxes next to the UDFs that you
wish to restrict from viewing. This feature eliminates operator passwords
2. Click OK to save. from the P2000 database and is useful when
passwords are periodically changed, eliminat-
Only the selected UDFs are visible in the ing the need to update passwords in the P2000
Cardholder dialog box. In addition, other system and passwords that are used to log on
P2000 applications that use UDFs, such as the to Windows.
Search tool, do not display the UDFs that are
restricted from viewing. To use directory service password validation,
the following elements must be set up in the
P2000 system:

24-10832-194 Rev. E
28 CHAPTER 2
Configuring the System

 The Directory Services Path field must be See the following examples:
set in the Password Policy tab of Site
Parameters (see Directory Services Pass-  Directory Services Path for a Windows
word Validation on page 41). The actual domain named companyname:
value to use for the Directory Services Path WinNT://companyname/Users
is unique to your specific network configu-  Directory Services Path for an Active Direc-
ration and needs to be obtained from your tory domain named companyname.com:
network administrator. LDAP://companyname.com/CN=Users,DC=compa-
 For each P2000 operator that you want their nyname,DC=com
password verified by directory services, you For more details on path values and typical
need to select the AD Account or AD Pro- examples, refer to LDAP ADsPath and to
file User Type in the Edit Operator dialog WinNT ADsPath on Microsoft’s MSDN
box (see User Info Tab on page 24). Library.

Directory Services Path Changing the User Password


The Directory Services Path is specific to your Use the Change Password option to change a
network layout and configuration. You must user’s password. Depending on the permis-
consult with your network administrator for sions assigned using the Menu Permission
the correct path. The path statement provides Groups, some or all users may be able to
the network location for the Users object change their own password at any time.
within the directory services hierarchy.

The P2000 software includes a utility that To Change a Password


allows you to test the correct path statement.
You can find the ActiveDirectoryTest.exe 1. From the P2000 Main menu, select Opera-
application in the bin folder of the P2000 soft- tor>Change Password. The Change Pass-
ware installation. By using this application, word dialog box opens.
you can easily try different path values to help
determine the correct value for your network.

2. Enter your Current Password.


3. Enter your New Password.
4. Re-enter your new password in the Con-
firm Password field.

24-10832-194 Rev. E
29

5. Click OK to save your new password. Users – Gives rights to log on to the server
There is no need to log out of the system. computer locally.
The new password is now valid within the
P2000 system. Administrators – Gives rights to administrate
the server computer (add users, change hard-
ware configuration, and so on).
Set Up User Accounts
To add operators to the P2000 system,
accounts must be set up in the operating sys- Note: The following instructions are provided
for Windows Server® 2008 R2 operating sys-
tem. Without proper authorizations, the system tems. For other operating systems, follow the
may not allow connections to the Server. general outline to enter your settings.

Note: If the Create NT user account on Add Users to Windows Server 2008 R2
server option (see User Info Tab on page 24) Details
was selected at the time you added the user to
the P2000 system, the following steps were per- 1. Run the Computer Management program;
formed automatically by the P2000 system. select Start>Settings>Control Panel>
Administrative Tools. Double-click the
Computer Management icon.
Adding a P2000 Login Name and
Password into the Operating System

When you add operators into the Windows list


of valid users on the server, you must assign
this user account as a member of the
PEGASYS Users group to give them rights to
connect to the P2000 database. Use the same
user name and password that the operator uses
to log on to Windows at the workstation.

The user account may be assigned member-


ship of other groups as desired. The commonly
used groups are explained: 2. Click System Tools>Local Users and
Groups>Users.
PEGASYS Users – Gives rights to log on to the
P2000 database. 3. From the Computer Management menu,
select Action>New User. The New User
PEGASYS Administrators – Gives rights to dialog box opens.
administrate the P2000 database (create and
drop tables, restore the database, and so on).

24-10832-194 Rev. E
30 CHAPTER 2
Configuring the System

7. Click Add.
8. In the Select Groups window, click
Advanced.

9. In the expanded Select Groups window,


click Find Now.
10. From the list of groups select the
4. Enter the data for the new user, then click PEGASYS Users group and click OK.
Create. Click Close to return to the Com-
puter Management window.
5. Right-click the newly added user on the
center pane and select Properties.
6. In the user Properties window, click the
Member Of tab.

11. In the Select Groups window, verify that


the correct group is listed and click OK.

24-10832-194 Rev. E
31

3. Local Configuration – With Local Configu-


ration, you can enter the database server
source and application path of your P2000
system, select the language in which to run
your P2000 software, and define the data-
base connection settings for your local
computer.
4. Time Zones – Times Zones are used
throughout the system to define active and
inactive time periods for various system
12. Repeat steps 7 - 11 for other groups you
components.
want to add, (see page 29), this time select-
ing that particular group from the list. 5. Holidays – Holidays are defined for the
entire facility. Holiday start and stop times
13. Click OK to close the user Properties win-
may be different for different access rights.
dow.

Registration Parameters
Configure System
Components You can review the maximum number of ter-
minals and workstations, the maximum badges
allowed, and other parameters specified for
System components that operate globally your system. Select Config>System from the
throughout the P2000 system include Site P2000 Main menu bar, enter your password if
Parameters, Partitions, Local Configuration, prompted, and click the Registration Param-
Time Zones, and Holidays. To speed the con- eters icon at the top of the configuration tree
figuration process, we recommend that you set in the System Configuration window. The
up system components in the following order: parameters display on the right windowpane.
In addition, you can expand Registration
1. Site Parameters – Site Parameters define Parameters and select Option Keys to dis-
general system information, real time play additional P2000 features available for
printing, panel types, facility codes, record your system.
retention times, and other parameters that
are specific for the entire facility. All these parameters are enabled via the entry
2. Partitions – You can divide the P2000 data- of your valid Registration Key and Option
base into smaller sections that can be indi- Keys provided by Johnson Controls. These
vidually managed. Partitions allow a keys are associated with your purchase con-
system to function as multiple, separate tract and cannot be modified within the pro-
systems. gram.

Note: If you wish to remove configured items


that are associated with an Option Keys, delete
the items first, then proceed to delete the associ-
ated Option Key.

24-10832-194 Rev. E
32 CHAPTER 2
Configuring the System

Site Parameters When you click Site Parameters in the System


Configuration window, the current settings dis-
The elements that define how your access con- play on the right windowpane. You may mod-
trol system operates are entered in Site Param- ify these settings as desired. The Backup
eters. The P2000 system uses the information Device, DB Server, and Real Time Printer in
in Site Parameters to determine how system Site Parameters can only be set at the Server.
and hardware components can be configured. On a partitioned system, only users that belong
It is important to plan your access require- to the Super User partition can modify Site
ments by establishing elements such as visitor Parameters.
badge validity period, the server that handles
system communications, real time printing,
panel types, facility codes, record retention
times, and other parameters that are specific
IMPORTANT: The Communication and Data-
base Server settings are advanced settings and
for the entire facility. Setup information associ- should be changed only at the direction of our
ated with the MIS and Web Access features is Technical Support team. If these settings are
described in Chapter 4: Advanced Features. changed, the system may not work properly.

Displays the default partition Details of Current Site


Parameter Configuration

Root System
Right Windowpane
Components Tree

24-10832-194 Rev. E
33

To Edit Site Parameters Max Visitor Validity Period – Enter the maxi-
mum number of days that a Visitor badge may
1. With Site Parameters selected, click Edit. be valid. If an operator tries to set the validity
The Edit Site Parameters dialog box opens period for a Visitor badge longer than the con-
at the General tab. figured value, an error message displays and
the badge is not saved.

Max Inactive Period – Enter the number of days


after which a badge is disabled because of
inactivity. The operator has to manually reacti-
vate the badge when needed.

Global In-X-It Tracking – If selected, messages


are sent to the real time list to report global
entry or exit violations. A global entry or exit
violation occurs when access is granted after
presenting a valid badge at, for example an
entry reader and then that badge is presented
again at another entry reader, despite the
requirement to badge at entry and exit readers
alternately.

After you enable or disable Global In-X-It


Tracking or the following Global Badge
Entry/Exit Status Synchronization feature,
settings may only take effect after you stop and
restart the following services:
2. Enter the information in each tab accord-
ing to your system requirements. (See Site  P2000 CK721-A Download Service
Parameters Field Definitions for detailed  P2000 CK721-A Priority Service
information.)
 P2000 CK721-A Upload Service
3. As you work through the tabs, you may
click Apply to save your entries. See Starting and Stopping Service Control on
page 432 for details.
4. After you have entered all the information,
click OK to save the settings and return to Global Badge Entry/Exit Status Synchronization
the System Configuration window. The – Select to allow synchronization of badge sta-
new values display on the right window- tus across multiple panels. This feature is not
pane. recommended for medium and large systems,
unless using CK721-A panels.
Site Parameters Field Definitions

Note: This feature must never be combined


General Tab with the Peer to Peer Badge Sync option (see
page 57). Selecting both features causes badge
Visitor Validity Period – Enter the time, entry/exit enforcement errors across multiple
between 1 and 80 hours, after which a Visitor panels.
badge expires by default.

24-10832-194 Rev. E
34 CHAPTER 2
Configuring the System

Badge Trace Alarm for Granted Access – Select Cross Site Access Group Editing – Select to
to generate an alarm when a badge with the allow modifying access groups for other Enter-
Trace flag set is granted access at any reader in prise sites.
the system.
Display asterisks instead of pin code – If
Badge Trace Alarm for Denied Access – Select selected, the PIN code entered in the Badge
to generate an alarm when a badge with the dialog box displays as asterisks.
Trace flag set is denied access at any reader in
the system. Max PIN Code Digits – Select the maximum
number of PIN code digits that can be entered
Alarm Options – Click to open the Alarm Cate- in the Badge dialog box.
gories window and assign alarm options asso-
ciated with the Badge Trace Alarms. For
detailed instructions, see Alarm Configuration Note: If your facility uses Mercury panels, you
on page 270. must restart the P2000 Mercury Interface Service
for this change to be effective. You must also
Comms Server – Defaults to the server that download all items to all Mercury panels with the
handles communications. Reset Panel Before Download flag selected;
see Downloading Data to Panels on page 425.
DB Server – Displays the name of the server
that handles the databases.
Special Access – The system provides three
System Information URL – This field displays Special Access flags to satisfy the require-
the location of the server that is hosting the ments for assisted access according to Ameri-
P2000 Web services. In the following URL cans with Disabilities Act (ADA). The Special
example: Access fields A, B, and C can be renamed
according to your facility needs, Handicap
https://<ComputerName>/jcihostingenvironment/ Access for example. The names entered in
systeminformation/v1/api these fields become effective throughout the
<ComputerName> is the name of the com- system. For configuring special access for your
puter where the P2000 Web API is deployed. panel type, see your specific hardware configu-
ration section for information on setting up
Number of Floors – Enter the maximum num- these flags.
ber of floors at your facility (up to 128) for ele-
vator access. This is the number of floors that
Printing Tab
displays in the Floor Name Configuration list.
Real Time printers can be set up only from the
Number of Doors – Enter the maximum number
system Server, even if the operators have per-
of doors at your facility (up to 128) for cabinet
missions to modify Site Parameters at their
access. This is the number of doors that dis-
workstations. Printers to be used by the P2000
plays in the Door Name Configuration list.
system must first be set up using the Windows
printer set up function. If you need assistance
adding printers to the system, see your system
administrator or refer to your Windows docu-
mentation.

24-10832-194 Rev. E
35

AV – Prints all audio-visual messages. See


Note: While the same options are offered from
Real Time Printing, this function operates inde-
DVR/VMS on page 390 for details.
pendently from the Real Time List viewed on Access Deny – Prints all Access Deny messages.
screen. It is not connected in any way to a history
file. It simply prints the transaction types selected Access Grant – Prints all Access Grant mes-
as they occur. sages.
Trace – Prints all transactions associated with a
IMPORTANT: Real time printing is not guar- badge. The Trace option must also be enabled
anteed on foreign language systems.
on the Badge dialog box; see page 253.
Guard Tour – Prints all guard tour messages.
See Guard Tour on page 374 for details.
Cabinets – Prints all cabinet messages.
Mustering Zones – Prints all mustering zone
messages.
Intrusion – Prints all intrusion messages.
Fire – Prints messages generated by the fire
alarm panel.

As a reference, see Using the Real Time List


Printing – If you wish to print any transaction, on page 342.
select this box and choose a printer. We recom-
mend a dot matrix printer be used exclusively
Panel Types Tab
for printing the following transaction types as
they occur. Use this tab to select the panel types and
related parameters that define how your sys-
Set All – Select if you wish to print all transac- tem can be configured.
tions.
Clear All – Select to clear the selections. To
limit the type of transactions printed, select
any of the following options:
Host – Prints triggered and system events.
Panel – Prints reader strikes and status, termi-
nal and panel status changes, and so on.
Audit – Prints operator actions such as add an
alarm instruction, edit an event, run a report,
and so on.
Alarm – Prints all alarm messages.
Elevators – Prints all elevator messages.
Areas – Prints all area messages.

24-10832-194 Rev. E
36 CHAPTER 2
Configuring the System

Panel Types Box  If you select more than one panel type
Select the panel types to be used at your facil- and enable Enforce Limitations, you force
ity. Specific features for the selected panel type the system to use the lowest values among
display when configuring the panels and their the panel types selected. For example, if
system and hardware components. Your sys- you select CK721-A and HID as the panel
tem can be configured with any combination of types, you are only able to configure up to 8
panel types. access groups, even though CK721-A pan-
els support 32 access groups.
Parameters Box  If you unselect a panel type, the system
does not automatically change the values
The Parameters box defines various elements accordingly for the remaining panel types.
for each panel type. Before entering your In general, the system automatically reduces
selections, see the following table for the max- the configured values, but never increases
imum default values for each panel type. them automatically. This must be done man-
Enforce Limitations – Select to force the system ually, if desired.
to use the default values listed in the following  If you select more than one panel type
table. If you select to Enforce Limitations, you and do not enable Enforce Limitations,
are not required to enter any values in the you can enter any value, but the system only
Parameters box and all tabs are disabled. There recognizes the maximum values for each
is a combination of options depending on panel type selected. For example, if you
whether or not you select this check box and select CK721-A and HID as the panel types
the type or types of panels selected. See the and you enter 32 in the Number of Access
following rules: Groups, you can download up to 32 access
 If you select one panel type and enable groups for CK721-A panels, and only up to
Enforce Limitations, you force the system 8 access groups for HID panels.
to use the maximum default values for the
panel selected.
Note: Regardless of the Enforce Limitation
 If you select one panel type and do not settings, the system enforces the maximum val-
enable Enforce Limitations, you can enter ues displayed here.
any value up to the maximum default values
for the panel selected.

Parameters Elements CK721-A S321-IP OSI HID Assa Abloy Mercury


Badge Max Badge Number 64 bit 1 64 bit 47 bit 2 64 bit 19 Digits 3 63 bit 4
Number of Access Groups 32 N/A N/A 8 32 32
Max Issue Level 255 N/A 99 N/A 255 255
Max Security Level 99 99 (2.6 and later) N/A N/A N/A N/A
Timezone Number of time pairs per day 10 4 10 6 10 10
Number of unique time pairs 40 40 N/A 40 32 5 12
per Timezone
1 64 bit for manual entry or CK721-A V3.1 or earlier. 128 bit for entry via pivCLASS integration and CK721-A V3.2 or later.
2 Highest Badge Number for OSI panels is 140,737,488,355,327
3 19 digits for Mag Stripe, 48 bit for others
4 Max Badge Number for Mercury panels is 9,223,372,036,854,775,807
5 Each Assa Abloy lock can only store a maximum of 32 different time periods

24-10832-194 Rev. E
37

Badge Tab Max Issue Level – Enter the highest issue level
that can be assigned to a badge. The maximum
Settings entered in this tab govern how badges value displays in the Issue drop-down list of
are configured for the entire system. When you the Badge dialog box. See the table on page 36
create a badge, the system uses this informa- for the maximum default values for each panel
tion to determine the maximum allowed val- type.
ues. For more information, see Badge Field
Definitions on page 252. Max Security Level – Enter the highest security
level that can be assigned to a badge. This is
the maximum number that displays in the
Security Options tab of the Badge dialog box.
Security levels are supported by S321-IP pan-
els (Version 2.6 and later) and CK721-A pan-
els. See Security Threat Level Control on
page 293 for more information.

Terminal Access Tab


Max Badge Number – Select the maximum This tab applies to Mercury panels only.
number of characters allowed to be entered in
the badge Number field. See the table on
page 36 for the maximum default values for
each panel type.

Number of Access Groups – Enter the maxi-


mum number of access groups that can be
assigned to each badge. This is the number of
access groups that displays in the Access
Rights tab of the Badge dialog box. See the
table on page 36 for the maximum default val-
ues for each panel type. Terminals associated with Timezone – If you
select this option, you activate the Details tab
in the Access Group dialog box, which enables
you to assign different time zones to each Mer-
Note: By default, Mercury panels allow up to
cury terminal. For more information, see Cre-
32 Access Groups. The maximum Access
Groups allowed is configured in the Mercury ate Access Groups on page 232.
Facility tab, (see page 151). Contact Technical
Support if you need to change that number.

24-10832-194 Rev. E
38 CHAPTER 2
Configuring the System

Timezone Tab Number of unique time pairs per Timezone –


Enter the maximum number of unique time
Use the Timezone tab to enter the maximum pairs that can be created for each Time Zone.
number of time pairs per day and the maxi- See the table on page 36 for the maximum
mum number of unique time pairs per time default values for each panel type.
zone that are allowed for the entire system. A
time pair is defined as a period of the day, with
a starting and ending time. See Time Zones on Options Box
page 49 for configuration instructions. To have
Set Terminal Status to “Unknown” when Panel
a better understanding of how the time pairs
Offline – Select to set a terminal status to
work, see the following illustration.
Unknown when a panel goes offline. For Assa
Abloy panels, this setting becomes effective
after the P2000 Assa Abloy DSR Interface Ser-
vice is restarted. For CK721-A panels, this set-
ting becomes effective after the following ser-
vices are restarted:

 P2000 CK721-A Download Service


 P2000 CK721-A Priority Service
Number of time pairs per day – Enter the maxi-  P2000 CK721-A Upload Service
mum number of time pairs per day that can be
This option is not recommended for Mercury
configured for the entire system. The number
panels, since terminal offline alarms cannot be
of time pairs per day display in the Time Zone
generated while the panel is offline.
dialog box (see the following illustration). See
the table on page 36 for the maximum default
values for each panel type.

Assume you selected the CK721-A  Assume you selected the S321-IP Assume you enable
panel type. panel type. Enforce Limitations
CK721-A allows: S321-IP allows:
10 time pairs per day 4 time pairs per day
40 unique time pairs per Timezone 40 unique time pairs per Timezone

NOTE: According to the Enforce Limitation rules (see page 36), the system uses the lowest values among the panel
types selected. In this case 4 pairs per day.

Using the preceding values, the Time Zone dialog box displays 4 time pairs for each day...

... and allow you to configure up to 40 unique time pairs for the entire Time Zone.

24-10832-194 Rev. E
39

Facility Code Tab

Some of the codes stored in every badge are


known as facility codes. These codes allow
you to identify the badges that belong to your
facility. See the instructions provided on
page 251 to assign facility codes to badges.

Audit Trail – Enter the time after which all audit


records at the Server, such as logins, logouts,
and record changes are purged.
You can define up to eight facility codes. The
box displays the Default Facility Code with a Transactions – Enter the time after which all
default value of 0. Double-click these fields to system and badge transactions are purged.
enter the facility code Name and correspond-
ing Value. If you use badges with different Alarms – Enter the time after which all alarm
facility codes, enter the names and correspond- records are purged.
ing values for each group of badges. You can-
not delete facility codes that have been
assigned to badges. Note: The number of days history should be
stored on the Server hard drive depends on the
amount of activity at your site. If you continually
Retention Policy Tab fill up the server hard drive, you can reduce the
number of days history is stored.
Enter in the Retention Time box, the amount
of time and select Days, Hours, or Minutes
Muster Data – Enter the time after which all
after which all records are deleted from the
Muster data is deleted from the system.
system. If you enter 1440 Minutes on any of
the fields, the system automatically converts it Request Queue – Enter the time after which all
into 1 Day. If you enter 1441 Minutes, the sys- Request Queue records are deleted from the sys-
tem leaves the value as is. The system converts tem. See Viewing Request Queue on page 466.
even values only. The maximum retention
period is 24,855 days (about 68 years). Tour Note – If your facility uses the Guard
Tour feature, enter the time after which all
notes are deleted from the system. See Guard
Tour Notes on page 387.

24-10832-194 Rev. E
40 CHAPTER 2
Configuring the System

FDA Retention Policy Password Policy Tab

Settings in this box are available if your facil- Settings in this tab provide additional security
ity uses the FDA Part 11 option. See FDA Part to your system by allowing the system admin-
11 on page 392. istrator to define several parameters to set up
strong passwords, passwords that are hard to
Enforce FDA Title 21 CRF Part 11 Record Reten- break.
tion and Validation Policy – Select to enable
FDA Part 11 record retention policy, which
addresses the protection of records for a speci-
fied period.

Retention Period – Enter the number of years


that the system keeps all records in the system.

Violation Alert Period – Enter the number of


days to generate a warning message before
records are deleted from the system. If the
Retention Period is longer than any of the val-
ues entered in the Retention Time box, an
alarm message is generated, and repeated on a
daily basis, until the operator performs the
FDA Backup procedure; see page 454.

Last FDA Backup – This is a displayed field


only and shows the date you informed the sys-
tem that a backup was archived, according to
your company policies to comply with FDA
Part 11 record retention requirements. Password Validation – Enter the number of
days during which a changed password
remains valid. Users are required to change
IMPORTANT: Changes to any of the FDA their password within this period; otherwise,
Record Retention Policy settings take effect only the account is automatically disabled. The user
after all services have stopped and restarted is informed of the password expiration at the
using Service Control. You must also log off and next login. If you enter 0 in this field, the pass-
on at the Server computer to see these changes.
word remains valid indefinitely. If complying
with FDA Part 11, FDA recommends that the
Backup Device – Select the name of the device password be changed every 30 days.
that indicates the location where automatic
database backups are saved, see Configuring a Max. consecutive Invalid Logins – If users
Backup Device on page 451 for details. Auto- exceed the maximum number of consecutive
matic backups (see page 453), are performed invalid login attempts entered in this field, they
using host event actions. For the location of immediately lose their ability to access the
manual backups, see page 452. P2000 system and the account is automatically
disabled for one hour. There are no limitations
if you enter 0. FDA recommends no more than
three invalid attempts.

24-10832-194 Rev. E
41

Minimum Length – Enter the minimum number Principal – This is a service account that is
of characters in a password. FDA recommends used to connect to the LDAP source for single
the password to be at least 6 characters long. sign-on login of an Active Directory Group
account.
‘A’ to ‘Z’ or ‘a’ to ‘z’ – Enter the number of let-
ters (uppercase and lowercase) required in a Password – Enter a password for the Principal
password. service account.

‘0’ to ‘9’ – Enter the number of numerals Use Encryption – Forces the connection to the
required in a password. Directory Services to use data encryption for
network communications. Not recommended
Other – If you wish to use characters not for Windows Active Directory. May be
defined as letters or numerals (symbols such as requested by your Directory Services adminis-
& or !), enter the number of symbols required trator.
in a password.
Secure Authentication – Requests the connec-
Enforce FDA Title 21 CFR Part 11 Password Pol- tion to the Directory Services to be made using
icy – This feature is available for selection if secure communications such as Kerberos.
your facility uses the FDA Part 11 feature. Recommended for Windows Active Directory.
Select this box to enable FDA Part 11 pass- May be requested by your Directory Services
word policy. For more information, see FDA administrator.
Part 11 on page 392.
Bind Server – Requests the Directory Services
IMPORTANT: Changes to any of the FDA to bind to the server. Not needed for Windows
Password Policy settings take effect only after all Active Directory. May be needed for LDAP
services have stopped and restarted using Ser- systems if your Directory Services Path
vice Control. You must also log off and on at the includes a server name or when requested by
Server computer to see these changes. your Directory Services administrator.

Directory Services Password Validation Download Tab


Directory Services Path – This is the Light- Use this tab to define different downloading
weight Directory Access Protocol (LDAP) options.
path for the directory server. This setting is
specific to the network; contact your network
administrator for assistance. See P2000 Direc-
tory Services Password Validation on page 27
for more information.
Username Formatting – This is the formatting
of the username passed to Directory Services
for authentication. The username is the string
as entered with $USERNAME replaced by the
actual username. For Windows Active Direc-
tory the default $USERNAME is recom-
mended. Special formatting may be needed for
LDAP systems or when requested by your
Directory Services administrator.

24-10832-194 Rev. E
42 CHAPTER 2
Configuring the System

Download to disabled panels – Select if you Download Access Groups of badge – Select to
wish to download items to disabled panels. If enable downloading of access groups when
this option is not selected and the panel is downloading badges after a Central mode
offline, items that are automatically down- request for a terminal in Shared mode.
loaded by the system are not queued for down- Changes to this option only take effect after
load until you select this check box again. you restart the P2000 CK721-A Priority Ser-
vice; see Starting and Stopping Service Control
on page 432.
Note: If you do not select this option, when you
enable the panel again using the Enabled func-
Port Configuration Tab
tion in the Edit Panel dialog box, you should
queue a complete download for that panel; see Use the Port Configuration tab if you wish to
Downloading Data to Panels on page 425.
change the default port values that are assigned
to the P2000 system applications during soft-
Download badges with Undefined entry/exit sta- ware installation. To change a port number,
tus – Select to change the entry/exit status of double-click the desired value and enter a
downloaded badges to Undefined. number between 1 and 65535; you are
prompted to restart the Server and all worksta-
Delayed download for badges and access
tions.
groups – If you select this option, badge and
access group downloads to panels are per-
formed using Smart Download instead of per-
forming the download immediately. This
moves the burden of building the download
from the workstation to the server, in addition
to delaying the download by the number of
minutes set in the Smart Download Rules box.
This option only effects downloads caused by
editing badges, access groups, or terminal
groups. This option does not apply to badge
and access group downloads performed using
the Download application. See Controlling
Smart Download on page 427.

Smart Download Rules – This option defines


the time for downloading badges to panels
when changes are made to access groups and
terminal groups, as well as defines the time for
downloading cardholder and badge changes.
The CK721-A Priority Port, CK721-A Upload
The download starts automatically whenever
Port, and CK721-A Download Port values
the system does not process any access groups,
(firmware Version 2.2 and later) must match
terminal groups, cardholder or badge changes,
the values configured at the panel, and must
during the number of minutes that you enter in
use TCP/IP port numbers above 41000.
this field. The default value is 5 minutes. Enter
0 to download immediately.

24-10832-194 Rev. E
43

If the mix of panel versions in the P2000 sys- Message Filter Group – Select the Message Fil-
tem does not need a particular port, set the ter Group that defines which remote messages
value to 0 to disable that port. your P2000 Remote Message Service pro-
cesses. If you select <None>, your local P2000
site can receive all remote messages. See Con-
Note: We recommend not changing the P2000 figure Message Filtering and Message Routing
XmlRpc Interface Port. If you need to do so, con- on page 221 for detailed information.
tact Technical Support for further instructions.
Local Alarms – Select to allow operators at a
remote site to acknowledge, respond, and
RMS Tab complete alarms originated at your P2000 site.
By default, this option is not selected.
Settings in the Remote Message Service
(RMS) tab determine if your P2000 site Remote Alarms – Select to allow operators at a
receives messages from remote P2000 sites. In remote site to acknowledge, respond, and
addition, you can define whether remote mes- complete alarms originated at other P2000
sages indicating alarm status changes for local sites. By default, this option is selected.
or remote alarms are to be processed.

Note: Although the Alarm Status column in the


Alarm Monitor window displays a Responded
status, the alarm response entered at a remote
P2000 site is NOT part of the P2000 alarm his-
tory in your P2000 site.

Receiving Messages (sec) – Enter the time in


seconds after which the P2000 system gener-
ates an alarm because no messages are
received from a remote server. If you enter 0,
an alarm is not generated.

Transmitting Messages (sec) – Enter the time


in seconds after which the P2000 system gen-
Process Received Remote Messages – Select if erates an alarm because no messages are trans-
you wish to receive messages from remote mitted to a remote server. If you enter 0, an
P2000 sites. If you select this option, the alarm is not generated.
P2000 Remote Message Service processes
incoming messages and passes them on to
RTLRoute for distribution within the local sys- Note: The time configured here is applicable to
tem and, if applicable, to other remote sites. all remote server connections from or to this com-
puter. Inactivity periods are checked every 30
seconds by the Remote Message Service. These
periods should be configured in line with the max-
imum duration of session configured in the Trans-
mit Session tab in the P2000 Remote Server
dialog box of the transmitting system. See Con-
figure P2000 Remote Servers on page 230.

24-10832-194 Rev. E
44 CHAPTER 2
Configuring the System

All remote message server communication Use Authorized SMTP – Select if your ISP
alarms generated by the local system are reset requires authenticated email connections that
to Secure when the P2000 Remote Message need a username and password to send emails.
Service is restarted. The Dial-up Connection Username and Pass-
word is used.
EMail Tab
Use Dial-up Connection – Select if your P2000
Use this tab to enter a valid email account that site uses a dial-up connection (via telephone
can be used to send email messages, and also lines).
where automatic error returns could be sent.
Dial-up Connection Name – Enter the name of
Before you enter your connection parameters,
the dial-up connection used at your P2000 site.
check with your Internet Service Provider
(ISP) or IT department to verify the required Username – Enter the name to be used to estab-
connection settings. lish the dial-up connection.
Changes to any of the Email settings take Password – Enter the password to be used to
effect after you restart the P2000 RTL Route establish the dial-up connection.
Service.
External Event Trigger Tab

The P2000 software allows external inputs to


be used as event trigger conditions. These
external inputs can be in the form of an RS232
serial message or a TCP/IP message; an ASCII
file or a database WRITE. These inputs allow
external software or hardware systems to send
a message to the P2000 system, which triggers
a Host event that in turn generates an alarm or
other event action.

Settings in this tab define which of the external


SMTP Hello Domain – This value is the domain inputs are monitored.
name sent with the SMTP Hello command.
Enter the domain of the computer sending the
email. The computer name of the P2000 Server
is normally acceptable unless your SMTP
Administrator requests a specific value.

Return Address – Enter the email address at


your P2000 site that is used to send messages
and also is used to receive automatic error
returns.

SMTP Server – Enter the name of the SMTP


(Simple Mail Transfer Protocol) Server pro-
vided by your Internet Service Provider (ISP)
or IT department.

24-10832-194 Rev. E
45

RS232 External Trigger – If you select Enable, File External Trigger – If you select Enable, the
the P2000 system opens the configured RS232 P2000 system periodically checks the config-
port and listens for incoming characters. When ured location to look for the existence of the
characters are received, they are placed into an configured file name. When the specified file
input buffer. When a carriage return is is found it is renamed to <original
received, the current contents of the input buf- name>.BAK. After it has been renamed, the
fer is processed and checked to see if it meets a lines in the file are processed. The file must
trigger condition. When the input buffer has contain only ASCII text. If the file contains
been processed, it is cleared and P2000 starts multiple lines, each line must be separated by a
waiting for the next message. If you select this carriage return. The last line in the file may
option, you must specify the COM Port to optionally include the carriage return or not.
use. The RS232 port is initialized with the Each line in the file is processed separately
Baud Rate, Parity, and Stop Bits configured and checked to see if it meets a trigger condi-
for that port. tion. After the file has been processed, it is
deleted. If you select this option, you must
TCP/IP External Trigger – If you select Enable, enter the path and Filename of the ASCII file
the P2000 system creates a TCP/IP socket on to look for, as well as the Scan Interval time
the configured IP port and listens for incoming (1 to 65535 seconds) between scans.
characters. When characters are received, they
are placed into an input buffer. When a car- Database External Trigger – If you select
riage return is received, the current contents of Enable, the P2000 system periodically checks
the input buffer is processed and checked to for any records in the external trigger database
see if it meets a trigger condition. When the table. Each row found in this table is processed
input buffer has been processed, it is cleared separately and checked to see if it meets a trig-
and the P2000 starts waiting for the next mes- ger condition. After a row has been processed,
sage. The external system may connect to this it is deleted. If you select this option, you must
TCP/IP socket and remain connected or it may enter the Scan Interval time (1 to 65535 sec-
disconnect after each message. If the external onds) between scans.
system remains connected, then only one
external system may send messages. If the
external system connects, sends the message, Note: Since these external inputs do not
and then disconnects, then multiple external authenticate the user sending the incoming mes-
systems may send messages. If the P2000 sage, enabling any of these inputs may cause the
detects a network error or if the external sys- P2000 system to be non-compliant with FDA Title
tem closes its connection, the P2000 returns to 21 CFR Part 11. When you enable any of these
external inputs, Site Parameters checks the
the listen state waiting for new incoming con-
Enforce FDA Rules setting. If this setting is on,
nections. then a warning message displays to inform that
the P2000 system may now be non-compliant if
the events modify database records. See FDA
Part 11 on page 392.

24-10832-194 Rev. E
46 CHAPTER 2
Configuring the System

XmlRpc Tab Setting Up External IPs


Use this tab to configure communications with Here you define a computer or device to accept
an external device using the XmlRpc protocol. messages from external devices. You can also
define a computer or device from which the
P2000 system does not accept external mes-
sages (using the Allow option). If the P2000
system receives an external message from a
source that is not configured, the P2000 soft-
ware logs an error message and does not pro-
cess the message.

To Set Up External IPs


Password Mode – Select one of the following
encryption modes to be used for XmlRpc com- 1. From the P2000 Main menu, select Con-
munication: fig>System. Enter your password if
prompted. The System Configuration win-
 Base64 – Password is Base64 encoded. dow opens.
 Clear Text – Password is not encoded. 2. In the left pane, expand Site Parameters
 Ignore – Password parameter is not vali- to display default system parameters.
dated. 3. Select External IPs and click Add. The
External IP Edit dialog box opens.
Allow Any IP Address – Select to allow the
P2000 system to accept XmlRpc commands
from any IP address. If not selected, the P2000
system only accepts XmlRpc commands from
IP addresses defined in the External IPs dialog
box; see Setting Up External IPs for details.
Changes to this setting only take effect after
you stop and restart the P2000 XmlRpc Inter-
face service.

4. Enter a descriptive Name of the external


device.
5. Click either IP Address or Computer
Name.

24-10832-194 Rev. E
47

6. If you click IP Address, enter the IP The system allows changes to the Local Site
Address of the computer or device from name, for example to change the name of the
which to accept messages. Use this option facility location, however frequent changes to
for a device that is not a Windows com- this setting are not recommended. Changes to
puter. the Local Site name can only be performed
7. If you click Computer Name, enter the from the P2000 Server.
Windows Computer Name from which to
accept messages, or click the browse [...] To Edit the P2000 Local Site Name
button to find a computer by name on your
network. 1. In the System Configuration window,
expand Site Parameters.
8. If you click Allow, the P2000 software
allows communication with this device. If 2. Select Local Site and click Edit to open
you do not click Allow, the P2000 system the Local Site Edit dialog box.
denies communication with this device but
does not log any error messages for this
device.
9. Click Use for XmlRpc if this device uses
the XmlRpc protocol. See XmlRpc Tab on
page 46 for details.
10. Click OK to save the settings and return to 3. Enter a Local Site Name (up to 32 charac-
the System Configuration window. ters) that easily identifies your P2000 site.
4. Click OK to save the Local Site Name.
5. A message displays, warning that changing
Note: The External IP settings take effect after the site name requires you to update exist-
you stop and restart the P2000 XmlRpc Interface ing database records that refer to the cur-
service; see Starting and Stopping Service Con-
rent site name. Click Yes if you want to
trol on page 432.
proceed to change the name.
6. You are prompted to stop all P2000 ser-
Local Site vices at the Server (see Starting and Stop-
ping Service Control on page 432) and to
The P2000 Local Site name is assigned during log out of all workstations.
the initial software installation and uniquely 7. Click OK to proceed with the update of the
identifies the P2000 site within the P2000 database tables.
Enterprise System.
8. After the database tables have been
The Local Site name is a system wide setting updated, click Yes to restart the Server
and does not require a partition reference. The computer.
site name is part of all audit entries, alarms,
and transactions originated in your system.
Applications such as the Alarm Monitor and
Real Time List display the site name to indi-
cate the P2000 site where the message origi-
nated.

24-10832-194 Rev. E
48 CHAPTER 2
Configuring the System

Local Configuration 3. Click Optimize for LAN to set the data-


base connection settings for the local com-
Use the Local Configuration window to enter puter to values that are appropriate to a
the database server source and application path Local Area Network (LAN).
of your P2000 system. You can also select the
4. The Application Path field displays the
language in which you wish the P2000 soft-
location of the P2000 program. Click
ware to run. Incorrect settings in this dialog
Browse to find another path, if the location
box may cause the P2000 software not to func-
tion properly. has changed.
5. If you wish to run the P2000 software in a
1. From the P2000 Main menu, select Con- language that is different from the Win-
fig>Local. Enter your password if dows operating system language, select the
prompted. The Local Configuration dialog desired Language from the drop-down list,
box opens. otherwise use the default <system set-
tings> option.

Note: Contact your Johnson Controls repre-


sentative if you wish to run the P2000 software in
a different language.

6. Click OK to save your settings. If you are


switching languages, you are prompted to
close all P2000 programs and restart for
the changes to take effect.

2. The ODBC Data Source field displays the


name of the Open Database Connectivity
(ODBC) data source that communicates
with the database server.

24-10832-194 Rev. E
49

Time Zones See Appendix C: Panel Comparison Matrix for


the maximum number of time zones supported
Time zones define all the periods during which by each panel type.
a reader, badge, alarm point, or other system
component or feature is active or inactive. A
time zone is a set of enable and disable times Configuring Time Blocks
applied to days of the week and holidays. You
The period between an active and inactive
can set up different time zones and then assign
time may be thought of as a time block. Some
these time zones to readers, inputs, outputs,
panel types allow up to four time pairs (four
terminal groups, and other system elements.
active and four inactive times); therefore, you
You can define an unlimited number of time can configure up to eight time blocks per day
zones, but you must assign at least one time for those panels. See the table on page 36 for
zone to each panel. This could be done at the the number of time pairs per day allowed for
time you create the panels or later. See Config- each panel type.
ure Panel Time Zones on page 62. The previous example shows eight time blocks
After you configure your time zones, expand representing a business hours day, opened at
the Time Zones icon to display all configured 6:00 A.M., closed one hour for lunch, opened
time zones. When you click on a Time Zones until 6:00 P.M., and opened for cleaning from
icon, the values for the time zone display on 10:00 to 11:00 P.M.
the right windowpane.

24-10832-194 Rev. E
50 CHAPTER 2
Configuring the System

To Create a New Time Zone Check the box and select the hour from the
spin box. For example, if the time period
1. In the System Configuration window, starting at midnight is Inactive, enter the
select Time Zones and click Add. The hour at which the time period becomes
Time Zone dialog box opens displaying the Active. In the next field, select the time at
maximum number of time pairs, as defined which the period returns to Inactive. You
in Site Parameters; see Timezone Tab on can include minutes, if needed.
page 38.
2. Select the day of the week (or a holiday)
you wish to define and click Edit. A time Note: The number of Active and Inactive times
is limited to the number of time pairs per day
zone dialog box opens with the name of the defined in Site Parameters. Select only those
day in the title block. The number of time time check boxes you wish to enable. For exam-
periods available depends on the parame- ple, to create a Time Zone that is active from 6:00
ters selected in Site Parameters. A.M. to 6:00 P.M., select the first check box and
set the time to 6:00 A.M.; then select the second
check box and set the time to 6:00 P.M.

5. The Set Default button sets all times to


12:00, and either Active or Inactive as
defined in the Start As box.
6. Click OK to save the settings and return to
the Time Zone dialog box.
7. Continue to edit and enter time zones, until
all days of the week and any applicable
holidays have been defined. See the next
3. In the Start As box, select whether, starting section To Copy a Time Zone.
at midnight, this time zone is Inactive or 8. Enter a descriptive Name for the new time
Active. zone (Day Shift, Full Time, and so on).
If you select Inactive, the time period 9. If this is a partitioned system, select the
between 12:00 A.M. and the hour entered Partition in which this time zone is active.
in the first field in the list is labeled Inac- 10. If this is a partitioned system, select Public
tive. (See the Period group box.) If you if you wish this time zone to be visible to
select Active from the Start As box, the all partitions.
time period between 12:00 A.M. and the
hour entered in the first field in the list is 11. Click OK. If you wish to add this time
labeled Active. zone to all panels, click Yes. Otherwise,
you must add the new time zone for each
4. In the Period group box, define the time at panel separately using the Panel Timezone
which the period between 12:00 A.M. application; see page 62.
changes status (from Active to Inactive or
vice versa). The new time zone displays under the root
Time Zones icon. These time zones are now
Note: The time format displayed throughout the accessible to other system features such as
P2000 software is set up in the Windows Control panels, workstations, cardholders, and so on,
Panel, Regional Options. for the partition selected.

24-10832-194 Rev. E
51

To Copy a Time Zone These holiday types correspond directly to


Type 1, 2, and 3 in the Edit Holiday dialog box.
You can copy a time zone from one day to the
next, or to all of the days.
Holidays
1. In the Time Zone dialog box, define one
time zone (a day of the week or a holiday). Use the Holiday window to define dates when
2. Select the defined time zone and click the system uses Holiday 1, 2, or 3 active and
Copy. inactive periods rather than the usual time
zones set for those days of the week. When the
3. Select the day to which you wish to copy system reaches midnight prior to a day defined
the time zone and click Paste. as a Holiday, it switches to Active and Inactive
periods, depending on the Holiday type speci-
Holiday Types fied for that time zone.
When the system reaches midnight prior to a Each day of a Holiday period must be assigned
day defined as a holiday it switches to Active separately. For example, you may plan to
and Inactive periods, depending on the Holi- allow two days off for the Christmas holiday.
day Type specified for that time zone. You must define two separate holidays with
separate names and dates, such as Christmas 1
You can define three Holiday Types. For
for the first date, and Christmas 2 for the sec-
example, you may want to define a Type 1 hol-
ond date.
iday to indicate a full day, such as Christmas
Day; and a Type 2 holiday as a half-day, such You can define an unlimited number of holi-
as Christmas Eve; and a Type 3 that is specific days.
to your company.

You can set different Holiday Types for differ- To Add a Holiday
ent Time Zones. For example, Night Shift
full-day holiday hours may begin and end at 1. In the System Configuration window,
different times than Day Shift full-day holiday select Holidays and click Add. The Edit
Holiday dialog box opens.
hours.

IMPORTANT: See Assa Abloy Holiday Defini-


tion on page 146 for specific instructions associ-
ated with Assa Abloy locks.

To Create Holiday Types

1. In the Time Zone window, select Holiday


1 and click Edit. Select a Type as defined on
the Time Zone dialog box
2. Define the Active and Inactive periods as
described for the other days of the week.
2. If this is a partitioned system, select the
3. Define Holiday 2 and 3, if needed. Partition to which the Holiday applies,
4. Click OK to save your settings and return and select Public if you wish this Holiday
to the System Configuration window. to be visible to all partitions.

24-10832-194 Rev. E
52 CHAPTER 2
Configuring the System

3. Enter the Name of the Holiday. To Change the Calendar Year


4. Enter the Date of the Holiday. (See Using Do one of the following:
the Holiday Calendar for details.)
5. Select the Type: 1, 2, or 3 depending on 1. Use the left or right arrows in the Calendar
the Holiday types set up in the Time Zone header to move forward or backward
dialog box. through the months into the next or last
year.
6. Click OK to save the new Holiday. If you
wish to add this Holiday to all panels, click 2. Click the year in the Calendar header. Use
Yes. Otherwise, you must add the new Hol- the left or right arrows to move forward or
iday for each panel separately using the backward through the years.
Panel Holiday application; see page 63.

Note: If you select to add the new Holiday to all


panels, the system may display a message indi-
cating that the number of panel holidays has
exceeded for the panel names that display in the
list box.

Assigning Holiday Types


Using the Holiday Calendar
Holiday Types correspond directly to Holiday
When you click the Date down arrow on the
1, 2, and 3 on the Time Zone dialog box. You
Edit Holiday dialog box, a calendar displays
can define different hours for each holiday
where you can select a specific date for the
type, depending on your facility’s preferences.
Holiday.
For example, in the Time Zone window, you
may designate Holiday 1 as a full day and Hol-
To Change the Calendar Month iday 2 as a half day. You can then create a holi-
day in the Holiday dialog box, such as New
Do one of the following: Year’s Eve, as Type 2, changing the active and
1. Use the left or right arrows in the Calendar inactive times for that holiday to correspond
header to move forward or backward with a half-day schedule. (See Time Zones on
through the months. page 49 for more information on creating Holi-
day types.)
2. Press Page Up or Page Down to move
through the months.

24-10832-194 Rev. E
53

Configure Hardware
Components

Hardware components are the physical panels,


terminals, and other inputs and outputs that
make up the security management system.
After the physical panel and terminal hardware
is set up at the various system locations, panels Configure Panels
and terminals must be created and then config-
Field panels are advanced intelligent control-
ured using the P2000 software program.
lers that interface between the Server and other
hardware in the system. Panels (CK721-A,
Hardware Configuration S321-IP, OSI, HID, Assa Abloy, and Mer-
Sequence cury), communicate with the Server via net-
work connections.
When you create panels, the new panels dis-
play under the root Panels icon in the System For hardware installation and specification
Configuration window, and placeholders for information, refer to the documentation that
additional items that need to be configured are was shipped with your panel.
listed under each panel.
Panel Naming Conventions

Panels should be named logically, including


information such as a panel’s location and what
it controls. This is helpful when configuring
other system components and when trouble-
shooting the system. For example, the panel
name Bldg B SW Corner is more meaningful to
an operator than Panel 1B. Descriptive names
cannot only identify the panel name and loca-
tion; but also, when terminals and time zones
associated with a panel use similar names, the
components are listed together (alphabetically).

Panel Configuration
The logical configuration sequence; however, Before configuring the panels that control your
does not follow the order presented on the Sys- security system, you must identify the type of
tem Configuration window. We recommend panel installed at your facility and follow the
hardware configuration be performed in the pertained instructions.
following sequence:
The following sections describe procedures to
configure CK721-A panels and related compo-
nents.

24-10832-194 Rev. E
54 CHAPTER 2
Configuring the System

The steps to configure other panel types differ 4. Fill in the information on each tab. (See
from the procedures described here. If you plan Edit Panel Field Definitions for details.)
to configure OSI, S321-IP, HID, Assa Abloy, 5. As you work through the tabs, you may
or Mercury panels, you must skip the remain- click Apply to save your entries.
ing sections and proceed to one of the follow-
ing sections: 6. Click OK to save your entries. A message
box displays asking if you wish to auto-
 Configure OSI Panels and Components on matically add all time zones to the new
page 95. panel. If you select No, you can add the
 Configure S321-IP Panels and Components time zones later; see Configure Panel Time
on page 108. Zones on page 62.
 Configure HID Panels and Components on 7. If you select Yes, the time zones are auto-
page 122. matically added. When you return to the
System Configuration window, the new
 Configure Assa Abloy® IP Door Locks and
panel name displays under the selected
Components on page 136.
panel type.
 Configure Mercury Panels and Components
on page 151.

Also, see Appendix C: Panel Comparison Note: For CK721-A panels, the panel version
Matrix to see the features supported by each number displays on the right windowpane of the
panel type. System Configuration window, after that panel
establishes communication with the Server.

To Add a New Panel


Soft Input Points
1. In the System Configuration window,
expand Panels to display the panel types. When a panel is created in the system, a Panel
2. Select one of the following panel types: Down soft input point is automatically created
for input point 25 and displays under the Soft
CK721-A Panels – To configure CK721-A Input Point icon as Panel Down <panel
panels. name>. If you wish to report this type of
S321-IP Panels – To configure S321-IP alarm, edit the input point and make sure the
panels, go to page 108 for details. Disable Alarm option is not selected in the
HID Network Panels – To configure HID General tab of Alarm Options, otherwise the
panels, go to page 122 for details. alarm does not report to the Alarm Queue, but
continues to report to the Real Time List (see
Mercury Panels – To configure Mercury
Alarm Options Tab on page 83).
panels, go to page 151 for details.
OSI Panels – To configure OSI panels, go If you rename the panel, you must edit the
to page 95 for details. input point to manually enter the new panel
Assa Abloy Panels – To configure Assa name, as in Panel Down <panel name>. See
Abloy panels, go to page 136 for details. Create Input Points on page 82 for detailed
information.
3. Click Add. The Edit Panel dialog box
opens at the General tab.

24-10832-194 Rev. E
55

Edit Panel Field Definitions Enabled – The system does not recognize the
panel unless you click Enabled. If you wish to
temporarily disable the panel, without having
General Tab
to delete the panel or disconnect the network
This dialog box defines descriptive informa- cable, click again to clear the check box to dis-
tion of the panel. able it. When you disable a panel, the readers
continue to grant access, but the panel does not
communicate with the Server until you enable
the panel again.

Query String – This value is used with message


filtering (see Define Query String Filters on
page 225).

RS-485 Baud Rate – Select the RS-485 commu-


nication rate. Options are: 9600, 19200, and
38400. The 38400 rate is only available with
panels Version 3.4 and later.

No Badge Archive to Flash – If enabled, the


Badge database is not saved to Flash during a
Write-Flash operation.
Partition – If you use Partitioning, select the No Access Group Archive to Flash – If enabled,
Partition that has access to this panel informa- the Access Group database (including elevator
tion. Access Groups) is not saved to Flash during a
Write-Flash operation.
Public – If you use Partitioning, click Public to
allow all partitions to see this panel. No Configuration Archive to Flash – If enabled,
the Configuration databases such as Panel, Ele-
Name – Enter a descriptive name for the panel.
vator, Terminal, Input, Output, Time Zones,
Type – Displays the panel type. Select the Holidays, Soft Alarms, and Card Events are not
firmware version from the drop-down list. saved to Flash during a Write-Flash operation.

Backup DB to Flash Interval – Enter the time


interval (in hours) to schedule automatic
Note: Certain features are enabled or disabled backup of the panel database to flash memory.
depending on the panel version selected. The The default backup period is once every 24
version selected is validated when the panel con-
hours. A backup period of 0 hours disables
nects. CK721-A panels that do not match are put
into a misconfigured state and are not allowed to
automatic database backups to flash memory.
fully communicate until the problem is resolved. This feature is to be used in conjunction with
the Write DB to Flash feature; see page 444 for
details.

Custom Configuration Number – This option


allows you to enter a number that is provided
by Johnson Controls, to enable special custom
features.

24-10832-194 Rev. E
56 CHAPTER 2
Configuring the System

Address Tab History Tab

This dialog box defines Primary IP addresses History settings govern how the panel uploads
for the panel. (You cannot complete panel con- data to the Server, and how long the panel
figuration unless you assign an IP address.) retains data in the transaction database before
older data is deleted.

Note: You must first configure the panel at the


Server, then proceed to configure the panel using
the CK721-A panel user interface.

Timezone – Select a time zone during which


the panel uploads data to the Server.

Upload only when greater than – To limit the


panel from always uploading data to the Server
Panel IP Address – Enter the IP Address. This during the time zone selected, click and select
entry must match the IP address at the panel. a percentage from the spin box only after
Panel Poll Interval – Enter the number of days, which data is uploaded.
hours, minutes, and seconds to set up the maxi- Always upload when greater than – Click and
mum time that the panel should be without select a percentage from the spin box after
contact with the Server. This value is down- which the panel always uploads data to the
loaded to the panel. Server.

Delete history older than – Click and enter the


Note: To set the Panel Poll Interval and the number of days the panel holds data before
Host Poll Timeout, use the following values: 0 to deletion. Select a time at which the history is
29 days, 0 to 23 hours, 0 to 59 minutes, and 0 to deleted.
59 seconds.

Host Poll Timeout – Enter the number of days,


hours, minutes and seconds that the Server
waits without receiving a poll, until it declares
the panel down.

24-10832-194 Rev. E
57

Access Tab Enforce Entry/Exit – Click if the panel operates


Entry and Exit terminals. Entry and Exit termi-
This dialog box defines Time Offsets for com- nals require the cardholder to badge at Entry
municating with remote panels and other time and Exit terminals alternately. For example,
zone-related information. Here you enable or badging at an Entry terminal and then badging
disable Timed Override/Anti-Tailgate, again at another Entry terminal is invalid. If
Entry/Exit, and System Override parameters; Entry and Exit terminals are installed in the
and set the PIN Code type used at the panel. panel, this option must be enabled for the
(See the Tip box on page 58 for more informa- Entry and Exit requirements to operate.
tion on PIN types.)
Timed Override/Anti-Tailgate – If enabled, a
Reader-controlled door in a state of manual
Timed Override is locked automatically when
the door is closed. If disabled, the Reader-con-
trolled door remains in override mode even
when the door is closed. Using this feature
requires the desired terminal’s Anti-Tailgate
check box to be enabled (see Flags Tab on
page 67).

System Override – If enabled, all doors con-


trolled by the panel are set in the unlocked
position. If disabled, all doors are set to their
normal position.

Time Offset – Click if the panel is in a different Note: The override state gets cancelled when
geographical time zone from the P2000 server. communication with the panel is lost for more
than 20 seconds. The override resumes when
Enter the appropriate hours and minutes for
communication is reestablished. In addition, be
the time offset. For example, if the P2000 aware that if you perform the Resume Normal
server is in California and the panel is in New Operation function from the Control All Doors
York, click the plus (+) sign, and select 3 hours application, the override state gets cancelled, but
from the spin box. the System Override option remains enabled.

Timezone Checking – Click if the panel is to


Peer to Peer Badge Sync – Click to have entry
check for valid reader and badge time zones,
and exit privileges enforced on reader termi-
badge access requests, PIN code suppression,
nals connected to different CK721-A panels.
and upload suppression during the assigned
This feature allows a CK721-A panel to broad-
time zones. If disabled, badge access decisions
cast the entry and exit status of a badge to mul-
are made based on valid badge and valid
tiple CK721-A panels, via User Datagram Pro-
access group parameters only.
tocol (UDP). This allows an entry and exit
zone to span across multiple panels within the
same subnet or across multiple subnets using a
properly configured multicast router.

24-10832-194 Rev. E
58 CHAPTER 2
Configuring the System

Source Time Zone – Select the source time


IMPORTANT: This feature must never be
zone that identifies the geographical time zone
combined with the Global Badge Entry/Exit Sta-
tus Synchronization option selection (see of this panel, if the panel is in a different time
page 33). Selecting both features causes badge zone from the P2000 server.
entry and exit enforcement errors across multiple
panels.
Alarm Tab

Broadcast Port Number – Enter the UDP port Panel relay, latch output functionality, and
number used by the Peer to Peer Badge Sync other parameters are set up in the Alarm tab.
UDP Broadcast agents. This number must
match that configured at the other CK721-A
panels.

PIN Code Type – Select Algorithmic or Cus-


tom. An algorithmic PIN is determined by an
algorithm programmed in the terminal. A cus-
tom PIN code must be entered in the Badge
window for each individual cardholder. (See
the following Tip box for more information on
PIN types, and see Configure PIN Codes on
page 78 for instructions.) Algorithmic codes
need to be requested from Technical Support.

PIN Code Digits – Select the number of PIN


code digits that allow access at a keypad termi- Reporting Delay – If enabled, the alarm is
nal. See Appendix C: Panel Comparison delayed by the number of seconds (0 to 60) set
Matrix for the maximum number of PIN code in the Reporting Delay field. If the input point
digits supported by each panel type. returns to the secure state before the delay
expires, the panel does not report the alarm to
the Server at all. If disabled, the alarm is
reported immediately. Open and short condi-
TIP: We recommend all panels in the system tions for 4-state input points are reported
immediately regardless of this setting.
that use PIN code readers be defined to use the
same number of PIN code digits and to have the
same PIN type, or access may be denied. Access Latch Output – If enabled, the alarm relay is
could be denied because of mismatches in PIN activated whenever an alarm occurs, and
code length and type between the PINs defined remains latched (activated) until reset by a card
here and the PINs defined in the Badge window. activated event, or acknowledged at the panel.
If disabled, the panel alarm relay is activated
Scramble Mode – Eight algorithms are embed- whenever an alarm occurs and deactivated
ded in the terminal. If Algorithmic was when all alarms are reset (if configured to do
selected in the PIN Code Type field, enter a so in the Input Point dialog box).
number from 0 through 7 to choose the appro-
priate algorithm.

24-10832-194 Rev. E
59

Enable Panel Relay Group Outputs – If enabled,


two output groups are created to represent two
physical output points on the panel CPU
board: Relay 1 and Relay 2. Although both
relays display under the Output Groups icon
for the panel selected, only Relay 1 is sup-
ported in this release. This output group can be
controlled as any other output group in the sys-
tem.

Output Delay – Enter the number of seconds


before the latch in the Latch Output field is to
be activated. Use this field only when the
Latch Output field is enabled. You can define a
time interval before the panel’s alarm relay
activates; for example, if an input point has Protocol Type – Select the elevator protocol
been configured to activate the panel’s alarm type to be used at your facility. Choices are:
relay, this could be the selectable delay in sec- <none>, KONE HLI, Otis® EMS - Security/
onds (0 to 60), before the relay activates. The BMS, Otis Compass, Kone IP, ThyssenKrupp
delay starts after the input point has activated. Serial, and Otis EMS Serial. If you select
<none>, you can only configure Low Level
Enable Input Suppression Messages – If Interface elevators. See Appendix C: Panel
enabled, input points that enter suppression are Comparison Matrix for the elevator protocols
reported as being suppressed. When the input supported by each panel version. Also, see
is no longer suppressed, the current input point Configuring Elevators on page 199 for specific
state is reported. configuration instructions. The following con-
figuration fields are enabled depending on the
Elevator Tab elevator protocol type selected.

Use this tab to configure CK721-A panels to


communicate with High Level Interface eleva- Note: Mercury elevators are configured in a
tor control equipment via a protocol. Once the different manner. See Configure Mercury Eleva-
tors on page 184 for instructions.
elevator protocol parameters are defined, use
the Elevator Configuration dialog box to
define the readers and associated outputs and Baud Rate – Available when configuring
inputs that operate with your particular eleva- KONE HLI elevators. Select the baud rate,
tor controller. For details, see Elevator Access options are 9600 or 1200. This setting must
Control on page 196. match the baud rate configured at the elevator
group controller.

Group Controller Address – Available when


configuring KONE HLI elevators. Select an
address (1 to 8). This setting must match the
address of the elevator group controller. An
incorrect setting does not permit the integra-
tion to be operational.

24-10832-194 Rev. E
60 CHAPTER 2
Configuring the System

Lowest Floor for Group Controller – Available Poll Delay Factor – Available when configuring
when configuring KONE HLI elevators. Enter Otis EMS Serial elevators. Enter the poll delay
the lowest level (1 to 64) of the building served factor (0 to 9) that prevents the Otis equipment
by any KONE elevator in this KONE group from being overloaded. A lower value speeds
controller. An incorrect setting secures and up the integration. We recommend not chang-
unsecures floors other than those intended. ing the default value.

Elevator Integration Server – Available when Retries – Available when configuring Otis
configuring ThyssenKrupp Serial and Otis EMS Serial elevators. Enter the number of
EMS Serial elevators. Select the name of the times (0 to 9) a message is retried before the
CK721-A panel that communicates directly Otis elevator system is declared offline. We
with the Otis EMS or the ThyssenKrupp eleva- recommend not changing the default value.
tor system using a serial communications link.
The list displays all available CK721-A panels
Encryption Tab
that are marked as elevator servers. If you
select <This Panel>, the CK721-A panel Use this tab to configure the P2000 software to
becomes the elevator server for the elevator secure every message to and from a CK721-A
protocol. You cannot define elevators under a panel, using Advanced Encryption Standard
CK721-A panel that is defined as an elevator (AES) to protect the P2000 system from unau-
server. thorized sources. This encryption methodology
is supported for all three channels: Upload,
Elevator Integration Server TCP Port – Avail-
Download, and Priority.
able when configuring ThyssenKrupp Serial
and Otis EMS Serial elevators. The TCP port
provides the communication between the
CK721-A server and the CK721-A client. This Note: P2000 Encryption is implemented using
Federal Information Processing Standards (FIPS)
field displays 48500 as the default elevator
140-2, validated, (Certificate #2398), cryp-
TCP port. You can modify this setting accord- tographic module, from Microsoft http://www.mic-
ing to your specific site needs. rosoft.com.
Total Number of Floors in Building – Available
when configuring Otis EMS Serial elevators.
This is the total number of floors in the build-
ing. A zero is the suggested value and tells the
Otis EMS Serial to use the floor count from the
elevator floors definition. The maximum floor
number is 64.

Timeout Factor – Available when configuring


Otis EMS Serial elevators. Enter the timeout
factor (0 to 9) by which the Otis elevator
should respond. A higher value gives the Otis
equipment more time to respond. We recom-
mend not changing the default value.

24-10832-194 Rev. E
61

IMPORTANT: You must define the encryption


key before enabling encryption.

Encryption Enabled – Click to allow encryp-


tion of all messaging between the CK721-A
Version 3.1 (and later) panel and the P2000
Server. Encryption must be enabled at the
CK721-A panel using its local user interface.

Note: While encryption is enabled, Telnet and


FTP network connections are rejected by the
CK721-A panel. Some components must be configured before
they can be applied to other components; how-
Create – Click to generate a random encryp- ever, the System Configuration window does
tion key. not list them in a logical configuration
sequence. For example, you must configure
Encryption Key – The Encryption Key text Panel Time Zones before you can complete
boxes display the key to be used for encrypted Terminal configuration, but you must config-
communications. If you prefer you may enter ure Terminals before you can create Soft
your own key (not to exceed 64 digits) in the Alarms, Input and Output Points and Groups,
text boxes. This key must match the key con- and Panel Card Events. For this reason, it is
figured at the CK721-A panel using its local important to configure Panel Time Zones and
user interface. Refer to the CK721-A Installa- Panel Holidays (if used), and then configure
tion and Operation Manual for details. Terminals before continuing with other panel
components.
Configure Panel Components We recommend the following configuration
sequence:
When a new panel is created, the new Panel
icon is listed under the root Panels icon in the  Configure Panel Time Zones
System Configuration window, and placehold-
 Configure Panel Holidays
ers for all panel components are added under
the new panel.  Configure Air Crew PIN Numbers
 Configure Panel Card Formats
 Configure Additional Panel Components

Complete instructions are presented in the fol-


lowing sections.

24-10832-194 Rev. E
62 CHAPTER 2
Configuring the System

Configure Panel Time Zones

Time Zones (created during System Configura-


tion) can be applied to a specific panel and its
associated components. See Appendix C:
Panel Comparison Matrix for the number of
panel time zones supported for each panel
type. You must apply at least one time zone to
each panel in your system. If time zones are
applicable to other panel components such as
readers, inputs, or outputs, these time zones
must also be defined.

Note: Each Assa Abloy lock can only store a


maximum of 32 different time periods. Make sure
the panel time zones assigned to an Assa Abloy
panel do not exceed this number; otherwise the
panel is out of sync. See the table on page 36 for
the number of time periods for other panel types.

Note: Any changes to the panel time zones for 3. Use the drop-down lists to select any time
Mercury panels requires downloading Access zones configured in the system.
Groups and Card Events to the affected panel.
4. If your panel type allows it and you need to
assign more than 16 time zones, click the
You can automatically operate outputs such as Timezones 17–32 tab and continue to add
lights, air conditioning, and so on, by associat- time zones as in step 3. Select additional
ing Output Groups with Panel Time Zones (not tabs and enter additional time zones as
available for OSI, S321-IP, HID, Assa Abloy, needed, up to a total of 64.
or Mercury panels).
5. After all time zones (and Output Groups, if
Panel Time Zones must be defined before you applicable) are assigned, click OK to save
can complete Terminal configuration. If you your entries and return to the System Con-
have not yet configured Terminals and Output figuration window.
Groups, you should enter Panel Time Zones
now, and return to add the Output Groups and
To Assign an Output Group to a Panel
any additional time zones.
Time Zone

To Assign a Panel Time Zone 1. In the Panel Timezone Edit dialog box,
select the Time Zone to which you wish to
1. In the System Configuration window, associate an Output Group.
expand the Panel to which you wish to 2. Select the associated Output Group. Out-
assign the Time Zone. The panel compo- put Groups must be created before they can
nents are listed below the panel icon. be accessible from the Panel Time Zone
2. Select Panel Timezones and click Edit. drop-down lists. (See Create Output Points
The Panel Timezone Edit dialog box opens. and Groups on page 80.)

24-10832-194 Rev. E
63

Configure Panel Holidays 4. When all Holidays are defined, click OK


to save the settings and return to the Sys-
Panel Holidays are not required for system tem Configuration window.
operation; however, they may be useful in cer-
tain applications. For example, you may want
to allow facility access during a Holiday Configure Air Crew PIN Numbers
period, but limit the number of entry doors.
The P2000 system allows you to define air
You can assign a specific Holiday Time Zone
crew personal identification numbers (PIN) to
to restrict access at a specific panel.
be used at PIN readers connected to CK721-A
See Appendix C: Panel Comparison Matrix for panels. Once the Air Crew PIN numbers are
the number of panel holidays supported for defined, a system administrator can enable or
each panel type. disable the Air Crew PIN feature from the Edit
Terminal dialog box; see page 75 for details.
When this feature is enabled, entering the
To Assign a Panel Holiday assigned Air Crew PIN number allows access
1. In the System Configuration window, at the door. You can create an Air Crew PIN
expand the Panel to which you wish to number to be assigned to a group of people, or
assign a Panel Holiday. create a PIN number to be assigned individu-
ally to an Air Crew member with different
2. Select Panel Holidays and click Edit. The access needs. Presenting a badge is not
Panel Holiday Edit dialog box opens. required when using the Air Crew PIN Num-
ber feature.

As an alternative, you can also see the instruc-


tions in Appendix D: Using a Keypad Reader
on CK721-A Panels.

To Define Air Crew PIN Numbers

1. In the System Configuration window,


expand Panels.
2. Select Air Crew PIN Code and click Edit.
The Edit Air Crew PIN Number dialog box
opens.

3. Use the drop-down lists to select the sys-


tem Holidays that apply to this panel.

24-10832-194 Rev. E
64 CHAPTER 2
Configuring the System

3. Double-click to enter the Name and corre- 3. To add a custom card format, click the line
sponding Code to define each Air Crew item you wish to define and click Add.
PIN Number. The Code number can have 4. Navigate to the directory where your card
up to 16 digits. format files are stored and double-click the
4. When you finish defining all Air Crew PIN <name>.txt file you wish to use. Click Yes
numbers, click OK to return to the System if you wish to enable the format for all
Configuration window. These names dis- CK721-A terminals and also want to add it
play in the Air Crew Pin tab of the Edit to S321-IP terminals with no custom card
Terminal dialog box. assignment. The name and description of
the selected card format file displays in the
line item selected. You can add up to eight
Configure Panel Card Formats
custom card format files.
P2000 supports up to eight custom card for- 5. If you wish to update or replace an existing
mats that can be downloaded to CK721-A and file, select the file name from the list and
S321-IP panels. Upon selection, custom card click Update. A verification message dis-
files are stored in a separate database table. plays, click Yes then proceed to select the
Once the selected card formats have been com- replacement file.
piled, they are available for selection using the
6. To delete a file format, select the file name
Card Type tab in the Terminal dialog box.
from the list and click Delete. You are
prompted for verification.
7. To view the contents of a file format, select
Note: Contact Johnson Controls for instruc-
tions in generating Custom Card Format files. the file from the list and click View. A text
file displays the format code string of the
selected format. When you finish viewing
To Add Custom Card Formats the file, close the window.
8. Click Done to close the Panel Card For-
1. In the System Configuration window,
mats dialog box. The new card formats are
expand Panels.
available from the Card Type tab in the
2. Select Panel Card Formats and click Terminal dialog box.
Edit. The Panel Card Formats dialog box
opens.
Configure Additional Panel
Components

Soft Alarms, Input and Output Points and


Groups, and Panel Card Events all use Termi-
nal information in their configuration; there-
fore, you must create and configure terminals
before you can configure these components.
See Configure Terminals for more information.

24-10832-194 Rev. E
65

Configure Terminals Note: Not all terminal options are available to


all panel versions. Certain features are enabled
Terminals are add-in boards such as reader
or disabled depending on the panel version
boards and input and output boards. These are where the terminals are installed.
installed into the panels to communicate with
devices such as card readers; inputs such as
alarm monitoring devices; and output devices To Create a New Terminal
that control other devices such as lights, air
conditioning, alarm annunciators, and so forth. 1. In the System Configuration window,
expand Panels to display the panel types.
Each terminal installed in your system must be
set up and configured in the P2000 software to 2. Expand CK721-A Panels. The panel
establish communication and control. Once names created under this type display.
terminals are configured, they may be included 3. Expand the panel in which the terminal is
in Terminal Groups and associated with Input installed. All the items that can be config-
Points and Groups to report alarms and trigger ured for the panel are listed under it.
events. We recommend the following setup 4. Select Terminals and click Add. The Edit
and configuration sequence: Terminal dialog box opens at the General
 Set up Terminals for each Panel tab. Enter the information in each tab
according to your system requirements and
 Create Terminal Groups naming conventions. (See Edit Terminal
 Configure Input and Output Points and Field Definitions for detailed information.)
Groups As you work through the tabs, click Apply
to save your settings.
These sections present instructions to config-
ure terminals installed on CK721-A panels. If
you have not already developed naming con-
ventions for these program elements, we rec-
ommend you do so before beginning this pro-
cedure. See Panel Naming Conventions on
page 53 for more information.

Set up Terminals for each Panel

Terminals can control card readers, input


points, output points, or a combination of the
three, depending on the type of board installed
in the panel. You must set up terminals for
each panel configured in the P2000 software.
5. When all entries are complete, click OK to
As with all configuration operations, the Edit
save your settings and return to the System
Terminal dialog box is accessed from the Sys-
Configuration window. Your new terminal
tem Configuration window.
is listed under the Terminal icon. In the
following example, Terminals named
Whse Entry Reader, Whse Exit Reader,
and Whse I/O8 were created for the Ware-
house panel.

24-10832-194 Rev. E
66 CHAPTER 2
Configuring the System

Enable – Click Enable for the system to recog-


nize the terminal.

Input – Select to define this terminal as an


alarm monitor terminal or as a terminal that
provides input points.
6. Continue to create terminals for every
Output – Select to define this terminal as an
panel in which they are installed.
output control terminal or as a terminal that
provides output points.

Note: You must perform the Write DB to Flash Module Type – Select one of the following
function (see page 444) when adding or deleting module types connected to your input or output
RDR2S-A or RDR8S terminals, or when modify- terminal: RDR2SA, RDR8S, I8O4, or I32O16.
ing any field on the General tab of an existing
RDR2S-A or RDR8S terminal (except Name, Address – Select the address (0 to 31) of the
Public, or Query String fields). hardware module.

Index – Select the index number of the terminal


Edit Terminal Field Definitions on the hardware module.

The Edit Terminal dialog box opens at the


General tab. Enter the required information on Note: The specific number of readers, input
each tab to complete the configuration. points, output points, and the terminal features
supported depend on the type of hardware Mod-
ule Type selected.
General Tab

Name – Enter the name of the new terminal. Reader – Select to define this terminal as a card
Use descriptive names according to your Nam- reader terminal. If selected, additional tabs are
ing Conventions Plan. added.

Panel – This field displays the name of the Module Type – Select one of the following
panel you selected from the System Configura- module types connected to your reader termi-
tion window. nal: RDR2SA or RDR8S.

Query String – This value is used with message Address – Select the address (0 to 31) of the
filtering (see Define Query String Filters on hardware module.
page 225).
Index – Select the index number of the hard-
Number – Select a terminal number. This ter- ware module.
minal number differs from the physical address
Reader Type – Select if this is an Access, an
as installed at the panel. (Refer to your specific
Entry, or an Exit reader terminal.
hardware configuration documentation if you
need more information on terminal number
assignment.) Note: For Entry and Exit to work, all Entry and
all Exit terminals must run in Central mode or they
Public – If this is a partitioned system, select must all be defined on the same panel and run in
Public if you wish this terminal to be visible to Local mode.
all partitions.

24-10832-194 Rev. E
67

Reader Mode – Select a reader mode. You can- Facility Code Only when Offline – If enabled,
not mix Wiegand and non-Wiegand reader the terminal accepts any badge with the correct
modes on the same RDR2S-A. Choices are: facility code when the terminal is offline from
the panel. This option is supported with some
 Wiegand card formats. See Facility Codes Tab on
 OSDP version 1 – Open Supervised Device page 74 for more details.
Protocol readers are supported with
CK721-A panels Version 3.2 and later with PIN Required when Offline – If enabled, an
RDR2S-A (firmware PS-217F and later) or algorithmic PIN number is required for badge
RDR8S (firmware PS-218B and later) mod- acceptance if the terminal goes offline.
ules. Allow PIN after Badge – If enabled, the card-
holder can enter the PIN number after present-
Note: OSDP reader status is supported with ing the badge instead of before presenting the
panels Version 3.4 and later. After you save the badge. Press the <#> key after entering the
terminal record, a terminal input point is automat- PIN number (see Configure PIN Codes on
ically created for input point 16 and displays as page 78). If disabled, the conditions under
Reader <terminal name>. The purpose of input Trigger Type in the Options box of the Panel
point 16 is to report alarms associated with the Card Event apply; see page 92.
communication status of the OSDP reader con-
nection to the hardware module (RDR2S-A or Reverse Reading – If enabled, when you turn a
RDR8S); you must configure alarm options for badge facing away from you and swipe in the
input point 16, other input point features are not normal direction, the badge still reads. Applies
supported.
to Binary BaFe and BCD BaFe cards only.
Log Reader Strike Message – If enabled, the
Flags Tab transaction displays in the Real Time List and
on the System Status window. This option
does not apply if the reader is to be assigned to
an elevator or cabinet.
Access Grant Message on Door Open Only – For
this feature to work, the terminal must be con-
figured to run in Local mode. If enabled, access
grant messages are generated when the card-
holder swipes the badge and opens the door.
When enabled, the Keyless Override timer
starts after swiping a badge (with override
privileges) and immediately opening the door.
When disabled, the Keyless Override timer
starts after swiping a badge (with override
Reader Box privileges).
Alarm Shunt Only for Auxiliary Access – If Also, in the case of elevator readers when this
enabled, the Aux-Access Input Point on the flag is enabled, elevator access grant messages
terminal suppresses only the Door Open are generated only when the cardholder pres-
Alarm. If disabled, the Aux-Access Input ents a badge at an elevator reader and a valid
Point on the terminal performs an access grant. floor is selected.

24-10832-194 Rev. E
68 CHAPTER 2
Configuring the System

Re-lock on Door Open – If enabled, the door is Valid & Unauthorized – If enabled, a green light
re-locked when the door is opened. Shunt indicates that badging has taken place; how-
remains active until after temporary override ever, the system does not grant access to the
timers (if any) expire and then after the shunt cardholder. A security guard must manually
time also expires. When the Anti-Tailgate or unlock the door with a key or push a button to
Timed Shunt options are enabled, shunt can open the door and allow access.
end earlier if the door closes. The Re-lock on
Door Open option is disabled during scheduled Reverse Swipe Duress – If enabled, you can
override periods. turn the badge away from you and swipe in the
normal direction to report a duress alarm. (Soft
No Green Light on Aux Access – If enabled, no alarm must be configured for this reader; see
green light displays on auxiliary access. Soft Alarms Field Definitions on page 94.)
Applies to Binary BaFe and BCD BaFe cards
Deny If Door Open – If enabled, an access only. When you enable Reverse Swipe Duress,
denied message is generated when the card- the Reverse Reading option is automatically
holder swipes the badge at an opened door. enabled.
Anti Tailgate – If enabled, the strike and shunt PIN Plus 1 Duress – If enabled, a duress alarm
timers are immediately reset and the door is generated when a cardholder adds 1 to the
immediately locks, following an access grant last digit of the PIN code (for example, 6
when a door closes. This prevents reopening becomes 7, not 61). When this option is
the door using one badge access. When used enabled, the 9 does not create a duress alarm. If
with the Re-lock on Door Open option, open- the last digit of the PIN code is a 9, then the
ing a door immediately re-locks the door. user substitutes a 0 for the 9 and this triggers
Momentary Auxiliary Access – If enabled, the the duress alarm. This feature only works if the
Access Time begins timing when a switch Duress soft alarm is enabled.
shorts the terminal’s Aux-Access input point Star Feature – If enabled, the cardholder can
contact. If disabled, the terminal’s Aux-Access press the star (*) key at the keypad plus a fea-
input point contact energizes the door relay as ture number, to activate some of the panel’s
long as the contact is shorted. functions that are normally invoked from key-
Reader Override Timezone Enable – If enabled, pads that contain the A, B, C, or D keys. The
the reader does not require a badge to open the (#) key acts as the Enter key, it wraps-up the
door during the reader override time zone. (A previously entered keys and starts the process-
time zone must be selected in the Override ing of the key sequence. It also clears the key-
field of the Timezone tab to enable this func- pad buffer for the next command to be entered.
tion.) The (*) key starts the feature selection process.
Once pressed, the cardholder can activate one
Soft In-X-It – If enabled, cardholders have of the following features:
access even though the In-X-It status is incor-
rect. (A soft alarm can be triggered if config- 0 = Local Override, followed by number of
ured through the Soft Alarms dialog box; see minutes
page 93.) 1 = Enable event, followed by event number
2 = Air Crew PIN
4 = Disable event, followed by event number

24-10832-194 Rev. E
69

* = Clear the keypad buffer. This works inde- Log Output Status Message – (Outputs only)
pendently of the Star Feature setting Click to send output relay messages from the
panel to the P2000 Server (whether or not
The cardholder must enter all PIN and Card ID access is granted). Must be selected to show as
information before selecting a feature. As an active on the System Status window. This
alternative, instead of pressing the (#) key, the option is disabled for output points assigned to
cardholder can swipe the badge to wrap-up the an elevator or cabinet.
previously entered keys and start the process-
ing of the key sequence; however, with the
Allow PIN after badge option the (#) key is Override Reset Threat Level Box
always required.
Each reader terminal defined for a CK721-A
For details, see Appendix D: Using a Keypad panel can be configured with an Override
Reader on CK721-A Panels. Reset Threat Level ranging between 0 and 99.
A value of 0 disables the Override Reset fea-
Log Auxiliary Access – If enabled, the system ture; a value between 1 and 99 invokes the fol-
reports when a Request to Exit (REX) input lowing behavior:
point activation allows a door to open, without
generating a forced door alarm (someone Whenever a terminal’s Security Level reaches
exits). When the REX input point grants Aux- or exceeds the terminal’s Override Reset
iliary Access and a door opens, the system Threat Level, all time zone based overrides,
reports this as a panel event. We recommend host initiated overrides and cardholder over-
that the REX inputs operate in 4-state mode. rides are immediately disabled. Subsequent
Also make sure you enable Forced/Propped attempts to invoke host initiated overrides or
soft alarms. You should also note that: cardholder overrides are denied.

 Reporting REX transactions is not sup- Once a terminal’s Security Level drops below
ported on devices operating in legacy the terminal’s Override Reset Threat Level, the
addressing mode. time zone based override is restored immedi-
ately. Host initiated overrides and cardholder
 Log Auxiliary Access is not supported
overrides are not automatically restored, but
when door inputs are reassigned as general
subsequent attempts to invoke host initiated
purpose inputs.
overrides or cardholder overrides are granted,
provided the configuration allows these over-
Input/Output Box rides.
Alarm Debounce Time – (Inputs only) Enter a The System Override feature is not affected by
delay time in milliseconds that the system the Override Reset Threat Level, and remains
waits to sample this terminal’s Supervised in effect as long as the panel’s System Over-
Input Point Circuits. The default is 20 msec. ride flag is set.
This improves system performance by ignor-
ing a circuit disturbance, such as a door jiggle
as it closes, rather than reporting an alarm. To Create an Input/Output Terminal

1. From the System Configuration window,


select the panel to which the Input/Output
terminal is added.

24-10832-194 Rev. E
70 CHAPTER 2
Configuring the System

2. Select the terminal to which you wish to Access Tab


add input and output points and click Add.
The Access tab defines the terminal’s operat-
The Edit Terminal dialog box opens. ing mode, and the access parameters and over-
rides allowed at the terminal.

3. Enter a descriptive name for the terminal.


4. Select both Input and Output. Access Box
5. Select the Module Type, Address, and Process – Select one of three operating modes:
Index for this terminal.
 Local – Access decisions for this terminal
6. Click the Flags tab. are made at the panel level. Must be
selected for readers assigned to elevators or
cabinets.
 Central – Access decisions for this terminal
are made at the Server.
 Shared – Access decisions are first
requested at the panel; if the badge record is
not stored at the panel, the access request is
passed on to the Server.

For more information on system performance


and operating process modes, see Communica-
tion Modes on page 6.

Anti-Passback – Click if this reader is an


7. Enter an Alarm Debounce time.
anti-passback reader. Enter a time in minutes
8. Select Log Output Status Message if you that a badge used at the reader is invalid before
want the status of the outputs to display in it can be used at the same or any other
the Real Time List and the System Status anti-passback reader.
window.
Access Time – Enter a time in seconds that the
door strike is energized after each valid badge
access request. The maximum value is 25 sec-
onds.

24-10832-194 Rev. E
71

Shunt Time – Enter a time in seconds that the There are two modes of temporary override:
door open alarm is suppressed after a valid
badge access request. The shunt time should Timed Override – Select this option if you want
be longer than the access time. The maximum to unlock the door for an extended period of
value is 255 seconds. time.

Timed Shunt – If you select this option, only


Note: If Anti-Tailgate is enabled, after an the shunt time is extended by the number of
access grant, the shunt time is cancelled once minutes in the temporary override. The access
the door status changes to locked and closed,
time remains at the configured value. Use the
even if the shunt time has not yet expired.
Timed Shunt mode if you want the door to be
held open for an extended period of time, but
Door Open Warning Box do not want the door to be unlocked for that
time.
Warning Output Group – Select the output
group that is to be activated when the Warning
Time is reached.
Note: In Timed Shunt mode, if the door is not
Warning Time – Enter the time in seconds (0 to opened while it is unlocked, the access ends,
even if the shunt time has not yet expired.
255) before the Shunt Time expires for the
Warning Output Group to be activated if the
door remains open. For a cardholder to activate a local override,
the presented badge must have the Override
Shunt Warning Auto Off – If enabled, the Warn- option enabled in the Badge dialog box, and
ing Output Group is reset when the door is the Cardholder Override/Shunt option must be
closed, access is granted, or the door is over- enabled in this tab.
ridden. Therefore, the Door Open Warning is
deactivated when there is no Propped Door Cardholder Override/Shunt – If enabled, an
alarm in the immediate future. authorized cardholder may temporarily over-
ride the shunt time and access time by per-
forming a badging procedure at a keypad
Timed Override/Timed Shunt Box reader. The timed override/shunt establishes an
A temporary override allows access times to extended shunt time and access time period
be temporarily extended by a number of min- from 0 to 1440 minutes (24 hours). The card-
utes and can be generated through a panel card holder must have the Override option enabled
event, the Keyless Override option, the Door in the Badge dialog box. Follow these instruc-
Control application, or by entering a number at tions to perform a timed override/shunt access
a keypad reader (see Cardholder Over- at a keypad:
ride/Shunt in this section). 1. Enter your PIN code on the keypad (if PIN
If you enable the Re-lock on Door Open codes are part of your system configura-
option, when the door is opened during the tion).
access time the door is re-locked. If you also 2. Press the <*> key (or <*> 0 if the Star Fea-
enable the Anti-Tailgate option, after a door is ture is selected in the Flags tab).
re-locked by the Re-lock on Door Open 3. Enter the number of minutes desired for
option, if the door is closed again, the shunt the override/shunt period.
time is also cancelled.
4. Press the <#> key.

24-10832-194 Rev. E
72 CHAPTER 2
Configuring the System

5. Badge into the keypad reader, so that the Warning Auto Off – If enabled, the Warning
override/shunt privilege can be checked Output Group is reset when the door closes or
against the badge record. when override is extended past the point when
6. If you wish to terminate the timed over- the warning should be triggered. Just an access
ride/shunt period (before the number of grant alone does not deactivate the Override
minutes selected have run out), repeat steps Warning. This feature is most useful in connec-
1 through 5, entering 0 minutes in step 3. tion with the Timed Override/Anti-Tailgate
option enabled. If Timed Override/Anti-Tail-
For details, see Appendix D: Using a Keypad gate is not enabled, it is possible that the Over-
Reader on CK721-A Panels. ride Warning is deactivated before the override
actually expires. If you want to avoid this sce-
Keyless Override/Shunt Time – Instead of hav- nario, disable this option.
ing to enter the number of minutes for the
timed override/shunt at a keypad reader, you
can have the system do it for you. Entering a Assisted Access Box
time from 1 to 1440 minutes into this field
treats a qualifying badging procedure as if the
number of minutes had been entered at the Note: This feature only works on terminals that
keypad. You can still choose to enter a differ- operate in Local mode.
ent number of minutes at the keypad reader,
which takes priority over the configured over- This option allows you to set up a door’s
ride/shunt time. Entering a 0 into the Keyless access time to be different, to satisfy the
Override/Shunt Time field turns this feature requirements for assisted access according to
off. The rules as to who can invoke a keyless ADA (Americans with Disabilities Act). The
timed override/shunt are identical to those gov- system provides three Special Access flags, A,
erning the keypad invoked override. When the B, and C, which can be renamed in the Site
Access Grant Message on Door Open Only Parameters dialog box according to your facil-
flag is selected in the Flags Tab, the keyless ity needs, and then assigned to a cardholder
override timer starts after the cardholder that requires special access at a door.
swipes the badge with override privileges and
then opens the door. Additionally, you may activate an ADA relay
in conjunction with granting assisted access.
Warning Output Group – Select the output
group to be activated when the timed over- Assisted Access – Select one of the following
ride/shunt expiration for this terminal falls options:
within the time set in the Warning Time field.
 Never – Assisted Access is not available at
Warning Time – Enter the time (0 to 10 min- the door, even if the cardholder’s badge has
utes) to activate the Warning Output Group to the Special Access A flag enabled.
warn operators that the override/shunt is about  Always – The door is always opened for the
to expire. For example, if you have created a Assisted Access Time, regardless if the
temporary door override/shunt for 8 hours, you cardholder’s badge has the Special Access
can create an audible output group that acti- A flag enabled.
vates 10 minutes before the override/shunt
expires to let operators know the door shortly
begins operating in normal mode.

24-10832-194 Rev. E
73

 Special Access A – The door is opened for N-Man Rule Box


the Assisted Access Time, only if the card-
holder’s badge has the Special Access A This option provides additional security mea-
flag enabled. If the Special Access A flag sures for specific access-controlled readers at
has been renamed using the Site Parameters your facility. The N-Man Rule is based on a
dialog box, that name displays here. team of cardholders who must present their
badge as a group within a defined period of
Assisted Access Time – Enter the time in sec- time to gain access at an N-Man Rule defined
onds (1 to 120) that the door remains unlocked reader. For this option to work, the terminals
to provide access time to cardholders with spe- are required to operate in Central mode.
cial needs. The assisted shunt time exceeds the
assisted access time by the same amount that Cardholders – Enter the number of cardholders
the regular shunt time exceeds the regular who must badge as a unit when entering an
access time. N-Man Rule controlled-reader.

ADA Relay Connector – Select the connector Time – Enter the time in seconds during which
that is activated for the ADA Relay time when the number of cardholders in the team are
assisted access is granted. Choices are: required to present their badge.

 Green – if the ADA relay is connected to Visitor Escort Mode – If enabled, a visitor can
the supported module connector that nor- gain access after badging at an N-Man Rule
mally drives the green light defined reader, as long as the visitor’s sponsor
 Shunt – if the ADA relay is connected to the presents the badge after the visitor. If this
supported module connector that normally option is selected, the default number in the
indicates the shunt condition Cardholders field is 2.
 <none> – if the ADA relay is not connected
to any supported module connector. Timezone Tab
Note that when connecting the ADA relay to The Timezone tab defines the time zones in
either one of these outputs, its regular func- which this terminal operates. Panel Time
tion, such as activating the green light or indi- Zones must be set up before they display in
cating the shunt condition, is no longer avail- drop-down lists.
able. Also, refer to the CK721-A
documentation about wiring procedures.

ADA Relay Time – Enter the amount of time in


seconds (1 to 120) that needs to elapse after an
assisted access grant before the ADA Relay
Connector is deactivated. The ADA Relay time
therefore specifies the time the ADA relay is
activated minus any ADA Relay Delay.

ADA Relay Delay – Enter the amount of time (0


to 30 units of 100 milliseconds) that needs to
elapse after an assisted access grant before the
ADA Relay Connector is activated. This may Enabled – Select a time zone that is in effect
be necessary to avoid operating the door-open- for this terminal.
ing device before the door is fully unlocked.

24-10832-194 Rev. E
74 CHAPTER 2
Configuring the System

Override – Select a time zone that can be set as The FASC-N (PIV, CAC, TWIC) and the
an override for this terminal. This field is UUID (PIV-I, CIV, FRAC) card formats are
available if Reader Override Timezone Enable provided to support Federal Identity, Creden-
is selected in the Flags tab. tial, and Access Management (FICAM) com-
pliant smart cards. These card formats do not
PIN Suppression – Select a time zone during work with the Facility Code Only when
which cardholders do not have to enter a PIN Offline and PIN Required when Offline
number. options.

Facility Codes Tab

Enter a Facility Code and corresponding card


type for each group of cards that uses this ter-
minal. You may enter up to 12 different facility
codes. Facility codes must be entered consecu-
tively. When a facility code is 0, the following
codes are ignored.

Note: Only cards that have the first facility


code selected here are granted access if the ter-
minal loses connection to the panel, as long as
the Facility Code Only when Offline option is
selected in the Flags Tab.

Select only the card formats that are necessary.


Also, note that:

 In addition to a non-PIN based card type,


you may select PIN + Card ID. This gives
people who have forgotten their badge the
opportunity to get access by keying-in their
badge number and their PIN. See Configure
PIN Codes on page 78 for details.
 If you use a two-wire reader with a keypad,
you must wire the Data 0 and Data 1 wires
Card Type Tab so that the keypad produces the correct
input to the panel. If this configuration
Select the type of card to use at this reader. If causes the badge data to be reported
the reader is disabled, the Card Type should be inversely, you can click Invert Data to
set to No Card Allowed. inverse just the badge data, so that the panel
Custom Card Format cards work offline can correctly interpret both the keypad data
(using the Facility Code Only when Offline and the badge data.
option), as long as the Binary BaFe card type
is also selected. In addition, the first Facility
Code entered in the Facility Code tab must be
4.

24-10832-194 Rev. E
75

 CK721-A panels Version 3.5 and later sup- If you click either of the Calibrate buttons, the
port HID Corporate 1000 card types that Server sends a calibration command to the
use 48-bit formats, in addition to the 35-bit panel, the panel then forwards the command to
format currently supported. The 48-bit for- the RDR2S-A or RDR8S module to initiate the
mat cannot be used with RDR2S-A and input’s calibration. When the module com-
RDR8S modules in offline mode (using the pletes its calibration, typically within a few
Facility Code Only when Offline option). seconds, the panel sends a transaction message
In offline mode both modules only process to the Real Time List indicating the calibration
35-bit formats. result. After a successful calibration, four-state
input statuses are functional for the input
The Custom Card Formats box displays the point; however, auxiliary access inputs do not
card formats that were downloaded into the report Open and Short conditions to the P2000
panel, using the Panel Card Formats dialog system.
box; see page 64 for detailed instructions.
If you click either of the Uncalibrate buttons,
the Server sends a command to the panel to
Calibrate Tab
uncalibrate the module’s input. The panel then
Use this tab to calibrate auxiliary access input sends a transaction message to the Real Time
point contacts on the terminal, as well as door List indicating the uncalibration result. After
contact input points. the uncalibration, four-state input statuses are
no longer functional for the input, only
two-state statuses.

TIP: Once an input is calibrated, you do not


need to use this feature again, unless you
change the controller hardware or the input
point’s wiring.

To calibrate or uncalibrate the auxiliary access,


you must enable the Propped Door (24) soft Note: RDR2S-A and RDR8S modules with
alarm. After the calibration command has been optional calibration resistors attached automati-
successfully issued, input point 24 can be cally use this reference for calibration. Inputs cal-
deleted if it is not being used. ibrated in this way do not need to be secured at
the time of calibration.

IMPORTANT: During the entire input calibra- Air Crew Pin Tab
tion procedure, the input’s contact must be physi-
cally closed. Otherwise, the input’s status is To enable the use of PIN codes at this terminal,
unreliable. select from the list any or all previously
defined Air Crew PIN Codes that were set up
in the Edit Air Crew PIN Number dialog box
(see page 63 for details).

24-10832-194 Rev. E
76 CHAPTER 2
Configuring the System

2. Expand CK721-A Panels and select the


panel name where you want to add the new
hardware module.
3. Right-click the panel name and select Add
Hardware Module from the shortcut
menu. The Module Type dialog box opens.

When this feature is enabled, entering an


assigned Air Crew PIN code allows access at
the door. If selected, other terminal access
options are still available (Card ID, PIN Only
or PIN + Card ID). Follow these instructions to
use the Air Crew PIN:

1. If you use the Star Feature, press the *2


keys to initiate the sequence. If you do not
use the Star Feature, press the B key.
2. Enter the unique Air Crew PIN code. If an
error is made, press the ** keys (with Star
Feature) to clear the keypad buffer and 4. Select from the Module Type drop-down
start with step 1. To clear the keypad with- list one of the following options:
out the Star Feature, press the C key.
RDR2SA – The wizard creates two
3. Press the # key to complete the sequence. RDR2S-A reader terminals.
RDR8S – The wizard creates eight RDR8S
Use the Add Hardware Module reader terminals.
The Add Hardware Module command starts a 5. Make your selection and click Next. The
wizard style interface that simplifies the pro- Terminal Number dialog box opens.
cess of adding a new module to a CK721-A
panel. It supports module types RDR2S-A and
RDR8S. The wizard asks the operator some
basic configuration information specific to the
module being added and automatically adds
the necessary configuration items (terminals,
input points, and output points) to the P2000
system.

To Add a Hardware Module

1. In the System Configuration window,


expand Panels to display the panel types.

24-10832-194 Rev. E
77

6. Select from the Base Number drop-down


list the terminal address that corresponds
to the physical address as installed at the
panel.
7. Select the Module Address.
8. Click Next. The Module Name dialog box
opens.

12. Select from the Template Terminal


drop-down list, an existing reader terminal
from which the access configuration
parameters are copied. Click Next.
13. The Summary dialog box opens.

9. The Base Name displays the name of the


selected CK721-A panel. You can how-
ever, change the name if you wish.
10. Select from the Style drop-down list one of
the following name styles:
 Base Name First, Space
 Base Name First, Underscore
 Base Name Last, Space
 Base Name Last, Underscore
The Item Names box displays the items
created with the name style selected.
11. Click Next, the Template dialog box 14. Click Finish. The Create Items progress
opens. bar displays.
15. A message displays indicating that all
items were successfully created. Click OK
to finish. The System Configuration win-
dow displays the created items. You can
edit any of the items to change configura-
tion parameters.

24-10832-194 Rev. E
78 CHAPTER 2
Configuring the System

Create Terminal Groups 4. Enter a descriptive Name for this Terminal


Group.
You can group terminals that have common
access throughout your facility and then apply 5. From the Available Terminals list, click
them as a group rather than individually to the the terminal you wish to include in your
various functions. For example, you may have group.
ten terminals (readers) with access to a ware- 6. Click << to include the terminal in the
house area. When grouped together, you can Terminals in Group box.
assign cardholders that should have access to 7. To remove a terminal from the Terminals
that area to the Warehouse Doors terminal in Group box, select the terminal and click
group, rather than assigning all ten terminals to >>.
the cardholders individually.
8. When all terminals you wish to include in
Terminal Groups may also be used to define the group have been moved to the Termi-
events. Using the warehouse example, the nals in Group box, click OK. A Terminal
Warehouse Doors group can be associated with Group icon for the new group is added
a cardholder and an event to trigger the lights under the Terminal Groups icon in the Sys-
to come on no matter which door the card- tem Configuration window.
holder uses.

Configure PIN Codes


To Create a Terminal Group
There are three different ways of using PINs to
1. In the System Configuration window, select get access at a reader: PIN Only, PIN + Card
Terminal Groups and click Add. The Edit ID, and PIN. In configurations that require pre-
Terminal Group dialog box opens. senting a badge to request access, it is possible
to add the mode PIN + Card ID as an alterna-
tive for people who have forgotten their badge.

See Appendix D: Using a Keypad Reader on


CK721-A Panels for further instructions. Also,
see Appendix C: Panel Comparison Matrix for
the number of PIN codes supported by each
panel type.

PIN Only

In PIN Only mode all it takes for the system to


identify a person is entering a PIN at a reader.
2. If you use Partitioning, select the Partition Given a fixed scramble mode, an algorithm
that has access to this Terminal Group. All produces a unique PIN for every badge number
available terminals (for the partition between 1 and 32767. When a PIN is entered
selected) are listed on the right side of the at the keypad, the algorithm calculates the cor-
dialog box. responding badge number and the access deci-
3. If you use Partitioning, click Public to sion is made based on that badge’s access
allow all partitions to see this Terminal rights. This feature works with 5-digit algorith-
Group. mic PINs only.

24-10832-194 Rev. E
79

For PIN Only to work, you need to configure 3. The terminal’s PIN Suppression in the
the following parameters: Timezone tab has no effect, that is, you
cannot use time zones to waive the require-
1. The panel’s PIN Code Type must be set to ment to enter a PIN in PIN + Card ID
Algorithmic (see page 58). mode.
2. The panel’s PIN Code Digits must be set
to 5 (see page 58). To use PIN + Card ID mode, you must enter
your PIN followed by your 5-digit badge num-
3. The panel’s Scramble Mode must be set ber, followed by the # key. You must enter
to the value used to create the PINs from leading zeros if your badge number has fewer
the badge numbers (see page 58). than 5 digits.
4. The terminal’s PIN Only card type must
be selected in the Card Type tab. All other
PIN
card types must not be selected (see
page 74). In this mode, the PIN needs to be entered in
5. The terminal’s Allow PIN after Badge in conjunction with a valid badge presented at the
the Flags tab has no effect (see page 67). reader. This feature works with 4 or 5-digit
algorithmic and with 4 up to 9-digit custom
6. The terminal’s PIN Suppression in the
PINs.
Timezone tab has no effect. For obvious
reasons you cannot waive the requirement For PIN to work, you need to configure the
to enter a PIN in PIN Only mode. following parameters:
To use PIN Only mode, simply enter your 1. Select a card type in the terminal’s Card
5-digit algorithmic PIN at the keypad followed Type tab that matches the reader’s technol-
by the # key, and the access decision is made. ogy (see page 74).
2. All other card types should not be selected.
PIN + Card ID 3. The terminal’s PIN Only card type in the
In this mode the badge does not have to be pre- Card Type tab must not be selected.
sented at the reader. The numeric keypad is 4. The terminal’s PIN + Card ID card type in
used to enter the PIN and the badge number. the Card Type tab should not be selected,
This feature works with 4 or 5-digit algorith- unless you want to use the PIN + Card ID
mic and with 4 up to 9-digit custom PINs. mode as an alternative for people who
have forgotten their badge.
For PIN + Card ID to work, you need to con-
figure the following parameters: 5. The terminal’s PIN Suppression in the
Timezone tab must be set to a defined time
1. The terminal’s PIN + Card ID must be zone. PINs are only required to be entered
selected in the Card Type tab. All other when the time zone is inactive.
card types should not be selected, unless
you want to use the PIN + Card ID mode To use PIN mode when the terminal’s Allow
only as an alternative for people who have PIN after Badge option in the Flags tab is not
forgotten their badge (see page 74). set, you must key in the entire PIN before pre-
senting the badge. The PIN does not need to be
2. The terminal’s Allow PIN after Badge in terminated with a # key.
the Flags tab has no effect (see page 67).

24-10832-194 Rev. E
80 CHAPTER 2
Configuring the System

To use PIN mode when the terminal’s Allow PIN Retry Alarm
PIN after Badge option in the Flags tab is set,
the PIN must be terminated with a # key. You A PIN Code Retry alarm is generated when the
can enter the PIN and the # key before, during, respective soft alarm is defined at the panel,
or after the badge is presented. and three consecutive unsuccessful attempts to
enter a PIN were made for the same badge (see
To use PIN mode when you also have the PIN page 94). In Local mode, the three consecutive
+ Card ID card type selected, as an alternative attempts can be made at any terminal of a sin-
for people who have forgotten their badge, the gle panel. In Central mode, the three consecu-
# key must not be entered before the badge is tive attempts can be made at any terminal at
presented. any panel.

Four-Digit PINs Configure Input and Output


A four-digit custom PIN is defined by the first Points and Groups
four digits entered in the PIN Code field in the Input and output points and groups work
Badge dialog box (see page 252). Algorithmic together to control devices connected to the
codes need to be requested from Technical system terminals. For example, an input can be
Support. configured for a broken window contact and
this can generate an output to an alarm annun-
PIN Duress ciator. A group of inputs can generate the same
output, no matter which input point in the
The PIN Duress feature in the Soft Alarm dia- group is activated.
log box, creates an access grant and a duress
alarm only if all of the following conditions
apply: Create Output Points and Groups

Output Points are dry contact relays located on


1. The duress soft alarm is defined at the
the Terminal boards. These are opened or
panel (see page 94).
closed by the system to control devices con-
2. The cardholder is required to enter a PIN at nected to them such as lights, air conditioning,
the terminal. alarm annunciators, parking barriers, and so
3. Exactly one digit of the PIN is replaced by on. After output points are created, they can be
the digit 9. grouped with other output points that have a
common purpose in the system and then used
4. All other digits match the badge’s PIN.
in conjunction with specific inputs.
5. The card type selected in the terminal’s
Card Type tab is not PIN Only.
To Create Output Points

1. In the System Configuration window,


select a Terminal that has been configured
for outputs.
2. Select Output Points and click Add. The
Output Point dialog box opens.

24-10832-194 Rev. E
81

10. The Output Group box is view-only. Each


output point can belong to three output
groups.
11. Click OK to save your settings. The new
output point is listed under the Output
Points icon.

Note: You must perform the Write DB to Flash


function (see page 444) when adding or deleting
RDR2S-A or RDR8S output points.

3. If this is a partitioned system, select in the


Output Point box the active Partition and To Create Output Groups
click Public if you wish the output point to
be visible to all partitions. Output Points can be grouped together to per-
form common functions. For example, an
4. Enter a descriptive Name for the output
input such as an air-sampling device can be
point.
configured to activate a group of exhaust fans
5. Select an output point Number. This num- connected to output points on a terminal.
ber represents the physical connection to
the I/O terminal. 1. In the System Configuration window,
expand the panel that contains the output
6. The Query String value is used with mes-
points you wish to group.
sage filtering (see Define Query String Fil-
ters on page 225). 2. Select Output Groups and click Add. The
Output Group dialog box opens.
7. The output point Status is Enable by
default.
8. In the State Option box, select the Active
State from the drop-down list. See the fol-
lowing definitions:
Reset – Reserved for diagnostic purposes.
Set – Turns on the output point. This
option must be selected for output points
assigned to elevators or cabinets.
Fast Flash – Toggles the output point on
and off quickly (once per second).
Slow Flash – Toggles the output point on
and off slowly (once per two seconds).
Timed – Turns on the output point for a
specified time in seconds.
9. If the Active State is Timed, you must 3. Enter a Name for the Output Group.
enter a Duration in seconds.

24-10832-194 Rev. E
82 CHAPTER 2
Configuring the System

4. The Panel field displays the name of the To Create Input Points
Panel selected.
1. In the System Configuration window,
5. The Group Number field displays the select a Terminal that has been configured
number that is automatically assigned for inputs.
when you create an output group.
2. Select Input Points (under the Terminal
6. If your system is partitioned, click Public icon) and click Add. The Input Point dia-
if you wish this group to be visible to all log box opens at the General tab.
partitions.
3. Enter the information in each tab, as
7. In the Output Point Names box, select an described in Input Point Field Definitions.
Output Point from the list of Available
Output Points. 4. Click OK to save your settings and return
to the System Configuration window. A
8. Click << to move the Output Point to the new Input Point icon is listed under the
list of Output Points in Group. root Input Points icon. When you click on
9. Continue to move available output points the new input point, the settings display on
from the Available list to the Group list the right windowpane.
until all output points you wish to include
are in the Output Points in Group box.
Note: You must perform the Write DB to Flash
10. To remove an output point from the Output function (see page 444) when adding or deleting
Points in Group box, select the output point RDR2S-A or RDR8S input points.
and click >>.
11. Click OK to save your settings. A new
Output Group icon is listed under the root Input Point Field Definitions
Output Groups icon for the panel.
General Tab
Create Input Points and Groups

Input points can be physical connections to


monitored devices such as a window or door
contact, or a motion detector. They can be soft-
ware alarms that are reported to the system,
and can be connected to alarm pop-ups and
instruction text. They can also trigger an event
or an output device.

Create Input Points

After the terminal is created, the Input Points Partition – If you use partitions, select the
icon is added under the terminal. From here, appropriate Partition that has access to this
you create the input points for the terminal. (If input point.
you need more information, see Configure Ter- Public – If you use partitions, click Public if
minals on page 65.) you want this input point to be visible to all
partitions.

24-10832-194 Rev. E
83

Name – Enter a descriptive Name for the input Open and short conditions for 4-state input
point. points are reported immediately.

Number – Select an input point number. Set Panel Relay When Active – If enabled, the
relay on the panel activates when the input
Query String – This value is used with message point is activated. If disabled, the relay on the
filtering (see Define Query String Filters on panel does not activate.
page 225).

Status – If you select Enable, all input point Alarm Options Tab
changes of state are reported. Select Disable if
you do not want these changes reported. Use this tab to configure alarm options for
P2000 devices that generate alarms, such as
Disabled During Time Zone – Select a Time input points, cameras, switches, and so on.
Zone during which the input point is disabled. Each alarm must belong to at least one Alarm
For example, it is impractical to report a door Category (see Alarm Configuration on
contact alarm during business hours when the page 270 for details), but can also be assigned
door is in constant use. to multiple alarm categories, each with its own
set of alarm options.
Type – Choose either Two State or Four State.
Changing the input type requires using the For example, if an input point connected to a
Un-calibrate command (for two-state inputs) glass breakage sensor generates an alarm, the
or the Calibrate command (for four-state P2000 system may create two separate alarms
inputs) in the Misc Tab. for two configured alarm categories:
P2000\Maintenance\Building 1 and P2000\
Entry Exit Delay – Enter a time (0 to 600 sec-
Security\Building 1. Typically, a single opera-
onds) that the alarm is suppressed until an
tor is configured to receive only a single cate-
event disables the alarm. If a delayed
gory of alarms, and therefore could only
entry/exit value is defined for an input point,
receive a single alarm. However, higher level
the system delays reporting activation of this
operators such as supervisors, or an operator at
input point for the time value specified. If the
a central alarm monitoring location, may be
input point is suppressed within this delay
configured to receive both of these alarms.
period (that is, by a card event), the alarm is
not reported. For example, a cardholder can 1. Click the Alarm Options tab. The P2000
badge at a reader, open the door, and then Alarm Category displays by default.
badge at a second reader to suppress the door
alarm before it reports. If the cardholder does
not badge and suppress the alarm (by card
event) at the second reader within the specified
time, the alarm is reported.

Report Delay – If enabled, the alarm is delayed


by the number of seconds set in the Reporting
Delay field in the Alarm Tab of the Edit Panel
dialog box. If the input point returns to the
secure state before the delay expires, the panel
does not report the alarm to the Server at all. If
disabled, the alarm is reported immediately.

24-10832-194 Rev. E
84 CHAPTER 2
Configuring the System

2. If you wish to assign this alarm to other Disable Alarm – Do not select if you wish this
alarm categories, click Add. The Add alarm to be added to the alarm queue and dis-
Alarm Categories dialog box opens dis- played in the alarm monitoring window to
playing all previously created alarm cate- notify the operator of its activation. Enabling
gories (see page 270 for details). or disabling the alarm is specific to a particular
Alarm Category. For example, you can enable
an alarm for a Security alarm category and dis-
able the same alarm for a Maintenance alarm
category.
Alarm Priority – Enter a value from 0 to 255.
Zero equals the highest priority. This is the
order in which the alarm message is placed in
the alarm queue. If alarm messages have the
same alarm priority, the date and time deter-
mine which alarm is positioned higher in the
Note: If you use the Enterprise option, the
Alarm Categories defined for all P2000 sites queue.
within an Enterprise system are listed. Alarm Timezone – Select the time zone during
which new alarm state changes are to be added
3. Select one or more categories and click to the alarm queue and displayed in the Alarm
Add. The list displays all the selected Monitor window. If you select <None>, the
alarm categories. alarm state is reported any time it changes.
4. If you wish to remove a category from the Alarm Popup – When you enable Alarm Popup
list, select the alarm category and click for an alarm, the Alarm Monitor window auto-
Delete. matically displays in front of all other windows
5. Once you have all the alarm categories you on the screen whenever the alarm is in the
want to assign to this alarm, select an alarm alarm state. If disabled, the alarm is simply
category from the list and click Edit to entered in the alarm queue.
modify the alarm options. You can select
and edit more than one category at a time. Note: Some computers may not allow the
The Alarm Options dialog box opens dis- Alarm Monitor window to automatically pop up in
playing the General tab. See the following front of other windows on the screen; instead the
definitions. Alarm Monitor button begins flashing in the Win-
dows taskbar.

General Tab Alarm Instruction – Select the Instruction Text


that displays in the Alarm Response window
when the alarm is in the alarm state. The
Alarm Response window displays a set of
instructions related to that particular alarm.

Note: Before you can assign instruction text to


the various pop-ups, you must first create instruc-
tion text. See Configure Instruction Text on
page 90 for more information.

24-10832-194 Rev. E
85

Normal Popup – When you enable Normal Events Tab


Popup for an alarm, the Alarm Monitor win-
dow automatically displays in front of all other
windows on the screen whenever the alarm
enters its normal state.

Normal Instruction – Select the Instruction Text


that displays in the Alarm Response window
when the alarm enters its normal state. The
Alarm Response window displays a set of
instructions related to that particular alarm.

Other Popup – When you enable Other Popup Event 1-4 – You can define up to four events
for an alarm, the Alarm Monitor window auto- that can be triggered from the Alarm Monitor
matically displays in front of all other win- window whenever the alarm goes into an
dows on the screen whenever the alarm is in a alarm condition and is entered into the alarm
state other than alarm or normal. queue. Enter a descriptive Event name and
select a previously configured Event from the
Other Instruction – Select the Instruction Text associated drop-down list; see To Activate an
that displays in the Alarm Response window Event from the Alarm Monitor on page 277.
when the alarm enters a state other than alarm
or normal.
Escalation Tab
Acknowledgement Required before Completion
The alarm escalation function constantly mon-
– Select to require acknowledgement of this
itors all generated alarms that have their esca-
alarm before its completion.
lation options enabled. Escalation level value
Response Required before Completion – Select range is from 0 to 10, where 0 indicates a
to require response to this alarm before its non-escalated alarm.
completion.
The alarm escalation feature provides for two
Associated AV Channel – If your facility uses different conditions when an alarm may be
the DVR/VMS feature, select the camera to be escalated:
associated with this alarm. If applicable, this
 If an alarm is generated for a specific alarm
selection overrides the selection made in the
category and there are currently no opera-
Input to camera mapping window.
tors logged on to the P2000 system that
Associated Real Time Map – Select the Real have privileges to receive alarms for that
Time Map to be associated with this alarm. If category.
applicable, this selection overrides the default  If an alarm is generated and remains pend-
behavior of the Real Time Map containing the ing for the configured escalation timeout
alarm. That is, when you click the Map button period.
in the Alarm Monitor, the associated Real
Time Map displays, even if it is different from
the Real Time Map containing the alarm.

24-10832-194 Rev. E
86 CHAPTER 2
Configuring the System

If either of these conditions occurs, that alarm Escalation Timeout (1 to 1440 minutes) – Enter
is regenerated with an elevated escalation the time period (in minutes) after which an
level. The escalation level is incremented by alarm remaining in pending state is escalated
the configured escalation increment value. by the Escalation Increment.
This process may be repeated multiple times
until a high enough escalation level is reached Escalation Increment (1 to 10) – Enter the value
that matches the privileges of a currently by which to escalate an alarm each time the
logged on operator. If no operators are logged escalation takes place.
on to the P2000 system, the alarm is regener-
ated until the maximum escalation level is MSEA Tab
reached, and then no further action is taken.
In facilities that use the Metasys system, this
After an escalated alarm has been completed, feature allows an alarm that is forwarded to the
the next occurrence of that alarm is created Metasys system to contain an embedded refer-
with no escalation level. ence to a Metasys graphic. For more informa-
tion, see Defining MSEA Graphics on
page 368.

Enable – Select to enable alarm escalation.

Escalation Repeat – Select to allow escalation


Select from the drop-down list the MSEA
to occur more than once for the alarm. For
Graphic to reference in this alarm. When an
example, if the Escalation Timeout is set to 30
alarm is received and displayed by the Metasys
minutes, and the Escalation Increment is set to
system, the Metasys operator can simply click
2, every half an hour the escalation value for
the alarm to display the graphic item associ-
alarms remaining in pending state goes up by 2
ated with the alarm and the item that caused
until it reaches the maximum value. If this
the alarm.
check box is not selected, escalation can occur
only once for this alarm. To avoid the delay
when the alarm cannot be seen and actioned by I/O Linking Tab
an active operator, click the Escalation based
upon visibility check box. Use the I/O Linking tab to link I/O Types to
specific output groups. You must define output
Escalation based upon visibility – If selected, groups in the Output Group dialog box before
the alarm is immediately escalated by a you can use this function. See Create Output
defined increment if, at the time of occurrence, Points and Groups on page 80 for detailed
no operator able to receive alarms from this information.
Alarm Category is logged on. This includes
operators that are logged on to the Web UI
Alarm Manager interface via a browser.

24-10832-194 Rev. E
87

Misc Tab

I/O Link Type – Select one of the following link


types:
Input Groups – If this input point is included in
 None – Default selection, indicating that an Input Group, the associated Input Group
there is no linkage between the input point displays in this box. An input point cannot be
and output group. included in more than three Input Groups.
 Active-on – When the input point is acti- Calibration – If you click Calibrate, the Server
vated, the output group activates. sends a calibration command to the panel, the
 Secure-on – When the input point is secure, panel then forwards the command to the
the output group activates. RDR2S-A or RDR8S module to initiate the
 Track – When the input point is activated, input’s calibration.
the output group activates. When the input
point is secure, open, or short, the output
group deactivates. IMPORTANT: During the entire input calibra-
 Mimic – When the input point is activated, tion procedure, the input’s contact must be physi-
cally closed. Otherwise, the input’s status is
open, or short, the output group activates.
unreliable.
When the input point is secure, the output
group deactivates.
When the RDR2S-A or RDR8S module com-
 Active-off – When the input point is acti-
pletes its calibration, typically within a few
vated, the output group deactivates.
seconds, the panel sends a transaction message
 Secure-off – When the input point is secure, to the Real Time List indicating the calibration
the output group deactivates. result. After a successful calibration, four-state
 Reverse Track – When the input point is input statuses are available for the input point.
activated, open, or short, the output group
deactivates. When the input point is secure, If you click Un-calibrate, the Server sends a
the output group activates. command to the panel to un-calibrate the
RDR2S-A or RDR8S input. The panel then
Output Group – Select from the drop-down list sends a transaction message to the Real Time
the Output Group to which you wish to link. List indicating the un-calibration result. After
the un-calibration, four-state input statuses are
no longer available for the input, only
two-state statuses.

24-10832-194 Rev. E
88 CHAPTER 2
Configuring the System

Using Reader Terminal Door Contact


TIP: Once an input is calibrated, you do not Input Points
need to use this feature again, unless you change
the controller hardware or the input point’s wiring. When you configure a reader terminal and
enable the Forced Door, Propped Door
option in the Edit Soft Alarm window, the sys-
tem creates the Input Points icon with two
Note: RDR2S-A and RDR8S modules with entries beneath it. The first input point, named
optional calibration resistors attached automati- Forced Door <terminal name> is created for
cally use this reference for calibration. Inputs cali- input point 18. The second input point, named
brated in this way do not need to be secured at Propped Door <terminal name> is created for
the time of calibration.
input point 24. You can use these input points
as a door contact alarm. If enabled in the Input
Point dialog box, these input points report to
Configuring Reader Terminal Hardwired
the Alarm Queue and Real Time List if the
Input Points
door contact is broken, or if left open longer
When a reader terminal is created, three input than the configured alarm suppression for the
points are reserved for specific inputs: input reader.
points for reader terminal door contact points
(these have to be configured in the Soft Alarm To Edit a Reader Terminal Door Contact
window; see Configure Soft Alarms on Input Point
page 93), and an input point for a terminal
down input point. In the following example, 1. Select the Forced Door or Propped Door
Input Points Forced Door Office Entry Reader, <terminal name> icon under the reader ter-
Propped Door Office Entry Reader, and Term minal you wish to configure and click Edit
Down Office Entry Reader were created for to open the Input Point dialog box. If
the Office Entry Reader terminal in the Ware- Forced Door was selected, input point 18
house panel. displays in the Number field. If Propped
Door was selected, input point 24 displays
in the Number field. These are hardwired
to points 18 or 24 on the reader terminal.
2. Enter the information on each tab as you
do for any other input point.
3. Click OK to save your settings and return
to the System Configuration window.

Note: If you rename a terminal that has a


Forced Door or Propped Door input point, you
must edit the input points to manually enter the
new terminal name, as in Forced Door <terminal
name> or Propped Door <terminal name>. As an
alternative, you could also disable the Forced
Door, Propped Door in the Soft Alarm window and
then enable it again to automatically create the
input points under the new terminal name.

24-10832-194 Rev. E
89

Using the Terminal Down Input Point To Create an Input Group

When a reader terminal is created in the sys- 1. In the System Configuration window,
tem, a Terminal Down Input Point is automati- expand the panel that contains the input
cally created for input point 25 on the terminal points you wish to group.
and displays under its input point icon as Term 2. Select Input Groups and click Add. The
Down <terminal name>. If you wish to report Input Point Group dialog box opens.
this type of alarm, edit the input point and
make sure the Disable Alarm option is not
selected in the General tab of Alarm Options,
otherwise the alarm does not report to the
Alarm Queue, but continues to report to the
Real Time List (see Alarm Options Tab on
page 83).

To Edit a Reader Terminal Down Input


Point

1. Select the Term Down <terminal name>


icon under the reader terminal you wish to
configure and click Edit to open the Input
Point dialog box. Input point 25 displays in
the Number field. (This is hardwired to
point 25 on the reader terminal.) 3. Enter a descriptive Name for the Input
2. Enter the information on each tab as you Group.
do for any other input point. 4. If your system is partitioned, click Public
3. Click OK to save your settings and return if you wish this group to be visible to all
to the System Configuration window. partitions.
5. The Panel name displays in the Panel
Note: If you rename a terminal that has a Ter- field.
minal Down Input Point, you must edit the Termi- 6. The Group Number field displays the
nal Down Input Point to manually enter the new number that is automatically assigned
terminal name, as in Term Down <terminal when you create an input group.
name>.
7. Select an input point from the Available
Input Points list and click << to move it
Create Input Groups to the Input Points in Group list.
8. Select all the input points you wish to
Input Points from the same panel can be
include in the group and move them into
grouped to perform related functions. For
the group list until all have been added.
example, motion detectors within a specific
area can be grouped together to trigger an 9. To remove an input point from the Input
alarm or other output when activated. You can Points in Group box, select the input point
create as many input groups as you need; how- and click >>.
ever, an individual input point can be included
in no more than three input groups.

24-10832-194 Rev. E
90 CHAPTER 2
Configuring the System

10. Click OK to save your settings and return


to the System Configuration window. A
new Input Group icon is listed under the
root Input Groups icon for the panel.

Configure Instruction Text

Instruction text can be assigned to input points


and other P2000 applications. When any of
these elements changes state, an alarm is sent
to the Alarm queue and displayed in the Alarm
Monitor window. When an operator selects the
message for response, the instruction text dis-
plays in the Alarm Response dialog box.

You can configure Alarm Instructions with an


embedded URL and assign that instruction to
an alarm. When the alarm instruction displays 2. Click Add. An instruction entry dialog box
in the Alarm Monitor, the user can click the opens.
URL and it starts the Web Browser with the
URL. The alarm instruction detects URLs that
begin with the following prefixes:

http: file: mailto:


ftp: https: gopher:
nntp: prospero: telnet:
news: wais:

When one of the previous URLs are found in


the instruction text, Windows performs its con-
figured default action for the URL. For URLs
of http: or https:, the Web Browser is started
with that URL. If the URL begins with mailto:, 3. If this is a partitioned system, select the
Windows starts your email program. If the appropriate Partition, and click Public if
URL begins with file:, Windows starts the you want this instruction to be visible to all
associated application to view the file. partitions.
4. Enter the Name of the Instruction. This is
To Create Instruction Text the name that displays in drop-down lists
for selection in P2000 applications that use
1. From the P2000 Main menu, select
Instruction Text.
Alarm>Instruction Text. The Instruction
Text dialog box opens. 5. Enter the actual instruction text you want
to display.

24-10832-194 Rev. E
91

6. If you wish to insert a macro to be part of Configure Panel Card Events


the instruction text, select a macro from
the Insert Macro drop-down list. See the Panel Card Events operate independently from
following table. the Server and therefore affect only the Panel
for which they are configured. Panel Card
Use Macro.... To Insert... Events are particularly useful for panels that
operate offline, such as in areas that must
$ASCII(xxx) ASCII Character
remain operable if the network goes down.
$BADGE_DESCRIPTION Badge Description
$BADGE_NUMBER Badge Number
$BS Backspace
$CARDHOLDER_FIRSTNAME Cardholder’s First Name Note: Panel Card Events are configured for
$CARDHOLDER_LASTNAME Cardholder’s Last Name each panel while System Events are configured
$CARDHOLDER_NAME Cardholder’s First for the Server. For more information on System
<space> Last Name Events, see Create Events on page 335.
$CR Carriage Return
$DATE Today’s Date
A Panel Card Event is based on badge (trigger)
$FF Form Feed
activity and used to suppress or unsuppress an
$INPUT_NAME Input Name
input group, activate or deactivate an output
$INPUT_NUMBER Input Number
$LF Line Feed
group, operate a door strike, and reset a panel
$OPERATOR Operator Name
alarm relay.
$PANEL_NAME Panel Name
The following section presents steps to create
$TAB TAB
Panel Card Events. To invoke panel card
$TERMINAL_NAME Terminal Name
events using a keypad, see Appendix D: Using
$TIME Current Time
$UDF_x* User Defined Field
a Keypad Reader on CK721-A Panels.
* The x must be replaced with the UDF order number.
This macro is used with Host events, where the triggering
message is directly associated with a Cardholder, such To Create a Panel Card Event
as an Access Grant message.
1. From the System Configuration window,
select the panel to which you wish to
Note: Do not include macros in Instruction Text assign a Panel Card Event.
that is used in delayed event actions. The infor- 2. Select Panel Card Event and click Add.
mation needed for the macros is not available The Panel Card Event dialog box opens.
when the action is delayed. See Creating Actions
on page 337.

7. Click OK to save the Instruction Text


entry and return to the Instruction Text dia-
log box. Click Done.

24-10832-194 Rev. E
92 CHAPTER 2
Configuring the System

Trigger Type – Indicates the condition that trig-


gers this card event. Select one of the follow-
ing:

 Card Only – Present badge. This trigger type


does not generate Invalid Event Privilege
Level messages.
 Card/PIN Code – Enter PIN code, then pres-
ent badge.
 Card/Keypad Code – Enter activation or
deactivation code, followed by the code
specified in the Keypad Code field, then
present badge.
 Card/PIN/Keypad Code – Enter PIN and acti-
vation or deactivation code, followed by the
keypad code, then present badge.
 Any Void Card – Present any void badge (a
3. Enter the information according to the
badge that does not provide access to the
Panel Card Event Field Definitions.
door). In this case the card event’s privilege
4. When all information is added, click OK to level should be set to 0, as void badges do
save your settings and return to the System not have any privilege level. For this condi-
Configuration window. tion to trigger a card event with a consistent
behavior, the terminal should run in Local
Panel Card Event Field Definitions mode. The card event may not be triggered
on terminals running on Shared mode,
depending on the generated card message.
Panel Card Event  Special Access Flags – Select one of the
Name – Enter a descriptive event name. three Special Access flags A, B, or C that
can trigger this card event. The list displays
Panel – Displays the selected panel name. the special access flag names as configured
in Site Parameters. Special access condi-
Number – Enter an event number from 1 to 20. tions are set up in the Access tab of the ter-
minal dialog box; see page 72.
Option

Privilege Level – This entry corresponds to the


Note: If Allow PIN after Badge is enabled in
Cardholder’s privilege level (from 0 to 7, with the Terminal dialog box, the cardholder can enter
0 being the lowest). The Cardholder’s privilege the PIN number after presenting the badge; see
level must be equal to or greater than the Privi- page 67 for more information.
lege Level defined here to initiate the event;
see Entering Badge Information on page 251 Keypad Code – Enter a four-digit keypad code
for more information. that must be entered to activate or deactivate
the event. Deactivating an event can only
accomplished by using a keypad code.

24-10832-194 Rev. E
93

Event Duration – Enter the duration, in minutes Output Group – Select the name of the Output
that the event is active (up to 1440 minutes). If Group that can be activated or deactivated.
the event activates an output group, the output
group is deactivated after this time period. If Misc.
the event suppresses an input group, the input
group is unsuppressed after this time period. Operate Door Strike – If not selected, a valid
Event duration applies only to event activa- event invokes the event action only, but does
tion, and not to event deactivation. Further- not unlock the door. This setting does not
more, only output group activation and input apply to badges with executive privilege. Also,
group suppression may be assigned a duration, events with trigger type Any Void Card never
but not output group deactivation and input unlock the door.
group unsuppression.
Reset Panel Alarm Relay (Acknowledge Alarm)
– If selected, the panel alarm relay is reset.
Input Group

Enable – Click to enable the Input Group Sup- Note: If a panel card event is created for
pression function. CK721-A panels and none of the boxes to sup-
press output points or strike readers are enabled,
Suppress – Click to suppress the specific Input the panel card event still shows in the Real Time
Group when this event is activated. Do not List, as an activated event.
select Suppress to unsuppress the specific Input
Group when this event is activated. When this
event is deactivated, the selected action is Valid Readers for Current Event
inverted; that is, an event that suppresses an
The terminals connected to this panel display
input group on activation, unsuppresses that
in the list. Select those terminals that are used
input group on deactivation, and an event that
to initiate this card event. Select terminals run-
unsuppresses an input group on activation, sup-
ning in Local mode; the card event may not be
presses that input group on deactivation.
triggered on terminals running on Shared
Input Group – Select the name of the Input mode. Terminals not selected are not affected
Group that can be suppressed or unsuppressed. by the event.

Output Group Configure Soft Alarms


Enable – Click to enable the Output Group Soft alarm points and their addresses are cre-
Activate function. ated by the system during installation rather
than hardwired to an actual input point. You can
Activate – Click to activate the specific Output enable these soft alarms for readers or panels.
Group when this event is activated. Do not
select Activate to deactivate the specific Out- The alarm point numbers may be different,
put Group when this event is activated. When depending on the type of panel selected.
this event is deactivated, the selected action is
inverted; that is, an event that activates an out- To Enable Soft Alarms
put group on activation, deactivates that output
group on deactivation, and an event that deac- 1. From the System Configuration window,
tivates an output group on activation, activates select the Panel for which you wish to
that output group on deactivation. enable soft alarms.

24-10832-194 Rev. E
94 CHAPTER 2
Configuring the System

2. Select Soft Alarm and click Edit. The Edit PIN Code Retry – When enabled, an alarm is
Soft Alarm dialog box opens. generated when three consecutive invalid PIN
3. Select the Reader or Panel Soft Alarms codes are entered at a keypad reader.
you wish to enable, and click the corre-
sponding Relay box to activate the panel
relay. See Soft Alarms Field Definitions Note: If you enable the Relay box associated
for detailed information. with a Duress or PIN Code Retry alarm to activate
the panel relay, you must also enable the Latch
Output option on the Alarm tab of the Edit Panel
dialog box; see page 58.
Note: Make sure the Set Panel Relay When
Active check box is selected in the Input Point
dialog box to activate the relay on the panel when Forced Door/Propped Door – If enabled, a
the input point is activated, see Input Point Field Forced Door alarm message is printed when-
Definitions on page 82. ever there is a door open condition without a
valid badge read detected first; and a Propped
Door alarm message is printed whenever there
is a door open condition with a valid badge,
but the door is left open past the entry time.

Soft In-X-It – If enabled, the Soft In-X-It over-


rides the system In-X-It control function for a
specified reader and allows cardholders to gain
access at that reader even though they have the
wrong In-X-It status. An alarm is generated
when a violation occurs.

Panel Lost AC – Used with the UPS option, this


soft alarm sends an alarm if the panel loses
power. For this to work, you must follow the
4. Click OK to save your settings and return wiring instructions provided in the CK721-A
to the System Configuration window. hardware manual.

Panel Low Battery – With UPS equipped pan-


Soft Alarms Field Definitions els, an alarm is sent when the battery in the
Duress – If enabled, an alarm is generated panel is low.
when an authorized cardholder reverse-swipes Panel Tamper – The panel has an internal hard-
the badge, provided that the terminals’ Reverse ware connection for its own enclosure tamper
Swipe Duress feature is enabled, or substitutes switch that generates a special message when-
a 9 for one of their PIN code digits. The PIN is ever the enclosure is opened or closed.
used with the badge and grants access to avoid
compromising the personal safety of the card- Report on Terminal – Select a terminal from the
holder. The panel relay for a duress alarm is drop-down list. This is the actual terminal con-
only activated when the reader is either in nection associated with the Soft Alarm and is
Local mode, or in Shared mode and the panel used for panel soft alarms only.
knows the badge.

24-10832-194 Rev. E
95

Configure OSI Panels and The portal gateway communicates with the
Components P2000 Server via standard 10/100Base-T
Ethernet connectors. The transmit range from
portal gateway to reader is typically 150 to 300
feet. Each portal gateway supports up to 128
IMPORTANT: This release of the P2000 soft-
ware is compatible with Stanley® Wi-Q™ Version readers. The wireless reader performs the
3.00.38, Portal Firmware Version 3.0.17.155, and actual access validation and can support up to
Reader Version 3.00.039. Older versions of the 65,000 badges. The OSI interface has no hard
OSI software are not compatible with this P2000 limit on the number of portal gateways but
release. enforces the existing P2000 limits on the num-
ber of readers.
Use this section to configure your P2000 sys-
The portal gateway includes a built-in Web
tem to communicate with OSI Wireless Access
server that provides a simple easy-to-use user
Management Solutions (WAMS) hardware. It
interface for configuring the portal, monitoring
is assumed that the OSI hardware is already
the status of the portal, and updating the firm-
installed before you can configure and use the
ware loaded into the portal and the readers.
essential functions described in this section.
Refer to the OSI documentation for hardware
installation instructions and to the P2000 Soft- Unsupported OSI Features
ware Installation Manual for instructions asso-
ciated with the installation of the OSI Interface The following OSI system features are not
software. compatible with the P2000 system architecture:

 Access and Shunt Time per Badge


 PIN Expiration Dates
IMPORTANT: The installation of the Stanley
Wi-Q software must follow some specific instruc-  Unlock with ID access mode
tions. Contact Technical Support for detailed  OSI I/O modules
instructions.

Unsupported P2000 Features


The OSI Interface that resides on the P2000
Server is called P2000 OSI Interface Service, The following P2000 system features are not
and provides an interface between the P2000 supported by the OSI system:
system and Stanley OSI OMNILOCK® 2000
Series readers. This integration allows P2000  Extensive badge specific time-controlled
operators to configure and control OSI readers access rights (see Badge Access Rights on
to provide badge access. Transactions and page 97 for more information)
alarm messages associated with these readers  Quick detection of hardware offline
are sent to the Alarm Monitor and the Real
Time List.
System Architecture
The OSI hardware consists of a Portal Gate-
The communication to the OSI portal gateway
way that provides wireless communications to
is performed by the OSI Web Service, which is
the individual readers.
installed with the OSI Interface. The portal
gateway in turn provides the wireless commu-
nication path to the individual OSI readers.

24-10832-194 Rev. E
96 CHAPTER 2
Configuring the System

The OSI Web Service runs in the context of the This automatic hardware detection also affects
Microsoft Internet Information Services (IIS) long term operation. If an OSI reader is unable
Web server, sends data and commands to the to communicate with its portal gateway for a
readers, and receives transaction data from the period of about 30 minutes or more, it attempts
readers. The OSI Web Service reads and writes to connect to any other portal gateway within
data to the OSI WAMS database that is hosted wireless range. This provides communication
in the same SQL Server® as the P2000 system. redundancy if a reader is within communica-
The P2000 OSI Interface Service provides the tion range of multiple portal gateways. Since
interface between the P2000 system and the the P2000 software maintains a relationship
OSI system. The OSI Interface Service per- between panels and terminals (and displays
forms all of its functions by calling functions this relationship in several different locations),
in the Stanley Wi-Q Version 3.x SDK. All it must update the database when a reader
other major principles of the P2000 architec- switches to a new portal gateway. The P2000
ture remain the same. OSI Interface Service detects this condition
and updates the database as required.
Hardware Detection Since the terminal record is only updated and
not recreated, any links between terminals and
The OSI system provides automatic hardware
other items remain unchanged. The only
detection. When new portal gateways or read-
impact is for partitioned P2000 systems. Since
ers are added to the system, they are detected
by definition the terminal belongs to the same
by the OSI Web Service and the appropriate
partition as its panel, moving a terminal to a
record is created in the WAMS database. The
different panel may require the partition of the
P2000 OSI Interface Service periodically scans
terminal to change. In practice, this is usually
for these new items. When a new item is
not a problem since P2000 partitions usually
found, the appropriate record is created in the
correspond to some physical barrier or separa-
P2000 database.
tion such as different buildings or different
areas of the same building.

P2000 Server

Reader
Ethernet

OSI P2000
Web Service Software

Portal
Gateway

Reader Wi-Q SDK P2000 OSI


Web Interface
Service Service

WAMS Database P2000 Database

24-10832-194 Rev. E
97

In most cases the physical separation between  Configure OSI Panels


these areas prevents readers from communicat-  Configure OSI Terminals
ing with portals in other partitions.

Configure OSI Facility Parameters


Badge Access Rights
Before bringing any OSI hardware online, the
The P2000 software defines access rights for OSI Facility record must be added to the
individual badges through multiple pairs of P2000 database. The OSI Facility record
Access Groups and Timezones. OSI readers do defines settings that control all OSI portal
not support this model of badge access rights. gateways and wireless readers connected to a
The OSI model consists of a list of readers that single P2000 server.
a badge has rights to use at any time in combi-
nation with membership in up to 32 User
Groups. Since the P2000 system operates with To Configure OSI Facility Parameters
a set of badge access rights across multiple
1. From the P2000 Main menu, select Con-
types of controllers and readers, the P2000
fig>System. Enter your password if
OSI Facility Edit application is provided to
prompted. The System Configuration win-
configure these settings.
dow opens.
Using the OSI Facility Edit application, a 2. Expand Panels to display the panel types.
P2000 operator can configure up to 32 pairs of
3. Expand OSI Panels to open the OSI com-
Access Groups and Timezones as Facility
ponents.
Access Groups. These Facility Access Group
pairs correspond to OSI User Groups. When
Access Groups and Timezone pairs are
assigned to an individual badge (using the Note: If the OSI Panels branch does not dis-
play, you need to enable the OSI panel type in
Badge application), the Timezone values are
the Panel Types Tab of Site Parameters. This
ignored unless the Access Group has been should only be necessary if you have upgraded
configured as an OSI Facility Access Group. If from a previous version of the P2000 software.
the Access Group corresponds to an existing
OSI Facility Access Group, then the Timezone
4. Select OSI Facility and click Add. The
configured for the Facility Access Group
OSI Facility Edit dialog box opens at the
defines the time when access is allowed. If the
General tab.
Access Group is not defined as a Facility
Access Group, then the badge is granted 5. Fill in the information on each tab accord-
access on a 24/7 basis. ing to the following OSI Facility Field
Definitions.

Configuration Sequence 6. As you work through the tabs, you may


click Apply at any time to save your
Once the hardware is installed, we recommend entries.
the following configuration sequence: 7. After you have entered all the information,
 Configure OSI Facility Parameters click OK to save the settings and return to
the System Configuration window.
 Add New Portals

24-10832-194 Rev. E
98 CHAPTER 2
Configuring the System

Once the OSI Facility record is saved, it is Database Name – This field displays the name
written in the OSI system. At that point, the of the OSI database.
system automatically recognizes the new hard-
ware when it is activated, as well as automati- Keypad Credential Length – Enter the number
cally adds it to the P2000 database. of digits that cardholders need to enter at wire-
less keypad readers in your facility.

OSI Facility Field Definitions PIN Length – For facilities that require addi-
tional security, enter the number of PIN code
digits that cardholders need to enter at wireless
General Tab keypad readers in your facility. OSI supports
Use this tab to define general descriptive infor- PIN codes ranging from 3 to 6 digits.
mation of the OSI Facility record and the Manager Flag – Select one of the three special
access parameters associated with the readers. access flags to be assigned to users with Man-
ager privileges who require special access at a
reader.

Note: Special access allows a door’s access


time to be different. The list displays the special
access flag names as configured in Site Parame-
ters; see page 33.

Programmer Flag – Select one of the three spe-


cial access flags to be assigned to users with
Programmer privileges who require special
access at a reader.

Extended Access Flag – Select one of the three


special access flags to be assigned to users
Name – Enter the name of the OSI Facility with Extended Access privileges who require
record. This field displays P2000 by default, special access at a reader.
but you can change the name according to your
facility needs.
Note: Manager, Programmer, and Extended
Sign On Key – This is a six-digit number that is Access privileges are assigned using the OSI
automatically assigned to each OSI Facility software.
record. If your facility uses OSI readers with
keypads, you need to enter this number at each Extended Access Time – Select the amount of
wireless reader to establish connection time that the door remains unlocked to provide
between the readers and the portal gateways, extended access time to cardholders with spe-
and ultimately to establish the communication cial needs.
with the WAMS software.

24-10832-194 Rev. E
99

Extended Shunt Time – Select the amount of Use Secondary Badge Format – Click if your
time that the door alarm is suppressed to allow facility uses a secondary badge format.
access to cardholders with special needs. The
Extended Shunt Time must exceed the Secondary Badge Format – Click the [...] but-
Extended Access Time. ton and select the secondary badge format to
be used at your facility.

Badge Type – Select the badge type to be used


Note: The reader default option in the at your facility. Options are: Prox Badge, Mag
Extended Access Time and the Extended Shunt Stripe Badge, and Smart Card Badge.
Time is the time defined at the Access tab of the
OSI Terminal Edit dialog box; see page 106 for Create Keypad Credential – Keypad Credential
details. numbers are codes stored in every badge and
allow you to identify the badges that belong to
your facility. Click if you wish to automati-
Badges Tab cally assign these codes to all badges in your
Use this tab to define the badge formats and facility that can be used with OSI wireless
type that can be used at all OSI readers. In readers.
addition, if the OSI readers do not have key-
pads, you need to enter the Reader Sign On Reader Sign On Badge
Badge information to be used at your facility.
If your facility uses OSI readers with no key-
pads, you can create a master badge that can be
assigned with a facility number. This badge
can be used to establish communication
between the readers and the software.

Number – Enter a badge number that can be


used for the facility number. This badge num-
ber does not need to be a valid P2000 badge
assigned to a cardholder.

Issue – Select the issue level from 0 to 255 to


use for the facility number.

Facility Code – Enter the facility code number


to use for the facility.

Primary Badge Format – Click the [...] button


and select the primary badge format to be used
at your facility. The P2000 software provides
badge formats that are located in the \Program
Files (x86)\Johnson Controls\P2000\
BadgeFormats folder. If a different format is
needed, create a new badge format file by
using the P2000 Badge Format tool; see
page 193 for details.

24-10832-194 Rev. E
100 CHAPTER 2
Configuring the System

Magnetic Stripe Tab Expiration Date Format – Select the card expi-
ration date format.
If your facility uses Magnetic Stripe cards, use
this tab to configure the software to accept the Expiration Date Position – Enter the position in
card types and settings. Default settings are the card of the expiration date field.
sufficient for most systems.
Expiration Date Position Type – Select if the
position type is a Character, a Field, or
Unused.

Expiration Date Valid – Select if the expiration


date is valid Thru Expiration Date (includes
the day of expiration), or To Expiration Date
(expires at midnight the previous day).

Facility Code – Enter the facility code number


to assign to your cards.

Facility Code Position – Enter the position in


the card of the facility code field.

Facility Code Position Type – Select if the posi-


tion type is a Character, a Field, or Unused.

Card Track – Select Track 2 or Track 3 mag- Issue Number Position – Enter the position in
netic cards. The system can be used with either the card of the issue number field.
Track 2 or 3 cards; however, you cannot use Issue Number Position Type – Select if the posi-
both types within the same facility. Most users tion type is a Character, a Field, or Unused.
use Track 2 cards and do not need to set up any
type of advanced card parameters. ID Position – Enter the position in the card of
the ID field.
Card Track Limit – There is a limitation on the
number of characters for each track. These ID Position Type – Select if the position type is
characters include any digits and field separa- a Character, a Field, or Unused.
tors; however, they exclude the starting and
ending sentinels. The maximum number of
characters that the system can read on Track 2
is 26 characters; Track 3 can read up to 70
characters. The P2000 software does not
enforce these limits.

24-10832-194 Rev. E
101

Time Tab Access Groups Tab

Use this tab to adjust Daylight Savings Time Use this tab to define up to 32 Access Groups
(DST) settings according to your region. DST and corresponding Timezones that can be
varies from country to country. Some countries assigned to all badges that are used at OSI
may not observe DST, while in many other readers. You must create Access Groups
countries the start dates and end dates for DST (page 232) and Time Zones (page 49) before
change from year to year. the selections display in the drop-down lists.

Daylight Savings Type – Select the daylight


savings type that applies to your region. To Define OSI Facility Access Groups
Choices are Custom, Europe, North Amer- 1. In the Access Groups tab, double-click the
ica, and Southern Hemisphere. When you line item you wish to define. The Group
select Europe, North America or Southern Edit dialog box opens.
Hemisphere, the system uses the standard
Daylight Savings Time settings for the
selected region.

If you wish to change the default settings,


select Custom from the Daylight Savings
Type drop-down list and select:

 the Fall Back Month


 the Fall Back Sunday
 the Spring Forward Month
The Number field displays a number that
 the Spring Forward Sunday indicates the order in which the access
group will be downloaded to the panels.

24-10832-194 Rev. E
102 CHAPTER 2
Configuring the System

2. Select the Access Group you wish to


assign to the badges that are used at OSI
readers.
3. Select the Timezone to assign to the
selected Access Group.
4. Click OK to save your settings.
5. If you wish to remove a group from the list,
select the line item and click Delete.

Add New Portals

To add OSI hardware devices into the P2000


database, you must first establish the commu- 3. Click Add. The Configure New Portal
nication between the OSI portals and the soft- Gateway dialog box opens.
ware. Each portal gateway must be configured
with its assigned IP address, the name of the
P2000 Server, and the name and description of
the OSI portal. The portal gateways use the
Stanley Wi-Q Access Management Software
(AMS) Configurator that allows you to config-
ure these settings.

Note: Make sure you have followed the spe-


cific instructions from Technical Support to install
the Stanley Wi-Q software.

To Set Up the Portal Gateway

1. From you Windows desktop, double-click


Stanley Wi-Q Access Management Soft- 4. From the Workstation drop-down list,
ware. The Configurator window opens. select the name of the P2000 server.
2. Click the Portals tab. 5. Enter the portal Name and Description of
the OSI portal.
6. Enter the portal’s IP Address.

24-10832-194 Rev. E
103

7. Keep the values of the remaining fields at To Configure OSI Panels


their default setting.
1. From the P2000 Main menu, select Con-
8. Click Finish. The new portal appears in fig>System. Enter your password if
the tree. prompted. The System Configuration win-
Shortly after, the portal is added to the P2000 dow opens.
system as a new OSI panel. Edit the panel 2. Expand Panels to display the panel types.
record in the P2000 software as desired. 3. Expand OSI Panels to open the OSI com-
ponents.
To Set Up OSI Readers 4. Select the portal you wish to configure and
click Edit. The OSI Panel Edit dialog box
1. Power up the new OSI reader.
opens.
2. Press and hold the reset button on the back
of the reader (next to the batteries). The
green LED flashes followed by the red
LED.
3. When the green LED flashes again, enter
5678 followed by the Sign On Key from
the P2000 OSI Facility record, see the
General Tab on page 98.
4. Shortly after, the reader appears in the
AMS Configurator and then in the P2000
system as a new OSI terminal. Edit the ter-
minal record in the P2000 software as
desired.
5. If you use Partitioning, select the Partition
Configure OSI Panels that has access to this panel, and Click
Public if you wish to allow all partitions to
Once the portal gateway is set up and config- see the panel.
ured through the OSI Web Interface to estab-
6. Enter a descriptive Name for the panel. By
lish the connection to the P2000 Server, the
default the Name field displays the MAC
portal displays in the System Configuration
address of the portal but you can change
window under the OSI Panels root icon. By
the name according to your facility needs.
default, portal names include their MAC
address. You must now complete the configu- 7. Click Enabled so the panel can be recog-
ration of the portal. nized by the system. If you wish to tempo-
rarily disable the panel, without having to
delete the panel, click the check box again
to disable it. When you disable a panel, the
readers continue to grant access, but the
panel does not communicate with the
Server until you enable the panel again.

24-10832-194 Rev. E
104 CHAPTER 2
Configuring the System

8. The Query String value is used with mes- Readers with Keypads – For a reader with a
sage filtering (see Define Query String Fil- keypad, you must enter the Sign On Key from
ters on page 225). the P2000 OSI Facility record into the keypad;
9. The Mac Address field displays the Media see page 98. To place the reader into enroll-
Access Control address automatically ment mode, enter 5678 on the keypad. A green
assigned to the portal. light on the reader flashes three times. Within
five to six seconds, enter the six-digit Sign On
10. Select from the Channels box, the Radio Key from the OSI Facility record. The reader
Frequency (RF) channels or frequency goes through a sequence of alternating red and
bands that this panel uses to communicate green lights and should finish with three green
with the readers. flashes. That means the reader successfully
11. The Reboot button is provided to restart communicated with the portal.
the portal; for example, if the portal is not
responding or to recover from an error. Readers without Keypads – For a reader with-
out a keypad, the reader is placed into enroll-
12. Click OK to save your entries. ment mode by presenting the default badge
After you create the OSI panel, the system that was included in your package from OSI.
automatically creates a Panel Down soft input Within five to six seconds, present the badge
point for input point 25 and displays it under that was defined in the Reader Sign On Badge
the Soft Input Points icon. If you wish to box of the OSI Facility record; see page 99.
report this type of alarm, edit the input point The reader goes through a sequence of alter-
and make sure the Disable Alarm option is not nating red and green lights and should finish
selected in the General tab of Alarm Options, with three green flashes. That means the reader
otherwise the alarm does not report to the successfully communicated with the portal.
Alarm Queue, but continues to report to the
Real Time List (see Alarm Options Tab on After a successful sign on, the reader should be
detected and automatically added to the P2000
page 83).
database as a new terminal. Note that the Real
Time List displays messages associated with
Configure OSI Terminals the new OSI components.
After a portal is up and functional, you can add Each reader installed in your system must be
new readers to the system. A new reader needs set up and configured in the P2000 software to
to be enrolled into the OSI system to become establish communication and control. Once
functional. The enrollment process is different Terminals are configured, they may be
for readers that have keypads and readers that included in Terminal Groups to provide com-
do not. mon access throughout your facility.

To Create OSI Terminals

1. In the System Configuration window,


expand Panels to display the panel types.
2. Expand OSI Panels. All OSI portals cur-
rently configured in the system are listed.

24-10832-194 Rev. E
105

3. Expand the portal that contains the readers


Note: The Tamper alarm for OSI soft input
you wish to configure. points is generated after five consecutive invalid
4. Expand Terminals to display the readers credential attempts.
that were successfully enrolled. By default,
the reader names include their MAC
address. OSI Terminal Field Definitions
5. Select the reader you wish to configure and
click Edit. The OSI Terminal Edit dialog General Tab
box opens at the General tab. Enter the
information in each tab according to your Use this tab to enter general descriptive infor-
system requirements. See the following mation of the OSI reader.
OSI Terminal Field Definitions for
detailed information.
6. As you work through the tabs, you may
click Apply to save your settings.
7. When all entries are complete, click OK to
save your settings and return to the System
Configuration window.
8. If you wish to group OSI terminals that
provide common access, see Create Termi-
nal Groups on page 78 for detailed instruc-
tions.

After you create the OSI reader terminal, the


system automatically creates three soft input
points: Low Battery, Tamper, and Term Down.
These input points display under the Input
Name – Enter a descriptive Name for the ter-
Points icon as Low Battery <reader name>,
minal. By default the Name field displays the
Tamper <reader name>, and Term Down
MAC address of the reader but you can change
<reader name>. If you wish to report the asso-
the name according to your facility needs.
ciated alarms, edit the input point and make
sure the Disable Alarm option is not selected Panel – This field displays the name of the por-
in the General tab of Alarm Options, otherwise tal you selected from the System Configura-
the alarm does not report to the Alarm Queue, tion window, which provides the wireless
but continues to report to the Real Time List communication to the reader.
(see Alarm Options Tab on page 83). Also, if
you rename the reader, you must edit the input Query String – This value is used with message
point to manually enter the new reader name, filtering (see Define Query String Filters on
as in Term Down <reader name>. page 225).

Mac Address – This field displays the Media


Access Control address automatically
assigned to the reader.

24-10832-194 Rev. E
106 CHAPTER 2
Configuring the System

Enable – Click if you wish the system to recog- Statistics Update Interval – Select the frequency
nize this terminal. at which the reader sends messages to the por-
tal gateway with signal strength, battery volt-
Public – If you use Partitioning, click if you age, external supply voltage and packet trans-
wish this terminal to be visible to all partitions. fer ratio information.
Door Sensors – Click if your reader has the
optional Door Sense Module for monitoring of
the actual strike status. Note: The smaller the interval, the greater the
battery use. For a high volume area, you may
Channels – Click the Radio Frequency (RF) want to keep the interval time at 1 minute to
channels or frequency bands that this terminal ensure adequate coverage. (You need to monitor
uses to communicate with the readers. battery use to ensure adequate power supply.)
However, for little used areas, you can set the
update interval up to 24 hours to preserve battery
Access Tab life.

This tab defines the OSI reader’s time parame-


ters. Timezone Tab

The Timezone tab defines the time zones in


which the OSI reader operates. Time Zones
must be set up before they display in
drop-down lists.

Access Time – Select the amount of time that


the door remains unlocked to provide access.

Shunt Time – Select the amount of time that the


door alarm is suppressed to allow access at the
door. The Shunt Time should be longer than Badge Required – Select the time zone during
the Access Time. which the reader requires a badge to allow
access. If you do not wish to enable this func-
tion, select <none - 24 hour enable> to allow
access at all times.

24-10832-194 Rev. E
107

Override – Select a time zone during which the Reboot and Clear DB – Click to reset the reader
reader does not require a badge to open the and temporarily clear current reader data.
door. After you perform this command, you must
reset the OSI terminal using the instructions
PIN Required – Select a time zone during provided on To Set Up OSI Readers on
which cardholders are required to enter a PIN page 103.
number.

Note: After you click one of the previous but-


Note: If the Badge Required time zone tons, a Reader Cleared message displays in the
selected for the OSI terminal is inactive, but the Real Time List. The total time for these opera-
PIN Required time zone is active, then the OSI tions to complete and the time it takes for the cor-
terminal grants access to a valid cardholder. responding message to display in the Real Time
List varies due to the wireless nature of the sys-
tem.
Reboot Tab

At times it may be necessary to use this tab to Viewing OSI Wireless Devices Status
reset the reader. This could typically happen
only if you were to take the reader offline, for The System Status window displays the cur-
example to change batteries. rent status of all OSI devices that have been
configured in the system. It also allows you to
view portal and reader values related to the
wireless signal they receive.

See Viewing System Status on page 435 for


instructions on how to display the status of
OSI devices.

Reboot – Click to reset the reader.

24-10832-194 Rev. E
108 CHAPTER 2
Configuring the System

Configure S321-IP Panels and You should logically name S321-IP panels,
Components including information such as a panel’s loca-
tion or what it controls, but bear in mind that
Use this section to configure your P2000 sys- the maximum number of characters allowed in
tem to communicate with S321-IP panels. an S321-IP component name is 32. When you
S321-IP panels communicate with the P2000 use long panel names, you need to remember
Server using a standard TCP/IP network proto- that a terminal input point name is <input
col to provide badge access, alarm monitoring, name> <terminal name> <panel name> and
history reporting, input/output linking, and therefore, that combination should not exceed
card and system activated events. 32 characters. If the combination does exceed
32 characters the resulting name is truncated to
The S321-IP is an advanced, intelligent, net-
32 characters.
work panel capable of monitoring and con-
trolling one or two fully configured doors. The
S321-IP panel provides the ability to configure
supervised 4-state inputs and unsupervised IMPORTANT: Although the P2000 system
allows S321-IP component names to have up to
2-state inputs. When interfacing to a single
32 characters, the S321-IP panel user interface
door, you can configure the unused points as only supports names of up to 16 bytes long.
general purpose input/output points.

It is assumed that the S321-IP hardware is


already connected to the P2000 Server before Configure S321-IP Panels
you can configure and use the functions To enable communication between the
described in this section. Refer to the S321-IP S321-IP panel and the P2000 Server, you have
Network Controller Hardware Installation to configure the connection at both sides. First,
Manual for hardware installation instructions. you need to define the P2000 Server at the
S321-IP panel, and then you need to enter the
S321-IP Naming Conventions S321-IP information in the P2000 S321-IP
Panel Edit dialog box.
S321-IP panel components are named using a
consistent naming scheme. Terminals, input,
and output point are automatically allocated an Note: You must generate a Certificate using
identifying name. This name consists of a the S321-IP user interface to enable encrypted
fixed description of the item (such as Term 1 communications between the P2000 Server and
for terminals or Panel Battery for inputs), plus the S321-IP panel.
the panel name. In the case of terminal input
and output points, the name of the terminal is Refer to the S321-IP Configuration and Oper-
also appended to the input and output names, ation Manual to prepare the S321-IP panel for
so that an input point for example, is recog- integration with the P2000 system.
nized by its panel and terminal name.

Note: Because of S321-IP requirements, there


must be at least one time zone available before
creating or editing an S321-IP panel.

24-10832-194 Rev. E
109

To Configure S321-IP Panels S321-IP Panel Field Definitions

1. From the P2000 Main menu, select Con-


fig>System. Enter your password if General Tab
prompted. The System Configuration win-
dow opens.
2. Expand Panels to display the panel types.
3. Select S321-IP Panels and click Add. The
S321-IP Panel Edit dialog box opens.
4. Fill in the information on each tab. (See
S321-IP Panel Field Definitions for
details.)
5. As you work through the tabs, you may
click Apply to save your entries.
6. Click OK to save the panel information. A
message box displays asking if you wish to
automatically add all time zones to the new
panel. If you select No, you can add the
time zones later; see Configure Panel Time
Zones on page 62.
Partition – If you use Partitioning, select the
7. If you select Yes, the time zones are auto- Partition that has access to this panel.
matically added. When you return to the
System Configuration window, a new Public – If you use Partitioning, click Public to
S321-IP Panel icon bearing the name allow all partitions to see this panel.
assigned displays under the root S321-IP
Name – Enter a descriptive Name for the panel.
Panels.
See S321-IP Naming Conventions on
page 108 for more information.

Note: In addition to applying time zones to the Version – Select the firmware version of the
panels (described in Configure Panel Time Zones S321-IP panel. Certain features are enabled or
on page 62), you may also define panel holidays disabled depending on the panel version
if you wish to restrict access in your facility during selected.
a holiday period; see Configure Panel Holidays
on page 63.

24-10832-194 Rev. E
110 CHAPTER 2
Configuring the System

Enabled – The system does not recognize the Address Tab


panel unless you click Enabled. If you wish to
temporarily disable the panel, without having
to delete the panel, click the check box again to
disable it. When you disable a panel, the read-
ers continue to grant access, but the panel does
not communicate with the Server until you
enable the panel again.

Query String – This value is used with message


filtering (see Define Query String Filters on
page 225).

Enable Panel Inputs – Click to create two panel


soft input points: Panel Tamper and Power
Failure.

Enable Encryption – Click to allow encryption


of all messaging between S321-IP panels and
the P2000 Server. Name for DNS Address Resolution – Click and
enter the name assigned to the S321-IP panel.
This name is used to communicate with the
Note: To use encrypted communications, you panel instead of the IP address if the Domain
must also configure the Secure Sockets Layer Name Server (DNS) is present on the network.
(SSL) settings at the S321-IP panel.
This field must exactly match the S321-IP
name defined using the S321-IP panel user
interface.
Note: You must disable the Enable Encryp- Fixed IP Address – If your facility uses fixed IP
tion option when performing the S321-IP firm-
ware upgrade process. After the panel is updated,
addresses, click and enter the IP address
you can enable the encryption option again. assigned to the S321-IP panel.

MAC Address – Enter the Media Access Control


Reboot – Click to reboot the S321-IP panel. (MAC) address assigned to the S321-IP panel.
The Reboot button is provided to force the
panel to restart, for example in cases when the
panel is not functioning properly. This feature Note: Changes to any of the following Panel
is available after you save the panel informa- Communication Parameters may cause the panel
tion. to go down and then up again.

Heartbeat Transmit Interval – Enter the number


of hours, minutes, and seconds that determines
how often the S321-IP panel sends keepalive
messages to the P2000 system.

24-10832-194 Rev. E
111

Host No Reception Timeout – Enter the number Other Tab


of hours, minutes, and seconds that must pass
without receiving any notification, before the
P2000 system assumes the S321-IP panel is no
longer available. If this value is set below 60
seconds, the P2000 system may report the
S321-IP offline when a large number of
badges are downloaded, because of S321-IP
internal processing.

Note: Be aware that the communication


between the P2000 server and the S321-IP panel
may be significantly slow if the Data Center TCP
feature is enabled in certain Windows operating
systems. Refer to the P2000 Software Installation
manual for instructions.

Resend Attempt Interval – Enter the number of


History Retention Period – This setting defines
hours, minutes, and seconds to define how
how long the panel retains data in the transac-
long the S321-IP panel waits before resending
tion database before older data is deleted.
a message after the previous attempt failed.
Click Delete history older than and enter the
HTTP Disconnect Delay – Determines how long number of days the panel holds data before
the S321-IP panel holds on to a connection if deletion.
there is no activity. Select one of the follow-
Enable Secondary Interfaces – Use this setting
ing:
if you wish to use an external device to config-
 Time Delay – Click to tell the S321-IP panel ure, monitor, and control the S321-IP panel.
to keep the underlying HTTP connection
 SNMP – The Simple Network Management
for the time specified in the Hours, Minutes
Protocol (SNMP) option is used mostly by
and Seconds fields.
network connected devices to report condi-
 Never – Click to tell the S321-IP panel to tions such as a high temperature alarm. You
never drop the underlying HTTP connec- would have to provide a third party device
tion. for doing this monitoring.
 Immediate – Click to tell the S321-IP panel  Web UI – The Web UI option is the interface
to drop the underlying HTTP connection method necessary for using a Web Browser
immediately after each transmission. to communicate with the S321-IP panel.
Restore Defaults – Click to restore default val- You must enable this option to run the
ues of all related communication timed values. S321-IP Firmware Update application.
Refer to your S321-IP documentation for
details.

24-10832-194 Rev. E
112 CHAPTER 2
Configuring the System

Configure S321-IP Terminals


IMPORTANT: It would be virtually impossible
for the P2000 system to control and monitor the The S321-IP panel can control two door termi-
S321-IP panel correctly if you use either of these
nals, which are automatically created after you
options to control or configure the S321-IP panel.
If you only use SNMP or Web UI to monitor the configure and save the S321-IP panel. Either
S321-IP panel, while the P2000 system is in oper- or both terminals can be configured as a reader
ation, then the risk of problems is greatly terminal or with all input and output points
reduced, but not eliminated. Do not enable these designated as general purpose input/outputs.
secondary interfaces unless you need to obtain
diagnostic information from the S321-IP panel When the terminals are created in the system,
during system startup, or you wish to monitor cer- they display under the Terminals icon as Term
tain S321-IP items using SNMP and understand 1 <panel name > and Term 2 <panel name>.
the risks.

Note: The Entry/Exit concept is not supported


World Timezone Information Box by S321-IP panels. In addition, the S321-IP termi-
nal only supports Local access operation. See
The information in this box defines time Appendix C: Panel Comparison Matrix for
zone-related information and Daylight Savings detailed information on the features supported.
Time (DST) settings.

Import World Time Zone Information – Click to To Configure S321-IP Terminals


select the time zone information that applies to
the panel location. 1. In the System Configuration window,
expand Panels to display the panel types.
Panel UTC Offset – Defines time offsets for
remote panels, relative to Universal Time. 2. Expand S321-IP Panels to display all
Click the + or – radio button and enter the S321-IP panels configured in the system.
appropriate hours and minutes for the time off- 3. Expand the panel that contains the termi-
set. nals you wish to configure. All the items
that can be configured for the panel are
Daylight Savings Used – When you select a listed under it.
time zone, the system defaults to the standard
4. Expand Terminals. Select the terminal you
daylight savings time settings for the selected
wish to configure and click Edit. The
region, the S321-IP’s clock is automatically
S321-IP Terminal Edit dialog box opens at
adjusted for daylight savings time. If you wish
the General tab.
to change the default settings, click the Day-
light Savings Used check box and select: 5. Enter the information in each tab according
to your system requirements. (See S321-IP
 the Begin and End Month Terminal Field Definitions for detailed
 the Begin and End Week of Month information.) As you work through the
 the Begin and End Day of Week tabs, click Apply to save your settings.
 the Begin and End Time of Day 6. When you finish with all the entries, click
OK to save your settings and return to the
Added During Daylight Savings – A value of 1 System Configuration window. If you wish
hour is currently the world standard. You can- to include S321-IP terminals in groups that
not change this value. provide common access, see Create Termi-
nal Groups on page 78.

24-10832-194 Rev. E
113

S321-IP Terminal Field Definitions Flags Tab

General Tab

Shunt Alarm on Request to Exit – If enabled,


Name – This field displays the name automati- the system shunts the Request to Exit door
cally assigned to the terminal. You can how- alarm when the system grants access through
ever enter a different name for the terminal. an auxiliary access point. If the Request to Exit
alarm is shunted, the door can be opened and
Panel – This field displays the name of the closed for a specific period of time (shunt time
S321-IP panel you selected from the System defined in the Access tab) after access has
Configuration window. been granted. If a door is opened without
access being granted, or if the door is held
Query String – This value is used with message open beyond the alarm shunt time and the
filtering (see Define Query String Filters on alarm signal is not suppressed, the alarm is
page 225). detected immediately.
Number – This field displays the terminal index Momentary Auxiliary Access – Determines the
number (1 or 2). This number corresponds to total access time when a cardholder is entering
the terminal index as assigned at the panel. or exiting a secured area via an auxiliary
Public – If you use Partitioning, click Public if access point. When enabled, the access time
you wish this terminal to be visible to all parti- (defined in the Access tab) begins timing when
tions. a switch shorts the door’s auxiliary access
input point contact (the door strike unlocks for
Enable – Click so the new terminal is recog- the number of seconds defined in the Access
nized by the system. Time field when the system first detects an
entry or exit request through an auxiliary
Reader Mode – Indicates a card reader termi- access point). If not enabled, the door’s auxil-
nal. If selected as the Terminal Operational iary access input point contact energizes the
Mode, additional tabs are added. If the Termi- door relay as long as the contact is shorted (the
nal is a reader terminal, only two input points door strike remains unlocked for the entire
can be utilized. auxiliary access time, including the number of
Input/Output Mode – Indicates a terminal that seconds defined in the Access Time field).
provides input and output points. In this mode,
four input points and four output points can be
utilized.

24-10832-194 Rev. E
114 CHAPTER 2
Configuring the System

Report Strike Status – Click to report the status Access Tab


of the door strike associated with the reader.
Unchecking this flag leaves the last reported
door strike status in place. This means that the
terminal may show as locked or unlocked,
regardless of whether the door is actually
locked or unlocked.

Badge Override – If enabled, cardholders with


their badge’s Override option enabled can
unlock the door controlled by the selected
reader for a specified time period.

Badge ID Allowed – If enabled, a cardholder


may enter the badge number at a keypad to Access Time – Enter the time (in seconds) that
access a secured area. This feature enables the door strike remains energized after a card-
cardholders who have forgotten their badge the holder presents a valid badge at the selected
opportunity to gain entry by keying in their reader. The cardholder has up to 60 seconds to
badge number. open the unlocked door before it re-locks when
the access time elapses.
PIN Required – If enabled, all cardholders must
enter a custom PIN on the selected reader Shunt Time – Enter a time in seconds that the
when attempting to access a secured area. door open alarm is suppressed after a valid
badge access request. The Shunt Time should
be longer than the Access Time.
Override Reset Threat Level Box
Anti Passback – This feature prevents unautho-
Each reader terminal defined for an S321-IP
rized persons from using the badge of an
panel can be configured with an Override
authorized cardholder to gain access to a con-
Reset Threat Level ranging between 0 and 99.
trolled area. Once an authorized cardholder
Whenever a terminal’s Security Level reaches presents a valid badge to access the facility, the
or exceeds the terminal’s Override Reset cardholder cannot access the facility again
Threat Level, all overrides are immediately until the anti-passback time entered expires.
disabled. Subsequent attempts to invoke over-
rides are denied.

All overrides are restored once a terminal’s


Security Level drops below the terminal’s
Override Reset Threat Level. For more infor-
mation, see Security Threat Level Control on
page 293.

24-10832-194 Rev. E
115

Timezone Tab

This tab defines the time zones in which this


terminal operates. Time Zones must be set up
before they display in drop-down lists.

 The S321-IP panel supports one built-in


card type at a time, therefore select only one
card type.
 Select No Card Types if this reader is dis-
Enabled – Select a time zone during which the abled.
terminal is active. For example, you may not
 The Sensor 26 Bit card format is compati-
want the reader to be used between midnight
ble with the 26-bit Wiegand Inverted card
and 5:00 AM, so assign a time zone with the
format.
desired inactive time period. If you select
<none>, the terminal is always active and  If you select Raw 128 Bit, enter the Num-
allows unrestricted access. ber of bits to use (12 - 64).
 If your facility uses Custom Card For-
Override – Select a time zone that can be set as mats, select one of the formats previously
an override for this terminal. If you select downloaded into the panel using the Panel
<none>, this terminal is never in override. Card Formats application; see page 64 for
PIN Suppression – Select a time zone during detailed instructions.
which cardholders do not have to enter a PIN
number. If you select <none>, cardholders are Calibrate Tab
never required to enter their PIN number.
Use this tab to calibrate door contact input
points as well as auxiliary access input point
Card Types Tab contacts on the terminal.
This tab determines which card type can be
used at the selected reader. If a presented
badge does not match the selected card type,
the system denies access to the cardholder.

24-10832-194 Rev. E
116 CHAPTER 2
Configuring the System

Configure S321-IP Input Points


IMPORTANT: During the entire input calibra-
tion procedure, the input’s contact must be physi- S321-IP Panel and Terminal applications auto-
cally closed. Otherwise, the input’s status is
matically generate input points and their
unreliable.
addresses. These input points can be enabled to
indicate the current state of a device and can be
Calibrate – This command calibrates the used for alarm or non-alarm purposes.
S321-IP’s selected input point contacts without
using the panel’s CAL RESISTOR points. Some S321-IP input points have a predefined
Issuing this command determines the door’s and unchanging purpose – indicating panel
secure state and sets the selected input point as power failure and low battery power. When
supervised (4-state). terminals are enabled, some input points are
dedicated to access control functions, such as
receiving input from door contacts and REX
Note: A Reader Status Input Fault message devices. Other input points can be used for a
displays in the Real Time List when Door Contact variety of purposes and devices (motion sen-
or Exit Request 4-state inputs are opened or sors, tamper switches, and so on) – these input
shorted. points are referred to as general purpose inputs.
The number of terminals enabled determines
Uncalibrate – This command uncalibrates the the available number of general purpose
selected input point and sets it as unsupervised inputs.
(2-state). After you uncalibrate the input point, Panel input points are automatically created
four-state input statuses are no longer available under the selected S321-IP panel and are
for the input, only two-state statuses. named using the input name and <panel
Calibrate with Resistor – This command cali- name>, as in Power Failure <panel name>.
brates the S321-IP’s selected input point con- Terminal input points are created under the
tacts using the panel’s CAL RESISTOR points. selected S321-IP terminal and are named using
Issuing this command determines the door’s the input name and <terminal name> <panel
secure state and sets the selected input point as name>, as in Forced Door <terminal name>
supervised (4-state). Calibrating the input point <panel name>. If you rename the panel or ter-
based on the CAL RESISTOR points does not minal, you can edit the input point to manually
require the door to be in the secure state during enter the new panel or terminal name.
the calibration process. The following possible input points are avail-
able:

Note: Once you perform a calibration proce-


dure on an input point, you should not use this
feature again, unless you change the input point’s
wiring.

24-10832-194 Rev. E
117

Input Type Input Name Generated for... Description


Panel Inputs Panel Tamper S321-IP panels with the General purpose input. Typically wired to
Enable Panel Inputs option a tamper switch on an enclosure to indi-
selected. cate tampering.
Power Failure With battery backup employed, this input
point indicates power failure.
Panel Soft Inputs Panel Battery All S321-IP panels. With battery backup employed, this input
point provides a low battery indication
during power failure.
Clock Battery Indicates when the panel’s lithium battery,
which is used to back up the real-time
clock, is low.
Panel Down Internal to the P2000 system to indicate
that the panel is not active.
Terminal Inputs Forced Door S321-IP terminals with the Indicates when there is a door open con-
Reader Mode option dition without a valid badge read detected
selected. first.
Propped Door Indicates when there is a door open con-
dition with a valid badge, but the door is
left open past the entry time.
Door Contact S321-IP terminals with the In Reader Mode, this input point receives
Input/Output Mode option input from the door contact associated
selected. with the terminal. In Input/Output Mode,
this input point can be used as a general
purpose input.
Exit Request In Reader Mode, this input point receives
input from the REX device associated
with the terminal. In Input/Output Mode,
this input point can be used as a general
purpose input.
Spare All S321-IP terminals. General purpose input.
Tamper General purpose input.
Term Down Internal to the P2000 system to indicate
that panel communications have ceased.

24-10832-194 Rev. E
118 CHAPTER 2
Configuring the System

To Configure S321-IP Inputs Partition – If you use partitions, select the


appropriate Partition that has access to this
1. In the System Configuration window, input point.
expand Panels to display the panel types.
2. Expand S321-IP Panels to display all Public – If you use partitions, click Public if
S321-IP panels configured in the system. you want this input point to be visible to all
partitions.
3. Expand the panel that contains the input
points you wish to configure. Name – This field displays the name automati-
 To configure panel inputs, expand Input cally assigned to the input point, which con-
Points, select the input point you wish sists of the <point name> <panel name>; the
to configure and click Edit. <terminal name> displays for terminal inputs.
If you wish to change it, enter a descriptive
 To configure terminal inputs, expand the
name for the input point.
terminal that contains the input point
you wish to configure, then expand Query String – This value is used with message
Input Points, select the input point you filtering (see Define Query String Filters on
wish to configure and click Edit. page 225).
The S321-IP Input Point dialog box opens
Point Name – Displays the point name defined
at the General tab.
by the S321-IP panel.
4. Enter the information in each tab according
to your system requirements. The fields Point Number – Displays the number associ-
available for configuration depend on the ated with the input point. This number rep-
type of input point selected. (See S321-IP resents the physical connection to the I/O ter-
Input Point Field Definitions for detailed minal.
information.) As you work through the Enable – Click to report all input point changes
tabs, click Apply to save your settings. of state.
5. When you finish with all the entries, click
OK to save your settings and return to the Suppress During Timezone – Select a Time
System Configuration window. Zone during which the input point is disabled.
For example, it is impractical to report a door
contact alarm during business hours when the
S321-IP Input Point Field Definitions door is in constant use. This option is not avail-
able for Panel Down, Forced Door, Propped
General Tab Door, and Term Down input points.

24-10832-194 Rev. E
119

Alarm Options Tab Output Link – This option links the input point
to an output point, so that the output point can
be triggered by a change in the input point’s
state. For example, when an input point, such
as a motion sensor, is tripped (the input point
state changes from secure to alarm), an output
point triggers an external device (a light is
turned on). Select the number of the output
point that can be triggered by the selected
input point. The list display the output point
number preceded by the terminal number, as in
<terminal number>-<output number>.

Calibrate – This command calibrates the


Alarm options are described in detail on S321-IP’s selected input point contacts with-
page 83. out using the panel’s CAL RESISTOR points.
Issuing this command determines the door’s
Misc Tab secure state and sets the selected input point as
supervised (4-state).
Settings in this tab are not available for Panel
Down, Forced Door, Propped Door, and Term
Down input points. IMPORTANT: During the entire input calibra-
tion procedure, the input’s contact must be physi-
cally closed. Otherwise, the input’s status is
unreliable.

Uncalibrate – This command uncalibrates the


selected input point and sets it as unsupervised
(2-state). After you uncalibrate the input point,
four-state input statuses are no longer available
for the input, only two-state statuses.

Calibrate with Resistor – This command cali-


brates the S321-IP’s selected input point con-
tacts using the panel’s CAL RESISTOR
Debounce Time – Enter the time in tens of mil- points. Issuing this command determines the
liseconds that the input must remain in a tran- door’s secure state and sets the selected input
sition state to establish the detected state. point as supervised (4-state). Calibrating the
Without a debounce time, the panel may detect input point based on the CAL RESISTOR
that the input is in an incorrect state because of points does not require the door to be in the
the bouncing of the input device’s contacts. secure state during the calibration process.

Note: Once you perform a calibration proce-


dure on an input point, you should not use this
feature again, unless you change the input
point’s wiring.

24-10832-194 Rev. E
120 CHAPTER 2
Configuring the System

Configure S321-IP Output Points The following possible output points are avail-
able:
S321-IP output points are automatically cre-
ated under terminals that operate with the
Input/Output Mode enabled. These output
points are used to trigger external devices Output Name Description
using the S321-IP panel. These devices might Green If the terminal is enabled, this out-
include warning indicators for alarm situations put point controls a green LED
or non-alarm related functions, such as lighting associated with the terminal. When
access is granted, this output is
or environmental control. activated. If the terminal is disabled,
this output point can be used as a
When the terminal operates in Reader Mode, general purpose output.
the output points are dedicated to access con- Red If the terminal operates in Reader
trol functions, such as controlling the door Mode, this output point controls a
strike, shunting an alarm, and turning green red LED associated with the termi-
nal. When access is denied, this
and red LEDs on and off to indicate access output is activated. If the terminal
granted or denied. operates in Input/Output Mode, this
output point can be used as a gen-
If the terminal operates in Input/Output Mode, eral purpose output.
the output points that were used by the reader Shunt If the terminal operates in Reader
can be used to trigger external devices, such as Mode, the alarm shunt prevents the
external alarm system from sound-
lights and sirens – these output points are ing an alarm when a valid access
referred to as general purpose outputs. occurs. When a valid access
occurs, the shunt relay is energized
Output points are created under the selected for the number of seconds entered
in the Shunt Time field on the
S321-IP terminal and are named using the out- Access tab of the S321-IP Terminal
put name and <terminal name> <panel name>, Edit application. If the terminal
as in Shunt <terminal name> <panel name>. operates in Input/Output Mode, this
output point can be used as a gen-
If you rename the panel or terminal, you can eral purpose output.
edit the output point to manually enter the new
Strike If the terminal operates in Reader
panel or terminal name. Mode, the door strike controlled by
the terminal unlocks for the number
of seconds entered in the Access
Time field on the Access tab of the
S321-IP Terminal Edit application. If
the terminal operates in Input/Out-
put Mode, this output point can be
used as a general purpose output.

24-10832-194 Rev. E
121

To Configure S321-IP Outputs 9. Click Enable to allow the output point to


be activated or deactivated.
1. In the System Configuration window,
locate the S321-IP terminal that contains 10. Click Log Output Status Message if you
output points. want the status of the output point to dis-
play in the Real Time List and the System
2. Expand Output Points, select the output Status window.
point you wish to configure and click Edit.
The S321-IP Output Point dialog box 11. Select one of the following Operational
opens. Mode options:
Latched (on until turned off, off until turned
on) – to command the output point to be set
and remain active, until commanded to be
reset.
Latched with Fast Flash (flashes until turned
off) – to toggle the output point on and off
quickly (once per second).
Latched with Slow Flash (flashes until
turned off) – to toggle the output point on
and off slowly (once per two seconds).
Timed Duration (on until duration expires) –
to turn on the output point for the time
3. If you use partitions, select the appropriate specified in the Timed Duration field.
Partition that has access to this output
point. Timed Duration with Fast Flash (flashes
until duration expires) – to toggle the out-
4. If you use partitions, click Public if you put point on and off quickly for the time
want this output point to be visible to all specified in the Timed Duration field.
partitions.
Timed Duration with Slow Flash (flashes
5. The Name field displays the name auto-
until duration expires) – to toggle the out-
matically assigned to the output point,
put point on and off slowly for the time
which consists of the <point name> <ter-
specified in the Timed Duration field.
minal name> <panel name>. If you wish to
change it, enter a descriptive name for the 12. If you selected any of the Timed Duration
output point. operational modes, enter a Duration in
seconds.
6. The Point Name field displays the point
name defined by the S321-IP panel. 13. When you finish with all the entries, click
OK to save your settings and return to the
7. The Point Number field displays the num-
System Configuration window.
ber associated with the output point. This
number represents the physical connection
to the I/O terminal.
8. The Query String value is used with mes-
sage filtering (see Define Query String Fil-
ters on page 225).

24-10832-194 Rev. E
122 CHAPTER 2
Configuring the System

Configure HID Panels and  Data0


Components  Data1
 GrnLED
HID Edge® readers interface with the P2000  RedLED (optional)
Server using a TCP/IP connection to provide a  Beeper
single-door access control solution. The HID  Hold
Edge readers are IP-based readers with Power
 When configuring the HID device via its
over Ethernet (POE) capabilities and can be
built-in Web page, you must enter a value
initially configured remotely over the network
(no less than 20 seconds), in the Here I Am
via standard Web browser.
Interval (sec): field; otherwise, the reader
does not attempt to communicate with the
IMPORTANT: This release of the P2000 soft- P2000 Server.
ware works with HID Edge readers that use firm-
ware Version 2.2.7.568 and HID Edge EVO®
readers that use firmware Version 3.5.2. Other
HID Panel Naming Conventions
versions may not be compatible with this release
HID panel components are named using a con-
of the P2000 software. The upgrade of HID firm-
ware must follow specific instructions. Contact sistent naming scheme. The system automati-
Technical Support for details. cally allocates an identifying name to the ter-
minals and associated input and output points.
This name consists of a fixed description of the
Hardware Requirements item (such as Term 1 for a terminal or Request
to Exit for an input), plus the panel name. In
Before you can use the functions described in addition, the name of the terminal is also
this section, the HID hardware must be prop- appended to the input and output names, that
erly installed and configured to communicate way, you can for example recognize an input
with the P2000 Server. Refer to the HID docu- point by its panel and terminal name.
mentation for hardware installation instruc-
tions. You should logically name HID panels, includ-
ing information such as the panel’s location or
what it controls. The maximum number of
Note: Edge EVO devices require at least one characters allowed for an HID component
Highly Intelligent Opening (HI-O) module to be name is 32. If you use long panel names, you
connected; otherwise, a “Mode 0” error may be
need to remember that a terminal input point
displayed preventing the HID panel from coming
online. name is <input name> <terminal name>
<panel name> and therefore, that combination
should not exceed 32 characters.
The connection settings are determined by
HID guidelines; however, to ensure proper
operation with the P2000 system, the follow-
ing is required: Note: Although panel components display
names that are automatically assigned, you can
 If your HID model requires an external rename those components according to your
reader, we recommend using the following facility's needs.
connections:
 Pwr
 Gnd

24-10832-194 Rev. E
123

Configure HID Facility Parameters 7. Enter the Controller Buffer Size that
defines the number of events buffered on
Before configuring your HID components, use the HID controllers when offline.
the following instructions to define facility
parameters associated with HID readers. 8. In the Badge Formats box, click Add to
define the badge formats to be used at your
facility. The Badge Format Edit dialog box
To Configure HID Facility Parameters opens.
1. From the P2000 Main menu, select Con-
fig>System. Enter your password if
prompted. The System Configuration win-
dow opens.
2. Expand Panels to display the panel types.
3. Expand HID Network Panels to open the
HID components.
4. Select HID Facility and click Add. The
HID Facility Edit dialog box opens. 9. Click the [...] button, select a *.bft file
from the list, and click Open. The name of
the selected *.bft file displays in the Name
field. You cannot edit this name.
10. Select the Technology type.
11. Enter the total number of Bits expected to
be returned from the reader when the
badge is read.
12. Select a Qualifier number. The number
selected represents a 32-bit numerical
value that allows differentiating formats
with the same technology and the same
number of bits. The default value is 1.
5. Enter the Name of the HID Facility record.
This field displays P2000 by default, but IMPORTANT: The Technology, Bits, and
you can change the name according to Qualifier badge format settings must match the
your facility needs. badge format settings defined for a cardholder
badge (see Create Badge Formats on page 237).
6. Select from the Extended Access Flag
drop-down list, one of the three special
access flags that are used by cardholders 13. Click OK.
with extended access privileges who 14. Repeat these steps for each badge format
require special access at a reader. Special to be used with HID readers.
access allows a door’s access time to be
different. The list displays the special
access flag names as configured in Site Note: The system may generate “Facility code
too large” Event Log error messages when the
Parameters; see page 33. facility code is too large for the selected format.

24-10832-194 Rev. E
124 CHAPTER 2
Configuring the System

15. After you enter all the information, click


Note: In addition to applying time zones to the
OK to save the settings and return to the panels (described in Configure Panel Time Zones
System Configuration window. on page 62), you may also define panel holidays
if you wish to restrict access in your facility during
a holiday period; see Configure Panel Holidays
Configure HID Panels on page 63.
After you install the hardware and use the HID
tools to locate and configure the HID reader,
you are ready to configure the P2000 Server to HID Panel Field Definitions
communicate with the HID device by defining
communication, time, and hardware parame- Note: Changes to any of the following HID
ters. In addition, if you wish to protect the Panel parameters causes the panel to go offline
P2000 system from unauthorized sources, you momentarily. Also, be aware that some down-
can implement encryption using Advanced loads associated with HID panels may take over
40 seconds to process. Some downloads may
Encryption Standard (AES) to secure each and
cause the door to be in unsecure state for a short
every message to and from the HID panel. period.

To Configure HID Panels


General Tab
1. From the P2000 Main menu, select Con-
fig>System. Enter your password if
prompted. The System Configuration win-
dow opens.
2. Expand Panels to display the panel types.
3. Select HID Network Panels and click
Add. The HID Panel Edit dialog box
opens.
4. Fill in the information on each tab. (See
HID Panel Field Definitions for details.)
5. Click OK to save the panel information. A
message box displays asking if you wish to
automatically add all time zones to the new
panel. If you select No, you can add the
time zones later; see Configure Panel Time Partition – If you use Partitioning, select the
Zones on page 62. Partition that has access to this panel.
6. If you select Yes, the time zones are auto-
Public – If you use Partitioning, click Public to
matically added. When you return to the
allow all partitions to see this panel.
System Configuration window, a new
panel icon bearing the name assigned dis- Hardware – Select the HID hardware type. Cer-
plays under the root HID Network Panels. tain features are enabled or disabled depending
on the hardware type selected here. The P2000
server can communicate with the following
HID panel types:

24-10832-194 Rev. E
125

Panel Type Description Encryption Enabled – Click to allow encryp-


Edge Controller with internal reader, tion of all messaging between the HID panel
inputs, and outputs. and the P2000 Server. If you choose to enable
Edge EVO EH400 Controller only, no internal encryption, you may click Create to generate
reader, inputs, or outputs.
Edge EVO EHR40 Integrated with 13.56 MHz a random HID encryption key, or if you prefer
reader, no inputs or outputs. you may enter your own key (not to exceed
Edge EVO EHRP40 Integrated with 13.56 MHz and 200 digits).
125 kHz readers, no inputs or
outputs.
The Encryption Key box displays the key to
See EVO Hardware Tab on page 127 for the be used for encrypted communications.
different hardware modules supported with
Important Notes
each Edge EVO panel hardware type.
 When any encryption setting is changed, a
warning message displays notifying the
Note: You can convert an existing HID Edge user that communications must exist and
panel into an HID Edge EVO EH400 panel. You must not be interrupted while encrypted
must disable the HID Edge panel before chang- communications are established or ended.
ing the hardware type. After you save the panel  Only one encryption setting change can be
record, the change cannot be reverted. After con-
made using the HID Panel Edit application
version, you can edit the panel configuration, also
you can change the EVO hardware type to per session (before the panel information is
EHR40 or EHRP40 as required. saved after clicking OK). The user must
restart the HID Panel Edit application to
make another change.
Name – Enter a descriptive Name for the panel.
 If the user chooses to delete an HID panel
Enabled – The Enabled check box is automati- from the System Configuration window,
cally selected for the system to recognize this and that panel has encryption enabled, a
panel. If you wish to temporarily disable the warning message displays indicating the
panel, without having to delete the panel, click risk involved.
the check box to disable it. When you disable a
panel, the reader continues to grant access, but EVO Hardware Inputs – The following EVO
the panel does not communicate with the hardware inputs can be enabled for monitoring
Server until you enable the panel again. (these panel input points are automatically cre-
ated for Edge panels):
Query String – This value is used with message
filtering (see Define Query String Filters on  Tamper – to indicate tampering if the panel
page 225). is wired to a tamper switch on an enclosure.
 Low Battery – to indicate that the battery is
low.
IMPORTANT: The Encryption Control param-  Power Failure – to indicate a power failure if
eters described next, are not available until the the panel uses a battery backup.
panel information is saved. Communications with
the panel must be established in a non-encrypted
way before encrypted communications can be
established.

24-10832-194 Rev. E
126 CHAPTER 2
Configuring the System

Communications Tab

MAC Address – Enter the Media Access Con-


trol (MAC) address assigned to the HID panel. Import World Time Zone Information – Click to
select the time zone information that applies to
Heartbeat Transmit Interval – Enter the number
the panel location.
of hours, minutes, and seconds that determines
how often the HID panel sends heart beat mes- Panel UTC Offset – Defines time offsets for
sages that confirm successful communication. remote panels, relative to Universal Time.
If you change the heartbeat interval, the panel Click the + or – radio button and enter the
is rebooted after the update. You must confirm appropriate hours and minutes for the time off-
if you wish to continue. set.
Host No Reception Timeout – Enter the number Daylight Savings Used – When you select a
of hours, minutes, and seconds that must pass time zone, the system uses the standard day-
without receiving a heartbeat notification, light savings time settings for the selected
before the P2000 system assumes the HID region, the HID’s clock is automatically
panel is no longer available. adjusted for daylight savings time. If you wish
to change the default settings, click Daylight
Resend Attempt Interval – Enter the number of
Savings Used and select:
hours, minutes, and seconds to define how
long the HID panel waits before resending a  the Begin and End Month
message after the previous attempt failed.  the Begin and End Week of Month
Restore Defaults – Click if you wish to restore  the Begin and End Day of Week
default values of all related communication  the Begin and End Time of Day
timed values.

Time Information Tab Note: Because of HID limitations, all minutes


and seconds values must always be zero.
The information in this box defines time
zone-related information and Daylight Savings
Added During Daylight Savings – A value of 1
Time (DST) settings.
hour is currently the world standard. You can-
not change this value.

24-10832-194 Rev. E
127

EVO Hardware Tab Module Type Specification


EIM (Hi-O Grp 1) 4 general purpose input points
Information in this tab allows you to select the
EIM (Hi-O Grp 2) 4 general purpose input points
hardware module connected to Edge EVO
ELM (Hi-O Grp 1) **** 1 output point. Can be defined
panels. The specific number of readers, input as a Fail Safe output.
points, output points, and the terminal features ELM (Hi-O Grp 2) ***** 1 output point
supported depend on the type of module * Not available if ELM (Hi-O Grp 1) is selected.
selected here. ** Not available if ELM (Hi-O Grp 2) is selected.
*** Not available for panels (EHR40 and EHRP40) with
integrated readers.
**** Not available if EDM (Hi-O Grp 1) is selected.
***** Not available if EDM (Hi-O Grp 2) is selected.

Important Notes:
 The P2000 system does not monitor the sta-
tus of HI-O bus modules.
 EVO panels may display download errors
unless the items selected on this tab match
exactly the HI-O bus modules physically
connected. P2000 configuration should be
updated after new HI-O modules are added
and rebooted. P2000 configuration should
Hardware – Displays the hardware type be changed before old HI-O modules are
selected in the General Tab. removed.
 If you select any group 1 module type, a
Built-in Reader – This is selected by default for P2000 terminal number 1 is automatically
EHR40 and EHRP40 panels, and indicates that created. If you select any group 2 module
a reader is integrated into the panel. Not avail- type, a P2000 terminal number 2 is auto-
able for EH400. matically created.
Hi-O Modules Connected – Select the HI-O  Tabs in the HID Terminal Edit are available
hardware module connected to the HID panel. for configuration, depending on the module
Depending on the selections made in the check type selected.
boxes, other check boxes are enabled or dis-  When you define two readers for a single
abled. The final selection must not exceed 2 door, most terminal parameters are synchro-
readers, 12 inputs, and 3 outputs. The follow- nized between the two readers to ensure a
ing table displays the options provided with predictable behavior of the door.
each module type:  Terminal Inputs are available for configura-
tion if terminal 1 contains an EDM module.
Module Type Specification
EDM (Hi-O Grp 1) 4 dedicated input points
 You can configure input points, if the termi-
2 output points * nal contains an EIM or EDM group 2 mod-
EDM (Hi-O Grp 2) 4 general purpose input points ule for the selected group number.
2 output points **
EWM (Hi-O Grp 1) 1 reader terminal. Can be  You can configure output points, if the ter-
defined as a Keypad reader. minal contains an EDM or an ELM module
EWM (Hi-O Grp 2) *** 1 reader terminal. Can be for the selected group number.
defined as a Keypad reader.

24-10832-194 Rev. E
128 CHAPTER 2
Configuring the System

 For example, if you select an EIM for group 6. When you finish with all the entries, click
2 and an EWM for group 2, a terminal with OK to save your settings and return to the
index 2 is created. In addition, 4 inputs are System Configuration window. If you wish
available for creation under that terminal. to include HID terminals in groups that
provide common access, see Create Termi-
Configure HID Terminals nal Groups on page 78.
Depending on your hardware selection, the
HID EVO panel can control up to two door ter- HID Terminal Field Definitions
minals, which are automatically created after
you configure and save the HID panel informa- General Tab
tion. The HID terminal may contain input and
output points. When the terminal is created, it
displays under the Terminals icon as Term 1
<panel name > or Term 2 <panel name>.

Note: The HID Edge panel allows 1 reader ter-


minal with up to six inputs and one output point.

Note: The Entry/Exit concept is not supported


by HID panels. In addition, the HID terminal only
supports Local access operation. See Appendix
C: Panel Comparison Matrix for detailed informa-
tion on the features supported.

Name – This field displays the name automati-


To Configure HID Terminals cally assigned to the terminal. You can how-
ever enter a different name for the terminal.
1. In the System Configuration window,
expand Panels to display the panel types. Panel – This field displays the name of the
HID panel you selected from the System Con-
2. Expand HID Network Panels to display figuration window.
all HID panels configured in the system.
3. Expand the panel that contains the terminal Query String – This value is used with message
you wish to configure. All the items that filtering (see Define Query String Filters on
can be configured for the panel are listed page 225).
under it. Number – This field displays the terminal
4. Expand Terminals, select the terminal and index number.
click Edit. The HID Terminal Edit dialog
box opens at the General tab. Public – If you use Partitioning, click Public if
you wish this terminal to be visible to all parti-
5. Enter the information in each tab according tions.
to your system requirements (the Flags,
Access, and Timezone tabs are available EVO EDM Hi-O Grp 1 Module Inputs – The fol-
for reader terminals only. See HID Termi- lowing EDM Hi-O Grp 1 module inputs can be
nal Field Definitions for detailed informa- enabled for monitoring (these input points are
tion. automatically created for Edge terminals):

24-10832-194 Rev. E
129

 Door Contact – to indicate when the input Propped Door is Annunciated at Door – If
point receives a signal from the door con- enabled, the reader beeps when the propped
tact associated with the reader. door condition is reported. A Propped Door
 Forced Door – to indicate when there is a condition occurs when the propped input point
door open condition without a valid badge is configured and a door is held open longer
read detected first. than the Time Before Propped Door Reported
setting, as indicated on the Access tab.
 Propped Door – to indicate when the door is
held open longer than the time entered in Tamper Alarm Activates AUX Relay – Click to
the Time Before Propped Door Reported activate the auxiliary relay upon receiving a
field. tamper signal. The relay deactivates when the
tamper becomes secure. A tamper signal is
received from one or more tamper switches on
Note: When the Edge reader is in override, the the panel to indicate a tamper condition if for
Propped Door alarm does not go back to secure example, a reader has been disturbed or
state after the door is closed. removed from the wall.

 Request for Exit – to indicate when the input Access Tab


point receives a signal from the REX device Door access is allowed based on the parame-
associated with the reader. ters selected here.

Flags Tab

Note: When you define two readers for a sin-


gle door, the following settings are synchronized
between the two terminals. Access Method – This option defines the type
of credentials that must be presented to unlock
REX Contact Energizes Door Strike Relay (REX the door. Choices available for selection
always shunts door contact for access time) – If depend on the EVO hardware selected. When
enabled, the Request to Exit (REX) input point two readers are defined for a single physical
automatically energizes the door strike relay door, the choices available also depend on the
(unlocks the door). When pressed, the REX selection of the other reader. Select one of the
input always suppresses the forced door alarm following:
for the access time defined. The Propped door
alarm is also inhibited until the door is closed.

24-10832-194 Rev. E
130 CHAPTER 2
Configuring the System

 Card only – The cardholder must swipe the  A command is received from the Door Con-
badge to gain access. trol application to change the door’s condi-
 Card and PIN – The cardholder must swipe tion.
the badge and is also required to enter a PIN
The following describes the keypad sequence
code. If this option is selected, you must
necessary to unlock the door and return the
complete the Keypad Entry Parameters set-
door to normal operation.
tings. Selection is not available when the
other reader is in Card ID only mode or  Depending on the Access Method used
Card or Card ID mode. (Card and PIN, Card ID only, or Card or
 Card ID only – The cardholder must enter the Card ID) gain access and enter 9 9 # to
badge number at the keypad. If this option unlock the door.
is selected, you must complete the Keypad  Depending on the Access Method used
Entry Parameters settings. Selection is not (Card and PIN, Card ID only, or Card or
available when the other reader is in Card Card ID) gain access and enter 0 0 # to
and PIN mode. return the door to normal operation.
 Card or Card ID – The cardholder could
either swipe the badge or enter the badge Note: HID panels do not report transactions
number at the keypad. If this option is associated with Cardholder Override.
selected, you must complete the Keypad
Entry Parameters settings. Selection is not
available when the other reader is in Card Anti Passback
and PIN mode.
Enable – Click to enable the anti-passback fea-
ture at this reader for the number of seconds
Note: PIN or Card ID entries are completed by entered in the Time Active field. The
pressing the # key. Also, if you make any badge anti-passback function prevents cardholders
format changes, you must download all badges to from using their badge at the same reader until
the HID panels that have the Card ID only or the timer has expired.
Card or Card ID terminal option selected.

Cardholder Override – This feature is not avail- Note: If cardholders swipe their badge while
the anti-passback timer is active, access is
able if the Access Method is Card only. If
denied because the anti-passback timer is on.
Cardholder Override is enabled, an authorized
cardholder may place the reader in an override
condition by performing a badging procedure Time Active – Enter the time in seconds that a
at the reader’s keypad. The override remains in badge used at the reader is invalid before it can
effect until: be used at the same reader.

 An authorized cardholder takes it out of


Reader Parameters
override by performing a badging procedure
at the reader’s keypad.
 The reader’s override timezone enables or Note: When you define two readers for a single
door, the “Access Time,” “Extended Access
disables the door.
Time,” and “Time Before Propped Door Reported”
values are propagated to the other reader termi-
nal.

24-10832-194 Rev. E
131

Access Time – Enter the time (up to 60 sec- Enabled – Select a time zone during which the
onds) that the door remains unlocked after a terminal is active. For example, you may not
cardholder presents a valid badge at this want the reader to be used between midnight
reader. The cardholder has up to 60 seconds to and 5:00 AM, so assign a time zone with the
open the unlocked door before it re-locks desired inactive time period. If you select
when the access time elapses. <always enabled>, the terminal is always
active.
Extended Access Time – Enter the time (up to
1620 seconds) that the door remains unlocked Override – Select a time zone that can be set as
to provide extended access time to cardholders an override for this terminal.
with special needs.
PIN Suppression – Select a time zone during
Time Before Propped Door Reported – Enter the which cardholders are not required to enter a
number of seconds (up to 60) that the door can PIN code.
remain opened before the propped door alarm
is reported.
Configure HID Input Points

Keypad Entry Parameters HID panel and terminal applications automati-


cally generate input points and their addresses.
Maximum Entry Time – Enter the number of These input points can be enabled to indicate
seconds (up to 60) the user has to enter the PIN the current state of a device and can be used
code or badge number at the keypad. for alarm or non-alarm purposes.
Maximum Attempts – Enter the number of Some HID input points have a predefined and
attempts (up to 10) the user has to enter a cor- unchanging purpose, such as to indicate panel
rect PIN code or badge number at the keypad. tamper. Other input points are dedicated to
access control functions, such as receiving
Failed Attempts Lockout – Enter the number of
input from door contacts and REX devices;
seconds (up to 99) the reader is locked after the
and other input points can be used for a variety
user exceeded the maximum attempts to enter a
of purposes and devices, such as power failure
PIN code or badge number at the keypad.
– these input points are referred to as general
purpose inputs.
Timezone Tab
Panel input points are automatically created
This tab defines the time zone during which under the selected HID panel and are named
the terminal operates. Time zones must be set using the input name and <panel name>, as in
up before they display in drop-down lists. Power Failure <panel name>. Terminal input
points are created under the selected HID ter-
minal and are named using the input name and
<terminal name> <panel name>, as in Forced
Door <terminal name> <panel name>. If you
rename the panel or terminal, you can edit the
input point to manually enter the new panel or
terminal name.

24-10832-194 Rev. E
132 CHAPTER 2
Configuring the System

The following input points are available: 2. Expand HID Network Panels to display
all HID panels configured in the system.
Input 3. Expand the panel that contains the input
Input Name Description
Type
points you wish to configure.
Panel Power Failure Indicates the reader has
Input a power failure.  To configure panel inputs, expand Input
Points Points, select the input point you wish
Panel Battery Provides low battery
indication. to configure and click Edit.
Panel Down Internal to the P2000  To configure terminal inputs, expand the
system to indicate that terminal that contains the input point
the panel is not active.
you wish to configure, then expand
Tamper Typically wired to a tam- Input Points, select the input point you
Switch (for per switch to indicate
Edge EVO) tampering. wish to configure and click Edit.
A tamper alarm may be
generated in configura-
tions where there are
multiple enclosures Note: Depending on your HID EVO hardware,
whenever the tamper you can also add terminal input points.
sensor on one those
enclosures is activated.
Terminal Door Contact This input point receives The HID Input Point Edit dialog box opens
Input signal from the door con- at the General tab.
Points tact device associated
with the reader. 4. Enter the information in each tab according
Forced Door Indicates when there is a to your system requirements. The fields
door open condition available for configuration depend on the
without a valid badge type of input point selected. (See HID Input
read detected first.
Point Field Definitions for detailed infor-
Propped Door Indicates when there is a mation.) As you work through the tabs,
door open condition with
a valid badge, but the click Apply to save your settings.
door is left open past the
entry time
5. When you finish with all the entries, click
OK to save your settings and return to the
Request To This input point receives
Exit signal from the REX System Configuration window.
device associated with
the reader.
HID Input Point Field Definitions
Tamper General purpose input.
Switch (for Typically wired to a tam-
Edge) per switch to indicate General Tab
tampering.
Terminal Internal to the P2000
Down system to indicate that
panel communications
have ceased.

To Configure HID Inputs

1. In the System Configuration window,


expand Panels to display the panel types.

24-10832-194 Rev. E
133

Partition – If you use partitions, select the Alarm Options Tab


appropriate Partition that has access to this
input point.

Public – If you use partitions, click Public if


you want this input point to be visible to all
partitions.

Name – This field displays the name automati-


cally assigned to the input point, which con-
sists of the <point name> <panel name>. For
terminal inputs, the input name consists of the
<point name> <terminal name> <panel
name>. If you wish to change it, enter a
descriptive name for the input point. Alarm options are described in detail on
page 83.
Query String – This value is used with message
filtering (see Define Query String Filters on
Misc Tab
page 225).
Settings in this tab are not available for Panel
Point Description – Displays the point name
Down, Tamper Switch (EVO only), Forced
defined by the HID panel.
Door, Propped Door, and Term Down input
Point Number – Displays the number associ- points.
ated with the input point. This number rep-
resents the physical connection to the terminal
and cannot be changed.

Enable – Click to allow the input point to oper-


ate as a predefined input, such as REX, Door
Monitor or Tamper Switch.

Report Status Change – Click to report all


input point changes of state.

Note: HID input points do not differentiate Debounce Time – Enter the time in millisec-
between short or open changes of state, they are onds (15 to 2040) that the input must remain in
both considered fault conditions; however, they a transition state to establish the detected state.
are reported in the system as short alarms. Without a debounce time, the panel may detect
that the input is in an incorrect state because of
the bouncing of the input device’s contacts.

Import Standard Values – Click to select a pre-


defined mode of operation of the input. Inputs
can be used as either 2-state or 4-state inputs
and can be Normally Open or Normally Closed.
Once you make your selection, click OK.

24-10832-194 Rev. E
134 CHAPTER 2
Configuring the System

Note: Depending on your HID hardware, you


can also edit output points that are automatically
created.

A/D values – The Analog to Digital (A/D)


default values displayed here represent the
High Range Upper Limit (HRUL), High Range
Lower Limit (HRLL), Low Range Upper Limit
(LRUL), and Low Range Lower Limit (LRLL)
values assigned for each operational mode and
that match the end of line (EOL) resistors. You
can however, change any of the four A/D val-
ues at any time.
3. If you use partitions, select the appropriate
Partition that has access to this output
point.
Note: The A/D Values Define field displays
how HID uses the four values. It also shows 4. If you use partitions, click Public if you
errors when an illegal combination of values is want this output point to be visible to all
entered. This field is updated every time you partitions.
make changes to the A/D values
5. Enter a descriptive Name for the output
point.
Configure HID Output Points 6. The Query String value is used with mes-
sage filtering (see Define Query String Fil-
Depending on your hardware selection, the
ters on page 225).
HID panel can control up to three auxiliary
output points. The auxiliary output point can 7. Select the Point Description of the output
be activated in response to an activated input point.
point, and can be used to trigger external 8. Select the Point Number associated with
devices, such as alarm warning indicators or the output point.
emergency lights. It can also be commanded
9. Click Enable to allow the output point to
from the P2000 Output Control application.
be activated or deactivated.
10. Select from the Active State drop-down
To Configure HID Outputs list, the state in which the output point
1. In the System Configuration window, operates. If you select Set, the output point
locate the HID terminal that contains the remains active, until commanded to be
output point. Reset.

2. Select Output Points and click Add. The 11. When you finish with all the entries, click
HID Output Point Edit dialog box opens. OK to save your settings and return to the
System Configuration window.

24-10832-194 Rev. E
135

Troubleshooting Misconfigured HID 3. If this is a partitioned system, select the


Readers Partition in which the HID door is active.

Some HID Edge readers (built-in or external), 4. Click Door.


may ship from HID configured to either hold 5. Select the HID door you wish to test.
one card swipe or ignore all card swipes when 6. Click Lockout to prevent access at the
disabled. If configured to hold a card swipe, door.
when the device is re-enabled, card data is pre-
sented to the Edge device for an access deci- 7. Click Perform. The door is locked. This
sion, possibly granting access. The ability to puts the door into lockout.
disable the reader is used within the P2000 8. With the door in lockout swipe a card at
software by Reader Enable Timezone, Reader the reader.
Override Timezone, and Door Control. 9. If the reader is configured incorrectly the
reader beeps.
To Determine if an HID Reader is 10. To return the door to its previous state,
Storing Card Information click Return to Normal.
1. From the P2000 Main menu select Con- 11. Click Perform. The Door Control lockout
trol>Door Control. is reversed. The Real Time List shows the
results of the card swipe if the reader is not
2. Enter your password if prompted. The
properly configured.
Door Control dialog box opens.

Note: Contact HID if you encounter this type of


problem.

Override and Lockout Reader Operation

The following table shows how Edge EVO


readers behave based on reader mode interac-
tions.

Reader 2 Normal Reader 2 Override Reader 2 Lockout


Reader 1 Reader 2 Reader 1 Reader 2 Reader 1 Reader 2
Reader 1 Normal LED Red Red Green Green Red Red
Access Mode Normal Normal Normal Override* Normal Locked*
Reader 1 Override LED Green Green Green Green Red Red
Access Mode Override* Normal Override* Override* Normal Locked*
Reader 1 Lockout LED Red Red Red Red Red Red
Access Mode Locked* Normal Locked* Normal Locked* Locked*
* Badge swipes are rejected by the reader.

24-10832-194 Rev. E
136 CHAPTER 2
Configuring the System

Configure Assa Abloy® IP Door The following figure illustrates a DSR running
Locks and Components in a virtual environment.

Assa Abloy Intelligent Locks provide a wired


DSR Server (Virtual)
(PoE) and wireless (Wi-Fi) door locking secu- - Operating System
- Database Engine
rity solution that can be integrated with the - DSR Software Package

P2000 system. Integration between these two


systems is possible via the Assa Abloy Door P2000 Server
P2000
Workstation
Service Router (DSR), which is installed on
the DSR server, and the P2000 Assa Abloy Wide Area
DSR Interface Service, which runs on the Network
IP Network
P2000 server.

IMPORTANT: This release of the P2000 soft-


ware works with Assa Abloy locks that use firm-
ASSA ABLOY ASSA ABLOY
ware Version N14, Version N11, and Version P04. Wired Locks Wireless Locks

Other versions may not be compatible with this


release of the P2000 software. Refer to the
P2000 Software Installation Manual for firmware Hardware Requirements
upgrade instructions.
Before you use the functions described in this
This P2000 software version requires DSR section, the Assa Abloy hardware and DSR
Version 7.0.5 or Version 7.0.4, other previous servers must be properly installed. Refer to the
versions are not supported. For optimal system Assa Abloy documentation for hardware
performance, we recommend you configure installation assistance.
your system with few DSRs as possible; each Also, refer to the Assa Abloy Lock Configura-
DSR can connect with up to 1024 locks. tion Tool (LCT) documentation for alarm con-
The DSR can be on a separate server or on a figuration instructions. The following table
virtual computer on the P2000 server, and must displays LCT settings that provide a good
have network access to the P2000 server. compromise for both response time and battery
life. We highly recommend configuring these
The following figure illustrates DSR running settings during the initial installation phase to
on physical computers. view relevant messages during testing:
ASSA ABLOY
Wired Locks Alarm Name Security Passage Rx Held
P2000 Server
P2000 Mode Mode Mode
Workstation
Door Secured ON OFF ON
Wide Area
Door Forced ON OFF ON
Network
Door Ajar ON OFF ON
IP Network
Low Battery ON ON ON
RTC Failure ON ON ON
Tamper Alarm ON ON ON
Tamper Restore ON ON ON
DSR Server Additional DSR Server
- Operating System (as needed)
- Database Engine ASSA ABLOY
- DSR Software Package Wireless Locks
For DSR installation information, refer to the
P2000 Software Installation Manual.

24-10832-194 Rev. E
137

Assa Abloy Component Naming Configure Assa Abloy Facility


Conventions Parameters

Each Assa Abloy Intelligent Lock is repre- Before configuring your Assa Abloy compo-
sented by a panel and a single reader terminal nents, use the following instructions to define
in the P2000 software. The P2000 system facility parameters associated with Assa Abloy
automatically adds Assa Abloy panels, termi- panels.
nals, and associated soft input points to the
P2000 system configuration tree after the DSR
detects the corresponding locks, which occurs Note: Facility parameter modifications affect
after the DSR Interface Service restarts or all Assa Abloy panels and associated compo-
when a change occurs to the fields on the Assa nents defined in the P2000 System Configura-
Abloy DSR Edit dialog box (see page 141). tion.
Each component has a predefined name,
including a 16-character string identifying the Configuring Assa Abloy facility parameters
panel serial number as defined in the DSR. consists of the following:
Panel names have the following predefined  Assigning special access requirements for
structure: Assa Abloy panels (see Special Access for
Assa Abloy Panels on page 137)
[PoE or Wi-Fi] [Lock Serial Number]
 Setting up badge formats for use with Assa
Example: PoE IT107E2577PA0BCE Abloy panels (see Set Up Badge Formats
for Assa Abloy Panels on page 138)
Terminal names have the following predefined
structure:

[PoE or Wi-Fi] [Lock Serial Number] Term Note: Changing any Assa Abloy Facility
parameters requires a manually initiated down-
Example: PoE IT107E2577PA0BCE Term load of all badges to the DSR. This can be most
efficiently done by using the Full Download but-
Soft input points have the following pre- ton on the Assa Abloy DSR Edit dialog box.
defined structure:

[Soft input point alarm name] [Lock Serial


Special Access for Assa Abloy Panels
Number]
In addition to basic access, operators can con-
Example: Forced PoE IT107E2577PA0BCE
trol special access for overriding the normal
When renaming Assa Abloy panels, terminals, operation of Assa Abloy panels. Special access
and soft input points, use a consistent naming options include:
scheme to avoid panel and component identifi-
 Extended Access – Extends the time a card-
cation confusion.
holder is permitted to hold a door open,
Use logical names for Assa Abloy panels. For which can be used to comply with Ameri-
example, consider a name that identifies the cans with Disabilities Act (ADA) require-
panel’s location. The maximum number of ments.
characters allowed for an Assa Abloy compo-
nent name is 32.

24-10832-194 Rev. E
138 CHAPTER 2
Configuring the System

 Deadbolt Override – Enables a cardholder to To Modify the Assa Abloy Facility


unlock an Assa Abloy lock when the dead- Parameters for Special Access
bolt is engaged. On Persona™ or Pass-
port™ locks, the Deadbolt Override 1. From the P2000 Main menu, select Con-
privilege grants access 24/7, including holi- fig>System. Enter your password if
days, eliminating the time zone check in the prompted. The System Configuration win-
access decision process. dow opens.
 User Activated Passage – Enables a card- 2. Expand Panels to display the panel types.
holder to unlock an Assa Abloy lock, keep- 3. Select Assa Abloy Panels and click Edit.
ing the lock unlocked during the User The Assa Abloy Facility Edit dialog box
Activated Passage selected time zone’s opens.
active period. The lock automatically
relocks the next time the time zone switches
to the inactive state. To enable the User
Activated Passage time zone, the cardholder
must swipe the badge twice at doors with
Passport locks; once at doors with SAR-
GENT® Profile series locks.
 Wakeup Communication (Wi-Fi only) –
Forces the Assa Abloy lock to connect to
the DSR so that the P2000 system can
retrieve panel event data since the last
panel-DSR connection.
4. Assign the desired special access flags.
Note: Assa Abloy wireless locks connect to a The drop-down lists display the special
DSR at specified time intervals, because of an access flag names as configured in Site
alarm, or upon presentation of a badge with the Parameters; see page 33. You can only
Wakeup Communication capability. P2000 opera- define three special access flags.
tors can only view panel event data that has
occurred since the last lock-DSR connection. 5. Click Yes when informed about the down-
load requirement.
6. Click OK.
Note: If a badge has both Deadbolt Override
and Wakeup Communication capabilities, the
Wakeup Communication function takes priority Set Up Badge Formats for Assa Abloy
when the cardholder presents the badge (Dead- Panels
bolt Override does not take effect).
Assa Abloy intelligent locks support multiple
badge formats. The integration with these
Note: Badges with Wakeup Communication locks requires P2000 operators to configure the
capability do not unlock any doors. P2000 system to support the badge formats
that are employed at the site. The P2000 sys-
tem offers the flexibility of defining a primary
Note: Changing any of the special access flags badge format for the majority of badges used at
requires restarting the P2000 Assa Abloy DSR Assa Abloy locks, and allows supplemental
Interface Service.
formats to be added for the rest.

24-10832-194 Rev. E
139

The P2000 software provides the following In addition to creating *.bft files, you must
formats to be used with Assa Abloy locks: perform additional badge format configuration
steps specific to Assa Abloy panels, as
 Cardkey 34 bit with Sentinel described in this section. These steps consist of
 Corporate 1000 with Sentinel the following:
 H10301 with Sentinel (this is the 26 Bit
 Creating badge formats to be assigned to
Wiegand format)
cardholder badges (see Create Badge For-
 H10302 with Sentinel (this is the HID Pro- mats on page 237). These settings must
prietary 37 Bit Wiegand format. As this for- match the settings defined for Assa Abloy
mat does not have a facility code, use supplemental badge formats.
facility code 0 for all badges of this format.)
 Selecting the primary badge format for
Assa Abloy locks (see To Select a Primary
Badge Format for Assa Abloy Locks on
Note: If any other binary card formats are to be page 139).
used for Assa Abloy locks, a Sentinel version of
the card format must be created. In addition, a  Adding supplemental badge formats, as
card format for Magnetic stripe cards must be needed (see To Add Supplemental Badge
created to match the encoding on the magnetic Formats on page 140).
stripe cards. Contact Technical Support for assis-
tance in creating card formats.
To Select a Primary Badge Format for
Assa Abloy Locks

Note: The system may generate “Badge num- 1. From the P2000 Main menu, select Con-
ber encode failed” Event Log error messages fig>System. Enter your password if
when the badge number or facility code is too prompted. The System Configuration win-
large for the selected format. dow opens.
2. Expand Panels to display the panel types.
To start, add any badge formats (*.bft files) not
3. Select Assa Abloy Panels and click Edit.
already defined that are required by Assa
The Assa Abloy Facility Edit dialog box
Abloy locks. See P2000 Badge Format on
opens.
page 193 for more information. All badge for-
mats (*.bft files) are located in \Program Files 4. In the Primary Badge Format field, click
(x86)\Johnson Controls\P2000\BadgeFormats. the [...] button and select the badge format
that is the primary format used at the site
for Assa Abloy locks.

Note: If a P2000 operator does not assign a


badge format to a cardholder badge, the Primary
Badge Format is used.

5. Click Apply.

24-10832-194 Rev. E
140 CHAPTER 2
Configuring the System

To Add Supplemental Badge Formats 9. Repeat these steps for each badge format to
be used with Assa Abloy locks.
1. On the Assa Abloy Facility Edit dialog
box, click Add. The Badge Format Edit
dialog box opens. Using the Card ID feature with Assa
Abloy Locks

The following instructions allow you to use the


Card ID feature with Assa Abloy Locks:

 First you need to use the instructions pro-


vided in Create Badge Formats on page 237
to define a badge format of Technology PIN
Only, set Bits to 0, and Qualifier to 1. Name
this format Card ID.
2. Click the [...] button, select a *.bft file from  Use the Badge application (see page 251),
the list, and click Open. The name of the to select from the Format field, the Card ID
selected *.bft file displays in the Name format previously defined. Also, enter in the
field. You cannot edit this name. Number field, the Card ID number that the
3. Select the Technology type. cardholder must enter at an Assa Abloy
keypad lock.
4. Enter the total number of Bits expected to
be returned from the reader when the badge  We recommend defining a Facility Code of
is read. 0 to be assigned to this type of badge for-
mat.
5. Select a Qualifier number. The number
 On magstripe locks, the Card ID must con-
selected represents a 32-bit numerical
tain exactly 6 digits, no leading zeros
value that allows differentiating formats
allowed. The cardholder must enter the #
with the same technology and the same
key followed by the 6 digit number.
number of bits. The default value is 1.
 On non magstripe locks, the Card ID may
contain from 1 to 6 digits, no leading zeros
allowed. The cardholder must enter the
IMPORTANT: The Assa Abloy Technology,
Bits, and Qualifier badge format settings must number followed by the * key.
match the badge format settings defined for a
cardholder badge (see Create Badge Formats on
Add a Door Service Router (DSR)
page 237).
The Assa Abloy DSR is the communication
6. Click OK. link between the P2000 server and Assa Abloy
7. Verify that the badge format is listed under panels. Once you add a DSR on the P2000
Additional Badge Formats. System Configuration window, the P2000 sys-
tem automatically adds all of the Assa Abloy
8. If you do not wish to keep the recently panels and sub-components associated with the
added badge format, select it from the list, DSR.
click Delete, then Yes to confirm. The Can-
cel button in the Assa Abloy Facility Edit
dialog box does not cancel changes made
on the Badge Format Edit dialog box.

24-10832-194 Rev. E
141

To Add an Assa Abloy DSR 12. When a DSR status changes to Down, the
P2000 system receives notifications about
1. From the P2000 Main menu, select Con- the panel status, according to the following
fig>System. Enter your password if selections in the Panel Status When DSR
prompted. The System Configuration win- is Down drop-down list:
dow opens.
Down – The P2000 system receives a panel
2. Expand Panels to display the panel types. down notification for each panel associ-
3. Expand Assa Abloy Panels. ated with the DSR.
4. Right-click over Integration Components No Change – The P2000 system receives
and click Add. The Assa Abloy DSR Edit only a single notification that the DSR is
dialog box opens. currently down. The P2000 system does
not receive panel down notifications for
each panel associated with the DSR. This
option is recommended for large instal-
lations.
13. Click the Clear DSR button if you wish to
delete all P2000 data (for example, badge
data or access groups) from the DSR. Use
the Clear DSR button only if the DSR has
gone through abnormal conditions that
make its database inconsistent with the
P2000 data, such as restoring the DSR
database to an earlier backup, or using a
DSR that was previously loaded by a dif-
ferent P2000 system.

5. If this is a partitioned system, select the


Partition in which the Assa Abloy DSR is IMPORTANT: After clearing the DSR of
active. P2000 data, and once the DSR downloads these
6. Click Public if you wish the Assa Abloy changes to the Assa Abloy locks, cardholders are
DSR to be visible to all partitions. unable to gain access.

7. Enter a descriptive Name for this DSR.


14. Click the Quick Restore button if you
8. The Query String value is used with mes- wish to download the DSR with the most
sage filtering (see Define Query String Fil- important data to get the system going
ters on page 225). again. If you do not have important data to
9. Enter the IP Address of the DSR. download, you may skip this step and pro-
10. Enter the TCP Port address of the DSR. ceed directly to Full Download.

11. The Encryption feature is currently not 15. Click the Full Download button to down-
supported in this release. load the DSR with all data to ensure its
provisioning data matches the P2000 data.
16. Click OK to close.

24-10832-194 Rev. E
142 CHAPTER 2
Configuring the System

To Clear and Reload a Single DSR 4. Expand Integration Components, select


the Assa Abloy DSR you wish to delete,
1. From the System Configuration window, and click Delete.
select the DSR you wish to clear and
reload and click Edit. 5. At the confirmation message, click Yes.

2. Click Clear DSR.


Download Recommendations
3. Click Quick Restore.
4. Click Full Download. The following general download recommenda-
tions must be followed when integrating with
5. Click OK to close.
Assa Abloy locks, specially in facilities where
the number of locks is higher than 128 locks.
To Clear and Reload all DSRs
1. Open the Download tab in Site Parame-
1. From the System Configuration window, ters.
edit each of the DSRs you wish to clear
and reload.
2. For each DSR, click Clear DSR.
3. Edit one DSR and click Quick Restore to
download all DSRs with the most import-
ant data.
4. Edit one DSR and click Full Download to
download all DSRs with all data.
5. Click OK to close.

To Delete an Assa Abloy DSR  Select the Delayed download for


badges and access groups check box.
 Unless some other condition requires
IMPORTANT: When you delete a DSR that is the Minutes Delay value to be set to a
still connected to the P2000 server, it may bring
specific value, enter 0 minutes in this
panels back to the P2000 server that are in the
process of being deleted. Ensure that none of its field.
Assa Abloy locks are connected to the DSR or In addition, you must consider the following
will connect to the DSR during the deletion pro- operational recommendations:
cess. Alternatively, you may disconnect the DSR
from the P2000 server before deleting it.  When downloading badges to Assa Abloy
panels, it is advised to leave the Delete
1. From the P2000 Main menu, select Con- Badges From Panel Before Download flag
fig>System. Enter your password if unchecked. Otherwise, the DSR may be tied
prompted. The System Configuration win- up in a large amount of internal data pro-
dow opens. cessing and may not respond in time to
requests made by the P2000 system.
2. Expand Panels to display the panel types.
3. Expand Assa Abloy Panels.

24-10832-194 Rev. E
143

 In rare occasions, for example when you  An error message when trying to delete a
change a badge format or when the DSR is time zone associated with Assa Abloy pan-
not informed about a badge change because els, may indicate that the P2000 Assa Abloy
someone emptied the download queue, the DSR Interface service has not yet for-
system may generate a User already exist warded the deletion information to the
with same credentials error message in the DSR. Wait for the information to get for-
Real Time List. If this error occurs, you warded, and then delete the time zone.
must clear the DSR and perform a manual  Downloading Holidays to a specific Assa
download from the P2000 server using the Abloy panel results in an automatic for-
Clear DSR, Quick Restore, and Full warding to all Assa Abloy panels.
Download buttons on the Assa Abloy DSR
Therefore, downloading Holidays to a sin-
Edit dialog box.
gle Assa Abloy panel updates all Assa
 Avoid unnecessary downloads using the Abloy panels with respect to Holiday con-
Download application or through Down- figuration.
load event actions.
 Downloading Input Points, Output Points,
The DSR queues all download records Soft Alarms, Access Groups, Card Events,
received from the P2000 system. and Elevator/Cabinets has no effect, and
Any unnecessary download records may therefore be omitted.
increase the load on the DSR, and more
importantly, the time it takes to synchronize
Additional DSR Downloading Notes
the locks.
Therefore, observe the following instruc- To ensure that the DSR remains in synch with
tions to reduce the amount of messages the the P2000 database, the DSR is expected to be
DSR has to process. online all the time.

 In general, all modifications in the P2000 In case the DSR is offline, downloading of cer-
system are automatically queued for down- tain configuration data, including badges and
load. Unless the download queues are emp- access groups, is suspended for the DSR.
tied, or a lock or the DSR were cleared, or
the P2000 informs you that a manual down- The suspension of downloads is automatically
load is required, there is no need to manu- lifted as soon as the DSR is online to the
ally download to an Assa Abloy lock. P2000 Server, and any suspended downloads
resume automatically. No user action is
 Downloading a Time Zone to a specific
required.
Assa Abloy panel results in an automatic
forwarding to all Assa Abloy panels. However, if a DSR goes offline frequently, or
Therefore, we recommend that only one goes offline for unknown reasons, an investi-
Assa Abloy panel lists in its Panel Time gation must be initiated as soon as possible.
Zone table all time zones used on the DSR.
This way, downloading Time Zones to this Edit Assa Abloy Panels
single Assa Abloy panel updates all Assa
After you add a DSR, a panel list displays
Abloy panels with respect to Time Zone
under the DSR in the System Configuration
configuration.
tree.

24-10832-194 Rev. E
144 CHAPTER 2
Configuring the System

Note: When a panel is disabled, and the


Download to disabled panels check box is
selected in the Download tab of Site Parameters,
data to be downloaded to an Assa Abloy panel is
added to the download queue (it is not down-
loaded to the DSR until the panel is enabled). If
the Download to disabled panels check box is
New panels cannot be added manually. How- not selected, no Assa Abloy data is added to the
ever, you can edit or delete the panels, as nec- queue for download.
essary.
11. The Query String value is used with mes-
To Edit an Assa Abloy Panel sage filtering (see Define Query String Fil-
ters on page 225).
1. From the P2000 Main menu, select Con-
12. Click the Clear Lock button if you wish to
fig>System. Enter your password if
delete all P2000 data (for example, badge
prompted. The System Configuration win-
data or access groups) from the Assa Abloy
dow opens.
panel. For more information, see To Clear
2. Expand Panels to display the panel types. and Reload a Single Lock and To Clear and
3. Expand Assa Abloy Panels. Reload Several Locks.
4. Expand Integration Components.
5. Expand the DSR that has the panel you IMPORTANT: After clearing a lock, and once
the DSR downloads these changes to the panel,
wish to edit.
cardholders are unable to gain access via the
6. Right-click over the panel you wish to edit Assa Abloy door locks.
and select Edit. The Assa Abloy Panel Edit
dialog box opens. 13. Click OK to save the panel information.

To Clear and Reload a Single Lock

1. From the System Configuration window,


select the Assa Abloy panel you wish to
clear and reload and click Edit.
2. Click Clear Lock.
7. If this is a partitioned system, select the
3. Click OK to close.
Partition in which the Assa Abloy panel is
active. 4. Open the Download application and select
the Assa Abloy panel.
8. Click Public if you wish the Assa Abloy
panel to be visible to all partitions. 5. From the Item to Download box, select
Terminals and Badges. Make sure that the
9. The Name field displays the name auto-
Delete Badges From Panel Before Down-
matically assigned to the panel. You can
load flag is not selected; otherwise, the
however enter a different name.
download process takes much longer.
10. Click Enabled to enable the Assa Abloy
6. Click Download.
panel.

24-10832-194 Rev. E
145

To Clear and Reload Several Locks To Delete an Assa Abloy Panel

1. From the System Configuration window,


edit each of the Assa Abloy panels you IMPORTANT: You should only delete an Assa
wish to clear and reload. Abloy panel from the P2000 system if the lock is
no longer connected to the DSR. Otherwise, the
2. For each panel click Clear Lock. panel may be automatically added again to the
3. Click OK to close. system.

4. Open the Download application and select


all Assa Abloy panels that were cleared. 1. From the P2000 Main menu, select Con-
fig>System. Enter your password if
5. From the Item to Download box, select prompted. The System Configuration win-
Terminals and Badges. Make sure that the dow opens.
Delete Badges From Panel Before
Download flag is not selected; otherwise, 2. Expand Panels to display the panel types.
the download process takes much longer. 3. Expand Assa Abloy Panels.
6. Click Download. 4. Expand Integration Components.
5. Expand the DSR that has the panel you
To Move a Panel to a Different DSR wish to delete.
6. Right-click over the panel you wish to
Use the following instructions to properly
delete and select Delete.
relocate an Assa Abloy panel to a different
DSR. In this example a lock is moved from 7. Click Yes to confirm.
DSR1 to DSR2:

1. Ensure that DSR1 is online to the P2000 Assa Abloy Panel Time Zones
system.
2. Use the LCT configuration tool to config- Note: Each Assa Abloy lock can only store up
ure the lock to not talk to any existing to 32 different time blocks. A time zone may have
multiple time blocks.
DSR; that is, neither DSR1 nor DSR2.
3. Delete the panel from the P2000 system,
 To keep the number of time blocks inside
under the DSR1 integration component.
each lock to a minimum, we recommend
4. Use the LCT to configure the lock to talk using a very basic Time Zone strategy for
to the new DSR; that is, DSR2. Assa Abloy locks.
5. Ensure that DSR2 is online to the P2000  The access rights of a badge are determined
system. by the combination of Access Groups and
6. The panel shows up under the DSR2 inte- Time Zones.
gration component.  Ensure that Access Groups containing Assa
7. Clear the lock and download from the Abloy panels are only paired with Time
P2000 system. Zones that are suitable for Assa Abloy pan-
els.
 It is not required to list a Time Zone in the
Panel Time Zone table of an Assa Abloy
panel in order for it to be used to grant
access to badges.

24-10832-194 Rev. E
146 CHAPTER 2
Configuring the System

 It is required to list a Time Zone in the  Define a specific day to be an Assa Abloy
Panel Time Zone table of an Assa Abloy Holiday by doing two things:
panel in order for it to be used as the “Over-  declare the specific day as a Holiday (of
ride Timezone” in the terminal definition. Type 1, 2, or 3) in the Edit Holiday
 The exclusion of a Time Zone from the application (see page 51), and
Panel Time Zone table cannot be used to  define the time blocks in a Time Zone
curtail the access rights of defined badges. for the Holiday’s Type as always Inac-
Instead, the Access Groups shall be chosen tive.
to only include the applicable Assa Abloy
This configuration matches the intent to
panels.
have no access and no overrides during the
 In general, removing or rearranging Time entire holiday.
Zones in a Panel Time Zone table is not
advisable. If such actions are necessary, we  If in a Time Zone there is any Active period
recommend downloading all Time Zones defined for a Holiday of Type 1, 2, or 3,
and badges to the affected panel after the then this configuration is not supported by
changes were made by using the Full Assa Abloy locks, and the Assa Abloy inte-
Download button on the Assa Abloy DSR gration ignores the particular holiday type
Edit dialog box. for that Time Zone and treat the day as a
regular day.
 It is recommended to select one Assa Abloy
panel and list in its Panel Time Zone table
all time zones that are used on the DSRs. Configure Assa Abloy Terminals
This panel can then be selected in the Each Assa Abloy panel controls a single door
Download application to download Time terminal, which is automatically created with
Zones, if necessary. each panel added to the System Configuration
window via the DSR. The Assa Abloy terminal
consists of seven soft input points.
IMPORTANT: Keep the Time Zone strategy
for Assa Abloy locks as simple as possible.
To Configure Assa Abloy Terminals

Assa Abloy Holiday Definition 1. From the P2000 Main menu, select Con-
fig>System. Enter your password if
Holiday periods behave differently for Assa prompted. The System Configuration win-
Abloy locks. See the following notes: dow opens.
 If a day is defined as a Holiday in an Assa 2. Expand Panels to display the panel types.
Abloy Time Zone, that Time Zone does not 3. Expand Assa Abloy Panels.
grant access to anyone during the entire day, 4. Expand Integration Components.
regardless of the Holiday’s defined time
periods. 5. Expand the DSR that has the panel or ter-
minal you wish to configure.
 If a day is defined as a Holiday in an Assa
Abloy Time Zone, and that Time Zone is 6. Expand the panel that has the terminal you
used to drive the Unlock or First Person wish to configure.
Through feature, those features do not work 7. Right-click over the terminal and select
during the entire day, regardless of the Time Edit. The Assa Abloy Terminal Edit dialog
Zone’s defined time periods. box opens at the General tab.

24-10832-194 Rev. E
147

8. Enter the information in each tab according Lock Type – Displays the name indicating the
to your system requirements. (See Assa terminal lock type, as defined by the DSR.
Abloy Terminal Field Definitions for This field cannot be edited.
detailed information.) As you work through
the tabs, click Apply to save your settings. Wireless – By default, this check box is
selected for Assa Abloy wireless locks (indi-
9. When you finish with all the entries, click cated as Wi-Fi in the default name) and not
OK to save your settings and return to the selected for wired locks (indicated as PoE in
System Configuration window. If you wish the default name). Do not change the default
to include Assa Abloy terminals in groups setting unless special circumstances require it.
that provide common access, see Create
Terminal Groups on page 78. This field enables you to define the time inter-
val when the lock connect to the DSR. Since
wireless Assa Abloy locks typically run on
Assa Abloy Terminal Field Definitions
battery power, configuring the lock to connect
to the DSR too often significantly drains the
General Tab lock’s battery power.

Connect Interval – For wireless locks only; use


this field to set the time interval (up to 65535
minutes) to have the lock connect to the DSR
for updates and event information. The Wire-
less check box must be selected to modify the
time interval.

Note: We recommend setting a badge start to


a date early enough to give the Wi-Fi locks time
to connect and learn about the badge before it is
used. The P2000 system downloads the badge to
the DSR when its start date and time is reached.
Name – This field displays the name automati- With a connect interval of 1440 minutes, the
cally assigned to the terminal. You can how- badge start date should be set to at least one day
ever enter a different name for the terminal. before it is actually used. If there are other timing
issues, we recommend setting the badge start
Panel – Displays the name of the Assa Abloy date even earlier, or not set it at all.
panel you selected from the System Configu-
ration window.
Access Tab
Query String – This value is used with message
filtering (see Define Query String Filters on
page 225).

Number – Displays the terminal number auto-


matically assigned and cannot be edited.

Public – If you use Partitioning, click Public if


you wish the Assa Abloy terminal to be visible
to all partitions.

24-10832-194 Rev. E
148 CHAPTER 2
Configuring the System

Access Time – Enter a time in seconds that the Override Type – If a time zone is selected in the
door strike is energized after each valid badge Override Timezone drop-down list, the Over-
access request. The default value is 5 seconds. ride feature functions according to one of the
following options:
Shunt Time – Enter a time in seconds that the
door open alarm is suppressed after a valid  Unlock – The door automatically unlocks
badge access request. The shunt time should be and remains unlocked during the active
longer than the access time. The default value period of the selected time zone.
is 10 seconds.  First Person Through – The door remains
locked during the active period of the
Extended Access Time – Select the amount of
selected time zone until a cardholder pres-
time that the door remains unlocked to provide
ents a valid badge at the reader, at which
extended access time to cardholders with spe-
time the door remains unlocked for the
cial needs.
remainder of the time zone’s active period.
PIN Type – Determines the use of PIN codes. Override Timezone – To disable the Override
Select one of the following options: feature, select <never overridden>. To use the
Override feature in accordance with the Over-
 No PIN Required – In this mode, cardholders
ride Type selected, select a time zone during
do not enter a PIN to gain access through a
which the override period is active.
door.
 PIN Required – In this mode, cardholders
that have a PIN must enter their PIN in con- Configure Assa Abloy Soft Input Points
junction with presenting a valid badge. PIN
The P2000 system monitors the following soft
codes can be entered before or after present-
input points for Assa Abloy panels and termi-
ing a badge. This feature is not supported on
nals:
all locks (for example, Persona or Passport
locks). Check with your local Assa Abloy Low Battery (Low Batt) – Indicates that the
dealer for information on PIN support with wireless lock’s battery is failing. Does not
other locks. Cardholders that do not have a apply to wired locks.
PIN, do not have to enter a PIN in conjunc-
tion with presenting a valid badge. Forced Door (Forced) – Indicates when the door
has been opened without a valid badge having
 PIN After Badge – In this mode, cardholders
been presented to the reader first.
that have a PIN must enter their PIN in con-
junction with presenting a valid badge. PIN Out of Sync (OutOfSync) – Indicates when the
codes must be entered after presenting a DSR and lock are out of sync, which can be
badge. Cardholders that do not have a PIN, caused by numerous events (for example,
do not have to enter a PIN in conjunction downloading a badge with an invalid badge
with presenting a valid badge. format for the lock or exceeding the number of
time periods for the lock).

Propped Door (Propped) – Indicates when a


Note: For information on the number of sup-
ported PIN digits on Assa Abloy locks, check with door has been opened with a valid badge but
your local Assa Abloy dealer. has been held open longer than the shunt time.

24-10832-194 Rev. E
149

Tamper – Indicates when someone has tam- 9. Modify the fields on the desired tabs
pered with the lock or firmware. accordingly. For information on the Gen-
eral and Alarm Options tabs, see Input
Terminal Down (Term Down) – Since an Assa Point Field Definitions on page 82.
Abloy panel and terminal are essentially the
same in the P2000 system, watch for panel 10. Click OK.
down indications.
Assa Abloy Status Information
Panel Down (PanelDown) – Listed under Soft
Input Points in the System Configuration The status of Assa Abloy components can be
tree; this soft input point indicates when panel monitored on the P2000 System Status win-
communications have ceased. dow.

To Configure Assa Abloy Soft Input DSR Status Information


Points
The DSR is represented as an Integration
1. From the P2000 Main menu, select Con- Component in System Status with the follow-
fig>System. Enter your password if ing states:
prompted. The System Configuration win-
dow opens.  Unknown – The status has not yet been
determined.
2. Expand Panels to display the panel types.
 Up – The P2000 system is communicating
3. Expand Assa Abloy Panels.
with the DSR.
4. Expand Integration Components.  Down – The P2000 system is not communi-
5. Expand the DSR that has the panel or ter- cating with the DSR.
minal and the soft input point you wish to
configure.
Panel and Terminal Status Information
6. Expand the panel that has the terminal and
soft input point you wish to configure. Each door lock is represented in the P2000
system as a panel in System Status with the
7. Expand the terminal to view the available
following states:
soft input points.
8. Right-click over the soft input point you Unknown – The status has not yet been deter-
wish to edit and select Edit. The Input mined.
Point dialog box opens. This dialog box
Up – The panel is currently online with the
consists of four tabs: General, Alarm
DSR.
Options, I/O Linking, and Misc.
Down – The panel is currently offline with the
DSR. This is the normal state for wireless
Note: All of the fields on the I/O Linking and locks.
Misc tabs, including many fields on the General
tab, cannot be modified. Disabled – The P2000 system has been
instructed not to communicate with the panel.

24-10832-194 Rev. E
150 CHAPTER 2
Configuring the System

Real Time Functions Communication between the DSR and the


locks may be as frequent as once per day, but
When access is denied, the Real Time List can be less frequent.
shows one of three different reasons why
access is denied. Assa Abloy PoE locks are permanently con-
nected to the DSR, and real-time operations as
 Invalid Card is shown when: well as real-time database modification and
 a badge has recently expired event reporting are supported.
 the presented badge is not known to the
lock Change of State Reporting
 the wrong card format was selected Assa Abloy locks report the following condi-
tions to the P2000 system: Reader Down,
 Invalid Card Timezone is shown when a Reader Up/Normal, Override, and Lockout, as
badge has access rights to the door, but not well as Forced Door and Propped Door
at the current time. This message is not gen- through the respective soft input points. The
erated for Assa Abloy PoE locks, but only temporary unlocking of a door because of an
the Assa Abloy Wi-Fi locks. access grant, or the Unlock for Access Time
command, or the Open Door action from the
 Invalid Reader is shown for all other rea- Real Time Map, is not reported.
sons, including:
 the deadbolt is thrown Lockout Mode with Assa Abloy PoE
 the lock is currently in Lockout mode Locks
 the Wi-Fi lock is currently communicat- The P2000 Door Control application supports
ing with the DSR the ability to set an Assa Abloy PoE door into
 the badge is presented outside of a valid Lockout mode. In this mode, the lock denies
time zone access to all users, except those that have the
Assa Abloy Emergency privilege. P2000 oper-
Even though the last two cases traditionally ators cannot assign this privilege because of
would be mapped to an Invalid Card message, restrictions with the DSR.
the information received from the DSR does
For information see, Controlling Doors on
not distinguish this case from some other cases
page 290.
that would traditionally be mapped to the
Invalid Reader message. Therefore, the Invalid
Reader message needs to be understood as the File Maintenance on the DSR Server
generic message for access being denied by an The DSR produces *.zip and *.log files that
Assa Abloy lock. contain archived logs; and which are stored on
the computer hosting the DSR. These files are
For information, see Using the Real Time List normally located in the \Program Files (x86)\
on page 342. DSR\logs and the \Program Files (x86)\DSR\
Assa Abloy Wi-Fi locks are not permanently logarchives folders.
connected to the DSR. For this reason, However, the DSR does not purge them auto-
real-time functions, such as operating a door, matically or regularly.
and real time database modification and event
To avoid running out of disk space on the com-
reporting are not supported.
puter that hosts the DSR, we recommend peri-
odically deleting these files manually.

24-10832-194 Rev. E
151

Configure Mercury Panels and Configure Mercury Facility Parameters


Components Before configuring Mercury hardware compo-
The P2000 system can communicate with a nents, you must define facility wide settings
variety of Mercury Security Corporation’s associated with your Mercury devices.
access control hardware products to provide
access control, alarm monitoring, and other To Configure Mercury Facility Settings
security operations.
1. From the P2000 Main menu, select Con-
Mercury panels offer different solutions to fit fig>System. Enter your password if
your access control needs, such as IP and prompted. The System Configuration win-
Power over Ethernet (PoE) capabilities, up to dow opens.
64 doors per panel, support for installations
that use RS-485 communications, and other 2. Expand Panels to display the panel types.
configuration options for small-to-large secu- 3. Select Mercury Panels and click Edit.
rity applications, whether you are installing a The Mercury Facility dialog box opens.
new security system or retrofitting an existing 4. Fill in the information on each tab accord-
one. The following panel types are supported: ing to the following Mercury Facility Field
Panel Type Max. Number of Terminals
Definitions.
EP1501 17 5. As you work through the tabs, click Apply
EP1502 64 at any time to save your entries.
EP2500 64
Schlage PIM400-1501* 16
6. After you have entered all the information,
* Does not offer many of the features provided with the click OK to save your settings.
other Mercury panel types.

Before you use the functions described in this Mercury Facility Field Definitions
section, the Mercury hardware must be prop-
erly installed and configured to communicate
Facility Tab
with the P2000 system. Refer to the hardware
installation instructions that were shipped with Use this tab to define access parameters asso-
your Mercury equipment. ciated with Mercury readers.
Once you define your Mercury panels, termi-
nals, inputs, and outputs, see Configure Mer-
cury Elevators on page 184 for specific
instructions to implement elevator access con-
trol using Mercury panels, and also see Mer-
cury Intrusion Interface on page 323 for spe-
cific instructions to implement intrusion
detection using Mercury panels.

IMPORTANT: This P2000 software release is


compatible with Mercury panels that use firmware
Versions 1.18.7,1.19, or 1.22. Other versions
may not be compatible with this release of the
P2000 software.

24-10832-194 Rev. E
152 CHAPTER 2
Configuring the System

Access Levels – Displays the maximum num- PIN Duress Mode – Select one of the following
ber of access groups (up to 32), that can be PIN code modes used for detecting duress:
assigned to a badge.

Multi-Card Access Time Out (sec) – Enter the


time in seconds (0 to 60) that the system waits Note: To report duress with a PIN code, you
must also select the Allow PIN before Badge
for a subsequent card to be presented at readers option in the Terminal Access Tab, to allow users
that require more than one card. For systems to enter the PIN code before swiping their badge.
using the Two Badge Access function (see This applies only to PIN Append and only when
page 167), we recommend entering a value of the PINs have the maximum number of digits.
1 to 60 seconds. If you enter 0, the system
reverts to the default value of 15 seconds.  Mercury Legacy Mode – Uses the normal
duress PIN codes, where a value of 1 is
added to the last PIN digit. For example,
Note: Changes to Multi-Card Access Time Out PIN 1234 would become 1235. If the last
require performing a Panel Download procedure PIN digit is a 9, the last digit in the PIN
to all Mercury panels. code becomes 0, for example PIN 1239
would become 1230.
Reader Feedback Mode – Select the option that  PIN Append – Appends a duress value (0 to
determines the acoustic feedback that the read- 9) to the PIN code. For example, PIN 1234
ers produce upon access grant or access deny with a duress value of 8 would become
activity. 12348.
 Mercury Default – If selected, an access  PIN Code Offset – Adds a duress value (1 to
grant results in one short beep, and an 9) to the last PIN digit. For example, PIN
access deny results in three short beeps. 1234 with a duress value of 2 would
become 1236, PIN 1239 would become
 Custom – If selected, an access grant results
1231.
in two short beeps, and an access deny
results in three short beeps Offset / Append Value – Select the value that
identifies the PIN append or PIN code offset
value.
Note: To use this feature, the buzzer output of
the Mercury hardware must be connected to the
reader’s beeper/buzzer control line. You must Note: Changes to the PIN Duress Mode and to
also set the LED Mode in the Terminal Reader the Offset / Append Value require restarting the
Tab to Generic 1-wire, tri-state, bi-color. P2000 Mercury Interface Service for the change
to be effective. You must also download panel
information to all Mercury panels.

Note: The Reader Feedback Mode has no


influence on the behavior of any Schlage or
Aperio locks.

24-10832-194 Rev. E
153

Input Point Calibration Tab


Note: The following special access indicators
allow a door's access time to be different. The Supervised inputs are calibrated by assigning
ADA Indicator and VIP Indicator lists display the
the correct calibration table to the input point.
special access flag names as configured in Site
Parameters; see page 33 for details. The calibration tables defined in this tab spec-
ify the predefined mode of operation of Mer-
cury inputs.
ADA Indicator – Select one of the three special
access flags used by cardholders with ADA
privileges and that require special access at a
reader. Select <none> if special access is not
required.

VIP Indicator – Select one of the three special


access flags used by cardholders with VIP
privileges and that require special access at a
reader. Select <none> if special access is not
required. A cardholder with VIP privileges is
exempt from anti-passback and entry/exit
checking, but is not exempt from entering a
PIN code.
Mercury provides two standard tables for
inputs with 1kOhm and 2kOhm as their nor-
Note: Changes to the ADA or VIP indicators mal state. If the input points need to use other
require restarting the P2000 Mercury Interface resistances, click Add to create additional cus-
Service for the change to be effective. You must tom calibration tables.
also download all badges to all Mercury panels.

Enter the Table Name and double-click to edit


any of the eight displayed set of values to
define the possible states of the input circuit.
The reporting Priority value must be between
0 (the highest) and 2.

24-10832-194 Rev. E
154 CHAPTER 2
Configuring the System

The following tables show input calibration


values for 1200 Ohm resistances:
Normally Closed Normally Opened
Status Resistance Status Resistance
Code Range Code Range
3 - short -2 to 51 3 - short -2 to 51
5 - fault 52 to 1053 5 - fault 52 to 516
0 - inactive 1055 to 1354 0 - inactive 517 to 688
5 - fault 1356 to 2122 5 - fault 689 to 1053
1 - active 2124 to 2671 1 - active 1055 to 1355
5 - fault 2674 to 23600 5 - fault 1356 to 23500
4 - open 23700 to -1 4 - open 23600 to -1
2 - short -4 to -3 2 - short -4 to -3

With the exception of the Order field, you can


Note: The calibration values are based on the
actual resistances of the input's states and the select a row and click on any of the following
specific type of hardware device. Contact Mer- fields to define your formats:
cury Technical Support for specific values.

Click Save. You can assign up to four of these Note: The Order column displays the order in
calibration tables to each Mercury panel; see which the card formats are created. The first eight
the General Tab on page 157 for more informa- card formats are defined to work in offline mode.
Verify that your reader terminals display the cor-
tion. rect card formats; see Card Type Tab on
page 169 for details.

Note: Mercury provides two standard settings Name – Enter the name you wish to give to the
for non-supervised inputs, Normally Open and
card format.
Normally Closed. Those inputs do not require an
Input Calibration table. Facility Code – Enter the facility code of the
card format. For Card ID Without Facility
Code formats, you must enter -1.
Card Format Tab
Offset – Enter an offset number to add to the
This tab determines the card formats to be used
card number (based on the card format type) to
at Mercury readers. You can define up to 16
create a unique card number.
card formats to allow your facility to use
badges with different facility codes, different Function – Select one of the following card
data lengths, and so on. Once the selected card types to use with the card format:
formats are defined, they are available for
selection using the Card Type tab in the Mer-  No formatting
cury Terminal dialog box.  Wiegand
 Magnetic stripe

24-10832-194 Rev. E
155

Details – Click to open the Details dialog box Even Parity Number of Bits – Enter the number
to enter the details of the card format. Configu- of bits that are used to calculate even parity.
ration of these fields depends on the card type
selected, Wiegand, Magnetic stripe, and so on. Even Parity Start Bit – Enter the starting bit
position of the even parity.

Odd Parity Number of Bits – Enter the number


of bits that are used to calculate odd parity.

Odd Parity Start Bit – Enter the starting bit


position of the odd parity.

Facility Code Length and Position – Enter the


number of bits or digits in the facility code and
the position of the first bit or digit of the facil-
ity code in the card format.

Card Number Length and Position – Enter the


number of bits or digits in the card number and
the position of the first bit or digit of the card
number in the card format.

Issue Level Length and Position – Enter the


number of bits or digits in the issue level and
the position of the first bit or digit of the issue
level in the card format.

Click OK to return to the Card Format tab. If


you wish to remove a card format, select the
Flags – This field is not currently used. You format and click Clear.
may enter 0 under the corresponding bit num-
ber. Commonly Used Card Formats
Total Length – Enter the total number of digits The following table displays values associated
on a Wiegand card format. with the most popular card formats used at
Mercury readers.
Minimum and Maximum Number of Digits –
Enter the minimum and the maximum number
of digits required in a card format.

24-10832-194 Rev. E
156 CHAPTER 2
Configuring the System

Maximum Number of Digits

Even Parity Number of Bits


Minimum Number of Digits

Odd Parity Number of Bits

Card Number Position


Facility Code Position

Card Number Length


Facility Code Length

Issue Level Position


Even Parity Start Bit

Odd Parity Start Bit

Issue Level Length


Flag To Be Set to 1

Magnetic Stripe (example) – Total Length


– 12 12 – – – – 5 0 6 5 1 11
26-bit Wiegand Standard – 26 – – 13 0 13 13 8 1 16 9 0 0
34-bit Wiegand Standard – 34 – – 0 0 0 0 -13 32 -16 16 -3 19
35-bit HID Corporate 1000 – 35 – – 0 0 0 0 12 2 20 14 0 0
37-bit HID H10302 – 37 – – 19 0 19 18 0 0 32 4 0 0
37-bit HID H10304 – 37 – – 19 0 19 18 16 1 19 17 0 0
Card ID with Facility Code* – – F+C F+C – – – – F 0 C F 0 0
Card ID without Facility – – C C – – – – 0 0 C 0 0 0
Code *
* F = number of digits in a facility code
C = number of digits in a card number.

Configure Mercury Panels To Configure Mercury Panels

After you install the Mercury hardware and 1. From the P2000 Main menu, select Con-
define facility parameters, you must configure fig>System. Enter your password if
the P2000 Server to communicate with Mer- prompted. The System Configuration win-
cury panels by defining connection settings, dow opens.
time information, and other parameters. 2. Expand Panels to display the panel types.
3. Select Mercury Panels and click Add.
The Mercury Panel Edit dialog box opens.
Note: Encryption of all messaging between
Mercury panels and the P2000 Server is done 4. Fill in the information on each tab. (See
through the Transport Layer Security (TLS) proto- Mercury Panel Field Definitions for
col. The encrypted communication uses the TLS details.)
If Available setting, which is configured using
Mercury’s web browser interface. 5. As you work through the tabs, you may
click Apply to save your entries.

IMPORTANT: You cannot modify certain


panel parameters after you save the panel infor-
mation in the database.

24-10832-194 Rev. E
157

6. Click OK to save the panel information. A Partition – Select the partition that has access
message box displays asking if you wish to to this panel.
automatically add time zones to the new
panel. If you select No, you can add the Public – Click Public to allow all partitions to
time zones later; see Configure Panel Time see this panel.
Zones on page 62. Name – Enter a descriptive name for the panel.
7. If you select Yes, the time zones are auto-
matically added. When you return to the Enabled – The system does not recognize the
System Configuration window, a new panel unless you click Enabled. To temporarily
panel icon bearing the name assigned dis- disable the panel, without having to delete or
plays under the root Mercury Panels. disconnect the panel, click again to clear the
check box. When you disable a panel, the
readers continue to grant access, but the panel
does not communicate with the Server until
Note: In addition to applying time zones to the you enable the panel again.
panels (described in Configure Panel Time Zones
on page 62), you may also define panel holidays Query String – This value is used with message
if you wish to restrict access in your facility during
filtering; see Define Query String Filters on
a holiday period; see Configure Panel Holidays
on page 63. page 225.

Mercury Panel Type – Select a panel type. Cer-


tain features are enabled or disabled depending
IMPORTANT: After you create the panel and on the panel type selected here. Refer to the
verify that it is online, you must download the documentation that was shipped with your
panel information with the Reset Panel Before Mercury equipment for details specific to your
Download flag selected. panel type.

Mercury Panel Field Definitions Note: You cannot change the Mercury Panel
Type once you add the panel to the system.

General Tab Panel Inputs – Panel input points are automati-


cally created for specific purposes. Enable:

 Tamper – to indicate tampering if the panel


is wired to a tamper switch on an enclosure.
 Low Battery – to indicate that the battery is
low.
 Power Failure – to indicate a power failure if
the panel uses a battery backup.

Input Calibration – Select the calibration tables


that provide the predefined mode of operation
of the input points defined for this panel. Cali-
bration tables are defined in the Input Point
Calibration tab in Mercury Facility, see
page 153 for details.

24-10832-194 Rev. E
158 CHAPTER 2
Configuring the System

Communications Tab Refer to the CKM-DLAN Dual Ethernet Mod-


ule for CKM-EP2500 document for configura-
You cannot complete panel configuration tion instructions.
unless you define these communication param-
eters. Enabled – Click to enable the alternate connec-
tion.
Note: Changes in this tab do not take effect
until you restart P2000 Mercury Interface Service.
Note: When you select or clear the Enable
check box, Primary Channel and Alternate Chan-
nel soft input points are added or removed.
Removing these points may result in unexpected
consequences in some areas, such as Events
and Actions. This change does not take effect
until the Mercury Interface Service is restarted.

Connection String – Enter the IP address of the


alternate connection. This entry should be from
a different subnet address and must match the
IP address at the panel. If you use a Dynamic
Host Configuration Protocol (DHCP), enter the
name of the alternate connection device.

Maximum Retries – Enter the number of times


Primary Channel that the Server tries to connect with the panel,
after which the panel is considered offline. We
Connection String – Enter the IP address that is recommend using the default value of 0. Con-
used to connect to the panel. If you use a tact Technical Support for instructions if you
Dynamic Host Configuration Protocol need to change this value.
(DHCP), enter the controller name in this field.
Central Response Timeout – Enter the time in
Maximum Retries – Enter the number of times seconds (between 2 and 32) that this panel may
that the Server tries to connect with the panel, wait without receiving any notification from
after which the panel is considered offline. We the Server before it can make any access deci-
recommend using the default value of 3 retries. sion. This setting applies to all entry and exit
Contact Technical Support for instructions if terminals defined for this panel. If you use this
you need to change this value. setting in conjunction with the Cen-
tral-In-X-It feature defined for each terminal,
the timeout setting may be rather short, 3 sec-
Alternate Channel
onds for example. If you use this setting in
Use the Alternate Channel box to configure conjunction with the Operator Access feature
Mercury EP2500 panels that have a second defined for each terminal, the timeout setting
network connection through a Dual Ethernet must be long enough for an operator to make
interface. Dual Ethernet allows the alternate an access decision, 30 seconds for example.
connection to take over the communications if
the primary connection fails.

24-10832-194 Rev. E
159

Downstream Connections Tab Port – Displays the available ports for the
selected panel type. See the following table for
details.
IMPORTANT: You cannot modify certain
Panel
parameters in this tab after you save the panel Type
Port Protocol
information in the database.
Mercury Primary 10/100 Ethernet MSP1
EP1501
TB2 (RS-485) MSP1
Mercury panels connect to their terminals Schlage PIM
using downstream ports. These ports contain Direct Reader *
parameters that define the port’s behavior, Mercury Primary 10/100 Ethernet MSP1
EP1502
including the type of devices that can be con- TB3 (RS-485) MSP1
nected. The availability of the ports varies by Mercury Primary 10/100 Ethernet MSP1
panel type. Also, the options in the Mercury EP2500
Port 2 (RS-485) MSP1
Terminal configuration depend on the choices Schlage PIM
made in the port definition. Port 3 (RS-485) MSP1
Schlage PIM
Schlage TB2 (RS-485) Schlage PIM
PIM400- (uses a fixed
1501 9600 baud rate)
* Select Direct Reader for the EP1501 panel if you want
to use a reader on connector TB2 instead of an MSP1
bus.

Baud Rate – Select the specific baud rate for


the selected port. Confirm that all terminals
associated with the panel are set to the same
baud rate. Mismatching of the baud rate
between the panel and terminals causes the
Real Time List to display a download failure
message for the terminal.

Reply Timeout (ms) – Select the time in milli-


seconds that the panel waits for a response.

Protocol – Select the type of protocol specific


to the selected port; see the table in this section
for details.

Dialect – Always use the Default setting.

24-10832-194 Rev. E
160 CHAPTER 2
Configuring the System

Time Information Tab Configure Mercury Terminals

The information in this tab defines time A variety of terminal types can be installed into
zone-related information and Daylight Savings Mercury panels to control devices such as card
Time (DST) settings. readers, inputs that control alarm monitoring
devices, outputs that control other devices such
lights or alarm annunciators, or they can be
configured to control soft input points.

Each terminal installed in your system must be


set up and configured in the P2000 software to
establish communication and control. Once
terminals are configured, they may be included
in Terminal Groups to provide common access
throughout your facility.

Understanding Terminal Siblings

The P2000 system considers each Mercury


reader as its own terminal. Some Mercury
Import World Time Zone Information – Click to Serial Input/Output (SIO) devices, such as the
select the time zone information that applies to MR52, MR51e, and the on-board SIO devices
the panel location. on the EP1501 and EP1502 panels can have
two reader terminals. The Aperio 1 to 8 Hub
Panel UTC Offset – Defines time offsets for can have eight reader terminals, the Schlage
remote panels, relative to Universal Time. PIM400-485 can have 16 reader terminals, and
Click the + or - radio button and enter the the Schlage ENGAGE Gateways can have 10
appropriate hours and minutes for the time off- reader terminals on the same device.
set.

Daylight Savings Used – When you select a Note: SIO devices are not necessarily serial
time zone, the system uses the standard day- devices or pure input/output devices.
light savings time settings for the selected
region, the panel’s clock is automatically The term sibling, refers to all terminals that are
adjusted for daylight savings time. If you wish on the same SIO device; for example, a termi-
to change the default settings, click Daylight nal on an MR52 may have up to one sibling, a
Savings Used and select: terminal on a Schlage PIM400-485 may have
up to 15 siblings.
 the Begin and End Month
 the Begin and End Week of Month The following rules apply to terminal siblings:
 the Begin and End Day of Week  A terminal can only have siblings that are in
 the Begin and End Time of Day the same panel.
 Terminals that are siblings to each other
Added During Daylight Savings – A value of 1
have the same SIO number.
hour is currently the world standard. You can-
not change this value.

24-10832-194 Rev. E
161

 Terminals that are siblings to each other  Siblings share their P2000 inputs and
have the same address configuration (such P2000 outputs on a first come first serve
as Port, Address, IP Address, or MAC basis. This allows a more flexible assign-
Address), but a different Index. ment of inputs and outputs, in case one ter-
 If you change the address configuration minal needs more inputs/outputs than the
(such as Port, Address, IP Address, or MAC other. For example:
Address) of a terminal, the following warn-  Out of the 8 inputs of an MR52 there
ing message displays: may be 6 assigned to terminal 1 and the
remaining 2 to terminal 2.
 Out of the 8 inputs of an MR52 there
may be 8 assigned to terminal 1 and
none left for terminal 2.
 Out of the 8 inputs of an MR52 there
may be 8 assigned to terminal 2 and
none left for terminal 1.
If you click Yes, the same change is also  Out of the 8 inputs of an MR52 there
made to all siblings of the terminal. may be 4 assigned to terminal 1 and the
remaining 4 to terminal 2.
 If you change the Enabled flag of a termi-
nal, the following warning message dis-  All inputs of an SIO device are equally visi-
plays: ble in the System Configuration tree under
the Mercury Input Points branch for all of
the siblings on that SIO device.
 The System Configuration tree under the
P2000 Input Points branch shows only
P2000 inputs assigned to that specific ter-
minal, and not to a sibling.
 All outputs of an SIO device are equally
visible in the System Configuration tree
If you click Yes, the same change is also under the Mercury Output Points branch for
made to all siblings of the terminal. all of the siblings on that SIO device.
 Updating the firmware of a terminal applies  The System Configuration tree under the
automatically to all of its siblings. P2000 Output Points branch shows only
P2000 outputs assigned to that specific ter-
For Mercury terminals MR52, MR51e, and the
minal, and not to a sibling.
on-board SIO devices on the EP1501 and
EP1502 panels, the following additional rules
apply:

Note: These rules do not apply to the Aperio 1


to 8 Hub, the Schlage PIM, or the Schlage
ENGAGE devices.

24-10832-194 Rev. E
162 CHAPTER 2
Configuring the System

P2000 Server P2000


Workstation

Wide Area
Network
IP Network

CKM-EP1501 Schlage CKM-EP2500


PIM400-1501

Schlage Schlage
AD-300 series AD-300 series
Supports up to 16
wireless locks .

Schlage Schlage Schlage Schlage


PIM400-485 AD-400 series PIM400-485 AD-400 series

Supports up to 16 wireless locks Supports up to 16 wireless locks .

Schlage Schlage Schlage Schlage


ENGAGE Gateway ENGAGE Lock ENGAGE Gateway ENGAGE Lock
(NDE series) (NDE series)

Supports up to 10 wireless locks . Supports up to 10 wireless locks.

For performance considerations,


scalable to maximum 8 Schlage
Scalable to 8 Schlage devices devices (PIM400-485 modules,
(PIM400-485 modules, AD300 AD300 series locks, or Schlage
series locks, or Schlage ENGAGE ENGAGE Gateways ) per bus. The
Gateways). CKM-EP2500 controller has two
buses.
Maximum number of Schlage locks
per CKM-EP1501 controller is 17. Maximum number of locks per the
CKM-EP2500 controller is 64.

24-10832-194 Rev. E
163

To Configure Mercury Terminals Mercury Terminal Field Definitions

1. In the System Configuration window,


General Tab
expand Panels to display the panel types.
2. Expand Mercury Panels to display all
Mercury panels configured in the system.
3. Expand the panel for which you wish to
configure the terminal. All the items that
can be configured for the panel are listed
under it.
4. Select Terminals and click Add. The Mer-
cury Terminal Edit dialog box opens at the
General tab. Enter the information in each
tab according to your system requirements.
See the following Mercury Terminal Field
Definitions for detailed information.
5. As you work through the tabs, click Apply
to save your settings.
Name – Enter a descriptive name for the termi-
6. When all entries are complete, click OK to nal.
save the terminal information.
Panel – This field displays the name of the
7. Continue to create terminals for every
Mercury panel you selected from the System
Mercury panel in which they are installed.
Configuration window.
If you wish to group Mercury terminals
that provide common access, see Create Query String – This value is used with message
Terminal Groups on page 78. filtering; see Define Query String Filters on
page 225.

Number – Select a terminal number. Refer to


Note: If you delete a Mercury terminal from the
system, you must download at a convenient time,
your specific hardware configuration docu-
all items to the affected panel with the Reset mentation if you need more information on
Panel Before Download flag selected. Failure to terminal address assignment.
do so may prevent you from adding another ter-
minal to the same address as the deleted termi- Public – If you use Partitioning, click Public if
nal. you wish the Mercury terminal to be visible to
all partitions.

Enable – Click if you wish the system to recog-


Note: Deleting a Schlage ENGAGE Gateway nize this terminal.
terminal requires that you first delete all Schlage
ENGAGE Locks that are connected to the gate- Type – Select the terminal module type
way. installed. The specific number of readers, input
points, output points, and the terminal features
supported depend on the type of module
selected here. You cannot change the terminal
type after the terminal information is saved.

24-10832-194 Rev. E
164 CHAPTER 2
Configuring the System

Port – Select the port that is specific to the ter-


Note: Settings in this tab are enabled or dis-
abled depending on the terminal type selected.
minal type. The availability of the ports varies
Also, some options are selected by default and by panel type and by selected terminal type.
cannot be edited. See Downstream Connections Tab on page 159
for more information.
The following table displays the options pro-
Reader – Click to define this terminal as a
vided with each terminal type: reader terminal. You must enter information on
Module Type Specification
the Access, Card Type, and Input/Output tabs
to complete the configuration. You cannot
EP1501 On-Board up to 2 reader terminals 1
2 input points change this setting after the terminal is saved.
2 output points Not available for MR16in or MR16out termi-
EP1502 On-Board 2 reader terminals nal modules. Select one of the following reader
8 input points
4 output points types from the drop-down list:
MR50 1 reader terminal
2 input points  Access – Normal access reader.
2 output points
MR51e 2 reader terminals  Entry – Entry defined access reader.
4 input points
2 output points  Exit – Exit defined access reader.
MR52 2 reader terminals
8 input points
6 output points
MR16in 16 input points Note: Entry and Exit terminals require card-
2 output points holders to badge at Entry and Exit terminals alter-
MR16out 16 output points nately. For example, badging at an Entry terminal
MRDT (DM-21) 1 keypad display terminal and then badging again at another Entry terminal
Schlage PIM 2 16 reader terminals (Schlage is invalid. If Entry and Exit terminals are installed
PIM400-485) on the panel (must be installed on the same
Aperio 1 to 8 Hub 3 8 reader terminals panel), this option must be enabled for the Entry
Schlage ENGAGE Provides the communication to and Exit requirements to operate.
Gateway 4 the Schlage ENGAGE Locks.
Schlage ENGAGE 10 reader terminals
Lock 4 Address – Select the address of the selected
1 Available if the selected protocol is Direct Reader. If terminal module. Not available for MR51e
you select the MSP1 protocol, then only one reader
terminal is available, located on connector TB3. modules. The address selection varies accord-
2 The Schlage PIM reader is only available with ing to the terminal type selected.
Schlage PIM400-1501 panels, or EP1501 and
EP2500 panels with the Schlage PIM protocol
selected. Index – Select the index number of the selected
3 For more information on Aperio 1 to 8 Hub, see terminal. The index selection varies according
Aperio Locks Particularities on page 177.
4 Available with EP1501 and EP2500 panels with the to the terminal type selected. The index speci-
Schlage PIM protocol selected. For more information,
see Schlage ENGAGE Particularities on page 178. fies which reader terminal is defined, if there is
more than one terminal available.
SIO Number – This field is available after the
terminal is saved. It displays the Mercury
Serial Input/Output (SIO) number assigned to Note: For addressing and indexing information
associated with Schlage ENGAGE Locks, see
SIO devices (the terminal types listed in the Schlage ENGAGE Particularities on page 178.
previous table), and is used for diagnostic pur-
poses only. See Understanding Terminal Sib-
lings on page 160 for additional information.

24-10832-194 Rev. E
165

IP Address – Available for MR51e modules.


Note: A Propped Door alarm is generated if
Enter the IP address when using static IP the door is left opened after the shunt time
addressing. See What to Do When Changing defined in the Access Tab has expired.
an MR51e IP Address on page 192 for addi-
tional information.
 Duress (17) – When enabled, an alarm is
MAC Address – Available for MR51e modules. generated if the system detects a duress
Enter the Media Access Control (MAC) condition. See Facility Tab on page 151 for
address of the module when using DHCP. the different PIN Duress modes.

Soft Input Points –The P2000 system can mon-


itor the following soft input points for Mercury Reader Tab
terminals (the availability of these soft input
points varies according to the terminal type
selected):

 Terminal Power Fail (21) – When enabled, an


alarm is generated when the terminal device
has a power failure.
 Terminal Tamper (22) – When enabled, an
alarm is generated to indicate a tamper con-
dition if for example, the terminal device
has been disturbed or removed from the
wall. ACR Number – This field is available after the
The following soft input points are only avail- terminal is saved. It displays the Access Con-
able for Reader type terminals. trol Reader (ACR) number assigned to the
reader, and is used for diagnostic purposes
 PIN Code Retry (19) – When enabled, an only.
alarm is generated when three consecutive
invalid PIN codes are entered at a keypad Reader Configuration – This field defines the
reader. hardware operation of the reader. Select one of
 Soft-In-X-It (23) – This soft input point is the following:
only available for Entry or Exit readers.
 Single – The reader operates as a single
When enabled, an alarm is generated when
reader.
the system detects an entry/exit violation.
 Paired, Master – The reader operates as the
 Forced Door (18) – When enabled, an alarm
leader reader in a paired reader configura-
is generated when a door has been opened
tion.
without the door being unlocked.
 Paired, Slave – The reader operates as the
 Propped Door (24) – When enabled, an
follower reader in a paired reader configu-
alarm is generated when a door has been
ration.
held open longer than allowed.

Note: In paired reader mode, the leader reader


controls the access, and the follower reader
makes access requests to the leader reader.

24-10832-194 Rev. E
166 CHAPTER 2
Configuring the System

 Turnstile – The reader provides turnstile  Generic 1-wire, tri-state, bi-color


access. Security personnel can provide  Dorado 780
access through turnstile devices using a sin-
 LCD
gle badge to control and count the flow of
pedestrian traffic in and out of a facility.  OSDP (for more information, see OSDP
Reader Particularities on page 179).
 Elevator without feedback – This option is
not available for selection. It displays in this
field after the reader is assigned to an eleva- Note: The Generic 1-wire, tri-state, bi-color
tor without the Floor Tracking option mode is required if you use the BZR output of the
selected; see page 185 for details. Mercury boards for explicit beeper/buzzer control.
 Elevator with feedback – This option is not
available for selection. It displays in this Offline Reader Mode – This option is not avail-
field after the reader is assigned to an eleva- able for Schlage or Aperio readers. Select one
tor with the Floor Tracking option selected; of the following behavior modes of the reader
see page 185 for details. if the terminal loses communication with the
panel:
Paired Reader Terminal – If your reader oper-
ates as a leader reader, select the follower  No Change
reader that defines the paired reader configura-  Disable Reader, no REX
tion. If your reader operates as a follower  Unlocked
reader, then select the leader reader that  Locked (No Access, REX Active)
defines the paired reader configuration. You  Facility Code Only
can only select reader terminals that are
installed on the same panel. Default Reader Mode – Select one of the fol-
lowing reader default mode of operation (make
Keypad Mode – If this is a keypad reader, select your selection after the panels starts up):
one of the following keypad modes to be used
with your reader.  Disable Reader, no REX
 Unlocked
 <none>
 Locked (No Access, REX Active)
 Motorola / Indala 8-bit
 Card Only
 HID 4-bit
 Card and PIN Required
 MR20 8-bit with tamper
 MR20 8-bit without tamper
Note: Changes to the Default Reader Mode
become effective after you download all items to
Note: Some Schlage Magstripe keypad read- the affected panel, with the Reset Panel Before
ers are not compatible with Motorola/Indala 8-bit. Download flag selected. Otherwise, changes
For those Schlage devices, select MR20 8-bit become effective the next time the panel is
without tamper. restarted.

LED Mode – Select one of the following LED


modes associated with the reader: Note: The Default Reader Mode selection
remains in effect until it is changed either through
 <none> Door Control, Host Events, Mercury Procedures,
or Web UI Maps.
 Separate red and green, no buzzer

24-10832-194 Rev. E
167

Access Tab  Re-lock on Open – Select to lock the door


immediately when the door opens to pre-
vent reopening the door on one card access.
The door does not relock until the Mini-
mum Access Time has elapsed.
 Re-lock on Close – Select to lock the door
immediately when the door closes to pre-
vent reopening the door on one card access.

Operator Access – This feature provides addi-


tional security by requiring an operator to con-
firm or reject a valid access request. For exam-
ple, if your facility is equipped with cameras at
an entry door, an access request can be put on
Access Time – Enter the time in seconds that hold for a specific time to give an operator
the door remains unlock to provide access. time to provide visual verification that a card-
holder is valid.
Minimum Access Time – Enter the minimum
access time in seconds. This access time is
used in combination with the Re-lock on Open Note: An authorized operator must use the
option selected in the Anti-Tailgating field. Web UI to grant or deny access requests before
they expire. For more details, refer to the Web UI
Shunt Time – Enter the time in seconds that the User Guide.
door alarm is suppressed to allow access at the
door. The shunt time should be longer than the If an operator does not make an access deci-
access time. sion in time, the Operator Access feature uses
the Central Response Timeout setting
Door Open Warning Time – Enter the time in
defined at the panel (see page 158) to grant or
seconds before the Shunt Time expires, to warn
deny access when the Central Response Time-
operators that the door is still open. The maxi-
out setting expires. Select one of the following
mum time must be 2 seconds less than what is
modes:
configured for the Shunt Time. For example, if
the Shunt Time is set for 10 seconds, then the  Deny on Timeout – to deny access after the
maximum Door Open Warning time must be 8 Central Response Timeout setting expires.
seconds. This option only works in conjunction
 Grant on Timeout – to grant access after the
with Mercury Triggers of category Door Status
Central Response timeout setting expires.
and type Open Pre-Alarm Only, otherwise the
seconds entered here are ignored; see Configur-  Disabled – to disable the Operator Access
ing Triggers on page 182 for more information. feature. This option is selected by default
when the Central In-X-It feature is selected.
Anti-Tailgating – Select one of the following
anti-tailgating modes that occur to prevent
more than one person accessing a controlled Note: Since the Central In-X-It feature also
uses the Central Response Timeout setting, we
area with a single card transaction: recommend that readers in Central Entry/Exit
mode and readers in Operator Access mode be
 <none> – This option is only available for
placed onto different panels because the timeout
Aperio 1 to 8 Hub terminal type. values will probably be different.

24-10832-194 Rev. E
168 CHAPTER 2
Configuring the System

The Operator Access feature makes an auto- 1. Present a valid badge.


matic access decision in case a valid access 2. Within 30 seconds enter the following key
request is not handled by the operator within sequence at the keypad: *, 0, nnn, # (nnn is
the Central Response Timeout. Every addi- the desired shunt time in minutes, with
tional valid access request that is made at a leading zeros if necessary).
reader that already has access requests pend-
ing, restarts that timeout counter, so that all 3. The door will unlock for a normal access
accumulated valid access requests will have time. During this time, prop the door.
their automatic access decision made at the The propped door alarm is suppressed for up to
same time, that is, once the central response 999 minutes (16 hours and 39 minutes).
timeout has elapsed after the last valid access
request. Invalid access requests (requests made Suppression of the propped alarm ends if the
by people that do not have access rights to the door is closed or the time expires. If the door is
reader) are denied access immediately and do still propped open when the time expires, a
not restart the timeout counter. propped door alarm will occur.

Anti-Passback – Select to enable the anti-pass- Performing the activation sequence while the
back feature to prevent cardholders from using timer is running will again unlock the door for
their badge again at this reader until the a normal access time and start a new timer.
anti-passback time entered expires.
Entering *0600# starts or extends an override
for 10 hours.
Note: If cardholders use their badge at a differ- Entering *0000# starts an override that will
ent reader on the same panel and are granted end immediately.
access, the system resets the anti-passback
period to its initial value.

Note: The door remains locked after being


Shunt Only on REX – If enabled, the door alarm unlocked for the normal access.
is suppressed when a Request to Exit (REX)
input signal is received from a REX device
Two Badge Access – If enabled, the system
associated with the reader, which prompts the
requires presenting two badges to grant access.
door contact to be shunted without setting off
the alarm. Central In-X-It – Available for entry and exit
readers. If enabled, this terminal operates in
Allow PIN before Badge – If enabled, the card-
Central Entry/Exit mode regardless of the
holder can enter the PIN number before pre-
entry/exit status maintained by the panel.
senting the badge. The cardholder must press
the <#> key after entering the PIN number. Soft-In-X-It – Available for entry or exit readers.
If enabled, this function overrides the system
Cardholder Override – If enabled, an authorized
entry and exit control function and allows
cardholder can suppress a propped alarm by
cardholders to gain access at that reader even
performing a badging procedure at the reader’s
though they have the wrong entry and exit sta-
keypad. The cardholder must have the Over-
ride option enabled in the Badge dialog box. tus. An alarm is generated when a violation
occurs.
Use this activation sequence to perform a card-
holder override:

24-10832-194 Rev. E
169

Check Use Limit – If enabled, a badge is denied


Note: Activation of the ADA Relay is indepen-
access when its Uses Left counter reaches dent of the special ADA access flag assigned to a
zero. The maximum number of times a badge cardholder. Also, you must define a Door Contact
can be used is defined in the Security Options to make the ADA Relay work, and you must also
tab of the Badge dialog box, see page 253. define the reader on the same terminal as the
Door Strike.
Decrement Use Limit – If enabled, a badge dec-
rements its Uses Left counter by one every ADA Relay Delay – Enter the amount of time
time it is granted access. (in 100 milliseconds) that needs to elapse after
the door is unlocked before the ADA Relay is
Note: The Use Limit options are provided to activated. This may be necessary to avoid
control the maximum number of times a badge operating the door-opening device before the
can be granted access.
door is fully unlocked.

Assisted Access Box Card Type Tab

The Assisted Access option allows you to set


up a different access time, to satisfy the
requirements for assisted access according to
ADA (Americans with Disabilities Act).

Note: Schlage readers support the Assisted


Access feature if connected to Mercury EP2500
panels that use firmware versions 1.18.7, 1.19, or
1.22.

Assisted Access Time – Enter the time in sec-


onds that the door remains unlocked to provide
additional access time to cardholders with spe- Card Data Formatting – Select the type of card
cial needs. format to be used with this reader.

Assisted Shunt Time – Enter the time in sec-  For magnetic stripe cards, select the Trim
onds that the door alarm is suppressed to allow Zero Bits and Format To Nibble Array for-
additional access time to cardholders with spe- mats. Make sure the Data1 / Data0, Wie-
cial needs. The assisted shunt time should gand Pulses format is not selected.
exceed the assisted access time by the same  For magnetic stripe cards, you can select the
amount that the regular shunt time exceeds the Allow Bi-Directional Mag Decode format to
regular access time. also read cards that are reverse swiped.
ADA Relay Mode – Select one of the following  For readers that send their input as a Wie-
relay modes that specifies the time the ADA gand signal, select the Data1 / Data0, Wie-
relay is activated minus any ADA Relay Delay. gand Pulses format and make sure the Trim
Zero Bits, Format To Nibble Array, and
 <none> – if there is no ADA Relay support. Allow Bi-Directional Mag Decode formats
 Same as Access Time – if an ADA Relay is are not selected.
used, make sure you select the ADA Relay  To use Card ID, see How to Use Card ID
button in the Input/Output tab. using a Keypad Reader on page 188.

24-10832-194 Rev. E
170 CHAPTER 2
Configuring the System

Card Format Types with Offline Support – Select Terminal – Select the terminal associated with
the card types to be used with this reader. the door contact input point. The terminal list
These card types are configured using the Card includes only terminals that are configured in
Format tab in Mercury Facility; see page 154 the same panel.
for details. These formats are defined to work
in offline mode. Input – Select the Door Contact input point
number that receives signal from the door con-
Card Format Types without Offline Support – tact associated with the terminal.
Select the card types to be used with this
reader. These card types are configured using Debounce Scan Count – Select the number of
the Card Format tab in Mercury Facility; see consecutive input scans that must agree, before
page 154 for details. These formats do not a change of state is reported. Each scan period
work in offline mode. is 16.7 milliseconds.

Hold Time – Select the number of seconds (2 to


Input/Output Tab 15) to hold a higher priority status before a
lower priority status is reported. Select 0 to
Settings in this tab define how inputs and out- prevent any hold time.
puts behave when activated. Not available for
MR16in or MR16out terminals. You must save Calibration – Select the calibration table that
the terminal information before you access this provides the predefined mode of operation of
tab. the Door Contact input point. You can define
additional calibration tables by using the Input
Point Calibration tab in Mercury Facility; see
page 153 for details.

Primary REX

Note: 4-state REX inputs (primary and second-


ary) do not report the Open and Short conditions.
However, since the door unlocks only when the
REX is correctly activated, the Open and Short
conditions cannot be used to unlock the door.

Enable – Click to enable the primary Request


to Exit (REX) input point. If enabled, the door
is unlocked, or only shunted when the Shunt
Door Contact Only on REX flag is selected. You can disable
this option to disassociate this input from the
Enable – Click to enable the Door Contact
terminal and reassign the input as a general
input point. If enabled, an alarm is generated
purpose input point, see To Configure Mercury
when the door detects a forced door or propped
Inputs on page 174.
door condition. You can disable this option to
disassociate this input from the terminal and Terminal – Select the terminal associated with
reassign the input as a general purpose input the REX input point. The terminal list includes
point, see To Configure Mercury Inputs on only terminals that are configured in the same
page 174. panel.

24-10832-194 Rev. E
171

Input – Select the REX input point number that Hold Time – Select the number of seconds (2 to
receives signal from the primary REX associ- 15) to hold a higher priority status before a
ated with the terminal. lower priority status is reported. Select 0 to
prevent any hold time.
Debounce Scan Count – Select the number of
consecutive input scans that must agree, before Calibration – Select the calibration table that
a change of state is reported. Each scan period provides the predefined mode of operation of
is 16.7 milliseconds. the secondary REX input point. You can define
additional calibration tables by using the Input
Hold Time – Select the number of seconds (2 to Point Calibration tab in Mercury Facility; see
15) to hold a higher priority status before a page 153 for details.
lower priority status is reported. Select 0 to
prevent any hold time.
Strike
Calibration – Select the calibration table that
provides the predefined mode of operation of Enable – Click to enable the Strike output
the primary REX input point. You can define point. You can disable this option to disassoci-
additional calibration tables by using the Input ate this output from the terminal and reassign
Point Calibration tab in Mercury Facility; see the output as a general purpose output point,
page 153 for details. see To Configure Mercury Outputs on
page 176.

Secondary REX Terminal – Select the terminal associated with


the door strike output point. The terminal list
Enable – Click to enable the secondary includes only terminals that are configured in
Request to Exit (REX) input point. If enabled, the same panel.
the door is unlocked, or only shunted when the
Shunt Only on REX flag is selected. You can Output – Select the door strike output point
disable this option to disassociate this input number that is activated after each valid badge
from the terminal and reassign the input as a access request.
general purpose input point, see To Configure
Mercury Inputs on page 174. Drive Mode – Select one of the following
modes that define the door strike output point
Terminal – Select the terminal associated with behavior upon activation:
the REX input point. The terminal list includes
only terminals that are configured in the same  Normal – This mode locks the door when
panel. the strike output state is Inactive, and
unlocks the door when the strike output
Input – Select the REX input point number that state is Active.
receives signal from the secondary REX asso-  Inverted – This mode unlocks the door
ciated with the terminal. when the strike output state is Inactive, and
locks the door when the strike output state
Debounce Scan Count – Select the number of
is Active.
consecutive input scans that must agree, before
a change of state is reported. Each scan period Offline Mode – Select one of the following
is 16.7 milliseconds. modes that define the door strike state when
the terminal goes offline:

24-10832-194 Rev. E
172 CHAPTER 2
Configuring the System

 No Change – The strike output state does not  Normal – This mode sets the output point if
change. the output state is Active, and resets the out-
 Inactive – This mode locks the door when put point if the output state is Inactive.
the strike output drive mode is Normal, and  Inverted – This mode resets the output point
unlocks the door when the strike output if the output state is Active, and sets the out-
drive mode is Inverted. put point if the output state is Inactive.
 Active – This mode unlocks the door when Offline Mode – Select one of the following
the strike output drive mode is Normal, and modes that define the output point state when
locks the door when the strike output drive the terminal goes offline:
mode is Inverted.
 No Change – The output state does not
change.
Shunt/ADA Relay
 Inactive – This mode resets the output point
when the output drive mode is Normal, and
sets the output point when the output drive
Note: The Shunt Relay or ADA Relay output
point is always defined as the next output point of mode is Inverted.
the selected Strike output point. If the Shunt  Active – This mode sets the output point
Relay or ADA Relay output point is not available, when the output drive mode is Normal, and
the Not used option is automatically selected. resets the output point when the output
Also, you must define a Door Contact to make the
drive mode is Inverted.
Shunt Relay or ADA Relay work, and you must
also define the reader on the same terminal as
the Door Strike. Configure Mercury Inputs

Not used – Select if there is no output relay The Mercury configuration provides several
connected to the reader. types of input points. Some of these input
points have a predefined and unchanging pur-
Shunt Relay – Select if the relay is connected to pose, such as to indicate panel tamper. Other
an output point that indicates a shunt condi- input points are dedicated to access control
tion. functions, such as receiving input from door
contacts and REX devices; and other input
ADA Relay – Select if the relay is connected to points can be used for a variety of purposes
an output point that controls a door opening and devices, such as power failure.
device.
The system automatically creates panel input
Terminal – Displays the name of the terminal points under the selected Mercury panel and
associated with the shunt/ADA relay output can be enabled for alarm and non-alarm pur-
point. poses.
Output – Displays the shunt/ADA relay output The system also automatically creates two sets
point number that is activated after each valid of terminal input points under the selected ter-
badge access request. minal: P2000 Input Points and Mercury Input
Drive Mode – Select one of the following Points. The terminal hardware type determines
modes that define the output point behavior the available number of input points on both
upon activation: sets. See the table on page 163 for the number
of inputs provided with each module type.

24-10832-194 Rev. E
173

Before you configure your input points, you The System Configuration window displays
should note that: the following icons associated with Mercury
input points:
 You cannot add or delete Mercury Input
Points; those input points are associated
with other Mercury components, such as
P2000 general inputs or Door Contact
inputs.
 You can configure P2000 Input Points to
indicate the current state of a device, and The following possible input points are avail-
also for alarm or non-alarm purposes. able:

Input Type Input Name Generated for... Description


Panel Soft Inputs Panel Down All Mercury panels. Internal to the P2000 system to indicate
that the panel is not active.
Panel Inputs Panel Tamper Mercury panels with Panel Typically wired to a tamper switch on an
Inputs enabled (availability of enclosure to indicate tampering.
Panel Battery these inputs depends on the Indicates when the battery in the panel is
panel type selected). low.
Power Failure With battery employed, this input point
indicates power failure.
Primary Ch EP2500 Mercury Panels with Indicates the panel primary communica-
Dual Ethernet communication tion channel status.
Alternate Ch enabled. Indicates the panel alternate communica-
tion channel status.
Terminal Soft Term Down All Mercury terminals, except Indicates that panel communications have
Inputs Schlage ENGAGE Locks. ceased.
Terminal Inputs Terminal Power Mercury terminals with Soft Indicates power failure.
Fail Input Points enabled (avail-
Terminal Tamper ability of these inputs Typically wired to a tamper switch on the
depends on the panel type terminal to indicate tampering. For
selected). Schlage ENGAGE Gateways this means
that the Bluetooth Low Energy connection
was made from the ENGAGE mobile app.
There is no physical tamper switch on the
Schlage ENGAGE Gateway.
Terminal Lost AC Indicates when the reader has lost power.
Forced Door Mercury terminals with Soft Indicates when a door has been opened
Input Points enabled. The without the door being unlocked.
Propped Door Reader option must be Indicates when a door has been held open
selected (availability of these longer than allowed.
inputs depends on the panel
Duress type selected). Indicates when the system detects a
duress condition. See Facility Tab on
page 151 for PIN Duress modes.
PIN Code Retry Indicates when three consecutive invalid
PIN codes are entered at a keypad reader.
Soft-In-X-It Indicates when there is an entry/exit viola-
tion.

24-10832-194 Rev. E
174 CHAPTER 2
Configuring the System

Input Type Input Name Generated for... Description


Terminal Inputs Magnetic Tamper Schlage ENGAGE Locks Indicates that the door position switch for
(these inputs are the door contact is not reliable.
automatically Unknown Fault Aperio 1 to 8 Hub Indicates an uncategorized fault condition.
created at the
time the terminal Lock Offline Indicates that the lock is offline from the
is added) communication hub.
Radio Problem Aperio 1 to 8 Hub, Schlage Indicates a problem with the radio fre-
PIM, and Schlage ENGAGE quency. For Schlage ENGAGE Locks, it
Locks indicates that a connection has been
made to the lock from the ENGAGE
mobile app.
Stalled Indicates that the lock is stalled or
jammed.
Reader Tamper Typically wired to a tamper switch on the
reader to indicate tampering.
Low Battery Indicates when the battery on the reader
is low.

To Configure Mercury Inputs 5. When you finish with all the entries, click
OK to save the input information.
1. In the System Configuration window,
expand Panels to display the panel types.
2. Expand Mercury Panels to display all Mercury Input Field Definitions
Mercury panels configured in the system.
3. Expand the panel for which you wish to General Tab
configure the input point.
 To configure panel inputs, expand Panel
Input Points, select the input point you
wish to configure and click Edit.
 To configure terminal inputs, expand the
terminal that contains the input point
you wish to configure, expand Input
Points, then expand P2000 Input
Points, either click Add or select the
input point you wish to configure and
click Edit.
The Edit P2000 Input Point dialog box Partition – Select the partition that has access
opens at the General tab. to this input point.
4. Enter the information in each tab according
to your system requirements. The fields Public – Click Public to allow all partitions to
available for configuration depend on the see this input point.
type of input point selected. (See Mercury Name – Enter a descriptive name for the input
Input Field Definitions for detailed infor- point.
mation.) As you work through the tabs,
click Apply to save your settings.

24-10832-194 Rev. E
175

Number – Select an input point number. This Calibration – Select the calibration table that
number is always associated with the input provides the predefined mode of operation of
point number automatically created under the this input point. You can define additional cali-
Mercury Input Points. bration by using the Input Point Calibration
tab in Mercury Facility; see page 153 for
Query String – This value is used with message details.
filtering; see Define Query String Filters on
page 225. Debounce Scan Count – Select the number of
consecutive input scans that must agree, before
Status – Select Enable to report all input point a change of state is reported. Each scan period
changes of state. Select Disable if you do not is 16.7 milliseconds.
want these changes reported.
Hold Time – Select the number of seconds (2 to
15) to hold a higher priority status before a
Alarm Options Tab
lower priority status is reported. Select 0 to
prevent any hold time.

Monitor Point Number – Displays the internal


Mercury monitor point number associated
with this input point. Used for diagnostic pur-
poses only.

Log Type – Select one of the following log


types that are used for status notifications:

 All – logs all status change.


 No Change-of-State – does not log any con-
tact changes of state when the input point is
Alarm options are described in detail on
in suppression mode.
page 83.
 No Fault-to-Fault – in addition to the No
Change-of-State log type, this log type does
Mercury Tab
not log any contact changes of state if the
Since Mercury Input Points (automatically contact’s fault to fault status changes, when
created for Mercury terminals) are not config- the input point is in suppression mode.
urable, use this tab to define parameters asso-
ciated with those input points. Mode – Select one of the following entry and
exit delay modes:

 Normal – if there is no entry or exit delay.


 Non-latching – if the input point goes into
alarm state and then immediately returns to
the secure state (within the entry delay),
then the alarm would not go off. This trans-
action is not reported to the Alarm Monitor.

24-10832-194 Rev. E
176 CHAPTER 2
Configuring the System

 Latching – if the input point goes into alarm, To Configure Mercury Outputs
regardless if the input point is secure, the
alarm goes off, (unless the input point is 1. In the System Configuration window,
suppressed). This transaction is reported to expand the terminal that contains the out-
the Alarm Monitor and the Real Time List. put you wish to configure.
2. Expand Output Points, then expand
Entry Delay – Enter the time in seconds (from 0 P2000 Output Points and click Add. The
to 65,535) that the system delays reporting an Edit Mercury Output Point dialog box
entry. This value must be 0 if the entry/exit opens.
Mode selected before is Normal.

Exit Delay – Enter the time in seconds (from 0


to 65,535) that the system delays reporting an
alarm after the input point is unsuppressed.
This value must be 0 if the entry/exit Mode
selected before is Normal.

Configure Mercury Outputs

Mercury outputs are provided to trigger exter-


nal devices, such as lights and sirens, or can be
activated in response to access transactions,
such as controlling a door strike or shunting an 3. If you use partitions, select the appropriate
alarm. Partition that has access to this output
point.
The system automatically creates two sets of
terminal output points under the selected ter- 4. If you use partitions, click Public if you
minal: P2000 Output Points and Mercury Out- want this output point to be visible to all
put Points. The terminal hardware type deter- partitions.
mines the available number of output points on 5. Enter a descriptive Name for the output
both sets. point.
As in the input point configuration, you cannot 6. Select the output point Number. This num-
add or delete Mercury Output Points; those ber is always associated with the output
output points are associated with other Mer- point number automatically created under
cury components, such as P2000 general out- the Mercury Output Points.
puts or Elevator Floor outputs. 7. The Query String value is used with mes-
sage filtering; see Define Query String Fil-
The System Configuration window displays
ters on page 225.
the following icons associated with Mercury
output points: 8. From the Status drop-down list, select
Enable if you wish to allow the output
point to be activated or deactivated.
9. The Control Point Number displays the
internal Mercury control point number
associated with this output point. Used for
diagnostic purposes only.

24-10832-194 Rev. E
177

10. Select one of the following Drive Modes 14. If the Active State is Flash, enter the fol-
that define the output point behavior upon lowing parameters:
activation:  On Time – to toggle the output point on
 Normal – This mode sets the output for the time specified here.
point if the output state is Active, and  Off Time – to toggle the output point off
resets the output point if the output state for the time specified here.
is Inactive.
 Repeat Count – the number of times to
 Inverted – This mode resets the output repeat the flash cycle.
point if the output state is Active, and
15. When you finish with all the entries, click
sets the output point if the output state is
OK to save your settings.
Inactive.
11. Select one of the following Offline Modes
that define the output point state when the Aperio Locks Particularities
terminal goes offline:
 Doors connected to Aperio devices cannot
 No Change – The output state does not be unlocked using Door Control, Control
change. All Doors, or Real Time Map applications.
 Inactive – Resets the output point when  Doors connected to Aperio devices cannot
the output drive mode is Normal, and be controlled using Mercury Procedures
sets the output point when the output and Triggers.
drive mode is Inverted.  Some Aperio devices that are configured
 Active – Sets the output point when the with the Card and PIN Required option,
output drive mode is Normal, and resets do not grant access after presenting a valid
the output point when output drive badge and PIN code. After presenting the
mode is Inverted. badge, there is a 2-3 second window in
12. Select one of the following Active States which the Aperio lock does not accept any
that are used with the Preset command in key presses. As a general recommendation,
the Output Control application: wait until you see the red LED light up
before entering the PIN. In Allow PIN
 Reset – to reset the output point.
before Badge mode, wait to present your
 Set – to set the output point. badge until the red LED has flashed 3 times
 Flash – to toggle the output point on and after you enter your PIN followed by the #
off with the specified On Time and Off sign. This also takes about 2-3 seconds.
Time pattern. Also, some locks require that you enter the
 Timed – to turn on the output point for asterisk key (*) key after the PIN code
the specified time entered in the Dura- instead of the pound key (#).
tion field.  The Door Override feature is not available
13. If the Active State is Timed, enter the for Aperio locks. It is also not available at
Duration in seconds that the output point the door, that is, the door cannot be overrid-
is turned on. den by keying in a number of minutes.

24-10832-194 Rev. E
178 CHAPTER 2
Configuring the System

Schlage ENGAGE Particularities  A Magnetic Tamper soft alarm is generated


when there is a sudden and extreme increase
 The integration with Schlage ENGAGE in the magnetic field near the wireless door
devices requires using Mercury firmware sensor. While the Magnetic Tamper is in the
version 1.22 and the latest Schlage Short condition (only Short and Secure con-
ENGAGE Gateway firmware version. ditions are reported), the lock continues to
 Commissioning a Schlage ENGAGE lock behave normally with the exception of Door
for the first time requires downloading and Position Sensor related features; for exam-
installing the ENGAGE mobile app onto ple, alarms may be generated reporting
your iOS or Android device. Refer to the Forced Door or Propped Door conditions,
installation instructions that are provided and in some cases the door status may be
with your equipment. Thereafter, you will reported as open. You must use the
continue to use the ENGAGE mobile app to ENGAGE mobile app to recalibrate the
log in to connect to the locks. The Door Position Sensor to correct the mag-
ENGAGE mobile app is used to configure netic tamper condition.
the locks, configure the gateway, and for  A Schlage ENGAGE door requires two ter-
maintenance. minals, one for the Lock and one for the
 Be aware that every time you use the designated Gateway. On an EP2500 panel,
ENGAGE mobile app to connect to the the terminal numbers to use for the Locks
lock, the Radio Problem soft input point are 1 to 64, for the Gateways use 65 to 128.
goes into the Alarm state. When you dis- On an EP1501 panel, the terminal numbers
connect the ENGAGE mobile app from the to use for the Locks are 1 to 17, for the
lock the soft input point goes into the Gateways use 18 to 25.
Secure state.
 Connecting the ENGAGE mobile app to an
ENGAGE gateway causes the Terminal Note: Schlage ENGAGE Gateway terminals do
Tamper soft input point to go into Alarm. not count toward the maximum number of termi-
Disconnecting the ENGAGE mobile app nals allowed under EP1501 or EP2500 panels.
from the ENGAGE gateway causes it to go
into the Secure state.  We recommend planning for each Schlage
 A Radio Problem soft input point also goes PIM bus addressing schema ahead of time.
into the Alarm state to indicate the lock’s Locks, gateways, and PIM400-485 can all
battery has reached a critically low level, share the same Schlage PIM bus. On the
which causes the lock to lose communica- Schlage PIM bus not only device addresses
tion with the gateway. It is therefore import- matter, but also the Schlage door numbers,
ant to replace the batteries as soon as also known as Wireless Access Point Mod-
possible after a Low Battery soft input point ule (WAPM) numbers. WAPM number 170
goes into the Alarm state, as there is no cannot be used. When configuring the
additional warning whenever the battery Schlage Door Numbers via the Schlage
level goes critically low. tools, always avoid a Low Door High Door
 The Strike Mode and Strike Time settings range that stretches across WAPM number
that are configured using the ENGAGE 170.
mobile app are overwritten by settings con-
figured in the P2000 software.

24-10832-194 Rev. E
179

 The terminal Address field of a Schlage The following table provides the different
ENGAGE Lock must be set to the Address OSDP reader messages displayed on the LCD
on an already existing Schlage ENGAGE and under what circumstances each message
Gateway under the same panel and the displays:
same RS-485 bus.
LCD Message Displays when ...
 The terminal Index field (1 to 10) of a
Schlage ENGAGE device refers to the rela- Ready the reader is in Card Only or Card
and PIN Required mode and is
tive number of the door on this module. waiting for a badge to be presented.

 You should become familiar with the LED Unlocked the reader is in Override mode.
Lockout the reader is in Disable Reader, no
Indicator Guide, which explains the differ- REX or in Locked (No Access, REX
ent LED colors and blink sequences. Refer Active) mode.
to the instructions provided with your Access Denied the reader signals Access Deny.
equipment. Access Granted the reader signals Access Grant or
Unlocked for Access Time.
 Be aware that a Magnetic Tamper alarm is Enter Badge the reader is in Card and PIN
reported on the Web UI as a Forced Open Required mode and is waiting for
the badge after the PIN was
alarm with an alarm condition of Trouble. entered.
Enter PIN the reader is in Card and PIN
Required mode and is waiting for
OSDP Reader Particularities the PIN to be entered. For each key
pressed, an asterisk is shown after
the question mark.
P2000 supports OSDP readers connected to Next Request the reader uses the Two Badge
MR50, MR52, MR51e, EP1501, and EP1502 Access feature and is waiting for
the second badge.
Mercury devices.
Enter Next PIN the reader uses the Two Badge
Access feature and is waiting for a
 Only one OSDP reader can be connected to PIN to be entered for the second
a single Mercury device reader port. The badge
... the reader is offline to the Mercury
OSDP reader must be set to address 0, device.
except the second reader on EP1501, which
must be set to address 1. The baud rate is
fixed to 9600 Baud. In addition to the messages described in the
table above, the LCD shows the current time
 P2000 does not signal any reader offline of the day in AM/PM format.
condition for OSDP readers connected to
Mercury devices.
 P2000 does not support biometric template
information transfer using OSDP readers.

24-10832-194 Rev. E
180 CHAPTER 2
Configuring the System

Configure Mercury Procedures and


Triggers

You can set up terminals, inputs, or output


points to activate specific actions based on
input points or time zones changes of state.

Mercury Procedures and Triggers affect only


the panel for which they are configured. Trig-
gers define the actions (procedures) that must
be performed when the specified Trigger Cate-
gory selected changes state.

For example, you can define triggers that sup- 5. Enter a descriptive Procedure Name.
press an input point, activate or deactivate an 6. Click Public to allow all partitions to see
output point, or temporarily change the reader this procedure.
mode of operation whenever a specified time
zone becomes active or inactive. 7. The Query String value is used with mes-
sage filtering; see Define Query String Fil-
ters on page 225.
Configuring Procedures
8. Click Add. The action number automati-
Procedures allow you to define a sequence of cally displays in the No. column.
actions that can be executed based on the 9. Select the row, click the corresponding
selected trigger category. For example, a pro- Group field, and select a group number
cedure could unlock a door, suppress an alarm, from 1 to 4. Only actions that belong to the
and then turn on the lights. You can create sev- group selected in the Mercury Trigger defi-
eral actions within a procedure that can occur nition will be activated.
in the order they are defined.
10. Click the corresponding Category field
and select Terminal, Input, Output, or
To Configure a Procedure Timezone. The choices in the Type, Value,
and Details columns determine how the
1. In the System Configuration window, terminal, input, output, or timezone
expand Panels to display the panel types. behaves upon activation. The following
2. Expand Mercury Panels to display all table describes all possible action types.
Mercury panels configured in the system.
3. Expand the panel for which you wish to
define a procedure. Note: The Timezone procedure category
allows a reader terminal behavior to be controlled
4. Select Procedure and click Add. The Mer- by a predicted time schedule, such as a coming
cury Procedure Edit dialog box opens. snow storm, for more information see How to
Interrupt a Normal Door Schedule on page 190.

24-10832-194 Rev. E
181

Category Type Value Details


Terminal Open for Access Time – unlocks the
door for the amount of time set in the
Access Time field defined for the Termi-
nal.
Set Reader Mode – sets the reader Card Only – a card is required for access.
mode of operation to the option selected Card with PIN – a card and a PIN are
in the Value field. required for access.
Disable, REX Off – the reader is disabled;
Note: The Reader Mode selected here is request to exit is not allowed.
in effect until it is changed either through Lock, REX On – the reader is locked;
Mercury Terminal, Door Control, Host request to exit is allowed.
Events, or Web UI Maps. Unlock – the reader is unlocked.
Suppress Forced Door – activates or On
deactivates the forced door suppression, Off
according to the option selected in the
Value field.
Suppress Propped Door – activates or On
deactivates the propped door suppres- Off
sion, according to the option selected in
the Value field.
Temporary Set Reader Mode – tempo- Card Only – a card is required for access. Enter the
rarily sets the reader mode of operation Card with PIN – a card and a PIN are temporary
to the option selected in the Value field. required for access. duration in
Disable, REX Off – the reader is disabled; minutes to
request to exit is not allowed. set the
Lock, REX On – the reader is locked; reader mode.
request to exit is allowed.
Unlock – the reader is unlocked.
Input Suppress – activates or deactivates the On
input point suppression, according to the Off
option selected in the Value field.
Output Activate – activates the output point.
Deactivate – deactivates the output
point.
Flash – toggles the output point on and On Time
off during the specified On Time and Off Off Time
Time selected in the Value field. You Repeat Count
must also enter the number of times to
repeat the flash cycle.
Timed Pulse – turns on the output point Enter the number of seconds the output
for the specified number of seconds point shall be on.
entered in the Value field.
Timezone Activate – activates the selected time
zone.
Deactivate – deactivates the selected
time zone.
Release – returns the selected time zone
to its scheduled setting.

24-10832-194 Rev. E
182 CHAPTER 2
Configuring the System

11. Click the corresponding Item field and 5. Enter a Name to describe the function of
select the name of the terminal, input, or the trigger.
output. 6. Click Public to allow all partitions to see
12. If you wish to add additional actions to the this trigger.
procedure, click Add and repeat the previ- 7. The Query String value is used with mes-
ous steps. sage filtering; see Define Query String Fil-
13. The actions within a procedure are exe- ters on page 225.
cuted in the order they are added. If you 8. Click Enabled to allow the system to per-
wish to change the sequence of the actions, form the trigger.
select the action line and click Up or
Down. 9. Select the Time Zone during which this
trigger is operational. If you select
14. Once you define your actions, click Apply <always enabled>, this trigger is always
or OK to save the Procedure. operational.

Configuring Triggers
Note: If you set the Time Zone to a time zone
Triggers are defined to detect a specific trans- defined as “Never,” the trigger is never opera-
action, such as a time zone or input point tional. If you set the Time Zone to a time zone
change of state, and to invoke a procedure that defined as “8 to 5,” the trigger is only operational
in turn executes a list of actions. from 8:00 to 5:00. Therefore, when triggering on a
time zone going active or inactive, we do not rec-
ommend using the same time zone to make the
To Configure a Trigger trigger operational, as you will miss either the
activation or the deactivation. When triggering on
1. In the System Configuration window, a time zone, we recommend to set the Time Zone
expand Panels to display the panel types. field to <always enabled>.
2. Expand Mercury Panels to display all
Mercury panels configured in the system. 10. Select from the Category drop-down list if
3. Expand the panel that contains the trigger the trigger is to be activated by Access
you wish to configure. Granted transactions, Door Status
(alarm), Door Status (secure), Input
4. Select Trigger and click Add. The Mer- Point changes, or Timezone transitions.
cury Trigger Edit dialog box opens.
11. If you select Access Granted, the Any
Access Grant Type displays by default
indicating that the trigger is to be activated
upon any access grant operation.
If you select Door Status (alarm), select
from the Type drop-down list if the trigger
is activated when the door status is Forced
Open, Forced or Propped Open (only first),
Forced then Propped Open, Propped Open
(always), or Propped Open (only after nor-
mal access cycle).

24-10832-194 Rev. E
183

If you select Door Status (secure), select 14. Select a Group number from 1 to 4. Only
from the Type drop-down list if the trigger actions that belong to this group can be
is activated when the door status is Door triggered.
Closed, Door Opened, Forced Open Can- 15. Click Apply to save the Trigger informa-
celled, Forced or Propped Open Cancelled, tion.
Open Pre-Alarm Only, or Propped Open
Cancelled. In the following example, the procedure pro-
vides access to the cleaning crew. First, the
If you select Input Point, select from the
door alarm is suppressed, the door is unlocked,
Type drop-down list if the trigger is acti-
and the lights turn on. These three actions
vated when the input goes into Alarm,
belong to Group 1.
Fault, or Secure state.
If you select Timezone, select from the The defined trigger specifies that all three
Type drop-down list if the trigger is acti- actions in Group 1 will be triggered when the
vated when the time zone becomes Active selected time zones becomes active.
or Inactive.
You can create another trigger that includes the
12. Select from the Item drop-down list, the defined Group 2 actions, and that will be trig-
name of the door, input point, or time zone gered when the selected time zone becomes
that activates the trigger upon change of inactive.
state.
13. Select the Procedure that contains the
actions that can be activated when the
selected item changes state.

24-10832-194 Rev. E
184 CHAPTER 2
Configuring the System

Configure Mercury Elevators Output and Input Point Chain Rules

The Mercury elevator integration is a low level The Mercury elevator control requires that you
interface that allows you to configure one out- configure one physical output for each elevator
put for each floor. If you select floor tracking, floor. If floor tracking is enabled, you must
you must also configure one input for each also configure one physical input for each ele-
floor. vator floor.

Input and output points are selected by picking All input and output points used for an elevator
terminal boards. The start point can be selected must be continuous. That means that if floor 1
on the first board only. Each subsequent board uses output point 1, floor 2 must use output
must start on point one. point 2. Output point 2 cannot be used for any
other purpose.
The Mercury elevator integration supports up
to 128 floors, and each elevator must be To support the desired number of elevator
defined with a minimum of two floors. floors, you may need to chain the points from
one terminal board to the next. You must fol-
User experience varies depending on floor low specific rules when chaining points, which
tracking selection: is done on the Output Board and Input Board
 Without floor tracking, elevator users can tabs. Note that the same rules apply to chaining
select more than one floor per access grant. both output and input points.
The system does not keep any records of If you need more output or input points to sup-
what floors were selected. port the number of elevator floors that are on
 With floor tracking, elevator users can only the terminal you started with, those extra ter-
select one floor at a time. The system keeps minals are called additional terminals.
records of which floor was selected.

When defining access groups for Mercury ele- Starting the Output Point/Input Point Chain
vators, the readers in the access group are auto-
matically assigned the default timezone of the  Any terminal on the panel that has spare
access group. Floor masks are also assigned to points can be used to start the chain.
the default timezone.  Before you define the number of the starting
point for the chain, make sure that either
The Mercury elevator integration allows you to enough consecutive points are available to
configure and control one or more Mercury support the number of defined floors or that
elevators at a facility. all of the points to the end of the board are
available.
Before you can configure Mercury elevators,
you must configure the Mercury panels and
terminals that are to be part of the elevator sys-
tem.

24-10832-194 Rev. E
185

Using Additional Terminals 5. Enter a descriptive Name for the Mercury


elevator.
 Additional terminals cannot be associated
with the terminal whose SIO number is 0. 6. Click Public to allow all partitions to see
the elevator.
 The first output/input point must be avail-
able. 7. The Panel field displays the name of the
Mercury panel for which you are configur-
 The number of consecutive, available
ing the elevator.
points, starting from the first point, must
match at least the lower of: 8. The Number of Floors field displays two
 the number of floors that need to be floors by default. You can change the num-
associated with a point ber of floors by entering the desired num-
ber and clicking Update. The list on the
 the number of physical points on the Floor tab displays the defined number of
board. floors.

Note: A point is considered available if it is cur- Note: The list box displays the floor names as
rently unused or is currently used for the elevator configured in the Floor Name Configuration dia-
you are configuring. log box; see Defining Floor Names on page 197.

To Configure Mercury Elevators 9. The Query String value is used with mes-
sage filtering; see Define Query String Fil-
1. In the System Configuration window, ters on page 225.
expand Panels to display the panel types. 10. Click Floor Tracking to keep track of
2. Expand Mercury Panels to display all floor selection.
Mercury panels configured in the system.
3. Expand the panel for which you wish to
configure the elevator. Note: You must select Floor Tracking to com-
plete the Input Point settings in the Mercury Ele-
4. Select Elevators and click Add. The Mer- vator Floor Configuration dialog box and to
cury Elevator Configuration dialog box access the Mercury Elevator Input Board Selec-
opens. tion.

11. Select the Reader that provides the eleva-


tor access. You can only select Mercury
readers that are defined as Single. See
Reader Tab on page 165 for details.

Note: After you select the reader and save the


elevator configuration, the Reader Configuration
in the Reader tab of the Mercury Terminal dis-
plays Elevator with feedback or Elevator with-
out feedback, depending on whether you
selected the Floor Tracking option.

24-10832-194 Rev. E
186 CHAPTER 2
Configuring the System

6. The Mercury Output field displays the


Note: Deleting an elevator or modifying the
associated reader requires a download to the
terminal name and output point number
affected panel of all access groups associated assigned to the floor. This is based on the
with that reader. information in the Output Board tab; see
page 187 for details.
7. Select one of the following Drive Modes
Configuring Mercury Elevator Floors that define the output point behavior upon
activation:
1. In the Mercury Elevator Configuration dia-
log box, select the Floors tab. The list box Normal – Sets the output point if the output
displays the defined number of floors. state is Active, and resets the output point
if the output state is Inactive.
2. Select a floor from the list and click Edit.
The Mercury Elevator Floor Configuration Inverted – Resets the output point if the
dialog box opens. output state is Active, and sets the output
point if the output state is Inactive.
8. Select one of the following Offline Modes
that define the output point state when the
terminal goes offline:
No Change – The output state does not
change.
Inactive – Resets the output point when the
output drive mode is Normal, and sets the
output point when the output drive mode is
Inverted.
Active – Sets the output point when the out-
put drive mode is Normal, and resets the
output point when output drive mode is
Inverted.
3. The Number field displays the number of 9. The Mercury Input field displays the ter-
the floor being configured. minal name and input point number
4. The Floor Name field displays the name of assigned to the floor. This is based on the
the selected floor. You can select a differ- information in the Input Board tab; see
ent floor from the drop-down list. page 187 for details. This field may display
<Floor Tracking Disabled> if Floor
5. Select the Public Access Timezone that
Tracking is not enabled for the elevator.
was defined to allow cardholders to access
the floor without presenting their badge at 10. Select the Calibration that provides the
the reader. If you select <None>, then a predefined mode of operation of the input
badge is always required to access the point.
floor. 11. Enter in the Debounce field the number of
consecutive input scans (0 to 15) that must
agree before a change of state is reported.
Note: This is any time zone that was assigned Each scan period is 16.7 milliseconds. The
to the Mercury panel. default is 4. Use a higher setting if you are
seeing noise induced reports.

24-10832-194 Rev. E
187

12. In the Hold Time field enter a hold time in


Note: The list box displays all defined output
seconds (2 to 15) to hold a higher priority boards, including the total number of points on
status before a lower priority status is each board, and the total point count.
reported. Enter 0 to prevent any hold time.

Configuring Mercury Elevator Outputs Configuring Mercury Elevator Inputs

Use the Output Board tab to define the chain Use the Input Board tab to define the chain of
of terminals that identify the output points terminals that identify the input points used for
used for the elevator floor. See Output and the elevator floor. See Output and Input Point
Input Point Chain Rules on page 184 for more Chain Rules on page 184 for more informa-
information. tion.

1. In the Mercury Elevator Configuration dia- 1. In the Mercury Elevator Configuration dia-
log box, select the Output Board tab. log box, select the Input Board tab.
2. Click Add to add an output board. The 2. Click Add to add an input board. The Mer-
Mercury Elevator Output Board Configu- cury Elevator Input Board Configuration
ration dialog box opens. dialog box opens.

3. Select an Output Terminal Name. 3. Select an Input Terminal Name.


4. Select the First Board Start Point num- 4. Select the First Board Start Point num-
ber. This number is always assigned to the ber. This number is always assigned to the
lowest floor number. lowest floor number.
5. The Output Points Available field dis- 5. The Input Points Available field displays
plays the number of available output points the number of available input points on the
on the selected terminal. This number is selected terminal. This number is deter-
determined automatically and must be suf- mined automatically and must be sufficient
ficient to support the number of defined to support the number of defined floors.
floors. 6. Click OK to return to the Mercury Eleva-
6. Click OK to return to the Mercury Eleva- tor Configuration dialog box.
tor Configuration dialog box. 7. You can use the Up or Down buttons to
7. You can use the Up or Down buttons to change the order of the input terminals, if
change the order of the output terminals, if necessary.
necessary.
Note: The list box displays all defined input
boards, including the total number of points on
each board, and the total point count.

24-10832-194 Rev. E
188 CHAPTER 2
Configuring the System

Best Practices 3. If you select Card Only as the Default


Reader Mode in the Reader tab of the ter-
This section provides a description of how to minal configuration (see Reader Tab on
accomplish common tasks associated with page 165 for details), you must enter your
Mercury components. credentials at the keypad reader by press-
ing the * key, enter the Facility Code, enter
How to Override a Reader Based on a the Card ID, and press the # key.
Time Zone The Facility Code and the Card ID must be
filled up with leading zeros to match the
Follow the instructions provided in Configure
number of digits specified in the format
Mercury Procedures and Triggers on page 180.
defined in step 1.
Also, see How to Change Reader Mode Based
on Time Zone Change of State on page 189.

Note: A Facility Code may be absent if the card


How to Use Card ID using a Keypad format was defined without it.
Reader

To authenticate a user via an entered Card ID 4. If you select Card and PIN Required as the
at a Mercury keypad reader, the following con- Default Reader Mode in the Reader tab of
ditions must be met. the terminal configuration (see Reader Tab
on page 165 for details), you must enter
1. You must define a card format with a your credentials at the keypad reader by
Function value of Magnetic Stripe (even if pressing the * key, enter the Facility Code,
you are using a Wiegand reader). enter the Card ID, press the # key, and
This card format defines how many digits enter the PIN number.
need to be entered for the facility code, and The Facility Code and the Card ID must be
how many digits need to be entered for the filled up with leading zeros to match the
Card ID. If no facility code is entered, the number of digits specified in the format
card format uses a Facility Code value of defined in step 1.
-1. See Card Format Tab on page 154 for
If the PIN has fewer digits than specified in
details.
the General Tab in Site Parameters, the #
2. You must select the Card ID format in the key must be pressed after the PIN is
Card Type tab of the terminal configura- entered (you cannot enter PIN numbers
tion; and must also select the correct Card with leading zeros).
Data Formatting (select Data1 / Data0,
Wiegand Pulses for Wiegand readers; or
select Trim Zero Bits and Format To Nibble Note: A Facility Code may be absent if the card
Array for Magnetic Stripe readers). See format was defined without it.
Card Type Tab on page 169 for details.
It is possible to combine the Card ID for- 5. The Allow PIN before Badge option in the
mat with other badge based formats at the Access tab has no effect in the operation of
same reader; however, some combinations Card ID and PIN. The required sequence is
may not be operational. Contact Technical always as specified in step 4.
Support for instructions if you need to use
a specific combination.

24-10832-194 Rev. E
189

How to Save Data to the Mercury Panel  Item: select the name of the time zone that
in the Event of Power Loss activates the trigger upon change of state.
Ensure that all three of the following require-  Procedure: select the name of the pro-
ments are met for all Mercury panels: cedure defined in Step. 1.
 Group: make appropriate selection.
1. The on-board coin cell is electrically con- This number must match the Group
nected and the isolation strip is removed. number defined in the Procedure.
2. The firmware version is 1.18.7, 1.19, or
In the previous example, the selected terminal
1.22, as displayed in the Panel Details of
unlocks every time the selected time zones
the System Status window.
becomes active or inactive, depending on your
3. The following Auto-Save settings in the selection.
Mercury Configuration Manager are
enabled:
How to Delay the Override of a Reader
 Restore from the last saved settings Based on an Active Time Zone until the
 Auto Save is enabled First Valid Card is Presented
 Delay before save is 30 seconds Use the following procedure to avoid starting
the override when no authorized person is
How to Change Reader Mode Based on present.
Time Zone Change of State
1. Follow the same steps in How to Change
1. Create a Procedure (see page 180 for Reader Mode Based on Time Zone Change
details) that includes the following param- of State and create a second trigger that
eters: includes the following parameters:
 Group: make appropriate selection.  Time Zone: select the time zone
This number must match the Group defined with an override period.
number selected in the Trigger defined
 Category: select Access Granted.
in Step 2.
 Type: select the default option Any
 Category: select Terminal.
Access Grant. This indicates that the
 Type: select Set Reader Mode. trigger will be activated upon any access
 Item: make appropriate selection. grant activity.
 Value: make appropriate selection (for  Item: select the name of the reader that
example, Unlock). will start the override when access was
2. Create a Trigger (see page 182 for details) granted.
that includes the following parameters:
Note: In paired reader mode, the leader reader
 Time Zone: select the time zone during controls the access; therefore, the override is
which the trigger is operational. Select only reported on leader readers.
<always enabled>, if this trigger is
always operational.  Procedure: select the name of the pro-
 Category: select Timezone. cedure.
 Type: select if the trigger is activated  Group: make appropriate selection.
when the time zone becomes Active or This number must match the Group
Inactive. number defined in the Procedure.

24-10832-194 Rev. E
190 CHAPTER 2
Configuring the System

How to Interrupt a Normal Door Option 1: Define specific time periods


Schedule

Note: Interrupting a normal schedule is possi-


ble by using Mercury panels’ capability that
allows times zones to be overridden within a con-
troller.

The following instructions are provided for sit-


uations in which a facility or a section in a
facility must be placed in a different operating A time zone defined with specific hours during specific days.
mode than during regular days, such as for a The snow day operation is active from Wednesday 4:00 PM
through Friday 8:00 AM.
snow day situation.

A snow day operating mode for example, may


be scheduled in advance and may have a preset Option 2: Define entire days as snow days
duration. For example, an operator may decide
on Monday that as of Wednesday through Fri-
day the building will operate in snow day
mode. If on Thursday the conditions have
improved, the building can go back to normal
operating mode immediately.

To Prepare the System for a Snow Day

You must prepare the system for a snow day


operating mode that includes doors that should
not be in override during snow days, and doors
that should provide access to a more limited
population.

Note: You need to define a procedure that


overrides normal access, and define triggers that
change that normal access based on time zone
changes, for more information see How to
Change Reader Mode Based on Time Zone
Change of State on page 189.

To Configure a Snow Day Schedule

Use the Time Zone application to configure


for example, a Snow Day Time Zone that
includes the appropriate time periods of the
A time zone that uses the Holiday feature to define entire
anticipated snow days. This can be done sev- days. The snow day operation is active from 12/14/2016
eral days in advance or during the snow day. 12:00 AM through 12/16/2016 11:59 PM.

24-10832-194 Rev. E
191

To Create a Snow Day Procedure  Type: select Release to return the time
zone to its normal schedule setting.
1. Create a Procedure (see page 180 for
 Item: select the name of the time zone
details) that includes the following param-
that normally overrides the doors.
eters:
 Group: select a group number. This
number must match the Group number To Create a Snow Day Start Trigger
selected in the Trigger defined in To
1. Create a Trigger (see page 182 for
Create a Snow Day Start Trigger.
details), that includes the following param-
 Category: select Timezone. eters:
 Type: select Deactivate to interrupt the  Time Zone: select the time zone during
normal door schedule. which the trigger is operational. Select
 Item: select the name of the time zone <always enabled>, if this trigger is
that normally overrides the doors. always operational.
2. Click Add to add a second action to the  Category: select Timezone.
procedure and that includes the following  Type: select Active to indicate that the
parameters: trigger is activated when the time zone
 Group: select a group number. This becomes active.
number must match the Group number  Item: select the name of the time zone
selected in the Trigger defined in To created for the snow day mode, Snow
Create a Snow Day Stop Trigger. Day Time Zone for example.
 Category: select Timezone.

24-10832-194 Rev. E
192 CHAPTER 2
Configuring the System

 Procedure: select the name of the pro-  Unless the Holiday feature is used to
cedure defined in To Create a Snow Day declare a snow day, it is important to
Procedure. remove any active periods from the snow
 Group: select the group number defined day time zone after the condition has
in step 1 of To Create a Snow Day Pro- cleared. Otherwise, seven days later the
cedure. building will go into the different operating
mode again.
 Unless the Holiday feature is used to
To Create a Snow Day Stop Trigger
declare a snow day, snow days may be
1. Create a second Trigger with the following scheduled at most one week in advance.
parameters:
 Time Zone: select the time zone during What to Do When Relocating a Mercury
which the trigger is operational. Select Panel
<always enabled>, if this trigger is If you install a Mercury panel that was previ-
always operational. ously configured for a different site or location,
 Category: select Timezone. you must use the panel’s Bulk Erase Configu-
 Type: select Inactive to indicate that the ration Memory function to reset the panel to
trigger is activated when the time zone factory conditions. This prevents the P2000
is no longer active. system from processing transaction messages
that are not applicable to the panel’s current
 Item: select the name of the time zone use. Refer to your panel’s hardware installation
created for the snow day mode, Snow manual for details on the Bulk Erase Configu-
Day Time Zone for example.
ration Memory function.
 Procedure: select the name of the pro-
cedure defined in To Create a Snow Day
What to Do When Changing an MR51e
Procedure.
IP Address
 Group: select the group number defined
in step 2 of To Create a Snow Day Pro-  If you change the IP address using the
cedure. P2000 Mercury Terminal Edit application,
the MR51e goes offline. If you change this
field again back to the correct IP address,
Additional Notes you must download all items to the panel
with the Reset Panel Before Download
 The interruption of a normal door schedule flag selected to return the MR51e to normal
does not apply to badges with executive operation.
privileges.
 If you change the IP address using the MSC
 The snow day time zone must take into MR51e Address Configuration Tool before
account P2000 holidays. For example, if changing the IP address using the P2000
Wednesday through Friday are configured Mercury Terminal Edit application, when
to be snow days, and Thursday is a Holiday the MR51e is reset to begin the IP address
of Type 1, that holiday type needs to also be change (using its S2 push button), the
configured as active in the snow day time MR51e goes offline. You must download all
zone. items to the panel with the Reset Panel
Before Download flag selected to return
the MR51e to normal operation.

24-10832-194 Rev. E
193

P2000 Badge Format Every parity bit position entered in the


Format Layout box is automatically
The P2000 software offers the flexibility of added to the Parity Definition list where it
defining badge formats to be used at readers needs to be defined. See To Define Parity
that support different formats. You can create a Bits for details.
new badge format, load an existing format, or
load and modify an existing format to create a 5. Click Invert Bits if the bits are to be
new one. inverted when the raw badge format is pro-
cessed by the P2000 system.
6. Click Details to see bit locations for card
To Create P2000 Badge Formats
number, facility code, and issue level. Edit
1. From the P2000 Main menu, select Con- the text in the box only if you need to
fig>P2000 Badge Format. The P2000 reverse the order of the bits when they are
Badge Format dialog box opens. processed by the P2000 system.
For example, if the raw card number bits
are 15-34, and they must be reversed, enter
34-15.

Note: You cannot use this window to change


bits allocation as defined in Format Layout.

2. Enter the Format Name of the badge.


3. The Total Bits displays the total number of
bits in the format.
7. Click OK to close Format Details.
4. In the Format Layout box specify the lay-
out of the bits on the badge:
To Define Parity Bits
P: Bits allocated to parity
N: Bits allocated to card number 1. Select an item from the Parity Definition
I: Bits allocated to issue level box and click Edit. The Edit Parity dialog
1: Fixed bit of 1 box opens.
0: Fixed bit of 0
For example, starting the format with PP
indicates that the first two bits are allo-
cated to parity.

24-10832-194 Rev. E
194 CHAPTER 2
Configuring the System

1. In the P2000 Badge Format dialog box


click Add in the Decode box. The Add
Decode Rule dialog box opens.

2. In the Parity Mask field enter the bits that


are used to calculate parity.
3. Click Even or Odd to specify parity type.
2. Specify the rule to be used by the P2000
4. Click OK to save the changes and to close software for decoding raw card format. To
Edit Parity. enable condition fields click If.
5. To delete parity definitions, select an entry The Bs indicate the values returned from
from the list and click Delete. the badge reader, while the Ps indicate the
values as displayed in the P2000 user inter-
face.
Note: Delete a parity definition only if you have
removed the corresponding parity bit from the 3. Click OK to close Add Decode Rules.
Format Layout box.
To Add Encoding Rules
6. Once all parity positions are defined, click
Up or Dn to change the order in which the Encoding rules are used to convert the P2000
parity is calculated. badge number, facility code, and issue level
into a single number for a badge reader.
For example, if parity in position 1 uses in
its calculation the value of parity in posi- Each encoding rule must match a decoding
tion 35, then it must be listed below posi- rule in reverse form. See the following exam-
tion 35. ple of a pair of matching decoding and encod-
ing rules.
To Add Decoding Rules Decoding rule: If BI = 500
Then PN = (BN+10000)
Decoding rules are used to convert a raw num-
ber received from a badge reader into the
P2000 badge number, facility code, and issue
level.

Note: For each decoding rule, you must also Encoding rule: If PI = 500
add an encoding rule that matches it in reverse Then BN = (PN-10000)
form.

24-10832-194 Rev. E
195

Follow the next steps to create an encoding


rule.

1. In the P2000 Badge Format dialog box


click Add in the Encode box. The Add
Encode Rule dialog box opens.

2. In the upper boxes enter the card number,


facility code, and issue level as would be
displayed in the P2000 interface.
3. Click To Raw Data. The bit string dis-
played in the lower box should be a valid
raw data card number.
4. Click to clear the Raw data box and enter
in it the single number as would be
received from a badge reader. The number
has to be provided in the data type
2. Specify the rule to be used by the P2000 selected.
software for encoding card format. To 5. Click To 2000. The card number, facility
enable condition fields click If. code, and issue level as would be dis-
The Ps indicate the values as displayed in played in the P2000 interface should
the P2000 user interface, while the Bs indi- appear in the upper boxes.
cate the values for the badge reader. 6. Click Close to return to the P2000 Badge
Format dialog box.
3. Click OK to close Add Encode Rules.
7. Click Save to save the badge format.

To Test the Badge Format 8. The Save As window opens. Enter the file
name and click Save.
1. To test the format, click Test at the bottom 9. In the P2000 Badge Format window click
of the P2000 Badge Format dialog box. Close.
The Test Format dialog box opens.

To Load/Edit Badge Format

1. From the P2000 Main menu, select Con-


fig>P2000 Badge Format. The P2000
Badge Format dialog box opens.
2. Click Load.
3. Browse for the badge format to load and
select the appropriate *.bft file.

24-10832-194 Rev. E
196 CHAPTER 2
Configuring the System

Configure Elevators and


Cabinets

The P2000 system supports the elevator and


cabinet access control using CK721-A panels.

The following sections describe how to config-


ure:

 Elevator Access Control


 Cabinet Access Control

Note: To configure elevators that use Mercury


4. Click Open. panels, see page 184.

Elevator Access Control

General Overview
The elevator access control gives you the abil-
ity to assign cardholders access to various ele-
vators and floors in your facility, through their
access groups.

Elevator floors cannot be overridden by a


Local Cardholder Override or a Timed Over-
ride, and do not allow the Auxiliary Access
input to grant access to any floors.

Also, panel card events cannot be used to con-


trol elevator floors.
5. Edit the badge format if desired.
Elevators are assigned floors and floor groups,
then these floors and floor groups are included
Note: Each modified format should be tested in access groups which are assigned to card-
before saving. holders.

The basic procedures for defining and imple-


6. Click Save. menting the elevator access control are:
7. The Save As window opens. Enter the file
name and click Save.  Defining Floor Names
 Defining Floor Masks
8. To define additional badge formats, click  Configuring Elevators
Clear and enter the new data.  Configuring Floors
9. In the P2000 Badge Format window click  Defining Floor Groups
Close.  Creating Access Groups for Elevator Floors

24-10832-194 Rev. E
197

Steps to perform each procedure are presented Executive Privilege – Badges with executive
in the following sections. To successfully privilege enable all floors of the elevator per
implement the elevator access control, config- elevator access grant. Executive privilege does
ure these steps in the order presented. not modify the floor’s granted access when
using PIN codes in Otis Compass elevators.
Basic Definitions

Valid Badge – A valid badge in this context is


Defining Floor Names
defined as a badge that is accepted by the ele- Use the Floor Name Configuration dialog box
vator’s reader with a green light. The specific to define floor names and associated index
rights of this badge are dependent on the number. Floors should be named by physical
badge’s access groups’ floor masks, so it may characteristics such as Lobby or Roof Access,
be possible that a valid badge gives no access to help identify the floor name and location
to any of the elevator’s floors. when configuring the actual elevators.
Elevator Access Grant – The valid badge’s 1. In the System Configuration window,
access groups’ floor masks determine which of expand Elevator/Cabinet Parameters to
the elevator cab’s floors are enabled by an ele- display the elevator parameters.
vator access grant. Relinquishing an elevator
2. Select Elevator Floor Names and click
access grant does not disable an elevator floor
Edit. The Floor Name Configuration dia-
that is enabled by public access or by direct
log box opens.
output control.

Direct Output Control – Each elevator cab’s


floor buttons may be enabled by direct output
control from the Server’s or the panel’s user
interface. Relinquishing direct output control
does not disable an elevator button that is
enabled by an elevator access grant or by pub-
lic access.

Access Grant Message – When a valid badge is


presented, the panel sends an elevator access
grant message to the Server, which includes
the badge’s number and cardholder name.

Override – When the reader terminal in the ele-


vator cab is overridden, the public access fea-
ture energizes all of the associated output
relays. This means, that there are no floor
tracking messages generated. Except for local
cardholder override, all modes of reader over-
ride are applicable to elevator terminals; that
is, override per timezone, per panel system The number of floors entered in the Site
override, and per the Unlock All Doors com- Parameters dialog box displays. (See Gen-
mand from the Server. Override has no effect eral Tab on page 33).
on Otis Compass elevators.

24-10832-194 Rev. E
198 CHAPTER 2
Configuring the System

3. Select the floor you wish to rename. The


floor name displays in the Floor Name
field at the bottom of the window.
4. Rename the floor accordingly and click
Insert. The new name displays and the list
of floor names moves down one position.
For example, if you rename floor 1 and
floor 2, number 3 on the list becomes Floor
1.
5. If you wish to edit a floor name, select the
floor name, rename it, then click Update.
6. If you delete a floor name, using the Delete
button, the next floor on the list moves up
one position.
3. If you use Partitioning, select the Partition
7. To restore the default floor names, click that has access to this Floor Mask. All
Defaults. available floors (for the partition selected)
8. When you finish configuring floor names, are listed on the right side of the dialog
click OK to return to the System Configu- box.
ration window. 4. If you use Partitioning, click Public to
allow all partitions to see this Floor Mask.
Defining Floor Masks 5. Enter a descriptive Name for this Floor
Mask.
You can group floors that have common access
throughout your facility and then apply them 6. From the Available Floors list, select the
as a group to associate them with physical ele- floor you wish to include in your group.
vators when configuring Floor Groups. For 7. Click <<. The floor moves to the left side
example, your facility may have three floors of the dialog box, to be included in the
that access the Operations department. When Selected Floors box.
floors are grouped, you can assign cardholders 8. To remove a floor from the Selected Floors
that should have access to the three floors to box, select the floor and click >>.
the Operations group, rather than assigning all
three floors to the cardholders individually. 9. When all floors you wish to include in the
group have been moved to the Selected
1. In the System Configuration window, Floors box, click OK. A Floor Mask icon
expand Elevator/Cabinet Parameters to for the new group is added under the Ele-
display the elevator parameters. vator Floor Masks root icon in the System
2. Select Elevator Floor Masks and click Configuration window.
Add. The Floor Mask dialog box opens.

24-10832-194 Rev. E
199

Configuring Elevators There is no prescribed scheme to associate


outputs and inputs by their address to the
Use this instructions to define the parameters
elevator’s floor buttons, but the reader and all
that operate the following elevator protocols:
outputs and inputs for an elevator must be
 Low Level Interface, see page 199. defined on the same panel. The association of
 KONE HLI, see page 202. elevators, floors, readers, outputs, and inputs is
 Otis EMS - Security / BMS, see page 203 done by defining an Elevator and then
downloading it into the panel.
 Otis Compass, see page 204.
 KONE IP, see page 208. When presenting a badge at the elevator cab’s
 ThyssenKrupp Serial, see page 213. reader, the panel searches the badge record for
 Otis EMS Serial, see page 214. floor access information. This information is
then applied to energize the output relays of
You must first select your specific protocol those floors that the person should have
type in the Panel Elevator tab, see page 59. access. It is the elevator control system’s
Refer to the CK721-A Installation and Opera- responsibility to ensure the elevator does not
tion Manual for information on connecting the go to disabled floors.
CK721-A the panel with your specific elevator
protocol. Also, make sure you perform the The enabled floors are disabled after the eleva-
Write DB to Flash function after making any tor access time has expired, unless they are
changes in Elevator Configuration. still enabled by public access or by direct out-
put control. All buttons, that are exclusively
enabled by the elevator access grant produce
Note: Mercury elevators are configured in a
different manner. See Configure Mercury Eleva- floor tracking messages.
tors on page 184 for instructions.
Low Level Interface Elevator
Low Level Interface Configuration

Low level interface elevators have readers asso- 1. In the System Configuration window,
ciated with a set of output points and an optional expand the CK721-A panel to which you
set of input points. The field panel works with wish to assign an elevator.
the elevator manufacturer’s control system 2. Select Elevators and click Add. The Ele-
using output points to enable car-call buttons, vator Configuration dialog box opens.
and input points to monitor car-call buttons.

The panel may grant access to a floor by


enabling the corresponding car-call button
when a badge is presented at a reader installed
in the elevator cab.

An elevator cab must be equipped with one


reader, and one output needs to be assigned to
every floor button in the cab that needs to be
enabled by the security system. If floor track-
ing is desired, one input needs to be assigned
to every floor button in the cab that is sup-
posed to create a floor tracking message.

24-10832-194 Rev. E
200 CHAPTER 2
Configuring the System

3. Enter a descriptive Name for this elevator. 10. If the elevator has a Fireman Override
4. Click Public if you wish the elevator to be switch, select an available input point that
visible to all partitions. has not yet been assigned to an elevator or
cabinet. The only purpose of this input
5. The Panel field displays the name of the point is to send messages to the Real Time
panel you selected from the System Con- List; it does not control Fireman Override.
figuration window.
11. If the elevator has a Service Override
6. If you wish, enter a Query String. This switch, select an available input point that
value is used with message filtering (see has not yet been assigned to an elevator or
Define Query String Filters on page 225). cabinet. The only purpose of this input
7. Select an available Reader that has not yet point is to send messages to the Real Time
been assigned to an elevator or cabinet. List; it does not control Service Override.
8. Select from the Protocol drop-down list, 12. Enter in the Access Time field, the time in
Low Level Interface. seconds (2 to 600) that cardholders have to
9. If you enable the D620 Mode option, when press a car-call button after badging at the
a badge is presented at the elevator cab’s elevator. At the time a valid badge is pre-
reader, the panel searches the badge record sented to the elevator reader, the elevator
for floor access information. The floor access time starts. The elevator access time
access information is compared with the starts over with every subsequent presenta-
floor button selection input point. If the tion of a valid badge.
floor button selection input point matches
the floor access information, then the out- Note: At the beginning of the elevator access
put (timed) point for the floor the person time certain floor buttons are enabled by the
should have access to is enabled. It is the panel outputs per elevator access grant. Subse-
elevator control system’s responsibility to quent presentation of other badges therefore may
ensure the elevator does not go to disabled enable more outputs. Only outputs exclusively
enabled by elevator access grants are disabled at
floors.
the end of the elevator access time.

13. Enable Floor Tracking if you wish the


Note: If you configure a low level elevator with panel to generate a history message identi-
D620 Mode enabled, you must create new panel
and terminal definitions. You cannot convert fying the badge number, cardholder’s
existing panels and terminals into an elevator name, elevator, and floor selected when the
application with D620 mode enabled. car-call button is pressed.
Floor tracking messages are generated only
The cab’s floor button selection must be for floors whose associated output is exclu-
made before the elevator access time has sively enabled by the elevator access grant,
expired, unless the floor call-button is and not enabled by public access or by
enabled by public access or by direct out- direct output control. A floor tracking mes-
put control. The floor car-call button that is sage is generated for each elevator input
exclusively enabled by the elevator access that experiences a transition from the nor-
grant produces floor tracking message. mal into the off-normal state during the
elevator access time; or that is in the
off-normal state at the time a valid badge is
presented.

24-10832-194 Rev. E
201

Track On Input Open – Defines the normal Elevator Protocol Maximum Floors
and off-normal states. If enabled, a floor KONE HLI 64
tracking message is generated when the Low Level Interface 128
Otis EMS - Security / BMS 128
floor’s input is open. If disabled, a floor
Otis Compass 128
tracking message is generated when the KONE IP 128
floor’s input is closed. ThyssenKrupp Serial 96

Track On Transition Only – If enabled, a Otis EMS Serial 128

floor tracking message is generated only


Follow the next steps to add the individual
when the input transitions from a normal to
floors that your particular elevator can service.
off-normal state. If disabled, a floor track-
ing message is generated when the input 1. In the Elevator Configuration dialog box,
transitions from a normal to off-normal click Add at the bottom of the window.
state and during the presentation of a valid The Floor Configuration dialog box opens.
badge while the input is in the off-normal
state.
14. Enable Timed Button to keep the access
grant at the elevator active for the specified
elevator access time, independent of any
elevator buttons being pressed. If this
option is not enabled, the access grant is
cancelled as soon as an enabled elevator 2. Select a Floor Name that has not yet been
button is pressed. It does not matter assigned to this elevator. The list displays
whether or not that enabled point is on the floors names as configured in the Floor
public access. If no button is pressed, the Name Configuration dialog box.
access grant is cancelled at the end of the
specified elevator access time. 3. The floor Number index automatically dis-
plays in the Number field. You can select
15. After you have entered all the information,
the Number first to display the associated
click OK to save your settings and return
floor name in the Floor Name field.
to the System Configuration window.
4. If configuring Low Level Interface eleva-
Continue with Configuring Floors on page 201 tors, select an available Output Point that
to add floors to your elevator definition. has not yet been assigned to an elevator or
cabinet.
Configuring Floors 5. If configuring Low Level Interface eleva-
tors, select an available Input Point that
The Floor Information box at the bottom of the has not yet been assigned to an elevator or
Elevator Configuration dialog box displays the cabinet.
associated floors active for access. See the fol-
6. Select the Public Access Timezone
lowing table for the maximum number of
defined to allow cardholders to use the ele-
floors supported by each elevator protocol.
vator without presenting their badge at the
reader. If no time zone is selected, then this
floor is not active for public access.
7. Click OK to save your settings and return
to the Elevator Configuration dialog box.

24-10832-194 Rev. E
202 CHAPTER 2
Configuring the System

KONE HLI 4. Click Public if you wish the elevator to be


visible to all partitions.
The KONE interface is a leader-follower pro-
tocol over RS232 or RS485, according to 5. The Panel field displays the name of the
KONE Elevator EPL HLI Security Protocol panel you selected from the System Con-
specification V=2.3 SO-13.20.10-KAM, with figuration window.
the CK721-A being the leader. 6. If you wish, enter a Query String. This
value is used with message filtering (see
Each panel connects to a KONE group control- Define Query String Filters on page 225).
ler with up to 8 elevators, with each elevator
serving up to 64 floors. To connect a KONE 7. Select an available Reader that has not yet
group controller to a CK721-A panel, use the been assigned to an elevator or cabinet.
RS232C B (J2) connector. 8. The Protocol field displays the elevator
protocol selected in the Panel Elevator tab.
To define a KONE elevator, the Protocol and If you wish to define a Low Level Interface
Address fields have to be defined. To define elevator, follow the instructions provided
the floors of a KONE elevator, the public on page 199.
access timezone must be defined. A floor is on
public access when the specified timezone is 9. Enter the KONE elevator Address (from 1
active. A floor is not on public access when the to 8) inside the KONE group controller.
specified timezone is inactive. This value must match the address of the
elevator group controller.
10. Enter in the Access Time field, the time in
KONE HLI Elevator Configuration
seconds (2 to 600) that cardholders have to
1. In the System Configuration window, press a car-call button after badging at the
expand the CK721-A panel to which you elevator. At the time a valid badge is pre-
wish to assign an elevator. sented to the elevator reader, the elevator
access time starts. The elevator access time
2. Select Elevators and click Add. The Ele-
starts over with every subsequent presenta-
vator Configuration dialog box opens.
tion of a valid badge.
11. Enable Floor Tracking if you wish the
panel to generate a history message identi-
fying the badge number, cardholder’s
name, elevator, and floor selected when the
car-call button is pressed.
12. After you have entered all the information,
click OK to save your settings and return
to the System Configuration window.

Continue with Configuring Floors on page 201


to add floors to your elevator definition.

3. Enter a descriptive Name for this elevator.

24-10832-194 Rev. E
203

Otis EMS - Security / BMS


Note: For new elevator installations, we rec-
The Otis Elevator Management System (EMS) ommend using the Otis EMS Serial protocol. To
update an existing Otis EMS - Security / BMS
controls up to 8 groups of elevators, each
elevator to an Otis EMS Serial elevator, select
group consisting of up to 8 elevators. It com- the Otis EMS Serial protocol in the Panel Eleva-
municates with the Building Management Sys- tor Tab, and follow the steps provided in Otis
tem (BMS) through an RS422 interface. EMS Serial Elevator Configuration on page 215.

The number of elevators, and their assignment


to elevator groups determines the number of Otis EMS - Security / BMS Elevator
CK721-A panels required. All elevators of Configuration
each single group must be handled by the same
CK721-A panel. Each CK721-A can support 1. In the System Configuration window,
multiple groups, as long as there are enough expand the CK721-A panel to which you
reader terminals for all the access points in wish to assign an elevator.
each group. 2. Select Elevators and click Add. The Ele-
When you configure the Otis EMS - Security / vator Configuration dialog box opens.
BMS elevator floors (1 to 99 floors allowed),
you must define the public access timezone. A
floor is on public access only when the speci-
fied timezone is active.

Note: When downloading elevators to a panel


running the Otis EMS - Security / BMS integra-
tion, make sure the Delete Elevators From
Panel Before Download option is not selected,
as otherwise, the temporary deletion of the eleva-
tors would temporarily disrupt communication
with the Otis EMS - Security / BMS; see
page 425 for details.

3. Enter a descriptive Name for this elevator.


Otis EMS - Security / BMS elevators may
report with a significant delay, landing num- 4. Click Public if you wish the elevator to be
bers that were selected after a badge was used visible to all partitions.
to de-secure floors. Therefore, the CK721-A 5. The Panel field displays the name of the
panel does not take any actions to re-secure panel you selected from the System Con-
those floors, as this may interfere with subse- figuration window.
quent access requests. 6. If you wish, enter a Query String. This
The CK721-A panel then re-secures the floors value is used with message filtering (see
after the configured elevator access time has Define Query String Filters on page 225).
elapsed, or when a new access request is pro- 7. Select an available Reader that has not yet
cessed that de-secures different floors. been assigned to an elevator or cabinet.

24-10832-194 Rev. E
204 CHAPTER 2
Configuring the System

8. The Protocol field displays the elevator The P2000 system provides the communication
protocol selected in the Panel Elevator tab. between the Otis Compass elevator system and
If you wish to define a Low Level Interface CK721-A panels. When a cardholder swipes a
elevator, follow the instructions provided badge, a message is routed to the Otis Compass
on page 199. elevator system for the cardholder. Based on the
operational mode, a default floor and/or a list of
9. Enter in the Access Time field, the time in authorized floors is sent.
seconds (2 to 600) that cardholders have to
press a car-call button after badging at the The Otis Compass interface requires the P2000
elevator. At the time a valid badge is pre- Server to have a dedicated network interface
sented to the elevator reader, the elevator card (NIC) connected to the Otis Compass net-
access time starts. The elevator access time work with an assigned static IP address of
starts over with every subsequent presenta- 192.168.50.250 and a mask of 255.255.255.0
with no default gateway. To configure a perma-
tion of a valid badge.
nent static network route for the Otis system, a
10. Enable Floor Tracking if you wish the static route must also be configured at the
panel to generate a history message identi- P2000 Server by issuing once the following
fying the badge number, cardholder’s command (CMD) during commissioning:
name, elevator, and floor selected when the route add -p 192.168.0.0 mask 255.255.0.0
car-call button is pressed. 192.168.50.254.

Note: The P2000 Otis Interface Service must


be running at all times if Otis Compass elevators
Note: High level elevator integrations report are being used, even during maintenance opera-
floor numbers after a badge is used to access a tions if possible, so it has the correct information
secure floor. When the floor tracking option is to send to the Otis Compass system when it is
enabled, the P2000 system creates a floor track- reactivated. To disable P2000 control of the Otis
ing message for each landing number that is Compass system for testing or maintenance
reported by the elevator system. The P2000 sys- operations, the network connection between the
tem associates the reported landing number with systems can be disconnected, but the Otis Inter-
the last person that was granted access at the face Service must be left operational on the
elevator. P2000 system.

11. After you have entered all the information, The Otis system differs from typical elevator
click OK to save your settings and return systems because the floor selection is done
to the System Configuration window. outside of the elevator cab. Access to the floor
entry keypad, called a Destination Entry Com-
Continue with Configuring Floors on page 201 puter (DEC), can be controlled by a reader
to add floors to your elevator definition. connected to a CK721-A panel, if configured
to do so. The Otis system allows operation of
the DECs in four different modes that define
Otis Compass the availability of floors and the order in which
floors and badges are presented to the system.
The Otis Compass interface is a high level
interface that uses a TCP/IP network to send Once a P2000 system is connected to an Otis
elevator commands to the Otis system, and Compass system, the P2000 system is in full
also receives historical information from the control of what each DEC is able to do. This
Otis system. means that until an elevator is defined in the
P2000 system and its access parameters are
configured, no use of the elevator is permitted.

24-10832-194 Rev. E
205

Important Notes Mode 2 – These elevators must have a reader


associated with the elevator and operate when
 Each CK721-A panel can control as many the cardholder presents a valid badge at the
DECs as it has readers configured, using a reader/DEC combination. The cardholder must
one to one mapping. present the badge before selecting a floor, if
 The P2000 system allows for the configura- the floor is authorized or allowed, an elevator
tion of public use of a DEC through the is dispatched. This is the common mode of
configuration of unsecured elevator entry operation for secured elevator entry points. To
points. configure these elevators, see Otis Compass
 The P2000 system also allows for configu- Elevator Configuration on page 205.
ration of secured entry points and the asso-
Mode 3 – Initially allows entry of a requested
ciation of access rights on a badge to those floor. If the floor is allowed, an elevator is dis-
secured entry points. patched. If the floor is not allowed, a request is
 The P2000 system supports the Otis con- made for the user to provide a badge, if the
cepts of Allowed Floors and Authorized badge presented authorizes the floor requested,
Floors through its configuration screens. an elevator is dispatched. This is the most
 The P2000 system supports the ability to common mode of operation for unsecured ele-
enter a PIN code on the DEC which is asso- vator entry points. To configure Mode 3 eleva-
ciated with a badge in the P2000 system tors, see Otis Compass Elevator Configuration
and granted appropriate access if allowed. on page 205 and Otis Unsecured Elevator
Configuration on page 207.
 The P2000 system also allows configura-
tion of Passenger Type flags and Default Mode 4 – The cardholder must present a badge
Floor for cardholders that need access to before selecting a floor; the system preselects
Otis Compass elevators. the badge’s default floor for the user, but the
 The PIN Access, Default Floor, and Passen- user has a short time to select a different floor.
ger Type settings are defined using the If the floor selected after the time-out is autho-
Badge application, see Otis Compass Ele- rized or allowed, an elevator is dispatched. To
vator Options Tab on page 255. configure these elevators, see Otis Compass
Elevator Configuration on page 205.
Otis Compass Elevator Modes In all modes, if the cardholder presents an
invalid badge or enters an illegal floor, the sys-
The Otis Compass system provides the follow- tem informs the cardholder using the DECs
ing elevator mode types: display. If the cardholder makes a valid combi-
Mode 1 – Initially allows entry of a requested nation of badge and floor selection, the system
floor or the presentation of a badge. If a card- informs the cardholder what elevator to board
holder enters a floor request, and is an allowed using the DECs display. All transactions
floor, an elevator is dispatched. If a cardholder occurring at secured elevator entry points are
presents a badge first, that badge’s default floor logged in the P2000 system.
can be used to dispatch an elevator, as long as
the default floor is an authorized or an allowed Otis Compass Elevator Configuration
floor (applies to Mode 3 also). To configure
Mode 1 elevators, see Otis Compass Elevator 1. In the System Configuration window,
Configuration on page 205 and Otis Unsecured expand the CK721-A panel to which you
Elevator Configuration on page 207. wish to assign an elevator.

24-10832-194 Rev. E
206 CHAPTER 2
Configuring the System

10. Select the Destination Entry Computer


Note: The Otis Compass integration with this
version of P2000 requires CK721-A firmware ver-
(DEC) that is associated with the MRE or
sion 3.5 or higher. DER selected, and is also associated with
the elevator reader. A DEC is a user inter-
2. Select Elevators and click Add. The Ele- face device into which the desired floor is
vator Configuration dialog box opens. entered.

Note: The MRE and DEC combination settings


must be unique throughout the system.

11. Select one of the four elevator modes pro-


vided with the Otis Compass system and
that is to be defined as the Default Opera-
tional Mode. See Otis Compass Elevator
Modes on page 205 for more information.
12. If you wish the DEC reader to operate
under different modes at different times of
the day, select for each of the Schedules (1
to 4), the Mode that will be active during
the associated Timezone selected.
3. Enter a descriptive Name for this elevator.
For example, you can define Mode 1 to be
4. Click Public if you wish the elevator to be
the Default Operational Mode, Mode 3 to
visible to all partitions.
be active during regular business hours to
5. The Panel field displays the name of the allow some floors to be opened and others
panel you selected from the System Con- to be secured; and Mode 2 to be active after
figuration window. hours and secure all floors in the building.
6. If you wish, enter a Query String. This
value is used with message filtering (see Note: If there is no active time zone associated
Define Query String Filters on page 225). with a selected mode, the Default Operational
Mode takes precedence. If one or more sched-
7. Select an available Reader that has not yet
ules are active, the first active schedule takes
been assigned to an elevator or cabinet. precedence.
8. The Protocol field displays the elevator
protocol selected in the Panel Elevator tab. 13. Click Enable Otis PIN to allow cardhold-
If you wish to define a Low Level Interface ers to enter a PIN code on the DEC to gain
elevator, follow the instructions provided access to a floor.
on page 199. 14. After you have entered all the information,
9. Select the Machine Room Enclosure click OK to save your settings and return
(MRE 1 to 22) that defines a group of ele- to the System Configuration window.
vators that can serve a set of floors (num-
bers 10 and 20 are reserved). As an option, Note: After you create or edit Otis Compass
you can select a Destination Entry Redirec- elevator settings, you must restart the P2000 Otis
tor (DER) that connects to all elevator Interface Service to make the changes effective.
groups for building-wide dispatching. You must also perform the Write DB to Flash
Select the DER (1 or 2) that is associated function for the affected CK721-A panel after
restarting the P2000 Otis Interface Service.
with the elevator reader.

24-10832-194 Rev. E
207

Continue with Configuring Floors on page 201 7. Select from the Destination Entry Com-
to add floors to your elevator definition. puter drop-down list, the user interface
device number into which the desired floor
is entered. This DEC number is associated
Otis Unsecured Elevator Configuration
with the MRE or DER selected.
Use this section to configure unsecured Otis
Compass elevators. Unsecured elevators are Note: The MRE and DEC combination settings
not associated with readers, input, or output must be unique throughout the system.
points and include floors that users are allowed
to access without any specific access right. 8. Select from the Operational Mode drop-
down list whether this is a Mode 1 or Mode
1. From the System Configuration window, 3 elevator. See Otis Compass Elevator
expand Elevator/Cabinet Parameters to Modes on page 205 for more information.
display the elevator parameters. 9. Click Enable Otis PIN to allow unsecured
2. Select Otis Unsecured Elevators and elevators to accept a PIN code to gain
click Add. The Otis Unsecured Elevator access to a floor.
Configuration dialog box opens. 10. Select from the Report on Terminal
drop-down list, the terminal that is used to
report access grant decisions.
11. Click Add at the bottom of the window.
The Floor Configuration dialog box opens.

12. Select a Floor Name. The list displays the


floors names as configured in the Floor
Name Configuration dialog box; see
3. Enter a descriptive Name for this elevator. page 197.
4. Click Public if you wish the elevator to be 13. The floor Number index automatically dis-
visible to all partitions. plays in the Number field. You could select
the Number first, and the associated floor
5. If you wish, enter a Query String. This
name displays in the Floor Name field.
value is used with message filtering (see
Define Query String Filters on page 225). 14. Click OK to return to the Otis Unsecured
Elevator Configuration dialog box.
6. Select the Machine Room Enclosure
MRE (1 to 22) that defines a group of ele- 15. After you enter all the information, click
vators that can serve a set of floors. As an OK to save your settings and return to the
option, you can select the Destination System Configuration window. You must
Entry Redirector (DER 1 or 2) that con- stop and restart the P2000 Otis Interface
nects to all elevator groups for build- Service to make the changes effective, and
ing-wide dispatching. also perform the Write DB to Flash function
for the affected CK721-A panel after
restarting the P2000 Otis Interface Service.

24-10832-194 Rev. E
208 CHAPTER 2
Configuring the System

KONE IP KONE IP Controller Configuration

CK721-A panels provide the communication 1. In the System Configuration window,


necessary for KONE IP elevators. In this expand the CK721-A panel that communi-
high-level elevator integration, the CK721-A cates with the KONE IP Controller.
panel interfaces with the elevator control sys- 2. Select Kone IP Controller and click Add.
tem through a communications protocol. The Kone IP Controller Configuration Edit
Granting access to floors is achieved by send- dialog box opens.
ing messages to the elevator controller; report-
ing destination floors is achieved by receiving
messages from the elevator controller (you
must select the Floor Tracking function).

Each CK721-A panel can connect to multiple


KONE IP group controllers, each controller
with up to 8 elevators, each elevator serving up
to 128 floors. To define a KONE IP elevator,
you must first select the Kone IP protocol type
in the Panel Elevator tab.

The KONE IP elevator interface provides two


types of group controllers, the KONE KIC and
the Primary/Backup KGC. There are different
rules when interfacing to a KONE KIC as
opposed to a Primary/Backup KGC controller.
KONE KIC controllers only support Car Oper-
ation Panels (COPs), and not Destination
Operation Panels (DOPs). You can define up to
33 elevator groups for each KONE KIC con-
3. The Panel Name field displays the name
troller. KONE IP controllers, configured in pri-
of the selected panel, which is used to com-
mary/backup pairs, only support elevator
municate with the KONE IP controller.
group address number 1 (all other elevator
groups are ignored). 4. The Panel Id field displays the identifica-
tion number assigned to the panel.
Before configuring a KONE IP elevator, you
5. The Kone IP Controller Id displays the
must define the KONE IP controller that serve
identification number of the KONE IP con-
as the interface to set the configuration param-
troller. This number only displays after you
eters related to the elevator controller, as well
save the record.
as the interface to monitor the status of the ele-
vator controller and its communication with 6. Select from the Kone IP Type drop-down
the CK721-A panel. list, whether this is a KIC or a Primary/
Backup KGC controller.
Note: When configuring KONE IP elevators, 7. Enter the Controller Name of the KONE
you must create a panel as a Kone IP type before IP controller.
adding terminal definitions. You cannot use exist- 8. Enter the IP Address of KONE IP control-
ing panel definitions for an elevator application.
ler.

24-10832-194 Rev. E
209

9. If you selected a Primary/Backup KGC 1. In the Group and Floor Configuration box,
controller type, enter the Backup Control- select the group number you wish to define
ler Name and Backup IP Address of the and click Floors. The Kone IP Floor Con-
primary/backup controller. figuration dialog box opens.
10. Click Send COP if you wish the system to 2. The Floor Number column displays the
send COP global default masks messages number of floors configured in Site Param-
to the KONE IP elevator controller. eters.
11. Click Send DOP if you wish the system to 3. The Floor Name column displays the floor
send DOP global default masks messages name assigned to each floor number. See
to the KONE IP elevator controller. Defining Floor Names on page 197.
12. In the Heartbeat Interval field, enter the 4. Enter the floor Level Number as defined
time interval at which heartbeat messages by the KONE equipment.
are sent to the KONE IP elevator control- 5. Select the Elevator Side through which
ler. the selected floor is accessible.
13. Enter the TCP Port number of the KONE 6. Click COP Destination When Connected
IP elevator controller. to specify whether the selected floor is
publicly accessible as a COP destination
Kone IP Group and Floor Configuration when the KONE IP controller is online.
This value is ignored when communicating
The Group and Floor Configuration box at the to KONE KIC controllers.
bottom of the Kone IP Controller Configura-
7. Click COP Destination When Discon-
tion dialog box displays the Group Number of
nected to specify whether the selected
the KONE IP controller and whether the group
floor is publicly accessible as a COP desti-
was defined. You can define up to 33 elevator
nation when the KONE IP controller is
groups for each KONE KIC controller. Pri-
offline. This value is ignored when com-
mary/Backup KGC controllers only support
municating to KONE KIC controllers.
elevator group address number 1 (all other ele-
vator groups are ignored).

24-10832-194 Rev. E
210 CHAPTER 2
Configuring the System

8. Click DOP Destination When Connected


to specify whether the selected floor is
publicly accessible as a DOP destination
when the KONE IP controller is online.
This value is ignored when communicating
to KONE KIC controllers.
9. Click DOP Destination When Discon-
nected to specify whether the selected
floor is publicly accessible as a DOP desti-
nation when the KONE IP controller is
offline. This value is ignored when com-
municating to KONE KIC controllers.
10. Click DOP Source When Connected to
specify whether the selected floor is pub-
licly accessible as a DOP source when the
KONE IP controller is online. This value is 3. Enter a descriptive Name for the KONE IP
ignored when communicating to KONE elevator.
KIC controllers. 4. Click Public if you wish the elevator to be
11. Click DOP Source When Disconnected visible to all partitions.
to specify whether the selected floor is 5. The Panel Name field displays the panel
publicly accessible as a DOP source when you selected from the System Configura-
the KONE IP controller is offline. This tion window.
value is ignored when communicating to
KONE KIC controllers. 6. The Panel Id field displays the identifica-
tion number assigned to the panel.
12. Click OK to save the KONE IP group and
floor configuration. 7. Select the Reader terminal that provides
the access in the elevator cab.
13. Select the KONE IP group number just
defined and click Defined. 8. In the Access Time field, enter the time (0
to 30 seconds) that cardholders have to
14. Click OK to save the KONE IP controller. press a car-call button after badging at the
elevator.
KONE IP Elevator Configuration 9. Click Floor Tracking to allow the panel to
generate a history message identifying the
1. In the System Configuration window,
badge number, cardholder’s name, eleva-
expand the CK721-A panel that communi-
tor, and floor selected when the car-call
cates with the KONE IP elevator.
button is pressed.
2. Select Kone IP Elevator and click Add.
10. Select from the Type drop-down list,
The Kone IP Elevator Configuration dialog
whether this is a COP or DOP KONE IP
box opens.
elevator.

24-10832-194 Rev. E
211

11. Enter the COP Group Address or DOP 20. Click OK to save your KONE IP elevator
Address of the elevator group. This value configuration.
must match the address of the elevator
group controller. If you selected a Primary/
Supporting the KONE IP Remote Call
Backup KGC controller type, the COP
Giving Interface (RCGIF)
Group Address must be set to 1.
12. Enter the COP Elevator Address or DOP The Remote Call Giving Interface (RCGIF)
Level Number of the elevator cab. enables a user to present a valid badge at a
reader mapped to a Destination Operation
13. In the Elevator Floor Management box,
Panel (DOP) and be taken to their configured
click Select Floors. The Select Floors dia-
default floor. In some regions, this functional-
log box open.
ity is known as Swipe-N-Go.

To use RCGIF with the P2000 system, set the


following conditions on the Kone IP Elevator
Configuration dialog box:

 The Type of the elevator must be DOP


 The first character of the elevator Name
must be the numeral 1. For example,
12919DOP 62 is an elevator name that
enables RCGIF.

14. From the Available Floors list, select the


floors you wish to include in your elevator
configuration. The badge used with this functionality must be
15. Click <<. The floors are included in the set to access only a default floor.
Selected Floors box.
16. Click OK.
Note: RCGIF is supported on CK721-A panels
17. In the Elevator Floor Management list box, Version 3.4 and higher.
select a floor number. Select the Public
Access Timezone defined for public
access. If no time zone is selected, this When configuring a CK271-A panel to sup-
floor is not active for public access. port RCGIF, the TCP Port that is specified on
the Kone IP Controller Configuration Edit dia-
18. Click Public When Disconnected to spec- log box is also used to set the port used for
ify whether the floor should be in public RCGIF. The RCGIF port value is the TCP
access when the KONE IP controller is Port minus 1.
offline.
19. Repeat this steps for each floor.

24-10832-194 Rev. E
212 CHAPTER 2
Configuring the System

For example, if the TCP Port value is set to


2005, then the following socket connections
are open:

 Port 2005 for the KONE IP primary control-


ler ELI (Elevator Locking Interface)
 Port 2004 for the KONE IP primary control-
ler RCGIF
 Port 2005 for the KONE IP backup control-
ler ELI
 Port 2004 for the KONE IP backup control-
ler RCGIF
When configuring badges for use with the spe-
Refer to the CK721-A Installation and Opera-
cial access privileges, specify the Security
tion Manual for details on panel port numbers.
Options on the Badge dialog box as follows:

Supporting KONE IP Special Access  Select Special Access A to use Handicap


Privileges Access Time
 Select Special Access B or Executive
The KONE IP special access privileges Handi- access to use Priority Access Time
cap Access Time and Priority Access Time are
used primarily to comply with Americans with When both Special Access A and Special
Disabilities Act (ADA) requirements. Access B are selected, Priority Access Time
takes precedence.
The Name field on the Kone IP Elevator Con-
figuration dialog box is used to set these spe-
Controlling the KONE IP Portal
cial access privileges.
Operators with the appropriate permissions can
The second and third digits of the elevator manually change a specific KONE IP eleva-
name in the Name field set the Handicap tor’s mode of operation from a workstation.
Access Time. Valid values are from 1 to 30
seconds.
To Change Mode of Operation of a
The fourth and fifth digits of the elevator name KONE IP Elevator
in the Name field set the Priority Access Time. 1. From the P2000 Main menu select Con-
Valid values are from 1 to 30 seconds. trol>Kone IP Portal Command. The
Kone IP Portal Command dialog box opens.
In the following example, the elevator name
12919DOP 62 sets the Handicap Access Time
to 29 seconds and the Priority Access Time to
19 seconds.

24-10832-194 Rev. E
213

2. If this is a partitioned system, select the ThyssenKrupp Serial Elevator


Partition in which the elevators are active. Configuration
3. Select from the Kone IP Portal Mode 1. In the System Configuration window,
Command list box, the elevator you wish expand the CK721-A panel to which you
to control wish to assign an elevator.
4. Click one of the following actions: 2. Select Elevators and click Add. The Ele-
Normal – to return the elevator to its previ- vator Configuration dialog box opens.
ous state.
Override – to override access at the eleva-
tor. All floors defined for the selected ele-
vator are in public access.
Lockdown – to prevent access to all desti-
nation floors.
5. Click Done to exit the window.

ThyssenKrupp Serial
The P2000 system provides the communica-
tion between the ThyssenKrupp elevator sys-
tem and CK721-A panels (Version 3.2 and
later). The ThyssenKrupp elevator is com-
3. Enter a descriptive Name for this elevator.
posed of the Lift Control System (LCS) and
the Destination Selection Control (DSC) ter- 4. Click Public if you wish the elevator to be
minal. The P2000 system communicates with visible to all partitions.
CK721-A panels (acting as clients or servers) 5. The Panel field displays the name of the
through a TCP/IP connection. The communi- panel you selected from the System Con-
cation between the CK721-A panel (acting as figuration window.
a server) and the LCS is done over an RS232
6. If you wish, enter a Query String. This
serial interface.
value is used with message filtering (see
When a cardholder swipes a badge at the ele- Define Query String Filters on page 225).
vator reader and access is granted, the P2000 7. Select an available Reader that has not yet
system sends a temporary unlocking of floors been assigned to an elevator or cabinet.
message to the LCS, which contains a bitmask
8. The Protocol field displays the elevator
of all unlocked floors. This information is pre-
protocol selected in the Panel Elevator tab.
sented at the DSC terminal via its touch screen
If you wish to define a Low Level Inter-
panel located inside the elevator cab. After
face elevator, follow the instructions pro-
floor selection, the cardholder is assigned
vided on page 199.
access to the selected floor. Then, the LCS
sends a Destination Call message back to the 9. Enter the Device Number of the DCS ter-
P2000 system after the cardholder makes a minal (from 0 to 255). A value of 255,
valid floor selection at the DSC terminal. This indicates that this device is disabled.
selection gets reported to the Real Time List, if
the Floor Tracking option is set.

24-10832-194 Rev. E
214 CHAPTER 2
Configuring the System

10. Enter the Shaft Number (from 0 to 31) 1. In the Elevator Configuration dialog box,
that is part of the ThyssenKrupp elevator click Copy at the bottom of the window.
group. 2. The Copy Floor Configuration dialog box
11. Select if the floors in this elevator defini- opens.
tion are accessed through the Front Door
or Rear Door.

IMPORTANT: The combination of Device


Number, Shaft Number, and Door selection must
be unique for each elevator that has the same
Elevator Integration Server (configured in the
Panel Elevator Tab).

12. Enter in the Access Time field, the time in 3. Select the elevator that contains the floor
seconds (2 to 600) that cardholders have to definition you wish to copy.
press a car-call button after badging at the 4. Click OK. All existing floor information is
elevator. At the time a valid badge is pre- replaced with the selected floor configura-
sented to the elevator reader, the elevator tion.
access time starts. The elevator access time
5. You must click OK in the Elevator Config-
starts over with every subsequent presenta-
uration window to save the new floor infor-
tion of a valid badge.
mation.
13. Enable Floor Tracking if you wish the
panel to generate a history message identi-
fying the badge number, cardholder’s Otis EMS Serial
name, elevator, and floor selected when the The Otis Elevator Management System (EMS)
car-call button is pressed. controls up to 8 groups of elevators, with each
14. After you have entered all the information, group consisting of up to 8 elevators. The
click OK to save your settings and return P2000 system provides the communication
to the System Configuration window. between the Otis elevator system and
CK721-A panels (Version 3.2 and later). The
Continue with Configuring Floors on page 201 P2000 system communicates with CK721-A
to add floors to your elevator definition, or see panels (acting as clients or servers) through a
the next section Copying an Existing Floor TCP/IP connection. The communication
Configuration. between the CK721-A panel (acting as a
server) and the Otis system is done over an
Copying an Existing Floor RS232 serial interface.
Configuration
The Otis EMS Serial protocol is very similar to
The ThyssenKrupp Elevator Configuration the Otis EMS - Security / BMS (see page 203),
allows you to copy floor configuration from except that you need to define the Group Num-
other ThyssenKrupp elevators configured ber, Elevator Car Number, and Fire Floor
under the same panel. Number of the Otis EMS Serial elevator.

24-10832-194 Rev. E
215

Otis EMS Serial Elevator Configuration 9. Enter the Otis elevator Group Number
(from 1 to 8).
1. In the System Configuration window,
expand the CK721-A panel to which you 10. Enter the Elevator Car Number (from 1
wish to assign an elevator. to 8) that is part of the Otis elevator group.

2. Select Elevators and click Add. The Ele- 11. Enter the Fire Floor Number (from 1 to
vator Configuration dialog box opens. 64). If there is a fire in the building, the
elevator proceeds to the designated fire
floor and stops with its doors open.

IMPORTANT: The combination of Group


Number and Elevator Car Number selection must
be unique for each elevator that has the same
Elevator Integration Server (configured in the
Panel Elevator Tab).

12. Enter in the Access Time field, the time in


seconds (2 to 600) that cardholders have to
press a car-call button after badging at the
elevator. At the time a valid badge is pre-
sented to the elevator reader, the elevator
3. Enter a descriptive Name for this elevator. access time starts. The elevator access time
4. Click Public if you wish the elevator to be starts over with every subsequent presenta-
visible to all partitions. tion of a valid badge.
5. The Panel field displays the name of the 13. Enable Floor Tracking if you wish the
panel you selected from the System Con- panel to generate a history message identi-
figuration window. fying the badge number, cardholder’s
name, elevator, and floor selected when the
6. If you wish, enter a Query String. This
car-call button is pressed.
value is used with message filtering (see
Define Query String Filters on page 225). 14. After you have entered all the information,
click OK to save your settings and return
7. Select an available Reader that has not yet
to the System Configuration window.
been assigned to an elevator or cabinet.
8. The Protocol field displays the elevator Continue with Configuring Floors on page 201
protocol selected in the Panel Elevator tab. to add floors to your elevator definition.
If you wish to define a Low Level Inter-
face elevator, follow the instructions pro-
vided on page 199.

24-10832-194 Rev. E
216 CHAPTER 2
Configuring the System

Defining Floor Groups 6. Click Add at the bottom of the dialog box.
The Group Detail dialog box opens.
Use the Edit Floor Group dialog box to associ-
ate specific groups of floors with physical ele-
vators.

1. From the System Configuration window,


expand Elevator/Cabinet Parameters to
display the elevator parameters.
2. Select Elevator Floor Groups and click
Add. The Edit Floor Group dialog box 7. Select an Elevator name, previously con-
opens. figured in the Elevator Configuration dia-
log box.
8. Select the Floor Mask name, previously
configured in the Floor Mask dialog box.
9. Click OK to save your entries and return to
the Edit Floor Group dialog box.
10. Click OK to save the Floor Group and
return to the System Configuration win-
dow.

Creating Access Groups for Elevator


Floors

Access groups are described under Create


Access Groups on page 232. See this section
for detailed information.

Cabinet Access Control


The Cabinet Access Control feature protects
3. Enter a descriptive Name for the Floor sensitive information by monitoring and con-
Group. trolling access to files and equipment con-
4. If you use Partitioning, select the Partition tained in a cabinet. The P2000 system allows a
that has access to this Floor Group. single reader to provide access to up to 32 cab-
inets. Cabinet readers are associated with a set
5. Click Public to allow all partitions to see
of output points to unlock cabinet doors and an
this Floor Group.
optional set of input points to monitor the sta-
tus of cabinet doors.

24-10832-194 Rev. E
217

The panel may grant access to a cabinet by


unlocking the corresponding door when a
badge is presented at a reader installed at the
cabinet.

The cabinet access control gives you the abil-


ity to assign cardholders access to various cab-
inets and doors in your facility, through their
access groups.

Cabinets are assigned doors and door groups,


then these doors and door groups are included
in access groups which are assigned to card-
holders.

The basic procedures for defining and imple-


menting the cabinet access control are:

 Defining Door Names


 Defining Door Masks
 Configuring Cabinets
 Configuring Doors
 Defining Door Groups
 Creating Access Groups for Cabinet Doors
The number of doors entered in the Site
Steps to perform each procedure are presented Parameters dialog box displays. (See Gen-
in the following sections. To successfully eral Tab on page 33.)
implement the cabinet access control, config-
3. Click on the door you wish to rename. The
ure these steps in the order presented.
door name displays in the Door Name
field at the bottom of the window.
Defining Door Names 4. Rename the door accordingly and click
Use the Door Name Configuration dialog box Insert. The new name displays and the list
to define door names and associated index of door names moves down one position.
number. Doors should be named by physical For example, if you rename door 1 and
characteristics such as Supply Cabinet 1 or door 2, Number 3 on the list becomes Door
Electronics Bay 1, to help identify the door 1.
name and location when configuring the actual 5. If you wish to edit a door name, click on
cabinets. The system supports up to 128 doors. the door name, rename it, then click
Update.
1. In the System Configuration window,
expand Elevator/Cabinet Parameters to 6. If you delete a door name, using the Delete
display the cabinet parameters. button, the next door on the list moves up
one position.
2. Select Cabinet Door Names and click
Edit. The Door Name Configuration dia- 7. To restore the default door names, click
log box opens. Defaults.

24-10832-194 Rev. E
218 CHAPTER 2
Configuring the System

8. When you finish configuring door names, 6. From the Available Doors list, click the
click OK to return to the System Configu- door you wish to include in your group.
ration window. 7. Click <<. The door moves to the left side
of the dialog box, to be included in the
Defining Door Masks Selected Doors box.
8. To remove a door from the Selected Doors
You can group doors that have common access
box, select the door and click >>.
throughout your facility and then apply them
as a group to associate them with physical cab- 9. When all doors you wish to include in the
inets when configuring Door Groups. group have been moved to the Selected
Doors box, click OK. A Door Mask icon
1. In the System Configuration window, for the new group is added under the Cabi-
expand Elevator/Cabinet Parameters to net Door Masks root icon in the System
display the cabinet parameters. Configuration window.
2. Select Cabinet Door Masks and click
Add. The Door Mask dialog box opens. Configuring Cabinets

Use the Cabinet Configuration dialog box to


define the reader and associated output and
optional input points that operate with your
particular cabinet controller type.

1. In the System Configuration window,


expand the CK721-A panel to which you
wish to assign a cabinet.
2. Select Cabinets and click Add. The Cabi-
net Configuration dialog box opens.
3. Enter the required information according to
the following Cabinet Configuration Field
Definitions.
3. If you use Partitioning, select the Partition 4. After you have entered all the information,
that has access to this Door Mask. All click OK to save your settings and return
available doors (for the partition selected) to the System Configuration window.
are listed on the right side of the dialog
box. Cabinet Configuration Field Definitions
4. Click Public to allow all partitions to see
Name – Enter a descriptive Name for this cabi-
this Door Mask.
net.
5. Enter a descriptive Name for the Door
Mask. In the example, Aircraft Mainte- Public – Click Public if you wish the cabinet to
nance Group includes Supply Cabinet 1, be visible to all partitions.
Electronics Bay 1, and Electronics Bay 2
doors.

24-10832-194 Rev. E
219

Panel – This field displays the name of the Service Override – If the cabinet has a service
panel you selected from the System Configu- override switch, select an available input point
ration window. that has not yet been assigned to an elevator or
cabinet. The only purpose of this input point is
Query String – This value is used with message to send messages to the Real Time List; it does
filtering (see Define Query String Filters on not control Service Override.
page 225).
Door Tracking – If enabled, the panel generates
Reader – Select an available reader that has not a history message identifying the badge num-
yet been assigned to an elevator or cabinet. ber, cabinet, and door selected when an
Emergency Override – If the cabinet has an enabled door is opened.
emergency override switch, select an available Report Alarm – If enabled, an alarm is reported
input point that has not yet been assigned to an when a door, that has not been enabled, is
elevator or cabinet. The only purpose of this opened; or when an enabled door remains
input point is to send messages to the Real opened for longer than the time set in the
Time List; it does not control Emergency Alarm Suppression Time.
Override.
Access Time – Enter the amount of time in sec-
onds (2 to 600) that cardholders have to open a
door after badging at the cabinet.

Alarm Suppression Time – Enter the amount of


time in minutes (2 to 1440) for a door to
remain open.

24-10832-194 Rev. E
220 CHAPTER 2
Configuring the System

Configuring Doors Defining Door Groups

The Door Information box at the bottom of the Use the Edit Door Group dialog box to associ-
Cabinet Configuration dialog box displays the ated specific groups of doors with physical
associated doors active for access. Follow the cabinets.
next steps to add individual doors to this cabi-
net. 1. In the System Configuration window,
expand Elevator/Cabinet Parameters to
1. In the Cabinet Configuration dialog box, display the cabinet parameters.
click Add at the bottom of the window. 2. Select Cabinet Door Groups and click
The Door Configuration dialog box opens. Add. The Edit Door Group dialog box
opens.

2. Select a Door Name that has not yet been


assigned to this cabinet. The list displays
the doors names as configured in the Door
Name Configuration dialog box.
3. The door Number index automatically dis-
plays in the Number field. You could select
the Number first, and the associated door
name displays in the Door Name field.
4. Select an available Output Point that has
not yet been assigned to an elevator or cab-
inet.
5. Select an available Input Point that has
3. Enter a descriptive Name for the Door
not yet been assigned to an elevator or cab-
Group.
inet.
4. If you use Partitioning, select the Partition
6. Select the Public Access Timezone
that has access to this Door Group.
defined to allow cardholders to access the
cabinet without presenting their badge at 5. Click Public to allow all partitions to see
the reader. If no time zone is selected, then this Door Group.
this door is not active for public access. 6. Click Add at the bottom of the dialog box.
7. Click OK to save your settings and return The Group Detail dialog box opens.
to the Cabinet Configuration dialog box.

24-10832-194 Rev. E
221

Operators and Messages


The following illustrates the authorization pro-
cess to allow operators to see messages.

Do
Is this Is this operator’s
No No No
a Public a remote local partition
message? message? rights allow
7. Select a Cabinet name, previously config- access?

ured in the Cabinet Configuration dialog Yes


Yes
box.
Do
8. Select a Door Mask name, previously con- Yes operator’s
remote partition No
figured in the Door Mask dialog box. rights allow
access?
9. Click OK to save your entries and return to
the Edit Door Group dialog box. Yes

10. Click OK to save the Door Group and


return to the System Configuration win-
dow. Does
message pass
No
operator’s
message filter
Creating Access Groups for Cabinet group?

Doors
Yes
Access groups are described under Create
Access Groups on page 232. See this section
Does
for detailed information. workstation or
forwarded work- No
station’s message
filter group allow
Configure Message access?

Filtering and Message Yes


No message

Routing transmitted

Message is
transmitted
Message Filtering and Routing configuration
allows you to transmit and receive specific
messages to and from specific local or remote
P2000 systems, thereby reducing network traf- Basic Principles and Definitions
fic by transmitting and receiving only mes-
sages that pass filter criteria. The Remote Mes- P2000 Site – Uniquely identified by its Local
sage Server (RMS) maintains central control Site name. A P2000 site can have multiple
over all message routing and transmits mes- locations but only one P2000 server.
sages only to P2000 servers or workstations
P2000 Location – A physical location or place
that the RMS assumes are able and willing to
with a P2000 workstation or panel.
receive the message.

24-10832-194 Rev. E
222 CHAPTER 2
Configuring the System

P2000 Server – A single server that communi- Message Routing – Allows the system to route
cates with the panels for that site. Typically, it a sub-set of messages to a remote P2000 sys-
is also the database server for that site, but it is tem.
possible for another computer to act as the
database server for performance reasons. Remote Message Service (RMS) – P2000 ser-
vice that receives messages from the local RTL
P2000 Workstation – A single computer that is Route Service and transmits these messages to
connected to one P2000 server and is used to the remote P2000 Remote Message Service.
run the P2000 software. When receiving a remote message, the local
Remote Message Service processes the mes-
P2000 System – A P2000 system is defined by sage and passes it on to the local RTL Route
what is controlled by the P2000 server. A Service for distribution to the local worksta-
P2000 system has no relationship to geogra- tions.
phy, so a single P2000 system can and often
contains multiple facilities in multiple loca-
tions. Sequence of Steps
Local P2000 Server/Workstations – A P2000 The basic procedures for defining and imple-
server or P2000 workstations are local to each menting message filtering and routing are:
other, if they are part of the same P2000 sys-
tem.  Define Message Filtering
 Create Message Filter Groups
P2000 Remote Server – A P2000 server that
 Configure P2000 Remote Servers
controls a different P2000 system to the one
where the transaction was originated. The  Assign message filter groups to worksta-
P2000 Remote Server is the recipient of a for- tions (see page 20), operators (see page 24),
warded transaction and has no knowledge of and remote servers (see page 231).
the access control hardware and system infor-  Define Remote Message Service settings in
mation related to the originating P2000 sys- Site Parameters; see RMS Tab on page 43.
tem.

Remote Transactions – Remote Transactions Message Filtering


are messages received from another P2000
system. Message filtering allows you to control the
types of messages transmitted to local worksta-
Message Forwarding – Message Forwarding is tions or remote servers, thereby reducing net-
the ability to temporarily forward messages work traffic by only transmitting a sub-set of
from one P2000 operator logged on at a local P2000 messages that pass filter criteria.
P2000 workstation “A” to another local P2000
workstation “B.” The forwarded messages are Messages are sent to all workstations by
only visible at the P2000 workstation “B,” if default, provided the message is marked Pub-
the operator at workstation “B” has sufficient lic or the logged on operator has the proper
rights to view these messages. access. Depending on the parameters selected
in the Message Filter Configuration dialog
Message Filtering – Reduces network traffic by box, you can filter which messages are to be
only transmitting a sub-set of P2000 messages transmitted when alarm and transaction mes-
that pass a filter criteria. sages are generated. The system only transmits
messages that pass the filter criteria defined.

24-10832-194 Rev. E
223

You can, for instance, filter messages to send a 3. If you use Partitioning, select the Partition
specific group to one workstation and a differ- that has access to this Message Filter.
ent group to another. By using message filters 4. If you use Partitioning, click Public to
you may for example, limit the alarm mes- allow all partitions to see this Message Fil-
sages sent to workstations located in Building ter.
A to only those alarms originating in Building
A, and do the same for Building B. For a com- 5. Enter a descriptive Name for this Message
plete list of all available message types and Filter.
associated sub-types, see Appendix B: Mes- 6. See the following sections to define mes-
sage Types and Sub-Types. sage types, filters, and ranges.

Note: All messages are sent by default to the Note: The length of all filter strings entered in
local Server at all times, therefore this feature each Selected List is limited to approximately
cannot be used at the Server. 1000 characters.

7. As you work through the tabs, you may


To Create a Message Filter click Apply at any time to save your
1. From the P2000 Main menu, select Con- entries.
fig>System. Enter your password if 8. After you have entered all the information,
prompted. The System Configuration win- click OK to save the settings and return to
dow opens. the System Configuration window.
2. Select Message Filter and click Add. The
Message Filter Configuration dialog box
opens.

24-10832-194 Rev. E
224 CHAPTER 2
Configuring the System

Define Message Types

1. Click the Message Type tab.


2. In the Available Type box, click the mes-
sage type you wish to define.
3. In the Available Subtype box, click the
message subtype you wish to define. The
selections in this box are dependent on the
type selected in the Available Type box.
4. Click Add. The message type and subtype
code are automatically entered in the 1. Click the Site Name tab.
Selected List box. 2. Select from the Available List the Site
5. To enter messages from third-party soft- Name and click << to move it to the
ware or any currently unknown message, Selected List. To remove it from the
enter the text in the Manual Edit Box, Selected List, click >>.
then click Add.
6. To edit your selection, select the message
code from the Selected List box, make the Note: The Available List displays the Local Site
change, then click Update. Name only. All other site names need to be
entered in the Site Name field. Site Name entries
7. To delete a message type from the Selected are case sensitive.
List, select the message code and click
Delete.
3. To add a remote site name to the Selected
8. Once the message types are selected, click List, enter the name in the Site Name field
Include in the Selected List box to accept and click Add.
these types of messages.
If the Site Name changes either at the local
9. To reject all messages of the type selected, site or at the remote site, you must re-select
click Exclude. the name from the Available List or re-enter
the new name in the Site Name field.
Define Site Name Filters Entries may contain a filter string to spec-
ify more than one Site Name, for example
Messages associated with the Site Name
enter New* to add Site Names such as New
selected in this tab are either accepted or
York, New Jersey, or New Security.
rejected. For example, you can select to see
Area Alarm messages originated only at the
Chicago Office, or you can select to see all
Area Alarm messages, except the ones origi- Note: The wildcard character * (asterisk) in a
filter string means that all possible selections are
nated at the Chicago Office, if the Exclude
listed. The wildcard character is supported at the
option is selected. end of the filter value only.

4. To edit a remote site name or filter string,


select the name, make the change, then
click Update.

24-10832-194 Rev. E
225

5. To delete a remote site name or filter string You may enter a filter string to specify
from the list, select the name and click more than one Partition Name, for example
Delete. enter Main* to add Partition Names such
6. Once the Site Names are selected, click as Main Office - Atlanta and Main Office -
Include in the Selected List box to accept New York.
messages associated with the Site Names. 4. To edit a remote partition name or filter
7. To reject all messages associated with the string, select the name, make the change,
Site Names selected, click Exclude. then click Update.
5. To delete a remote partition name or filter
string from the list, select the name and
Define Partition Name Filters
click Delete.
The system either accepts or rejects messages 6. Once the Partition Names are selected,
associated with the Partition Names selected in click Include in the Selected List box to
this tab. The Available List displays all parti- accept messages associated with the Parti-
tion names within the local system, including tion Names.
any Remote Partitions entered in the Edit
7. To reject all messages associated with the
Operator dialog box.
Partition Names selected, click Exclude.
8. If the Message passes filter criteria, if
message has no filter value check box is
enabled, the message meets the filter crite-
ria even if there is no filter value. Do not
select the check box to stop the message
from passing the filter criteria if there is no
filter value.

Define Query String Filters

Use this tab to filter messages by Query


1. Click the Partition Name tab. Strings. Query Strings are filled by querying
Panels, Terminals, Input Points, and Output
2. Select from the Available List the Parti-
Points. The Available List displays all query
tion Name and click << to move it to the
strings defined within the local system.
Selected List. To remove it from the
Selected List, click >>.
3. To add a remote partition name to the
Selected List, enter the name in the Parti-
tion Name field and click Add.
If the Partition Name changes either at the
local site or at the remote site, you must
re-select the name from the Available List
or re-enter the new name in the Partition
Name field.

24-10832-194 Rev. E
226 CHAPTER 2
Configuring the System

1. Click the Query String tab.


2. Select from the Available List the Query
String and click << to move it to the
Selected List. To remove it from the
Selected List, click >>.
3. To add a remote query string to the
Selected List, enter the query string in the
Query String field and click Add.
If the Query String Name changes either at
the local site or at the remote site, you must
re-select the name from the Available List 1. Click the Item Name tab.
or re-enter the new name in the Query 2. Select from the Available List the Item
String field. Name and click << to move it to the
You may enter a filter string to specify Selected List. To remove it from the
more than one Query String, then click Selected List, click >>.
Add. 3. To add an item from a remote site to the
4. To edit a remote query string name or filter Selected List, enter the name in the Item
string, select the name, make the change, Name field and click Add.
then click Update. If the Item Name changes either at the local
5. To delete a remote query string name or fil- site or at the remote site, you must re-select
ter string from the list, select the name and the name from the Available List or re-enter
click Delete. the new name in the Item Name field.
6. Once the Query Strings are selected, click You may enter a filter string to specify
Include in the Selected List box to accept more than one Item Name.
messages associated with the Query 4. To edit a remote item name or filter string,
Strings. select the name, make the change, then
7. To reject all messages associated with the click Update.
Query String selected, click Exclude. 5. To delete a remote item name or filter
8. If the Message passes filter criteria, if string from the list, select the name and
message has no filter value check box is click Delete.
enabled, the message meets the filter crite- 6. Once the Item Names are selected, click
ria even if there is no filter value. Do not Include in the Selected List box to accept
select the check box to stop the message messages associated with the Item Names.
from passing the filter criteria if there is no
7. To reject all messages associated with the
filter value.
Item Name selected, click Exclude.
8. If the Message passes filter criteria, if
Define Item Name Filters message has no filter value check box is
Use this tab to filter messages by Item Names. enabled, the message meets the filter crite-
The Available List displays all Panels, Termi- ria even if there is no filter value. Do not
nals, Input and Output Points defined within select the check box to stop the message
the local system. from passing the filter criteria if there is no
filter value.

24-10832-194 Rev. E
227

Define Priority Ranges 9. If the Message passes filter criteria, if


message has no filter value check box is
Priorities define the order an alarm message is enabled, the message meets the filter crite-
placed in the alarm queue. You can configure ria even if there is no filter value. Do not
message filtering to accept or reject messages select the check box to stop the message
within a priority range. For example, you can from passing the filter criteria if there is no
assign a security supervisor to monitor high filter value.
priority alarms only (zero being the highest).

Define Alarm Escalation Ranges

You can configure message filtering to accept


or reject messages based on the alarm escala-
tion value. For example, you can assign a
security supervisor to monitor only the alarms
escalated above level 5 (0 meaning that an
alarm has not been escalated, and 10 meaning
an alarm has been escalated to the highest pos-
sible value).

1. Click the Priority Range tab.


2. Enter in the From field the start of the pri-
ority range.
3. Enter in the To field the end of the priority
range.
4. Click Add. The selected values display in
the Priority Range box.
5. If you wish to edit the priority range, select
the value, make the change, then click
Update. 1. Click the Alarm Escalation Range tab.
6. To delete an entry, select the value and 2. Enter in the From field the start of the
click Delete. alarm escalation range.
7. Once the Priority Ranges are selected, 3. Enter in the To field the end of the alarm
click Include in the Priority Range list box escalation range.
to accept messages that have a priority
4. Click Add. The selected values display in
value within the range selected.
the Alarm Escalation Range box.
8. To reject all messages that have a priority
5. If you wish to edit the alarm escalation
value within the range selected, click
range, select the value, make the change,
Exclude.
then click Update.
6. To delete an entry, select the value and
click Delete.

24-10832-194 Rev. E
228 CHAPTER 2
Configuring the System

7. Once the Alarm Escalation Ranges are 3. To add remote operator names to the
selected, click Include in the Alarm Esca- Selected List, enter the name in the Opera-
lation Range list box to accept messages tor Name field and click Add.
that have an alarm escalation value within If the Operator Name changes either at the
the range selected. local site or at the remote site, you must
8. To reject all messages that have an alarm re-select the name from the Available List
escalation value within the range selected, or re-enter the new name in the Operator
click Exclude. Name field.
9. If the Message passes filter criteria, if You may enter a filter string to specify
message has no filter value check box is more than one Operator Name.
enabled, the message meets the filter crite-
4. To edit a remote operator name or filter
ria even if there is no filter value. Do not
string, select the name, make the change,
select the check box to stop the message
then click Update.
from passing the filter criteria if there is no
filter value. 5. To delete a remote operator name or filter
string from the list, select the name and
click Delete.
Define Operator Name Filters
6. Once the Operator Names are selected,
Use this tab to accept or reject messages asso- click Include in the Selected List box to
ciated with the operator names selected here. accept messages associated with the Oper-
For example, you can limit the number of ator Names.
operators who respond to alarm messages gen- 7. To reject all messages associated with the
erated at your local site. The Available List dis- Operator Names selected, click Exclude.
plays the names of all the operators within the
local system. 8. If the Message passes filter criteria, if
message has no filter value check box is
enabled, the message meets the filter crite-
ria even if there is no filter value. Do not
select the check box to stop the message
from passing the filter criteria if there is no
filter value.

Define Alarm Category Filters

The system either accepts or rejects messages


associated with the Alarm Category Names
selected in this tab. The Available List displays
1. Click the Operator Name tab. the default P2000 category and all
2. Select from the Available List the Opera- user-defined categories. If you use the Enter-
tor Name and click << to move it to the prise option, the Alarm Categories defined for
Selected List. To remove it from the all P2000 sites within an Enterprise system are
Selected List, click >>. listed.

24-10832-194 Rev. E
229

Create Message Filter Groups

Message filters are assigned by groups; there-


fore, you must create Message Filter Groups
before they are available to be assigned to
workstations, operators, and remote servers.

A Message Filter Group can contain multiple


message filters, but if at least one message fil-
ter within the group passes the filter criteria,
1. Click the Alarm Category Name tab. the message is transmitted.

2. Select from the Available List the Alarm


Category Name and click << to move it to To Create a Message Filter Group
the Selected List. To remove it from the
1. From the System Configuration window,
Selected List, click >>.
select Message Filter Group and click
3. To add an alarm category name, enter the Add. The Edit Message Filter Group dia-
name in the Alarm Category Name field log box opens.
and click Add.
You may enter a filter string to specify
more than one Alarm Category Name.
4. To edit a remote alarm category name or
filter string, select the name, make the
change, then click Update.
5. To delete an alarm category name or filter
string from the list, select the name and
click Delete.
6. Once the Alarm Category Names are
selected, click Include in the Selected List
box to accept messages associated with the
Alarm Category Names. 2. If you use Partitioning, select the Partition
that has access to this Message Filter
7. To reject all messages associated with the
Group. All available message filters (for
Alarm Category Name selected, click
the partition selected) are listed on the
Exclude.
right side of the dialog box.
8. If the Message passes filter criteria, if
3. If you use Partitioning, click Public to
message has no filter value check box is
allow all partitions to see this Message Fil-
enabled, the message meets the filter crite-
ter Group.
ria even if there is no filter value. Do not
select the check box to stop the message 4. Enter a descriptive Name for this Message
from passing the filter criteria if there is no Filter Group.
filter value. 5. From the Available list, click the message
filter you wish to include in your group.

24-10832-194 Rev. E
230 CHAPTER 2
Configuring the System

6. Click <<. The message filter moves to the To Create a P2000 Remote Server
left side of the dialog box, to be included in
the Selected box. 1. From the P2000 Main menu, select Con-
fig>System. Enter your password if
prompted. The System Configuration win-
Note: The Selected box displays auto-added dow opens.
next to a Message Filter that was automatically
added using a Host Event. 2. Select Remote Server and click Add. The
P2000 Remote Server dialog box opens at
7. To remove a message filter from the the General tab.
Selected box, select the message filter and 3. Fill in the information on each tab accord-
click >>. ing to the following P2000 Remote Server
8. When all message filters you wish to Field Definitions.
include in the group have been moved to 4. As you work through the tabs, you may
the Selected box, click OK. A Message click Apply at any time to save your
Filter Group icon for the new group is entries.
added under the Message Filter Groups 5. After you have entered all the information,
icon in the System Configuration window. click OK to save the settings and return to
the System Configuration window.
Message Routing
Message routing allows the transfer of alarm Note: Any change made to the P2000 Remote
Server settings only takes effect after you restart
and transaction messages between P2000 Serv-
the P2000 Remote Message Service; see Start-
ers located at different P2000 Sites. Message ing and Stopping Service Control on page 432.
routing is processed by the Alarm Monitor (see
Monitoring Remote Alarms on page 272) and
the Real Time List application (see Monitoring P2000 Remote Server Field Definitions
Remote Messages in Real Time on page 342).

General Tab
Note: Before you configure any P2000 Remote
Servers, verify your settings in the RMS Tab of Use this tab to define general descriptive infor-
Site Parameters (page 43), to make sure your mation of the P2000 remote servers that are
system is ready to process remote messages.
allowed to receive or transmit messages to
other servers.
Configure P2000 Remote Servers

The P2000 Remote Server application must be


properly configured at each remote site that
wishes to transmit and receive alarm and trans-
action messages. The setup must include the
name, IP address and Remote Message Service
Listener Port number of the remote site; the
type of messages to be forwarded and at what
times; and other related parameters.

24-10832-194 Rev. E
231

Partition – If you use Partitioning, select the Transmit Filter Tab


Partition that has access to this P2000 Remote
Server. This tab defines what type of messages and
during which times you want to send messages
Public – Click to allow all partitions to see this to a remote server.
P2000 Remote Server.

Name – Enter a descriptive Name of the P2000


Remote Server. This name must match exactly
the name of the server at the remote site,
including the case.

IP Address – If you select the IP Address


option, enter the IP Address of the P2000
Remote Server that is used to receive or trans-
mit messages.

Computer Name – If you select the Computer


Name option, enter the Windows computer Timezone – Select the time zone during which
name that is used to receive or transmit mes- messages, that pass the Message Filter Group
sages, or click the [...] button to find a com- criteria, are transmitted to the P2000 remote
puter by name on your network. server. Select <Always Enabled> if you wish
to send messages at all times.
Remote Site Name – Enter the name of the
remote site that can send messages to your
local site. You must enter a name in this field if IMPORTANT: If the P2000 Remote Server is
you select the Receive messages from this down during an active time zone, messages are
server option. not transmitted and they are not available for
later transmission.
Receive messages from this server – Click if
you wish to receive messages from this remote
Message Filter Group – Select the Message Fil-
server.
ter Group that defines which messages are
Transmit messages to this server – Click if you transmitted to this P2000 remote server. Select
wish to transmit messages to this remote <None> if you wish to transmit all messages
server. to this remote server.

Port – Enter the Remote Message Service Lis-


tener Port number of the remote site, and select Transmit Queue Tab
the protocol to be used for transmitting mes- Use this tab to define message queue parame-
sages to the remote server. Options are: Binary ters for the remote server.
Protocol, HTTP Post XML Protocol, and
XML Protocol.

24-10832-194 Rev. E
232 CHAPTER 2
Configuring the System

Set up Access Groups and


Cardholders

After you have configured your panels, termi-


nals, terminal groups and various input and
outputs, you are ready to complete system con-
figuration by adding Access Groups and Card-
holder Options. While Access Groups are
assigned from the System Configuration win-
Maximum Queue Length – Enter the maximum dow, Cardholder Options are assigned via the
number of messages to place in the transmis- P2000 Main menu. We recommend these ele-
sion queue. Messages are transmitted based on ments be assigned in the following sequence:
the First-In-First-Out (FIFO) principle.

Message Void Period – Enter the time in sec-


onds after which the system declares messages
in the buffer as obsolete.

Transmit Session Tab


Parameters specific to individual transmission
sessions are set up in the Transmit Session tab.
You must select the Binary Protocol in the Gen-
After these final elements are added, you are
eral Tab to complete the settings in this tab.
ready to move on to operating the system.

Create Access Groups


After terminals and terminal groups have been
configured, you can group them together to
create common access groups. For example,
you can assign two terminals that control the
doors into a common area, such as a ware-
house, to an access group. When you assign a
cardholder badge to that access group, the
Maximum Number of Records – Enter the maxi- cardholder is granted access to both doors in
mum number of messages than can be trans- the group. This is a quick way to assign badges
mitted within one session. access to a large number of doors and areas.

Maximum Duration – Enter the maximum dura- If your system is configured to operate eleva-
tion in seconds that a session is kept open. tors and cabinets, elevators floors and cabinet
doors can also be assigned to control which
Timeout Period for Session End Message – floors and doors a cardholder can access.
Enter the number of seconds that the session
waits without receiving a message, until it
declares the session closed.

24-10832-194 Rev. E
233

Once access groups are created, they are avail- 5. Select the Default Timezone during which
able for assignment in the applications that use all terminals (Mercury only) included in
access groups. You can assign up to 32 access this access group are active. To assign dif-
groups to a badge (depending on the parame- ferent time zones to the Mercury terminals
ters selected in Site Parameters; see Number in this access group, click the Details tab
of Access Groups in the Badge Tab on and follow the instructions provided in
page 37). In addition, you can also define per- step 14.
sonalized access groups for each individual
cardholder. (See Personalized Access Groups
on page 258). Note: The Details tab is only available if you
select the Terminals associated with Timezone
option in the Edit Site Parameters dialog box.
To Create an Access Group
6. If this is a partitioned system, select the
1. In the System Configuration window, Partition name in which the items for this
select Access Groups. access group reside.
2. Click Add. The Access Group Edit dialog 7. Click Public if you wish this Access
box opens at the General tab. Group to be visible to other partitions.
3. Enter a descriptive Name for the Access 8. From the list of Available Terminals list
Group. at the far right of the dialog box, select the
4. Click Enable for the system to recognize terminal to include in the Access Group.
this access group. If at any time you wish 9. Click << to move the terminal into the
to temporarily disable access to any of the Terminals box.
items in this group, without having to
delete the access group, click to clear this 10. From the Available Terminal Groups list,
box. select the Terminal Group to include in the
Access Group.
11. Click << to move it into the Terminals
Groups box.

24-10832-194 Rev. E
234 CHAPTER 2
Configuring the System

12. To add elevator floors to the Access Group, You can also create access templates to speed
click the Elevator tab and select from the cardholder and badge data entry, as well as cre-
Available Floor Groups list, the Floor ate badge purposes to specify the badge’s
Group to include in the Access Group. intention. Complete instructions are presented
13. To add cabinet doors to the Access Group, in the following sections:
click the Cabinet tab and select from the  Define Companies and Departments
Available Door Groups list, the Door
 Create Access Templates
Group to include in the Access Group.
 Create Badge Formats
14. If you wish to assign a different time zone
to the any of the Mercury terminals  Create Badge Purposes
selected in this access group, click the  Create Badge Reasons
Details tab, double click the time zone  Create Required Cardholder Fields
name you wish to change, and select a new
 Create User Defined Fields
time zone from the drop-down list.
 Define Automatic Employee IDs
 Entering Cardholders
Note: The Details tab displays Mercury termi-
nals that are defined in the General tab, and also
Define Companies and Departments
Mercury terminals that are assigned to elevators
included in the Floor Groups defined in the Eleva- If your facility includes Company and Depart-
tor tab.
ment as part of Cardholder definition, you
must first configure Companies and Depart-
15. Click OK. The new access group displays ments from the Config>Cardholder Options
under the root Access Groups icon. When menu. The company and department names are
you click on the new Access Group icon, the then available for assignment to cardholders in
parameters display on the right window- the Cardholder Edit dialog box.
pane of the System Configuration window.
To Define a Company
Define Cardholder Options
1. From the P2000 Main menu, select Con-
At a minimum, a first and last name must be fig>Cardholder Options>Company. The
entered into the Cardholder database for each Company dialog box opens.
person who needs access to your facility. Card-
holder data entry is typically performed as part
of system operation, which is described in
detail in Chapter 3: Operating the System.

However, if your facility takes advantage of


additional cardholder information, such as
company and department definition, and any
other information specific to each facility
(defined in User Defined fields), these must be
configured before adding cardholders, to make
this information accessible from the Card-
holder Edit dialog box.

24-10832-194 Rev. E
235

2. Click Add. The Edit Company dialog box


opens.

2. Click Add. The Edit Department dialog


3. If this is a partitioned system, select the
box opens.
Partition to which this company belongs
and click Public if you wish this company
to be visible to all partitions.
4. Enter the Name of the company.
5. Click OK. The new company name dis-
plays in the Company dialog box.

3. If this is a partitioned system, select the


Partition to which this department
belongs and click Public if you wish this
department to be visible to all partitions.
4. Enter the Name of the department.
5. Click OK. The new department name dis-
plays in the Department dialog box.

The Auto Added column displays com-


pany names that were added using other
P2000 applications.
6. Click Done. Company names are accessi-
ble from the Cardholder Edit dialog box.
(See Entering Cardholder Information on
page 244.)

To Define a Department
6. Click Done. This department name is now
1. From the P2000 Main menu, select Con- accessible from the Cardholder Edit dialog
fig>Cardholder Options>Department. box.
The Department dialog box opens.

24-10832-194 Rev. E
236 CHAPTER 2
Configuring the System

Create Access Templates 3. Enter the information as described in the


Access Template Edit Field Definitions.
Access Templates are an excellent tool for
speeding the entry of cardholders and badges 4. After you have entered all the information,
into your system. You may have a large group click OK. The new Access Template is
of cardholders that need badges with the same listed in the Access Template window.
access privileges. For example, your entire Day These Access Templates are now available
Shift Shipping Department may need access to to assign to badges from the Badge dialog
the same group of doors, time zones, and asso- box.
ciated input and output groups. An Access
Template can be created to apply up to 32 Access Template Edit Field Definitions
Access Groups and time zones to a badge, sim-
ply by selecting the template from the Badge
dialog box. You can create several Access Tem-
Note: The definitions in this section are
plates to speed cardholder data entry. described in detail in Badge Field Definitions on
page 252.
To Create an Access Template

1. Select Config>Cardholder Options> Template Box


Access Template. The Access Template
window opens. Partition – If this is a partitioned system, select
the Partition in which this access template is
used.

Public – If this is a partitioned system, click


Public if you wish this Access Template to be
visible to all partitions.

Name – Enter a descriptive Name for the


Access Template.

Badge Box

2. Click Add. The Access Template Edit dia- Facility Code – Select the type of facility code
log box opens. to be assigned to this Access Template. Facility
codes identify the cards that belong to your
particular site.

Options Box

Disabled – Click if you wish to disable the


badges that use this Access Template.

Override – Click if you wish to give override


privileges to the badges that use this Access
Template.

24-10832-194 Rev. E
237

Executive Privilege – Click if you wish to give Create Badge Formats


executive privileges to the badges that use this
Access Template. This feature allows you to configure badge
format categories to assign to badges. This
Trace – Click if you wish the badges that use allows facilities that use multiple badge tech-
this Access Template to be traced throughout nologies or formats to differentiate their
the facility. badges.

Event Privilege – Select a privilege level you


wish to assign to the badges that use this To Create Badge Formats
Access Template.
1. From the P2000 Main menu, select Con-
fig>Cardholder Options>Badge For-
1-4 through 29-32 Tabs mat. The Badge Format dialog box opens.

Use these tabs to select the Access Groups and


associated Time Zones to be assigned to the
badges that use this Access Template.

Additional Options Tab

Security Level – Select a security level number


from 0 (lowest) to 99 that defines the access
privilege to be assigned to badges that use this
Access Template. 2. Click Add. The Edit Badge Format dialog
box opens.
Guard Tour Priority – Select a priority number
from 1 (lowest) to 99 that determines which
tours the badges that use this Access Template
can perform.

Special Access – Select the special access


flags that are assigned to badges that use this
Access Template.

3. If this is a partitioned system, select the


Partition in which the badge format is
active.
4. Click Public if you wish the badge format
to be visible to all partitions.
5. Enter a descriptive Name for this badge
format.

24-10832-194 Rev. E
238 CHAPTER 2
Configuring the System

6. Select the Technology type. 2. Click Add. The Edit Badge Purpose dialog
7. Enter the total number of Bits expected to box opens.
be returned from the reader when the badge
is read.
8. Select a Qualifier number. The number
selected represents a 32-bit numerical
value that allows differentiating formats
with the same technology and the same
number of bits. The default value is 1.
9. Click OK. 3. If this is a partitioned system, select the
Partition to which this badge purpose field
10. Click Done.
belongs and click Public if you wish this
purpose field to be visible to all partitions.
Create Badge Purposes 4. Enter the Name of the badge purpose.
Users can assign a purpose to a badge for 5. Click OK. The new badge purpose field
example, to specify the badge’s intention. The displays in the Badge Purpose dialog box.
Purpose field can be used for different applica-
tions. For example, an airport employee may
have multiple badges, one for each airline ter-
minal the employee is allowed to access. The
Purpose field for each badge could be used to
identify the airline where the badge is valid.
Use the Badge Purpose tool to create the differ-
ent Purpose field values that can be available
for assignment in the Badge dialog box.

To Create Badge Purpose Fields 6. Click Done. This purpose field is now
available from the Badge dialog box.
1. From the P2000 Main menu, select Con-
fig>Cardholder Options>Badge Pur-
pose. The Badge Purpose dialog box Create Badge Reasons
opens.
The P2000 system provides a list of predefined
badges reasons that are used to indicate why a
badge is being issued. This application allows
you to define new badge reasons or modify
existing ones according to your facility needs,
and then assign these reasons to badge records
for filtering and reporting purposes.

Note: Only operators that belong to the Super


User partition can add, edit, or delete badge rea-
sons.

24-10832-194 Rev. E
239

To Create Badge Reasons To Create Required Cardholder Fields

1. From the P2000 Main menu, select Con- 1. From the P2000 Main menu, select Con-
fig>Cardholder Options>Badge Reason. fig>Cardholder Options>Required
The Badge Reason dialog box opens. Fields. The Cardholder Required Fields
dialog box opens.

2. Click Add. The Edit Badge Reason dialog


box opens. 2. From the list of Available cardholder
fields at the right side of the window,
select the field you wish to define as a
required field.
3. Click the << button to move the required
field to the Selected box. You can add as
many fields as you wish.
3. Enter the Name of the badge reason.
4. To remove a required field from the
4. Click OK. The new item is added to the Selected box, select the field and click >>.
list of badge reasons.
5. When all the required fields are defined,
5. Click Done. The badge reason is now click OK.
available from the Badge dialog box.

Create User Defined Fields


Create Required Cardholder Fields
Use the User Defined Fields (UDF) tool to
The P2000 system requires that at a minimum, define your own data fields, which you can
a first and last name must be entered into the access from the Cardholder dialog box to store
Cardholder database for each person that additional cardholder information.
needs access to your facility. However, you
can define additional cardholder fields as If you wish to restrict operators from viewing
required fields, which must be completed certain user defined fields in the Cardholder
before a cardholder record is saved. dialog box, see the instructions provided in
Concealed UDFs Tab on page 27.
The Cardholder dialog box displays an asterisk
(*) next to a field to indicate a required field. If
a required field is left empty, the system dis-
plays a warning message to indicate that a
required field has not been completed.

24-10832-194 Rev. E
240 CHAPTER 2
Configuring the System

To Create User Defined Fields 7. Select from the Type drop-down list, the
format in which the data is to be displayed.
1. From the P2000 Main menu, select Con- Select either Text, Numeric, Boolean (tog-
fig>Cardholder Options>User Defined gle field), Date or Selection. The Selection
Fields. The User Defined Fields dialog box type allows you to define set values to
opens. choose from a drop-down list.

Note: The maximum number that you can


enter in a Numeric UDF field is 21474836478. For
higher numbers, change the UDF type to Text.

8. Click Required if this field must always be


completed. The system displays a warning
message if the field is left empty.
2. Click Add. The Add User Defined Field 9. In the Width field, enter the maximum
dialog box opens. number of characters allowed in this field.
10. The Order box displays the order in which
the fields appear in the UDF tab of the
Cardholder dialog box. As you add user
defined fields, they display in the order
they are created. You can however, change
the order in which the fields display by
selecting the field from the Field Order box
and clicking Up or Down to move the field
up or down on the list.
11. After you enter all the information, click
OK to return to the User Defined Fields
dialog box.

3. If this is a partitioned system, the partition 12. To delete a user defined field, select the
name displays in the Partition field. field from the list and click Delete. A mes-
sage displays if there are cardholders with
4. If this is a partitioned system, click Public values entered in this field. Click Yes to
if you wish to make this field visible to all continue. When the Delete User Defined
partitions. field dialog box opens, click Yes to delete
5. Enter the Name you wish to display as the the field.
field title. Names can contain alphanu- 13. To add choices to Selection type fields,
meric characters, symbols, spaces or select the field from the list and click
underlines. Choices. The Choices dialog box opens
6. Click Hide from MIS if you do not wish to displaying the name of the UDF and the
display this field in the MIS Interface current number of choices.
tables.

24-10832-194 Rev. E
241

Define Automatic Employee IDs

Use the Auto Employee Id Configuration tool


to define a pool of consecutive ID numbers
that can be automatically assigned to each
cardholder record created in the system. This
means that every time you create a cardholder
record you no longer have to keep track of the
last number assigned or the minimum number
of characters used for each ID number.

Note: Only operators that belong to the Super


User partition can modify Auto Employee Id Con-
figuration parameters.
14. Click Add. The Choice dialog box opens.

To Configure Automatic Employee ID


Numbers

1. From the P2000 Main menu, select Con-


fig>Cardholder Options>Auto
Employee ID. The Auto Employee Id
Configuration dialog box opens.
15. Enter the set value for this field and click
OK.
16. The choice displays in the list. Click Done
to return to the User Defined Fields dialog
box.
17. If you wish to convert a Text type field into
a Selection type field, select the Text field
from the list and click Migrate. In the
New Type dialog box click Next.
18. A Summary window displays a description 2. Click Enable to enable the automatic gen-
of the change. All previously values eration of employee IDs. If you wish to use
defined for the Text field are converted to a different number scheme for a particular
Choices for the new Selection field. Click cardholder, click to clear this check box
Finish. and manually assign the ID number.
19. A message indicates that the UDF was suc- 3. Click Prevent Editing Employee ID if
cessfully migrated. Click OK. you wish to make the ID field a display
20. Click Done to close the User Defined field, no editing allowed.
Fields dialog box.

24-10832-194 Rev. E
242 CHAPTER 2
Configuring the System

4. In the Minimum Length field, enter the Entering Cardholders


minimum number of characters required in
the ID field. A cardholder ID can have up After all configuration elements have been
to 25 characters. defined; along with companies, departments,
and user defined fields, if applicable; you are
5. Define the pool of numbers by entering the ready to enter cardholders into the database.
first number in the Starting Number field. See Entering Cardholder Information on
6. The Next Available field displays the next page 244 for more detailed information.
number that can be assigned to the card-
holder record.
Commissioning the Sys-
tem: When commissioning the
system, we recommend you
Note: Automatic Employee IDs are only assign create at least one or two card-
APPLICATION NOTE
when you create a new cardholder record. If you holder records and badges,
wish to edit an existing cardholder record and then swipe these badges to ensure door controls
assign a number from the pool, click to clear the are working properly.
Prevent Editing Employee ID check box and
manually enter the next available number from
the pool.

7. Click OK to save your settings.

Next time you create a cardholder record, the


ID field will display the number that was auto-
matically assigned from the pool, and whether
the field allows editing.

24-10832-194 Rev. E
243

Chapter 3: Operating the System

T
his section describes procedures typi- Provide Access to
cally performed by operators of the
P2000 Security Management System,
Cardholders and Visitors
assuming all system configuration has
been completed. If you have not completed Access privileges define which cardholder or
Chapter 2: Configuring the System, some of visitor may enter a specific area of the facility,
the functions described here may not be ready and at what time they may enter. Access privi-
to operate. leges are assigned to individual reader termi-
nals or group of reader terminals; these devices
Operations typically performed as part of sys-
are assigned to specific access groups, and then
tem maintenance, such as downloading data,
when cardholder records are added to the data-
updating software and panels, starting and
base, the cardholders are assigned to the access
stopping service control, and reviewing system
groups.
and workstation status; are typically performed
by a system administrator and are described in The Access feature provides flexible tools to
Chapter 5: System Maintenance. create cardholder records and assign badges
with which to grant or deny facility access. At
The following sections describe how to:
a minimum, a first and last name must be
 Provide Access to Cardholders and Visitors entered into the Cardholder database for each
 Monitor Alarms person who needs to have access to your facil-
ity. Additional cardholder information can
 Perform Operator Controls include personal information such as address
 Control Areas and Muster Zones and phone; company information such as a
 Detect and Control Intrusion company name and department; a Photo ID;
 Track Hours On Site and any additional information such as eye
color, height, weight, or other information you
 Create Events can define in User Defined Fields.
 Monitor the System in Real Time
MIS Interface: Cardholder
IMPORTANT: All configuration steps outlined information can be added,
in Chapter 2: Configuring the System, must be deleted, or updated from a
completed before you can program and use the APPLICATION NOTE
database outside the P2000
essential functions described in this section and software using the MIS Inter-
some system features require specific configura- face; see page 365 for more information. MIS is a
tion settings before others can be enabled. These low-level interface that requires programming to
are described in the appropriate sections that fol- implement.
low.

24-10832-194 Rev. E
244 CHAPTER 3
Operating the System

The procedures are presented in the following A cardholder may have several different
sections: badges; however, each access badge must have
a unique number.
 Entering Cardholder Information
 Entering Badge Information
Viewing Cardholder Information
 Entering Visitor Information
 Defining Automatic Badge Numbers 1. Select Access>Cardholder from the
P2000 Main menu to open the Cardholder
 Synchronizing Badge Status
window.
 Recalling Images
2. To view current cardholder information,
select a Type from the drop-down list at
Entering Cardholder Information the right side of the window (All, Regular,
or Visitor).
Every person who needs access to the facility
must have a Cardholder and Badge record
entered into the P2000 system. Cardholders
can be entered all at once at system startup, Note: The system displays up to 20,000 card-
and then added, edited, or removed as neces- holders at a time, for the partition selected in the
Partition field. If the number of cardholders in
sary thereafter. Permanent cardholders and vis-
your system exceeds 20,000, you must use the
itor cardholders are viewed and added in the Search feature, described in To Search for Spe-
same Cardholder window. cific Cardholders on page 250.

If you use database partitioning, the cardholder


can belong to one partition, and could have
multiple badges, each in a different partition
with different access parameters.

24-10832-194 Rev. E
245

Cardholder Types To Enter New Cardholder Information

Regular – These are the permanent cardholders 1. From the Cardholder window, click Add.
in the system. Their access begins with a start The Cardholder dialog box opens at the
date, but unless terminated or temporarily Cardholder Edit tab.
reassigned, no end date is specified. Select
Regular from the Cardholder window Type
drop-down list to view only the regular card-
holders.

Visitor – A visitor is given temporary access to


the system on a limited basis. Their access is
limited by start and end dates and times, and
they are assigned a company Sponsor to take
responsibility for them while visiting the facil-
ity. Select Visitor from the Cardholder window
Type drop-down list to view only visitor card-
holders in the system.

All – When you select All from the Cardholder


window Type drop-down list, all cardholders
currently in the system display, regardless of
cardholder type. 2. Enter the information as described in the
Cardholder Field Definitions. Required
fields are indicated by an asterisk and must
Additional Cardholder Data
be completed before a record is saved.
When you select a cardholder from the list, 3. You may click Apply at any time to save
additional cardholder data such as Image, your settings. When you finish click OK to
Address, Start/End Badges, UDFs, and other return to the Cardholder window, the name
information display in the tabs in the middle of of the newly added cardholder displays
the Cardholder window. If the cardholder selected in the list box.
selected is a Visitor, a Sponsor tab is added to
the window and displays limited Sponsor
information. Regular cardholders display the Cardholder Field Definitions
Sponsored Visitors tab, which displays the vis-
itors sponsored by the selected cardholder. If Cardholder Tab
your facility uses P2000 Enterprise, a Site field
is added at the top of the window, which Partition – If this is a partitioned system, select
allows you to view only cardholders that from the drop-down list the Partition to which
belong to the selected Site name. In addition, this cardholder is assigned.
the Enterprise Sites tab is also added to the
Public – If this is a partitioned system, click
window to display the site names assigned to
Public if you wish this cardholder record to be
the cardholder. See P2000 Enterprise on
visible to all partitions.
page 402 for details.

24-10832-194 Rev. E
246 CHAPTER 3
Operating the System

Type – Select Regular or Visitor. If you select All Badges


Visitor, the Sponsor box at the bottom of the
window is activated. (See Sponsor on page 247 Start – This is the date and time that badges
for more information.) become active. Select the check box and click
the down arrow to select a start date from the
First – Enter the first name of the cardholder. system calendar. This date applies to all badges
assigned to this cardholder. If you selected a
Middle – Enter the middle name of the card- start date, the time field is enabled. Click the
holder. spin box buttons to select the time that badges
Last – Enter the last name of the cardholder. are activated.

ID – This field displays the ID number that was End – This is the date and time that all badges
automatically assigned from the Automatic assigned to this cardholder are voided. Select
Employee ID pool numbers. Depending on the check box and click the down arrow to
your settings, this field may allow editing. See select an end date from the system calendar.
Define Automatic Employee IDs on page 241.
Note: The system automatically voids all
badges on the date specified, and the status of all
Note: We recommend using the ID field on
badges changes to Inactive.
Enterprise systems to prevent duplicate records.

The end date is typically used for Visitor


Address badges, but can also be edited as needed to void
badges for a terminated employee or similar
Address fields are optional, unless they are application. If you selected an end date, the
defined as required fields in your facility. Enter time field is enabled. Use the spin box arrows
the suite, street, city, state, zip, phone number, to select the time that badges are voided.
and extension, if required.

Note: If you create a Visitor badge and do not


Other enter an end date and time, the date and time
default to the Visitor Validity Period value speci-
Email – If available in your facility, enter the fied in your Site Parameters setting.
email address assigned to this cardholder.

Company and Department – To include this


Web Access
information in your Cardholder database,
select a Company and Department from the Menu Permission Group – If your facility uses
drop-down lists. You must create Companies the Web Access feature, select from the
and Departments before the selections display drop-down list the permission group that is
in the drop-down lists. See Define Companies assigned to this cardholder. The cardholder is
and Departments on page 234 for detailed allowed to perform any Web Access function
information. defined in this permission group. See Web
Access on page 406 for detailed information.
Guard – This field is used with the Guard Tour
feature and allows you to assign Tour Badges Password – Enter the password that the card-
to cardholders who participate in guard tour holder uses to log on to the P2000 Web Access
operations; see Guard Tour on page 374. site.

24-10832-194 Rev. E
247

Enterprise

If your facility uses P2000 Enterprise, the


Enterprise box displays all the sites defined in
the system. Select the check box next to the
site that this cardholder may access. See P2000
Enterprise on page 402.

Sponsor

If you selected Visitor as the Cardholder Type,


the Sponsor box is activated. A sponsor is the
cardholder responsible for the visitor. This information also displays in the Sponsor
tab of the Cardholder window.

To Enter a Visitor Sponsor

1. Once the Sponsor box is activated at the


bottom of the Cardholder Edit dialog box,
after you select Visitor as the Cardholder
Type, click Select. The Cardholder – Find
Sponsor dialog box opens.
In addition, when you select a sponsor name
from the Cardholder window and click the
Sponsored Visitors tab, the list displays all vis-
itors sponsored by the selected cardholder. If
you double-click a visitor name in the list, the
visitor becomes the selected cardholder.

Adding a Cardholder Image


2. Enter a value in any of the fields. The list You can import an existing image to display in
box displays the cardholder records that the Cardholder Image tab. The P2000 system
match the entered values. supports a large number of image formats;
3. Select a cardholder name and click OK to however, if your image format is not sup-
save the setting and return to the Card- ported, you may need to use an image-editing
holder Edit dialog box. Basic Cardholder program to convert to a supported format. See
information displays in the Sponsor box. To Import an Image on page 364.

24-10832-194 Rev. E
248 CHAPTER 3
Operating the System

You can define different image resolution and To Enter Journal Entries
sizes, depending on your facility’s preferences;
however, you should remember these simple 1. Select a cardholder from the Cardholder
rules: list.
2. Click Journal in the Image tab located in
 Keep the image resolution as small as nec- the middle of the Cardholder window. The
essary, while maintaining the desired clarity Journal dialog box opens displaying the
of the image, as this correlates directly with journal entries associated with the card-
file size. holder, together with the date and time
 960 x 1280 resolutions for JPG files, on a when the journal was entered, the name of
medium-small system are recommended. the operator who last edited the journal, the
 Use compressed formats, such as JPG files date and time the journal was last edited,
to reduce file sizes, as opposed to uncom- and whether there is an attachment file
pressed formats, such as BMP files, for the associated with the journal entry.
same resolution.
 The smaller the file size, the smaller the
impact on SQL Server performance for the
P2000 system, including SQL-based inte-
grations, such as MIS Interface. Large file
sizes take up equivalent space on the data-
base server, and accordingly require equiva-
lent processing to query the data when you
use P2000 features, such as Badge Image
Recall or P2000 API/Integrations, such as
MIS Interface.
3. Click Add. The Journal Edit dialog box
Note: If your imported image displays cropped opens.
on the screen, you may need to contact Technical
Support if you wish to change the image aspect
ratio.

If the workstation is configured as a badging


workstation, you can use the Badging buttons
to capture an image. See Video Imaging on
page 358 for details.

Adding a Cardholder Journal


Journal entries supplement cardholder infor-
mation by storing notes associated with each
cardholder. For example, you may want to
keep track of cardholders with parking viola-
tions, or keep a record of cardholders that
attended specific company training, or track
cardholders with suspicious behavior.

24-10832-194 Rev. E
249

4. Enter a descriptive Title to identify the 16. To delete a note, select the note from the
subject of this note. list and click Delete. You are prompted for
5. Click in the text area and enter the details verification.
of the note. 17. When you finish with the Journal entries,
6. If you want to add additional information click Exit. The Journal button displays the
to the note, click Import and navigate to number of notes associated with the card-
the directory that contains the text file you holder.
want to include. Select the file and click
Open. The text file displays in the text User Defined Fields
area.
After you create User Defined Fields (see
7. If you wish to save the note as a text file,
page 239), use the UDF tab in the Cardholder
click Export and navigate to the directory
dialog box to enter additional cardholder infor-
where the exported notes are stored. Enter
mation. The number of UDF tabs displayed
a file name and click Save.
depends on the number of UDF fields created.
8. If you wish to attach a file to the journal Select additional UDF tabs and enter the data
entry, click Attach and navigate to the as needed.
directory that contains the file you wish to
attach. Select the file and click Open.
9. If you do not wish to use the attachment Note: The UDF tab displays only the user
file, select the file and click Detach. The defined fields that were assigned to the operator.
attachment file is removed from the list. See Concealed UDFs Tab on page 27 for details.

10. If you wish to save the attachment file,


click Save and navigate to the directory
To Enter User Defined Field Information
where the attachment file is stored.
11. If you wish to view the contents of the 1. Select a cardholder from the Cardholder
attachment file, click Open. list.
12. To email the attachment file, click Email. 2. Click Edit on the right side of the window.
The program starts your default email cli- The Cardholder dialog box opens.
ent with the file attached. Check with your 3. Click the UDF 1 tab to display the user
Internet Service Provider (ISP) or IT defined fields. Required fields are indi-
department to verify the required email cli- cated by an asterisk and must be completed
ent settings. before a record is saved.
13. When you finish with the note details,
click OK to save the entry and return to the
Journal dialog box.
14. To view the contents of a note, select the
note from the list and click View. When
you finish viewing the note, click Cancel.
15. If you wish to modify an existing note,
select the note from the list and click Edit;
make your changes, then click OK.

24-10832-194 Rev. E
250 CHAPTER 3
Operating the System

4. After you enter the information, click OK


to return to the Cardholder window.
5. Click the UDF tab located in the middle of
the Cardholder window. The User Defined
Fields and entries display for the card-
holder selected.

To Edit Cardholder Information

1. From the Cardholder window, select a


cardholder from the Cardholder list.
2. Click Edit. The Cardholder dialog box
opens.
3. Enter the necessary changes.
Click to select Enter UDF
4. Click OK to save your changes and return search criteria
a UDF
to the Cardholder window. Changes are
reflected in the Cardholder list and in the
appropriate tabs in the center of the win- 2. Enter or select from the associated
dow. drop-down lists, the information for any or
all of the fields to search for specific card-
To Search for Specific Cardholders holders.
3. If you wish to search by Company and
1. In the Cardholder window, click Search on Department, select a previously defined
the right side of the cardholder list. The name from the drop-down list.
Database Search dialog box opens.
4. You can also search by UDF (up to two
UDF fields). Select any of the previously
defined UDFs from the drop-down lists
(Date type UDFs cannot be included in the
search). Then enter the UDF search criteria
in the associated fields. (Fields associated
with Selection type UDFs are selected
from drop-down lists.)

Note: The UDF list only displays the UDF fields


associated with the operator record; see Con-
cealed UDFs Tab on page 27 for details.

24-10832-194 Rev. E
251

5. If you wish to clear the existing search cri- To Enter Badge Information
teria, click Clear.
1. In the Cardholder window, select a card-
6. After you define the search criteria, click holder from the Cardholder list.
one of the following:
2. In the Badge Information box at the bot-
Exact Match – to display an exact match to tom of the Cardholder window, click Add.
your search criteria. The Badge dialog box opens.
Partial Match – to display all possible selec-
tions that match the initial characters of the
search criteria; for example, if you enter
Carl in the First Name field, the list box
displays names such as Carla, Carlos, Carl-
ton, and so on.
7. The Cardholder window opens showing
the number of cardholders and the match
specified in the search criteria.
Search Criteria

TIP: You can also access the Badge dialog


box from the Cardholder Edit tab by selecting
Create Badge at the bottom of the window.
Number of Cardholders

3. Enter the information as described in the


8. Click All on the right side of the Card- Badge Field Definitions.
holder window to restore it to display all 4. When all information is entered, click OK
cardholders. to return to the Cardholder window. The
new badge is listed in the Badge Informa-
Entering Badge Information tion box at the bottom of the window.

The Badge Information box in the Cardholder


window displays all badge information for the Note: Click Duplicate at the bottom of the
cardholder selected from the Cardholder list. A Badge dialog box to create any number of
badges for a cardholder. All current badge infor-
badge can be created strictly for identification,
mation is copied; however, each badge must
or it can be assigned access privileges. have a unique number.

24-10832-194 Rev. E
252 CHAPTER 3
Operating the System

Badge Field Definitions Alpha – Some custom badges may provide


space for additional characters. If so, you may
enter up to four characters here.
Badge
Issue – Select an issue level. If cardholders
Partition – If this is a partitioned system, select
lose their badge, you would give them the next
the Partition in which this badge is active.
available issue level and retain the same badge
Public – Click Public if you wish this badge number. The number of badge issue levels sup-
record to be visible to all partitions. ported depends on the panel type you use; see
Max Issue Level in the Badge Tab on page 37.

Note: Some badge fields may not be available


for editing, depending on the badge Data Style. Note: When using Assa Abloy locks, be aware
that when you modify a badge issue level, that
badge may be unavailable for access for up to
Number – Enter a badge number (the number one minute after the change is made.
of allowed characters depends on the parame-
ters selected in the Site Parameters dialog box;
Description – If desired, enter a description (up
see Max Badge Number in Badge Tab on
to 32 characters) of this badge.
page 37). Access and Identification badges can
have the same number. Pin – Enter the cardholder or visitor personal
identification number (PIN) to be used with
Auto – If your facility is set up to use the Auto-
PIN readers. If an algorithmic PIN is used,
Badge Management feature (see page 264),
leave this field blank.
click Auto to insert the next available badge
number in the Number field. Start – Select the date and time this badge
becomes active. Click the down arrow to select
Facility Code – Select the facility code to be
a date from the system calendar and click the
assigned to this badge. Facility codes are
spin box buttons to select a time.
defined in Site Parameters (see page 39), and
identify the badges that belong to your particu- End – Select the date and time this badge is
lar site. automatically voided. Click the down arrow to
select a date from the system calendar and
click the spin box buttons to select a time.
Note: It is imperative that you select the correct When the system voids this badge, its status
facility code for badges that are used at Assa changes to Expired.
Abloy locks, since these locks verify both badge
number and its facility code when making access
decisions. In addition, if you have an existing sys- Note: Some Assa Abloy locks only support
tem in which facility codes are only defined on a expiration dates, but no specific times. The
terminal basis, but not on a per badge basis, you badges are automatically voided at midnight on
must ensure that all badges have the correct the expiration date.
facility code assigned before adding them to
access groups that include Assa Abloy locks.
If this is a Visitor badge and no end date and
time is entered, the badge is automatically
voided as configured in Site Parameters; see
General Tab on page 33 for more information.

24-10832-194 Rev. E
253

Security Options Tab


Note: The time used to void a badge is based
on the P2000 Server time and not the time defined These options allow you to define access privi-
for a panel. The panel time may be different if a
leges for a cardholder. Access decisions are
Time Offset was defined; see Access Tab on
page 57 for details. made based on the privileges assigned to the
badge.
Type – Select a badge type, choices are:
Access or Identification.
Note: Some security options are panel spe-
Format – Select the badge format to be cific. See Appendix C: Panel Comparison Matrix
assigned to this badge. See Create Badge For- for a detailed list of features and capabilities sup-
ported by your panel type.
mats on page 237.

In Enterprise systems, the Badge dialog box


Note: When using HID panels, if this badge is displays the site name tabs of the sites
only used for card ID operation, the badge format assigned to the cardholder. The first tab is
selected here should be mapped to the “Card ID always the local site tab and is used to assign
Only 64 bit” badge format defined in HID Facility, local access privileges. The second tab is the
see page 123 for details. Enterprise tab and is used to assign global
access privileges. Additional tabs show other
Purpose – If you wish to include this badge site names assigned to the cardholder.
information, select a purpose to indicate the
Assigning access privileges is determined by
badge’s intention. You must create Purpose
the following conditions:
fields before the selections display in the
drop-down list. See Create Badge Purposes on  When you define access to the local site and
page 238. click Apply Security Options Enterprise,
the security options defined in the Enter-
Reason – Select a reason to indicate why the
prise tab are applied.
badge is being issued. You can add or edit
badge reasons using the Edit Badge Reason  When you define access at a different site
application. See Create Badge Reasons on and click Apply Security Options Enter-
page 238. prise, the security options defined in the
Enterprise tab are applied to that site.
Design – If you have created badge designs
using your Video Imaging software, you can For more information, see P2000 Enterprise on
select a design from the drop-down list. page 402.
(Badge design instructions are provided in the
P2000 Integrated Video Imaging Installation
and Operation Manual.)

Data Style – Displays the badge data style. This


field always displays Normal for badges that
are created using the Badge application. You
can add badges with other badge data styles
through MIS, but not through the Badge appli-
cation.

24-10832-194 Rev. E
254 CHAPTER 3
Operating the System

Disabled – When a badge is created, it is auto- Security Level


matically enabled. Click this check box to dis-
able this badge. This function is useful when Select a security level number from 0 (lowest)
you wish to disable a badge, but do not wish to to 99 or the maximum security level set up at
re-issue or redefine a badge for this cardholder. the Site Parameters dialog box. To obtain
access at a door, this number must be equal to
Executive – If enabled, the cardholder has or greater than the security level set up at the
unlimited access to all operational doors con- terminal. If the security level at the terminal is
trolled by the access control system, regardless raised, cardholders are denied access, unless
of any other privileges programmed for this the badge has the Executive privilege enabled.
badge. (If a specific terminal requires the use
of a PIN code with a badge, the PIN code is
Event Privilege
still required.)
Every badge has an event privilege level, rang-
ing from 0 to 7, with zero as the lowest level. If
Note: For badges that are used with Mercury a cardholder’s badge is to initiate a card event,
panels, the badge must be in the same partition
as the panel, or the panel must be set as Public. this event privilege level must be equal to or
greater than the privilege level defined in the
Panel Card Event dialog box.
Note: When using HID panels, the P2000 sys-
tem emulates the executive privilege in the panel, Guard Tour
using standard access methods. Therefore, exec-
utive privilege badges are not exempt from Select a Guard Tour Priority number from 1
access rules in the panel, such as anti-passback. (lowest) to 99. This number determines which
tours the selected cardholder can perform.
Trace – Enable to trace cardholder movement Only tour badges with equal to or greater than
throughout the facility. Badge transactions are this priority can perform a tour.
printed, as they occur, on any printer config-
ured to print trace transactions, as long as the Card Use Limit
Badge Trace and Printing options are selected
in the Real Time List window. Card use limit options are provided to control
the maximum number of times a badge can be
Override – If enabled, the cardholder can granted access.
unlock any door controlled by a keypad reader
that has the Override option enabled. See your Use Limit – This feature controls the maximum
specific hardware configuration section for number of times that a Mercury panel can
information on setting up this option. grant access to this badge. Select the number
of times (0 to 254) or <unlimited> from the
Special Access – Special Access flags are drop-down list.
defined in the Site Parameters dialog box; see
General Tab on page 33. Click any of the three Uses Left – Select Unchanged (default option)
special access flags if the cardholder requires to keep the Uses Left counters unaffected; or
special access at a reader. Special access select Reinitialize to reset the counters to Use
allows a door’s access time to be different. See Limit value.
your specific hardware configuration section
for information on setting up this option.

24-10832-194 Rev. E
255

Additional Card Use Limit Notes Otis Compass Elevator Options Tab
 The card Use Limit of a badge applies to a Use this tab to define parameters for cardhold-
site. In an enterprise system, a badge may ers that need access to Otis Compass elevators,
have a different card Use Limit on each see Otis Compass on page 204 for more infor-
site. mation.
 The P2000 system sets the Use Limit of a
badge to zero as soon as it learns that the
badge’s Uses Left counter has reached zero
on any Mercury panel. It will then apply
this new Use Limit of zero to all Mercury
panels that have the badge, along with the
instructions to reinitialize the Uses Left
counter to this zero value. This effectively
prevents the badge from being granted
access at all Mercury readers that enforce Floor Mask – For Otis Compass elevators that
the card Use Limit feature. are configured for PIN entry, select the floor
 The Uses Left counter for each badge is mask that contains the floors that this badge is
kept on a per panel basis. This means, that able to gain access to when they enter a PIN
the system wide maximum number of uses code at the elevator.
may be higher, and that the Uses Left
Floor – Select the default floor for the user.
counter may have reached zero on one
When the badge is swiped, depending on the
panel, but still is positive on another panel.
operational mode of the elevator that is being
 Rebooting a Mercury panel or performing a used, that badge’s default floor is used to dis-
Reset Panel Before Download restores the patch an elevator, assuming the default floor is
Uses Left counter to the value defined in an authorized or an allowed floor.
the Use Limit.
Passenger Type – Select the passenger types
that identify special conditions that can be
Access Rights Tab
assigned to a cardholder. When the badge is
Use this tab to define the Access Groups and presented, a message is sent to the Otis Com-
corresponding Time Zones that can be pass elevator system to dispatch a specific ele-
assigned to this badge. The number of groups vator car that the cardholder can board.
displayed here depends on the parameters
 Standard – Select for cardholders that do
selected in the Site Parameters dialog box (see
not require special access. This is the
Number of Access Groups in the Badge Tab
default selection for all badges.
on page 37). See Badge Access Rights on
page 97 for details associated with OSI panels.  Disability – Select for cardholders that
Also, see To Define Access Rights on require special elevator accommodations;
page 256 for complete instructions. for example, bigger elevator cars, extended
time to board the elevator, or audible
announcements at each floor.
A cardholder can be assigned with a Standard
or a Disability flag, in addition to any of the
following conditions:

24-10832-194 Rev. E
256 CHAPTER 3
Operating the System

Apply Access Rights


Note: The following flags are provided as
default for the corresponding Type Descriptor If a large number of cardholders uses badges
(TD) values. You must verify that these flags
having the same options, you can set all badge
match the TDs configured at the Otis Compass
elevator system. options at once by applying an Access Tem-
plate. The Access Template contains preset
badge options, access groups, and time zones,
 VIP (TD04) – Select for cardholders that and overrides any settings already defined in
require priority service through dedicated the Badge dialog box, before the template was
VIP elevators; for example, an empty eleva- applied. You can edit badge options individu-
tor that runs non-stop to the destination ally after the template is applied; if you
floor. re-select the template, the settings mirror the
 Split Group (TD10) – Select for cardholders template settings. In addition, if you make
that belong to different operating groups; changes to an Access Template, you have to
for example, some cardholder can have re-select the template to apply the new set-
access to elevators for general population, tings. See To Apply Access Rights to a Badge
while other cardholders can have access to on page 258.
elevators for maintenance, construction or
service staff personnel.
 Cart Service (TD40) – Select for cardholders Note: Access Templates must first be created
that require enough room in the elevator to before they are available in the Badge dialog box.
fit the passenger and a cart; for example, For more information, see Create Access Tem-
hotel or hospital service elevators that use plates on page 236.
food or laundry carts.
 Vertigo (TD08) – Select for cardholders that
require boarding elevators with special Note: In addition to selecting Access Tem-
characteristics; for example, elevators that plates from the Apply Access Rights drop-down
provide slow car speed for passengers with list, you can also select another badge owned by
vertigo, or elevators that are not exterior the same cardholder and apply the same access
glass elevators. rights from the selected badge.

 Vertigo 2 (TD20) – Select for cardholders that


require boarding elevators with special To Define Access Rights
characteristics. This option is similar to Ver-
tigo (TD08), but may be configured with 1. In the Access Rights tab, double-click the
other characteristics. line item you wish to define.
 CIM Override (TD80) – Select for cardholders
that wish to override segmentation. Seg-
mentation with Compass Inter-floor Matrix
(CIM) is an elevator function (for DES con-
figurations only), that provides a method to
separate passengers into different elevator
cars based on their segment membership,
usually in buildings that are occupied by
multiple tenants.

24-10832-194 Rev. E
257

Whether or not you can define access 3. If you wish to modify the settings in the
groups and time zones, and assign the selected Access Group, click the [...] but-
access rights to a badge is determined by ton to open the Access Group Edit dialog
the following conditions: box. Make your changes and click OK to
 Operators that belong to the Super User return to the Access Rights Definition dia-
partition can define access groups/time log box.
zones and assign the access rights to any 4. In the Time Zone field, select a time zone
badge. to be assigned to the selected Access
 Operators that belong to, for example Group. If the Access Group selected
Partition A, can define access includes Mercury terminals, the system
groups/time zones and assign the access uses the default time zone defined for each
rights to any badge in Partition A. Mercury terminal, regardless of the time
zone selected here. See page 233 for
 If the Access Rights tab shows three or
details on creating access groups.
more access groups/time zone entries
already defined, operators that belong to 5. If you wish to define a Temporary Access
Partition A cannot edit the first two Period for the selected Access Group,
rows but can edit the third row and select the check box and use the
beyond on the Access Rights tab for drop-down lists to select the Start date and
access rights of a badge in Partition B. time when permission for access is
granted. If the check box is not selected,
 If the Access Rights tab shows less than
access is allowed immediately.
three access groups/time zone entries,
operators that belong to Partition A can-
not edit the first row but can edit the
second row on the access Rights tabs for Note: For example, if the reader doors
included in the Access Group normally grant
access rights of a badge in Partition B.
access from 8:00 A.M. to 5:00 P.M., you can set
When you select the line item you wish to up temporary access on a selected date and time
define, the Access Rights Definition dialog period that can grant the cardholder permission
box opens. for limited access within the normal time zone.
This feature is performed by the Smart Download
service and therefore, you can use it only when
Smart Download is running; see P2000 Services
Definitions on page 429. This feature only works
on terminals running in Local mode.

6. Select the Void check box and use the


drop-down lists to select the stopping date
and time when permission for access
expires.
7. Click Apply to save your settings. To
assign another access group to this badge
2. The Index number automatically displays.
or see other definitions, click the spin box
Select from the drop-down list, the Access
next to the Index field.
Group you wish to assign to this badge.

24-10832-194 Rev. E
258 CHAPTER 3
Operating the System

8. To define personalized settings, click Per- To Apply Access Rights to a Badge


sonalized Access Group and enter your
settings. See Personalized Access Groups 1. From the Apply Access Rights drop-down
for details. list, at the bottom of the Badge dialog box,
select the Access Template or badge num-
9. Click OK to return to the Access Rights ber you wish to apply to the badge. All
tab. access options defined for the Access Tem-
10. To remove a definition, select the line item plate or selected badge number are applied
and click Remove. to the badge.
11. The list displays the access groups
assigned to the badge. To edit an access
group, select the line item and click the [...]
button.

Personalized Access Groups

When assigning access groups to a badge, you


can use personalized access group for each
cardholder. The Personalized Access Group
button provides a shortcut to set up access
groups without the need of scanning through
all existing access groups.
2. If you wish to change specific badge
By default, the Name of the access group is options, access groups, or time zones for
always the name of the cardholder. However, this badge, you may do so. All other set-
be aware that the name of the access group is tings remain in effect.
not automatically modified if you change the
name of the cardholder. Viewing Badge Data
Once you have all the access group elements Badge information such as Number, Status,
defined, such as terminals, terminal groups, Options, Type, Partition, and Access Group
elevators, or cabinets, click OK. The new per- displays in the list box at the bottom of the
sonalized access group displays automatically Cardholder window. When you select a card-
in the Access Group field. Assign a time zone holder from the Cardholder list, all badges
to the new access group as you would for any assigned to that cardholder display in the
other access group. Badge Information box. You can also display
the badge’s transaction history.

Note: Although initially created for a particular


cardholder, a personalized access group To Display Badge Transaction History
becomes a standard access group within the
P2000 system and can also be assigned to other
1. In the Cardholder window, select a card-
cardholders. holder from the list.
2. In the Badge Information box, right-click
the badge number you wish to view.

24-10832-194 Rev. E
259

3. From the shortcut menu select Transac-


tion History. The Badge Transaction His-
tory dialog box opens displaying the
selected Cardholder name and Badge num-
ber.

The list box displays the date, transaction


type, and location where the badge was
presented.
2. Enter or select from the associated
4. To change the number of transactions dis- drop-down lists, the information for any or
played, enter the desired number in the all of the fields.
Num Records field.
5. To update the list box with new data, click
Refresh. Note: The list box displays cardholders that
match all fields in the search criteria. Make sure
6. Click Done to close the dialog box.
you use the AND logic to define your search.

Bulk Badge Change 3. If you wish to search by Company and


Department, select a previously defined
The Bulk Badge Change tool is used to change
name from the drop-down list.
badge parameters across multiple records, in a
single operation. This feature not only allows 4. You can also search by UDF (up to two
you to save time by modifying multiple fields). Select any of the previously
records at once, but also improves the accu- defined UDFs from the drop-down lists
racy from single record editing, and avoids the (Date type UDFs cannot be included in the
hassle of updating badge records one entry at a search), then enter or select the UDF
time. In addition, you can also delete multiple search criteria in the associated fields.
badges and associated cardholder records at 5. If you wish to search for badges that have
the same time. not been used for a while, enter in the
Badge Unused For field the number of
To Bulk Change Badge Records days that the badges have not been used.
6. After you define the search criteria, click
1. From the P2000 Main menu, select one of the following buttons:
Access>Bulk Badge Change. The Bulk
Badge Change dialog box opens. Exact Match – to display an exact match to
your search criteria.

24-10832-194 Rev. E
260 CHAPTER 3
Operating the System

Partial Match – to display all possible selec- Delete Access Group – to remove from the
tions that match the initial characters of the selected badges access to all terminals
search criteria; for example, if you enter defined in the access group. Select the
Carl in the First Name field, the list box Access Group to remove.
displays names such as Carla, Carlos, Carl-
Delete Badge – to delete all badges in the
ton, and so on. list box.
7. Once the list box displays the cardholders
Delete Badge and Cardholder – to delete all
specified in the search criteria, select from
badges and associated cardholders in the
the Action drop-down list one of the fol-
list box.
lowing options:
Add Access Group – to assign all badges in
the list box with access to all terminals Note: If a cardholder owns more than one
defined in the access group. Select the badge, and that badge is not included in the list
Access Group and Timezone to be box, the cardholder record is not deleted.
assigned to the selected badges. The access
group is added to the first available slot on Disable Badge – to disable all badges in the
the badges. list box.
Apply Access Template – to apply all preset Replace Access Group – to replace the
access privileges, badge options, access existing access group. Select from the New
groups, and time zones that were defined in Access Group drop-down list the access
the access template. Select from the Access group you wish to assign. Select from the
Template drop-down list, the Access Tem- Old Access Group, the access group you
plate to be applied to the selected badges. wish to replace. The original timezone for
the access group does not change.
8. If you wish to print the data in the list box,
Note: You cannot apply Facility Code settings
using the Bulk Badge Change function. click Print.
9. Click Apply to change the selected badge
Change Badge Format – to change the for- records.
mat of all badges in the list box. Select the 10. Click Done to close Bulk Badge Change.
New Badge Format to be applied to the
selected badges.

24-10832-194 Rev. E
261

Entering Visitor Information 4. If you wish to save and print the badge,
click Save and Print (requires the Video
The Add Visitor function introduces an easier Imaging application).
and faster way to enter visitor and badge infor-
5. If you wish to enter additional visitors,
mation, by allowing authorized operators to
click Clear, then enter the information
enter visitor and badge data using a single user
according to the Add Visitor Field Defini-
interface. Before a visitor’s arrival, the opera-
tions.
tor enters the appropriate visitor data into the
system, assigns a visitor sponsor, enters the 6. Click Exit to close the Add Visitor dialog
date and time period of the scheduled visit, and box.
assigns access privileges using Access Tem-
plates. Subsequently and from the same
Add Visitor Field Definitions
screen, the visitor badge is printed.

Visitor Box
To Enter Visitor Information
First – Enter the first name of the visitor.
1. From the P2000 Main menu, select
Access>Add Visitor. The Add Visitor dia- Middle – Enter the middle name of the visitor.
log box opens.
Last – Enter the last name of the visitor.
2. See Add Visitor Field Definitions for
detailed information. ID – Enter a unique ID for this visitor (up to 25
3. After you enter all the information, click characters).
Save to save the visitor and badge infor-
mation. The new visitor data is also
reflected in the Cardholder window.

24-10832-194 Rev. E
262 CHAPTER 3
Operating the System

Company – Select the visitor’s Company name.


If the company name does not already exist in
the database for the visitor’s assigned partition,
click the browse button [...] to open the Com-
pany window. See Define Companies and
Departments on page 234 for information on
adding a company name to the P2000 data-
base.

Partition – Select the partition to be assigned to


the visitor.

Found in DB – Indicates whether or not the


P2000 system has identified a matching Visitor
record in the cardholder database after you
click Search. If Found in DB shows Yes, then
the existing visitor record in the P2000 data- Select the visitor’s name and click OK.
base is updated. If it shows No, the new visitor
is added when you click Save. Take – If your facility uses the Video Imaging
application, click Take to capture the visitor’s
Approved Visits – Displays the number of portrait, see Capturing the Portrait and Signa-
approved visits. This field is only valid if the ture Images on page 363 for details.
Found in DB field displays Yes.
Sponsor Box

Note: The Add Visitor application creates four First – Displays the first name of the person
UDFs: Approved Visits, Most Recent Visit, who sponsors this visitor.
Second Most Recent Visit, and Third Most
Recent Visit. These UDFs are automatically Middle – Displays the middle name of the per-
updated and allow you to monitor the visits asso- son who sponsors this visitor.
ciated with the selected visitor.
Last – Displays the last name of the person
Search – If the visitor information already who sponsors this visitor.
exists in the database, you may search the data- ID – Displays the unique ID assigned to the
base by entering a value in any of the Visitor sponsor (up to 25 characters).
fields and then clicking Search. The Find Visi-
tor dialog box opens displaying the visitor Company – Displays the sponsor’s Company
records that match the entered values. You may name.
also click Search without entering any values
to display all visitors in the database. To search Partition – Displays the partition assigned to
for specific names in the Find Visitor dialog the sponsor.
box, enter the data in any of the fields. You can
use wildcards such as “?” to replace one char-
acter (including a space), or “*” to replace
more than one character.

24-10832-194 Rev. E
263

Search – Click this button to find a Sponsor in Auto – If your facility is set up to use the Auto-
the database. The Find Sponsor dialog box Badge Management feature (see page 264),
opens. When you enter a value in any of the click Auto to insert the next available badge
fields, the list box displays the sponsor records number in the Number field.
that match the entered values. If no value was
entered, all cardholders in the database display. Issue – Enter an issue level per badge number.
To search for specific names, enter the data in If a visitor loses a badge, give the next avail-
any of the fields. You can use wildcards such able issue level and retain the same badge
as “?” to replace one character (including a number. The number of badge issue levels sup-
space), or “*” to replace more than one charac- ported depends on the panel type you use; see
ter. Max Issue Level in the Badge Tab on page 37.

Template – Select the access template to be


applied to this badge. See Create Access Tem-
plates on page 236.

Design – Select the badge design that was cre-


ated using the Video Imaging application.

Start Date – Enter the date this badge becomes


active. Click the down arrow to select a date
from the system calendar.

Start Time – Enter the time this badge becomes


active. Click the spin box buttons to select a
time.

Void Date – Enter the date this badge is auto-


matically voided. Click the down arrow to
select a date from the system calendar.
Select the sponsor’s name and click OK.
Void Time – Enter the time this badge is auto-
Badge Box matically voided by the system. Click the spin
box buttons to select a time.
Number – Enter a badge number (the number
of allowed characters depends on the parame-
ters selected in the Site Parameters dialog box;
see Max Badge Number in the Badge Tab on
page 37).

Note: The Add Visitor application only sup-


ports badge numbers of Data Style Normal.

24-10832-194 Rev. E
264 CHAPTER 3
Operating the System

Defining Automatic Badge


Numbers
The Auto Badge Management feature allows
you to control and manage badge numbers
within a defined pool. Once the pool of num-
bers is defined and you are issuing a badge,
you can click Auto to insert the next available
badge number in the Number field.

To Create a Pool of Badge Numbers


5. If this is a partitioned system, click Public
1. From the P2000 Main menu, select Sys- to make these badge numbers visible to all
tem>AutoBadge Management. partitions.
2. Enter your password if prompted. The 6. Define the pool of numbers by entering the
AutoBadge Number Management dialog First badge and Last badge numbers.
box opens.
7. From the Type drop-down list, select
3. If this is a partitioned system, select the whether this pool of numbers is assigned to
Partition for which you want to display Regular or Visitor badges.
the badge numbers.
8. From the Issue drop-down list, select the
4. Click Add Numbers. The Add badge issue level for a badge with this number.
numbers dialog box opens.

24-10832-194 Rev. E
265

9. Click OK to return to the AutoBadge If, for example, they follow another cardholder
Number Management dialog box. The list out without swiping their badge, their badge
box displays the pool of numbers defined remains in the In state (out-of-sync). When
for the selected partition, together with the they attempt to badge back into the area, they
Status of each number and the Modifica- are denied access. You can manually adjust the
tion Date when the entry was created or state of a badge to return it to the correct state.
last modified. You can also reconfigure this badge as Unde-
When you assign numbers from this pool, fined to clear the Entry/Exit status until the
the Status column displays one of the fol- next badging.
lowing:
Available – this number can be assigned to Note: For Entry/Exit to work, all Entry and all
a badge. Exit terminals must either run in Central mode, or
they must all be defined on the same panel and
Reserved – this number has already been run in Local mode.
assigned, but a badge has not yet been
issued.
In Use – this number is currently in use and To Resync Badges
cannot be assigned to another badge. 1. From the P2000 Main menu, select
10. To change the status of a badge number Access>Badge Resync. The Badge
from Available to In Use, click Set In-use. Resync dialog box opens.
11. To change the status of a badge number
from In Use to Available, click Set Avail-
able.

Note: The status of a badge number can be


changed from In Use to Available only if the
number has not yet been issued (it was in the In
Use state because if was changed using the Set
In-use button).

12. To delete badge numbers from the pool,


select the numbers and click Delete
Selected.
13. Click Done to close AutoBadge Number
Management.
2. If this is a partitioned system, select the
Partition in which the badges are active.
Synchronizing Badge Status
3. From the Show drop-down list, select one
Entry and Exit terminals require cardholders to of the following options:
enter and exit an area in sequence. That is,
Cardholders – to resync the status of
when cardholders badge in at an entry termi-
badges that belong to all or specific card-
nal, they must badge out at the next badging.
holders.

24-10832-194 Rev. E
266 CHAPTER 3
Operating the System

Last Badging Terminal – to resync the status 7. Enter the information on any or all of the
of all badges last presented at the selected fields to search for specific cardholders.
terminal. 8. If you wish to search by Company and
Last Badging Terminal Group – to resync Department, select a previously defined
the status of all badges last presented at all name from the drop-down list.
terminals in the selected terminal group. 9. You can also search by UDF. Select any of
the previously defined UDFs from the
drop-down list (Date type UDFs cannot be
Note: The Last Badging Terminal and Last included in the search). Then enter or
Badging Terminal Group options are used, for select the UDF search criteria in the associ-
example, to quickly reset the status of all badges ated field.
after a mustering event or reset the status of
badges in situations when cardholders badged in 10. If you wish to clear the existing search cri-
at an entry terminal and they were unable to teria, click Clear.
badge out at an exit terminal because the exit ter-
11. After you define the search criteria, click
minal was down.
one of the following buttons:
Exact Match – to display an exact match to
4. If you selected Last Badging Terminal or
your search criteria.
Last Badging Terminal Group, select a
terminal or terminal group from the list and Partial Match – to display all possible selec-
continue with step 16. tions that match the initial characters of the
5. If you selected Cardholders, select the search criteria; for example, if you enter
Type of cardholder (Regular, Visitor, or Carl in the First Name field, the list box
<all>) that you wish to display in the list displays names such as Carla, Carlos, Carl-
box. ton, and so on.

6. If you wish to display specific cardholders 12. The list box in the Badge Resync dialog
(within the type selected), click Search. box opens displaying the cardholders spec-
The Database Search dialog box opens. ified in the search criteria.
13. If you wish to display all cardholders again
(within the type selected), click All.
14. After you define the cardholders you wish
to display in the list box, select a card-
holder name from the list.
15. The badge number and status of all badges
assigned to this cardholder display in the
Badges list. Select the badge or badges to
be resync.

Note: Click Select All if you wish to resync the


status of all badges in the system.

24-10832-194 Rev. E
267

16. Click the appropriate button, In, Out, or


Undefined to change the status of the
badges.
17. Click Done. The badge status is now
changed.

Recalling Images
If the Image Recall window is open on the
workstation, any badging (for the partition
selected in Image Recall Filters) displays the
cardholder’s image and information. An oper-
ator with proper menu permissions can define
access conditions and other filter criteria
(transactions set up in the Image Recall Filter 3. If this is a partitioned system, select the
Edit dialog box, such as an Access Grant or Partition in which this image recall filter
any invalid transaction), to determine if an is active.
image displays in the Image Recall window.
4. Click Public if you wish this image recall
filter to be visible to all partitions.
Image Recall Filters 5. Enter a descriptive Name for the image
1. From the P2000 Main menu, select recall filter.
Access>Image Recall Filters. The Image 6. From the Type to Display box, select the
Recall Filters dialog box opens. transactions that you wish to monitor. You
do not need to select all conditions. If you
select Any Deny, all other filtering condi-
tions are dimmed, except Access Grant and
Duress.

Note: Cardholder image and information


always display in the Image Recall window if the
associated badge has the Trace option enabled,
regardless of the filter conditions selected here.

2. Click Add. The Image Recall Filter Edit


7. Select a Terminal name to specify the ter-
dialog box opens.
minal to be monitored.
8. Select a Terminal Group name if you
wish to monitor a Terminal Group.
9. Click OK. The new image recall filter dis-
plays in the Image Recall Filters list.
10. Click Done.

24-10832-194 Rev. E
268 CHAPTER 3
Operating the System

To Activate Image Recall 8. This image and information remain in the


window until another cardholder badges
1. From the P2000 Main menu, select within the partition, or until the Blanking
Access>Image Recall. The Image Recall Time defined elapses, or until you click
window opens. Clear to clear the information in the Image
Recall window.
9. Leave the Image Recall window open on
the workstation to view images displayed
as a result of subsequent badgings.

Image Recall FS (Full Screen)

The Image Recall FS feature offers a simpli-


fied display and works in both default and full
2. If this is a partitioned system, select the screen modes.
Partition in which the image recall is
active. When the Image Recall FS window is open
and a cardholder presents a badge at a terminal
3. Select Popup if the Image Recall window
or group of terminals that meets the filtering
is to move to the front of all windows on the
conditions, the cardholder’s image displays
P2000 screen whenever an access attempt
along with the cardholder name. Optionally,
that matches the current filter occurs.
one or two of the following can also display:
Company, Department, ID, and any text or
numeric user defined field (UDF).
Note: Some computers may not allow the
Image Recall window to automatically pop up in
front of other windows on the screen; instead, the To Activate Image Recall FS
Image Recall button begins flashing in the Win-
dows taskbar. 1. From the P2000 Main menu, select
Access>Image Recall FS. The Image
4. Click Show UDF Fields, if you wish to Recall FS window opens.
display the user defined fields associated
with the cardholder.
5. In the Blanking Time field, enter the time
in minutes after which the image and the
data are cleared. If you enter a value of
zero, the display is not blanked.
6. Select a Filter from the drop-down list.
7. When a cardholder presents a badge at a
terminal or group of terminals that meets
the filtering conditions, the cardholder’s
image displays, along with the current
cardholder information.

24-10832-194 Rev. E
269

2. Select Edit>Options to open the Image 7. Click the Text Font browse button [...] to
Recall Options dialog box and define the open the Font window and select the font
elements you wish to display. type you wish to display. The font style
and size are not configurable.
8. Click the Text Color browse button [...] to
open the standard Color window and select
the text color you wish to display.
9. Click the Background Color browse but-
ton [...] to open the standard Color window
and select the background color you wish
to display.
10. Click the Background Image browse but-
ton [...] to select a background image.
11. In the Blanking Time field, enter the time
in minutes after which the image and the
data are erased and the background is dis-
played. If you enter a value of zero, the
3. If this is a partitioned system, select the
display is not blanked.
Partition in which the image recall is
active. 12. Click OK to save your options and return
to the Image Recall FS window.
4. Select a Filter that contains the access con-
ditions that determine which images to dis- 13. Select View>Full Screen to change the
play. See Image Recall Filters on page 267. display mode to full screen. Click <Esc>
to return to previous view.
5. Select Popup if the Image Recall FS win-
dow is to move to the front of all windows 14. The image and information remain in the
on the P2000 screen whenever an access window until another cardholder badges
attempt that matches the current filter within the partition, or until the Blanking
occurs. Time defined in Image Recall Options
elapses, or until you select View>Clear to
clear the information.
Note: Some computers may not allow the
15. Leave the Image Recall FS window open
Image Recall window to automatically pop up in
front of other windows on the screen; instead, the on the workstation to view images dis-
Image Recall button begins flashing in the Win- played as a result of badgings, or select
dows taskbar. File>Exit to close.

6. From Line 1, Line 2, or Line 3, select the


data to be displayed in the first, second, or
third line under the cardholder’s image.
You can select Badge Expiration Date,
Cardholder Expiration Date, Cardholder
First Name, Cardholder Full Name, Card-
holder Last Name, Company, Department,
ID, or any text or numeric user defined
field.

24-10832-194 Rev. E
270 CHAPTER 3
Operating the System

Monitor Alarms Alarm Configuration


Every alarm in the system must belong to at
Alarm monitoring is at the heart of the P2000 least one Alarm Category, but can also be
Security Management system. According to assigned to multiple alarm categories, each
system devices configuration, alarms display with its own set of alarm options. The system
in the Alarm Monitor queue as they occur. creates a P2000 base alarm category, which
cannot be deleted or renamed.
Operators assigned to monitor alarms respond
according to individual company policy, and An operator can define an unlimited hierarchal
the alarm instruction and response text config- tree of Alarm Categories under the P2000 base
ured for the various alarm types. The Alarm alarm category. When an alarm category dis-
Response text can be pre-configured for opera- plays in various P2000 screens, it typically dis-
tor selection or set to enter manually for a more plays in the form of a URL, for example:
appropriate response. P2000\Maintenance\Building 1.

The Alarm Monitor window opens immedi- You can for example, define an input point to
ately after logging on to the Server, so that generate upon activation, two separate alarms
ongoing alarms are always visible. The Alarm for two configured alarm categories:
Monitor window cannot be closed at the P2000\Maintenance\Building 1 and
Server, to ensure that alarm conditions do not P2000\Security\Building 1. Typically, a single
go unnoticed. However, it can be minimized operator is configured to receive only a single
using the minimize button on the title bar. category of alarms, and therefore would only
receive a single alarm. However, higher level
If the Alarm Monitor window is minimized, an operators such as supervisors, or an operator at
alarm message pop-up can alert the operator a central alarm monitoring location, may be
that a new alarm has been reported. When an configured to receive both of these alarms.
alarm is reported, the operator acknowledges
the alarm, makes the appropriate response, and When deleting an existing Alarm Category, the
then completes the response. P2000 searches the database and issues a warn-
ing if the category is referenced by any alarm
configurations. If the operator chooses to con-
Note: Some computers may not allow the tinue, all existing references to the category
Alarm Monitor window to automatically pop up in being deleted are changed to its parent cate-
front of other windows on the screen; instead, the
gory.
Alarm Monitor button begins flashing in the Win-
dows taskbar. Alarm Categories are an Enterprise-wide con-
figuration and therefore, if you are using the
Pending alarm messages remain in the Alarm Enterprise feature, a single set of categories is
Queue until acknowledged and removed by an shared by all P2000 sites within an Enterprise
operator. Alarm History is stored in the system system.
as configured in Site Parameters.

Note: Elements that report alarms, such as


input points, must NOT have the Disable Alarm
option selected to have the alarm displayed in the
Alarm Monitor window; see page 84.

24-10832-194 Rev. E
271

To Create Alarm Categories


Note: Message Filtering and Alarm Processing
1. From the P2000 Main menu, select Con- Groups apply on P2000 Workstations only, not on
P2000 Servers.
fig>System. Enter your password if
prompted. The System Configuration win-
dow opens. The alarm response typically includes steps
similar to the following:
2. In the left pane, expand Alarm Categories
to display the default P2000 alarm cate- 1. Acknowledge that an alarm condition has
gory. been reported by the system.
3. Select the P2000 alarm category and click 2. Respond by entering the appropriate
Add. The Alarm Category dialog box response.
opens.
3. Complete the alarm.
4. Remove the completed alarm condition
from the Alarm Monitor window.

Acknowledging an alarm – An operator may be


required to acknowledge a new alarm as soon
as it is received (see To Acknowledge an
Alarm on page 275). They may do so and then
4. Enter a Name for the alarm category. return later to actually respond to the alarm,
depending on company policy and the priori-
5. Click OK to save the new alarm category. ties assigned to that alarm. The time and date
The new alarm category is listed under the of the acknowledgment is recorded in the
default P2000 category. You can create alarm history. Acknowledging an alarm
unlimited trees of alarm categories. silences the audible beep (unacknowledged
alarms continue to beep until recognized).
Alarm acknowledgment is optional and does
not need to occur before a response; its use is
typically dictated by company policy.

Responding to an alarm – When an operator


responds to an alarm, the operator name is
entered in the User Name column of the Alarm
Monitor window. The Response time is date
and time stamped for the alarm history record.
Alarm Handling
The operator would typically review the
As an operator, you may be required to handle Alarm State and Description to note any
alarm conditions, depending on the Message known conditions. Specific instructions cre-
Filter Group and Alarm Processing Group ated for the particular alarm display in the
assigned; see User Info Tab on page 24. The Instruction box during the response to help the
Alarm Monitor verifies that alarms pass the operator perform the appropriate action. (See
Alarm Processing Group filter (if any) for the To Respond to an Alarm on page 275.)
operator before allowing the operator to
acknowledge, respond or complete alarms.

24-10832-194 Rev. E
272 CHAPTER 3
Operating the System

Completing an alarm – Several actions may When a new alarm displays in the Alarm Mon-
take place during the handling of an alarm. itor window, an audible beep sounds, and a red
When all actions needed to process the alarm color bell icon in the line item entry message
have been completed, the operator completes begins flashing. The entry continues in this
the alarm. This action is date and time stamped Pending state until an operator acknowledges
for the alarm history record. (See To Complete the alarm, after which the beep stops and the
an Alarm on page 277.) An alarm can only be bell icon changes to yellow.
completed if the alarm state is secure. Some
alarms in secure state, such as Guard Tour
alarms, must first be acknowledged or TIP: You can right-click a line item in the
responded, before they can be completed. Alarm Monitor window to acknowledge, respond,
complete, or remove alarms from the shortcut
menu. The shortcut menu also allows you to see
the location of the alarm on a Real Time Map, dis-
Note: Responding to an alarm that has not play live or stored AV video (if available), or view
been acknowledged automatically causes an all items when you click Display All. In addition, if
acknowledgment to occur. Similarly, completing the element that generated the alarm was config-
an alarm causes an automatic acknowledge, if ured to manually activate events, the event name
needed. also displays in the shortcut menu. Also, you can
select from the shortcut menu to Print All alarms
in the queue or select Print Displayed to print
Removing the Alarm from the queue – Accord- only the alarms that display in the list box.
ing to company policy, operators may remove
completed alarms from the alarm queue. The
alarm response sequence remains in the alarm
Monitoring Remote Alarms
history record. (See To Remove an Alarm
Message from the Queue on page 277.) You can configure your system to receive
alarm messages from remote P2000 sites,
Refreshing the Alarm Monitor window – The allowing operators to simultaneously monitor
Refresh button on the Alarm Monitor window alarms locally and at multiple remote sites.
is used to read again all current alarms from This feature is useful to monitor alarms at
the database (this should not be needed unless unattended sites that are closed for the week-
there was a loss of communication with the end or a holiday, and ensures that all alarm
Server). conditions, even at far away locations, are
watched closely at all times.
Access the Alarm Monitor from the P2000
Main menu. Select Alarm>Alarm Monitor, To be able to monitor remote alarms, both your
or if minimized just click the Alarm Monitor local and the remote site have to be properly
button to restore it. configured. The following conditions must be
met:
The Alarm Monitor queue displays alarms in a
scrolling list, as they occur. The alarm  The Remote Message Service must be up
response changes as the operator performs the and running at both the remote site (to send
response steps (see the Alarm Status column the alarm message) and at your local site (to
header in the Alarm Monitor window); and the receive the alarm message). The Remote
date and time of each step is recorded in the Message Service can be started and stopped
alarm history record. using the P2000 Service Control feature, just
like the other P2000 services. See Starting
and Stopping Service Control on page 432.

24-10832-194 Rev. E
273

 The Message Filter Configuration appli- If these conditions are met, your local Alarm
cation (page 222), must be properly config- Monitor window displays alarm messages that
ured at your local site and each remote site, are generated at remote sites when their alarm
to control the type of messages transmitted status or state changes.
between Servers, thereby reducing network
traffic by transmitting only messages that The procedures for handling remote alarms are
pass the filter criteria. similar as for local alarms; however, the fol-
lowing points should be noted:
 The P2000 Remote Server application
(page 230), must be properly configured at Responding to remote alarms – Alarm instruc-
each remote site to be able to send their tions are sent to remote sites; however, the
alarm messages to your local site. The setup alarm responses remain local. While the Alarm
must include the name, IP address and Status column in the Alarm Monitor displays a
Remote Message Service Listener Port Responded status, the alarm response entered
number of your local site; the type of mes- at a remote site is not part of the alarm history
sages that is forwarded to your site and at in your local site.
what times; and other related parameters.
Completing remote alarms – Remote alarms
 The Process Received Remote Messages
can be completed, regardless of the current
option in the RMS tab of Site Parameters
alarm state.
(page 43), must be selected at your local site
to be able to receive messages from remote Removing remote alarms – Remote alarms can
P2000 sites. If you select this option, the be removed from the queue, regardless of the
Remote Message Service processes incom- current alarm state. Removed alarm are auto-
ing messages and pass them on to RTLRoute matically completed.
for distribution within the local system and,
if applicable, to other remote sites.
Alarm Monitor Definitions
 The Message Filter Group selected in the
RMS tab of Site Parameters (page 43), Date/Time – Displays the date and time the
defines which remote messages your alarm was reported to the system. Alarms that
Remote Message Service processes. If you are originated at remote sites with different
select <None>, your local P2000 site geographical time zones display the actual
receives all remote messages. time at the remote site.
 The Local Alarms option in the RMS tab
of Site Parameters (page 43), must be
selected at the remote site to allow remote Note: Click any of the column headings to sort
operators to acknowledge, respond, and the alarms by the selected column heading.
complete alarms originated at your local
site. Escalation – Displays the escalation level of
 The Remote Alarms option in the RMS tab the alarm (the highest is 10).
of Site Parameters (page 43), must be
selected at the remote site to allow remote Priority – Displays the Alarm Priority set for
operators to acknowledge, respond, and each alarm type (the highest is 0).
complete alarms originated at other P2000
sites.

24-10832-194 Rev. E
274 CHAPTER 3
Operating the System

You can assign sounds to Alarm Priorities 0 to Alarm Status – Displays one of the following:
255 in groups of 10. The sound files can be set
up from Control Panel in your Windows desk-  Pending – Not yet acknowledged.
top, clicking the Sounds icon. In the Sounds  Acknowledged – Acknowledged but no
tab, select any of the Pegasys Alarm Priorities action taken.
from the Program events box, then select the  Responding – Acknowledged and response
corresponding sound file from the Sounds action in progress.
drop-down list.  Complete – Action taken.

Alarm State – Indicates the state of the alarm,


Note: To access the P2000 alarm priority such as Secure, Alarm, Open, Short, Sup-
sounds, you must open the Alarm Monitor win- pressed, Tamper, Bypassed, and so on.
dow at least once at the workstation.
Description – Displays a description of the ele-
ment that activated the alarm.

Alarm Category – Displays the Alarm Category


to which the alarm belongs. The default cate-
gory is P2000. When an alarm is assigned to
multiple Alarm Categories, and the operator is
configured to view alarms from these multiple
categories, the alarm displays separately for
each category.

User Site – Displays the site name from where


the operator is handling the alarm.

User Name – Displays the name of the operator


who handles the alarm.

24-10832-194 Rev. E
275

Action Date/Time – Displays the date and time Map Button – You can see the location
the action (respond, complete, and so on) takes of an alarm on a Real Time Map from
place. This is always the local time, regardless the Alarm Monitor window. Select an
if a remote site is in a different geographical alarm and click the Map button. The map dis-
time zone. plays and the icon blinks indicating the loca-
tion of the alarm. For more information, see
Query String – Displays the query string value Using the Real Time Map on page 346. This
(if it was defined) of the item associated with feature is available for local alarms only.
the alarm.
AV – This button is enabled if your facility uses
Alarm Site – Displays the name of the P2000 the DVR/VMS feature. If the alarm message
site where the alarm was originated. displayed is associated with a camera, you can
Partition – Displays the name of the partition select the message line from the list and click
containing the item (input point, terminal, the AV arrow, then select whether you want to
panel, and so on) that originated the alarm. display live or stored video. For more informa-
tion, refer to your DVR/VMS documentation.
Public – Displays whether the alarm message
is visible to other partitions. Print – Click the Print arrow and select whether
you want to Print All alarms in the queue or
Audible Alarm Button – Click the select Print Displayed to print the alarms that
Audible Alarm button to temporarily are visible in the Alarm Monitor list box.
disable the audible alarm beep. All
alarms are affected. Unless you acknowledge,
To Acknowledge an Alarm
respond, or complete the alarm, the beep
becomes audible again in 40 seconds. If you 1. Click the line item you wish to respond to
wish to turn off the audible alarm beep, select and click Ack. The Alarm Status changes
from the Sounds dialog box in Control Panel, to Acknowledged. This informs the system
any of the Pegasys Alarm Priorities, then and anyone else monitoring the system that
browse for the None.wav file located in the bin the alarm has been recognized.
folder of the P2000 software installation.
2. If several alarms come in at once, you can
Msg Routing Status – The Message acknowledge them in any order you wish;
Routing Status indicator displays in however, company policy may dictate that
green to indicate that all communica- you respond by priority. If desired, select
tions between the workstation and the Server the highest priority by number, or click the
are up. If communications go down, the Mes- Priority column title to sort by priority,
sage Routing Status indicator turns red. moving the highest priority to the top of
the list.
Total – Displays the total alarm count in the
Alarm Monitor window.
To Respond to an Alarm
Pending – Displays the number of pending
alarms in the Alarm Monitor window. 1. With the line item to which you wish to
respond selected, click Respond. The
Alarm Response dialog box opens.

24-10832-194 Rev. E
276 CHAPTER 3
Operating the System

2. The Description box displays the descrip-


Note: See Creating Predefined Alarm
tion for the line item selected in the Alarm Response Text on page 279 for information on
Monitor window. adding different responses for specific alarms.
3. The Condition box displays the alarm con-
dition. 7. If you wish, you can also enter a specific
4. The Instruction box displays any instruc- response in the Text box and click Add to
tion text associated with the alarm. add your response to the History box.
5. The History box displays all stored history 8. Click Done to return to the Alarm Monitor
for the line item selected from the Alarm window.
Monitor.
6. If you wish to add a predefined response,
click the Predefined Alarm Response Note: You can have multiple Alarm Response
Text drop-down list and select the desired windows open and respond to multiple alarms
simultaneously. You can also acknowledge or
response. The response text displays in the
complete alarms in the Alarm Monitor window
Text box. Click Add to add the selected while the Alarm Response window is open, but
response to the History box. The Alarm you cannot acknowledge or complete those
Status changes to Responding. This stores alarms that are currently open in the Alarm
a record of the response in the transaction Response windows.
history.

24-10832-194 Rev. E
277

To Complete an Alarm To View Alarm Instructions

1. Click Complete to end the alarm process- Instruction text associated with an alarm can
ing sequence. The Alarm Status changes to be viewed from the Alarm Response window,
Complete. Alarms can only be completed the Alarm Details window, or by right-clicking
if the alarm state is secure. an alarm in the Alarm Monitor window and
selecting Instructions.
To Remove an Alarm Message from the
Queue To Activate an Event from the Alarm
Monitor
The Complete and Remove buttons do not
become active until the alarm is in the secure 1. In the Alarm Monitor window, select the
state. line item you are responding to and
right-click to open the shortcut menu.
1. Select a line item from the scrolling list.
2. Click the event name you wish to activate.
2. Click Remove. The event is triggered.

To Display Alarm Details


Configuring Alarm Colors
1. In the Alarm Monitor window, select an
The P2000 system provides color configura-
alarm from the list.
tion capability for each alarm priority (0 to
2. Right-click to open the shortcut menu and 255) and its corresponding alarm status. Each
select Details. alarm status can have a unique color assigned
to help operators recognize specific alarms.
When a new alarm displays in the Alarm Mon-
itor window, the line for the affected alarm dis-
plays in the color that was assigned using the
Default Alarm Colors dialog box.

To Define Color-Coded Alarms

1. From the P2000 Main menu, select Con-


fig>System. Enter your password if
prompted. The System Configuration win-
dow opens.
2. In the left pane, expand Site Parameters.
3. Select Default Alarm Colors and click
Edit. The Default Alarm Colors dialog
box opens.
The window displays the alarm details for
the line item selected, together with the
associated alarm instruction, alarm history,
and any response entered for the alarm.
3. Click Done to close.

24-10832-194 Rev. E
278 CHAPTER 3
Operating the System

7. Click Background Color and select the


desired background color from the color
palette. Click OK.
8. The Sample Text box displays the selected
colors. Click OK to return to the Default
Alarm Colors dialog box. You cannot see
the new color until you select other priority
number or click anywhere on the screen.
9. Repeat the same steps if you wish to assign
colors to other alarm priorities.
10. If you wish to reset to the default system
colors, select the Priority line and click Set
To Default.
11. When you finish setting all alarm colors,
click OK.
4. Click the Priority line you wish to define.
The assigned colors for each priority and
5. Click one of the following buttons:
corresponding alarm status are the default
 Pending Color – to assign a specific colors for all operators; however, operators
color to alarms that have not yet been who are required to handle certain alarm
acknowledged. conditions may want to use different colors
 Acked Color – to assign a specific color for the alarms they need to see. In that case,
to alarms that have been acknowledged. the default alarm colors can be changed
 Respond Color – to assign a specific color from the Alarm Monitor window.
to alarms that have been responded.
 Complete Color – to assign a specific col- Note: The ability to change alarm colors from
or to alarms that have been completed. the Alarm Monitor window is controlled by menu
permissions. Therefore, if you do not want opera-
 All Colors – to assign the same color to tors to override the default alarm colors, remove
all alarm status for the priority selected. the Alarm Colors permission from their Menu Per-
mission Group.
Regardless of the option selected, the Edit
Color dialog box opens.
12. Open the Alarm Monitor window, and
click the system menu button.

System Menu Button

6. Click Text Color and select the desired


text color from the color palette. Click OK.

24-10832-194 Rev. E
279

13. From the control menu select Alarm Col- 3. The Name, Text, Partition, and whether or
ors. The Alarm Colors dialog box opens not the text is Public display in the list.
displaying the default colors that were 4. Click Add. The Alarm Response Text dia-
defined from the System Configuration log box opens.
window.
14. Assign the desired colors as described
before, then click OK to save your settings.

Note: Alarm colors that are assigned from the


Alarm Monitor window are associated with the 5. Select a Partition, if applicable, and click
operator who made the changes. In addition, the Public if you wish the text to be seen by all
Set To Default button resets to the default colors
partitions.
assigned from the System Configuration window.
6. Enter a descriptive Name for the text.
7. Enter the actual Text you wish to enter into
Creating Predefined Alarm the Alarm Response record.
Response Text 8. Click OK. The Response text name is now
You can create Response text to speed alarm available in the drop-down list of the
response to specific types of alarms. For exam- Alarm Response dialog box.
ple, when panels go down for regular mainte-
nance, a Panel Down soft alarm is sent to the Monitoring Alarms Using the SIA
Alarm Queue. The operator can quickly Interface
respond by selecting a predefined response
from the drop-down list.
Note: The P2000 system only supports the
Bosch® (formerly Radionics) system SIA mode
To Create Predefined Alarm Response using ADEMCO Contact ID protocol.
Text

1. From the P2000 Main menu, select The Bosch D6600 Security Receiver/Control-
Alarm>Alarm Response Text. The ler is capable of receiving alarm and supervi-
Alarm Response Text list opens. sory messages from the Bosch digital dialers
over analog telephone lines. It can process up
to eight individual telephone lines simultane-
ously. The Bosch Receiver/Controller is con-
nected to the P2000 system via a standard
RS232 serial interface.

The Bosch Receiver/Controller can also be


programmed to send alarm messages through
the COM RS232 port. The communications
parameters must be programmed using a
2. If this is a partitioned system, select the hand-held Bosch programmer. (Refer to the
Partition in which this alarm response text Bosch manual for programming instructions.)
applies.

24-10832-194 Rev. E
280 CHAPTER 3
Operating the System

The communication takes place only in one 6. Click Enable to enable the SIA device.
direction; from the Bosch system to the P2000 7. Click P2000 Alarms to display messages
Server. The P2000 Server does not transmit from the SIA device in the Alarm Monitor
commands to the Bosch Receiver/Controller (in addition to the SIA Message Viewer
and cannot suppress any Bosch capabilities window, where they display by default).
such as print or display audible indications.
The P2000 Server acknowledges messages as 8. Select the Comm. Port to which the SIA
they are received. device is physically connected. Choices
include serial input and output ports COM1
This section describes the configuration of the to COM32.
Bosch interface to the P2000 system. You must 9. Select the Baud Rate for the SIA device
program the Bosch system before connecting it communications. The recommended value
to the P2000 Server. All information must be is 9600.
supplied by the Bosch installer.
10. Select the number of Data Bits for the SIA
device communications. The recom-
To Configure the SIA Interface mended value is 8.
1. From the P2000 Main menu, select Con- 11. Select the appropriate Parity for the SIA
fig>System. Enter your password if device communications. The recom-
prompted. The System Configuration win- mended value is None.
dow opens. 12. Select the number of Stop Bits for the SIA
2. Select SIA Device and click Add. The SIA device communications. The recom-
Device Edit dialog box opens. mended value is 1.
13. Click OK to save your settings.

To View Messages from the SIA Device

1. From the P2000 Main menu, select


Alarm>SIA Message View. The SIA Mes-
sage View dialog box opens.

3. If this is a partitioned system, select the


Partition to which the SIA device has The Date/Time column displays the date
access. and time the message originated.
4. Click Public to make this SIA device visi- The Message column displays the text of
ble to all partitions. the message.
5. Enter the Name that identifies the SIA
device.

24-10832-194 Rev. E
281

The Partition column displays the name To Forward Messages from One
of the partition containing the SIA device Workstation to Another
that originated the alarm.
1. From the P2000 Main menu, select
The Public column indicates whether the Alarm>Message Forwarding. The Mes-
message is visible to other partitions. sage Forwarding dialog box opens listing
the workstations from where and to where
all current messages are forwarded.
Note: The Message Routing Status indicator
displayed in green indicates that all communica-
tions between the workstation and the Server are
up. If communications go down, the Message
Routing Status indicator turns red.

2. Click Clear List to remove all messages


from the list.
3. Click Done to close the window.

Message Forwarding 2. If this is a partitioned system, select the


Partition in which the workstations are
Message Forwarding is useful when using
active.
message filters. At times, it may be necessary
to temporarily forward messages from one 3. Click Add. The Message Forwarding Edit
workstation to another; for example, if an dialog box opens.
operator must leave the workstation for a short
period of time, or during a vacation or sick
leave. When the operator is ready to receive
messages at the workstation again, message
forwarding for the workstation can be deleted.

Note: When forwarding messages from one


workstation to another, the system must decide 4. From the From Station drop-down list,
which messages are to be forwarded depending select the workstation from which to for-
on the operator that is logged on at the receiving ward the messages.
workstation. The system only transmits mes-
sages that pass the filter criteria associated with 5. From the To Station drop-down list, select
the operator. See Operators and Messages on the workstation to which you wish to for-
page 221. ward the messages.
6. Click OK. The new entry displays in the
Message Forwarding list.
7. Click Done.

24-10832-194 Rev. E
282 CHAPTER 3
Operating the System

Fire Alarm Control The IFC fire alarm system uses the P2000 IFC
Interface Service to communicate IFC panels
The fire alarm function allows the P2000 sys- with the P2000 server using the BACnet proto-
tem to monitor alarms generated by fire col. This service allows the P2000 system to
devices connected to Notifier® and IFC (Intel- monitor alarms generated by devices con-
ligent Fire Control) fire panels. The fire system nected to IFC panels. The P2000 system cur-
consists of sensors, connected to the fire panel, rently supports IFC-320, IFC2-640, and
capable of detecting fire events. These detec- IFC2-3030 fire panels. Complete hardware
tors are grouped into zones that use audible installation and operation instructions are pro-
signals (input/output modules) to indicate that vided with the IFC panel option requested for
a zone is in alarm condition. your facility.

Both fire systems benefit from the P2000 sys-


Note: To avoid conflict, do not configure your tem powerful alarm capability by providing the
P2000 system to use a combination of Notifier tools that define how these alarms respond
and IFC fire panels. You may only use one fire when activated, whether or not they trigger
panel type within the P2000 system. output relays, and at which times an alarm can
be activated.
The Notifier fire alarm panel communicates When properly configured, the P2000 system
with the P2000 server using Johnson Controls should:
Fire OPC Server. It uses the P2000 OPC Proxy
Service to provide the communication between  receive notification from the fire panel that
the P2000 server and the Notifier fire panel. a fire has been detected in the building
Use the instructions provided in the Notifier®  identify the location of the fire
AMx000 unit OPC Server Application to
 inform building personnel that a fire has
define your fire system, such as fire detectors,
been detected
input/output modules, and how these input and
output devices can be associated with fire  warn the occupants of the building that a
zones. fire has been detected to ensure that all are
able to exit the building before escape
routes become impassable.
Note: The P2000 system has been validated to
support up to 4,000 OPC points. Basic Definitions

Activated – The state of a device connected to a


fire input/output module, such as evacuation
IMPORTANT: The Notifier panel is not avail- signals or a sprinkler system.
able in North America. Contact Johnson Controls
Systems Integration Services Europe for informa- Deactivated – The state of a device connected
tion. to a fire input/output module after the fire
alarm is reset.

Detector – Device connected to the fire panel


and that reports physical changes associated
with fire such as a heat detector, a smoke
detector, or a carbon monoxide detector.

24-10832-194 Rev. E
283

Disabled – The state of a fire detector, zone or The P2000 software is used to:
input/output module that is disabled from
reporting fire alarms. This state is typically  Provide the communication between P2000
used with devices that report false alarms or applications and the Fire OPC Server (when
can be used to turn off fire devices after an using Notifier panels), using the P2000
alarm condition. OPC Proxy Service; see page 432.
 Provide the communication between P2000
Enabled – The state of a fire detector, zone or applications and IFC panels through the
input/output module that is enabled for report- BACnet protocol, using the P2000 IFC
ing fire alarms. Interface Service; see page 432.
Fire Panel – Device that is the controlling com-  Enable the fire server; see page 283.
ponent of a fire alarm system. The panel  Configure alarm options for fire alarm pan-
receives information from sensors designed to els, detectors, zones, and input/output mod-
detect changes associated with fire (detectors), ules; see page 286.
monitors the operation of these detectors, and  Monitor and display the status of fire detec-
activates equipment (input/output modules) tors, zones, and input/output modules; see
designed to alert building personnel of poten- page 288.
tial danger.
 Define event triggers associated with fire
Input/Output Modules – Device connected to a detectors, zones, and input/output modules;
fire panel that can detect input from switched see page 289.
devices, such as sprinkler systems; and acti-  Run alarm activity and alarm history
vate notification signals, such as alarm bells or reports associated with fire alarms; see
telephone dialers. Traditionally, when an input page 471.
device is activated, a certain output device (or
relay) is also activated. The above sections describe fire alarm config-
uration and control procedures using the
Zone – An area in a facility that is associated P2000 software.
with fire detectors and input/output modules.

Fire Alarm Server Configuration


Basic Fire Alarm Components
After you configure your fire panel and associ-
This section describes the basic components of ated items using the instructions provided with
a fire alarm control system. The fire alarm your fire unit, you must define fire compo-
control system consists of the P2000 software, nents in the P2000 System Configuration win-
the panel (Notifier or IFC) firmware, and the dow to populate the associated data into the
panel components (fire detector, zone, and P2000 database.
input/output modules).

24-10832-194 Rev. E
284 CHAPTER 3
Operating the System

To Enable the Notifier Fire Server

IMPORTANT: We recommend using the Fire


OPC Server Configurator to remove fire detector
loops that are not physically configured in the
Notifier panel, to avoid reporting unknown states
to the P2000 system. Do this before enabling fire
components in the P2000 system. Otherwise, you The P2000 system is now ready to operate with
must remove any unused fire component using the Notifier fire panel, continue with Fire
the Empty Fire Data task in Database Mainte-
Alarm Configuration on page 286.
nance.

1. From the P2000 Main menu, select Con- To Configure the IFC BACnet Gateway
fig>System. Enter your password if Keep in mind the following points before con-
prompted. The System Configuration win- figuring the IFC BACnet Gateway:
dow opens.
2. In the left pane, expand Fire Server.  The P2000 system communicates with IFC
panels through the BACNET-GW-3 module
3. Expand Notifier. using the BACnet over IP protocol on UDP
4. Select the fire server name and click Edit. port 47808. You cannot edit this port using
The Fire Server Config dialog box opens. the Port Configuration tab in Site Parame-
ters.
 Verify that the P2000 server that integrates
with IFC panels has its firewall disabled.
 Make sure the device ID of the IFC panel is
not set as 0.
 You cannot define two IFC objects (gate-
5. Verify that the fire server name displays in way, panel, input/output modules, or detec-
the Name field. tors) with the same device ID.
6. Select the Enable check box.  If you enable or disable LAN communica-
7. Click OK. tions on the P2000 server, you must restart
the P2000 system to successfully integrate
Once you enable the fire server, the System with IFC panels.
Configuration window is automatically popu-
lated with the fire panel and associated fire
zones, detectors, and input/output modules. Note: The BACnet Gateway Configuration
application provides a mechanism to discover the
IFC panel and associated fire zones, fire detec-
tors and input/output modules from the actual
hardware devices.

1. From the P2000 Main menu, select Con-


fig>System. Enter your password if
prompted. The System Configuration win-
dow opens.

24-10832-194 Rev. E
285

2. In the left pane, expand Fire Server.


3. Select IFC and click Add. The BACnet
Gateway Configuration dialog box opens.

4. Select the Partition in which the BACnet 12. Select the fire objects to be imported to the
Gateway and associated IFC panel and P2000 database. When you select a check
devices are active. box for a parent object, all its children
5. Click Public to allow all partitions to view objects are also selected and imported. You
this BACnet Gateway. can manually clear check boxes for any
objects you do not want to import.
6. Enter the Gateway Name that describes
the BACnet Gateway or IFC panel. 13. Click OK to return to the BACnet Gate-
way Configuration dialog box.
7. Enter the Gateway IP address of the BAC-
net Gateway. This IP address is used to 14. Click OK to save the BACnet Gateway
discover the associated IFC objects. You information. The System Configuration
must configure the BACnet Gateway and window is automatically populated with
the P2000 server on the same subnet. the fire panel and associated fire zones,
detectors, and input/output modules
8. Enter the Polling Interval (in seconds)
selected.
that is used by the P2000 IFC Interface
Service for polling the BACnet Gateway to
obtain IFC panel status information.
9. Enter the number of times that the Server
Retries to connect with the IFC panel,
after which the panel is considered offline.
10. Enter the time in seconds by which the
P2000 system can keep searching for IFC
objects until the Wait Time elapses.
11. Click Explore Device to display the IFC
panel and devices associated with the
BACnet gateway.

24-10832-194 Rev. E
286 CHAPTER 3
Operating the System

The P2000 system is now ready to operate with To Configure Notifier Fire Alarms
the IFC fire panel, continue with Fire Alarm
Configuration on page 286. 1. In the System Configuration window,
expand Fire Server.
2. Expand Notifier, then expand the fire
Note: You can configure multiple BACnet gate- server name to display all the fire panel
ways that contain multiple IFC fire panels to allow components.
the P2000 system to receive alarms from multiple 3. Select a Fire Panel or component (Zone,
IFC systems; however, the P2000 system can
Detector, or IO Module). Click Edit.
only communicate with up to five IFC panels.

Note: The IFC panel may show a Trouble con-


dition on the control module and on the relay
module, but the P2000 system shows Enabled.
This is because the P2000 systems gets the
Enabled status from the BACnet gateway.

Fire Alarm Configuration

Every alarm that is generated in the P2000 sys-


tem, must belong to at least one Alarm Cate-
gory (see Alarm Configuration on page 270 for
details), but can also be assigned to multiple
alarm categories, each with its own set of
alarm options. For example, if a fire input/out-
put module connected to a push-button switch
generates an alarm, you can define this 4. The Fire Devices Configuration dialog box
push-button switch to generate upon activation opens for the selected item.
two separate alarms for two configured alarms
categories, for example one for P2000\Mainte-
nance\Building 1 and one for P2000\Fire\
Building 1. The P2000\Fire alarm can be con-
figured with a higher priority, enabled escala-
tion settings, and to be monitored by security
personnel. The P2000/Maintenance alarm can
be configured with a lower priority, no escala-
tion settings, and to be monitored by mainte-
nance personnel.

Use the following instructions to assign fire


related alarms to one or more Alarm Catego-
ries.

24-10832-194 Rev. E
287

5. If you are configuring alarm options for a To Configure IFC Fire Alarms
Fire Panel, select from the Partition
drop-down list, the appropriate Partition 1. In the System Configuration window,
that has access to the Fire Panel. Partition expand Fire Server.
selection is only available at the Fire Panel 2. Expand IFC, then expand the BACnet
level. Gateway name to display all the fire panel
6. Click Public if you wish the fire device to components.
be visible to all partitions. 3. Select a Fire Panel or component (Zone,
7. Specify the Query String value to be used Detector, or IO Module). Click Edit.
with message filtering.
8. In the Alarms Options box, click Add to
assign this alarm to one or more Alarm
Categories. The Add Alarm Categories
dialog box opens displaying all previously
created alarm categories (see page 270 for
details).

Note: If you use the Enterprise feature, the


Alarm Categories defined for all P2000 sites
4. The BACnet Devices Configuration dialog
within an Enterprise system are listed. box opens for the selected item.

9. Select one or more categories and click


Add. The list displays all the selected
alarm categories.
10. If you wish to remove a category from the
list, select the alarm category and click
Delete.
11. Once you have all the alarm categories you
want to assign to this alarm, select an
alarm category from the list and click Edit
to edit the alarm options. You can select
and edit more than one category at a time.
The Alarm Options dialog box opens dis-
playing the General tab. See the definitions
provided on page 83.

24-10832-194 Rev. E
288 CHAPTER 3
Operating the System

5. If you are configuring alarm options for a 12. Once you have all the alarm categories you
Fire Panel, select from the Partition want to assign to this alarm, select an alarm
drop-down list, the appropriate Partition category from the list and click Edit to edit
that has access to the Fire Panel. Partition the alarm options. You can select and edit
selection is only available at the Fire Panel more than one category at a time. The
level. Alarm Options dialog box opens display-
6. Click Public if you wish the fire device to ing the General tab. See the definitions
be visible to all partitions. provided on page 83.

7. The Object Name displays the fire item


selected. You can change this name, if you
wish. Note: Be aware that if you delete an Alarm
Category, all existing IFC fire object alarms that
8. Specify the Query String value to be used belong to that Alarm Category are not deleted
with message filtering. from the Alarm Monitor.

9. In the Alarms Options box, click Add to


assign this alarm to one or more Alarm
Fire Alarm Management
Categories. The Add Alarm Categories
dialog box opens displaying all previously Management of fire alarms includes displaying
created alarm categories (see page 270 for fire alarm information in the Alarm Monitor,
details). Real Time List, Real Time Map, and System
Status windows. See the following sections:

 Monitoring Fire Alarms using the Alarm


Monitor Window
 Viewing Fire Transactions Using the Real
Time List
 Monitoring Fire Components Using the
Real Time Map
 Viewing Fire Components Using the
System Status Window
Note: If you use the Enterprise feature, the
Alarm Categories defined for all P2000 sites
within an Enterprise system are listed. Note: The IFC panel may report to the P2000
system an alarmed status for items that are actu-
ally in pre alarmed state.
10. Select one or more categories and click
Add. The list displays all the selected
alarm categories.
Note: When you disconnect the Network Com-
11. If you wish to remove a category from the munications Module (NCM) used by the IFC
list, select the alarm category and click panel, the P2000 system may show the panel sta-
Delete. tus as Trouble instead of Down. Also, be aware
that the P2000 system does not display alarms
associated with NCM Error and Ground faults
generated by the IFC panel.

24-10832-194 Rev. E
289

Monitoring Fire Alarms using the Alarm To add fire icons to the Real Time Map, follow
Monitor Window the instructions provided in Creating a Real
Time Map on page 348.
Fire alarms can be monitored, acknowledged,
and removed using the Alarm Monitor win- Map Maker provides a default fire component
dow. For detailed information, see Monitor image set to display various fire states. How-
Alarms on page 270. ever, you can use your own icons to create cus-
tom image sets. See Adding Image Sets on
page 352 for details.
Viewing Fire Transactions Using the
Real Time List
Viewing Fire Components Using the
All fire transactions are sent through real time System Status Window
messages to the Real Time List. As the status
of defined fire detectors, zones, and input/out- The System Status window displays the cur-
put modules changes, corresponding related rent status of fire zones, detectors, and
messages are generated and displayed. You input/output modules that have been config-
must select the Fire check box in the Real ured for fire alarm control.
Time List window to display all fire transac-
tions as they occur. See Using the Real Time See Viewing System Status on page 435 for
List on page 342 for more information. instructions on how to display fire component
status.

Note: If you wish to print fire transactions as Fire Component Events


they occur, you can either print them from the
Real Time List window, or select the Fire check The fire alarm system connected to the P2000
box in the Site Parameters dialog box, Printing system can trigger events and respond to event
tab; see page 34. actions using the P2000 Event application. For
specific instructions, see Create Events on
page 335. Typical fire commands to be
Monitoring Fire Components Using the included and linked to specific actions are as
Real Time Map follows:
The Real Time Map displays the status of fire  An alarmed fire zone (trigger) forces a door
panels, detectors, zones, and input/output to be locked to control the spread of smoke
modules on a map layout of your facility. fumes and fire (action).
Upon fire alarm activity, the map shows the  A fire panel that enters the trouble state
state change and the exact location of the (trigger) sets the badge security level at a
activity. See Using the Real Time Map on specified value (action).
page 346.
For a complete list of event triggers associated
When a status changes, the associated fire icon with fire panels, detectors, zones, and
starts flashing. If the fire component was con- input/output modules, see Appendix A: Event
figured to allow the operator to activate events, Triggers/Actions.
the event name also displays in the shortcut
menu.

24-10832-194 Rev. E
290 CHAPTER 3
Operating the System

Perform Operator Controls 3. If this is a partitioned system, select the


Partition in which this door is active.
4. In the Control box, select either Door or
Most system functions operate automatically; Group to populate the Name drop-down
however, some functions may be operated list with selections.
manually from a workstation. Operators with
the appropriate permissions can manually con- 5. Select a Name from the drop-down list.
trol doors, output devices, and panel relays. 6. In the Action box, select one the following:
For example, an operator can unlock all doors Return to Normal – to return the door to its
at once, manually trigger a certain event, or normal state. For CK721-A terminals, this
allow a guard to manually control access to a command can also be used to shorten the
specific door during off business hours. Opera- access time after access was granted.
tor controls are panel specific. See Appendix
C: Panel Comparison Matrix for a detailed list Open for Access Time – to unlock the door
of features and capabilities supported by your for the time set in the Access Time field
panel type. defined in the Terminal dialog box. This
command cannot be used for some Aperio
locks.
Controlling Doors
When using Schlage AD400 locks, the
An operator can manually control a door, a Reader Override message displays on the
group of doors, or all doors (override system Real Time List, the Reader Terminal on
controls) for a specific time period. (The oper- System Status changes from Terminal Up
ator must first have menu permissions for Door to Terminal Override, and the door stays
Control to use this feature.) If this is a parti- unlocked for 20 seconds.
tioned system, the doors or door groups avail-
When using Schlage AD300 locks, the
able from the drop-down list are those active in
Reader Override message does not display
the operator’s partition.
on the Real Time List, and the Reader Ter-
minal on the System Status does not change.
To Manually Control Doors
Unlock – to unlock the door for the number
1. From the P2000 Main menu select Con- of minutes entered (up to 1440 minutes) in
trol>Door Control. the Duration field, after which the door
2. Enter your password if prompted. The reverts back to their original system-con-
Door Control dialog box opens. trolled condition. Not available for HID
panels and some Aperio locks.
Lockout – to prevent access by all badges
at the door. Only supported by OSI, Assa
Abloy PoE, and HID panels. The Lockout
door command is not available in the Web
Access interface.
Set Reader Mode – to set the reader mode
of operation to one of the following
options. Only supported by Mercury pan-
els.

24-10832-194 Rev. E
291

 Card Only – a card is required for access.


 Card and PIN Required – a card and a
PIN are required for access.
 Disable Reader, no REX – the reader is
disabled; request to exit is not allowed.
 Locked (No Access, REX Active) – the
reader is locked; request to exit is
allowed.
 Unlocked – the reader is unlocked.
Do not use the Return to Normal com-
mand if you wish to reverse the Set Reader
Mode – Unlocked option. Instead use Set
Reader Mode – Card Only or Set Reader 3. If this is a partitioned system, select the
Mode – Card and PIN Required. Partition in which the doors are active.
4. Click All Panels if you wish to control all
doors in the system, or click Selected
Note: The Reader Mode selected here is in Panel and select a panel to control all
effect until it is changed either through Mercury
doors connected to the selected panel.
Terminal, Mercury Procedure, Host Events, or
Web UI Maps. 5. Click Unlock All Doors if you wish to
unlock all doors.
7. Click Perform. The Action selection goes 6. Click Perform. The system informs you
into effect. that the doors will remain unlocked until
8. Click Done to exit the window. you lock the doors again, and prompt you
to continue.
7. Click Yes. This overrides the system con-
To Control all Doors at once
trol until you reverse the command.
8. To return the doors to their previous state,
Note: This feature only applies to terminals click Resume Normal Operation.
that support door control from the P2000 system.
Whether or not a terminal supports door control 9. Click Perform. The system prompts for
from the P2000 system depends on the type of verification.
panel where the terminal is defined, the termi- 10. Click Yes. The Door Control override is
nal’s hardware type (in some cases the terminal’s
reversed.
firmware revision), and local terminal settings.

Controlling Outputs
1. From the P2000 Main menu select Con-
trol>Control All Doors. An operator can manually control an output
(override system controls) for a specific output
2. Enter your password if prompted. The
point or group. (The operator must first have
Control All Doors dialog box opens.
menu permissions for Output Control to use
this feature.) If it is a partitioned system, the
outputs available from the drop-down list are
those active in the operator’s partition.

24-10832-194 Rev. E
292 CHAPTER 3
Operating the System

 Slow Flash – to toggle the output point


Note: HID panels do not report transactions
associated with output point status changes.
on and off slowly.
 Fast Flash – to toggle the output point on
and off quickly.
To Manually Control an Output Point  Timed/Pulse – to turn the output point for
a specified time in seconds. If you select
1. From the P2000 Main menu, select Con-
this option, you must enter the time in
trol>Output Control. The Output Control
seconds in the Duration field.
dialog box opens.
6. Click Perform to manually activate the
output point.
7. If you wish to return the output point to a
Normal state, click Deactivate, then click
Perform.
8. If you wish to temporary disable an output
point, click Disable, then click Perform.
Available only for some output point types.
9. Click Exit to close the dialog box.

Controlling Panel Relays


An operator with permissions can manually
2. If this is a partitioned system, select the override system control of specific panel
Partition in which this output is active. relays. For example, a panel relay may auto-
matically operate lights in a specific area. An
3. In the Output box, click either Point or
operator can manually set the panel relay to
Group to populate the Name drop-down
override system control and turn on the lights
list with selections.
when they would normally be off.
4. Select an output point or output group
Name from the drop-down list.
To Manually Control a Panel Relay
5. Click Activate to activate the output point
(or group) and select from the drop-down 1. From the P2000 Main menu, select Con-
list one of the following choices (the trol>Panel Relay. The Panel Relay dialog
actions available in the list depend on the box opens.
panel type):
 Preset – to turn the output point to a pre-
defined state.
 Set On – to turn on the output point.

24-10832-194 Rev. E
293

2. If this is a partitioned system, select the To Define Security Levels


Partition in which this panel is active.
1. From the P2000 Main menu select Con-
3. Select the Panel Name from the fig>System. Enter your password if
drop-down list. prompted. The System Configuration win-
4. Click Set to activate the relay. dow opens.
5. Click Reset to deactivate the relay. 2. In the left pane, expand Panels to display
6. Click Done to exit the dialog box. panel components.
3. Select Security Level and click Edit. The
Security Level Range Editor dialog box
Security Threat Level Control opens.
Security threat level control provides a rapid
method of restricting access in case of an
emergency. If there is a security breach, an
authorized operator is able to quickly change
access privileges for all cardholders at any
reader terminal connected to a panel that sup-
ports security threat level control. The default
security level for these terminals is 0 (the low-
est) and could be raised up to 99 (the maxi-
mum security level).

For this feature to work, you must assign secu-


rity levels to badges (see page 254). To obtain
access at a door, the badge security level must 4. Enter for each of the five colors, the Mini-
be equal to or higher than the terminal security mum, Maximum, and Set To values.
level. When an event occurs, the operator Keep in mind that the Minimum has to be
raises the security level of the terminals in below the Maximum value, and that the
question, and access is immediately restricted, Set To value must be in between the Mini-
unless the badge has the Executive privilege mum and Maximum values. The system
option enabled. does not allow overlapping of ranges.
5. Once the security level color codes have
been defined with acceptable ranges, click
Defining Security Levels
Apply to save the values while leaving the
The Security Level Range Editor allows you to dialog box opened.
modify the default values of the security level. 6. Click OK if you wish to close the Security
Security levels are represented by five colored Level Range Editor dialog box.
alert codes (Red, Orange, Yellow, Blue, and
Green). For each color there is a range defined
by Minimum, Maximum, and Set numeric val- Applying Security Level
ues between 1 and 99. Once the ranges are Once the Security Level is defined, you can
defined, they can be assigned to selected ter- rapidly apply a Security Level value to termi-
minals using the Security Level Control dialog nals using the Security Level Control dialog
box. box.

24-10832-194 Rev. E
294 CHAPTER 3
Operating the System

To Apply Security Levels 4. Depending on your selection in the Select


Terminals By box, select from the list box
1. From the P2000 Main menu, select Con- the desired terminal, terminal group, or
trol>Security Level. The Security Level panel name. You can select multiple names
Control dialog box opens. by holding down the <Ctrl> key, or click
Select All to select all items in the list.
5. In the Security Level By Color box, select
TIP: As an alternative, you can click the Secu- one of the colored security levels you wish
to apply, then click Perform.
rity Level Control icon in the P2000 toolbar to rap-
idly open the Security Level Control dialog box. The selected terminals in the list box dis-
play in the Requested column the default
value for that colored security level. The
Current column display the current secu-
rity level at the terminal.

Note: If you raise the security level at terminals


that use the Override Reset Threat Level option,
all time zone based overrides, host initiated over-
rides, and cardholder overrides are immediately
disabled. For more information, see Override
Reset Threat Level Box on page 69 and
page 114.

6. If you wish to assign a particular value,


click Other in the Security Level By Color
2. If this is a partitioned system, select the box, enter the desired security level value,
Partition in which the terminals reside. then click Perform. The selected terminals
3. In the Select Terminals By box, select one in the list box are set to this value as well
of the following options: as display the color of that value.
Terminal – All terminals (for the partition 7. Once management determines that the
selected) are listed on the right side of the emergency is over, you can either put the
dialog box. Use this option to restrict terminals in their previous level or remove
access to the selected terminals. the security level by selecting the item (ter-
minal, terminal group or panel) from the
Panel – All panels (for the partition list box then clicking Clear Security Level
selected) are listed on the right side of the from the Security Level By Color box. The
dialog box. Use this option to restrict at color is removed from the terminal and the
once access to all terminals connected to Requested and Current columns display 0.
the selected panels.
8. Click Done to close the Security Level
Terminal Group – All terminal groups (for Control dialog box.
the partition selected) are listed on the right
side of the dialog box. Use this option to
restrict at once access to all terminals that
belong to the selected terminal groups.

24-10832-194 Rev. E
295

Input Point Suppression 3. If this is a partitioned system, select the


Partition in which the inputs are active.
This feature allows an operator to rapidly sup-
4. In the Suppress box, select one of the fol-
press input points permanently or for a specific
lowing options:
time period, during which the input point stops
reporting any changes of state and conse- Input Point – to suppress the selected input
quently prevents alarms from displaying in the point.
Alarm Monitor. For example, if an input point Input Group – to suppress all input points
is constantly sending messages, the operator in the selected group.
may want to suppress the input point until it
can be determined what is causing the prob- Door – to suppress forced and propped soft
lem, and keep the input suppressed until the alarm input points associated with the
problem is resolved. This applies to forced selected door. This feature works if the
door and propped door soft alarm inputs, as Forced Door/Propped Door soft alarm is
well as hardware input points. See Appendix enabled.
C: Panel Comparison Matrix to verify if your 5. Select an input point, input group, or door
panel type supports this feature. The operator Name from the drop-down list.
must have Suppress Inputs menu permissions
6. In the Action box, select one the following
to use this feature.
(only the actions available for your panel
type are enabled):
Stop Suppression – to cancel the Input
Note: Input point suppression has certain
security exemptions, such as fault conditions, Suppression condition. This returns the
Duress, and PIN Code Retry reports. input point to fully functional status. (The
input point starts reporting changes of state
alarms).
To Suppress Input Points Timed Suppression – to suppress CK721-A
1. From the P2000 Main menu select Con- input points for the number of seconds
trol>Suppress Inputs. entered in the Duration field. (The input
point does not report alarms within this
2. Enter your password if prompted. The period). A value of zero keeps this input
Suppress Inputs dialog box opens. point suppressed until commanded to stop
suppression.
Begin Suppression – to suppress Mercury
or S321-IP input points. The input point
remains suppressed until you click Stop
Suppression.
7. Click Perform. The Action selection goes
into effect.
8. Click Done to exit the window.

24-10832-194 Rev. E
296 CHAPTER 3
Operating the System

Control Areas and Muster Configuring the Area


Zones Use the Area Configuration dialog box to
define the readers and input points that monitor
the entry and exit of cardholders or vehicles.
The Area Control and Mustering features pro-
Here you name and describe the specific Area,
vide additional security measures in specific
define the maximum and minimum cardhold-
areas of your facility, such as highly sensitive
ers allowed in the Area at any given time, and
areas, dangerous areas, or areas that contain
the count mode for the specific Area.
high-value materials. Using Area Control for
example, an operator can define a minimum
number of cardholders allowed in a controlled To Configure the Area
area, such as a bank vault. Alternatively, if
using Mustering, the operator can define mus- 1. From the P2000 Main menu, select Con-
ter terminals as places of assembly, for track- fig>System. Enter your password if
ing the location and movement of personnel in prompted. The System Configuration win-
the event of an emergency. dow opens.
2. Select Areas and click Add. The Area
Configuration dialog box opens.
Area Control
3. If this is a partitioned system, select the
An Area is a designated section of a facility Partition that has access to this Area, and
with one or more readers or input points click Public if you wish the Area to be vis-
assigned. The Area can be monitored at any ible to other partitions.
time to determine the current count and the 4. Enter a descriptive Name for the Area.
entry, or entry and exit of personnel or vehicles
to, for example, a paint shop or parking struc- 5. Enter an Area Description that is meaning-
ture within a plant or facility. ful to the operator.
6. Select the Area Type from the drop-down
You can group readers and input points that are list. The options are:
related to a particular section of your facility,
for the purpose of reporting on the current Access – Select to monitor cardholder
whereabouts of cardholders. Areas do not have count on a specific Area, for example a
any access control or transaction processing Main Vault.
functions; they are set up for reporting pur- Facility – Select to monitor cardholder
poses only. This feature is useful on large sites count on the entire facility, for example
with many card-controlled access points. Bank ABC.
Parking – Select to monitor cardholder
count in a parking structure, for example
Parking One.

24-10832-194 Rev. E
297

Pre Max Allowed – An alarm is generated


Note: It is possible for a cardholder to be
counted on all three Area types at the same time;
when the pre-maximum number of card-
for example, when the cardholder badges at the holders entered in this field is exceeded.
parking structure reader (Parking One), then This field is available only if the Area
badges at the facility reader (Bank ABC), and Type selected is Parking. For example, if
then proceeds to badge at a specific access Area the Max Allowed is 100 and the Pre-Max
(Main Vault). Allowed is 95, an alarm is generated when
96 vehicles have entered the parking struc-
7. Click Alarm to define any or all of the fol- ture, that way the operator may advise
lowing alarm fields: other cardholders that the lot is full.

Max Allowed – An alarm is generated when


the maximum number of cardholders
Note: In the Adjustment field, select the + or –
entered in this field has been exceeded.
sign, and enter a number to adjust any of the pre-
The status column in the Area Control dia- vious counts by this number. For example if the
log box displays Max Allowed Alarmed. Max Allowed is 100 and you entered a +2 in this
field, an alarm is not generated if the Max
Min Required – An alarm is generated
Allowed count is 102.
when the minimum number of cardholders
entered in this field is not present at the
same time in the specific Area. The status
column in the Area Control dialog box dis-
plays Min Required Alarmed.

24-10832-194 Rev. E
298 CHAPTER 3
Operating the System

Area Alarms Setting 4. In the Pre Max Allowed Alarm box, click
Popup when set or Popup when secure,
Area Alarms Setting enables the Alarm Moni- and select the Instruction Text Name
tor window to automatically pop up in front of from the associated drop-down list that dis-
other windows on the screen whenever any of plays in the Alarm Response window
the three Area Alarm types occur. The pop up whenever the Pre Max Allowed Alarm is in
displays a set of instructions related to that par- the alarm or secure state.
ticular alarm. Before you assign instruction
text to the various pop ups, you must first cre- 5. Click OK to return to the Area Configura-
ate instruction text. See To Create Instruction tion dialog box.
Text on page 90.

1. In the Area Configuration dialog box, click Note: The default Alarm Priority setting for
Area Alarms Setting. The Area Alarm Area alarms is 10.
Settings dialog box opens.

Define Area Terminals and Inputs


Points

1. In the Area Configuration dialog box, click


the Entry tab to monitor Entry type reader
terminals and input points.
2. Select one of the following count modes:
Count All – Select if you wish to count the
number of cardholders that are granted
access through both reader terminals and
input points.
Count Terminals – Select if you wish to
count the number of cardholders that are
2. In the Max Allowed Alarm box, click granted access through reader terminals
Popup when set or Popup when secure, only.
and select the Instruction Text Name
from the associated drop-down list that dis- Count Inputs – Select if you wish to count
plays in the Alarm Response window the number of cardholders that are granted
whenever the Max Allowed Alarm is in the access through input points only.
alarm or secure state. 3. Click the Terminal tab to select the termi-
3. In the Min Required Alarm box, click nals that to be monitored for Area count.
Popup when set or Popup when secure, 4. In the Terminal box, select the terminal
and select the Instruction Text Name from the Available list and click << to
from the associated drop-down list that dis- move it to the Selected list.
plays in the Alarm Response window 5. In the Terminal Group box, select the ter-
whenever the Min Required Alarm is in the minal group from the Available list and
alarm or secure state. click << to move it to the Selected list.
6. Click the Input tab to select the input
points that to be monitored for Area count.

24-10832-194 Rev. E
299

7. In the Input box, select the input point To Control each Defined Area
from the Available list and click << to
move it to the Selected list. 1. From the P2000 Main menu, select Con-
trol>Area Control.
8. In the Input Group box, select the input
group from the Available list and click << 2. Enter your password if prompted. The
to move to the Selected list. Area Control dialog box opens.
3. Select the Partition that contains the
Areas you wish to control.
Note: The terminal or input selected here can- 4. If you wish to control a specific Area, use
not be assigned to another Area. the Filter box to enter a filter criteria, such
as M* then click Filter. The list box dis-
9. Click the Exit tab if you wish to monitor plays all Area Names that start with the let-
Exit type reader terminals and input points, ter M.
and repeat the same steps.
10. Click OK. A new icon displays under the
root Area icon. When you click the new Note: You can also select a previously typed
Area icon, the parameters display on the filter from the drop-down list. The list box
refreshes when you select * from the Filter box or
right windowpane of the System Configu-
when you close the Area Control dialog box.
ration window. Changes to Area Configu-
ration become effective after you stop and
restart all P2000 services. The list box displays the following infor-
mation for each defined Area:

Controlling the Area Area Name – The Area name, as configured


in the Area Configuration dialog box.
The Area Control dialog box is a real time Type – The Area type, as configured in the
control window that displays all the Areas Area Configuration dialog box.
defined in the Area Configuration dialog box.
The default sort in the list box is by Area Count – Displays the number of cardhold-
Name. ers currently in the specific Area.

24-10832-194 Rev. E
300 CHAPTER 3
Operating the System

Status – Displays one of the following:


 Normal – No alarm was generated.
 Max Allowed Alarmed – An alarm was
generated because the maximum number
of cardholders had exceeded.
 Min Required Alarmed – An alarm was
generated because the minimum number
of cardholders was not present at the
same time in the specific Area.
 Pre Max Allowed Alarmed – An alarm was
generated because the pre-maximum
number of cardholders had been reached.
Partition – The Partition, as configured in
the Area Configuration dialog box.
Description – The Description, as config-
ured in the Area Configuration dialog box.
5. If you wish to change the current sort 8. Enter a value in any of the Cardholder
order, click the specific column header in fields. The list box displays the cardholder
the list box. records that match the entered values.
6. To display specific details of each Area, 9. Select a cardholder from the list box. If
right-click the specific Area name, and only one badge was assigned to this card-
select whether to Show Only the cardhold- holder, that number automatically displays
ers passing the filter criteria entered in the on the Badge field, and the respective Area
Area Filter dialog box (see the next section Type field displays the Area name where
Defining Area Filters), or to Show All the cardholder is located.
cardholders in the Area Details dialog box 10. If the cardholder has more than one badge
(see Displaying Area Details on page 301). assigned, select a Badge number from the
You can have any number of Area Details drop-down. The respective Area Type field
windows opened at the same time. displays the Area name where the card-
holder can be found.
11. Click OK to close the Search Badge dialog
Note: You can also access the Area Filter and box and return to Area Control.
each Area Details dialog box by clicking Show
Only and Show All on the right side of the Area 12. To manually update the current Count and
Control dialog box. Status displayed in the Area Control list
box, click Refresh. This list is automati-
cally updated every 10 seconds.
7. To search the whereabouts of a specific
cardholder, click Search. The Search 13. Click Close to exit Area Control.
Badge dialog box opens.

24-10832-194 Rev. E
301

Defining Area Filters 6. If you wish to search by specific date and


time, enter the information on the
Each Area Details dialog box displays the total Date/Time box.
count of all cardholders that have been granted
access to the specified Area. You can, how- 7. After you define the search criteria, click
ever, define filter criteria to help you locate one of the following buttons:
specific cardholders quickly and easily. Exact Match – to display an exact match to
your search criteria.
1. From the Area Control dialog box,
right-click the Area Name that you wish to Partial Match – to display all possible selec-
monitor and click Show Only, or select the tions that match the initial characters of the
Area Name and click Show Only on the search criteria; for example, if you enter
right side of the screen. The Area Filter Carl in the First Name field, the list box
dialog box opens. displays names such as Carla, Carlos, Carl-
ton, and so on.
8. The Area Details dialog box opens, dis-
playing all the cardholders passing the fil-
ters defined in the Area Filter dialog box.

Displaying Area Details

The Area Details dialog box displays current


count details and status information for the
Area selected. Here you can monitor and man-
ually change current cardholder count.

The Area Details can be accessed from the


Area Control dialog box in one of the follow-
ing ways:

 When you select an Area Name from the


Area Control list box and click Show All,
2. Enter the information on any or all of the or right-click the Area Name and click
fields to display specific cardholder count. Show All; or
3. If you wish to search all cardholders that  When you select an Area Name from the
belong to the same Company or Depart- Area Control list box and click Show Only,
ment, select any of the previously defined or right-click the Area Name and click
Companies or Departments. Show Only, and enter the criteria in the
Area Filter dialog box.
4. To search by location, select the Terminal
where cardholders last presented their In either case, the Area Details dialog box
badge. opens, showing the Area Name and Area Type
5. If you wish to search by UDF, select any of in the window title. See Area Details Field
the previously defined UDFs (Date type Definitions for details.
UDFs cannot be included in the search).
Enter or select the UDF search criteria in
the next field.

24-10832-194 Rev. E
302 CHAPTER 3
Operating the System

Area Details Field Definitions If you enter a new count in the Current Count
field that is less than the total number of card-
Area Name – Displays the Area Name selected holders showing in the list box, you are asked
in the Area Control dialog box. to remove some cardholders from the list, or
Current Status – Displays the current status of set the count to a larger value.
the Area. See the Status definitions on Refresh – To manually update the Area Details
page 300. list box, click Refresh. If a change in the Area
Current Count – Shows the total number of count occurs, only the Count fields are updated
cardholders currently in the Area, which were automatically and the Refresh button changes
granted access through either reader terminals color displaying a message to refresh the list to
or input points. see the changes.

Terminal Count – Shows the total number of Add – If a cardholder is currently in the Area,
cardholders currently in the Area, which were but does not display in the Area Details list
granted access through a reader terminal. box, click Add and select the cardholder name
and badge number, click OK, then click Yes to
Input Count – Shows the total number of card- confirm. The cardholder is added to the list and
holders currently in the Area, which were the Current Count and Terminal Count values
granted access through an input point. are updated.

Set – This button is activated when the Current Remove – This button is activated if one or
Count is manually changed, for example to add more cardholders are selected in the list box.
cardholders that you know are currently in the Click Remove if you wish to manually remove
Area, but you do not know who they are. After a selected cardholder, then click Yes to con-
entering the new count, click Set, then click firm. The Current Count and Terminal Count
Yes to confirm. The Input Count increases or values are updated.
decreases by the number you manually enter in
the Current Count field.

The word All displays if you select Show All from the Area Control dialog
box, which shows all cardholders currently in the Area. If you select Show
Only, to display specific cardholders, the criteria entered in the Area Filter
dialog box displays here.

24-10832-194 Rev. E
303

Layout – This field relates to how the card-


holder list displays in the list box. The
drop-down list displays all Layout names that
were previously defined in the Area Layout
dialog box. (See Area Layout for more infor-
mation, and the next section Viewing the
Details List for instructions on changing the
list box display.)

Default – Click Default to restore the eight


default fields; see Viewing the Details List.

Done – Click Done to return to the Area Con-


trol dialog box.

Print – Click Print to print the details list.


The pop-up menu displays eight default
fields, plus any previously defined User
Viewing the Details List Defined Fields. The check mark to the left
of the field name shows which fields are
The details list box displays all cardholders currently displayed.
currently present in the Area. Individual opera-
tors can define how the information in the 3. If you wish to change the position of the
Area Details list box displays on their system. columns, drag and drop the column head-
You may choose to display only specific data. ing to desired position.
4. To select a previously defined Layout,
select one from the drop-down list. See
Note: The previous sort order displays the next Area Layout for detailed instructions.
time you open the Area Details dialog box, but if 5. You can make modifications to previously
the field you used to sort by is removed from the
defined layouts. Any changes made are
list, then the default sort is by the first column.
saved for future use and are applied if you
select <none> from the Layout drop-down
1. If you wish to change the sort order, click list.
the desired column header. The list is
sorted by the selected column. 6. Click Done to return to the Area Control
dialog box. If you apply a different layout
2. To add or remove columns from the list or change the existing one, you are asked if
box, right-click anywhere in the header to you wish to save the current view for
open a pop-up menu where you select the future use.
fields you wish to add or remove.

Area Layout

The Area Details dialog box displays a default


view consisting of eight pre-stored fields. You
can, however, create different layouts to dis-
play only certain information, according to
your particular needs.

24-10832-194 Rev. E
304 CHAPTER 3
Operating the System

For example, a system administrator may want 4. Click Public if you wish this Area Layout
to monitor how many cardholders from a spe- to be visible to all partitions.
cific department are currently in the Area. In 5. Enter the Name of the Area Layout. This
that case an Area Layout is created to display name displays in the Layout field of the
only the fields selected on the Area Layout Area Details dialog box.
Edit dialog box.
6. The Items box displays eight default fields,
plus any User Defined Fields, previously
To Define Area Layouts defined. Click the check box to select the
fields you wish to display on the Area
1. From the P2000 Main menu, select Con-
Details list box. The default width (in char-
fig>Area Layout. The Area Layout dialog
acters) of the selected field displays.
box opens.
7. To change the width, either double-click
the width field, or click Change Width
and enter the new width.
8. If you wish to change the order in which
the fields display, click Up or Down to
move the field up or down on the list.
9. When all information is entered, click OK.
The new Area Layout displays in the Area
Layout dialog box.
10. Click Done. This Area Layout is now
2. Click Add. The Area Layout Edit dialog accessible from the Area Details dialog
box opens. box.

Area Reports

Five Area reports are provided as part of the


standard P2000 reports:

All Areas to Cardholder - Preprocessed – Lists


by cardholder name, all areas the cardholder
can access and the terminal doors defined for
the area.

All Cardholders to Area - Preprocessed – Lists


by area name, the cardholders and badges that
have access to the area.

Note: Preprocessed reports display current


data. Any changes made to database items are
not reflected until the following day, unless you
3. If you use partitioning, select the Partition
manually update the report table using the
that has access to this Area Layout. Update Preprocessed Reports table task in Data-
base Maintenance; see page 447.

24-10832-194 Rev. E
305

Area Configuration – Lists by area name, all Basic Definitions


configuration information entered in the Area
Configuration dialog box. Muster Zone – A Muster Zone is defined as any
area within a facility that presents some risk to
Area Control – Lists the cardholders currently personnel; for example, a paint shop, an oil
in the area, including the total number of card- refinery, or a building’s electrical control cen-
holders for each count mode. ter. In the P2000 Mustering feature, a Muster
Zone is represented by one or more badge
Area Transaction – Lists all transactions per- reader terminals.
formed in the system for the specific area. You
can select to run the report on transactions at Zone Terminal – Zone terminals are badge
your local site or you can enter the name of the reader terminals that define a Muster Zone.
remote site that you want to report on. These reader terminals can control entry to a
zone, a paint shop for example, where the zone
See Chapter 6: System Reports for detailed terminals would control the access. Zone ter-
instructions on running P2000 Standard minals could also be readers at various loca-
Reports. tions where personnel are required to badge as
they move around, but which do not control
Mustering access, as in an oil refinery for example. The
general requirement is that when someone has
The Mustering feature provides the capability badged at a zone reader terminal, it means that
of tracking personnel movement in the event person is in the zone.
of an emergency.
Muster Terminal – In an emergency, personnel
During the emergency, all personnel within a are expected to move from the Muster Zone to
risk area are expected to evacuate and are a safe area, where muster terminals for the
required to badge at a reader outside the risk zone are located. As personnel arrive, they
area, thereby providing real time printed badge at the muster terminal, allowing the sys-
reports and online display information as to tem to know that they are no longer at risk.
who may still be in a hazard area. The report There can be any number of safe areas and
and online display can be used to direct search muster terminals for a zone.
and rescue operations. The list of personnel
still in the risk area is derived from the last Sequester Terminal – Any terminal installed in
known access data, and then refined by track- a sequester zone. A sequester zone is defined
ing badge activity as personnel move out of as a secondary Muster Zone when the initial
the risk area. mustering may not provide permanent safety.
In some cases a muster safe area may only pro-
Mustering is initiated by a P2000 event, which vide temporary safety. If so, it is desirable to
triggers a Muster; or by manual action using move people to a safer (sequestered) area,
the Muster Zone Status and Control dialog where sequester terminals are set up and where
box. Once management or emergency person- arrival of personnel is recorded in the same
nel determine that the emergency is over, the way as muster terminals. Sequester Terminals
Muster is terminated by an event that stops the are optional.
Muster, or by manual action using the Muster
Zone Status and Control dialog box.

24-10832-194 Rev. E
306 CHAPTER 3
Operating the System

Muster – A Muster occurs when an event repre-


Note: Trapped, Wandering, and Rescuer
senting an emergency within the Muster Zone groups are only tracked if Track Movement is
is triggered. Personnel in the Muster Zone are selected in the Muster Terminals tab; see
then expected to move to safety and badge at a page 311.
muster terminal to indicate that they are out of
danger.
Sequence of Steps
At Risk – When a Muster begins, all personnel
within a Muster Zone are considered to be at The basic procedures for defining and imple-
risk until they badge at a muster terminal so menting Mustering are:
that their status can be upgraded according to
the last used terminal.  Define Muster Zones and the terminals that
are associated with it.
Trapped – Personnel are considered trapped if  Define the Events that start and end the
they badge at one or more zone terminal after Muster (alarms, card events, inputs), or any
the Muster begins, indicating that they are Events that are to be triggered when a Mus-
moving but possibly unable to escape the Mus- ter starts or stops (set outputs to turn lights
ter Zone, for example because of a blocked on, open doors, activate alarms, and so on.)
exit.
 Control Muster Zones before, during, and
Wandering – Personnel are considered to be after a Muster.
wandering if they badge at a terminal outside  Generate reports and analysis reports.
the Muster Zone, but not at a designated mus-
ter terminal. Wanderers are assumed to be on
their way to a muster terminal, but because of Define Risk Areas and Muster Zones
circumstances, may be having difficulty find- Careful examination of a facility can disclose
ing a safe path. For example, a hazard may be any potential risks and allow you to physically
spreading to other parts of the facility, causing define the necessary Muster Zones. Following
difficulty escaping from the original event. this process, use the Muster Zone Definition
Mustered – Mustered personnel are those who dialog box to define the Muster Zone, associ-
have badged at a designated muster terminal ate the necessary zone, muster, and sequester
since the start of a Muster. reader terminals with the Muster Zone, and
select the appropriate options to control it.
Sequestered – Sequestered personnel are those
who have badged at a designated sequester ter-
To Define Muster Zones
minal since the start of the Muster.
1. From the P2000 Main menu, select Con-
Rescuer – Rescuers are personnel who badge
fig>System. Enter your password if
into the Muster Zone during the Muster. Res-
prompted. The System Configuration win-
cuers are assumed to be carrying out search,
dow opens.
rescue, or emergency control activities, and are
tracked until they badge at a muster or seques- 2. Select Muster Zones and click Add. The
ter terminal. Muster Zone Definition dialog box opens
at the General tab.

24-10832-194 Rev. E
307

3. Enter the required information in each tab Public – Click Public if you wish this Zone
according to your system requirements. Name to be visible to all partitions.
See the following Muster Zone Definition
Fields for details. As you work through the Enabled – Click Enabled for the system to rec-
tabs, click Apply to save your settings. ognize this Zone Name. If you wish to tempo-
rarily disable the Zone, click to clear the check
4. When all entries are complete click OK to box.
return to the System Configuration win-
dow. A new icon displays under the root Automatically start the Muster Control Dialog –
Muster Zones icon. When you click the Click if you wish to automatically open the
new Muster Zone icon, the parameters dis- Muster Zone Status and Control dialog box as
play on the right windowpane. soon as a Muster begins. If you enable this
option, select from the drop-down list the
workstation that automatically displays the
Muster Zone Definition Fields
Muster Zone Status and Control dialog box
Zone Name – Enter a meaningful zone name. when a Muster begins.
All zone names must be unique. Zones should
be named logically, including information
such as the zone location and what it contains, Note: To take advantage of this option, the
to be easily identified by rescue personnel in P2000 software must be running at the desig-
the event of an emergency. nated workstation when the Muster begins.

Partition – Select the partition in which this


Zone Name is active.

24-10832-194 Rev. E
308 CHAPTER 3
Operating the System

One line abbreviated content – If enabled, a Muster Startup Rules


one-line report is automatically printed when a
Muster begins. This report is printed at the Several rules are provided to guide you in
Report Interval selected and includes first and determining whether a cardholder’s last badge
last name, badge number, and last badging date location means that the cardholder is inside or
and time. outside the Zone when a Muster is started.

Two line full content – Select this option if you For mustering purposes, either the last valid or
wish to automatically print more detailed card- last invalid badging is used, depending on
holder information when a Muster begins. This which has the latest date and time. You can
report is printed at the Report Interval selected prevent invalid badging from being used to
and includes first and last name, badge num- determine the initial At Risk group; see Use
ber, last badging date and time, terminal name, only valid badging at startup on page 309 for
company, and department name. details. Thereafter, a muster in progress always
uses the last known badge activity, valid or
Report Interval – Select from the spin box the invalid. Even invalid badging shows the card-
report interval (in minutes) at which mustering holder’s current location.
reports is printed during an emergency. When a
Muster starts, the first report is printed imme- If the badge status shows that the holder is in
diately. the zone, assume holder is in the zone (select
one of the following options):

 regardless of last badge time – Select this


IMPORTANT: Printing muster reports is not option to include all cardholders regardless
guaranteed on foreign language systems. of the last badge time.
 only if last badge is today – Select this
No automatic reports – Click if you do not wish option if you wish to monitor who badged
to generate any of the previous automatic today.
reports.  unless last badge is older than – Select this
Select Printers – Click to select a printer where option to assume the cardholder is in the
Muster reports are printed as soon as a Muster zone only if the last access grant was within
begins. When the Select Report Printers dialog the number of days, hours, or minutes
box opens, select a printer name from the list selected.
and click OK. You can select one or more  unless last badge is for prior shift – Select
printers, as long as the PegasysServices Win- this option if your facility does shift work
dows user account that runs the P2000 Muster and the cardholder’s last access grant was
Service has the appropriate access rights to during a previous shift, to assume that the
those printers. Automatic muster reports can cardholder is no longer in the area. If
only be printed from a printer connected to the enabled, the Shift Setup box is activated.
P2000 Server.
A basic rule for applying this option is to
set up your time zones to start one after the
other in the correct correlative order, for
Note: We recommend setting up a printer to be example Shift 2 should always start after
used exclusively for printing Muster reports.
Shift 1, and Shift 3 should always start
after Shift 2. See the following example:

24-10832-194 Rev. E
309

Enable de-muster – If selected, and a Muster


has been stopped, and before returning the
Shift Work Schedule Week Days Time Zone Zone to the Ready status again, you can click
Shift 1 8:00am - 5:00pm Mon-Fri 7:30am - 5:30pm De-Muster in the Muster Zone Status and
Shift 2 5:00pm - 2:00am Mon-Sat 4:30pm - 2:30am Control dialog box to put all personnel who
Shift 3 2:00am - 8:00am Tue-Sat 1:30am - 8:30am were in the At Risk group back at their initial
location when the Muster began. De-Muster
can also be activated by a P2000 Event if
Shift Setup desired.
Number of shifts – If you enable unless last
badge is for prior shift, select from the spin
box the number (1 to 3) of shifts in your facil- Note: To end an emergency by a specific
event, you must specify any number of different
ity.
events as Muster terminating events. See Mus-
Shift 1 - 3 Timezone – Select from the tering Events on page 312.
drop-down list the time zone assigned to each
shift in your facility.
Muster Zone Alarm Settings

Muster Zone Definition Options Muster Zone Alarm Settings enable the Alarm
Monitor window to automatically pop up in
Allow expansion – If selected, the Zone can be front of all other windows on the screen when-
dynamically expanded during a Muster. This is ever a Muster alarm condition occurs.
useful in cases where the Zones are overlapped
or not very rigidly defined. For example, an You can also specify instruction text that dis-
emergency event in one part of the facility plays when an operator responds to a Muster
might spread to adjacent areas and the Zone alarm going into a Set or Secure state.
could be expanded to include terminals in Enabling the Popup feature and selecting
those areas as the need arises. As expansion Instruction Text are independent tasks, and can
takes place, the badging activity at the newly be used in any combination.
incorporated terminals is examined to deter-
Before you assign instruction text to the vari-
mine which personnel need to be added to the
ous pop ups, you must first create instruction
At Risk group.
text. See To Create Instruction Text on
Use only valid badging at startup – If selected, page 90.
only valid badging determines if the card-
1. In the Muster Zone Definition dialog box,
holder is inside a risk area. If this option is not
click Muster Zone Alarm Settings. The
selected, any invalid badging inside a risk area
Muster Zone Alarm Settings dialog box
is included in determining if the cardholder is
opens.
inside the risk area.

24-10832-194 Rev. E
310 CHAPTER 3
Operating the System

3. Click OK to return to the Muster Zone


Definition dialog box.

Note: The default Alarm Priority setting for


Muster alarms is 5.

Defining Zone Terminals

Use the Zone Terminals tab to select the termi-


nals or terminal groups that provide access to
the zone defined for mustering purposes. These
terminals may be of any type, Access, Entry, or
Exit.

IMPORTANT: Do not use Assa Abloy Wi-Fi


2. Click any of the following Popup when readers to define Zone terminals, as those read-
set or Popup when secure check boxes, ers do not report transactions in real time.
and select the Instruction Text Name
from the associated drop-down lists that 1. From the Muster Zone Definition dialog
displays in the Alarm Response window box, click the Zone Terminals tab.
whenever any of the following alarm con-
ditions occur: 2. From the Available Terminals list, select
the terminal that provides access to the
Alarm On Start of A Muster – An alarm mes- Muster Zone.
sage is generated at the start of a Muster.
3. Click <<. The terminal is included in the
Alarm On Zone Status Degraded or Inopera- Selected Terminals box.
ble – An alarm message is generated if one
or more panels or terminals that belong to a 4. From the Available Terminal Groups list,
Muster Zone are disabled or go down. select the terminal group that provides
access to the Muster Zone.
Alarm On Muster Aborted – An alarm mes-
5. Click <<. The terminal group is included
sage is generated if system operation is
in the Selected Terminal Groups box.
affected during the emergency. For exam-
ple, if database problems are encountered
during the Muster, the Muster cannot con- Note: The Available Terminals and Available
tinue and aborts. Terminal Groups boxes display only terminals
that have not yet been defined as Muster or
Alarm On Muster Triggered When Zone is Sequester Terminals.
Disabled – An alarm message is generated
when a disabled Muster Zone is triggered
to be started by an event. This option does Defining Muster Terminals
not have a specific event or action of any
kind that makes it Secure, and does not Use the Muster Terminals tab to select the ter-
have a corresponding Secure pop-up option minals or terminal groups that are designated
and related instruction text. as mustering terminals, and to associate these
mustering terminals with each risk area.

24-10832-194 Rev. E
311

Muster terminals should be dedicated to the 7. Click Muster Only At Terminals


mustering function; they should not control Selected Here to have cardholders, in an
access. From an operational viewpoint, it does emergency, badge only at the muster termi-
not matter if badges are valid at muster termi- nals selected in this tab. This is the default
nals. As long as they are recognized by the option, and allows you to select specific
P2000 system, its use at muster terminals is muster terminals for the zone.
recognized during the Muster, regardless if a 8. Click Track Movement if you wish to
red or green light displays at the terminal. trace cardholder movement within the
During an emergency, all personnel within the defined Muster Zone. Cardholders may be
risk zone are required to badge at any defined considered Trapped, Wandering, or Rescu-
muster terminal to provide real time informa- ers, depending on where and when they
tion as to their location. badge. See Basic Definitions on page 305
for details. To get the best use of this fea-
ture, do not click Muster At Any Non
IMPORTANT: Do not use Assa Abloy Wi-Fi Zone Terminal.
readers to define Muster terminals, as those
9. When you finish defining the zone and
readers do not report transactions in real time.
muster terminals, you may click Apply to
save your entries and continue with defin-
1. From the Muster Zone Definition dialog ing the optional sequester terminals; or
box, click the Muster Terminals tab. click OK to save your entries and close the
2. From the Available Terminals list, select Muster Zone Definition dialog box.
the terminal where cardholders can badge
in an emergency.
3. Click <<. The terminal is included in the Note: The Available Terminals and Available
Selected Terminals box. Terminal Groups boxes display only terminals
that have not yet been defined as Zone or
4. From the Available Terminal Groups list, Sequester Terminals.
select the terminal group where cardhold-
ers can badge in an emergency.
5. Click <<. The terminal group is included Defining Sequester Terminals
in the Selected Terminal Groups box.
In an emergency, personnel who initially
6. Click Muster At Any Non Zone Termi- badged at a muster terminal can be moved in
nal if in an emergency you wish to allow groups to a safer offsite location, a sequester
cardholders the option of badging at any zone, where they are required to badge at a
terminal that has not been defined as a sequester terminal, and therefore, provide real
Zone Terminal. time information that they have been moved
If this option is selected, terminals not outside the risk area to a safer location.
assigned to the zone are treated as muster
Use the Sequester Terminals tab to define the
terminals, and Movement Tracking is lim-
terminals or terminal groups that are desig-
ited to Trapped and Rescuers only.
nated as sequester terminals. Sequester termi-
nals are optional.

24-10832-194 Rev. E
312 CHAPTER 3
Operating the System

The events used can include one or more


IMPORTANT: Do not use Assa Abloy Wi-Fi inputs going to an alarm state in response to a
readers to define Sequester terminals, as those
readers do not report transactions in real time. variety of possible signaling devices, alarms,
or manual actions. You can also specify one or
more output points that can be set upon trigger-
1. From the Muster Zone Definition dialog
ing of a Muster.
box, click the Sequester Terminals tab.
2. From the Available Terminals list, select In the following example, the Paint Shop
the terminal where cardholders can badge Emergency Event has been programmed to
once they are moved to a safer location. start the mustering, turn emergency lights on,
and activate an audible alarm (actions) when
3. Click <<. The terminal is included in the
input point Manual Alarm goes into alarm after
Selected Terminals box.
the operator presents the badge at the Emer-
4. From the Available Terminal Groups list, gency Terminal (triggers).
select the terminal group where cardhold-
ers can badge once they are moved to a
safer location.
5. Click <<. The terminal group is included
in the Selected Terminal Groups box.
6. When you finish defining the zone, muster,
and optional sequester terminals, you may
click Apply to save your entries, or click
OK to close the Muster Zone Definition
dialog box.

Note: The Available Terminals and Available


Terminal Groups boxes display only terminals
that have not yet been defined as Zone or Muster
Terminals.

Mustering Events

After Muster Zones are defined, they can be


associated with one or more events, each of
which can trigger a Muster for that zone as one
of its actions.

Event Actions allow an event to start and stop


a Muster, while Event Triggers allow the start-
ing and stopping of a Muster to trigger addi-
tional P2000 events, such as unlocking doors You can end the emergency (de-mustering) by
or turning on audible or visual alarms to alert a specified event or events, and specify any
personnel of danger in the area. number of different events as muster terminat-
ing events.

24-10832-194 Rev. E
313

The following event actions are required to To Manually Control a Muster


start a Muster, stop it, save data, or de-muster,
and then make the zone Ready for another 1. From the P2000 Main menu, select Con-
Muster: Mustering Start, Mustering Stop, trol>Muster Status/Control. Enter your
Make Zone Ready, De-Muster, and Save Mus- password if prompted. The Muster Zone
ter Data (last two are optional). Status and Control dialog box opens.

To allow a Muster to be triggered by an event


and to trigger other P2000 events, use the
information on Create Events on page 335 to
create new event triggers and actions.

Controlling Muster Zones

Use the Muster Zone Status and Control dialog


box to monitor the status of a Muster Zone;
and when a Muster is initiated, to control all
the activities of the Muster in progress. 2. Select the Muster Zone you wish to control
and click OK. The Muster Zone Status and
Mustering can be manually started and termi- Control dialog box opens, showing the
nated by operator action using the Muster Zone Muster Zone name in the window title.
Status and Control dialog box. When muster-
ing is triggered by a P2000 event, the Muster The list box displays the name, badge
Zone Status and Control dialog box automati- number, and last known location and time
cally opens at the designated workstation of all cardholders currently in the defined
selected in the Muster Zone Definition dialog Muster Zone. See the following Muster
box, if this option is selected for the zone. Zone Status and Control Field Definitions
for details.
When an initiating event occurs, the Muster
Zone enters a Running state. Any events sched-
uled to occur on starting the Muster are trig- Muster Zone Status and Control Field
gered, and the zone determines the initial situa- Definitions
tion from last badge information and any
time-based rules defined for the zone. Once the Zone – Displays the name of the Muster Zone
initial situation is known, the report of card- to be monitored.
holders still inside the zone is output repeatedly Zone Status – Displays the status of the Muster
at the interval set up when the zone was defined.
Zone. A Muster Zone can be Ready, Running,
As cardholders badge at the designated muster
Stopped, Aborted, or Disabled. As personnel,
terminals the situation is updated to show the
who were initially in the zone, badge at other
new list of cardholders still in the zone.
readers during a Running Muster, their loca-
Operators must first have Muster Control tion is tracked and they are put in the appropri-
menu permissions to use this feature. Depend- ate group as their location changes.
ing on the permissions assigned using the
Menu Permission Groups, some or all opera-
tors may be able to control muster zones at any
time. For detailed information, see Creating
Permission Groups on page 21.

24-10832-194 Rev. E
314 CHAPTER 3
Operating the System

A warning message No
Printer For Muster Reports
displays here if no printer
was selected in the Muster
Zone Definition dialog box.

Zone Hardware Status – Displays one of the Enabled – Click Enabled for the system to con-
following: trol this Zone. If you wish to temporarily dis-
able the Zone, click to clear the check box. You
 Inoperable – If a panel (that contains zone or can disable a Zone only when it is in the Ready
muster terminals) is disabled or down. Also status.
if zone or muster terminals are disabled or
down. Start Time – Displays the time the Muster was
 Degraded – If a panel (that contains seques- triggered or manually started.
ter terminals) is disabled or down. Also if
Elapsed Time – Displays the time that has gone
sequester terminals are disabled or down.
by since the Muster started.
 OK – If all mustering terminals or panels are
enabled. Start – Click Start to manually start a Muster.
To manually start a Muster, the Zone must be
Show Group – Select the group you wish to dis- in the Ready status. Once started, the Muster
play. This allows switching the display to any Service determines the initial state of the Zone
of the available groups. Choices are: At Risk, and the At Risk group displays by default.
Trapped, Wandering, Mustered, Sequestered,
and Rescuer. See Basic Definitions on Stop – Mustering is stopped by triggering an
page 305 for details. The At Risk group is the event designated to automatically stop a Mus-
default display. ter. If you wish to manually terminate a Mus-
ter, click Stop. The Zone Status displays the
Personnel In Group – Displays the current Stopped state and analysis reports become
number of cardholders in the group selected in available by clicking first Save Data and then
the Show Group drop-down list. Reports.

24-10832-194 Rev. E
315

Once the Muster is stopped the Zone Control All mustered cardholders can be automatically
quits updating the list of cardholders. restored to their last badge location through
the De-Muster capability, as long as the
Ready – When a Muster is manually stopped, Enable de-muster option is selected in the
it may be necessary to ensure that all trigger- Muster Zone Definition dialog box. This func-
ing devices, such as alarms, manual switches, tion is password protected.
or push buttons are reset so that another Mus-
ter cannot be inadvertently started. Once it is Reset – Click to stop a Muster in progress and
determined that the Zone can be made ready reset the Zone Status back to Ready. The Reset
for another Muster, click Ready to enter the function is not normally used, but under
Ready state. unusual circumstances, such as database prob-
lems during a Muster causing the Muster to
Drill – To participate in a disaster preparedness abort, the Reset button must then be used to
exercise, a Muster can also be run as a drill by reset the Zone.
clicking Drill. A drill differs from the real
thing by the fact that during a drill, events that
would otherwise send external alarms to out- Note: A Muster in progress resets itself after
side emergency response agencies can be sup- the P2000 system recovers from a database fail-
pressed. ure.

This feature applies only to events triggered by


Suspend Printing – Enable this option to
the starting or stopping of a Muster; it cannot
momentarily suspend the automatic printing of
be applied to the events that normally start a
the selected group, to add paper or take care of
muster. When you define the trigger, and click
some other printer problem.
Do not trigger for muster drill it prevents
any event action from being carried out when a
drill is in progress. A drill can only be initiated IMPORTANT: Printing muster reports is not
through the Muster Zone Status and Control guaranteed on foreign language systems.
dialog box.
Refresh List – Click to update the list box.

Number Mustered – Displays the total number


of cardholders who have badged at a desig-
nated muster terminal.

Number Sequestered – Displays the total num-


ber of cardholders who have badged at a desig-
nated sequester terminal.

Remove Selected Individuals – This button can


De-Muster – Click to put all personnel who be used to manually move one or more card-
were initially in the zone back to their location holders from any group to any other group
when the muster began. This option is used while a Muster is Running. You can use it to
when muster terminals are located within the make the final group content reflect a situation
Zone, in that case cardholders are not required where, for example, some personnel left the
to badge back into the Zone. Muster Zone but did not badge at a muster ter-
minal, yet their current location is known.

24-10832-194 Rev. E
316 CHAPTER 3
Operating the System

Print Group – Click to print the group currently Viewing and Printing Muster Transac-
being displayed. Printing is done at the desig- tions in Real Time
nated printers selected in the Muster Zone
Definition dialog box. Once a Muster is started, an alarm is generated
and displayed in the Alarm Monitor window,
Expand Zone – Use this option if you wish to and all mustering transactions are sent through
expand a Muster Zone during an emergency. real time messages to the Real Time List. As
For instance, a hazard may spread requiring the Muster Zone status changes, corresponding
zones that initially were not involved, to be Muster-related messages are generated and
added to the active Muster Zone. You can only displayed. You must select the Mustering
use this option if Allow expansion was check box in the Real Time List window to
enabled in the Muster Zone Definition dialog display all mustering transactions as they
box. When you click this button, a list of avail- occur. See Using the Real Time List on
able terminals displays, where you can select page 342 for more information.
the terminals you wish to add. All personnel
who last badged at any of the new terminals If you wish to print mustering transactions as
are added to the At Risk group. they occur, you can either print them from the
Real Time List window, or select the Muster-
View Inoperable Hardware – Click this button to ing Zones check box in the Site Parameters
view muster terminals or panels that are not dialog box, Printing tab. See Printing Tab on
enabled or are down. page 34 for more information.

Note: The Muster Zone hardware status also


Note: The Message Routing Status indicator at displays in the System Status window, see View-
the bottom of the window displays in green to ing System Status on page 435 for details.
indicate that all communications between the
workstation and the Server are up. If communica-
tions go down, the Message Routing Status indi- Muster Reports
cator turns red.
 Muster reports are available while the Muster
The Muster Service Status indicator displays in is in the Stopped state, or afterward if the Mus-
green to indicate that Muster Service is up and ter state is saved before returning the zone to
running. If Muster Service goes down, the indica-
the Ready state. These reports allow manage-
tor turns red.
ment to assess preparedness for emergencies
and improvement of procedures for handling
Save Data – After the Muster is terminated, future events.
you may click this button to store the Muster
data in the database for later evaluation. When you click Reports in the Muster Zone
Status and Control dialog box, the Muster
Reports – Once the Muster is stopped and data Analysis dialog box opens.
has been saved, analysis reports can be run by
clicking this button. These reports are run
using the P2000 Standard Report feature.
Reports can be run during the Stopped state, or
at a later time when the Muster data has been
saved. For more information, see Muster
Reports.

24-10832-194 Rev. E
317

The Muster Zone Name and Available In addition to the Muster Analysis report, the
Date/Time fields only display selections if the P2000 Standard Reports set includes the Mus-
Muster Zone was started at least once. tering Configuration report, which lists by
Muster Zone name, all the zone definition con-
In the Group Type drop-down list select one figuration, as set up in the Muster Zone Defini-
of the following reports: tion dialog box. This report lists each Muster
 At Risk – Displays the list of personnel who Zone and shows its defining and mustering ter-
are within the Muster Zone and have not yet minals, and all associated events.
checked-in at a muster terminal.
 Trapped – Displays the list of all personnel Detect and Control Intrusion
who may be trapped in the Muster Zone.
 Wandering – Displays the list of all person-
nel who are not believed to be in the Muster The Intrusion Detection function has been
Zone, but who have not yet checked-in at a designed to sense an intrusion into a protected
muster terminal. building (detection) and report it to responsible
 Mustered – Displays the list of all personnel parties (annunciation). This is accomplished
who have badged at a muster terminal. with a combination of detection, control, and
reporting devices such as a control panel, input
 Sequester – Displays the list of all personnel devices (sensors), and output devices (bells,
who have badged at a sequester terminal. sirens).
 Rescuer – This report tracks all rescue per-
sonnel throughout the site. The Intrusion Detection system consists of
sensors, connected to the intrusion panel,
In the Started By drop-down list select capable of detecting various intrusion or bur-
whether this Muster Zone was started by an glary events. These intrusion detection sensors
Operator or by an Event. are associated with physical zones/points and
grouped into areas; also intrusion events use
In the Reason drop-down list select the reason
audible annunciators to signal that a zone or
why this Muster was started, whether it was a
area is in alarm condition.
real Muster, a drill, or both.
The P2000 Intrusion Service resides on the
After you have entered your selections, the
P2000 Server and provides the communication
Muster Analysis Report displays in the Crystal
between the P2000 system and intrusion pan-
preview window showing the criteria selected
els. This service allows the P2000 system to
and the total number of cardholders in the
obtain status information whenever an intru-
Muster Zone. This report lists all Mustering
sion component changes and issues commands
activity within a specified time frame by zone
to control the intrusion zones/points, areas,
name, start and stop times and whether it was a
and annunciators that are part of the intrusion
drill or real emergency.
system.
This report can also be generated using the
The P2000 system supports three intrusion
Report>Run Report option and selecting the
detection integrations: OPC Aritech, Bosch®
Muster Analysis report.
(GV3 and GV4 series), and Mercury. Com-
plete hardware installation and operation
instructions are provided with the intrusion
system that is shipped with your option.

24-10832-194 Rev. E
318 CHAPTER 3
Operating the System

Area – A group of zones/points within a facil-


Note: Mercury intrusion panels require both the
P2000 Intrusion Interface Service and the P2000
ity (for example, the perimeter, the main
Mercury Interface Service to communicate with entrance, the entire facility).
the server.
Armed – (Aritech and Mercury) The state of a
zone that reports intrusions unless it is
bypassed. When an area is armed or disarmed,
IMPORTANT: The Aritech panel is not avail- it arms or disarms all associated zones.
able in North America. Contact Johnson Controls
Systems Integration Services Europe for informa- Armed – (Bosch) The state of an area that
tion. reports intrusions.

Bypassed – The state of a zone/point that does


Areas are used to control zones and can be not report intrusions. This state is intended for
commanded to be armed or disarmed. An maintenance use. If a zone is bypassed an
authorized user at a P2000 workstation can intrusion is not detected nor sent to the P2000
arm or disarm an area, bypass a zone, and Server.
silence or activate an annunciator, assuming
that the user has the appropriate authorization. Disarmed – The state of a zone/point that is dis-
abled from reporting intrusion alarms. This
When an Aritech area is armed or disarmed, it state is typically used during hours when zones
causes all associated zones to become armed or are occupied.
disarmed (or if armed, possibly alarmed). Ari-
tech Areas are objects that are used to control Intrusion – An unauthorized entry to an area or
zones. Zones maintain state and can be in zone that results in an alarm state for the area
states such as bypassed or alarmed. or zone.

A properly configured intrusion detection sys- Intrusion Input Point – A device used to detect
tem should: a change in a facility. A point senses an event
that could represent intrusion such as a glass
 Detect an unlawful intrusion break, motion or door contact.
 Identify the location of the intrusion
Intrusion Interface – TCP/IP, RS232C, or OPC
 Signal an alarm to inform local security
that is used to communicate with one or more
forces that an intrusion has been detected
intrusion servers.
 Signal intruders that they have been
detected Intrusion Server – A physical device or soft-
ware component that controls one or more
intrusion zones or areas.
Basic Definitions
Zone – A collection of one or more input points
Annunciator – (Not supported by Mercury) An (or Mercury readers) that are used to monitor a
annunciator is any electrical device connected particular zone within the facility.
to an Aritech or Bosch output point, which is
activated when an intrusion is detected (for
example, a siren). An annunciator can be
silenced or activated manually.

24-10832-194 Rev. E
319

Sequence of Steps The following sections describe intrusion con-


figuration and operation procedures using the
The following sequence of steps are involved P2000 software.
in the process of configuring, controlling, and
monitoring intrusion components: OPC Aritech Intrusion Interface
 Create and assign menu permissions to per- This interface controls the Intrusion OPC
form Intrusion Configuration and Control Server, which connects to Aritech devices to
functions; see page 21. control intrusion zones, areas, and annuncia-
 Enable the intrusion server (Aritech only); tors. The P2000 Intrusion Service connects to
see page 319. a single Intrusion OPC Server to support mul-
 Configure the Bosch intrusion panel; see tiple intrusion devices.
page 320.
 Configure Mercury intrusion components Note: The P2000 system has been validated
to support up to 4,000 OPC points.
and alarms; see page 323.
 Configure alarm options for Aritech and Once you use the instructions provided with
Bosch intrusion devices. This allows you to your Aritech panel to configure your intrusion
view intrusion-related alarms on the P2000 panel and associated items, you must enable
Alarm Monitor and act accordingly, such as the intrusion server in the P2000 System Con-
acknowledging the alarm; see page 326. figuration window to populate the associated
 Issue commands to control intrusion com- data into the P2000 database.
ponents; see page 328.
 View and monitor intrusion activity from Note: Requires OPC Server Version 2.7.
the Real Time List and Real Time Map as
they occur; see page 330.
To Enable the Aritech Intrusion Server
 Control, monitor, and display the status of
intrusion devices, areas, zones, and annun- 1. From the P2000 Main menu, select Con-
ciators; see page 330. fig>System. Enter your password if
prompted. The System Configuration win-
 Define event triggers and actions associated
dow opens.
with intrusion devices, areas, zones, and
annunciators; see page 331. 2. In the left pane, expand Intrusion.
3. Select Intrusion Server and click Add.
Intrusion Configuration The Intrusion Server Config dialog box
opens.
The intrusion detection system consists of the
P2000 software, the panel firmware (OPC Ari-
tech, Bosch, or Mercury), and I/O modules
(attached to sensors and annunciators). Use the
instructions provided with your intrusion hard-
ware to define your intrusion system, such as
the number and type of sensors, number of 4. Verify that the Aritech intrusion server
annunciators required, how these input and name displays in the Name field.
output devices are associated with
zones/points, and how zones/points are 5. Click Enable.
included within areas. 6. Click OK.

24-10832-194 Rev. E
320 CHAPTER 3
Operating the System

Once you enable the Aritech intrusion server, 2 = vendor address format is incorrect
the System Configuration window is automati- 4 = Aritech panel is working in battery mode
cally populated with the intrusion device and
associated intrusion areas, zones, and annunci- 5 = battery charge is low
ators. Under these conditions, the Aritech panel is
still operational because:

Tag 2: Vendor Address is invalid – Even if the


address format is invalid, maybe that default
values are already correct. If the panel address
is equal to 1 and the password is set to the
The P2000 system is now ready to operate with
default value 0000000000, the Aritech panel
the Aritech intrusion panel, continue with
still communicates with OPC Server; there-
Intrusion Alarms on page 326.
fore, the invalid address fault is displayed but
ignored. Also, note that each field (Address,
OPC Tags Password, and System) is independent from
The P2000 Intrusion Service obtains status others. For example, if the Password field is
information by monitoring the OPC tags correct and the Address field is incorrect, the
defined within the Intrusion OPC Server and driver successfully parses the password value
issue commands by writing values to the and returns the InvalidVendorAddress condi-
appropriate OPC tags. tion because the Address is wrong (but it sets
the Address to the default value 1).
The following table displays nine tags that are
associated with the OPC Aritech panel, includ- Tag 4: Mains failure – This means that the Ari-
ing the corresponding value for each of the tech panel is working in battery mode, but it
tags. You must set up the panel correctly to stays online while the battery works.
communicate with the P2000 system to
Tag 5: Battery charge is Low – In this case the
achieve these values.
Aritech panel is working with a battery in low
Tag Number Description Value condition, but not yet exhausted. So, it com-
1 Connected True municates until power is present.
2 InvalidVendorAddress False
3 PortOpened True
4 MainsFailure False
5 BatteryLow False
Note: Be aware that if you disconnect the bat-
tery from the Aritech panel, the panel may indi-
6 BatteryTest False
cate unusual status and send multiple fault
7 BatteryTestFail False
messages to the Real Time List.
8 BatteryMissing False
9 Tamper False

Be aware that under certain conditions, the Bosch Intrusion Interface


P2000 system may indicate that the Aritech
This integration allows P2000 operators to
panel is in fault status, but the overall opera-
configure and control Bosch intrusion devices.
tion of the Aritech interface is normal. For
The intrusion system may have multiple, inde-
example:
pendent Bosch intrusion panels, and each
If tags 2, 4, and 5 are set with a value of True, Bosch intrusion panel can support multiple
it indicates that: intrusion areas/zones.

24-10832-194 Rev. E
321

DX4020 Configuration Rules (GV3 and


IMPORTANT: This release of the P2000 soft- GV4 Panels)
ware works with Bosch GV3 intrusion panels
firmware Version 8.13 and GV4 intrusion panels 1. After setting up the DX4020 module based
firmware Version 2.03. Other versions may not be on the instructions provided by Bosch,
compatible with this P2000 release.
change the dip switch address on the net-
work interface module to reflect address
Before you configure your Bosch intrusion pan- 80 to connect to the P2000 system.
els, ensure that the following settings are in
2. Telnet into the network module via the
place to establish the communication between
command Telnet <ip address> 9999 and
the P2000 Server and the Bosch intrusion panel:
change the channel 1 settings.
 You should modify some parameters using a. Set Connectmode to c0 for P2000/third
Bosch Remote Programming Software party automation.
(RPS) to program the panel.
b. Do not change any other settings and
1. Verify that under the AUXPARM set- press <Return> to leave the default set-
tings, the SDI RPS Automation is tings.
enabled. This enables the third-party
communication for the panel. Send ‘+++’ in Modem Mode (Y) ?
Auto increment source port (N) ?
2. If you use GV4 panels, set the Automa-
Remote IP Address : (000) .(000) .(000) .(000)
tion device under AUXPARM to the
Remote Port (0) ?
appropriate address based on the network
DisConnMode (02) ?
interface connection.
FlushMode (00) ?
3. To be fully compatible with the P2000 DisConnTime (00:00) ?:
system, you should verify that under the
POINTS section, the point indexes have
B426 Configuration Rules (GV3 Panels)
the parameters listed as follows:
For RPS:
a. Bypassable (enables bypassing from the Yes
Third party automation) : - 1. Set the physical switch address on the
b. Defer Bypass Report : - No B426 to 4.
c. Alarm Abort :- No
2. Set Automation TCP Enable to No.

Note: We recommend the point response type For Automation (P2000 Integration):
for immediate response to be A for non 24-hour
points, and 0 or 2 for 24-hour points. 1. Set the physical switch address on the
B426 to 3.
 The Bosch intrusion integration uses the 2. Set Automation TCP Enable to Yes.
TCP/IP protocol to communicate between
the Bosch panel and the P2000 Server; B426 Configuration Rules (GV4 Panels)
therefore, you must establish the availability For RPS:
of Conettix DX4020 or B426 network inter-
face. This is provided by Bosch to connect 1. Set the physical switch address on the
with the Bosch panel via a TCP/IP protocol. B426 to 4, or 2 or 1. Use this value to set
Make sure the B426 network module uses the panel address using the AUXPARM
the latest Bosch intrusion firmware version. settings.

24-10832-194 Rev. E
322 CHAPTER 3
Operating the System

2. Set Automation TCP Enable to No.


Note: You must use unique panel names, Sys-
tem Adapter errors may occur when a Bosch
For Automation (P2000 Integration): intrusion panel has the same name as an access
control panel (for example, CK721-A).
1. Set the physical switch address on the
B426 to 3, or 2, or 1.
6. Enter the IP Address of the intrusion panel.
2. Set Automation TCP Enable to Yes.
7. Enter the Port Number of the intrusion
3. Set the Web and Automation Security flag panel. This value must be 7700.
to Disabled.
8. Select the Panel Type.
4. If using RPS version 5.18, set the Automa-
9. Enter the Query String value to be used
tion Device to Mode 1.
with message filtering (see Define Query
After you define the previous settings and con- String Filters on page 225).
figure your intrusion devices using the instruc- 10. Select the Source Time Zone that identi-
tions provided with your Bosch panel, you fies the geographical time zone of the
must define the Bosch panel using the P2000 Bosch intrusion panel.
software.
11. The Read Configuration button is pro-
vided to refresh the configuration in this
To Configure the Bosch Intrusion Panel panel with information from the Bosch
panel. This button is only available after the
1. From the P2000 Main menu, select Con- panel has come online. You must use this
fig>System. Enter your password if function to read the panel configuration
prompted. The System Configuration win- after changes are downloaded to the Bosch
dow opens. panel using the hardware configuration tool
2. In the left pane, expand Intrusion. (RPS for example), provided by Bosch.
3. Select Bosch Intrusion and click Add. 12. Click Resend All Events if you wish to
The Bosch Intrusion Panel Edit dialog box re-download all event data stored at the
opens. Bosch panel. Use this function only if the
Bosch panel was not functioning properly
and you replaced your hardware or
upgraded your firmware.
13. Click OK to save your settings.

After you save the Bosch intrusion panel,


within a few minutes the System Configuration
window is automatically populated with the
associated intrusion areas, zones, and annunci-
ators that were configured using the Bosch
user interface.
4. If you use Partitioning, select the Partition
that has access to this panel, and click Pub-
lic if you wish to allow all partitions to see
the panel.
5. Enter a descriptive Name for the panel.

24-10832-194 Rev. E
323

Mercury Intrusion Interface


Note: If you delete an intrusion zone that was
The Mercury Intrusion integration allows the only zone associated with an intrusion area,
then you need to associate the intrusion area
P2000 operators to configure and control
with a new intrusion zone or you may have to
Mercury intrusion devices. A Mercury delete the intrusion area. If you do not perform
intrusion system may have multiple, these steps, then you must perform at a conve-
independent Mercury intrusion panels, and nient time, a full download to the affected panel
each Mercury intrusion panel supports with the Reset Panel Before Download flag
multiple intrusion areas, zones, and keypads. selected.

To configure Mercury Intrusion, first create


Mercury Intrusion Zone Field
the zones, then configure the areas, adding the
Definitions
appropriate zones to the appropriate areas.

Before you can configure Mercury Intrusion General Tab


areas and zones, ensure that your Mercury
hardware (panels, terminals, and input points),
are properly configured using the P2000
system; see Configure Mercury Panels and
Components on page 151 for details.

Configuring Mercury Intrusion Zones

1. From the P2000 Main menu, select Con-


fig>System. Enter your password if
prompted. The System Configuration win-
dow opens.
2. Expand Panels to display the panel types.
3. Expand Mercury Panels to display all Partition – Select the partition that has access
Mercury panels configured in the system. to this intrusion zone.
4. Expand the panel for which you wish to Public – Click Public to allow all partitions to
configure an intrusion zone. see this intrusion zone.
5. Select Intrusion Zone and click Add. The Zone Name – Enter a descriptive name for the
Mercury Intrusion Zone Edit dialog box zone.
opens at the General tab. Enter the infor-
mation in each tab according to your sys- Enabled – This check box controls whether or
tem requirements. See the following not the zone is enabled. The default is enabled.
Mercury Intrusion Zone Field Definitions
for detailed information. Query String – This value is used with message
filtering; see Define Query String Filters on
6. As you work through the tabs, click Apply page 225.
to save your settings.
7. When all entries are complete, click OK to Zone Number – Select a number for the zone.
save the intrusion zone information. Each zone must have a unique zone number.

24-10832-194 Rev. E
324 CHAPTER 3
Operating the System

Mercury Tab  Trigger – if activating the zone triggers an


entry delay.
 Follow – if the zone follows a trigger during
an entry delay. This zone may be active
during an entry delay.

Bypassed – Click to set the zone to be


bypassed. The zone stays bypassed until the
intrusion area’s status changes to disarmed.

Chime Flag – Click if you want to allow the


keyboard chime to be activated, when appro-
priate, on an MRDT keypad.

Alarm Options
Intrusion Area – Displays the intrusion area
name to which the zone is assigned. This field
displays <none> until you assign the zone to
an intrusion area.

Point Type – Select Input Point if you are con-


figuring the zone with an input point or
Reader Terminal if you are configuring the
zone with a reader terminal.

Input Point – If the Point Type is Input Point,


select the input point that has been designed to
detect a change in your facility, this could be a
glass break sensor or door contact.

Reader Terminal – If the Point Type is Reader Alarm options are described in detail on
Terminal, select the reader terminal that has page 83.
been designed to monitor a particular zone.

Processor Rule – This field defines the zone Configuring Mercury Intrusion Areas
type. Select:
1. From the P2000 Main menu, select Con-
 24 Hour Zone – if the zone alarms are trig- fig>System. Enter your password if
gered at any time (the zone is always moni- prompted. The System Configuration win-
tored). dow opens.
 Interior Zone – if the zone is only monitored 2. Expand Panels to display the panel types.
when the associated intrusion area is armed. 3. Expand Mercury Panels to display all
Delay Trigger – This field defines the entry Mercury panels configured in the system.
delay trigger type. Select: 4. Expand the panel for which you wish to
configure an intrusion area.
 No delay – if the zone is not affected by an
entry delay.

24-10832-194 Rev. E
325

5. Select Intrusion Area and click Add. The Query String – This value is used with message
Mercury Intrusion Area Edit dialog box filtering; see Define Query String Filters on
opens at the General tab. Enter the infor- page 225.
mation in each tab according to your sys-
tem requirements. See the following Number – Select a number for the area. Each
Mercury Intrusion Area Field Definitions area must have a unique area number.
for detailed information.
6. As you work through the tabs, click Apply Mercury Tab
to save your settings.
7. When all entries are complete, click OK to
save the intrusion area information.

Note: If you wish to delete an intrusion area,


you must first delete it from the System Configu-
ration window, then you must perform at a conve-
nient time, a full download to the affected panel
with the Reset Panel Before Download flag
selected; see page 425 for details.

Mercury Intrusion Area Field Defini- Default Status – Select Disarmed or Armed as
tions the default status for the intrusion area.

Entry Delay – Enter the number of seconds from


General Tab 0 to 32767 (default is 60) that alarms are sup-
pressed after someone enters the intrusion area.

Exit Delay – Enter the number of seconds from


0 to 32767 (default is 60) that alarms are sup-
pressed after the intrusion area is armed.

Auto Disarm – When selected, the intrusion


area is automatically disarmed when access to
the area is granted via an access control reader.
This applies only to the default intrusion area,
the intrusion area defined as number 1.

Skip Alarm Cancel – This option is selected by


default and cannot be modified. It allows an
Partition – Select the partition that has access
area to go directly from Disarmed to Armed or
to this intrusion area.
from Armed to Disarmed, as appropriate.
Public – Click Public to allow all partitions to
Report Disarmed Not Ready to Arm – This
see this intrusion area.
option is not selected by default and cannot be
Name – Enter a descriptive name for the area. modified. The intrusion area does not report
when it is not ready to be armed.

24-10832-194 Rev. E
326 CHAPTER 3
Operating the System

Zones Tab
Note: To configure Mercury intrusion zone
alarms, see Configuring Mercury Intrusion Zones
on page 323. To configure Mercury intrusion area
alarms, see Configuring Mercury Intrusion Areas
on page 324.

To Configure Aritech Intrusion Alarms

1. In the System Configuration window,


expand Intrusion.
2. Expand Intrusion Server to display all
Aritech intrusion components.
To make an intrusion zone part of an intrusion 3. Select an Intrusion component (Device,
area, select it in the Available Zones section Area, Zone, or Annunciator). Click Edit.
and click << to move it to the Selected Zones
section.

Alarm Options Tab

4. The Intrusion Config dialog box opens for


the selected item (Device, Area, Zone or
Annunciator).
Alarm options are described in detail on
page 83.

Intrusion Alarms
Intrusion components that generate alarms
must belong to at least one alarm category, and
must provide their own set of alarm options
and parameters to define how the alarms
behave when activated, whether or not they
need to be acknowledged, at what time an
alarm can be activated, and other alarm set-
tings that provide the flexibility of automating
the alarm operation.

24-10832-194 Rev. E
327

5. If you are configuring alarm options for an To Configure Bosch Intrusion Alarms
Intrusion Device, select from the Partition
drop-down list, the appropriate Partition 1. In the System Configuration window,
that has access to the Intrusion Device. expand Intrusion.
Partition selection is only available at the 2. Expand Bosch Intrusion to display all
Intrusion Device level. Bosch intrusion panels.
6. Click Public if you wish the Device, Area, 3. Expand the Bosch intrusion panel that con-
Zone, or Annunciator to be visible to all tains the intrusion component (area or
partitions. point) you wish to configure.
7. Specify the Query String value to be used
with message filtering.
8. Click Add to assign this alarm to one or Note: You cannot configure alarms that are
associated with Bosch intrusion annunciators.
more Alarm Categories. The Add Alarm
Categories dialog box opens displaying all
previously created alarm categories (see 4. Select the intrusion component and click
page 270 for details). Edit. The selected Bosch Intrusion Edit
dialog box opens.

Note: If you use the Enterprise feature, the


Alarm Categories defined for all P2000 sites
within an Enterprise system are listed.

9. Select one or more categories and click


Add. The list displays all the selected 5. Select from the Partition drop-down list,
alarm categories. the appropriate Partition that has access to
10. If you wish to remove a category from the the Bosch intrusion component.
list, select the alarm category and click 6. Click Public if you wish the intrusion
Delete. component to be visible to all partitions.
11. Once you have all the alarm categories you 7. If you wish, edit the Name of the Bosch
want to assign to this alarm, select an Intrusion area or point alarm. This name is
alarm category from the list and click Edit not stored in the intrusion panel, and is
to edit the alarm options. You can select overwritten when you click the Read Con-
and edit more than one category at a time. figuration button in the Bosch Intrusion
The Alarm Options dialog box opens dis- Panel Edit dialog box.
playing the General tab. See the definitions
provided on page 83.

24-10832-194 Rev. E
328 CHAPTER 3
Operating the System

8. Specify the Query String value to be used Controlling Intrusion Items Using the
with message filtering. Intrusion Control Window
9. Click Add to assign this alarm to one or Use the Intrusion Control window to perform
more Alarm Categories. The Add Alarm commands for areas, zones/points, and annun-
Categories dialog box opens displaying all ciators. It allows operators to arm and disarm
previously created alarm categories (see areas; reset, bypass, and make any
page 270 for details). zones/points operational; and silence or acti-
vate any annunciator.

To Control Intrusion Items

1. From the P2000 Main menu select Con-


trol>Intrusion. The Intrusion Control dia-
log box opens.

Note: If you use the Enterprise feature, the


Alarm Categories defined for all P2000 sites
within an Enterprise system are listed.

10. Select one or more categories and click


Add. The list displays all the selected
alarm categories.
11. If you wish to remove a category from the
list, select the alarm category and click 2. Select the Device (Aritech, Bosch, or Mer-
Delete. cury panel) name you wish to control.
12. Once you have all the alarm categories you 3. If you wish to control an intrusion area,
want to assign to this alarm, select an alarm click the Areas tab. From the list of Avail-
category from the list and click Edit to edit able Areas at the left side of the window,
the alarm options. You can select and edit select the area you wish to control.
more than one category at a time. The 4. Click the >> button to move the selected
Alarm Options dialog box opens display- area to the Selected Areas box. You can
ing the General tab. See the definitions add as many areas as you wish. Once you
provided on page 83. have the selected areas, click the function
button on the right side of the window to
perform the associated operation. The
Intrusion Management choices are:
Management of intrusion includes displaying Arm – (Aritech) Arms the selected areas if
the current state of intrusion items as well as at the time that you issue the command the
issuing commands for such activities (arm, dis- area’s state permits it.
arm, bypass, and so on). The following sec-
tions describe how to monitor and control Arm – (Bosch) Arms the selected areas
intrusion items. after a delay, and if the area’s state permits
it.

24-10832-194 Rev. E
329

Arm – (Mercury) Arms the selected areas 6. Click the >> button to move the selected
with a pre-configured delay. zone to the Selected Zones/Points box.
You can add as many zones as you wish.
Forced Arm – (Aritech) Arms the selected
areas regardless of the area’s state at the Once you have the selected zones, click
time when you issue the command. the function button on the right side of the
window to perform the associated opera-
Forced Arm – (Bosch) Arms the selected tion. The choices are:
areas immediately. This function is exe-
Bypass On – Commands the selected
cuted by the Bosch panel whether or not
zones/points to be bypassed.
points are secured.
Bypass Off – Turns off bypassing of the
selected zones/points.
Note: Forced Armed is not supported by Mer- Reset – (Not supported by Bosch or Mer-
cury panels. cury). Resets the state of the selected
zones. If you issue this command while the
Disarm – (Aritech and Mercury) Disarms input point is still in alarm because of still
the selected areas. being unsealed, you must seal the input
and send this command again to reset it.
ResetAck – (Not supported by Bosch or
Note: When a Mercury intrusion area is dis- Mercury). Resets the state of the selected
armed, and some zones were faulted but are now zones. If you issue this command while the
normal, the area still remains in the alarmed input point is still in alarm because of still
state. To get the area back to the normal state,
being unsealed, there is no need to re-send
you must disarm the area from the MRDT keypad
terminal or from the Intrusion Control window. the command after the input is sealed. The
command remains valid and reset the
zones as soon as the input seals.
Disarm – (Bosch) Disarms the selected
areas and silences the associated keypad. 7. If you wish to control an intrusion annun-
ciator, click the Annunciator tab. From
5. If you wish to control an intrusion zone, the list of Available Annunciators at the
click the Zones/Points tab. From the list of left side of the window, select the annunci-
Available Zones/Points at the left side of ator you wish to control. Not supported by
the window, select the zone/point you wish Mercury.
to control.

24-10832-194 Rev. E
330 CHAPTER 3
Operating the System

8. Click the >> button to move the selected When a status changes, the associated intrusion
annunciator to the Selected Annunciators icon may start flashing. You can right-click the
box. You can add as many annunciators as icon to open a shortcut menu and choose to, for
you wish. Once you have the selected example, arm or disarm an intrusion area or
annunciators, click the function button on bypass an intrusion zone/point. If the intrusion
the right side of the window to perform the component was configured to allow the opera-
associated operation. The choices are: tor to activate events, the event name also dis-
Silence – Silences the selected annuncia- plays in the shortcut menu.
tors. To add intrusion icons to the Real Time Map,
Activate – Activates the selected annuncia- follow the instructions provided in Creating a
tors. Real Time Map on page 348.
9. When you finish controlling the intrusion Map Maker provides a default intrusion image
items, close the Intrusion Control dialog set to display various intrusion states. How-
box. ever, you can use your own icons to create cus-
tom image sets. See Adding Image Sets on
Viewing Intrusion Transactions Using page 352 for details.
the Real Time List
Viewing and Controlling Intrusion Items
All intrusion detection transactions are sent
Using the System Status Window
through real time messages to the Real Time
List. As the status of defined areas, zones, and The System Status window displays the status
annunciators changes, corresponding related of intrusion components that are configured to
messages are generated and displayed. You monitor intrusion detection. It also allows you
must select the Intrusion check box in the to issue the commands, depending on the state
Real Time List window to display all intrusion of the following intrusion component:
transactions as they occur. See Using the Real
Time List on page 342 for more information. Intrusion Areas – The system displays the sta-
tus of all intrusion areas associated with the
selected intrusion panel. You can issue com-
mands for the area by right-clicking the associ-
Note: If you wish to print intrusion transactions
as they occur, you can either print them from the ated status icon. The following commands may
Real Time List window, or select the Intrusion be available, depending on the current state of
check box in the Site Parameters dialog box, the area:
Printing tab; see page 34.
 Arm – (Aritech) Arms the selected area if at
the time that you issue the command the
Monitoring Intrusion Using the Real area’s state permits it.
Time Map  Arm – (Bosch) Arms the selected area after
a delay, and if the area’s state permits it.
Use the Real Time Map to display the status of
intrusion areas, zones/points, annunciators, and  Arm – (Mercury) Arms the selected area
intrusion devices on a map layout of your facil- with a pre-configured delay.
ity. Upon intrusion activity, the map shows the  Forced Arm – (Aritech) Arms the selected
state change and the exact location of the activ- area regardless of the area’s state at the time
ity. See Using the Real Time Map on page 346. when you issue the command.

24-10832-194 Rev. E
331

 Forced Arm – (Bosch) Arms the selected Intrusion Annunciators – (Not supported by
area immediately. This function is executed Mercury) The system displays the status of all
by the Bosch panel whether or not points intrusion annunciators associated with the
are secured. selected intrusion panel. You can issue com-
mands for the annunciator by right- clicking
the associated status icon. The following com-
Note: Forced Armed is not supported by Mer- mands may be available, depending on the cur-
cury panels. rent state of the annunciator:

 Activate – Activates the selected annuncia-


 Disarm – (Aritech and Mercury) Disarms tor.
the selected area.
 Deactivate – Deactivates the selected
 Disarm – (Bosch) Disarms the selected area annunciator.
and silences the associated keypad.
See Viewing System Status on page 435 for
Intrusion Zones – The system displays the sta- instructions on how to display intrusion status
tus of all intrusion zones associated with the and issue commands.
selected intrusion panel. You can issue com-
mands for the zone by right-clicking the asso-
ciated status icon. The following commands Intrusion Events
may be available, depending on the current
The intrusion detection system hardware con-
state of the zone:
nected to the P2000 system can trigger events
 Bypass On – Commands the selected zone and respond to event actions using the P2000
to be bypassed. Event application. For specific instructions,
 Bypass Off – Turns off bypassing of the see Create Events on page 335. Typical intru-
selected zone. sion commands to be included and linked to
specific actions are as follows:
 Reset – (Not supported by Bosch or Mer-
cury) Resets the state of the selected zone.  An armed intrusion zone (trigger) forces the
If you issue this command while the input door override to be cancelled (action).
point is still in alarm because of still being  An access grant command (trigger) disables
unsealed, you must seal the input and send intrusion for a fixed time (action).
this command again to reset it.  An access denied message generated by the
 ResetAck – (Not supported by Bosch or panel (trigger) bypasses or arms an intru-
Mercury) Resets the state of the selected sion zone or area (action).
zone. If you issue this command while the  A particular badge that is granted access
input point is still in alarm because of still (trigger) silences an intrusion annunciator
being unsealed, there is no need to re-send (action).
the command after the input is sealed. The
command remains valid and reset the zone For a complete list of event triggers and
as soon as the input seals. actions associated with intrusion devices,
areas, zones, and annunciators, see Appendix
A: Event Triggers/Actions.

24-10832-194 Rev. E
332 CHAPTER 3
Operating the System

Track Hours On Site Use readers that are related to a particular sec-
tion of your facility. For example, you may
want to select readers located at the entrance of
This feature allows you to record a card- a production facility that provide for the in
holder’s accumulated number of hours present hours, and select readers located at the exit of
at a site. The Hours On Site application is used the facility that can be used for the purpose of
exclusively for tracking and reporting purposes reporting the out hours.
and works by recording the cardholder’s time
interval between an in badging and out badg- The Hours On Site feature does not determine
ing at reader terminals that are defined to mon- where and when cardholders have access in
itor Hours on Site. and around a facility – there is no access con-
trol or transaction processing associated with
Time is accrued only from the latest in and out this function, the terminals that are selected for
badging. For example, when a cardholder this feature are defined for time tracking pur-
badges at a reader defined as an Entry Terminal, poses only.
the cardholder’s time is accrued. If the same
cardholder badges at the same or other Entry
To Define Hours On Site Zones
Terminal, the first badging is ignored and the
time is accrued from the latest badging. The 1. From the P2000 Main menu, select Con-
reverse is true for an Exit Terminal. Hours On fig>System. Enter your password if
Site accurately reports hours present between prompted. The System Configuration win-
matched pairs of in and out badgings (that is, an dow opens.
in badging followed by an out badging, with no
2. Select Hours On Site Zones and click
other badgings in between).
Add. The Hours On Site Zone dialog box
opens.
Configuring Hours On Site 3. If this is a partitioned system, select the
Zones Partition that has access to this Hours On
Site zone, and click Public if you wish the
Before you initiate data collection, you must
Hours on Site zone to be visible to other
define the readers that provide real time infor-
partitions.
mation to track a cardholder’s time spent at a
particular area.

24-10832-194 Rev. E
333

4. Enter a descriptive Name for the Hours On 2. Scroll down to the two Hours On Site
Site zone. reports provided and select one of the fol-
5. In the Entry Terminals box, select the ter- lowing:
minals from the Available list that are used Hours on Site – Lists a detailed report of a
for Hours on Site in transactions. Card- cardholder’s accumulated number of hours
holders should use any of these terminals present at a site.
when entering a facility or area within a
Hours on Site - Simple – Lists a summary
facility, to start the accumulation of hours report of a cardholder’s accumulated num-
present. ber of hours present at a site.
6. In the Exit Terminals box, select the ter-
Regardless of your selection, the Hours On
minals from the Available list that are used
Site dialog box opens displaying filtering
for Hours on Site out transactions. Card-
options.
holders should only use any of these termi-
nals when leaving a facility or area within
a facility, to stop the accumulation of hours
present.
7. Click OK. A new icon displays under the
root Hours On Site Zones icon in the Sys-
tem Configuration window.

Hours On Site Reporting


You can run Hours On Site reports at any time
to determine cardholders’ current number of
hours present at a specified area in a facility.

These reports display calculated attendance


and are ready for evaluation and printing. You
can also export these reports into a payroll or
human resources system for further calcula-
tion.

Hours On Site reports are provided as a subset


of the standard P2000 report set. This section
describes details specific to Hours On Site
reports. For detailed information on running 3. The default (*) reports all cardholders.
reports, see Chapter 6: System Reports. Enter a First Name or Last Name to limit
the report to a specific cardholder.
To Run Hours On Site Reports 4. Select the Terminal Zone that contains the
readers that were defined to track hours on
1. From the P2000 Main menu, select site; or select the (*) to report on all
Report>Run Report. The Run Report defined terminal zones.
dialog box opens.

24-10832-194 Rev. E
334 CHAPTER 3
Operating the System

5. From the Cardholder Type drop-down


list, select whether you want to report on
Regular cardholders, Visitors, or All.
6. Select a Begin and End date for the trans-
actions you wish to see. Only records
within these dates are listed in the report.
7. Click OK. Select a printer name and any
other information for the printer to be used.
See your system administrator if you need
more information, or refer to your Micro-
soft Windows documentation.
8. Click OK. The Hours On Site report dis-
plays in the Crystal preview window. The
top section of the report displays informa-
tion according to the filtering options that
you selected in the Hours On Site dialog
box. You can use the arrows at the top of
the window to scroll forward and back
through the pages; resize the window for
the best display, and export or print all or
single pages of the report.
Note that records marked with an asterisk (*)
indicate out of sequence in or out times. This
Hours On Site (Detail) Report occurs when:
This report provides detail cardholder activity  a cardholder badged more than once at des-
based on your selected search criteria. The ignated in readers without badging at an out
report displays the cardholder name, badge reader
number used, specific terminal name where the  a cardholder badged more than once at des-
badge was presented, the terminal zone that ignated out readers without badging at an in
contains the specified terminal, and the in and reader
out date and time when the cardholder badged
 a cardholder badged in and no subsequent
at the terminal. In addition, this report also dis-
out badging occurred on that calendar day
plays the total number of hours on site per day,
per badge, and for the entire report.  the first badging of the first day of the report
is an out
This information is updated each time the card-  the last badging of the last day of the report
holder badges at the terminals included in is an in.
Hours On Site zones.
The asterisk could also indicate that the report
might be displaying incomplete badging infor-
mation, depending on what time of day and
date the report is run.

24-10832-194 Rev. E
335

Hours On Site - Simple Report The following sections present general instruc-
tions and examples for creating triggers and
This summary report is run using the same actions; however, not every dialog box and
Run Report criteria as the detailed report. The field is illustrated. For a complete list of all
difference between this report and the detailed available categories and associated types and
report is that the Simple report only shows conditions, see Appendix A: Event Trig-
total times for each cardholder, not badging gers/Actions.
time details.
System Events vs. Panel
Card Events: System and
card-activated events, as cre-
ated via the P2000 Main menu
APPLICATION NOTE Events feature, create sys-

tem-wide events initiated from


the Server. These events can be triggered from
several sources including badges, panels, termi-
nals, inputs, outputs, operators, and so on. Panel
card events are created via the System Configu-
ration window for a specific panel and operate
independently from the system. If the system net-
work goes down for any reason, the panel card
events continue to operate, even while the panel
is offline. For more information on Panel Card
Events, see Configure Panel Card Events on
page 91.

To Create an Event

Create Events 1. From the P2000 Main menu, select


Events>Configure Events. The Configure
Events list displays. All events currently
Events are system actions that you can pro- configured for the system are listed.
gram to occur automatically. Events can be
triggered by the system or card activated. An
event consists of a trigger and an action. For
example, you can program an event that incre-
ments a counter (the action) when a cardholder
badges at a specific reader (the trigger).

Using Event Configuration


Dialog Boxes
Event configuration dialog boxes change
appearance, depending on the category
2. Click Add. The Configure Events – Add
selected; some category selections present
dialog box opens.
more fields on a dialog box than others.

24-10832-194 Rev. E
336 CHAPTER 3
Operating the System

TIP: Event triggers with multiple OR condi-


tions can be made more efficient by defining the
most specific and most likely triggers first (that is,
listed first in the trigger list). For example, Access
Grant triggers should be defined before Counter
triggers because Counters change less frequently
than the system grants access. Triggers that
check if certain items are members of groups
(such as the granting terminal being in a specific
access group) are very costly to process and
should be last on the list, and therefore checked
only when all other conditions are exhausted.

8. Click Enable to enable the event.


3. If this is a partitioned system, select the
9. Continue with Creating Triggers and Cre-
Partition in which this event is active and
ating Actions.
click Public if you wish this event to be
visible to all partitions.
4. Enter a descriptive Name for the event. Creating Triggers
When the event is configured, this name
Triggers determine what conditions must be
displays in the Configure Events list, so
met to initiate a specific action. The type, con-
make it meaningful to those who must
dition, logic, and value that can be assigned to
work with it.
the trigger are specific to the category selected.
5. In the Active field, select from the For example, when you select Badge as the cat-
drop-down list the Time Zone during egory, specific event action types are available;
which this event is active. when you select Panel as the category, a differ-
6. Click Allow Manual Trigger to allow an ent set of event action types are available.
operator to manually initiate this trigger.
See Creating Manual Triggers on page 341 To Create Trigger Conditions
for detailed information.
7. In Trigger Logic, click either AND or OR. 1. In the Configure Events dialog box, go to
If more than one group of conditions have the Triggers box and click Add. The Trig-
been created for this trigger and you wish ger dialog box opens.
all groups of conditions to be met to acti-
vate the trigger, click AND. If you wish
any of the groups of conditions to trigger
the action, click OR.

Note: It is possible to define a trigger (or set of


triggers) that would always be true. When using a
steady-state trigger, be sure to use the AND logic
with another trigger that is not a steady-state trig-
ger. Steady-state triggers are the status triggers for
panels, terminals, input points, and output points. 2. Enter the information in each field as
described in the Trigger Field Definitions.

24-10832-194 Rev. E
337

3. When all information is completed, click Value – Click Select to select a value that
OK to save the trigger conditions and applies from the Select list. For example, if the
return to the Configure Events dialog box. category is Badge you could select is less than
The new conditions are listed in the Trig- or equal to and select a badge number from the
gers list. list to create the condition all badges less than
or equal to a specific badge number.

In the previous example, we have created a


Note: Event triggers that use steady-state con- trigger using the Badge category, with a type
ditions, which can be modified by other event
actions such as Output Status and Host Count- Host Grant that triggers an event action if the
ers, may not be triggered reliably when AND is value (in this case, the badge number) is equal
used with other conditions. For example, creating to 30.
two triggers that activate when a badge is pre-
sented at a door and a counter is set at a certain
value, may fail if one of the actions changes the To Edit a Trigger Condition
value of the counter.
1. From the Configure Events list, select an
event and click Edit. The Configure
Trigger Field Definitions Events dialog box opens, displaying the
current settings for that event.
Category – Select a category from the 2. In the Triggers box, select the trigger you
drop-down list. wish to change and click Edit. The Trigger
Type – Select a type from the drop-down list. dialog box opens.
The types available for selection are limited to 3. Change the selections as appropriate and
those appropriate to the category selected. click OK to return to the Configure Events
dialog box. The Triggers list reflects the
Condition – Select a condition from the changes.
drop-down list. The conditions available are
limited to those appropriate for the category
and type selected. Creating Actions
Logic – Select the logic that applies to the con- An Action, as defined in the Actions list at the
dition from the drop-down list. The choices bottom of the Configure Events dialog box, is
are: is equal to, is not equal to, is less than or performed by the system when the related trig-
equal to, is greater than or equal to, is less ger occurs. You can program a wide variety of
than, and is greater than. event actions using the Category and Type
fields provided in the Action dialog box. As
with Triggers, the Action types available
depend on the Category type selected.

An event can trigger more than one action.


You can create several actions and specify in
what order the actions occur.

24-10832-194 Rev. E
338 CHAPTER 3
Operating the System

To Create an Action 2. Click Up or Down at the bottom of the dia-


log box to move the line item as desired.
1. In the Configure Events dialog box, go the The action displayed at the top of the list
Actions box at the bottom of the dialog box occurs first.
and click Add. The Action dialog box
opens.
Event Actions Field Definitions

The available fields to define any Action are


dependent on which category is selected.
Because there are so many combinations of
categories, types, and related selections, the
following list of field definitions contains only
a sampling of available fields. For a complete
list of categories and related selections, see
Appendix A: Event Triggers/Actions.

2. Enter the information according to Event Order – If more than one action has been
Actions Field Definitions. defined for this trigger, the order of the action
3. When all conditions are defined, click OK displays in this field. For example, if the action
to return to the Configure Events dialog selected is first in the Action list, this field dis-
box. The new Action displays in the plays 1. You should define a delay between
Actions list. event actions to avoid executing them in ran-
dom order.

Delay (H:M:S) – Select hour, minutes, and sec-


onds from the spin box to enter a delay time
after which the action occurs. This would be
useful with an anti-passback action, for exam-
ple.

Note: Delayed event actions should not con-


tain macros. The information needed for the mac-
ros is not available when the action is delayed.
Also, event actions that need information from a
trigger cannot be delayed.

Category – Select a category from the


drop-down list. The category selected deter-
4. Continue to add actions as required. mines what Action types are available.

Type – Select a type from the drop-down list.


To Change Event Action Order of The type selected may add, remove, or change
Occurrence any additional fields available for definition.
For example, when Increment Counter is
1. From the Actions box at the bottom of the
selected as the Type for the Host Category, an
Configure Events dialog box, select an
additional field is created that lists the counters
action line.
available.

24-10832-194 Rev. E
339

If Display Message is selected as the Type for


the Host Category, additional fields are added
from which to select the Instruction Text to be
used and the workstation on which to display
the message.

OPC Server Event Actions

1. In the Action dialog box, click the Cate-


gory drop-down list and select OPC
IMPORTANT: Do not configure OPC Server Server.
Event actions before reading and understanding
OPC Server. If OPC Server Event actions are not 2. From the Type drop-down list select
configured correctly, the equipment may not work OPCWrite.
properly.
3. To select an OPC Tag from those available
for the selected OPC Server, click the [...]
The following applies to OPC (OLE for Pro- button. The Items dialog box opens.
cess Control) Server events:

 If the computer on which the selected


Server resides is switched OFF, then the
event would have no effect.
 However, if the computer is ON and the
OPC Server has been switched OFF, then
the event would only be acted upon if the
appropriate launch and access rights are
granted.
 Similarly, if the computer and the OPC
Server are running, then the event would
only be acted upon if it has the correct
access rights (that is, the sending user and
password must be correctly set up at the
receiving computer together with the cor- 4. Click the [...] button to locate the OPC
rect DCOM rights). Note that the setup is Server, or select the Server from the OPC
correct when the software is installed. Servers drop-down list.
5. Select the Data Type (the default option is
To select an OPC Server and view the avail-
Use native type, which displays all tags).
able tags, a tag browser is provided in the
event Action dialog box. Note that to select an 6. In the Browse Items box, select the item
OPC Server, the OPC Server must be running and the tag for the event action.
and you must have the appropriate rights. The selected item displays in the Item
Name field.

24-10832-194 Rev. E
340 CHAPTER 3
Operating the System

To View Event Counters

1. From the P2000 Main menu, select


Events>Event Counters. The Event
Counters list displays.

7. Click OK to enter the Item Name into the


OPC Tag field in the Action dialog box.
The computer name and Prog ID are pre-
fixed to the item name.

Note: The Tag Browser can access the OPC


Server only if the log on operator has the appropri-
ate rights to the OPC Server.

8. Select the appropriate Data Type from the


drop-down list for the event action value. Event counters are listed under the Counter
column. The Value column lists the accu-
9. Enter the Value that is to apply to the OPC
mulated number of events attached to each
Tag.
counter. You can add as many counters as
10. Click OK to return to the Configure Events you wish, or change the event counter
dialog box. The new event action displays name to give the counter a meaningful
in the Actions list. name; see the following section for
detailed information.
Counting Events 2. Click Done to close the Event Counters
dialog box.
You can create an unlimited number of count-
ers for event programming, which increment or
decrement each time a trigger occurs, depend- To Add Event Counters
ing on the category and type selected for the
event. For example, you can create a badge 1. From the P2000 Main menu, select Con-
swipe trigger for a specific badge and then cre- fig>System. Enter your password if
ate an action that increments Counter 1 each prompted. The System Configuration win-
time the Server grants access to that badge. dow opens.
Then you can view the event counters list to 2. Select Counters and click Add. The
monitor the action. Event counters accumulate Counter Name Edit dialog box opens.
value until they are reset.

24-10832-194 Rev. E
341

Creating Manual Triggers


Triggers can be programmed to be activated
manually by an operator. In this case, the Con-
figure Events window is set to Allow Manual
Trigger and linked to an action. The event is
then initiated by the operator from the
3. If this is a partitioned system, select a Par- Events>Trigger Manually menu, rather than
tition where the counter applies and click by trigger conditions set up in the Configure
Public if you wish this counter to be visi- Events window.
ble to all partitions.
4. Enter a descriptive Name for the counter.
Note: Events can also be manually initiated by
5. Click OK. The new counter displays an operator from the Alarm Monitor window (see
beneath the main Counters icon. page 277), as long as the item that generated the
alarm was configured to activate events; or can
also be manually initiated from the Real Time
To Reset Event Counters Map (see page 348), regardless if the Allow
Manual Trigger option was enabled in the Con-
1. From the P2000 Main menu, select Sys- figure Events dialog box.
tem>Database Maintenance. Enter your
password if prompted. The Database
Maintenance dialog box opens. To Manually Trigger an Event
2. Under Maintenance Action, select Reset
1. From the P2000 Main menu, select
Counters to Zero.
Events>Trigger Manually. The Trigger
3. Click Perform. Since this action cannot be Manually dialog box opens.
undone, a verification message displays to
confirm your action.
4. Click Yes if you wish to reset counters to
zero. The Reset Counters dialog box opens.

2. All the events that have the Allow Manual


Trigger option selected in the Configure
5. If this is a partitioned system, select the Events window display in the list.
Partition in which the counters are active. 3. Select an event from the list, and click
6. Click Reset to Zero. All values in the Perform. The trigger is activated.
Event Counters list are reset to zero. 4. Click Done to close the window.
7. Click Done to return to the Database
Maintenance dialog box.
8. Click Exit.

24-10832-194 Rev. E
342 CHAPTER 3
Operating the System

Monitor the System in Real A system administrator may want to look at the
Real Time List as a health check; for example,
Time to ensure all transaction types are being pro-
cessed, or trace why a specific cardholder is
The Real Time List and Real Time Map are being denied access.
dynamic displays of system transactions and
operations. The Real Time List is a Monitoring Remote Messages in Real
time-stamped display of all (or specified) local Time
or remote transactions as they occur. The Real
Time Map displays the current status of local As with remote alarm monitoring (page 272),
terminals, inputs, outputs, and other defined you can monitor transactions from multiple
elements on a map layout of your site. The facilities at multiple geographical locations.
Real Time List and Real Time Maps are typi- Although each remote site administrator has
cally used by operators and system administra- total control over their access control hardware
tors not only to view current status, but as trou- and system information related to their site,
bleshooting tools. operators can control system and event infor-
mation from different sites. This means that
remote operators might, for example, monitor
Note: HID panels do not report transactions their transactions locally during normal work-
associated with lock or output point status
ing hours, while your local operators might
changes. Point status may appear as ‘Unknown”
on the Real Time List and Real Time Map.
monitor transactions messages generated at
their remote sites after hours, as long as both the
local and remote P2000 sites are set up and con-
Using the Real Time List figured to receive and send transaction mes-
sages across P2000 sites during such periods.
The Real Time List is a time-stamped display
of all system transactions as they occur. If With the proper configuration, an unlimited
desired, an operator can monitor only specific number of sites can be monitored simultane-
transaction types. For example, an operator ously, allowing operators to administer multi-
concerned with learning when a cardholder is ple regions from a single site. To monitor
denied access can select only Access Deny to remote messages, both your local and the
filter the information displayed. The Real Time remote sites have to be properly configured.
List then displays only who, what, when, The following conditions must be met:
where, and why the access was denied.
 The Remote Message Service must be up
You can open multiple windows of the Real and running at both the remote site (to send
Time List. For example, you could have one the transaction messages) and at your local
window open with all the types enabled. You site (to receive the transaction messages).
could open a second window with only the See Starting and Stopping Service Control
Badge Trace option selected that would display on page 432.
only those transactions.  The Message Filter Configuration appli-
cation (page 223), must be properly config-
Note: A description of each transaction type is ured at your local site and each remote site,
presented in the Printing tab of Site Parameters to control the type of messages transmitted
on page 34. The Printing function of Site Parame- between Servers, thereby reducing network
ters operates independently from the Real Time traffic by transmitting only messages that
List function. pass the filter criteria.

24-10832-194 Rev. E
343

 The P2000 Remote Server application Viewing Real Time List Transactions
(page 230), must be properly configured at
each remote site to send their transactions To access the Real Time List, select System>
messages to your local site. The setup must Real Time List. Transaction types displayed
include the name, IP address and Remote in the list area of the Real Time List can be
Message Service Listener Port number of color coded to help operators recognize a spe-
your local site; the type of messages that cific type of transaction. You can use the
can be forwarded to your site and at what default system colors, or customize a transac-
times; and other related parameters. tion type with a different color. You can also
set up a printer to print transactions as they
 The Process Received Remote Messages occur, or print all transactions in the list.
option in the RMS tab of Site Parameters
(page 43), must be selected at your local
site to be able to receive messages from
remote P2000 sites. If you select this Note: Operators with View menu permissions
can access all Real Time List functions.
option, the Remote Message Service pro-
cesses incoming messages and passes them
on to RTLRoute for distribution within the The Real Time List displays transaction mes-
local system and, if applicable, to other sages in the order they are received. When a
remote sites. message is received, it displays in the row
 The Message Filter Group selected in the above the scrolling list and in the first line of
RMS tab of Site Parameters (page 43), the list. As new transactions occur, they move
defines which remote messages your to the top of the list.
Remote Message Service processes. If you
select <None>, your local P2000 site
receives all remote messages.

24-10832-194 Rev. E
344 CHAPTER 3
Operating the System

When you open the Real Time List for the first Query – Displays the query string value (if it
time in the session, the scrolling list is empty. was defined) of the item associated with the
Depending on the transaction types selected at message.
the top of the window, transactions begin to
display in date and time order at the top of the Item – Displays the name of the item (panel,
list. As transactions occur, the older ones scroll terminal, input point, and so on) that is associ-
down in the list as the newer ones are added at ated with the message.
the top. Operator – Displays the name of the operator
The following information is shown for each who handled the message (alarms in non pend-
transaction in the list. ing state or audit messages only).

Date/Time – Displays the date and time of the Alarm Category – Displays the Alarm Category
message. Transaction messages that are origi- to which the associated alarm belongs.
nated at remote sites with different geographi-
cal time zones display the actual time at the Note: The Message Routing Status indicator at
remote site. However, remote alarms display the bottom of the Real Time List window displays
in green to indicate that all communications
the time at which they were received at your
between the workstation and the Server are up. If
local site. communications go down, the Message Routing
Status indicator turns red.
Note: Workstation messages display the same
timestamp as their servers, regardless of the time
zone configuration of the workstation or the server. Note: If your facility uses the DVR/VMS feature
and the selected transaction message displayed
is associated with a camera, click Details located
Type – Displays the transaction types that were at the bottom of the window to start the AV Player
selected for monitoring (Audit, Access Deny, in live mode. As an alternative, you can click the
Badge Trace, and so on). Details drop-down arrow and select AV Player
(Live) to start AV Player in live mode or select AV
Message – Displays a message related to the Player (Stored) to start AV Player in video
transaction type, for example, Invalid Card for retrieval mode. For more information, refer to
an Access Deny transaction type. your DVR/VMS documentation.

Details – Displays details related to the mes-


sage, such as Badge number, Terminal and To View all Options in the Real Time
Cardholder name. List
1. In the Real Time List window, click All
Site – Displays the name of the local or remote
from the options at the top of the window.
P2000 site where the message was originated.
All transactions begin to accumulate in the
Partition – Normally displays the name of the scrolling list.
partition containing the item (input point, ter-
minal, panel, and so on) associated with the To View Specific Options in the Real
message. Time List

Public – If the item associated with the mes- 1. Click to clear the All option and select only
sage is marked as Public, this column normally those options you wish to view. Only those
displays whether the message is visible to options begin to accumulate in the scroll-
other partitions. ing list.

24-10832-194 Rev. E
345

To Display Color-Coded Transactions

1. Click Color Items. All transactions dis-


play in a different color, using the default
system colors.
2. To display a transaction type with a differ-
ent color, click Set Colors. The Set Colors
dialog box opens.

The top portion of the window shows the


cardholder details including image, if
available.
The bottom portion includes a chronologi-
cal list of badge transactions associated
with the cardholder.
3. If you wish to manually adjust the In or
Out state of a badge until next badging,
click Set Undefined.
4. To change the number of transactions dis-
played, enter the desired number in the
Num Records field.
3. Select a transaction type, then click Select.
A Color dialog box opens. 5. To update the list box with new data, click
Refresh.
4. Select the desired color and click OK to
return to the Set Colors dialog box. 6. Click Done to return to the Real Time List.
5. Click Defaults if you wish to reset the col-
ors to the default system colors. Printing the Real Time List
6. Click OK to return to the Real Time List An operator can print from the workstation, all
window. (or all displayed) transactions in the Real Time
List, or print individual transactions as they
occur.
To Display Cardholder Details

1. Select from the scrolling list, the transac-


IMPORTANT: Real time printing is not guaran-
tion line item associated with a cardholder teed on foreign language systems.
(Access Deny, Access Grant or Badge
Trace transactions). Printers must first be set up using the Win-
2. Click the Details drop-down arrow located dows Printer Settings dialog box. See your
at the bottom of the window, and select system administrator if you need more infor-
Cardholder Info. The Cardholder Info mation, or refer to your Microsoft Windows
dialog box opens. documentation.

24-10832-194 Rev. E
346 CHAPTER 3
Operating the System

To Print the Real Time List 4. Click OK. The printer name displays.

1. In the Real Time List window, click Print- 5. Click OK to enable printing.
ing in the top portion of the window. The
Printing dialog box opens.
Note: Printing transactions from the Real Time
List (performed from a workstation) is different
from Real Time Printing (performed at the System
Server). For information on Real Time Printing,
see Site Parameters Printing Tab on page 34.

Using the Real Time Map


The Real Time Map displays the current status
of terminals, inputs, outputs, and other defined
elements on a map layout of your facility and
2. Click Print Displayed to print the transac- can be used similarly to the System Status win-
tions that are visible in the Real Time List dow. Maps are created using the Map Maker
box, or click Print All to print all transac- feature to drag-and-drop dynamic icons to their
tions in the list. actual locations on imported layout images.
3. Select a printer name and any other infor- All you need are simple layout maps that can
mation for the printer to be used. be scanned or drawn in any draw application,
then saved in an importable format.
4. Click OK to start printing.
Once the maps are created, they are accessed
from the P2000 System menu. If a terminal
To Print Real Time List Line Items
goes down or an alarm sets, the Real Time
1. In the Real Time List window, click Print- Map shows you the state change and exactly
ing in the top portion of the window. The where the device is located.
Printing dialog box opens.
2. Click Enable Printing. Line items contin- Sub Maps and Attachments
uously print as long as the Real Time List
window is open or minimized on the work- You can create facility-level maps and attach
station. Line items stop printing when the sub maps (Normal and Popup maps) that detail
Real Time List window is closed. specific areas in the facility. Sub maps may
also contain sub maps to add further detail; you
3. Click Setup to select a printer name and can create as many levels as you need.
any other information for the printer to be
used. If an alarm sets in an area detailed in a sub
map, the sub map icon blinks, indicating the
location of the alarm. You can double-click the
Note: We recommend a dot matrix printer be blinking sub map icon to jump to the associ-
used exclusively for printing line items from the ated detail map. (See Add Map Attachments
Real Time List, and independently from the trans- on page 352 for more information about creat-
actions printed from the Site Parameters window. ing multi-level maps.)

24-10832-194 Rev. E
347

Map Maker provides image sets to display var-


Note: Icons that are crossed out with a yellow
ious device states such as panel up, panel bar indicate that the items’ parent devices are not
down, input set, and so on. However, you can functioning. For example, an input point is
create your own icons and include them in marked as unreliable if its parent terminal or
image sets in Map Maker. See Adding Image panel is down.
Sets on page 352 for details.

Note: The Message Routing Status indicator at Note: If your facility uses the DVR/VMS fea-
the bottom of the Real Time Map window dis- ture, when you right-click a map icon that is asso-
plays in green to indicate that all communications ciated with a camera, a pop-up menu displays the
between the workstation and the Server are up. If AV Player (Live) option. If there are stored vid-
communications go down, the Message Routing eos (associated with alarms), the pop-up menu
Status indicator turns red. displays the Show Alarm Video and Start
Recording options. For more information, refer
to your DVR/VMS documentation.
To View the Real Time Map
3. From the drop-down list at the bottom of
1. From the P2000 Main menu, select Sys- the window, select the name of the map
tem>Real Time Map. The Real Time you wish to view. The list only displays
Map window opens. Normal maps.
4. If your facility uses Map Attachments,
click Prev to return to the previous map, or
click Home to return to the main facil-
ity-level map. Clicking Up level takes you
to the previous facility-level map.

Note: The Prev, Home, and Up level naviga-


tion tools are not used with Popup Map Attach-
ments.

5. Use the slider control to enlarge or reduce


the view of the active map. The zooming
of the map can also be controlled with the
mouse wheel. You can also use keyboard
commands to enlarge or reduce the view of
the active map. Use the Up or Left arrow
keys to reduce the view and the Down or
Right arrow keys to enlarge the view.
2. The current status of Panels, I/O Terminals, 6. Click Done to exit the window.
Readers, Input and Output points, and other
defined elements display as designed in
Map Maker. The Main Map displays as
assigned on Map Maker; however, you can
select any map created in the system.

24-10832-194 Rev. E
348 CHAPTER 3
Operating the System

Unlocking a Door Activating Events from the Real Time


Map
You can unlock a door from a Real Time Map.
The door remains unlocked for the time con- Events can be manually activated by an opera-
figured in the door terminal’s access settings, tor from the Real Time Map, rather than by the
and then locks. Use the instructions in Place trigger conditions set up in the Configure
Device Icons on a Real Time Map on page 350 Events dialog box. Icons on the Real Time
to insert a door icon. Map, such as Panels, Terminals or Input
Points, can be configured to initiate events; or
you can just place Event icons on the Map.
Note: The Open Door command does not
unlock Assa Abloy Wi-Fi readers, since those To Activate an Event from a Real Time
readers are normally not connected to the P2000 Map
system.
1. In the Real Time Map, locate the icon that
contains the event you wish to activate.
2. Right-click the icon and select the Event
Note: The Open Door command does not name from the shortcut menu. The event is
unlock doors on S321-IP panels, as this function- triggered.
ality is not supported by these devices. To do so
you must use the Unlock function on the Door
Control application. Creating a Real Time Map
The following steps allow you to create a Real
Time Map:
Note: For doors on a CK721-A panel whose
terminal has the Log Reader Strike Message flag  Set up the Map Maker Window
selected, the map icon image for the terminal  Create an Importable Image
changes from a closed door to an opened door,
as long as the door is unlocked, then reverts back
 Import an Image to Map Maker
to a closed door image when the door locks.  Place Device Icons on a Real Time Map
 Add Map Attachments
 Duplicate Maps
To Unlock a Door from a Real Time Map

1. Locate the door terminal icon for the door Set up the Map Maker Window
you wish to unlock.
1. From the P2000 Main menu, select Con-
2. Right-click the icon and select Open Door fig>Map Maker. The Map Maker dialog
from the shortcut menu. The door unlocks box opens.
for the configured time period, then locks.

Note: If you need to unlock the door for a


period other than that configured, you must do so
using the Door Control function.

24-10832-194 Rev. E
349

2. Click Add. The Map Editor window


Note: Normal and Popup maps that are used
opens. as Popup Map Attachments do not provide tools
to navigate to other maps.

Create an Importable Image


Map Maker can import most popular image
formats: .bmp, .tif, .wmf, .jpg, .pcx, and .eps, to
name a few. (To see all available formats, see
the Files of type drop-down list when you
click the Import button.)

1. If floor plans or maps exist in a compati-


ble electronic format, you can import
them directly.
2. If floor plans or maps exist in hard copy,
have them scanned and saved in a compat-
ible format.
3. If this is a partitioned system, select the
3. If floor plans or maps do not exist, you
Partition in which the map is active and
can create them using a draw program such
click Public if you wish the map to be vis-
as Microsoft Paint, CorelDRAW®, or
ible in all partitions.
other drawing utility, then save or export
4. Enter a descriptive Map Name. the image in a compatible format.
5. From the drop-down list, on the right side 4. Copy the image file to a directory that is
of the Map Name, select one of the follow- accessible to the P2000 system.
ing options:

System – A system map automatically dis- Import an Image to Map Maker


plays when you open the Real Time Map. 1. From the P2000 Main menu, select Con-
You can only create one system map. The fig>Map Maker. The Map Maker dialog
system map displays any defined sub maps box opens.
(Normal or Popup).
2. Click Add. The Map Editor window opens.
Normal – A normal map is a sub map that 3. In the Map Image box at the bottom of the
can be used as a Map Attachment or Popup window, click Import and navigate to the
Map Attachment on another map. It can directory in which your layout image is
also be selected from the drop-down list at stored.
the bottom of the Real Time Map window.
4. Select an image to import.
Popup – A pop-up map is a sub map that
can be used as a Map Attachment or Popup 5. Click Open. The image displays in the
Map Attachment on another map. It is not background of the image area of the Map
selectable from the Real Time Map Editor window. You can use the mouse
drop-down list. pointer to pull the corners and sides of the
window to increase the size as necessary,
or click the maximize/minimize button in
the top right of the window.

24-10832-194 Rev. E
350 CHAPTER 3
Operating the System

1. Expand the element you wish to add. To


Note: If you wish to export the map image,
click Export. Navigate to the directory where the
add an input point for example, click the
exported map is stored, give it a name, and select plus (+) sign next to the Input Point icon.
the file type and other related parameters. An Input icon is added under it.

Place Device Icons on a Real Time Map Note: Placing an Assa Abloy Wi-Fi reader on a
Real Time Map has little value, as those readers
When you open Map Maker, map icons repre- do not provide real time information to the P2000
senting Panels, Terminals, Inputs, Outputs, and system.
other system elements are listed on the right
windowpane. 2. Use the left mouse button to drag the new
icon to the desired position on the map. For
example, an input point could be dragged
near the door representing where the input
point is actually installed. When you
release the mouse button, a Properties dia-
log box opens.

TIP: The top left corner of the icon is anchored


exactly where the tip of the mouse pointer is
released.

Note: If your facility uses advanced features,


such as Intercom or DVR/VMS, the associated
map icons display in the list. See the respective
section in Chapter 4: Advanced Features, for
more information.

24-10832-194 Rev. E
351

3. In the Label field, enter a descriptive name 13. To assign events to the item, enter a
that can easily identify the icon in the Real descriptive event name and select a previ-
Time Map. This name displays under the ously configured event from the associated
icon on your layout. drop-down list. You can define up to four
4. The Font box displays the default font or events for each map icon.
the font selected for the icon name. 14. Click OK to close the Properties dialog
5. In the Font Size box enter the font size for box. The icon is inserted in the map.
the name appearing under the icon. 15. Repeat the same steps for each device or
6. To make all font changes at once, click event you wish to add to the map.
Choose Font and select a font type, style, 16. When all elements have been added, click
and size for the name appearing under the OK to close the Map Editor window. The
icon. map is now available to choose from the
7. If you wish to change the Font Style, Real Time Map drop-down list.
select from the drop-down list whether the 17. Click Done to close the Map Maker dialog
text should be Bold, Bold Italic, Italic, or box.
Normal.
8. To display the text in a different color, click Handling Alarms from the Real Time
the Text Color browse button [...] and Map
select a color from the Color dialog box.
You can place an Alarm Category icon on a
9. Click the Background Color browse but-
Real Time Map and issue commands for all
ton [...] to open the Color dialog box and
P2000 items that generate alarms, (such as
select the background color for the icon
input points or cameras) and that use the
name.
Alarm Category selected.
10. Click Transparent Background if you
wish the background of the text to be trans- When an alarm is reported in the system, the
parent. Alarm Category icon flashes on the map. You
can right-click the icon to issue from a shortcut
11. From the Text Position drop-down list,
menu one of the alarm commands (acknowl-
select whether you want to place the text at
edge, respond, or complete). If you select
the Bottom, Left, Right, or Top of the icon.
Acknowledge or Complete, all alarms that use
12. Select from the drop-down list the name of the Alarm Category selected are acknowl-
the item you wish to place in the map. If edged or completed at once. However, if you
you are placing an input point, all available select Respond, the Alarm Monitor window
input points (or all input points in the parti- displays so you can respond to each alarm by
tion selected) display in the drop-down entering specific instructions for each particu-
list. If you are placing a panel, the lar alarm.
drop-down list includes all panels (or all
panels in the partition). In addition, the shortcut menu allows you to
open the Alarm Monitor window or display
the alarm details associated with the Alarm
Note: You can also place static text objects in Category selected.
the map to indicate for example, the name of an
entire area, or a number to dial in case of emer-
gency.

24-10832-194 Rev. E
352 CHAPTER 3
Operating the System

Add Map Attachments 2. Select the map you wish to duplicate and
click the Duplicate button. The Duplicate
You can add map attachments to Real Time Map dialog box opens.
Maps that, when right-clicked, can open
another map. For example, you can place a
map attachment on the Office map that can
open the Warehouse map. Or you can place
several area map attachments on the System
Map.

To Add a Map Attachment

1. From the P2000 Main menu, select Con-


3. Enter the New Map Name.
fig>Map Maker. The Map Maker list box
opens. 4. Click Keep Items if you wish to keep all
items from the master map.
2. Select the map to which you wish to add a
map attachment. 5. Click Keep Item Labels if you wish to
keep the labels from the master map.
3. Click Edit. The Map Editor window opens
with the selected map in the image area. 6. Click Keep Item References if you wish
to keep all references from the master map.
4. Drag a Map Attachment icon to the image
area. When you release the mouse button, 7. Click OK to create the new map. The Map
select from the drop-down list the map you Editor window opens displaying the
wish to attach. selected items. Make any additional
changes if necessary.
5. Click OK. Now when you open the map in
Real Time Map, you can right-click the
Attachment icon and select Open to open Adding Image Sets
the attached map.
Map Maker provides image sets to display var-
ious device states such as panel up, panel
Duplicate Maps down, input set, and so on. However, you can
The Duplicate Map feature allows the duplica- use your own icons to create custom image
tion of existing maps. This feature is useful in sets.
buildings where the layout is the same
throughout all floors. You can create a master To Create a Custom Image Set for Map
map with default information, and then use Maker
that map as a template to create additional
maps. All current map information is copied; 1. From the P2000 Main menu, select Con-
however, each map must have a unique name. fig>Icon Editor. The Icon Editor dialog
box lists the default image set names.
To Duplicate a Map

1. From the P2000 Main menu, select Con-


fig>Map Maker. The Map Maker list box
opens.

24-10832-194 Rev. E
353

5. Select an icon from the list, and click one


of the following function buttons:
Edit – The Edit Button Image dialog box
opens. Use the editing tools and colors to
edit the existing icon. Click OK to save.

2. Click Add. The Image Set Bitmap Editor


opens.

Import – Select if you wish to replace the


existing icon. Navigate to the directory
where your new images are stored, select
the image and click Open. The default
icon in your new image set is replaced with
the new icon.
3. Select the Image Set Type you wish to Export – Select if you wish to export the
create. The default image for each state existing icon.
displays in the Icon list. 6. Click OK. Your new image set displays in
4. Enter an Image Set Name for the new the Icon Editor list, and is now accessible
image set. from the right windowpane in the Map
Editor window.

24-10832-194 Rev. E
354 CHAPTER 3
Operating the System

24-10832-194 Rev. E
355

Chapter 4: Advanced Features

T
his chapter describes several advanced  DVR/VMS – Provide controls to search,
features that, when properly config- retrieve, and download real-time or
ured and utilized, allow for a more archived audio and video recording from
secure and efficient way to operate and surveillance cameras.
monitor your access control system. Some of  Redundancy – Run the P2000 software in a
these features are bundled separately from the recovery configuration to ensure uninter-
P2000 software, and some of them are shipped rupted operations.
with their own manuals. Refer to your pur-
 FDA Part 11 – Define parameters to assure
chase contract to see what is available in your
FDA Title 21, Code of Federal Regulation
system. This chapter presents the information
(CFR) Part 11 compliance.
you need to set up and configure each of the
following features:  Intercom – Define and control intercom
calls from P2000 Workstations.
 Partitions – Divide your P2000 system data-
bases into sections that can be managed  P2000 Enterprise – Allow multiple P2000
individually. sites to communicate with each other to
share cardholder and badge data.
 Video Imaging – Improve your security by
creating badges to provide a visual identifi-  Web Access – Perform various P2000 tasks
cation of every cardholder. from any Web-ready computer.
 MIS Interface – Add, update, delete, or query
the P2000 cardholder database from an Partitions
external database system.
 pivCLASS Integration – Support of Federal
Identity, Credential, and Access Manage- You can divide the P2000 database into smaller
ment (FICAM) compliant smart cards and sections that can be individually managed. Par-
readers. titions structure what data is accessible by an
 Metasys System Integration – Allow several individual operator, or by a group of operators.
P2000 security tasks to be handled via the You can create as many partitions as you need,
Metasys system user interface. depending on your system requirements. For
example, if you manage a building with sev-
 Guard Tour – Define a sequence of transac- eral tenants, you could use partitions to segre-
tions that must occur at specific intervals to gate the databases and system functions, so
ensure security personnel properly monitors that Tenant A cannot see, access, or change
your facility. Tenant B’s records.
 CCTV – Provides controls to operate cam-
eras, monitors, and other CCTV elements. Operators select the partition to which they are
assigned, from the Partition selection box on
the right side of the P2000 toolbar.

24-10832-194 Rev. E
356 CHAPTER 4
Advanced Features

Any database items created by an operator in a


partition are owned by that partition. That is,
the information resides in that partition and it
could be accessible for use by other partition
operators if the database item has the Public
check box enabled or the operators have been
assigned to the same partition. Operators that
belong to the Super User partition may access
The first partition assigned to the logged on all database items.
user automatically displays in the Partition
field. For multiple partition users, click the There are two types of database partitions:
drop-down button to the right of the Partition Regular and Super User.
field to display all partitions assigned to the
user. The partition selected is the active parti- Regular Partitions
tion for the user.
Regular partition operators may belong to mul-
When a Partition field displays on a window, tiple partitions or just a single partition. Access
the items displayed in the window are only for restrictions include the ability to add, modify,
the partition selected from the drop-down list. or delete items that belong only to their
After partitions are set up, they are available assigned partitions. Items that have been
for assignment to all major system compo- marked as Public in other than their assigned
nents, such as operators, system devices, card- partitions can be selected for viewing; how-
holders, access groups, and terminal groups. ever, the information is not accessible for mod-
For detailed information about using Partitions ification.
with these components, see the component sec-
tions in Chapter 2: Configuring the System. Note: A workstation must be made Public to
allow users from different partitions to log on at
that workstation.
Partition Types
Operators are assigned to single or multiple Super User Partition
partitions and have unique access restrictions.
Examples of access restrictions include the The Super User partition is the main partition
ability to add, modify, or view database infor- in the database. Only one Super User partition
mation within their assigned partitions. Access can be defined. Operators that belong to the
restrictions for individual operators are defined Super User partition have access to all other
in the Menu Permission Groups window. partitions; are responsible for assigning parti-
When an operator logs on to the P2000 system, tions to database operators; and have the abil-
the partition chosen from the Partition selec- ity to add, modify, and delete any items in the
tion box on the right side of the toolbar is the database. Super User members are also respon-
active partition for the operator. However, an sible for performing system maintenance and
operator can select other partitions, assuming system configuration functions.
they have been given access to other partitions
The Super User member can access all system
in the Edit Operator dialog box. See Add Oper-
data regardless of partition ownership. Regular
ators to the System on page 21.
partition operators cannot change parameters
defined in the Super User partition.

24-10832-194 Rev. E
357

Creating Partitions Delete a Partition

Create partitions to divide the P2000 database 1. In the left pane of the System Configura-
into smaller sections. The newly created parti- tion window, expand Partitions. All the
tions are added under the root partition icon, partitions currently configured in the sys-
and display in drop-down list boxes through- tem are listed.
out the system. Once partitions have been 2. Select the partition you wish to delete, and
defined, operators can be assigned to a specific click Delete.
partition or to multiple partitions by using the
3. The Partition Selection dialog box opens.
Edit Operator dialog box.
Select the New Partition to which all items
from the deleted partition will be moved.

Note: If the MIS Interface feature is available


in your system, you need database administrative
rights to add, edit, or delete partitions. (See Set
Up User Accounts on page 29).

Create a New Partition

1. In the left pane of the System Configura- 4. Click OK.


tion window, select Partitions 5. At the Confirm Delete dialog box, click
Yes. All items under the deleted partition
are moved to the new partition.
Note: In Enterprise systems, you can only cre- 6. Operators cannot delete a partition that is
ate partitions at central sites.
associated with their currently logged on
workstation; however, an operator can
2. Click Add to access the Partition Add dia- delete a partition that is associated with
log box. other active workstations. A message dis-
plays to confirm the deletion and all active
workstations are forcefully logged off.

Note: Deleting a partition may take a consider-


able amount of time, if records are still associated
with the deleted partition.

3. Enter a Name for the new partition. Do not


use “Administrator” or “Everyone” as
those names are reserved for internal use.
4. Click OK to save the partition name and
return to the System Configuration win-
dow.

24-10832-194 Rev. E
358 CHAPTER 4
Advanced Features

Video Imaging Video Imaging Specifications


Video Imaging provides a full-featured badge
Video Imaging is a full-featured video imaging design and imaging solution, providing the fol-
and badging system that is fully integrated lowing:
with your P2000 Security Management Sys-
 Integration with the P2000 Security Man-
tem. Video Imaging improves security by pro-
agement System. The P2000 server cen-
viding a visual identification of every card-
trally stores all cardholder records, images,
holder.
and so on.
Through the imaging software’s graphical user  A fully-capable P2000 workstation that you
interface, you can create custom badge layouts can also use as a badging station
easily and quickly. You can include several  Easy-to-use WYSIWYG (what you see is
elements on a badge, such as company logos or what you get) badge design
other important identifying images, cardholder
 Badge design storage limited only by avail-
photographs, custom text, barcodes, and signa-
able hard disk space
tures. You can also add User-Defined Fields
(UDFs) to give you the flexibility to produce  Digital camera and signature pad video cap-
sophisticated designs with a minimum of time ture support options
and effort. You can also create two-sided  Simple to capture photos and signatures
badges, use mag stripe encoding, or print  Magnetic stripe or smart card encoding
badges or adhesive labels using the sheet for-
 Support with partitioned or non-partitioned
matting feature.
P2000 systems
The P2000 system supports two Video Imag-
ing software options: ID Server (Version 4.02)
and EPI Builder® (Version 6.3). Complete
Defining a Video Imaging
software and hardware installation and opera- Workstation
tion instructions are provided in the P2000 Like any P2000 workstation, you must define
Integrated Video Imaging Installation and the Video Imaging workstation at the P2000
Operation Manual that was shipped with your server before the station can properly connect
Video Imaging option. to the server.
The following sections describe basic video
imaging configuration and use, including: To Configure a Workstation for Badging
 Video Imaging Specifications 1. From the P2000 Main menu, select Con-
 Defining a Video Imaging Workstation fig>System. Enter your password if
 Badge Design prompted. The System Configuration win-
dow opens.
 Printing a Badge
2. In the left pane, expand Site Parameters.
3. Select Workstation, and click Add. The
Workstation dialog box opens.

24-10832-194 Rev. E
359

Badge Design
Once you have configured the capture devices,
and you have become familiar with navigating
through the Video Imaging user interface, you
are ready to design badges that meet your spe-
cific requirements.

The following sections provide basic instruc-


tions on how to custom design a badge layout
using your Video Imaging application. For
detailed instructions, refer to your P2000 Inte-
grated Video Imaging Installation and Opera-
tion Manual that was shipped with your Video
Imaging option.

See the following sections to:

 Set Up Badge Fields


4. Enter the information required; see Set Up  Encode Mag Track Formulas
Workstations on page 19.  Create a Badge Layout
5. Click Badge Station to define this work-  Set Up Badge Devices
station as a Video Imaging station.
We recommend you follow the previous steps
in order.
Note: If you edit an existing workstation and
define it as a Video Imaging station, you must exit Set Up Badge Fields
the P2000 software and restart the application for
the change to take effect. Use these instructions to create fields that can
be placed on a badge design. The screens may
6. Click OK. be slightly different, depending on your Video
Imaging software option.

To Create Badge Fields


Note: Configuring a workstation as a Badge
Station only authorizes that workstation to per-
1. From the P2000 Main menu, select Con-
form badging operation. You must still correctly
install the badging software at that workstation.
fig>Integrated Badging>Badge Layout.
The Badge Layout dialog box appears.
2. In the Badge Layout dialog box, select the
Fields tab.

24-10832-194 Rev. E
360 CHAPTER 4
Advanced Features

Encode Mag Track Formulas

With Video Imaging, you can use magnetic


stripe encoding on your badges.

To Add Mag Track Formula to the


Badge Design

Note: The following instructions apply only to


the ID Server software option.

1. From the Badge Layout dialog box, select


the Encode tab.
3. Click Add. The Database Field Select dia-
log box appears.

4. Select an entry from the Database Field


Name drop-down list.
5. Click OK to return to the Badge Layout
dialog box.

To Delete Badge Fields


2. Select the Magnetic Formula Track you
1. In the Badge Layout dialog box, select the wish to set, and click Edit. The Edit Mag-
field you wish to delete, and click Delete. netic Formula dialog box appears.
2. When the system prompts you to confirm
the deletion, click Yes.
The system deletes the field from the list and
also removes it from all magnetic stripe formu-
las.

24-10832-194 Rev. E
361

3. In the Available Fields list, select the To Insert a Text Field


fields you wish to insert, and click <<. The
selected fields appear on the Track Fields
list. Note: The following instructions apply only to
To remove fields from the Track Fields the ID Server software option.
list, select the desired fields and click >>.
4. In the Track Fields list, select the field 1. On the Edit Magnetic Formula dialog box,
you want to set, and click Edit. The Edit click Insert Text. The Edit Field Text dia-
Track Field Settings dialog box appears. log box appears.

5. Enter a value in the Minimum length


field. 2. Enter the field text you wish to insert in the
6. Enter a value in the Maximum length Track Fields list.
field. 3. Enter a value in the Minimum length
7. Enter a Pad character value. field.
8. Click Left padding or Right padding. 4. Enter a value in the Maximum length
field.
9. Enter a Delimiter character.
5. Enter a value in the Pad field.
10. Click OK to return to the Edit Magnetic
Formula dialog box. 6. Click Left padding or Right padding.
11. Click Up or Down to move the field up or 7. Enter a Delimiter character.
down on the Track Fields list. 8. Click OK to return to the Edit Magnetic
Formula dialog box.
9. Click Up or Down to move the field up or
down on the Track Fields list.
10. Click OK to return to the Badge Layout
dialog box.

24-10832-194 Rev. E
362 CHAPTER 4
Advanced Features

Create a Badge Layout To Configure Badge Setup

1. On the Badge Layout dialog box, select the


Layout tab.
Note: The following instructions apply only to
the EPI Builder software option.

1. From the P2000 Main menu, select Con-


fig>Integrated Badging>Setup. The
Badge Setup dialog box appears.

2. Click Add. The Layout window appears.


3. Select File>New from the Main menu bar. 2. From the Printer drop-down list, select the
If you use ID Server, the Properties of printer that prints the badges from the
Badge Background dialog box appears. Cardholder window.
Refer to your Video Imaging documenta- 3. Click Encoder to open the Card Printer
tion for further details. Click OK to con- Encoder Setup dialog, which specifies the
tinue. A blank badge design is displayed in type of encoding device you are using, as
the Layout window. well as for creating a custom encoding
If you use EPI Builder, a blank badge definition. Click OK.
design is displayed in the Layout window. 4. Click the Temp Layout File Path button
Refer to your Video Imaging documenta- [...] to select the directory where temporary
tion for further details. badge layout files (DGN) are stored. Once
you save the layout, the system saves the
DGN file information in the P2000 data-
Set Up Badge Devices
base.
The following steps describe basic settings to 5. Click Enforce Cropping Aspect Ratio to
configure your badging hardware when using enable the Constrain Aspect Ratio feature,
the EPI Builder software option. For detailed which changes the ratio between the hori-
instructions refer to your P2000 Integrated zontal to vertical dimensions when crop-
Video Imaging Installation and Operation ping images (a ratio of 1 to 1 maintains a
Manual. perfect square).
6. The settings in the Images to Capture box
are used to enable and configure the cap-
ture devices (camera and signature pad) for
use with the P2000 system.

24-10832-194 Rev. E
363

7. Click OK to accept the changes and close Capturing the Portrait and Signature
the Badge Setup dialog box. Images

Printing a Badge
Note: Capturing or importing a portrait image
Printing a badge requires the following steps: that is too large (at a high resolution) may result
in a degraded image when printed to a badge.
 Creating a cardholder record. (See Enter- Generally, the ideal size of a portrait image
ing Cardholder Information on page 244.) should be 290 pixels wide x 330 pixels tall.

 Assigning the badge to the cardholder.


(See Entering Badge Information on 1. From the P2000 Main menu, select
page 251.) Access>Cardholder. The Cardholder win-
dow opens.
 Capturing the Portrait and Signature Images
 Viewing and Printing the Badge 2. Select a cardholder from the list.
3. Click Take to begin the process of captur-
ing the portrait and signature images.

Available if using the ID Server


Take Button Video Imaging software option.

24-10832-194 Rev. E
364 CHAPTER 4
Advanced Features

To View a Badge Before Printing


Note: The following sequence of steps
assumes you are using all available capture 1. Click Preview at the bottom of the Card-
devices for Video Imaging (camera and signature
holder dialog box.
pad). Any devices not used, and therefore not
configured, are automatically skipped by the 2. Your design displays in its own window
Video Imaging application. with all the images you have captured.

4. The first capture window displayed is the To Print a Badge


portrait window. If you do not see an image
when the portrait capture window opens, 1. Before printing the badge, load the ribbon
check your camera cable connections and and cards according to the printer’s manual.
ensure the camera was properly config- 2. Select the cardholder record whose badge
ured. you wish to print.
For information on hardware installation, 3. Select the badge you wish to print.
refer to the P2000 Integrated Video Imag- 4. Click Print at the bottom of the Card-
ing Installation and Operation Manual that holder dialog box.
was shipped with your system. Elements
on each capture window display according
To Import an Image
to the type of devices you are using. Fol-
low the respective instructions in your 1. From the Cardholder window, select a
Video Imaging manual. cardholder from the list.
5. Capture the portrait image and make 2. Click the Image tab.
adjustments with the tools provided. 3. Under the Portrait box, click Import.
Experiment with the various image con-
trols. After you capture the portrait image,
it is automatically linked to the current
cardholder record.
6. After capturing the portrait image, the sig-
nature capture window automatically
opens (if previously configured). Use the
special plastic-tipped pen, shipped with the
pad, to sign your name.
7. Make the necessary adjustments and accept
the signature to assign it to the current
cardholder. 4. Navigate to the directory where your images
are stored. Select the image and click Open.
Viewing and Printing the Badge The image displays in the Image tab.

After capturing all the images, you can now Note: Once an image has been placed in the
view and print your badge design. Since the cardholder record, you cannot delete it; you must
captured images are usually large files, it takes import a new image to replace it. Also, if the
a few seconds to save them into the database. imported image displays cropped on the screen,
Always wait a few seconds after capturing you may need to contact Technical Support if you
images before printing a badge. wish to change the image aspect ratio.

24-10832-194 Rev. E
365

MIS Interface Once the previous components are in place,


you must set up the following elements at the
P2000 Server:
The MIS Interface provides a means for the
P2000 system to receive cardholder informa-  Enable the MIS account type for the opera-
tion and respond to queries from an external tor assigned to use the MIS Interface. To do
database source, such as a Human Resources this, simply click MIS in the Edit Operator
database. Therefore, the cardholder records dialog box; see page 24 for details. We
that already exist in the external database do strongly recommend using a separate Oper-
not need to be manually re-entered into the ator account for the MIS interface.
P2000 database.  Enable Password never expires in the Edit
Operator dialog box, since passwords can-
The MIS Interface allows an authorized not be changed for MIS users; see page 24.
ODBC-compliant application to manage (add,
 Make sure the P2000 operator is a member
modify, or delete) cardholders and their badges
of the PEGASYS Administrators group.
in the P2000 database and query cardholder
This is necessary to add or modify UDFs
information using wildcards. The P2000 MIS
for use in the MIS interface. This is done by
Interface communicates with the external
setting up the Windows account of those
application over an ODBC connection.
P2000 operators accordingly; see page 29.
 Make sure the P2000 MIS Interface Ser-
MIS Prerequisites vice is running using the Service Control
application; see page 432.
The following elements are external to the
P2000 software and they must be in place or  If you use the Export Image command,
the MIS Interface is unable to receive data or select in the MIS tab of Site Parameters, the
respond to queries: location for storing exported badge images.

 Network connection to link the external


Selecting a Location to Store Badge
database system with the P2000 Server.
Images
 MIS Interface (no separate installation
media is required). 1. From the System Configuration window,
 ODBC 2.6 or later (installed on the external select Site Parameters and click Edit.
database system). The Edit Site Parameters dialog box opens
at the General tab.
 Microsoft SQL Server ODBC driver
(already installed on the P2000 system). 2. Click the MIS tab.
 An ODBC-based program that communi-
cates between the external data source and
MIS Interface input and output tables.

Note: The external database system can be


any ODBC-capable application. This database
system is supplied by the user and is not included
in the P2000 software.

24-10832-194 Rev. E
366 CHAPTER 4
Advanced Features

3. Enter the name of the Image Folder or MIS and Partitioned Systems
click [...] to find the folder for storing the
badge images. On P2000 systems that use the Partitioning
feature, a set of input and output tables is cre-
4. Click OK to save the settings and return to
ated for each partition. The table names are
the System Configuration window.
prefixed by the partition name. These tables
are in addition to the normal input and output
Understanding the Input and tables, which are used for the Super User parti-
Output Tables tion.

The MIS Interface communicates with the


external application via an ODBC connection Using the MIS Interface
to receive data and return command and query Running the MIS Interface continuously or at
results through two database tables: an Input prescribed intervals is up to your management
table and an Output table. These tables are cre- procedures.
ated automatically. The Input table receives
data and commands from the external system. For example, you may want to run the MIS
The results of the commands issued to the Interface to populate the P2000 cardholder
P2000 system from the Input table are returned database for the first time, entering all card-
to the Output table. holder information for all personnel at one
time. After that is done, you may want to only
When the external program writes a record into run the MIS Interface once a day or once a
the Input table, the P2000 system reads that week.
record and performs the requested action (Add,
Delete, Update, Query, Query Multiple, Export MIS Interface Application:
Images, or Delete Badge). The results of that The MIS Interface is intended
operation are written to the Output table and only as a tool to allow an
the record in the Input table is deleted. The external database source to
APPLICATION NOTE export images and add,
external software should enter a unique
Request ID for each record. Results are update, delete, or query the
P2000 cardholder database. It is not intended to
reported by Record ID and can be reviewed via keep the P2000 database and the external data
the external program. in perfect “sync.” Records deleted from the
P2000 database are not automatically deleted
Results can be either successful or report an from the external database. You should establish
error on a specific Request ID. If multiple specific procedures to manage your use of the
records are sent to the Input table, they are pro- MIS Interface.
cessed in the same manner: as a group of
records is processed and clears the Input table,
For detailed information, refer to the MIS
the next group is read and processed. (Request
Interface Configuration documentation.
IDs remain intact, though records may not nec-
essarily be processed in any particular order.)
Records are removed from the Output table by
the external system. All successful operations
that modify a P2000 record generate a message
in the normal P2000 Audit log.

24-10832-194 Rev. E
367

pivCLASS Integration  Card format selection, using the Card Type


tab in the Terminal application to define
FASC-N (PIV, CAC, TWIC) or UUID
The P2000 pivCLASS integration enables the (PIV-I, CIV, FRAC) card formats.
support of Federal Identity, Credential, and
Access Management (FICAM) compliant
Configure the pivCLASS Integration
smart cards and readers. The basic concepts of
Component
this integration are based on:
 Cardholder and Badge enrollment – The 1. From the P2000 Main menu, select Con-
P2000 installation provides the fig>System. Enter your password if
FICAM-compliant HID Global pivCLASS prompted. The System Configuration win-
P2000 Plug-In that contains a template for dow opens.
inserting cardholder and badge information. 2. Select pivCLASS Integration and click
The enrollment is done from the HID piv- Add. The pivCLASS Integration dialog
CLASS Registration Engine through the box opens.
P2000 MIS Interface.
 FICAM-compliant re-validation of smart cards
– The pivCLASS integration validates card-
holder badges periodically and at the time of
access to confirm that the badge is not coun-
terfeited, cloned, copied, lost, or stolen.
 Processing of events generated at the piv-
CLASS system – The P2000 pivCLASS
Interface Service provides the communica- 3. If this is a partitioned system, select the
tion between the P2000 Server and the piv- Partition in which this pivCLASS Integra-
CLASS system with respect to events tion component is active.
generated at the pivCLASS system.
4. Select Public if you wish this pivCLASS
Integration component to be visible to all
Note: This section provides basic configuration partitions.
and use of the pivCLASS Integration. For settings
and procedures that are specific to configuring 5. Enter a descriptive Name to identify the
HID Global pivCLASS for use with the P2000 pivCLASS Integration component.
system, refer to the HID Global pivCLASS Inte-
gration Manual.
Note: The pivCLASS Integration component
must not have the same name as a terminal.
Specifications
The P2000 pivCLASS integration allows: 6. Enter the Query String value that is used
 128-bit badge numbers, using CK721-A with message filtering (see Define Query
panels version 3.2 and later. String Filters on page 225).
 Configuration of the pivCLASS integration 7. Click OK to save the pivCLASS Integra-
component (only one pivCLASS integra- tion component.
tion component can be configured per
P2000 site).

24-10832-194 Rev. E
368 CHAPTER 4
Advanced Features

Metasys System Integration To Define MSEA Graphics

1. From the P2000 Main menu, select Con-


This feature allows the P2000 system to be fig>System. Enter your password if
integrated with building management compo- prompted.
nents designed for Metasys system using Web 2. In the System Configuration window,
Services technology. The integration provides select MSEA Graphics and click Add.
the ability for objects in the P2000 security The MSEA Graphic dialog box opens.
system to be viewed from a single user inter-
face, along with all other building systems
controlled by the Metasys system.

Through this integration, the P2000 system can


expose HostEngine and Panel objects to the
Metasys system user interface, allowing clients
to browse through the P2000 object tree with
the purpose to read object attributes, change 3. Enter an alias Name for the Fully Qualified
those object attributes which are writable, and graphic reference name.
send commands to objects for readers and out- 4. Enter the Fully Qualified Name of the
put points. graphic item, as defined by Metasys sys-
tem. Fully Qualified Name entries are case
For detailed instructions refer to the Metasys
sensitive.
System Integration documentation.
5. Click OK to save the MSEA graphic name.

Defining MSEA Graphics


Registering the P2000 Server
The MSEA Graphic feature allows you to with a Site Director
assign a graphic reference to P2000 alarms.
When the P2000 alarm is received and dis- To expose P2000 objects to the Metasys sys-
played by the Metasys system, the operator can tem, you must register the P2000 Server with a
click the alarm to display the graphic item Metasys Site Director (ADS/ADX server) by
associated with the alarm and the item that adding a MSEA Registration definition in the
caused the alarm. P2000 Server. The P2000 system enables you
to create multiple MSEA Registration defini-
Before assigning the MSEA graphic to the tions, so you can register the P2000 Server
alarm (see page 86), you must configure the with multiple Site Directors.
Fully Qualified Reference Name (FQRN) of
the graphic item, as defined by the Metasys
system.
Note: This version of P2000 does not support
using NAE controllers as Site Directors.

24-10832-194 Rev. E
369

Site Directors Registered in P2000 In the previous illustration, the P2000 objects
ADS/ADX ADS/ADX
associated with Partition A are only visible
Tower Tower
from ADS/ADX 1; the P2000 objects associ-
ated with Partition B are only visible from
ADS/ADX 2; and the P2000 objects associ-
Wide Area
Network ated with Partition C are only visible from
IP Network
ADS/ADX 2.

Note: The partition rule previously described


Metasys
P2000 Server
Client has the following exceptions: 1) If you register the
Super User partition to a particular Site Director,
P2000 objects are visible from all partitions, even
from those that were not registered with the Site
In addition, you may register certain partitions Director. 2) Any P2000 device, such as a panel or
with a particular Site Director, so that only terminal, set to Public is visible from all parti-
those P2000 objects associated with the tions, regardless of the ones registered to a par-
selected partitions are visible from the Metasys ticular Site Director.
system (see the following illustration).

ADS/ADX 1 ADS/ADX 2 To Register a P2000 Server with one or


more Site Directors

1. From the P2000 Main menu, select Con-


fig>System. Enter your password if
prompted. The System Configuration win-
dow opens.
2. Select MSEA Registrations and click
Partition A Partition B Partition C
Add. The MSEA Registration dialog box
opens.

P2000 Server

24-10832-194 Rev. E
370 CHAPTER 4
Advanced Features

3. Enter the Site Director Name where the Defining SNMP Traps
Site Director is installed (the server name
of the ADS/ADX). The P2000 system can receive Simple Net-
work Management Protocol (SNMP) Traps
4. Enter the Site Director IP Address of the from the Metasys system (Version 6.5 and
server where the Site Director is installed later). Through the use of SNMP Traps, the
(the IP address of the ADS/ADX). P2000 system can receive Metasys alarms and
5. Enter the Device ID. Enter 377 or contact associate them with P2000 alarm options, such
Johnson Controls Technical Support for the as instruction texts and escalation rules.
Device ID used on the version of Metasys Alarms generated in the Metasys system can be
currently running. processed like regular P2000 alarms and can
6. Enter the ADS Repository Name (com- be used with all P2000 alarm-related applica-
puter name) of the Metasys ADS Reposi- tions and features.
tory.
The integration with the Metasys system
7. Enter the P2000 Server IP Address. enables P2000 operators to:
8. In the Available Partitions box, select the
 Browse and import selected Metasys
partition you wish to register with the
objects.
Metasys Site Director. To assign partitions,
simply select one or more partitions and  Receive Metasys alarm messages associated
click the left arrow button to move them to with the selected Metasys objects.
the Selected Partitions box.  Define P2000 alarm options for the
imported Metasys objects, translating Meta-
9. Click OK to save the MSEA Registration.
sys alarms into P2000 alarms, where they
10. Repeat the previous steps for each Site become subject to the standard P2000 rules
Director with which you wish to register and are processed like any other P2000
the P2000 Server. alarm.
11. To complete the P2000 MSEA Registra-
tion, you must stop and restart the P2000
XmlRpc Interface Service. For details, Note: Alarm actions for SNMP are not synchro-
see Starting and Stopping Service Control nized between the P2000 and the Metasys sys-
on page 432. tem. For example, when you acknowledge an
alarm in the P2000 system, the alarm is not auto-
The P2000 Server should now appear as a matically acknowledged in the Metasys system.
device in the Metasys system user interface
for the associated Site Director. Refer to
the Metasys System Integration manual for Limitations
information on starting and logging into
the Metasys system user interface.  The P2000 system does not monitor the sta-
tus of the integration device itself (ADX,
ADS, or NAE). Therefore, alarms and mes-
sages associated with the integration device
being up or down are not supported.
 The Metasys integration generates alarm
messages only. It does not generate transac-
tion history messages.

24-10832-194 Rev. E
371

Alarm Forwarding from the Metasys To Configure the SNMP Registration


System to the P2000 System
1. From the P2000 Main menu, select Con-
To forward Metasys alarms to the P2000 sys- fig>System. Enter your password if
tem, you must: prompted.

 Configure the P2000 server to import 2. In the System Configuration window,


SNMP objects, using the SNMP Registra- select SNMP Registration and click Add.
tion application. The SNMP Registration dialog box opens.
 Configure Metasys devices (ADX, ADS, or
NAE) to send alarm messages to the P2000
system (refer to the Metasys System Inte-
gration documentation).

Note: The Metasys system must be configured


to use SNMP Version 2c and “String-Based” for-
mat for the messages forwarded to the P2000
system.

Access to SNMP Registration and SNMP


3. Select the Partition in which the SNMP
Object Browser applications is subject to
Registration and its objects are active.
P2000 menu permissions.
4. Click Public to allow all partitions to view
this SNMP Registration.
SNMP Registration
5. Enter the SNMP Source Alias Name that
The SNMP Registration provides an auto-dis- describes the SNMP Registration.
covery mechanism for SNMP objects. 6. Enter the SNMP Source IP Address of
Through this mechanism, P2000 users can the SNMP Trap Source (the Metasys sys-
determine Metasys objects of interest and reg- tem object). To browse for objects, click
ister them as SNMP objects within the P2000 the browse [...] button. See SNMP Object
system. Browser on page 372 for details.
7. Enter the Query String value that is asso-
ciated with the SNMP Registration.
Note: The P2000 system only processes
alarms for those Metasys objects that are regis- 8. The SNMP Trap Message Format dis-
tered in the P2000 system. plays the format in which the SNMP Trap
messages are received by the P2000 sys-
tem. Currently, only the String-Based mes-
sage format is supported.

Note: The Metasys system must use the same


SNMP Trap Message Format as the P2000 sys-
tem.

24-10832-194 Rev. E
372 CHAPTER 4
Advanced Features

9. The SNMP Trap Source Type displays


the source that sends the SNMP Trap mes-
sage. Currently, only the MSEA source type
is supported.
10. The SNMP Version displays the version of
the SNMP. Currently, only version 2c is
supported.

Note: The Metasys system must use the same


SNMP version as the P2000 system.

11. Click OK to save your settings.

SNMP Object Browser

The SNMP Object Browser allows you to


Naming Convention
select objects to be imported from the Metasys
system into the P2000 system. Once imported, The P2000 system names each object with the
they become P2000 SNMP objects. same user defined name used by the Metasys
system. However, if the name does not meet
The P2000 system preserves the hierarchical
the P2000 naming rules, the following adjust-
order used by the objects in the Metasys sys-
ments are made by the import application:
tem. When you select a check box for a parent
object, all its children objects are also selected  Names longer than 32 characters are trun-
and imported. You can manually clear check cated.
boxes for any objects you do not want to  Names that are not unique (for example, due
import. to truncation) are appended with a number.
The SNMP Object Browser dialog box opens By default, the user defined name for the
when you click the browse [...] button in the Metasys object is also assigned to the query
SNMP Registration dialog box. After you string for that object.
make your selection, click OK to import the
Metasys objects into the P2000 system.

Note: The P2000 system identifies the Meta-


sys object during the import procedure by the
Note: Be aware that when you edit an existing Metasys Fully Qualified Reference Name
SNMP Registration, the Partition and Public set- (FQRN). If an FQRN in the Metasys system
tings are overwritten for all re-imported SNMP changes, the P2000 system can no longer recog-
objects. nize the object.

24-10832-194 Rev. E
373

SNMP Object Properties and Alarm 8. By default, the SNMP object name is
Options assigned to the Query String, but you can
enter any query string value for the object.
After you import the Metasys objects into the
P2000 system, you need to configure proper- 9. Click the Alarm Options tab. SNMP
ties and alarm options for each imported objects must belong to at least one alarm
SNMP object. category, and must provide their own set of
alarm options and parameters to define
how the alarms behave when activated,
To Edit SNMP Object Properties whether or not they need to be acknowl-
edged, at what time an alarm can be acti-
1. In the System Configuration window,
vated, and other alarm settings.
expand SNMP Registration to display all
the defined SNMP registrations in the sys-
tem.
2. Expand the SNMP registration that con-
tains the SNMP object you want to edit.
3. Select the SNMP object and click Edit.
The SNMPObjectEdit dialog box opens at
the General tab.

10. Click Add. The Add Alarm Categories


dialog box opens displaying all previously
created alarm categories (see Alarm Con-
figuration on page 270 for details).
11. Select one or more categories and click
Add. The list displays all the selected
alarm categories.
12. Once you have all the alarm categories you
4. Select the Partition in which this SNMP want to assign to the SNMP object, select
object is active. an alarm category from the list and click
5. Click Public to allow all partitions to view Edit to edit the alarm options. The Alarm
this SNMP object. Options dialog box opens displaying the
General tab. See the definitions provided
6. The Name field displays the name of the
in Alarm Options Tab on page 83.
SNMP object as defined in the Metasys
system, if the name matches the P2000
naming rules. Otherwise, the P2000 sys-
tem changes the name according to the Note: By default, all alarms received through
the use of SNMP Traps have priority 1.
naming rules. You can edit this name later.
7. The FQRN field displays the Fully Quali-
13. After you define the SNMP object proper-
fied Reference Name as defined in the
ties and alarm options, click OK to save.
Metasys system.

24-10832-194 Rev. E
374 CHAPTER 4
Advanced Features

Guard Tour Forward – The expected sequence the tour


takes place. Beginning with the starting
check-in station, the tour progresses sequen-
Guard Tour is a sequence of transactions that tially through all stations in a forward direc-
must be performed within a specified time tion. The starting tour station can be selected
frame, to ensure your facility is properly moni- automatically or manually.
tored by security personnel. The main purpose
of a tour is to ensure and record that an area Forward Tour Example
has been physically visited. It provides
real-time monitoring of guard activities, Tour Stations
reporting if a guard arrives early or late at des- 1 2 3 4 5
ignated tour stations. Guard Tour stations can
be either readers or input points. Starting Station

Tours may run to occur at regular time inter-


vals or they can be started manually. They can Tour Stations
also be run in forward or reverse order.
1 2 3 4 5
The P2000 system allows 256 Guard Tour
definitions. Each tour may contain up to Starting Station
16,000 stations, which consists of the individ-
ual readers or input points where transactions
Reverse – The expected sequence the tour
occur.
takes place. Beginning with the starting
If your facility uses the Guard Tour feature, the check-in station, the tour progresses sequen-
Guard Tour Service communication starts tially through all stations in reverse order. The
automatically when the host starts up. Note tour still begins at the starting station, regard-
that the Guard Tour Service can be started and less of Forward or Reverse direction. The start-
stopped using the P2000 Service Control fea- ing tour station can be selected automatically
ture, just like the other P2000 communication or manually.
services. See Starting and Stopping Service
Reverse Tour Example
Control on page 432.

Tour Stations
Basic Principles and Definitions
1 2 3 4 5
Guard Tour – A defined set of check-in stations
and minimum and maximum times for check- Starting Station
ing in at each station.
Tour Stations
Check-in Station – Also called simply station.
A reader or input point defined as part of a
Guard Tour.
1 2 3 4 5
Starting Station

24-10832-194 Rev. E
375

Tour Badge – A badge used during an actual Assign Tour Badges


guard tour to check-in at readers.
The main purpose of a tour is to ensure and
Tour Guard – The name of the person that was record that an area has been physically visited.
assigned a Tour Badge. While a guard may check-in at a reader
defined in a Guard Tour as a station, access
Tour Activation – Guard Tours may be acti-
through that reader-controlled door may or
vated automatically by time zones or start
may not be desired. Use the following instruc-
times, or manually by a system operator.
tions to assign badges to cardholders who can
Tour Abort – The P2000 system discontinues participate in guard tour operations.
tracking a Guard Tour if 1) the tour Abort
Time defined in the tour has exceeded, or 2) an To Assign a Tour Badge to a
operator manually aborts a tour. Cardholder

1. From the P2000 Main menu, select


Sequence of Steps Access>Cardholder. The Cardholder win-
dow opens.
The basic procedure for defining and imple-
menting Guard Tours are: 2. Create a new record or edit an existing
cardholder as desired. For details, see
 Define System Hardware for Guard Tour Entering Cardholder Information on
Operation page 244.
 Assign Tour Badges
 Configure Guard Tours
 Add Stations to the Guard Tour
 Control Guard Tours
 View and Print Transactions in Real Time
 Generate Guard Tour Reports

Steps to perform each procedure are presented


in the following sections.

Define System Hardware for


Guard Tour Operation
Before defining Guard Tours you must prop-
erly configure the system hardware and its
components; specifically, the readers and 3. In the Other box, click Guard to assign a
inputs points you intend to use in defining Tour Badge to the selected cardholder.
tours. If this has not been completed, some of This will be reflected in the Guard column
the functions described in this section will not of the Cardholder window.
be ready to operate. See Chapter 2: Configur- 4. Click Create Badge at the bottom of the
ing the System for details. window. The Badge dialog box opens.

24-10832-194 Rev. E
376 CHAPTER 4
Advanced Features

8. After adding the Tour Badge, click OK to


return to the Cardholder window.

Configure Guard Tours


The following steps are used to define Guard
Tours. Before proceeding, you must define
input points and terminals (readers) to be used
in tours. In addition, tour badges should have
been assigned to the appropriate cardholders.

Use the Guard Tour Configuration


Window

The Guard Tour Configuration window pro-


vides quick access to all guard tour component
configurations. When you select Options>
Guard Tour>Tour Configuration from the
P2000 Main menu bar, the Guard Tour Config-
uration window opens, displaying the actual
5. Enter the badge number and optional
Partition, Workstation, and User Name on the
description. For detailed information, see
right windowpane. All defined Guard Tours
Entering Badge Information on page 251.
display on the left side of the window. A plus
6. Click the Security Options tab. If this is (+) sign next to a defined Guard Tour indicates
an Enterprise system, see Define Global that Tour Stations exist beneath it. When you
Badge Access Rights on page 405 for addi- select a Guard Tour or Tour Station, the
tional information when assigning access detailed settings and values relating to that
privileges to Enterprise badges. selection are listed on the right windowpane.
7. Assign a Guard Tour Priority to the Tour
Badge.
Note: You cannot edit Tour Definitions or Sta-
Guard Tour Priority: When tions from the Guard Tour Configuration window
you define a Guard Tour, it is while a tour is running.
assigned a priority number
from 1 to 99. In the cardholder
APPLICATION NOTE
badge record, the Tour Priority To search for specific items, enter the name of
determines which tours the selected cardholder the item in the search field at the top right cor-
can perform. These can be all defined tours with ner of the window. You can enter complete or
a priority less than or equal to the badge’s partial words; no wildcards are needed, and
assigned Tour Priority. For example, a cardholder this field is not case sensitive.
badge with Tour Priority 45 is authorized to com-
plete tours with a priority of 1 through 45. If the Click Search. The window displays the match
cardholder badge is used to attempt to check-in
entered in the search field. Continue clicking
at stations of a tour defined as priority 46, their
badgings is ignored by the Guard Tour.
Search until you find the item you are looking
for.

24-10832-194 Rev. E
377

Define a Guard Tour


3. If this is a partitioned system, select the
1. From the P2000 Main menu, select Partition that has access to this Tour, and
Options>Guard Tour>Tour Configura- click Public if you wish to make this Tour
tion. The Guard Tour Configuration win- visible to all partitions.
dow opens. 4. Enter the Tour Name and optional
2. Select Guard Tours then click Add to Description.
access the Guard Tour Definition dialog 5. From the Priority drop-down list, select
box. the tour’s priority from 1 (lowest) to 99.

24-10832-194 Rev. E
378 CHAPTER 4
Advanced Features

Only tour badges with equal to or greater In the following example, a Time Zone was
than this priority can perform the tour. defined to be assigned to a tour, the start
6. Select one of the following Tour Types (active) time for the tour is 8:00 p.m. Monday
from the drop-down list: through Friday.

Manual – The tour must be initiated manu-


ally from the Guard Tour Control window,
see Control Guard Tours on page 383.
Auto Forward – The tour is initiated at a
time specified by the Timezone or Start
Time fields. The guard is expected to begin
at the first defined station and proceed
through all stations in a forward direction.
Auto Reverse – The tour is initiated at a Note: Stop (inactive) times are not necessary
time specified by the Timezone or Start in a Time Zone, unless a Guard Tour is to be run
Time fields. The guard is expected to begin more than once per day. In this case, you would
at the first defined station, and proceed enter a stop time to disable the time zone so it
through all stations in a reverse direction. can become active again that day, at another
time.
Random Watch – There is no sequencing in
this mode. All defined stations are moni- If you define several time blocks, ensure that
tored at all times, until the time entered in enough time is allotted between the active and
the Run Time expires. This is to assure that inactive times to realistically complete the
no station goes unchecked for greater than tour.
a specific stated time.
Start Time – When you click the Start Time
check box, the Timezone field is automatically
Timezones, Start and Abort Times
disabled. Enter the time (hours and minutes
If you select Manual as the tour type, the Time- only) the tour is scheduled to start.
zone and Start Time fields are disabled; these
Abort Time – Enter the time in minutes (from 2
are only enabled when you select Auto For-
to 1440). This is the maximum time allowed to
ward, Auto Reverse, or Random Watch.
expire, before a tour is automatically aborted.
Timezones – The purpose of selecting a Time- This field changes to Run Time if Random
zone is to provide an automatic starting time Watch is selected as the Tour Type.
for the Guard Tour. You need to define Time
Zones before defining Guard Tours. See Time
Zones on page 49 for detailed instructions. Note: A tour is automatically aborted only if
there are no tour alarms or the Manual Reset
option is not enabled.

Once these times are assigned, you can assign


the tour to a specific guard, or allow any guard
with the appropriate priority to perform the
tour.

24-10832-194 Rev. E
379

Assign the Tour to a Specific Guard Reset – Click the Reset button to restore the
pre-stored preference values.
1. In the Guard Tour Definition dialog box,
click the Tour Guard 1 drop-down list and Any Guard – Click to allow any guard with the
select a name. Only cardholders with the proper priority to perform the tour. When you
Guard option enabled in the Cardholder click this box, the Tour Guard 1 to 3 and corre-
Edit dialog box display in the list. sponding Badge ID fields become disabled.
2. Once a Tour Guard is selected, the corre- Manual Reset – If selected, the user has to click
sponding Badge ID field is enabled. Select the Complete button in the Guard Tour Control
a badge from the drop-down list. Only dialog box to remove the tour from the tour list.
badge numbers with priority greater than This is to indicate that the tour has completed.
or equal to the Tour Priority display in the
list. Auto Duress Alarm – If selected, an auto duress
3. If you wish to select additional guards, alarm is generated when a guard registers three
select Tour Guard 2 and Tour Guard 3, consecutive times at a station within one min-
and their corresponding Badge ID num- ute, for example by swiping the badge three
bers. times, or by activating a tour input three times.
If Manual Reset is not selected and Auto Duress
4. To allow any guard with the proper priority Alarm is enabled, the tour status changes to Idle
to perform the tour, click the Any Guard after one minute when it completes.
box. See Additional Guard Tour Options
for more information. Alarm Late – If selected, an alarm is generated
when a guard checks in later than expected at a
station. If the check box is not selected and a
Note: One guard can run only one tour at the guard is late, this is simply considered as a tour
same time. In addition, one tour can be run only
operation event.
by one guard, even if two guards were to walk the
same tour; it is the guard that badged at the initial
station who must complete the tour using the
same badge at the remaining stations.
Note: Operation events include, for example,
Tour Alarmed, Tour Started, Station Checked in
On Time, Station Checked in Early, Station
Checked in Late, Station Checked in Out of
Additional Guard Tour Options Order, Tour Stopped, Tour Restarted, Tour
Aborted, Tour Completed, Tour Terminated, Sta-
The remaining options in the Guard Tour Defi- tion Late Timer Reached.
nition dialog box are described in the follow-
ing paragraphs.
Alarm Skip – If selected, an alarm is generated
Alarm Priority – Select from the drop-down list when a guard skips a tour station. If the check
an alarm priority from 0 to 255, in which the box is not selected and a guard skips a station,
Guard Tour alarm message is placed in the this is simply considered as a tour operation
queue. event.

Set Default – Click the Set Default button to Grant Only – If selected, the system registers
store the default preference values, which only access grant transaction messages when
include Tour Priority, Tour Type, Alarm Prior- the guard swipes the badge at the station. If not
ity, and all check boxes. selected, either access grant or deny messages
are registered.

24-10832-194 Rev. E
380 CHAPTER 4
Advanced Features

Log Tour Operation – If selected, all tour opera- 2. Enable any of the following Popup when
tion events are logged to the system as events, set or Popup when secure check boxes,
and therefore are available for history, event and select the Instruction Text Name
processing, and so forth. from the associated drop-down lists that
displays in the Alarm Response window
Log Operator Action – If selected, all operator whenever any of the following alarm con-
actions, such as starting or aborting a tour are ditions occur:
logged as events.
Late Alarm – An alarm message is gener-
ated when a guard checks in later than
Tour Alarms Setting expected at a station. This option is avail-
able if you select Alarm Late in the Guard
Tour Alarms Settings enable the Alarm Moni-
Tour Definition dialog box.
tor window to automatically pop up in front of
all other windows on the screen whenever a Out Of Order Alarm – An alarm message is
Guard Tour alarm condition occurs. Be aware generated if a guard skips a tour station.
that Guard Tour alarms in secure state must This option is available if you select Alarm
first be acknowledged or responded, before Skip in the Guard Tour Definition dialog
they can be completed. box.
Duress Alarm – An alarm message is gener-
You can also specify instruction text that dis- ated if a guard registers three consecutive
plays when an operator responds to a Guard times at a station within one minute or by
Tour alarm going into a Set or Secure state. activating a tour input three times. This
Enabling the Popup feature and selecting option is available if you select Auto
Instruction Text are independent tasks, and can Duress Alarm in the Guard Tour Definition
be used in any combination. dialog box.
Before you assign instruction text to the vari- 3. Click OK to return to the Guard Tour Defi-
ous pop ups, you must first create instruction nition dialog box.
text. See To Create Instruction Text on
page 90.
Add Stations to the Guard Tour
1. In the Guard Tour Definition dialog box,
click Tour Alarms Setting. The Guard Tour Station information, such as Station
Tour Alarm Settings dialog box opens. Name, Sequence Number, Type, Device, and
Description displays in the list box at the bot-
tom of the Guard Tour Definition dialog box,
for all the stations assigned to that Guard Tour.

Guard Tour Stations can be either readers or


input points.

To Add Stations to the Guard Tour

1. Click Add at the bottom of the Guard Tour


Definition dialog box. The Tour Station
Definition dialog box opens showing the
Guard Tour Definition name on the title bar.

24-10832-194 Rev. E
381

2. Enter the required information. See Tour Station Type – Select either Input or Reader
Station Definition Fields for detailed infor- as the station type.
mation.
Server Type – This field is not currently used in
this version of the P2000 software.
Tour Station Definition Fields
Device Name – Select a previously defined
input point or reader (terminal) that has not
Tour Stations Information Box been assigned to another station. The list only
Station Name – Enter a descriptive name for displays the devices associated with the Station
the station. Type. If the input point selected is already
assigned to a cabinet door, the Report Alarm
Sequence Number – This field displays the option in the Cabinet Configuration dialog box
number that is automatically assigned when should be selected to be able to report guard
you define a new station. The Tour Stations tour messages.
Information list at the bottom of the Guard
Tour Definition dialog box shows the stations
assigned to this tour in sequence. You can IMPORTANT: Do not use Assa Abloy Wi-Fi
readers to monitor Guard Tour activities, since
change the sequence of the stations by clicking
those readers do not report transactions in real
the Up or Down arrows in the Tour Stations time and the system cannot verify if a guard
Information list box, to change the sequence of checks in at a station on time.
the selected station.

Description – Enter a description of this sta- Server ID – This field is not currently used in
tion, if desired. this version of the P2000 software.

24-10832-194 Rev. E
382 CHAPTER 4
Advanced Features

Traversal Time Box Traverse Times are started at station check-in.


For example, suppose the guard reaches station
Traverse Time (Forward or Reverse) sets the one at the two-minute mark (see illustration).
amount of time in minutes a guard has to reach The check-in would be reported as Early and
the defined station. The maximum Traversal the Traverse Timer for the next station would
Time must be less than the maximum value start. If the minimum and maximum values
entered in the Run Time field. Traverse Times were set at 2 for station two, the on time
work in relation to a tour’s Start and Abort/ check-in for station 2 would be between the 4
Run Times. One of six possible values is and 6-minute marks. These same timing princi-
assigned when a guard reaches a station: ples apply to all stations defined in the tour as
 Early well as Guard Tours designed to run in reverse
order.
 Running
 Late
Note: If the Tour Type selected is Random
 Out of Order Watch, the Forward Traverse Time defines how
 Completed often the guard checks a defined station. Reverse
Traverse Time is not available if Random Watch
 Idle is selected.

Assume the tour has: Assume Station 1 is defined as: 0 - 8 are minute increments
Start Time: 5:30:35 PM Forward Traverse Time Min: 2
Abort Time: 5 minutes Forward Traverse Time Max: 4

If the guard has not


reached the first station,
tour is aborted (Abort Time)
If the expected maximum Time frame in which Tour is reported as
forward traverse time is guard can still check Aborted
exceeded, the Guard Tour in at first station, but
is reported as Late will be shown as Late
(difference between
Max Traverse Time
and Abort Time)
Tour Starts
at 5:30:35 PM

0 1 2 3 4 5 6 7 8

Time allowed for the Time frame in which Time allowed for the Time frame in which
guard to reach the guard is expected to guard to reach the guard is expected to
first station (Fwd reach first station second station (Fwd reach second station
Traverse Time Min) (difference between Traverse Time Min) (difference between
Min and Max Traverse Min and Max Traverse
Guard will be shown Times) Guard will be shown Times)
Early at first Early at second
station check-in Guard will be shown station check-in Guard will be shown
On Time at first On Time at second
station check-in station check-in

24-10832-194 Rev. E
383

Shunt Device Box Value – This field is not currently used in this
version of the P2000 software.
During the course of the Guard Tour, you may
need to suppress alarms (shunt input points) as If you wish to activate more than one device,
part of the tour. you can define them in the Device 2 box, then
click the Activated Devices 3 & 4 tab and fol-
This operation is similar to disabling an input low the same steps.
point or input group as part of an Event, except
that an input point or input group remain dis-
abled until the next station in the tour is Note: The system does not shunt input points
reached, a tour alarm is set, or the tour is or activate output points assigned to the last sta-
aborted. tion defined in the tour.

Type – Select either Input Point or Input


Group as the Shunt Device Type. Saving the Station as Part of the Tour

Name – Select a previously defined input point After defining a station, click OK to return to
or input group. The list only displays the the Guard Tour Definition dialog box, the sta-
devices associated with the Shunt Device tion displays in the Tour Stations Information
Type. box.

Attribute – This field is not currently used in Continue to add stations as necessary. When
this version of the P2000 software. finished, click OK to return to the Guard Tour
Configuration window. The Guard Tour is
written to the database.
Activated Devices Box

During the course of the Guard Tour, you may Control Guard Tours
need to activate devices (set or reset output
points) as part of the tour. Use the Guard Tour Control window to start
and stop tours and monitor their progress.
This operation is similar to setting or resetting
an output point or output group in the main To Control Guard Tours
Control menu, except that an output point or
output group remain set until the next station 1. From the P2000 Main menu, select
in the tour is reached, a tour alarm is set, or the Options>Guard Tour>Tour Control.
tour is aborted. Enter your password if prompted. The
Guard Tour Control dialog box opens.
Type – Select either Output Point or Output
2. Select the Partition that contains the
Group as the Activated Device Type.
Guard Tours you wish to control.
Name – Select a previously defined output 3. Select Active Tours if you wish to display
point or output group. The list only displays all tours currently in the status database,
the devices associated with the Activated for the partition selected, and that are in
Device Type. non-idle state.
Attribute – This field is not currently used in 4. Select All Tours if you wish to display all
this version of the P2000 software. tours currently in the database, for the par-
tition selected, regardless of their state.

24-10832-194 Rev. E
384 CHAPTER 4
Advanced Features

5. Click Set Alarm Color if you wish to dis- Viewing the Tour Control List Box
play all Alarmed records in a different
The following information is shown for each
color. A Color dialog box opens where you
tour in the list.
select the desired color, then click OK to
return to the Guard Tour Control dialog Name – The tour name, as configured in the
box. Guard Tour Definition dialog box.
6. If you wish to display a specific Guard
Start Time – This column displays either a
Tour, use the Filter box to enter a filter cri-
defined start time, a Timezone name, or if it
teria, such as w*, then click the Show but-
was defined as a Manual tour type.
ton. The list displays all Guard Tours that
start with the letter W. Guard(Badge) – If a tour is assigned to a spe-
cific guard, the name displays here with the
corresponding Badge ID.
Note: You can also select a previously typed
filter from the drop-down list. This list is cleared Last Station – Displays the name of the last sta-
when your close the Guard Tour Control dialog tion that the guard registered at.
box.
Station Time – Displays the time that the guard
registered at the last station.
7. To display all Guard Tours again (Active or
All), select <none> from the Filter Remain Time – Displays the time remaining for
drop-down list. the guard to reach the next station, without
8. If you wish to sort the list of tours shown being late. The time displayed decreases by
on the list box, click the specific column 30-second increments if more than one minute
header. The current sort order can be set as remains. If less than one minute remains, the
default by clicking Set Current Sort time displayed decreases every one second.
Order Default. The default sort before Status – Displays one of the following:
clicking this button is by Start Time.
 Alarm – An alarm has occurred within the
guard tour, such as guard late or duress.

24-10832-194 Rev. E
385

 Started – The tour has been started, either To Start a Manual Tour
manually or automatically, but the first sta-
tion has not been reached. 1. Select a tour from the Guard Tour Control
list that has a Manual tour type in the Start
 Running – Status given to an active tour
Time column.
after the first station has been reached.
2. Click Start at the bottom of the Guard
 Early – When a tour station check-in is
Tour Control dialog box. The Start Tour
sooner than expected.
dialog box opens.
 Late – When a tour station check-in is later
than expected.
 Out of Order – When a tour station check-in
occurs out of sequence.
 Stopped – The tour has been manually
stopped.
 Aborted – The tour has been cancelled
either manually or because of an expired
Abort Time (stations not reached in time). 3. Select the Guard assigned to run the
selected tour. If only one guard was
 Completed – The tour has completed suc-
defined to run this tour, the name of the
cessfully without any alarms.
guard automatically displays on this field.
 Idle – The tour is not running.
4. Select the guard’s Badge number. If only
Partition – Displays the partition as configured one badge was assigned to this guard, that
in the Guard Tour Definition dialog box. number automatically displays on this
field.
Public – Displays whether or not this guard
tour is made public, as configured in the Guard
Tour Definition dialog box.
Note: If Any Guard was selected in the Guard
Description – Displays the description of the Tour Definition dialog box, the previous fields are
disabled.
tour, as configured in the Guard Tour Defini-
tion dialog box.
5. From the Starting Station drop-down list,
select any station in the tour to be station 1.
Note: The Message Routing Status indicator at 6. Select whether this tour starts in Forward
the bottom of the window displays in green to or Reverse order.
indicate that all communications between the
workstation and the Server are up. If communica-
7. Click OK to start the tour.
tions go down, the Message Routing Status indi-
cator turns red.
Guard Tour Handling

The Guard Tour Service Status indicator displays The Guard Tour Service communication
in green to indicate that the Guard Tour Service is
checks the Start Time or Timezone definitions
up and running. If Guard Tour Service goes
down, the indicator turns red. every one minute to determine whether to start
automatic tours.

24-10832-194 Rev. E
386 CHAPTER 4
Advanced Features

As an operator or guard, you may be required Refreshing the Tour Control window – The
to handle tour conditions. The tour control typ- Guard Tour Control list is updated every one
ically includes steps similar to the following: minute, or when Refresh is selected.

Stopping a Tour – You can temporarily stop a


tour by clicking Stop. The status of the tour Guard Tour Details
changes to Stopped, and the Stop button
You can monitor the activity occurring within
changes to Restart. At this point the tour can
Guard Tours. The Detail button on the Guard
be either restarted or aborted.
Tour Control dialog box displays current
Restarting a Tour – If the tour has been tempo- Guard Tour status information for the selected
rarily stopped or alarmed, you can click Restart tour.
to update the status of the tour to its previous
status, before it was stopped or alarmed. To Display Guard Tour Details
Aborting a Tour – If you wish to manually end a 1. Select a tour in the list.
tour, click Abort. The status changes to
Aborted, or to Idle if Manual Reset was not 2. Click Detail. The guard tour Details dialog
enabled. box opens. The top portion of the window
shows the tour details.
Completing the Tour – When all actions needed The scroll list includes a chronological list
to complete a tour have been completed, and of all activities for the specific tour, such as
Manual Reset was selected in the Guard Tour events, audits, and operator notes. If Set
Definition dialog box, the status of the tour Alarm Color was selected in the Guard
displays as Completed, click Complete to ter- Tour Control dialog box, the alarms dis-
minate the tour. The status changes to Idle. If play in the color selected.
Manual Reset was not selected and Auto
Duress Alarm is enabled, the status of the tour 3. Click Audit to display all audit transac-
displays as Completed and after one minute tions.
changes to Idle.

24-10832-194 Rev. E
387

4. Click Event to display all event transac- To Add Tour Notes


tions.
1. From the Guard Tour Control dialog box,
5. Click Note to display all Notes related to select a non-Idle tour from the list.
this tour. See the following section Guard
Tour Notes for more information. 2. Click Note. The Note dialog box opens.

6. In the Show Last box, enter the number of


days of tour activity you wish to display.
7. Click Refresh to update the list.
8. Click Close to return to the Guard Tour
Control dialog box.

Guard Tour Notes

The tour Note dialog box provides a place to 3. Enter the note you want to display in the
enter instructions for a particular tour. The Detail dialog box.
amount of time after which all notes are
4. Click Add. The list box displays the Date
purged is set up in Site Parameters.
and Time the note was added, with the
1. From the System Configuration window User Name, and the actual note text.
select Site Parameters and click Edit. 5. Click Done to return to the Guard Tour
The Edit Site Parameters dialog box opens Control dialog box.
at the General tab.
2. Click the Retention Policy tab and enter
the amount of time and select Minutes,
View and Print Transactions in
Hours, or Days from the Tour Note Real Time
drop-down list, after which all notes are Tour transactions are sent through real time
deleted from the system. messages to the Real Time List. You can mon-
itor real time messages, such as tour alarm
messages and see the status of a tour. Once the
status changes or the tour proceeds, corre-
sponding real time messages are generated.
Select the Guard Tour box in the Real Time
List window, to display all guard tour transac-
tions as they occur. See Using the Real Time
List on page 342 for more information.

3. Click OK to save the settings and return to


the System Configuration window.

24-10832-194 Rev. E
388 CHAPTER 4
Advanced Features

If you wish to print tour transactions as they When you select Tour Transaction History
occur, you can either print them from the Real from the Run Report window, the Tour Trans-
Time List window, or select Guard Tour in the action History dialog box opens. Select either
Printing tab of Site Parameters. See Printing your local Site or enter the name of the remote
Tab on page 34 for more information. site that you want to report on. The default (*)
reports all tours in the system, or you can
select a specific Partition, Tour Name, and
Generate Guard Tour Reports Transaction Type from the drop-down lists.
Guard Tour reports are provided as a subset of After you select a Begin and End Date and
the standard P2000 report set. For detailed Time for the transactions you wish to see, the
information on running reports, see Chapter 6: Tour Transaction History report displays in the
System Reports. Crystal preview window. The top of the report
shows the Tour Name, Transaction Type and
Three types of Guard Tour reports are pro- Site, and the date and time settings selected.
vided: Tour Configuration Report, Tour Trans- Each transaction is listed as a separate date and
action History Report, and Tour Notes Report. time stamped record.
The following sections describe each of these
reports.
Tour Notes Report

Tour Configuration Report This report lists all the tour notes assigned to a
specific tour name, as set up in the Guard Tour
The Tour Configuration report lists by tour Control window, or can be filtered to list by
name, all tour definition configuration, and specific Tour Name, specific Dates and Times,
associated stations, as set up in the Guard Tour and any combination of these. When you select
Definition window. When you select Tour Tour Notes from the Run Report window, the
Configuration from the Run Report window, Tour Notes dialog box opens. The default (*)
the Tour Configuration dialog box opens. You reports all tours in the system, or you can
can select a Tour Name from the drop-down select a specific Tour Name from the
list to limit the report to a specific tour or leave drop-down list. After you select a Begin and
the default (*) to report on all tours configured End Date and Time for the notes you wish to
in the system. see, the Tour Notes report displays in the Crys-
tal preview window. The top of the report
shows the date and time settings for the report
Tour Transaction History Report
and the Tour Name selected. Each note is listed
This report lists every guard tour transaction in as a separate date and time stamped record.
the system, or can be filtered to list by specific
Partition, Tour Name, Transaction Type, spe-
cific Dates and Times, and any combination of
these. In addition, you can select to run the
report on transactions at your local site or you
can enter the name of the remote site that you
want to report on.

24-10832-194 Rev. E
389

CCTV The CCTV control can send system actions to


the CCTV Switch; system actions can also be
run by event actions. The commands can:
The P2000 system communicates with
approved Closed Circuit Television (CCTV)  Place a Camera on a Monitor
systems via a Host computer connected  Run a Sequence on a Monitor
through an RS-232 serial communications  Pan, tilt, zoom; focus and control iris func-
line. tions; and switch on wipers, washers, and
lights for a given Camera
The following diagram illustrates the possible
configurations of the CCTV system equip-  Run Tours and Macros
ment. The software provided by the CCTV  Run Patterns and Presets, and use Auxilia-
application has two main components; the ries
CCTV Server and the CCTV Client. The
CCTV Server consists of the OPC Server, Settings and options vary, depending on the
drivers, and port controllers, and the CCTV type of CCTV Switch selected. Installation of
Client consists of the CCTV Configuration the CCTV equipment is done in accordance
and CCTV Control software. For instructions with the manufacturers’ instructions.
about installing CCTV, refer to the P2000 Soft- For detailed information, including a complete
ware Installation Manual. list of the protocols supported, refer to the
If your facility uses the CCTV application, the CCTV Integration Manual.
CCTV communication service (CCTV Server)
starts automatically when you start the com-
puter.

24-10832-194 Rev. E
390 CHAPTER 4
Advanced Features

DVR/VMS Redundancy

The P2000 software provides seamless integra- Johnson Controls provides a Fault Tolerance
tion with approved Digital Video Recorders (FT) or High Availability (HA) solution (with
(DVRs) or Video Management Systems Stratus® everRun 7.x Enterprise™) to their
(VMS). The integration allows authorized P2000 Security Management System.
users to manage camera functions from a sin-
gle P2000 workstation, and to tie an event gen- Stratus Technologies everRun Enterprise soft-
erated on the P2000 system to a live ware runs on CentOS® integrated with their
audio-visual (AV) recording. Depending on the software to create, manage, and deploy a vir-
digital video equipment used at the site, the tual Windows Server® that provides a fault
P2000 software also enables users to search, tolerant solution for the P2000 Security Man-
retrieve, and download real-time or archived agement System.
AV recordings from any transaction or surveil- The Stratus everRun Enterprise 7.x software is
lance camera, from any place and at any time. layered on to CentOS Linux® operating sys-
You can recall audio-visual files by a variety of tem. It creates the Stratus fault tolerant virtual
query options, including date and time, alarm server, ensures FT (Fault Tolerant) everRun,
events, camera ID, or DVR ID. Live video and and maintains full data integrity between two
audio playback options are available from the redundant physical servers, eliminating trans-
Alarm Monitor, Real Time List, and Real Time action loss, data loss, and application down-
Map. time.

The digital video system communicates with The everRun software transparently protects
the P2000 Server through a TCP/IP connection. an application by creating a redundant environ-
The P2000 CCTV Server, a software compo- ment for a virtual machine running across two
nent installed automatically with the Digital physical servers.
Video option, provides communication. The following illustration shows the two parts
Additionally, you can configure the digital of a protected virtual machine that are located
video integration feature with a CCTV Switch on separate physical servers, but everRun
for added control of the CCTV cameras and treats them as a single Windows environment.
monitors. For detailed configuration instruc-
tions, refer to the DVR/VMS Integration docu-
mentation.

24-10832-194 Rev. E
391

The everRun management software easily cre- The following illustration shows a basic ever-
ates a virtual machine into an everRun-pro- Run configuration that contains two Physical
tected virtual machine. By creating an identi- Machines in the same server rack and eAC
cal instance of the P2000 virtual machine on a (everRun Activity Console).
second host, it provides FT-class protection of
the virtual machine. The system administrator
manages this single entity from a separate,
browser-based management console, as indi-
cated in the previous illustration.

Neither the application nor the user is exposed


to the redundant computing resources on the
two hosts. There is only one host name, one IP
address, and one MAC address for the applica-
tion. As the system administrator, you load and
configure your applications on the protected
virtual machine, just as if you were loading
them onto a physical server.

If a fault or failure occurs in a disk or network


device, everRun automatically redirects I/O to
the paired host to permit continuous operation. Servers can be separated geographically, but
While there is a loss of redundancy until the this option requires a everRun splitsite license,
failure is repaired, there is no interruption to additional hardware, and network components.
client connectivity and no loss of data. The
application continues to execute as if nothing
had happened. The redundancy, fault detec- IMPORTANT: The installation and configura-
tion, isolation, and management are com- tion of a P2000 redundancy system with Stratus
pletely transparent to the Windows environ- everRun must be performed by qualified profes-
ment running the P2000 application. sionals who possess a reasonable level of expe-
rience with advanced configurations. You must
Repair is equally transparent and automatic. contact Technical Support to complete appropri-
When a failed component or everRun host is ate training before installing and configuring this
software.
repaired, everRun automatically incorporates
the repaired components into the protected
environment and restores redundancy without Contact your sales representative for more
interrupting the application. detailed information.

Configuring everRun Enterprise


Hosts
A basic configuration requires two servers that
are similarly configured and outfitted with
everRun-compatible processors.

24-10832-194 Rev. E
392 CHAPTER 4
Advanced Features

FDA Part 11 Authorized Users – The P2000 software limits


system access only to authorized individuals.
Authorized users are identified by their unique
The P2000 software provides change tracking combination of user name and password. The
parameters designed to assist facilities that passwords for these individuals can be config-
may be subject to Food and Drug Administra- ured to change periodically and have a mini-
tion (FDA) Title 21, Code of Federal Regula- mum password length. Additionally, the soft-
tion (CFR) Part 11 for electronic records and ware disables user access on multiple invalid
electronic signatures. The Title 21 CRF Part 11 log on attempts and provides for automatic log
provides the criteria under which the FDA off because of user inactivity. See Assigning
accepts electronic records and electronic signa- Operators on page 23 for detail instructions on
tures as equivalent to paper-based records and adding operators to the system. In addition, the
traditional handwritten signatures, and regu- Password Policy Tab on page 40 presents sev-
lates how these electronic records should be eral parameters to define passwords that com-
created, modified, maintained, archived, and ply with FDA regulations.
transmitted.
Record Validation – The P2000 software pro-
vides a tampering tool to detect unauthorized
record modifications. See System Validation
Note: An electronic record is a combination of
on page 457 for instructions on how the system
text, graphics, or data that is created, modified,
maintained, archived, retrieved, or distributed by validates digital signatures, points out discrep-
a computer system. An electronic signature is a ancies, and corrects discrepancies to ensure
computer data compilation of any symbol or that records now have a valid digital signature.
series of symbols (ID and password combina-
tion), and is the electronic equivalent of a hand- Record Persistence – All original records are
written pen on paper signature. saved in the P2000 database, even if records
are modified. The P2000 software generates
The P2000 system allows customers to define detailed, time-stamped audit trails reports,
parameters to assure Part 11 compliance. The assuring that all record changes maintain the
following are general Part 11 requirements original recorded information and thereby pro-
applicable to the P2000 system. tecting all previous data. See P2000 Standard
Report Definitions on page 474 for a complete
Audit Trail – The P2000 system provides valu- list of P2000 Standard Reports.
able time-stamped reports to monitor
day-to-day operator activity, such as how the Record Retention – Through software configu-
hardware is controlled, when alarms are ration, a system administrator can define
acknowledged, when cardholder records are parameters to back up and retrieve records to
changed, and more. A complete list of P2000 ensure the availability of all records for a spec-
Standard Reports is presented in P2000 Stan- ified period of time. See Retention Policy Tab
dard Report Definitions on page 474, along on page 39 to enforce FDA Part 11 record
with a brief description of each and how they retention policy. Also, FDA Part 11 Backups
can be used. on page 454 provide instructions to perform
periodic backups to comply with FDA Part 11
record retention requirements.

24-10832-194 Rev. E
393

Intercom  The MPC data output port in the AlphaCom


intercom system is enabled.
 The Intercom Exchange box is connected to
The P2000 Intercom interface allows the the P2000 Server. Use an RS232 DB9 cable
P2000 server to retrieve messages coming to connect the specific COM port on the
from approved intercom equipment and use Exchange box to an available COM port on
them for event processing and distribution to the P2000 Server.
P2000 workstations for the processing of inter-
com history messages and alarms. The P2000
Intercom Interface Service that resides on the
Note: The COM port to be used at the
P2000 server provides the communication
Exchange box depends on the AlphaCom model
between the P2000 system and the intercom used at your facility.
equipment. This interface enables audio com-
munication links between any two or more
defined intercom stations.  At least one Master Station is configured in
the intercom system.
The P2000 system provides applications to  At least one Sub-Station is configured to
control and display all intercom call requests link to the Master Station. The Sub-Station
coming from defined intercom stations. The should be configured to send call requests
operator can select a call request from the list to its Master Station.
and connect to any single intercom station, or
to a group of stations. For Commend systems ensure that:

The P2000 system supports two intercom inte-  The Intercom Server is defined using the
grations: Zenitel AlphaCom M (AMC 07.60) Commend system software, including con-
and Commend™ (GE300, GE800, and any nection settings and other system parame-
Commend intercom model compatible with the ters. Refer to the manufacturer’s
ICX Protocol Version 1.1/0910) systems. Com- documentation for assistance.
plete intercom hardware installation and opera-  If your intercom system supports output
tion instructions are provided with the intercom setting, use the Commend system software
system that was shipped with your option. to configure these outputs, and then add
them to the intercom exchange and station
definition.
Hardware Requirements
 The Commend Intercom Server is licensed
Before configuring the P2000 software com- and configured to use a TCP/IP channel.
ponents to control the intercom equipment,  You have configured at least two stations
you must ensure that at least basic intercom that can communicate with each other.
hardware components are up and running.
Installation of the intercom equipment must be
made in accordance with the manufacturer’s Intercom System Hardware Verification
instructions.
1. From the Master Station, dial a Sub-Sta-
For Zenitel AlphaCom systems ensure that: tion.
2. Verify that the call is received and that the
 The AlphaCom intercom system is opera- Sub-Station name displays on the Master
tional. Refer to the manufacturer’s docu- Station control screen.
mentation for assistance.

24-10832-194 Rev. E
394 CHAPTER 4
Advanced Features

3. Repeat steps 1 and 2 for each Sub-Station. Intercom Exchange


4. Send a call request from the configured Each P2000 workstation acting as an intercom
Sub-Station. Master Station must be associated with a spe-
5. Verify that the Master Station rings from cific Intercom Exchange. You can link each
the call request and that the Sub-Station intercom exchange to extend the number of
name displays on the Master Station con- intercom stations controlled by a single master
trol screen. intercom station.
6. Receive the call request from the Sub-Sta-
tion. To Define a Zenitel Intercom Exchange
7. Verify communication from the Sub-Sta-
1. From the P2000 Main menu, select Con-
tion and that its name displays on the Mas-
fig>System. Enter your password if
ter Station control screen.
prompted. The System Configuration win-
8. Repeat steps 4-7 for each Sub-Station con- dow opens.
figured to send call requests to the Master
2. Select Intercom Interface and click Add.
Station.
The Intercom Exchange dialog box opens.

Intercom Configuration
The following sections describe the procedures
to define the parameters used by the P2000
system to communicate with the intercom sys-
tem:

 Intercom Exchange
 Intercom Stations

If you use Partitions, you can assign the inter-


com stations to a partition. The operator can
only handle call requests and connect or dis-
connect with other stations that belong to parti-
tions that the operator can access.

Note: For any intercom configuration changes 3. If this is a partitioned system, select the
or deletions to take effect, you must stop and Partition in which this intercom exchange
restart the P2000 Intercom Interface Service is active.
using Service Control; see Starting and Stopping
Service Control on page 432. 4. Select Public if you wish this intercom
exchange to be visible to all partitions.
5. Enter a descriptive Interface Name to
identify the intercom exchange to which
the stations are connected.

24-10832-194 Rev. E
395

To Define a Commend Intercom


Note: Configuration settings defined for Inter-
com Exchanges and Intercom Stations must
Exchange
match the settings defined at the intercom equip-
1. From the P2000 Main menu, select Con-
ment. If the programming at the intercom equip-
ment changes, you have to make the fig>System. Enter your password if
corresponding changes in the P2000 intercom prompted. The System Configuration win-
configuration (Exchanges and Stations). dow opens.
2. Select Intercom Interface and click Add.
6. Click Enable Alarms, if you wish to The Intercom Exchange dialog box opens.
report all alarms generated by the intercom
equipment. The P2000 Alarm Monitor dis-
plays alarms associated with the Zenitel
Exchange, such as Connect and Discon-
nect.
7. Enter the Query String value that is used
with message filtering (see Define Query
String Filters on page 225).
8. Select the Message Filter Group that con-
tains the intercom history messages to save
in the P2000 Transaction History database.
Select <none> if you wish to save all inter-
com history messages.
9. To save the intercom history messages in
the P2000 Transaction History database,
you must click SaveXAction. For more
information, see Intercom Transaction His-
tory Reports on page 401. 3. If this is a partitioned system, select the
Partition in which this intercom exchange
10. Select from the Type drop-down list, the
is active.
Zenitel intercom protocol to be used at
your facility. 4. Click Public if you wish this intercom
exchange to be visible to all partitions.
11. Select from the Comm. Port drop-down
list, the P2000 Server port to which the 5. Enter a descriptive Exchange Name to
Intercom Exchange box is connected. identify the intercom exchange box to
which the stations are connected.
12. The values for the Baud Rate, Data Bits,
Parity, and Stop Bits should be set to
match the settings in the Zenitel intercom
hardware settings. Edit the settings if nec- Note: Configuration settings defined for Inter-
com Exchanges and Intercom Stations must
essary.
match the settings defined at the intercom equip-
13. Click OK to save your settings. The Inter- ment. If the programming at the intercom equip-
com Exchange name displays under the ment changes, you have to make the
Intercom Interface icon in the System Con- corresponding changes in the P2000 intercom
configuration (Exchanges and Stations).
figuration window.

24-10832-194 Rev. E
396 CHAPTER 4
Advanced Features

6. Click Enable Alarms, if you wish to


report all alarms generated by the intercom
equipment. The P2000 Alarm Monitor dis-
plays alarms associated with the Commend
Exchange, such as Connect and Discon-
nect; and alarms associated with Commend
stations, such as Station Alarm Set and Sta-
tion Alarm Reset.
7. Enter the Query String value that is used
with message filtering (see Define Query
String Filters on page 225).
8. Select the Message Filter Group that con-
tains the intercom history messages to save
in the P2000 Transaction History database.
Select <none> if you wish to save all inter-
com history messages.
9. To save the intercom history messages in
the P2000 Transaction History database,
you must click SaveXAction. For more Note: The Commend interface allows you to
information, see Intercom Transaction His- set or reset outputs that for example, open doors,
tory Reports on page 401. turn on lights, or activate alarm sirens. You must
10. Select from the Type drop-down list, the first configure these outputs using the Commend
software and then add them to the intercom
Commend intercom protocol to be used at
exchange definition. Intercom exchange outputs
your facility. are only used for event processing and reporting
11. In the Dial Number Length field, enter purposes. If you wish to control these outputs,
the number of digits to assign to each sta- you must add them to the intercom station defini-
tion.
tion call number.
12. Click Support Regions if your facility
18. The default Type is Output. In the Address
supports logical grouping of one or more
field enter the Output address and click
intercom servers.
Add. You may add as many outputs as
13. Enter the IP Address of the Commend needed. If you wish to remove an output
Intercom Server. from the list, select the output item and
14. Enter the IP Port number for communicat- click Delete.
ing with the Commend Intercom Server. 19. Click Close to save your settings and
15. Enter the Password that to use for connect- return to the Intercom Interface configura-
ing to the Commend Intercom Server. tion.
16. If your facility supports regions, enter 20. Click OK to save your settings. The Inter-
Region Number assigned to the group of com Exchange name displays under the
intercom servers. Intercom Interface icon in the System Con-
figuration window.
17. If your intercom system supports output
setting, click Outputs. The Commend Out-
puts dialog box opens.

24-10832-194 Rev. E
397

Intercom Stations 5. Click Public if you wish this intercom sta-


tion to be visible to all partitions.
Once you create an Intercom Exchange in the
System Configuration window, an Intercom 6. Enter the Query String value that is used
Station icon is automatically added under the with message filtering (see Define Query
Intercom Exchange name. Now you should String Filters on page 225).
define the intercom call stations to use for 7. Enter the Address assigned to this station.
audio channel communication. The P2000 sys- The P2000 system connects to the station
tem establishes a connection between the based upon the address entered here. This
selected stations and the workstation where the address has to match the address assigned
operator is logged on. The P2000 workstation at the station equipment.
associated with the exchange can control the
calls from the stations assigned to that
exchange, as well as process intercom history Note: For a Commend station group, you can
messages and alarms. enter a 1-digit number. This number must match
the 1-digit Direct Dialing number configured for a
Master station (using the Commend interface),
To Add an Intercom Station and that can be used to activate a group number.
1. In the left pane of the System Configura-
tion window, expand the Intercom 8. From the Priority drop-down list, select a
Exchange name where you want to define priority value from 0 (highest) to 255 that
the stations. determines the order the call request is
placed in the Intercom Control queue.
2. Select Intercom Station and click Add.
The Intercom Station dialog box opens. 9. From the Type drop-down list, select one
of the following:
Sub-Station – You should configure at least
one Sub-Station to send call requests to its
Master Station.
Global Sub-Station – Select to allow
Sub-Stations to connect to other Master
Stations.
Station Group – Select to connect to multi-
ple stations at the same time. The P2000
system establishes a connection between
the stations that are part of the group
selected and the workstation where the
operator is logged on.
Master Station – The Intercom Exchange
3. Enter a descriptive Name that identifies must have at least one Master Station to
the location of the station. link to other stations.
4. If this is a partitioned system, select the
Partition in which this intercom station is
active.

24-10832-194 Rev. E
398 CHAPTER 4
Advanced Features

10. If you are defining a Master Station, select 12. The default Type is Output. In the Address
from the Workstation drop-down list, the field enter the Output address and click
workstation name that controls the Master Add. You may add as many outputs as
Station. needed. If you wish to remove an output
from the list, select the output item and
click Delete.
Note: You can only associate a P2000 work- 13. Click Close to save your settings and
station with one Master Station within an intercom return to the Intercom Station configura-
switch. tion.
14. Click OK. The station name displays under
11. If this is a Commend intercom station, and the Intercom Station root icon.
your intercom system supports output set-
ting, click Outputs. The Commend Out-
puts dialog box opens. Intercom Control
The P2000 Intercom Control window allows
operators to monitor incoming call requests
and to connect with stations or station groups
that are part of the workstation’s exchange. In
facilities that use Commend Intercom systems,
operators can control outputs associated with
the Commend intercom equipment. The Inter-
com Control dialog box allows operators to
sort the list of call requests by request time,
priority, status, or name.

When the call comes, the operator can select


any call in the queue and connect the master
intercom station to the calling intercom station.
Once connected, the operator can place the call
on Hold or Disconnect the call.

Note: Stations can also be connected or dis-


Note: The Commend interface allows you to connected using the Real Time Map; see Con-
set or reset outputs that for example, open doors, trolling Intercom Stations using the Real Time
turn on lights, or activate alarm sirens. You must Map on page 400.
first configure these outputs using the Commend
software and then add them to the intercom sta-
tion definition.

24-10832-194 Rev. E
399

To Control Intercom Stations Time/Date – The date and time when the
call was placed.
1. From the P2000 Main menu, select Con-
trol>Intercom. The Intercom Exchange Priority – The priority that was set in the
Selection dialog box opens. Intercom Station dialog box.
Status – The status of the selected station,
such as Call Request, On Hold, Idle, Busy,
and so on.
Name – The name of the Sub-Station or
Station Group that is placing the call.
Address – The address assigned to the
Sub-Station or Station that is placing the
call.
3. Select any call in the queue and click Con-
2. Select the intercom exchange you wish to nect. This connects your master intercom
control and click OK. This selection list station to the calling intercom station
only displays in facilities that have more selected.
than one Intercom Exchange defined. The 4. Once connected, you may communicate
Intercom Control dialog box opens at the (talk and listen) with the person at the
Call Queue tab. Sub-Station. You can also perform the fol-
lowing actions:
Push to Talk – Click and hold to talk (not
listen) to the person at the selected calling
station. Release the button to only listen
(not talk) to the person at the Sub-Station.
To return to duplex communication (the
ability to talk and listen without holding
and releasing the button), click the Push to
Talk button without holding it down.
Hold – Disconnects from the calling station
and leaves the call in the queue.
The top right section of the dialog box dis- Disconnect – Disconnects from the calling
plays general information related to the station and removes the entry from the
Master Station. The list box displays the queue.
calls currently in the queue, either from Connect – Selecting another entry in the
Sub-Stations or Station Groups. The fol- queue and clicking Connect performs a
lowing information is shown for each call Hold on the currently connected call.
in the list:
5. Click Exit to close the Intercom Control
dialog box.

24-10832-194 Rev. E
400 CHAPTER 4
Advanced Features

To Control Sub-Stations Only To Control Station Groups

1. In the Intercom Control dialog box, click 1. In the Intercom Control dialog box, click
the Station tab. the Station Group tab.

The list box displays the Name, Address, The list box displays the Name, Address,
and Priority of the Sub-Station, as well as and Priority of the Station Group.
the current status of the call request and the 2. In the list box, select a station group to
time and date when the change of status which you wish to connect.
took place.
3. Click Connect.
2. In the list box, select a station to which you
wish to connect. 4. You may now communicate with the per-
son at the stations of the Station Group
3. Click Connect. selected. You may also perform the actions
4. You may now communicate with the per- described earlier (Push to Talk, Hold, and
son at the selected station. You may also so on).
perform the actions described earlier (Push 5. Click Exit to close the Intercom Control
to Talk, Hold, and so on). dialog box.
5. If the selected intercom station is associ-
ated with outputs (Commend systems
Controlling Intercom Stations using the
only), select the output from the Output list
Real Time Map
box and click Set Output to activate the
output, or Reset Output to reset the out- The Real Time Map displays the status of
put. intercom stations on a map layout of your
6. Click Exit to close the Intercom Control facility. If an intercom status changes, the Real
dialog box. Time Map shows the state change and the loca-
tion of the intercom device. See Using the Real
Time Map on page 346.

Note: Intercom station groups are stateless;


therefore, the Real Time Map does not display
status changes associated with intercom station
groups.

24-10832-194 Rev. E
401

When you receive a call request for a station,


Note: The Station Connected trigger type is
the intercom icon starts flashing. You can not supported by Commend Intercom station
right-click the icon to open a shortcut menu groups.
and choose to connect or disconnect the call. If
you configured the intercom to allow the oper-
ator to activate events, the event name also dis- Intercom Transaction History
plays in the shortcut menu. In addition, if the
Reports
intercom station is associated with outputs
(Commend systems only), you can choose The SaveXAction option in the intercom
from the shortcut menu to set or reset all out- exchange definition allows you to save all
puts associated with the station. intercom transactions in the P2000 Transaction
History database.
To add intercom icons to the Real Time Map,
follow the instructions provided in Place Once the transaction history messages are
Device Icons on a Real Time Map on page 350 saved, you can use the P2000 Transaction His-
and select from the drop-down list the Inter- tory report to list all intercom transactions in
com stations you wish to display in the Real the system. The Transaction History report can
Time Map. be filtered to list by specific Site, Partition,
Date and Time, and any combination of these.
You can also select to run the report to list all
Note: Map Maker provides a default intercom intercom history types, or select a specific type
image set to display various intercom states such such as Intercom - Station Busy or Intercom -
as Station Idle, Station Busy, Station Call Call Station OK. The options available for
Request, and so on. However, you can use your selection in the History Type field depend on
own icons to create custom image sets. See Add- the equipment used at your facility.
ing Image Sets on page 352 for details.
For detailed information on running reports,
see Chapter 6: System Reports.
Intercom Events
The intercom equipment connected to the sys-
tem can respond to event actions using the
P2000 Event application. You can define
Event Actions that Connect or Disconnect sta-
tions, or events that are to be triggered upon a
Station Busy, Station Call Request, Station
Connected, or Station Idle. See Create Events
on page 335 to create new event triggers and
actions.

24-10832-194 Rev. E
402 CHAPTER 4
Advanced Features

P2000 Enterprise Before defining Enterprise parameters using


the P2000 software, you must refer to the
Enterprise Configuration manual for instruc-
The P2000 Enterprise feature allows customers tions on:
with multiple sites to communicate with each
 Configuring the P2000 Central Site
other to share cardholder and badge informa-
tion. Cardholders can be granted access to  Moving data from existing P2000 Regional
doors at all assigned sites within the Enterprise Sites to the P2000 Central Site
system.  Configuring a P2000 Regional Site

In the P2000 Enterprise Configuration, one Once you complete Enterprise Configuration,
P2000 site becomes the P2000 Central Site and you are ready to set up Enterprise parameters
all other P2000 systems within the enterprise within the P2000 software. Follow these basic
become P2000 Regional Sites. procedures:

Each regional site synchronizes its data with  Define Enterprise Parameters
the central site. Database replication is imple-  Assign Cardholders Enterprise Access
mented using Microsoft SQL Server database  Define Global Badge Access Rights
technologies.

“CENTRAL”
Central Site

WAN

“ORANGE” “GREEN”
P2000 P2000
Regional Site 1 Regional Site 3

“BLUE”
P2000 
Regional Site 2

24-10832-194 Rev. E
403

Define Enterprise Parameters 7. If you wish to select all sites, click All.
This option allows you to unselect site
Before assigning cardholders access to multi- names individually.
ple sites, you should Define Enterprise Sites,
8. If you wish to clear your selections, click
Define Enterprise Parameters, Define Enter-
None.
prise Time Zones, and Define Enterprise
Access Groups. 9. If you wish to select all sites, click All
sites. This option does not allow editing.
Define Enterprise Sites 10. Click OK to save your settings.

1. From the P2000 Main menu, select Con-


Define Enterprise Parameters
fig>System. Enter your password if
prompted. The System Configuration win- 1. From the P2000 Main menu, select Con-
dow opens. fig>System. Enter your password if
2. In the left pane, expand Enterprise prompted. The System Configuration win-
Parameters to display the enterprise dow opens.
parameters. 2. Select Enterprise Parameters and click
3. Select Enterprise Sites and click Add. Edit. The Enterprise Parameters Edit dia-
The Enterprise Site Edit dialog box opens. log box opens.
The list box displays the name of your
local site.

3. Select from the Enterprise Site


drop-down list, the site name to be defined
as the central Enterprise site.
4. Select one of the following Central Con-
trol of Badge Enabling/Disabling
4. Enter the Name of the regional Site options:
exactly as defined at the P2000 site that
provides access.
5. Enter the Database Server name of the Note: This feature is provided to allow badge
enabling and disabling on Enterprise systems.
regional site. For the central control of badge enable/disable
6. In the Subscription Sites box, select the feature to operate, each regional site must sub-
site names that can be associated with this scribe to the central site.
site. Any changes in this Site are reflected
on the site names selected in this box. MIS – To enable or disable badges on the
central site, through the MIS Interface.

24-10832-194 Rev. E
404 CHAPTER 4
Advanced Features

User Interface – To enable or disable Assign Cardholders Enterprise


badges on the central site, through Web Access
Access or the Badge application.
Use the Cardholder application to assign the
Host Event – To enable or disable badges
sites a cardholder can access. Once the sites
on the central site, through Host Events.
are assigned, the cardholder information is sent
5. Click OK to save your settings. to the selected sites for download.

Define Enterprise Time Zones To Assign Enterprise Access to a


1. Expand Enterprise Parameters to display Cardholder
the enterprise parameters. 1. From the P2000 Main menu, select
2. Select Time Zones and click Add. The Access>Cardholder. The Cardholder win-
Enterprise Time Zone Edit dialog box dow opens.
opens. 2. Create a new record or edit an existing
cardholder as desired. For details, see
Entering Cardholder Information on
page 244. The Cardholder Edit dialog box
opens.

3. Enter the Name of the Time Zone exactly


as defined at the P2000 site that provides
access.
4. Click OK to save your settings.

Define Enterprise Access Groups

1. Expand Enterprise Parameters to display


the enterprise parameters.
2. Select Access Groups and click Add. The
Enterprise Access Group Edit dialog box
opens. The Enterprise box displays all the sites
defined in the System Configuration win-
dow. See Define Enterprise Sites on
page 403.
3. In the Enterprise box, select the check box
next to the site that this cardholder may
access. You may select as many sites as
3. Enter the Name of the Access Group needed.
exactly as defined at the P2000 site that 4. To select all sites, click All.
provides access.
5. To clear your selections, click None.
4. Click OK to save your settings.

24-10832-194 Rev. E
405

6. Once the sites are assigned, click OK to 3. Enter the badge number and optional de-
return to the Cardholder window. The scription. For detailed information, see En-
information also displays in the Enterprise tering Badge Information on page 251.
Sites tab located in the center of the win- The Badge dialog box displays the site
dow. name tabs of the sites assigned to this card-
holder. The first tab is always the local site
tab and is used to assign local access privi-
leges. The second tab is the Enterprise tab
and is used to assign global access privi-
leges. Additional tabs show other site
names assigned to the cardholder.
Define Global Badge Access Assigning access privileges is determined
Rights by the following conditions:
Once the cardholder has been assigned to the  When you define access to the local site,
selected sites, you may define the security and click Apply Security Options
privileges and access rights using the Badge ‘Enterprise’, the security options
application. defined in the Enterprise tab are applied.
 When you define access at a different
To Define Badge Access Rights site, and click Apply Security Options
‘Enterprise’, the security options
1. In the Cardholder window, select a card- defined in the Enterprise tab are applied
holder from the Cardholder list that has to that site.
Enterprise access.
 Access Groups and Time Zones can be
2. In the Badge Information box at the bot- accessed for your own site, the Enter-
tom of the Cardholder window, click Add. prise site or for any site within the
The Badge dialog box opens. Enterprise system.
 On each site, a maximum of 64 Access
Groups and Time Zones are applicable
(32 local and 32 Enterprise).
 The P2000 system only downloads the
maximum number of Access Groups
and Time Zones for each panel type,
giving priority to the local settings.
4. Once the badge access parameters are
defined, click OK to return to the Card-
holder window. This initiates all required
downloads.

Note: The Status column in the Badge Infor-


mation box at the bottom of the Cardholder win-
dow, displays the status of badges for the local
site only.

24-10832-194 Rev. E
406 CHAPTER 4
Advanced Features

Web Access The P2000 server runs the Web Access


front-end and back-end services. The front-end
services handle the web browser HTTP
Web Access is a suite of applications that requests, while the back-end services handle
enables users to perform various P2000 tasks the application’s XML requests from the front
from any web-ready computer. Web Access end.
offers many features such as employee, visitor,
and contractor management applications; Before you define Web Access parameters
badge activity tracking and synchronization; using the P2000 software, you must refer to the
alarm monitoring; emergency access disable; Web Access Manual for the software compo-
web badging capabilities; and a customizable nents required to operate the P2000 Web
user interface. Access application.

24-10832-194 Rev. E
407

Sequence of Steps View – View records.


Edit – Submit requests to edit records.
Once Web Access is installed at the server, fol- Add – Submit requests to add records.
low these basic procedures for defining, imple- Delete – Submit requests to delete records.
menting, and using Web Access:
The Web Request Queue Status item allows
 Creating and Assigning Web Access Menu users to view Web Access requests according
Permissions to the following selections:
 Defining Web Access Options
 Defining Request Approvers View – View requests from own department
Edit – View requests from own company
 Submitting Requests using Web Access
Delete – View all requests
 Processing Web Access Requests
 Customizing the Web Access Interface Other Web Access items provide only one per-
 Configuring the Web Access Smart Card mission level, which is selected by clicking on
Encoder any of the permission levels (View, Edit, Add,
or Delete), and allow users to perform the
associated function. For example selecting any
Creating and Assigning Web of the Web Alarm Monitor permission levels,
Access Menu Permissions allows the user to perform alarm monitoring
To prevent unauthorized users from perform- functions. For detailed instructions, see Creat-
ing high-level actions, such as deleting card- ing Permission Groups on page 21. Once the
holder records or rejecting requests, the system menu permissions are defined, they are avail-
administrator must create menu permission able for assignment from the Cardholder Edit
groups, which are assigned to users who per- dialog box.
form Web Access functions.
Each individual Web Access function is con- To Assign Web Access Permissions
trolled by menu permissions and one menu
1. From the P2000 Main menu, select
permission group can include various combi-
Access>Cardholder. The Cardholder win-
nations of permissions.
dow opens.
2. Create a new cardholder record or edit an
existing cardholder record. For detailed
instructions, see Entering Cardholder
Information on page 244. The Cardholder
Edit dialog box opens.

Some Web Access items, such as Web Badge,


Web Cardholder or Web Cardholder Journal,
provide up to four permission levels that allow
the following functionalities:

24-10832-194 Rev. E
408 CHAPTER 4
Advanced Features

3. In the Web Access box, select from the 2. Click the Web Access tab and see the fol-
Menu Permission Group drop-down list lowing Web Access Options Field Defini-
the group that can be assigned to this card- tions for detailed information.
holder. The cardholder may be allowed to 3. Click OK to save the settings and return to
perform any function defined in this per- the System Configuration window.
mission group.
4. In the Password box, enter the password
Web Access Options Field Definitions
that the cardholder can use to log on to the
P2000 Web Access site. Send Email to Request Approvers – If you
5. Click OK to save your settings. select this option, when a cardholder submits a
Web Access request that requires approval, an
email notification is sent to the approvers
Defining Web Access Options defined in the Request Approvers dialog box;
see Defining Request Approvers on page 410.
The P2000 system allows you to set up system
The email message contains a hyperlink to the
wide settings to define how web access
request, which takes the approver directly to
requests are managed. Use the Web Access tab
the Request Approval application, assuming
in Site Parameters to define the default Web
the approver has been assigned with the proper
Access options, approval levels, and process-
Web Access menu permissions. The
ing method for Web Access requests. You can
approver’s email address is defined in the card-
also configure User Authentication parameters
holder record.
to set up directory services for Web Access.
Super User rules override partition rules – If
To Edit Web Access Parameters this option is selected, any approvers defined
in the Super User partition override any
1. From the System Configuration window, approvers defined in specific partitions. If this
select Site Parameters and click Edit. The option is not selected, approvers from the spe-
Edit Site Parameters dialog box opens at cific partition are used.
the General tab.
Expiration Period for Requests – Enter the
number of days after which all Web Access
requests expire. The expiration date is calcu-
lated by adding the number of days entered
here to the initial date when the request is sub-
mitted.

Required Approval Levels – This box displays


default approval levels for each of the P2000
Web Access applications. To change the
default values, double-click the application
name you wish to modify. The Edit Request
Application dialog box opens. The Emergency-
Disable.Cardholder application does not allow
editing.

24-10832-194 Rev. E
409

This feature is useful in situations where pass-


words are periodically changed and therefore,
eliminates the need to update passwords in the
P2000 system and also passwords that are used
to log on to Windows.

To use directory service password validation,


set up the following elements:

 Configure the Directory Services Pass-


word Validation fields on the Password
Sender – This field displays the Sender that Policy tab of Site Parameters (see page 40).
originated the Web Access request. The actual value to use for the Directory
Services Path is unique to your specific net-
Application – This field displays the name of work configuration and needs to be
the P2000 Web Access application you are obtained from the network administrator.
currently modifying.  Create an AD Account or AD Profile oper-
Approval Levels – Select a number from the ator account on the Edit Operator dialog
drop-down list to define how many approvers box (see page 24) for each P2000 Web
are required to approve this type of Web Access operator whose password is to be
Access request. If you select 0, the Web verified by directory services.
Access request is sent directly for processing. Once the previous elements are configured,
Processing Mode – This field defines how the define the following parameters in the User
request is processed after the Web Access Authentication box:
request has been approved. Select from the Use Operator Account / Profile Authentication –
drop-down list one of the following options: Click if you wish to use the P2000 Account,
 Auto – Select this option if the request is AD Account, or AD Profile operator user type
processed automatically (without interven- for Web Access login (see User Info Tab on
tion). Not available for the VisitorManage- page 24). If you wish to log in to Web Access
ment.Visitor application. using a cardholder account (the cardholder
first and last name, for example, john.smith),
 Manual – Select this option if this applica- you must clear this check box. Changes to this
tion requires an authorized user to manually option requires restarting all P2000 Services
process the request; see Processing Web and IIS, or restarting the P2000 Server.
Access Requests on page 416.
UI Style – Enter the Web Access user interface
style that users are assigned when logging on
User Authentication Box
using directory services authentication.
P2000 Web Access operator passwords can be
authenticated against a directory service such
Note: The UI Style assigned affects all P2000
as Microsoft Active Directory or Lightweight operators whose accounts are enabled for direc-
Directory Access Protocol (LDAP). This elim- tory services authentication. This parameter can-
inates operator passwords from the P2000 not be assigned individually (you cannot assign
database. styles to specific users).

24-10832-194 Rev. E
410 CHAPTER 4
Advanced Features

Defining Request Approvers To Enter the Cardholder Email Address

Depending on settings previously defined in 1. From the P2000 Main menu, select
Site Parameters, each Web Access request may Access>Cardholder. The Cardholder win-
require up to three active approvers. The dow opens.
approver is a cardholder who has been 2. Create a new cardholder record or edit an
assigned Web Request Approval menu permis- existing cardholder record. For detailed
sions. Approvers are ordered in a sequence and instructions, see Entering Cardholder
approve requests in the same order. Information on page 244. The Cardholder
For example, an application requires three Edit dialog box opens.
approvers: John (Level 1), Mary (Level 2), and
Bob (Level 3). When a request is submitted, an
email notification is sent to John, who
approves the request first. After John approves
the request, an email notification is sent to
Mary; then after Mary approves the request, an
email notification is sent to Bob. After Bob
approves the request, the approval process is
complete. Bob never sees requests that are not 3. Enter the Email address that has been
approved by Mary, and Mary never sees assigned to this cardholder and where noti-
requests that are not approved by John. fications are sent to approve Web Access
requests.
Approvers only see requests that are waiting
for their approval and each request waits for a
single approver at any time. When a request
becomes ready for the next approver an email Note: To configure your Email Server, see
EMail Tab on page 44, and also check with your
notification is sent to the approver.
IT department for the required email settings in
If an application requires a single approver, your facility.
after the approver approves the request, the
approval process is complete. 4. Click OK to save your settings.

The P2000 system ignores all requests that do


not have all required approvals completed. To Define Request Approvers

The approver’s email address for sending noti- 1. In the left pane of the System Configura-
fications is entered in the cardholder record. tion window, expand Site Parameters.
2. Select Request Approvers and click Edit.
The Request Approvers dialog box opens.

24-10832-194 Rev. E
411

6. From the Application drop-down list,


select the name of the Web Access func-
tion that the selected cardholder is allowed
to approve.
7. Select the type of Operation (Add, Delete,
or Update) that the selected cardholder is
allowed to approve.
8. Select a Company name if you wish to
have the selected cardholder approve only
3. Select the Partition from the drop-down requests coming from the company
list that contains the cardholders that are selected here.
assigned as approvers. Requesters and 9. Select a Department name if you wish to
approvers need to be in the same partition, have the selected cardholder approve only
unless the approver is in the Super User requests coming from the department
partition. selected here.
4. Click Add. The Edit Approval Rule dialog 10. Select the Level 1 tab and click Add. The
box opens. If you leave an asterisk (*) in a Select Cardholder dialog box opens.
field, the Approval Rule includes all
records for that field.

11. Enter the First Name and/or Last Name


(or leave the default *), and click Search.
5. Select from the drop-down list, the Sender
that originated the request. The selected
cardholder can only approve requests com-
ing from this sender.

24-10832-194 Rev. E
412 CHAPTER 4
Advanced Features

12. Select a cardholder from the list and click


Note: The system generates an error message
OK. The name is added to the Level 1 list if a request is submitted and the number of
box. You can add as many Level 1 approv- required approvers has not been defined.
ers as needed, but only one can be the
active Level 1 approver.
16. Once you define the rules for the requests
13. From the Level 1 list box, select the card- that require approvals, click OK. The
holder who is the active Level 1 approver Request Approvers dialog box displays a
of the type of application and operation list of approval filters. To move an
selected (for the company and department approval filter up or down on the list, select
selected, if applicable). Click Active. You the line item and click Up or Down.
can change the Active approver as needed.
The order in which approval filters display
14. To remove a cardholder from the list, select in the Request Approvers list box is signif-
the name and click Delete. icant. When a request is submitted, the
15. Repeat the procedure, starting with step 4, approval filters in the list are scanned from
for the Web Access requests that require the top down until the first request and fil-
Level 2 and Level 3 approvers. ter match is found. When a match is found
the attached approver list is used. If two
approval filters include the same rules, the
filter above has precedence over the one
below.

Rule 1 requires three approvers Rule 2 requires only one approver


for adding cardholders (from any for adding visitors (from any
company and department). company and department).

Rule 3 requires one approver for any type of Rule 4 requires one approver for any request
request submitted for the DEFG company submitted, except that new cardholders (rule
(any department), except that new cardhold- 1), new visitors (rule 2), and DEFG company
ers (rule 1) and new visitors (rule 2) will be (rule 3) requests will be approved by the ap-
approved by the approval filters above. proval filters above.

24-10832-194 Rev. E
413

Submitting Requests using Web Note: When using the P2000 operator
Access account/profile user name, make sure the Use
Operator Account / Profile Authentication
The Web Access interface can be accessed option in the Web Access tab of Site Parameters
from any web-ready computer. This section is selected, see page 409.
provides a description of the features available
from Web Access. For detailed information on For systems that use multiple interface
how use this web-friendly interface, refer to styles, the User Name may include the
the Web Access Manual. style name (firstname.lastname@stylename).
Refer to the Web Access Manual for details.
To Log on to Web Access 3. Click Log In. The Welcome page displays.
1. From a web browser, enter the following in
the Address bar, replacing ServerName or
IP Address of the Web Access server:
http://ServerName or IP Address/P2000
or enter the following if the P2000 Server
is configured as a secure server:
https://ServerName or IP Address/P2000
Contact your system administrator for the
correct settings. The P2000 Web Access
Log In page displays.
4. To log out and return to the Log In screen,
click the Log Out link at the upper-right
corner of any Web Access page.

Note: To access Web Access from the P2000


Server, you can also select Start>Programs>
Johnson Controls>P2000>P2000 Web Access
Home Page.

Web Access Functions


While each of the following procedures is
2. Enter the User Name and Password. described in detail in the Web Access Manual,
a basic description is given here for your con-
The User Name is based on the cardholder venience.
first and last name (for example, john.smith)
that has Web Access menu permissions; or
Employee Services
it can be the user name of a P2000 operator
account/profile (for example, in a Micro- Allow users to track the badge activities of
soft Active Directory® integration). cardholders, request a Badge Resync, which
returns a badge to its correct state if it is
out-of-sync, or print and encode a badge.

24-10832-194 Rev. E
414 CHAPTER 4
Advanced Features

Cardholder Search Badge Print

Allows searching for cardholder records in the Allows users to locate cardholder records
P2000 database. Users may search by card- using various search filters. After performing a
holder name, badge number, ID number, search, Web Access lists the badge ID number,
department, and company. cardholder name, personal identification num-
ber, company, and department of each card-
holder record located in the search; then users
Area Search
can preview, print, and encode a cardholder’s
Allows users to view which cardholders cur- badge by clicking the badge ID number.
rently occupy a specific controlled area in a
facility. A controlled area is a designated sec- Guard Services
tion of a facility, with one or more readers or
input points assigned, with the purpose of These services allow authorized users to per-
reporting on the current whereabouts of card- form several guard-related actions, such as
holders. view, acknowledge, and remove alarms; and
manually control doors and output devices.
In Out Displays
Alarm Monitor
Allows users to see which cardholders are In
or Out of the facility, or specific areas of the P2000 alarms can be monitored, acknowl-
facility, based on their badge activity. If a card- edged, and removed using the Web Access
holder has badged to enter the facility the sta- interface. This feature is useful to monitor
tus is In. If a cardholder has not badged to alarms at unattended sites, allowing authorized
enter the facility, the status is Out. users to acknowledge alarm conditions as soon
as they are reported. Once an alarm is in a
secure state, the user can remove the alarm
Badge Resync
from the queue.
Allows users to manually adjust the status of
their badge if it has been placed in an Command Outputs
out-of-sync state. A badge is out-of sync when
cardholders (that are required to enter and exit Output devices can be manually activated or
an area in sequence using entry and exit termi- deactivated by authorized users to control
nals), badge In at an entry terminal and don’t devices connected to them such as lights,
badge Out at the next badging if, for example, warning indicators or sirens.
they follow another cardholder out without
swiping their badge. In that case, the badge
Door Command
remains in the In state (out-of-sync) and is
denied access the next time they attempt to This feature allows an authorized user to man-
badge back into the area. ually lock or unlock a door (override system
controls) for a specific time. The user is able to
unlock all doors at once or return all doors to
their previous state.

24-10832-194 Rev. E
415

Management Services Edit Cardholder

Through Management Services, an authorized In addition to submitting requests for new


user can add or edit cardholder records, includ- cardholders, authorized users can also request
ing badge and associated cardholder informa- to change existing cardholder records, includ-
tion. In addition, the user can also view, ing deleting records from the system.
approve, and process Web Access requests.
Validate
Request Status
This function is used to process Web Access
The Request Status page allows authorized requests that require manual processing. See
users to view the status of their requests, and Processing Web Access Requests on page 416.
depending on their menu permissions, the sta-
tus of all requests or the status of requests sub-
Audit
mitted by other users that belong to the same
department or company. The top portion of the This feature allows authorized users to track
screen displays the Request Parameters box changes to the software based on who per-
where users can search for specific requests. formed the action, the data affected by the
The bottom portion displays the Request List, action, the date and time the action occurred,
which displays requests in the order they are and the action itself, such as Add Badge, Edit
received. The links under the Request column Cardholder, Execute Application, and so on.
allows you to view the details of the requests.

WebBadging Setup
Request Approval
Allows you to download and run the Web-
The approval process provides additional BadgingSetup.exe file, which installs the
security measures by confirming the validity WebUSB application to enable the use of
of a request before the request is presented for USB-compatible badging devices via the
processing. Depending on the settings previ- P2000 Web Access interface. This service
ously defined in Site Parameters (see Defining must be running on the client computer run-
Web Access Options on page 408), up to three ning Web Access or the badging devices can-
authorized users may be required to approve not be controlled.
Web Access requests.

Visitor Management
Add Cardholder
Allows authorized users to request a visitor
This feature allows authorized users to submit badge or request to extend the validation
requests to enter cardholder information into period of a cardholder badge. In addition,
the system. Depending on the permissions users can also view the status of their requests.
assigned, users can enter cardholder related
information such as user-defined fields, jour-
nals, badge information, sponsor information
(if the cardholder is a visitor), or attach a por-
trait to the cardholder record.

24-10832-194 Rev. E
416 CHAPTER 4
Advanced Features

Visitor Request Processing Web Access


Web Access provides a faster way for users to Requests
make visitor badge requests, so badges are
Web Access requests are processed either auto-
ready when a visitor arrives at a building. Users
matically or manually, depending on the con-
can simply enter the appropriate visitor data
figuration defined in Site Parameters (see
into the system, assign a visitor sponsor, enter
Defining Web Access Options on page 408).
the date and time period of the scheduled visit,
and enter notes for visitors with special needs. With the exception of Visitor Requests, all
Visitor requests are processed using the P2000 Web Access requests can be processed auto-
Visitor Request Management application; see matically. Once a request is submitted and the
To Process Visitor Requests on page 416. approval is completed (if approval is part of
the process), the request is added to the P2000
database. If an error occurs during this process,
Contractor Request
the request displays in the Request Queue table
Enables authorized users to extend the badge (see Viewing Request Queue on page 466) as
validity period for selected cardholders. This Error or Rejected and the requester is subse-
feature is typically used for visitor badges that quently notified of the problem.
are about to expire, but can also be used as
needed to extend the badge validity period for Web Access requests that are set to Manual
regular cardholders. Users can only extend the process, require an authorized user to manually
badge validity period for cardholders who process the request. After the request is sub-
belong to the same company as the user. mitted and the approval is completed (if
approval is part of the process), the request is
sent out for validation. With the exception of
Request Status Visitor Requests, all Web Access requests are
processed from the Validation page. See To
This function is also accessed from Manage-
Process Visitor Requests for instructions on
ment Services; see Request Status on
manually processing Visitor Requests.
page 415.

To Process Visitor Requests


Emergency Access Disable
1. From the P2000 Main menu, select
This feature provides a rapid method of dis- Access>Visitor Request Management.
abling access in case of an emergency. An The Visitor Request Management dialog
authorized user can quickly disable all badges box opens. The list box (top portion of the
associated with selected cardholders and screen) displays a queue of requests sub-
access is immediately denied at all doors. In
mitted using Web Access.
addition, the selected cardholders are unable to
perform any Web Access functions. Once it is
determined that the emergency is over, the
badges can be enabled again using the Badge Note: The Visitor Request Management dialog
box should be kept opened at all times for the
application.
person to manually process and act upon incom-
ing visitor requests.
Note: Badges cannot be enabled using the
Web Access interface.

24-10832-194 Rev. E
417

2. Select from the Partition drop-down list,


the partition that contains the visitor
requests.
3. To display today’s requests only, click
Today Only.
4. To display requests to be processed at the
workstation location, click This Location
Only. The list displays requests that have
the location name entered in the Location
field of the Workstation dialog box (see
page 20).
5. To search the request queue for a specific
record, click Search located above the list 6. You may click All to display all visitors
box, enter the visitor data into the fields on currently in the queue.
the Request Search dialog box, and click
OK.
Note: You can also display all visitors in the
queue by clicking All above the list box in the Vis-
itor Request Management dialog box.

24-10832-194 Rev. E
418 CHAPTER 4
Advanced Features

7. Select an entry from the queue to pre-fill Middle – Displays the middle name of the visi-
the Visitor and Sponsor fields. Other infor- tor. You may also enter a value to search the
mation related to the selected Visitor, such cardholder database by middle name.
as Request Notes, also display.
Last – Displays the last name of the visitor.
You may also enter a value to search the card-
holder database by last name.
Note: The Found in DB fields indicate whether
or not the P2000 system has identified a match- ID – Displays the ID of the visitor. You may
ing Visitor or Sponsor record in the cardholder also enter a value to search the cardholder
database. A picture also displays, if there is one database by this field.
previously saved for the selected visitor.
Company – Displays the visitor’s Company
8. See the following Visitor Request Manage- name. You may also enter a value to search the
ment Field Definitions for more detailed cardholder database by company name.
information. If the company name does not already exist in
9. When all the information is entered, click the database for the visitor’s assigned partition,
Save to complete the request and save the you are notified upon selecting the visitor
visitor and badge information. The new request in the queue. To add the company
visitor data is also reflected in the Card- name to the P2000 database, click the browse
holder window. button to open the Company window. See
Define Companies and Departments on
10. If you wish to save and print the badge,
page 234 for information on adding a company
click Save and Print (requires the Video
name to the P2000 database.
Imaging application).
11. To process additional visitor requests, click Partition – Displays the partition assigned to
Clear to clear the information on the the visitor. To change the assigned partition,
screen, then select another visitor name select a new one from the drop-down list. If
from the queue or enter the information you change the partition, you may also have to
according to the Visitor Request Manage- reassign the visitor’s company to a company
ment Field Definitions. that belongs to the same partition.

12. If a visitor request is to be rejected, select Notes – Displays the visitor request notes
the name from the queue and click Deny. entered by the requestor.
13. Click Exit to close the Visitor Request Found in DB – Indicates whether or not the
Management dialog box. P2000 system has identified a matching Visitor
record in the cardholder database. If no match
Visitor Request Management Field is identified, click Search to manually search
Definitions for a matching record.
If Found in DB shows Yes, then the existing
Visitor Box visitor record in the P2000 database is updated.
If it shows No, the new visitor is added when
First – Displays the first name of the visitor you click Save.
selected in the queue. You may also enter a
Approved Visits – Displays the number of
value to search the cardholder database by first
approved visits. This field is only valid if the
name.
Found in DB field displays Yes.

24-10832-194 Rev. E
419

Sponsor Box
Note: The Visitor Request Management appli-
cation creates four UDFs: Approved Visits, First – Displays the first name of the person
Most Recent Visit, Second Most Recent Visit, who sponsors this visitor.
and Third Most Recent Visit. These UDFs are
automatically updated and allow you to monitor Middle – Displays the middle name of the per-
the visits associated with the selected visitor. son who sponsors this visitor.
Last – Displays the last name of the person
Search – If the P2000 system did not identify a who sponsors this visitor.
matching Visitor record in the database, you ID – Displays the unique ID assigned to the
may search the database by entering a value in sponsor.
any of the Visitor fields and then clicking
Company – Displays the sponsor’s Company
Search. The Find Visitor dialog box opens dis-
name.
playing the visitor records that match the
entered values. You may also click Search Partition – Displays the partition assigned to
without entering any values to display all visi- the sponsor.
tors in the database. To search for specific Found in DB – Indicates whether or not the
names in the Find Visitor dialog box, enter the P2000 system has identified a matching Spon-
data in any of the fields. You can use wildcards sor record in the cardholder database. If no
such as “?” to replace one character (including match is identified, click Search to manually
a space), or “*” to replace more than one char- search for a matching record.
acter.
Search – If the P2000 system did not identify a
matching Sponsor record in the database, you
may search the database by clicking Search.
The Find Sponsor dialog box opens displaying
the sponsor records that match the entered val-
ues. If no value was entered, all cardholders in
the database are displayed. To search for spe-
cific names, enter the data in any of the fields.
You can use wildcards such as “?” to replace
one character (including a space), or “*” to
replace more than one character.

Select the visitor’s name and click OK.

Take – If your facility uses the Video Imaging


application, click Take to capture the visitor’s
portrait. See the instructions on page 363 (Step
4.) for details on capturing portrait images.

Select the sponsor’s name and click OK.

24-10832-194 Rev. E
420 CHAPTER 4
Advanced Features

Badge Box Customizing the Web Access


Number – Enter a badge number (the number
Interface
of allowed characters depends on the parame- Web Access graphical user interface is con-
ters selected in the Site Parameters dialog box; trolled by styles, which can be fully custom-
see Max Badge Number in the Badge Tab on ized according to individual needs. The inter-
page 37). face is built with XML (Extensible Markup
Language) technology and can be customized
Auto – If your facility is set up to use the Auto-
using the Altova® StyleVision® designer soft-
Badge Management feature (see page 264),
ware tool to modify the following Web Access
click Auto to insert the next available badge
interface components:
number in the Number field.
 Caption font size, type, and color
Issue – Enter an issue level per badge number.
If a visitor loses a badge, you would give the  Images (for example, a company logo)
next available issue level and retain the same  Field type (combo box, text box, and so on),
badge number. The number of badge issue lev- location, and size
els supported depends on the panel type you  Button types
use; see Max Issue Level in the Badge Tab on
 Background colors
page 37.

Template – Select from the drop-down list the


access template to be applied to this badge. See Note: The customization feature also allows
Create Access Templates on page 236. Web Access pages to be displayed in different
languages.
Design – Select from the drop-down list the
badge design that was created using the Video
Web Access provides a default style (jci),
Imaging application.
which is assigned to all Web Access users. You
Start Date – Enter the date this badge becomes can however, modify the default style and
active. Click the down arrow to select a date assign it to all users, or create multiple styles to
from the system calendar. be assigned to specific users via UDFs (see
Assigning Styles to Web Access Users for
Start Time – Enter the time this badge becomes details).
active. Click the spin box buttons to select a
time. For detailed instructions on creating custom-
ized styles, refer to the Web Access Manual.
Void Date – Enter the date this badge is auto-
matically voided. Click the down arrow to
select a date from the system calendar. Assigning Styles to Web Access Users

Void Time – Enter the time this badge is auto- Once the Web Access interface styles have
matically voided by the system. Click the spin been created using the instructions provided in
box buttons to select a time. the Web Access Manual, they are available for
assignment via the UIstyle user-defined field
(UDF).

24-10832-194 Rev. E
421

To Create the User Interface Style UDF

1. From the P2000 Main menu, select Con-


fig>Cardholder Options>User Defined
Fields. The User Defined Fields dialog
box opens.
2. Click Add. The Add User Defined Field
dialog box opens.
3. In the Name field, enter UIstyle. Enter the
name exactly as shown. The letter case
must match: UI should be uppercase letters
and style should be lowercase letters. Do
not add spaces.
4. From the Type drop-down list, select Text.
5. In the Width field enter 32.
6. Click OK to save the UIstyle UDF, then
click Done to close the User Defined The dialog box displays all UDFs defined
Fields dialog box. for your facility.
5. To assign a style to the cardholder, enter
The UIstyle UDF is available in the Card- the style name into the UIstyle field. The
holder window to assign one or more of the name must match the directory style name;
new styles to the desired Web Access users. for example, green. Refer to the Web
Access Manual for details in creating cus-
To Assign Styles to Web Access Users tomized styles.
6. If you wish to assign multiple styles to the
1. From the P2000 Main menu, select
cardholder, enter the names of the styles
Access>Cardholder. The Cardholder win-
separated with a comma; for example,
dow opens.
green,basic.
2. Select a cardholder that is allowed to per-
7. Click OK to return to the Cardholder win-
form Web Access functions. See To Assign
dow.
Web Access Permissions on page 407.
3. Click Edit on the right side of the window.
The Cardholder dialog box opens. Configuring the Web Access
4. Click the UDF 1 tab to display the user Smart Card Encoder
defined fields. Required fields are indi- Web Access offers web badging capabilities,
cated by an asterisk and must be completed which allow among other things, encoding
before a record is saved. cardholder badges from a Web Access com-
puter.

To support the programming of smart cards


using the ACS® Model ACR120 MIFARE
smart card encoder, the Web Access computer
must be configured as a web badging station.

24-10832-194 Rev. E
422 CHAPTER 4
Advanced Features

The encoder requires a simple USB cable con-


nection from the device to the Web Access
computer.

Note: The encoder must be connected to the


USB port on the Web Access computer. Do not
connect to a USB hub. Refer to the Web Access
manual to install and configure the proper hard-
ware and software components.

MIFARE is a contactless smart card technol-


ogy that has 16 sectors; each sector with 64
bytes (512 bits) of memory. Each sector can 4. Click Add to open the Mifare Encode
contain up to 4 blocks, each block containing Details dialog box.
16 bytes (128 bits).

After you configure the web badging station,


use the WebAccess Config function to config-
ure the parameters for encoding badges from
web badging stations.

IMPORTANT: Before configuring the smart


card encoder, the user must have a reasonable
level of experience with encoding configuration
and a thorough understanding of the MIFARE
functional specification, including sector and
block organization. Refer to your card manufac-
turer documentation for specific settings.

To Configure the Web Access Smart


Card Encoder 5. Enter the Key that was assigned to the
card. A Key is basically a password. The
1. From the P2000 Main menu, select Con- Mifare card uses 48-bit keys, made of up to
fig>System. Enter your password if 12 Hex characters: “0” to “9” and “a” to
prompted. The System Configuration win- “f” (uppercase or lowercase). This key is
dow opens. usually provided by the manufacturer.
2. In the left pane, expand Site Parameters. 6. Select from the Key Type drop-down list,
3. Select Web Access and click Edit. The whether this is a Key A or Key B. These
WebAccess Config dialog box opens. keys perform different functions. For
example, Key A could be required to read
data in a sector, while Key B could be
required to write data to a sector.

24-10832-194 Rev. E
423

7. Select from the Sector drop-down list, a 11. If you wish to customize the encoding
sector number from 0 to 15 for the card. details, click Use Data Value, and enter
Each sector can store its own pair of keys the desired data in the Data Value field. If
(A and B). the Data Type is Data, the Data Value must
8. Select from the Data Type drop-down list, be a decimal number string. If the Data
whether the type is Data or Keys. See Type is Keys, the Data Value must be a
page 424 for more details. Hex string.

9. Select from the Block drop-down list, the 12. Click OK to save the encoding details and
block that is assigned to the sector. return to the WebAccess Config dialog box.
Depending on the Data Type selected, each 13. The P2000 system does not allow encod-
sector can contain up to 4 blocks. By ing badges from a Web Access computer
default, block 3 is assigned to any sector unless you click Enable Mifare Encod-
whose Data Type is Keys. See the follow- ing. If you wish to disable badge encoding
ing table for memory organization details. from a Web Access computer, click the
10. If you wish to include a P2000 database check box again to disable it.
field as part of the encoding information, 14. Click OK to save the encoding parameters.
select from the Data Field drop-down list
the desired field.

Byte Number within a Block


Sector Block 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Description
15 3 Key A Access Bits Key B Sector Trailer 15
2 Data
1 Data
0 Data
14 3 Key A Access Bits Key B Sector Trailer 14
2 Data
1 Data
0 Data

: :
: :
: :

1 3 Key A Access Bits Key B Sector Trailer 1


2 Data
1 Data
0 Data
0 3 Key A Access Bits Key B Sector Trailer 0
2 Data
1 Data
0 Manufacturer Block

24-10832-194 Rev. E
424 CHAPTER 4
Advanced Features

Mifare Encoding Scheme

Data Type: Data / User Data Value: false

 If the value of the selected Data Field is a


number, it is encoded in binary with an end-
ing semi-byte ‘0x0’; example:
for data field Cardholder ID with a value of
123.
123 in binary is 0000007B and with the end-
ing semi-byte ‘0x0’ it is encoded as
000007B0.
 If the value of the selected Data Field is not
a number, it is treated as ASCII string and
attached with a leading semi-byte ‘0x0’;
example:
for data field first name with a value of
John.
John in ASCII is 6A6F686E and with a
leading semi-byte ‘0x0’ it is encoded as
06A6F686E0.
Data Type: Key / User Data Value: false

 The selected Data Field is treated as Hex


string with an ending semi-byte ‘0x0’
 If the Data Field cannot be translate into
Hex string, it is converted as ‘0x00’; exam-
ple:
if the selected datafield’s value is E324FD it
is encoded as 0E324FD0

24-10832-194 Rev. E
425

Chapter 5: System Maintenance

T
he P2000 software provides several For example, if a panel or group of panels has
functions to help you maintain your se- been offline for maintenance, you can use
curity management system once it is up Download to update panels with system
and running. These functions are con- changes that occurred while they were down.
sidered non-routine and are typically performed Or, you may need to download data to all pan-
by a system administrator. Some of these func- els after a complete power failure or system
tions can be performed only from the Server. upgrade.

This section includes the following topics: You can download individual items such as a
change in holiday schedule or added card
 Downloading Data to Panels events, or you can download all items at once.
 Monitoring Downloads
 Controlling Smart Download
 Controlling P2000 Services TIP: Open the Download Status dialog box to
monitor the records in the download queue as the
 Viewing Workstation Status
download takes place.
 Viewing System Status
 Writing Panel Database to Flash Memory
 Updating CK721-A Panels To Download Data to Panels
 Updating Mercury Panels 1. From the P2000 Main menu, select Sys-
 Performing Database Maintenance tem>Download.
 Viewing Request Queue 2. Enter your password if prompted. The
Download dialog box opens.
Downloading Data to Panels

Under normal operating conditions, data such


as additions to the cardholder database and
other changes to the system are downloaded
automatically to the panels and no specific
downloading procedures are required. With the
Download function, you can manually down-
load data to panels if there has been an interrup-
tion in communication.

24-10832-194 Rev. E
426 CHAPTER 5
System Maintenance

3. From the Download To Panels box, select 7. If you wish to reset a Mercury panel before
the panel or panels to which you wish to download, select Panel from the Item To
download data, or click Select All to select Download box (make sure a Mercury panel
all panels in the list. Click None to clear type is selected in the Download To Panels
your selections and reselect the panels box), then click Reset Panel Before
individually. Download option.
4. From the Items To Download box, select the
items you wish to download to the panel or Note: Since the Reset Panel Before Down-
panels, or click Select All to select all items load option is provided to delete all data from the
in the list. Click None to clear your selec- selected panel, you are required to perform a full
tions and reselect the items individually. download to restore the panel’s database. Click
Select All in the Items To Download box to
restore the selected panel’s database.
Note: HID panels go temporarily offline when
a panel download is initiated. Also, when an HID 8. After you make your selections, click
terminal or input configuration is downloaded, Download. The records queued during the
there is a 7 to 8 second window when a card-
download display in the Download Status
holder may gain access, even if the enabled time
zone does not allow it. message box. In large downloads, the num-
ber of items queued may fluctuate if data is
transferred faster than the panels can
Note: On P2000 systems that use HID panels, receive it. This is normal. The download is
the download speed per badge decreases as the complete when the Records Queued
number of badges downloaded increases. returns to 0.

Monitoring Downloads
Note: OSI readers are temporarily disabled
during the download operation and deny access
until the download is completed.
Download Status displays the status of any
items that the system automatically downloads.
5. If you wish to download all badges to a Use this application in conjunction with the
panel and still allow access through a door Download function.
of the panel while being updated, select
Badges from the Items To Download box, To Monitor Download Status
and click to clear Delete Badges From
Panel Before Download. 1. From the P2000 Main menu, select Sys-
tem>Download Status. The Download
Status message box opens.
Note: If the panel being updated contains
badges that should not be there, the system does
not remove them from the panel, unless you
delete those badges before the download.

6. To download elevator data without deleting 2. Drag the Download Status message box to
all elevators from the panel, select Eleva- where it is visible during the download
tors/Cabinets from the Item To Download process. The number of records queued
box, and click to clear Delete Elevators during the download displays as the down-
From Panel Before Download. load progresses.

24-10832-194 Rev. E
427

3. To see the number of records queued at Controlling Smart Download


each panel, click Details. The Download
Status By Panel dialog box opens.
The Smart Download Control application
allows you to closely monitor Smart Down-
load queue activities, such as downloading
badges to panels when changes are made to
access groups and terminal groups, as well as
downloading cardholder and badge changes.

Use the Download tab in Site Parameters (see


page 41) to set up rules that determine the time
when these downloads take place.

To Monitor Smart Downloads


The list displays all panels configured in
the system. All items are downloaded at a 1. From the P2000 Main menu, select Sys-
High Priority, with the exception of tem>Queued Download Actions. The
Badges, which are downloaded at a Nor- Smart Download Control dialog box
mal Priority. opens.
The Information box displays the Smart
4. Click Refresh to update the screen with
Download Rule defined in the Site Param-
new data as the download progresses.
eters dialog box. The Count box displays
5. Click Done to close the Download Status the number of records queued for down-
By Panel dialog box. load. The In Progress box displays the
6. Close the Download Status message box. number of records currently being down-
loaded.

24-10832-194 Rev. E
428 CHAPTER 5
System Maintenance

The following information displays for Service Startup Configuration


each download in the queue:
Service Startup Configuration allows you to
ID – Shows a number that the system auto- enable or disable any of the P2000 services at
matically assigns to each download. the start of communications, as well as set up
Entry Time – Displays the time of each recovery actions to take place if a service fails.
download request entry. If you enable the Auto Start flag for a particu-
lar service, that service starts automatically and
Scheduled Time – Displays the scheduled
you can stop it or restart it using the Service
download time of each timed download
Control or the Service Monitor application. If
request entry.
you disable the Auto Start flag, the service
Status – Displays the status of each down- does not start automatically and does not dis-
load request entry. play in Service Control.
Description – Displays the text description By managing P2000 services, you can reduce
of each download request entry. system load by running only the required ser-
Site – Displays the site name where the vices. Before disabling a service, you must
download request entry originated. ensure that this service is not required to sup-
port a particular system function. If your facil-
2. Click Refresh to update the screen with
ity uses advanced features, such as Guard Tour
new data as the download progresses.
or Intercom, you could also enable or disable
3. Click Summary to display a summary of those services to start automatically when the
record counts and time information associ- Server starts up.
ated with the records currently displayed.
Click Cancel to return to the Smart Down- Access this function through the System Con-
load Control screen. figuration window from the Server or a work-
station. We recommend defining Menu Per-
4. Click Done to close.
missions to restrict access to this feature only
to system administrators to prevent unautho-
rized personnel from stopping critical services.
Controlling P2000 Services
To Edit Service Startup Configuration
A service is a process that performs specific
system functions and operates in the back- 1. From the P2000 Main menu, select Con-
ground without user intervention. fig>System. Enter your password if
prompted. The System Configuration win-
This section describes the procedures for con- dow opens.
trolling and monitoring P2000 services, as well 2. In the left pane, expand Site Parameters
as outlines the steps to customize which of to display default system parameters.
these services automatically initiate at system
startup. 3. Select Service Startup Configuration,
and click Edit. The Edit Service Startup
Configuration dialog box opens.

24-10832-194 Rev. E
429

Reboot on any failure – Reboots the com-


puter on any service failure.
8. Click OK to return to the System Configu-
ration window. The Service Control dialog
box displays only the enabled services.

P2000 Services Definitions

CCTV Server – Communicates with the CCTV


and the digital video system. See the CCTV
and the DVR/VMS features, described in
The list displays all services installed in Chapter 4: Advanced Features.
the system, along with the Server name
and a check mark in the Auto Start col- P2000 Aimetis Interface Service – Performs
umn to indicate whether the service auto- communications between the P2000 Server
matically initiates at system startup. See and the Aimetis Symphony™ system and the
P2000 Services Definitions for a brief P2000 VMS. It handles host event actions and
description of these services. processes alarms from the Aimetis and the
4. Select the service that you wish to auto P2000 VMS systems. This service is not
start and click the associated check box in involved in video playback. The P2000 Aime-
the Auto Start column. tis V7 Interface Service is used with the
Aimetis Symphony or P2000 VMS Version 7
5. To auto start all services, click All, or click integration.
None to clear the selections and reselect
the services individually. P2000 Assa Abloy DSR Interface Service – Pro-
6. To restrict a service from starting automat- vides the communication between the P2000
ically at system startup, select the service Server and the Assa Abloy Door Service
and click the associated check box to Router (DSR).
remove the check mark. P2000 AV Service – Provides the communica-
7. To set up recovery actions to take place if a tion between the P2000 Server and DVR/VMS
service fails, select the service, and under system components. See DVR/VMS on
the Recovery column select from the drop- page 390.
down list one of the following options:
P2000 Avigilon Interface Service – Performs
Take no action – No action takes place after communications between the P2000 Server
a service fails. and the Avigilon™ VMS. It handles host event
Restart on failure – Default option. Restarts actions and processes alarms from the Avig-
the service after failure. ilon system. This service is not involved in
video playback.
Restart on 1st failure then reboot – Restarts
the service after first failure, then reboots P2000 Bosch Interface Service – Performs com-
the computer. munications between the P2000 Server and the
Restart on 2 failures then reboot – Restarts Bosch VMS. It handles host event actions and
the service after two failures, then reboots processes alarms from the Bosch system. This
the computer. service is not involved in video playback, and
is not supported in this release.

24-10832-194 Rev. E
430 CHAPTER 5
System Maintenance

P2000 Cisco Interface Service – Performs com- P2000 IFC Interface Service – Provides the
munications between the P2000 Server and the communication between the P2000 Server and
Cisco® VMS. It handles host event actions and IFC panels using the BACnet protocol. This
processes alarms from the Cisco system. This service allows the P2000 system to monitor
service is not involved in video playback, and alarms generated by devices connected to IFC
is not supported in this release. panels.

P2000 CK721-A Download Service – Performs P2000 Intercom Interface Service – Provides the
Server downloads going to all CK721-A pan- communication with the Intercom hardware.
els in the system. See Intercom on page 393.

P2000 CK721-A Priority Service – Performs P2000 Intrusion Interface Service – Provides the
CK721-A panel online and offline notifica- communication between the P2000 system and
tions. intrusion panels. This service allows the P2000
system to obtain status information whenever
P2000 CK721-A Upload Service – Performs an intrusion component changes and issues
CK721-A panel uploads to the Server. commands to control the intrusion zones,
P2000 Endura Interface Service – Performs areas, and annunciators that are part of the
communications between the P2000 Server intrusion system.
and the Pelco® Endura™ VMS. It handles P2000 Mercury Interface Service – Provides the
host event actions and processes alarms from interface between the P2000 Server and Mer-
the Pelco Endura system. This interface service cury panels.
uses Pelco API that supports H.264 cameras.
This service is not involved in video playback, P2000 Milestone MIP Interface Service – Per-
and is not supported in this release. forms communications between the P2000
Server and Milestone Interface Protocol (MIP)
P2000 Escalation Service – Performs the alarm XProtect® Corporate and XProtect Enterprise
escalation function to monitor alarms that have VMSes. It handles host event actions and pro-
the escalation option enabled. cesses alarms from the Milestone system. This
P2000 External Trigger Service – Receives mes- service is not involved in video playback.
sages from external systems to be used as P2000 MIS Interface Service – Imports and
P2000 host event triggers. exports data for the MIS Interface. See MIS
P2000 Genetec Security Center Interface Service Interface on page 365.
– Performs communications between the P2000 Muster Control Service – Monitors the
P2000 Server and the Genetec™ Security Cen- status of all muster zones, and when a muster
ter (GSC) VMS. It handles host event actions is initiated, controls all the activities of the
and processes alarms from the GSC system. muster.
P2000 Guard Tour Service – Starts Guard Tour P2000 Nice Interface Service – Performs com-
Service and receives real-time event messages munications between the P2000 Server and the
from RTLRoute services. See Guard Tour on Nice™ VMS. It handles host event actions and
page 374. processes alarms from the Nice system. This
P2000 HID Interface Service – Provides the service is not involved in video playback, and
communication between the P2000 Server and is not supported in this release.
HID panels.

24-10832-194 Rev. E
431

P2000 OnSSI Interface Service – Performs com- P2000 Request Queue Service – Processes
munications between the P2000 Server and the request queue entries into the P2000 database.
OnSSI® VMS. It handles host event actions
and processes alarms from the OnSSI system. P2000 RTL Route Service – Routes all real-time
This service is not involved in video playback, messages to workstations and services. Also
and is not supported in this release. processes host events.

P2000 OPC Proxy Service – Provides the com- P2000 S321-IP Interface Service – Provides the
munication between P2000 applications and communication between the P2000 Server and
certain servers, such as the CCTV Server or S321-IP panels.
the OPC Server.
P2000 SIA Interface Service – Provides the
P2000 OSI Interface Service – Provides the communication with configured SIA devices.
interface between the P2000 system and the
OSI system. P2000 Smart Download Service – Downloads
badges to panels when changes are made to
P2000 Otis Interface Service – Provides the access groups and terminal groups. It also
interface between the P2000 system and the downloads cardholder and badge changes. In
Otis Compass Destination Entry elevator sys- addition, controls badges with temporary
tem. The P2000 Server acts as a message
access.
router for the messages going between the Otis
system and CK721-A panels. P2000 SNMP Trap Receiver Service – Receives
P2000 Periodic Service – Performs periodic SNMP traps from the Metasys system, trans-
tasks such as deleting old history, synchroniz- lates them to the P2000 alarm structure, and
ing time of panels with server, and enabling or sends them to RTL Route Service.
disabling badges based upon badge start and P2000 System Adapter Service – Provides the
void dates. communication between the P2000 Server and
P2000 pivCLASS Interface Service – Provides the P2000 Web UI software to allow access
the communication between the P2000 Server and use of certain P2000 applications via a
and the pivCLASS system with respect to web browser. The System Adapter Service
events generated at the pivCLASS system. transmits system configuration data; as well as
audit, alarm, and transaction messages to be
P2000 Rapid Eye Interface Service – Performs
accessed from the Web UI; and in turn, the
communications between the P2000 Server
P2000 Server receives item actions and alarm
and Honeywell® Rapid Eye® DVRs. It han-
actions performed using the Web UI.
dles host event actions and processes alarms
from the Rapid Eye DVR. This service is not P2000 Watchdog Service – Monitors other
involved in video playback, and is not sup- P2000 services to verify that they are operat-
ported in this release. ing and generates an alarm when a P2000 ser-
P2000 Remote Message Service – Receives vice fails.
messages from the local RTL Route Service
P2000 XmlRpc Interface Service – Provides
and transmits these messages to the remote
communication over the network, using the
P2000 Remote Message Service. When receiv-
XML-RPC interface to communicate with
ing a remote message, the local Remote Mes-
remote devices such as building management
sage Service processes the message and passes
components designed for Metasys system inte-
it on to the local RTL Route Service for distri-
gration, or with Web Access servers.
bution to the local workstations.

24-10832-194 Rev. E
432 CHAPTER 5
System Maintenance

P2000 XPortal Interface Service – Performs


communications between the P2000 Server
and the Pelco VMS (Endura). It handles host
event actions and processes alarms from the
Pelco system. This interface service uses Pelco
API that does not support H.264 cameras. This
service is not involved in video playback, and
is not supported in this release.

Starting and Stopping Service


Control
Service controls are provided specifically to
stop and restart communications between pan-
The Service Control dialog box displays all
els and the Server to perform system mainte-
services installed in the system, along with
nance functions, or during network trouble-
the Server name and its current status
shooting operations. For example, the system
(Stopped or Running).
administrator would be required to stop all
communication services between panels and 2. Click All, then click Stop or Start. If you
the Server when performing a P2000 version click Stop, all services stop and no com-
upgrade; or could stop uploads only between munication occurs between the Server and
panels and the Server as part of system trouble- the panels. If you click Start, all services
shooting. start running again.
3. Click Done.
Note: If you restart the SQL Server, after
reconnecting you may have to restart P2000 ser- To Stop or Start a Specific Service
vices and possibly the P2000 application.
1. Select the service to be stopped (or started)
from the scrolling list and click Stop (or
Service Control should be used only as Start). Only the services selected stop (or
directed by our Technical Support personnel, start) and the Stopped (or Running) status
and should be performed only by a system displays.
administrator at the Server or workstation.
2. Click Done.

Note: The procedure to control services at Controlling Services through the


redundancy systems might be different from the Service Monitor
steps described here. Refer to your redundancy
documentation for details. The P2000 Service Monitor application is
automatically installed at the Server during ini-
tial software installation. This application is
To Stop or Start All Services represented by a traffic signal icon located in
the system tray (right side of the Windows
1. From the P2000 Main menu, select Sys- taskbar).
tem>Service Control. Enter your pass-
word if prompted. The Service Control Each color in the traffic signal represents the
dialog box opens. status of P2000 services:

24-10832-194 Rev. E
433

Red – Indicates that all services are Stopped. 3. The list box displays the following infor-
mation for each workstation:
Green – Indicates that all services are Running.
Workstation – Indicates the name given to
Yellow – Indicates that at least one service is the workstation (and the Server).
Running or one service is Stopped.
Logged In – Indicates whether or not the
When you right-click the traffic signal icon, a workstation is currently logged on.
dialog box opens where you can start, stop, User Name – Displays the name of the user
and refresh P2000 services; or open the Ser- logged on at the workstation, if the work-
vice Control dialog box. station is logged on.
Login Date Time – Displays the date and
Note: The procedure to control services at time when the user logged on at the work-
redundancy systems might be different from the station.
steps described here. Refer to your redundancy
documentation for details.
Session Type – Indicates whether this is a
P2000 Thick Client (workstations running
P2000 applications), a P2000 Thin Client
(workstations running Web Access appli-
Viewing Workstation Status cations), a P2000 Web UI (workstations
running P2000 applications using a Web
user interface), a P2000 Web API (work-
An operator can see workstation status infor-
stations running Web API services), or
mation, including the workstation’s P2000
Integration (this option is not used in this
software version installed. This is a dis-
release).
play-only feature, and is helpful to determine
who is in the system, at what workstation, at
what time they logged on, and other parame-
ters associated with the workstation. Note: Limited status information displays for
Web API workstations.

To View Workstation Status Badging – Indicates if the workstation is


1. From the P2000 Main menu, select Sys- configured as a badging workstation.
tem>Workstation Status. The Worksta- Server – Indicates the workstation that
tion Status window opens. operates as the system Server.
Version – Displays the P2000 version
installed at the workstation.
4. If you wish to log off a workstation that is
currently logged on, select the workstation
name and click Force Logoff.

2. If this is a partitioned system, select the


Note: The Force Logoff feature is not sup-
Partition that contains the workstations ported for P2000 Web UI and P2000 Web Access
you wish to view. All workstations active sessions.
in the partition are displayed.

24-10832-194 Rev. E
434 CHAPTER 5
System Maintenance

5. To update the list box with current work-


stations status, click Refresh.
6. Click Done to exit the window.

Automatic Software Updates


P2000 supports the automatic distribution of
software updates to workstations in a P2000
Security Management System. P2000 adminis-
trators can configure the P2000 Server to force
update all P2000 workstations in the system or
allow workstation operators to accept or deny The following information displays:
the update when logging into the system. The
Automatic Update feature eliminates the need Name – Name of the update. Change the
to manually update each workstation when a name, if necessary.
new P2000 software version or service pack is Version – Software version number of the
released. This feature is available for worksta- selected update.
tions running P2000 Version 3.10 and later.
Service Pack – Number of the service pack
The P2000 Server software tracks each soft- provided in the selected update.
ware update installed on the Server, providing Installed – Date and time the selected
detailed information such as the version num- update was installed on the P2000 Server.
ber, service pack number, installation date, the
location of installation files, and the actual sta- Server Path – P2000 Server directory loca-
tus of the update. tion that houses the files installed from the
update.
This function should be performed by a system
Shared Path – The shared network direc-
administrator at the Server.
tory accessible from workstations that
houses the installation files used to update
To View or Modify Software Updates the P2000 workstations.
1. From the P2000 Main menu, select Con- Command – Executable file that is started
fig>System. Enter your password, if to update the P2000 workstations.
prompted. The System Configuration win- Status – Update control setting that is used
dow opens. to configure the P2000 Server to update its
2. In the left pane, expand Site Parameters workstations according to one of the fol-
to display default system parameters. lowing options:
3. Expand Software Updates. All updates  Not Available – Prevents the P2000
currently installed on the P2000 Server are Server from updating its workstations.
listed under this option. Select this option if you wish to wait
4. To view detailed update information, select before updating the client computers.
an update in the list and click Edit. The  Optional – Allows workstation operators
Software Update dialog box opens. to accept or deny a P2000 software
update when prompted during login.

24-10832-194 Rev. E
435

IMPORTANT: The P2000 Server and its work- Viewing System Status
stations must run the same software version and
service pack. If operators deny an update to their
workstation, the P2000 software may not function The System Status window is a dynamic dis-
correctly. play of the status of panels, associated devices,
and other integration components configured
 Required – Force updates all P2000 in the system. This useful troubleshooting tool
workstations in the system. When allows you to quickly determine if panels and
selected, workstations are unable to log connected devices are communicating. If com-
on if they deny a software update. munications go down between the Server and
the panels, the System Status window reports
the last known status of the devices.
Note: After you update the P2000 Server soft- The System Status window is view only. You
ware, the system does not automatically update can manually change the status of a compo-
P2000 workstations (or prompt the operator to nent using features accessed from the Control
install the update) if the workstation operator is
menu. See Perform Operator Controls on
currently logged into the P2000 software. The
operator must log out and log back into the page 290.
P2000 system before the software can be auto-
matically updated (some platforms may require
To Access the System Status Window
users to use the Run as Administrator option
when logging on to the P2000 system for the
1. From the P2000 Main menu, select Sys-
automatic software update to work). To help
avoid mismatched software versions between the
tem>System Status. The System Status
P2000 Server and its workstations, you may per- window opens.
form a Force Logoff command, if needed, to
force the user to log off of a selected workstation;
see page 433 for details.

Note: After you update the P2000 Server soft-


ware, the default Status setting may vary accord-
ing to the type of update (for example, new
version or service pack). Always verify and
change, if necessary, the current Status setting
after each server update.

5. In the Status drop-down list, change the 2. Select a component from the drop-down
update control setting, if necessary. list at the top left of the window. Informa-
6. Click OK. tion for each component is presented start-
ing on page 438.
3. If this is a partitioned system, select the
Partition to which the component belongs.
4. Click Refresh to update the system status
display.

24-10832-194 Rev. E
436 CHAPTER 5
System Maintenance

5. To see icon definitions for the different


condition indicators, click Legend at the
bottom of the window.

Name – Displays the name given to the


Note: Unreliable icons (crossed out with a yel- panel.
low bar) indicate that the items’ parent devices Configured type – Displays the panel type.
are not functioning. For example, an input point is
marked as unreliable if its parent terminal or Firmware version – Displays the firmware
panel is down. version of the panel.
IPL version – Displays the IPL (Initial Pro-
6. Click Done to close the System Status Leg- gram Load) version of the panel.
end dialog box.
Version description – Displays the version
description of the panel.
Note: When the Message Routing Status indi- Last poll communication – Displays the last
cator at the bottom of the System Status window time the Server received information from
displays in green, it indicates that all communica- the panel.
tions between the workstation and the Server are
up. If communications go down, the Message Serial Number – Displays the serial number
Routing Status indicator turns red. assigned to the panel. Available for some
panel types.
7. To display panel information, select the # of failed download connections – Displays
panel and click Panel Details. A Panel the number of times the Server has failed
Details dialog box opens displaying current to connect to this panel.
panel information. # of failed download transfers – Displays
the number of times an in-progress transfer
was aborted.
Delay Downloads Until – Displays the time
the Server attempts the next download con-
nection to this panel.

24-10832-194 Rev. E
437

Reset Time – Click to immediately try a Name – Displays the name of the intrusion
new download connection to this panel. panel.
Counters last cleared – Displays the last Connected – Displays whether the panel is
time you clicked Reset Counters. connected.
Panel avg. clock drift (seconds) – Displays Invalid Vendor Address – Displays whether
the average time difference between the the vendor address of the intrusion panel is
Server and the panel. invalid.
Panel max clock drift (seconds) – Displays Port Opened – Displays whether the intru-
the largest time difference between the sion panel port is open.
Server and the panel.
MainsFailure – Displays whether the main-
Reset Counters – Click to reset the values tenance of the intrusion panel has failed.
to 0.
Battery Low – Displays whether the battery
8. Click Done to close the Panel Details dia- of the intrusion panel is low.
log box and return to the System Status
Battery Test – Displays whether the battery
window. of the intrusion panel is in test.
9. Click Done to close the System Status
Battery Test Fail – Displays whether the
window.
battery of the intrusion panel has failed its
test.
To Display the Status of Aritech
Battery Missing – Displays whether the bat-
Intrusion Panels
tery of the intrusion panel is missing.
1. In the System Status window, select one of Tamper – Displays whether the intrusion
the intrusion components (Intrusion Areas, panel has been tampered.
Intrusion Zones, or Intrusion Annuncia-
3. Click Done to close the Intrusion Panel
tors) from the drop-down list at the top left
Status dialog box.
of the window, the associated intrusion
panel displays.
2. Select the intrusion panel from the list box, To Display the Status of Fire Alarm
then click Panel Details. The Intrusion Panels
Panel Status dialog box opens. 1. In the System Status window, select one of
the fire alarm components (Fire Zone, Fire
Detector, or Fire IO Module) from the
drop-down list at the top left of the win-
dow, the associated fire alarm panel dis-
plays.
2. Select the fire alarm panel from the list
box, then click Panel Details. The Fire
Panel Status dialog box opens.

24-10832-194 Rev. E
438 CHAPTER 5
System Maintenance

Note: HID panels do not support the unlocked


status for terminals. System status shows over-
ride for each terminal that is in override and lock-
out mode for each terminal that is manually
locked out.

Note: The P2000 system does not monitor the


status of HI-O bus modules.

System Status – Input Terminals


Name – Displays the name of the fire alarm
When you select Input Terminals, all panels
panel.
in the system are listed by name in the Panels
Connected – Displays whether the fire column. An icon next to the panel name indi-
alarm panel is connected. cates the status of the panel.
Invalid Vendor Address – Displays whether The input terminals connected to the panels are
the vendor address of the fire alarm panel displayed in the same row as their panel, and
is invalid. are listed under the corresponding terminal
Port Opened – Displays whether the fire number assigned during configuration. The
alarm panel port is open. displayed icon indicates the status of the termi-
nal. When you place the cursor over the termi-
General Failure – Displays whether the fire
nal icon, a tooltip displays showing the termi-
alarm panel has failed.
nal name assigned.
3. Click Done to close the Fire Panel Status
dialog box.
System Status – Output Terminals

System Status – Reader Terminals When you select Output Terminals, all panels
in the system are listed by name in the Panels
When you select Reader Terminals, all panels column. An icon next to the panel name indi-
in the system are listed by name in the Panels cates the status of the panel.
column. An icon next to the panel name indi-
cates the status of the panel. The output terminals connected to the panels
are displayed in the same row as their panel,
The reader terminals connected to the panels and are listed under the corresponding terminal
are displayed in the same row as their panel, number assigned during configuration. The
and are listed under the corresponding terminal displayed icon indicates the status of the termi-
number assigned during configuration. The nal. When you place the cursor over the termi-
displayed icon indicates the status of the termi- nal icon, a tooltip displays showing the termi-
nal. When you place the cursor over the termi- nal name assigned.
nal icon, a tooltip displays showing the termi-
nal name assigned.

24-10832-194 Rev. E
439

System Status – Inputs


Note: Some panel types require that you select
When you select Inputs, all terminals and pan- the Log Output Status Message option to dis-
play outputs in the System Status list.
els in the system are listed by name in the Ter-
minals/Panels column. An icon next to the ter-
minal or panel indicates the corresponding
System Status - OTIS Elevator Status
status.
When you select OTIS Elevator Status, all
The input points connected to the terminals or
Otis elevator servers in the system are listed by
panels are displayed in the same row as their
name. The individual status icon indicates if
terminal or panel, and are listed under the cor-
the associated Otis Destination Entry Com-
responding input point number assigned
puter is Up or Down.
during configuration. The displayed icon indi-
cates the status of the input point. When you
place the cursor over the input point icon, a System Status – Mustering Zones
tooltip displays showing the input point name
assigned. When you select Mustering Zones, the sys-
tem displays the zone status of each Muster
All input points above 16 are reserved for Soft Zone; see Muster Zone Status and Control
inputs. You can expand the size of the window Field Definitions on page 313.
to view these inputs (up to 25). A status icon is
represented for each possible input state. If no
System Status – Security Level
icons are present, no input points are associ-
Terminals
ated with the terminal or panel.
When you select Security Level Terminals,
all panels that have security level terminals in
Note: You can display the status of Mercury the system are listed by name in the Panels
Input Points and Mercury Output Points only if column. An icon next to the panel name indi-
they are associated with P2000 inputs or outputs. cates the status of the panel.

All security level terminals are displayed in


System Status – Outputs the same row as their panel and are listed
under the corresponding terminal number
When you select Outputs, all terminals in the assigned during configuration. The display
system are listed by name in the Terminals col- shows the security level setting for each termi-
umn. An icon next to the terminal indicates the nal. A number 0 indicates the security level is
status of the terminal. not used or is not assigned.
The output points connected to the terminals
are displayed in the same row as their terminal,
and are listed under the corresponding output
point number assigned during configuration.
The displayed icon indicates the status of the
output point. When you place the cursor over
the output point icon, a tooltip displays show-
ing the output point name assigned.

24-10832-194 Rev. E
440 CHAPTER 5
System Maintenance

System Status – Intrusion Areas


Note: When a Mercury intrusion area is dis-
When you select Intrusion Areas, all intrusion armed, and some zones were faulted but are now
normal, the area still remains in the alarmed
panels in the system are listed by name under
state. To get the area back to the normal state,
the Intrusion Panel column. An icon next to the you must disarm the area from the MRDT keypad
intrusion panel name indicates the status of the terminal or from the Intrusion Control window, see
panel. Controlling Intrusion Items Using the Intrusion
Control Window on page 328.
All intrusion areas associated with the intru-
sion panel are displayed in the same row as
their panel, and are listed under the corre- Disarm – (Bosch) Disarms the selected area
sponding intrusion area number assigned and silences the associated keypad.
during configuration. The displayed icon indi-
cates the status of the intrusion area. When you System Status – Intrusion Zones
place the cursor over the intrusion area icon, a
tooltip displays showing the intrusion area When you select Intrusion Zones, all intru-
name assigned.You can issue commands for sion panels in the system are listed by name
the areas by right-clicking the associated status under the Intrusion Panel column. An icon
icon. The following commands may be avail- next to the intrusion panel name indicates the
able, depending on the current state of the area: status of the panel.

Arm – (Aritech) Arms the selected area if at the All intrusion zones associated with the intru-
time that you issue the command the area’s sion panel are displayed in the same row as
state permits it. their panel, and are listed under the corre-
sponding intrusion zone number assigned
Arm – (Bosch) Arms the selected area after a during configuration. The displayed icon indi-
delay, and if the area’s state permits it. cates the status of the intrusion zone. When
you place the cursor over the intrusion zone
Arm – (Mercury) Arms the selected area with a
icon, a tooltip displays showing the intrusion
pre-configured delay.
zone name assigned.You can issue commands
Forced Arm – (Aritech) Arms the selected area for the zones by right-clicking the associated
regardless of the area’s state at the time when status icon. The following commands may be
you issue the command. available, depending on the current state of the
zone:
Forced Arm – (Bosch) Arms the selected area
immediately. Bypass On – Commands the selected zone to
be bypassed.
Disarm – (Aritech and Mercury) Disarms the
selected area. Bypass Off – Turns off bypassing of the
selected zone.

Reset – (Not supported by Bosch or Mercury)


Resets the state of the selected zone. If you
issue this command while the input point is
still in alarm because it is still being unsealed,
you must seal the input and send this command
again to reset it.

24-10832-194 Rev. E
441

ResetAck – (Not supported by Bosch or Mer- System Status – Fire Zone


cury) Resets the state of the selected zone. If
When you select Fire Zone, all fire panels in
you issue this command while the input point
the system are listed by name under the Fire
is still in alarm because it is still being
Panel column. An icon next to the fire panel
unsealed, there is no need to re-send the com-
name indicates the status of the panel.
mand after the input is sealed. The command
remains valid and resets the zone as soon as All fire zones associated with the fire panel are
the input seals. displayed in the same row as their panel, and
are listed under the corresponding fire zone
number assigned during configuration. You
System Status – Intrusion
can display the status of up to 20 fire zones per
Annunciators
row. If more than 20 fire zones are defined,
When you select Intrusion Annunciators, all they display in the following rows. The dis-
intrusion panels in the system are listed by played icon indicates the status of the fire
name under the Intrusion Panel column. An zone. When you place the cursor over the fire
icon next to the intrusion panel name indicates zone icon, a tooltip displays showing the fire
the status of the panel. (Annunciators are not zone name assigned.
supported with Mercury panels.)

All intrusion annunciators associated with the System Status – Fire Detector
intrusion panel are displayed in the same row
When you select Fire Detector, all fire panels
as their panel, and are listed under the corre-
in the system are listed by name under the Fire
sponding intrusion annunciator number Panel column. An icon next to the fire panel
assigned during configuration. The displayed name indicates the status of the panel.
icon indicates the status of the intrusion
annunciator. When you place the cursor over All fire detectors associated with the fire panel
the intrusion annunciator icon, a tooltip dis- are displayed in the same row as their panel,
plays showing the intrusion annunciator name and are listed under the corresponding fire
assigned.You can issue commands for the detector number assigned during configura-
annunciators by right-clicking the associated tion. You can display the status of up to 20 fire
status icon. The following commands may be detectors per row. If more than 20 fire detec-
available, depending on the current state of the tors are defined, they display in the following
annunciator: rows. The displayed icon indicates the status
of the fire detector. When you place the cursor
Activate – Activates the selected annunciator.
over the fire detector icon, a tooltip displays
Deactivate – Deactivates the selected annunci- showing the fire detector name assigned.
ator.
System Status – Fire IO Module

When you select Fire IO Module, all fire pan-


els in the system are listed by name under the
Fire Panel column. An icon next to the fire
panel name indicates the status of the panel.

24-10832-194 Rev. E
442 CHAPTER 5
System Maintenance

All fire input/output modules associated with The Wireless Parameters display can be sorted
the fire panel are displayed in the same row as by any column by clicking the desired column
their panel, and are listed under the corre- header.
sponding fire input/output module number
assigned during configuration. You can display Green bars indicate that the OSI devices are
the status of up to 20 fire input/output modules operating within acceptable parameters. Yel-
per row. low bars indicate a weakness in the devices
(you may want to investigate further to deter-
If more than 20 fire input/output modules are mine the cause and if corrective action is
defined, they display in the following rows. required). Red bars indicate a fatal breakdown
The displayed icon indicates the status of the in the OSI devices.
fire input/output module.
The display indicates the following status val-
When you place the cursor over the fire ues for each OSI reader:
input/output module icon, a tooltip displays
showing the fire input/output module name Portal Signal Strength and Reader Signal
assigned. Strength – These values indicate the Radio
Frequency (RF) signal level being received by
the portal and reader respectively as measured
System Status – Wireless Parameters in decibel milliwatts (dBm). The signal level is
affected by the distance between the portal and
In addition to the normal Up, Down, or Over-
reader and the type number of obstructions
ride status of OSI devices, you can also verify
between the portal and reader. Walls and doors
status values of OSI devices that are related to
between the portal and reader reduce the signal
the wireless signal they receive. When you
level especially if they contain metal. A signal
select Wireless Parameters, the list box dis-
level of -50 dBm or higher is considered good.
plays the signal strength, packet ratio, and bat-
A signal level of -70 to -50 dBm is considered
tery voltage values that are reported by the OSI
marginal. A signal level of below -70 dBm is
devices.
considered unacceptable and needs to be cor-
These parameters are only updated by the rected to ensure proper operation. Improving
reader about every 30 minutes (to conserve signal strength is a physical installation issue
battery power). The System Status window and is different for every installation. Tech-
automatically refreshes itself approximately niques for improving signal strength include
every 30 seconds. reducing the distance from portal to reader,
moving the portal to a location with fewer
obstructions between it and the reader, install-
ing additional portals, and changing the portal
antenna to a high-gain directional antenna.

24-10832-194 Rev. E
443

Portal Packet Ratio and Reader Packet Ratio –


Note: The OSI portal has the capability to com-
These values indicate the ratio of good to municate with the reader over 16 different RF
invalid data packets received from the wireless channels or frequency bands. These channels
signal as measured in percentage. The packet can be configured through the Web UI of the por-
ratio is affected by signal strength and external tal. By default, all 16 channels are enabled in the
interference. A packet ratio of 50 to 100% is portal. The portal uses the first configured chan-
considered good. A packet ratio of 30 to 50% nel that it finds available. The reader scans
through all 16 channels until it is able to establish
is marginal and should be improved for opti-
communication with the portal over that channel.
mum operation. A packet ratio of less than By enabling only one or two channels on the por-
30% is considered unacceptable and may pre- tal, you can control the frequency bands used for
vent proper operation. If both the portal and communication. Using a different channel may
reader are reporting good signal strength levels isolate the portal and reader from the interfering
but either the portal or reader is reporting a frequency. In particular, channels 25 and 26 are
poor packet ratio, it usually indicates some outside the frequency bands used by Wi-Fi net-
works and therefore good choices if a Wi-Fi net-
type of interference. Typical causes of interfer-
work is suspected to be causing your
ence are electrical noise from other electrical interference.
equipment (large electrical motors or micro-
wave ovens), nearby strong RF transmissions
(radio or TV station transmitting antennas), or System Status - Integration
other wireless equipment or networks (Wi-Fi Components
wireless networks or cordless phones). Mov-
ing the portal to a different position further Select Integration Components from the
away from interfering sources may help. drop-down list to display the status of certain
Another solution may be to change the RF third-party components configured in the sys-
channels used by the portal for communicating tem. The status column indicates one of the
with the readers. following possible states:

Battery Voltage – This value indicates the cur- Unknown – The status of the component has
rent voltage from the reader’s batteries. As the not yet been determined.
batteries are depleted, the reported voltage
drops. Weak batteries can affect the wireless Up – The P2000 system is able to communi-
communication if the reader is seeing low sig- cate with the component.
nal strength or if there is large amounts of Down – The P2000 system is unable to com-
interference. If the voltage drops too low, the municate with the component.
reader shuts down. A voltage of 5.0 volts or
higher is considered good. A voltage of 4.5 to Disabled – The P2000 system has been
5.0 volts is considered marginal and the batter- instructed not to communicate with the com-
ies should be replaced soon. A voltage of ponent.
below 4.5 volts is considered unacceptable and
the batteries must be replaced as soon as possi- Unavailable – The status of the component is
ble or the reader may shutdown. not available.

External Voltage – Displays the voltage of the


external power supply.

24-10832-194 Rev. E
444 CHAPTER 5
System Maintenance

Writing Panel Database to To Manually Write Panel Database to


Flash Memory
Flash Memory
1. From the P2000 Main menu, select Sys-
tem>Write DB To Flash. Enter your pass-
With the Write DB To Flash function, you can
word if prompted. The Write DB to Flash
manually archive the panel’s RAM data more
dialog box opens.
frequently as major changes are made to the
system database. For example, if you delete
several badges from the system, it would be
appropriate to write the panel’s RAM data to
flash memory. That way, if the RAM data is
lost, (before the system performs the scheduled
automatic backup), the most recent saved flash
memory contains the latest badge information.
2. Select the Panel To Write from the
This function is available for CK721-A and drop-down list.
Mercury panels. 3. Click Write. All data stored in the panel’s
RAM is backed up to its flash memory.
4. Click Done.
Note: The system automatically backs up and
stores CK721-A panels’ RAM based database at
the panel level flash memory, according to their
automatic backup schedule; see Backup DB to
Updating CK721-A Panels
Flash Interval on the General Tab on page 55.

This function updates CK721-A panel and ter-


For CK721-A panels, you must always per- minal firmware. Johnson Controls provides the
form this function after: update file, along with documented instruc-
tions. This function should be performed only
 Adding or deleting RDR2S-A or RDR8S
by a system administrator at the Server.
terminals.
 Modifying general parameters of existing This function requires the login names and
RDR2S-A or RDR8S terminals (except passwords of all panels in the system. You can
Name, Public, or Query String fields). find the default panel name and password in
 Adding or deleting RDR2S-A or RDR8S the panel’s Installation and Operation manual.
input or output points. If you changed your panel’s login name, you
must enter the new name and password to per-
Since the data stored at each panel is different, form this function.
you must perform this procedure for each
panel in the system.
Note: Johnson Controls delivers each version
upgrade with separate documented instructions
(Software Release Notes). Be sure to read and
follow all specific upgrade documentation instruc-
tions before performing an update.

24-10832-194 Rev. E
445

6. Select the file. The file name displays in


IMPORTANT: While updating firmware on an the Update File field.
encrypted CK721-A panel, you may need to
promptly answer queries generated by the 7. Enter the Panel Login Name as pro-
WinSCP application to allow the operation to grammed at the panel.
proceed. Failing to provide a prompt answer may
result in no firmware update. You may have to 8. Enter the Panel Password as programmed
close and reopen the Update CK721-A Panels at the panel.
application to proceed. This message may or
9. Click Update. The information contained
may not display again once you provide the
answer. Enter in lowercase u (to update), or in
in the update file is downloaded to the
some instances y (yes to accept). panel or terminal selected. This process
may take several minutes.

To Update CK721-A Panels and IMPORTANT: If you get a “processing script


Terminals file” error message, contact Technical Support to
obtain a new update file.
1. From the P2000 Main menu, select Sys-
tem>Update CK721-A Panels. Enter
your password if prompted. The Update Note: The firmware update process requires
CK721-A Panels dialog box opens. waiting for the current terminal firmware update
to complete before proceeding to update the next
terminal. Do not attempt to update multiple termi-
nals at the same time.

10. After the update process is complete,


select another terminal name and type, and
then click Update.

Note: During the terminal firmware update pro-


cess, all terminals connected to a CK721-A panel
go offline. The offline terminals may allow access
if you enabled the Facility Code Only when
Offline flag.
2. Select the Panel To Update from the
drop-down list.
11. After the update process is complete, click
3. The Terminal to Update drop-down list Done to close the dialog box.
displays all the terminals connected to the
panel selected. Select the terminal name Note: After a panel version upgrade, open the
you wish to update. If you do not wish to System Status window to check the status of the
update terminal firmware, select None. panel. If the panel shows a panel version mis-
match condition indicator, you must open the
4. If you select to update a specific terminal, Edit Panel dialog box to change the panel's type
you must select the Terminal Type that to the updated panel's firmware version. Then
you wish to update. wait until the panel indicator shows up in the Sys-
5. Click Browse to navigate to the directory in tem Status window.
which the update file resides. Refer to the
Software Release Notes for download 12. Follow the procedure on page 425 to
details. download data items to the recently
updated panel.

24-10832-194 Rev. E
446 CHAPTER 5
System Maintenance

Updating Mercury Panels 2. Select the Panel To Update from the


drop-down list.
3. The Terminal to Update drop-down list
Use this function to update Mercury panel and displays the terminals that are connected to
terminal firmware. Johnson Controls provides the selected panel. If you wish to update
the update files. This function should be per- terminal firmware, select the terminal from
formed only by a system administrator at the the list. If you wish to update the panel
Server. firmware, select None.

Note: Some version upgrades may be deliv-


ered with separate documented instructions. In IMPORTANT: You can only update terminal
that case, be sure to read and follow all specific firmware if encryption is disabled at the panel.
upgrade documentation instructions before per-
forming an update.
4. If you select to update a specific terminal,
the Terminal Type displays the type of the
To Update Mercury Panels and selected terminal.
Terminals

Note: We do not provide terminal firmware


upgrades for Schlage PIM, Schlage ENGAGE, or
IMPORTANT: The panel must be online during Aperio 1 to 8 Hub terminals.
the update process. Also, the Message Routing
Status indicator at the bottom of the Update Mer-
cury Panels window must display in green to indi- 5. The Current Firmware Version displays
cate that all communications are up and that the the version of the selected panel, or of the
RTL Route service is running. If the Message selected terminal, if you are updating ter-
Routing Status indicator turns red, the list box on
minal firmware.
the right side cannot display any of the actions or
responses associated with the update. 6. Click Browse to navigate to the directory
in which the update file resides. Refer to
1. From the P2000 Main menu, select Sys- the Software Release Notes for download
tem>Update Mercury Panels. Enter your details.
password if prompted. The Update Mer- 7. Select the file. The file name displays in
cury Panels dialog box opens. the Update File field.
8. The New Firmware Version field displays
the expected firmware version number
after analyzing the file name provided in
step 7.
9. Click Update. The information contained
in the update file is downloaded to the
panel or terminal selected. The list box on
the right side displays actions and
responses associated with the update. The
update process may take several minutes.

24-10832-194 Rev. E
447

10. After the update process is complete and if If you scheduled functions such as Database
you wish to update another terminal, click Backup or Empty Audit History to occur auto-
Reset to clear the information, select matically, you can use the tasks in Database
another terminal, and then click Update. Maintenance to override the system and per-
11. After the update process is complete, click form manual maintenance.
Done to close the dialog box.
To Perform Database Maintenance
Functions
Note: After a panel version upgrade, open the
Panel Details dialog box in the System Status 1. From the P2000 Main menu, select Sys-
window to verify the correct panel firmware ver- tem>Database Maintenance. Enter your
sion. password if prompted. The Database
Maintenance dialog box opens.
12. Follow the procedure on page 425 to
download data items to the recently
updated panel.

Note: Make sure you select the Reset Panel


Before Download flag when performing the first
full download after a firmware update.

Performing Database
Maintenance

You can perform a database backup, empty


various data histories, load an archived data-
base from backup, or reset event counters from 2. Under Maintenance Action, select the
the Database Maintenance dialog box. This function you wish to perform. See Data-
function is password protected and should be base Maintenance Actions for a descrip-
accessible only by a system administrator or a tion of each function.
designee. 3. Click Perform. A confirming message box
displays. Depending on your selection,
click the appropriate action.
Note: Some Database Maintenance tasks,
4. Click Exit.
such as Shrink Database, can only be per-
formed by operators that are members of the
Windows or PEGASYS Administrators group; see
Set Up User Accounts on page 29.

24-10832-194 Rev. E
448 CHAPTER 5
System Maintenance

Database Maintenance Actions Delete Selected Alarm – Deletes the selected


alarm from the database.
Backup and Restore – Allows you to back up
or restore the selected database. Delete Unique Badge Entries – Deletes cached
badge information that is specific to the read-
ers connected to the selected HID panel. Delet-
Note: For more information on backup and ing this data requires that all badges are down-
restore functions, see Database Backup on loaded again to the specified panel to allow for
page 451. correct operation of that panel.

Delete Unused Access Groups – Deletes all


Calculate Digital Signature – Validates the digi- unused access groups (access groups not
tal signatures, points out discrepancies, and assigned to any badge) from the database.
corrects the discrepancies to ensure that
records have a valid digital signature. This Delete Visitors Without Badges – Deletes all
function is available if your facility uses the visitors who have no assigned badges from the
FDA Part 11 feature. See FDA Part 11 on database.
page 392 and System Validation on page 457.
Empty Alarms – Removes all alarms from the
CK721-A/S321-IP Data Import and Export – alarm queue. This action is typically performed
Imports and exports CK721-A and S321-IP when the queue displays alarms that cannot be
hardware configuration data in Comma Sepa- secured, and thus cannot be discarded. You
rated Values (CSV) file format. See CK721-A must run Item Synchronization (see page 464)
and S321-IP Data Import and Export on to complete this task.
page 458 for details.

Delete all badges from OSI database – Deletes


all badges from the OSI database.
IMPORTANT: The Empty Alarms action does
not remove selected alarms. The system deletes
all alarms, so proceed with caution.
Delete all hardware from OSI database – Deletes
all hardware from the OSI database.
Empty Alarms History – Deletes all alarms in
Delete Expired Visitor Badges – Deletes all visi- the Alarms History database table.
tor badges that have expired from the database.
You must specify the number of days after
which expired visitor badges are deleted, and
select if you wish to download the information
IMPORTANT: The Empty Alarms History and
Empty Audit History actions should only be per-
to the panels. Each visitor badge has a Visitor formed with the aid of a Johnson Controls Techni-
Validity Period (defined in Site Parameters), cal Support specialist.
during which the badge is valid.
Empty Archive Database – Removes the data
from the Archive Database. This database is
used for running P2000 reports.

Empty Audit History – Purges all audit history


data from the database. The audit history data
contains time and date stamped records of user
actions.

24-10832-194 Rev. E
449

Empty Download Queue – Purges the actions Item Synchronization – Synchronizes data
from the Download Queue. This queue down- stored and consumed by the Web UI with
loads P2000 data to selected panels. This func- P2000 configuration data, including associated
tion is typically performed when a panel is no status and alarms. See Item Synchronization
longer in use, but the queue still lists down- on page 464.
loads for that panel.
Kill All Reports – Attempts to stop all database
Empty Fire Data – Purges all fire alarm panel queries issued by a P2000 report. This is help-
data from the database. ful if an operator accidentally tries to run an
extreme report, such as all transaction history
Empty Guard Tour Note – Purges all guard tour for the last two years. This action is not guar-
notes from the P2000 database. You can con- anteed to work in all cases.
figure the P2000 system to remove these notes
after a predetermined amount of time; see Load Archive Database from Backup – Loads
Guard Tour Notes on page 387. the data from the Archive Database. This data-
base is used for running P2000 reports.
Empty Saved Muster Data – Purges all muster
data from the database. This data is normally Mark Secondary Tables – Marks the starting
saved to the database for evaluation once a point of FDA data for later analysis.
muster is terminated.
Remove Access Groups from Disabled Badges
Empty Smart Download Queue – Purges the – Removes access groups from disabled
actions from the Smart Download Queue. For badges. This in turn allows the Delete Unused
more information, see Controlling Smart Access Groups command to be used more effi-
Download on page 427. ciently.

Empty Transaction History – Purges the Trans- Remove Expired Access Groups from Badges –
action History data from the database. Trans- Removes from badges any access group
actions indicate some form of system activity. assignment that is past the void day defined in
They can include items like access requests its Temporary Access Period. The void time
and general system messages, such as when a defined in the Temporary Access Period does
panel loses communication with a reader. Typ- not apply.
ically, transactions represent communication
initiated at field panels and sent to the P2000 Reset Counters to Zero – Resets all values in
Server. the Event Counters list to zero. For informa-
tion, see Counting Events on page 340.

Reset Reserved Autobadge Numbers – Resets


IMPORTANT: This action should only be per- these numbers, making them available for
formed with the aid of a Johnson Controls Techni- assignment. A reserved autobadge number is a
cal Support specialist. number that has already been assigned, but a
badge has not yet been issued.
FDA Backup Performed – Informs the P2000
system that the FDA backup is archived, in
accordance with company policies to meet
FDA Part 11 record retention policy. For more
information, see FDA Part 11 Backups on
page 454.

24-10832-194 Rev. E
450 CHAPTER 5
System Maintenance

Set all Input Status to Unknown – Used if a


panel is down (for example, for maintenance)
IMPORTANT: This action should only be per-
formed with the aid of a Johnson Controls Techni-
and alarms are being generated. cal Support specialist because it can cause
transactions to be processed multiple times.
Set all Output Status to Unknown – Used if a
panel is down (for example, for maintenance)
and alarms are being generated. Update Database Default Strings – Causes all
default data in the database (such as Super
Set all Panel Status to Unknown – Used if a User partition, Super User menu permission
panel is down (for example, for maintenance) group, default icon image set names, and so
and alarms are being generated. on) to be rewritten to the database in the cur-
rent P2000 language. This task is to be used on
Set all Terminal Status to Unknown – Used if a
P2000 systems operating in a foreign language.
panel is down (for example, for maintenance)
and alarms are being generated. Update Preprocessed Report Archive tables –
Runs a preprocessed report against an archived
Set Computer Default Language – Allows you
database.
to change the P2000 default language for all
users using this computer. This also sets the Update Preprocessed Report tables – Updates
language in which the P2000 services operate. preprocessed report tables manually. Normally,
This task is to be used on P2000 systems oper- this process occurs automatically each night.
ating in a foreign language. However, if the data has changed and you wish
to run a preprocessed report with current data,
Shrink Database – Commands SQL Server to
you may manually start this process.
free up space in the database. This process is
normally performed automatically at various Validate Digital Signature – Ensures the integ-
intervals. rity of all records and provides evidence when
records have been altered. A digital signature
Sync cardholder/badge active flags – Synchro-
verifies that unauthorized users have not modi-
nizes the cardholder/badge active flags, in case
fied the values in the columns of a record. This
this uncommon problem occurs.
function is available if your facility uses the
Synchronize OSI Transaction Counter – Sets the FDA Part 11 feature. See FDA Part 11 on
P2000 transaction counter to the last transac- page 392 and System Validation on page 457.
tion currently in the OSI WAMS database. It
would typically be used only if the OSI WAMS
database was destroyed and recreated. You
must stop the P2000 OSI Interface Service
before performing this task. After you run the
task, restart the P2000 OSI Interface Service.

24-10832-194 Rev. E
451

Database Backup Configuring a Backup Device

The P2000 system should be backed up on a 1. From the System Configuration window,
regular basis. Backups can be performed using select Site Parameters and click Edit.
several supplied methods, and can be made to The Edit Site Parameters dialog box opens.
any backup device supported by Microsoft 2. Click the Retention Policy tab.
SQL Server.

The following databases are automatically cre- Note: You must use the P2000 server to config-
ated at the P2000 server: ure a backup device where automatic backup files
are saved. Automatic backups (see page 453) are
Pegasys – P2000 configuration data such as performed using host event actions. If your P2000
cardholders and hardware devices. system is deployed on a distributed environment
(the P2000 server is hosted on two separate com-
BadgeImages – Cardholder images. puters), you must use Microsoft SQL Server tools
to define the backup device to use for P2000
JCISecurityConfig – Configuration data and backup functions.
alarms stored and consumed by the Web UI.

Note: The P2000 Web UI is a web-based soft-


ware from Johnson Controls that allows autho-
rized users to access and use certain P2000
applications via a web browser.

JCISecurityCase – Case Manager database that


is stored and consumed by the Web UI.

JCISecurityHistory – History messages stored


and consumed by the Web UI.

All databases should be backed up frequently,


with the exception of BadgeImages that should
only be backed up when cardholder images are
modified. Backups can be performed without 3. At the bottom of the window, select a
stopping the P2000 communication services; Backup Device from the drop-down list. If
therefore, the system remains operational there are no devices on the list, or you want
during the backup process. This function to add a new one, click Config Device. The
should be performed by a system administra- Backup Devices dialog box opens.
tor.

Note: To back up badge layout files, refer to


the Video Imaging manual that was shipped with
your option.

24-10832-194 Rev. E
452 CHAPTER 5
System Maintenance

4. Click Add. The Config Backup Device Manual Backups


dialog box opens.
1. From the P2000 Main menu, select Sys-
tem>Database Maintenance. Enter your
password if prompted. The Database Main-
tenance dialog box opens.

5. Enter a descriptive Name for the device.


6. Select the Type of backup device from the
drop-down list. Options include: Disk and
Tape.
7. If you select Disk, enter in the Disk File
box, a valid path and file name for the 2. Select Backup and Restore from the
backup file. The specified path must exist Maintenance Action list.
on the SQL Server computer. The backup 3. Click Perform. At the verification mes-
file is created in that path on the DB server, sage, click Yes if you wish to perform the
not on the P2000 server. backup operation. You cannot reverse this
8. If you select Tape, select from the action. The P2000 Database Backup &
drop-down list in the Tape Drive box, the Restore dialog box opens. See Advanced
name of the tape device. Backups for details.
9. Click OK to save your settings. The new 4. Click Exit to close the Database Mainte-
device is listed in the Backup Devices dia- nance dialog box.
log box and also displays in the Backup
Device drop-down list of the Edit Site Advanced Backups
Parameters dialog box.
10. To remove a device, select it and click You can access the P2000 Database Backup &
Delete. Restore application from your Windows desk-
top.
11. Click Done to close the Backup Devices
dialog box.
Note: Backups can only be performed at the
server.

24-10832-194 Rev. E
453

1. From your Windows desktop, select 7. Click Create Backup to start backup. The
Start>Programs>Johnson Controls> progress of the backup process is indicated
P2000>Database Backup. The P2000 and whether there are Success or Failed
Database Backup & Restore dialog box items.
opens. 8. Click View Details to open the Log file.

The Log screen displays messages that can


be saved to analyze your backups.
9. Click Save Logs and enter the name the
2. Make sure the Backup tab is selected.
Log file. Click Save.
3. Select the database or databases you wish
10. Click Close.
to backup.
11. Close the P2000 Database Backup &
4. Verify that the Backup Location is correct
Restore dialog box.
or click [...] to select a different location.

Automatic Backups
IMPORTANT: Restoring backup files from the You can configure backups as P2000 event
Windows desktop folder is not supported. We
recommend saving your backup files to your local
actions to allow automatic backups, based on a
drive. time setting or any other P2000 event trigger.
See Create Events on page 335 for more infor-
mation. For example, you can program an
5. Click Initialize media on backup if an
event to back up the database (the action)
existing backup should be overwritten or
every Friday at 5:00 P.M. (the trigger).
appended.
6. Click Format the backup files before
creating new if you wish to reformat the Note: You must configure a backup device
(see page 451) to define the location where auto-
existing backup media. matic backup files are saved.

24-10832-194 Rev. E
454 CHAPTER 5
System Maintenance

FDA Part 11 Backups

Depending on the parameters defined in the


Retention Policy tab of Site Parameters
(page 39), you must perform periodic backups
to comply with FDA Part 11 record retention
requirements. Backups must be done using the
standard backup procedures described in Data-
base Backup on page 451.

Once the backup process has been completed,


use the following steps to inform the P2000
system that the backup is archived, in accor-
dance with your company policies to meet
FDA Part 11 record retention policy.

1. From the P2000 Main menu, select Sys-


tem>Database Maintenance. Enter your
password if prompted. The Database Main-
tenance dialog box opens.

Program this event trigger, as you would any


other event triggers in the system, giving it a
descriptive name, and selecting a partition and
time zone. Make sure you select AND in the
Trigger Logic field to create more than one
condition to be met to activate this trigger.

Define two conditions in the Triggers box:


first, select the Day of the Week condition to
be equal to Friday, and then select a Time con-
2. Select FDA Backup Performed from the
dition to be equal to 5:00 P.M.
Maintenance Action list.
In the Actions box, define two actions: one to 3. Click Perform. At the verification mes-
back up the Data database, and the second to sage, click Yes to inform the P2000 system
back up the Images database. Make sure you that an FDA backup was performed. You
select Category Host and Type Backup Data- cannot reverse this action.
base in the Action dialog box.

24-10832-194 Rev. E
455

4. A message displays to confirm that you You must also shut down the P2000 Service
have just completed a backup, which will Monitor application at the Server. Do this by
be archived according to your company right clicking the traffic signal icon located in
policies to meet FDA Part 11 record reten- the system tray (right side of the Windows
tion requirements. Click OK to confirm. taskbar), if it exists, and selecting Quit from
The system updates the Last FDA Backup the menu. You can restart all P2000 communi-
field in the Retention Policy tab of Site cation services and applications after the
Parameters (see page 39), to match the cur- restore process finishes. We recommend that
rent system date. Any FDA Retention Pol- all panels in the system be downloaded imme-
icy alarms will change their alarm status to diately after a database restore; see Download-
Secure. ing Data to Panels on page 425.
5. Click Exit to close the Database Mainte-
nance dialog box.
IMPORTANT: After restoring the P2000 data-
base from a previous version, we recommend
Database Restore using the Load Language Reports function to
load the current reporting format into the data-
Under normal operating conditions, you do not base tables. Be aware that some legacy hardware
need to restore the P2000 databases, but if the configuration items may not be properly reported.
databases are lost, you can restore them from a
recent backup, using the P2000 Database
Backup & Restore application. You can also To Restore the Database
restore an older P2000 database to an archive
1. From your Windows desktop, select
database for the purpose of printing reports or
Start>Programs>Johnson Controls>
examining old settings, without affecting the
P2000>Database Backup. The P2000
currently active P2000 system.
Database Backup & Restore dialog box
opens.

IMPORTANT: Use the Server to restore the


database. If you restore the database to a differ-
ent Server other than where it was originally
backed up, you need to contact Technical Sup-
port for a new Registration Key, and you also
need to reconfigure your Server (DB and
COMM); see Site Parameters on page 32.

You can only perform a non-archive restore


after closing all P2000 applications on all
workstations and the Server, and after stopping
the P2000 communication services; see Start-
ing and Stopping Service Control on page 432.

24-10832-194 Rev. E
456 CHAPTER 5
System Maintenance

2. Make sure the Restore tab is selected. 12. Click Restore to start the restore process.
3. From the Select Database drop-down list, The progress of the restore process is indi-
select the database you wish to restore. cated and whether there are Success or
Failed items.
4. Click [...] to select the Backup Location
path and backup file name you wish to 13. Click View Details to open the Log file.
restore.

IMPORTANT: Restoring backup files from the


Windows desktop folder is not supported.

5. Click View Contents. The Backup Con-


tents dialog box opens. Select the backup
number you wish to restore, and click OK.
6. Click Add to add the selected database to
the list.
7. If you wish to add another database to the
list, select the database from the Select
Database drop-down list, click [...] to
select the Backup Location path and
backup file name, then click View Con-
tents to select the backup number, and The Log screen displays messages that can
click Add to add the selected database to be saved to analyze your restores.
the list.
14. Click Save Logs and enter the name the
8. If you wish to remove a database from the Log file. Click Save.
list, select the database and click Remove.
To remove all databases from the list, click 15. Click Close.
Clear. 16. Close the P2000 Database Backup &
9. Click Restore to archive to place the data- Restore dialog box.
base in an offline location, that way reports
can be generated using its data without
affecting the currently operating system. Note: After you restore the database, use the
Service Startup Configuration application to
10. If you wish to convert the restored data- enable or disable P2000 services and also to
base to the current version, click Convert define the related recovery actions that were set
to current version after restore. up before the database restore; see page 428.
You must also restart IIS on the P2000 server, on
11. Click Restore from foreign backup to
the P2000 Web API server, and on the P2000
force SQL Server to load a database, Web UI server, if those are installed on separate
regardless of where it was created, nor- web servers. To complete the operation, you must
mally only backups created on the current also restart all P2000 services and applications.
computer can be restored. Use this option
only when instructed to do so.

24-10832-194 Rev. E
457

System Validation
As a system administrator, you should sched-
ule validation of your system on a regular
basis to minimize the possibility of record
tampering. The Validate Digital Signature fea-
ture ensures the integrity of all records and
provides evidence when records have been
altered. This function is available if your facil-
ity uses the FDA Part 11 feature. See FDA Part
11 on page 392.

Note: A digital signature verifies that unautho-


rized users have not modified the values in the
columns of a record.

1. From the P2000 Main menu, select Sys-


tem>Database Maintenance. Enter your
password when prompted. The Database
Maintenance dialog box opens.

4. Select the database table you wish to ver-


ify. You can select to verify multiple
tables, or click Select All to verify all
tables at once.
5. To clear your selections, click Unselect
All.
6. To verify secondary database tables, click
Validate secondary table(s) to add the
secondary tables to the selection list.
7. Click Perform to start the validation.

2. Select Validate Digital Signature from


the Maintenance Action list.
3. Click Perform. The Validate Digital Sig-
nature dialog box opens.

24-10832-194 Rev. E
458 CHAPTER 5
System Maintenance

11. Click Exit to close the Database Mainte-


nance dialog box.

Note: In addition to using the Validate Digital


Signature function, you can also use the Calcu-
late Digital Signature function, which not only
validates the digital signatures and points out dis-
crepancies, but also corrects the discrepancies to
ensure that records have a valid digital signature.

CK721-A and S321-IP Data


Import and Export
The list box displays the following infor-
mation: This feature allows you to import and export
CK721-A and S321-IP hardware configuration
Table – The name of the table being vali- data, which reduces the commissioning time
dated. required to enter this information during con-
Invalid – The number of invalid signatures figuration. You can preconfigure panels, termi-
found in the table. nals, time schedules, access groups, and other
configuration settings using a standard Micro-
Name – The name of the record, for exam-
soft Excel spreadsheet.
ple cardholder or panel name, as defined in
the applicable P2000 application. Operators must have the appropriate menu per-
GUID – The Global unique identifier of the missions to use this feature and must also
record. belong to the Super User partition.
Date/Time – The date and time when modi-
fication took place. Only applicable for
secondary tables, that is tables with the suf- Note: This feature does not eliminate the con-
figuration process; it eliminates the need for
fix _save. entering some data during the configuration.
Mode – The type of modification per-
formed, such as delete (0), edit (1), or
insert (2). Importing CK721-A and S321-IP Data
Total Number of Invalid Signatures – The To import data into the P2000 database, you
number of records that have been tampered must obtain the XLS file provided by a
with. Johnson Controls representative (via the AIM
8. Click Export to save the results in a file. tools). The column names in the XLS file must
This result file can be easily imported into, be exactly the same as the ones listed under the
for example a Microsoft Excel® file, and Name column in the following table.
formatted according to your requirements.
9. Click Cancel to close the dialog box.
10. Click Cancel to return to the Database
Maintenance dialog box.

24-10832-194 Rev. E
459

To be
used
Item Name Value Type during
import to
P2000
1 DOOR LOCATION per Plans & Specs Text No
(Read Only Column) Make changes in
Sales View
2 READER LOCATION per Plans & Specs Text No
(Read Only Column) Make changes in
Sales View
3 Entry Method Selection from a list of: No
 Card In
 Free Entry
 NA
4 Exit Method Selection from a list of: No
 NA
 Free Egress
 Free Egress-Local Alarm
 Card Out
 REX Motion
 REX Motion with Backup Egress Button
 REX Motion with Backup Panic Bar
 Delayed Egress
 Panic Bar
5 Reader Entry_Exit Designation Selection from a list of: Yes
 Access
 Entry
 Exit
6 Logical Terminal # Numeric value between 1 - 64 or Unused (for Yes
CK721A)
Numeric value between 1 - 2 or Unused (for
S321IP)
Note: When “Unused” is entered as a value for
the Logical Terminal #, the data on that row is not
be imported.
7 Hardware Module # (Physical Address) Numeric value between 0 - 31 Yes
8 Reader Terminal Index Numeric value between 1 - 8 Yes
9 Supervisory Controller Part # Selection: Yes
 CK721A
 S321IP
10 Supervisory Controller RS485 Trunk # Selection: No
(CK722 Only)  A
 B
 NA
11 Supervisory Controller Program Tag Text – Up to 32 characters taken from text pro- Yes
(Panel Name) vided on the import file and must be within the
P2000 system.
12 Supervisory Controller Physical Location Text Yes
13 Supervisory Controller IP Address (Also IP Address format (###.###.###.###) Yes
for S321_IP)
14 Supervisory Controller MAC Address MAC Address format (hh.hh.hh.hh.hh.hh) Yes
15 Door Controller Physical Location Text – Up to 64 characters taken from text pro- Yes
vided on the import file.

24-10832-194 Rev. E
460 CHAPTER 5
System Maintenance

To be
used
Item Name Value Type during
import to
P2000
16 Door Controller Program Tag Text – Up to 32 characters taken from text pro- Yes
vided on the import file and must be within the
P2000 system.
17 Door Controller Part # Selection: Yes
 RDR2SA
 RDR8S
 S321IP
18 Access Group Text – List of access group names separated by Yes
semicolon (;). Each name can be up to 32 char-
acters.
19 Time Schedule Text – Up to 32 characters taken from text pro- Yes
vided on the import file.
20 Card Type Text – Selection of the following card types, sepa- Yes
rated by semicolons (;), S321-IP supports one
card type and CK721-A supports multiple card
types.
CK721-A: Standard Wiegand, Encrypted Wie-
gand, Binary BaFe, Mag Stripe, Invert Data, PIN
Only, Card ID, HID Corporate 1000, BCD BaFe,
26-bit Wiegand Inverted, Eyecam-Prox-Indala,
PIN + Card ID, 26 bit Sensor Forward, 26 bit Sen-
sor Reverse, 32 bit Motorola, <Custom> name of
the first 8 CK721-A card formats defined in the
database. FASC-N and UUID card types are not
supported with the Data Import and Export fea-
ture.
S321-IP: HID Corporate 1000, Cardkey Stan-
dard, Cardkey Magstripe, Sensor 26 Bit, Raw 128
Bit (requires number of bits to use), <Custom>
card formats defined in the database.
21 Metasys Interlock Text No
22 P2000 Map Reference Text No
23 Door Template Packages Text No
24 Comments Text No
25 Facility Code 1 Numeric Text for CK721-A. Ignored for S321IP. Yes
26 Facility Code Type 1 Selection for CK721-A: Wiegand, N-Crypt, Mag Yes
Stripe, Custom. Ignored for S321IP.
Note: Item 10 to be used in future release.

24-10832-194 Rev. E
461

After you enter the information in the XLS


file, save the file as a Comma Separated Val-
ues (CSV) file, and then copy the CSV file to a
location that is accessible to the P2000 system.

IMPORTANT: P2000 names in the imported


data file must not contain any of the following
characters: @ (at sign), . (period), ? (question 4. Click Import Data.
mark), * (asterisk), $ (dollar), # (pound), : (colon),
5. Click Browse to navigate to the location of
; (semicolon), ' (apostrophe), [ (open bracket), ]
(close bracket), or , (comma). the CSV file. Select the desired file.
6. The File Name displays the name of the
CSV file.
To Import CK721-A and S321-IP Data
7. Click Run. The Results window opens.
1. From the P2000 Main menu, select Sys- See the following section for details.
tem>Database Maintenance. Enter your
password if prompted. The Database Evaluating Imported Data
Maintenance dialog box opens.
The Results window provides additional secu-
rity, allowing you to evaluate all imported data
before it is added to the P2000 database. You
can review identified problems and decide
whether to proceed with the operation or
address any of the identified issues.

1. After you click Run in the CK721-A/


S321-IP Import and Export dialog box, the
Results window opens.
2. Click Evaluate to evaluate the data in the
import file.
The import process starts by validating the
data before the records are saved in the
database. Once the evaluation is com-
pleted, the Results window opens display-
ing information associated with the
2. Select CK721-A/S321-IP Data Import imported data.
and Export from the Maintenance Action
list. The screen is divided into two main
frames. The left frame displays the evalu-
ated data in a hierarchy tree format, show-
Note: Make sure that all P2000 services are ing panel to terminal relations. You need to
running. select and expand each item in the tree to
view the details.
3. Click Perform. The CK721-A/S321-IP
Import and Export dialog box opens.

24-10832-194 Rev. E
462 CHAPTER 5
System Maintenance

Each item is associated with one of the fol- 3. Click Commit to save the evaluated data
lowing icons to indicate the validity of the into the P2000 database. At the verification
imported data. message, click Yes if you wish to perform
the import operation. You cannot reverse
this action. Only the records without errors
or warnings are saved. Verify that:
 the Real Time List displays audit mes-
sages associated with this operation
The right frame displays error or warning  the System Configuration displays the
messages associated with a selected item. new panels and terminal names
The Status box displays the following  the System Status shows the status of
information: the panels and terminals
Record Count – Indicates the number of
records read from the import file or P2000 Note: When importing S321-IP panels, the
database. P2000 S321-IP Interface Service automatically
restarts after you click Commit.
Error Count – Indicates the number of
errors found in the import file.
4. Click Save if you wish to save all mes-
Warning Count – Indicates the number of sages into a log file. See Saving the Log
warnings found in the import file. File on page 463 for details.
5. The Cancel button stops the processing of
Note: These counts display the total number of the specific task. For example, if you click
errors and warnings associated with the evalu- Cancel while evaluating, this action causes
ated data displayed in the in the left frame. You all evaluated data to be lost. Cancelling the
may have to expand each parent item to identify Save Log operation simply stops writing to
each error or warning. the log file. Cancelling the Commit opera-
tion stops saving the records, but does not
roll back any of the saved data and requires
re-evaluation of the import file.

24-10832-194 Rev. E
463

Saving the Log File

During the evaluation process, the system may


generate error and warning messages that can
be saved to further analyze the problems, cor-
rect mistakes, and improve the import process.

To Save the Log File

1. After you click Evaluate in the Results


window, the screen displays the evaluated
data together with any error or warning
messages associated with a selected item.
2. To save the error or warning messages,
click Save Log. The Log File dialog box
opens.
2. Select CK721-A/S321-IP Data Import
and Export from the Maintenance Action
list.

Note: Make sure that all P2000 services are


3. Click Browse to navigate to the location running.
where you want to save the log file; enter
the name of the log file. 3. Click Perform. The CK721-A/S321-IP
4. The File Name displays the name of the Import and Export dialog box opens.
log file.
5. Click Save to save the error information
displayed in the Results window.
6. Click Exit to close.

Exporting CK721-A and S321-IP Data

Use this feature to export existing CK721-A


4. Click Export Data.
and S321-IP data to an external system.
5. Click Browse to navigate to the location of
the CSV file and select the desired file, or
To Export CK721-A and S321-IP Data enter the location and file name.
1. From the P2000 Main menu, select Sys- 6. The File Name displays the name of the
tem>Database Maintenance. Enter your CSV file.
password if prompted. The Database 7. Click Run. The Results window opens.
Maintenance dialog box opens. See the following section for details.

24-10832-194 Rev. E
464 CHAPTER 5
System Maintenance

Evaluating Exported Data You can run this tool from the P2000 server or
workstation to add P2000 data that does not
The Results window provides additional secu- exist in the Web UI, update P2000 data that
rity by letting you verify all records before already exists in the Web UI, or remove data
they can be exported to an external system. from the Web UI that no longer exists in the
You can review identified problems and decide P2000 database. This ensures data shared by
whether you wish to proceed with the opera- both systems is simultaneously updated with
tion or address any of the identified issues. current changes initiated by the P2000 system.
1. After you click Run in the CK721-A/
S321-IP Import and Export dialog box, the Note: To run Item Synchronization on a work-
Results window opens. station, you must install SSL Certificate of Server
on the workstation.
2. Click Evaluate to retrieve CK721-A or
S321-IP panel related records from the
We recommend you run the Item Synchroniza-
P2000 database.
tion tool under special circumstances, such as:
The export process starts by validating the
 after upgrading your P2000 system to use
data before it is exported to an external
the P2000 Web UI for the first time
system. Once the evaluation is completed,
the Results window opens displaying infor-  if the P2000 database has been restored, or
mation associated with the exported data.  if the Web UI configuration database has
3. Click Commit to save the evaluated data been restored
into the selected export file (if the export Make sure the P2000 System Adapter Ser-
file name exists, it is overwritten). At the vice is up and running, see Starting and Stop-
verification message, click Yes if you wish ping Service Control on page 432.
to perform the export operation. You can-
not reverse this action. The P2000 software provides two synchroniza-
tion methods:
4. Click Exit to close the window.
Fast – All items in the following list, and that
are affected by audit messages are synchro-
Item Synchronization nized starting on the date selected.
The Item Synchronization tool allows you to  CK721-A panels, terminals, input and
synchronize data stored and consumed by the output points
Web UI with P2000 configuration data, includ-  Mercury panels, terminals, input and
ing associated status and alarms. Only opera- output points
tors that belong to the Super User partition can
 S321-IP panels, terminals, input and
run this tool.
output points
 AV switches and cameras
 Fire servers, detectors, IO modules,
Note: The P2000 Web UI is a web-based soft-
ware from Johnson Controls that allows autho-
zones, and devices
rized users to access and use certain P2000  SNMP objects
applications via a web browser.  Host events
 Event counters
 Intrusion components

24-10832-194 Rev. E
465

Fast synchronization also updates status 4. If not already selected, click the Fast tab.
changes associated with panels, terminals, 5. Click the SyncConfig From Date Time
inputs, outputs, intrusion, and fire alarms. down arrow and select a specific date after
Detailed – Only selected items are synchro- which data stored and consumed by the
nized. You can select specific items, such as Web UI is synchronized with P2000 data.
panels, terminals, inputs, outputs and so on, to
synchronize only those items selected.
Note: Select a day or time before you enter a
P2000 item. For example if you enter an item on
Note: The synchronization is supported only 09/23/2015, select 09/22/2015.
one way – only the database used by the Web UI
is synchronized and not the P2000 database, 6. Click Synchronize, then click OK when
which is the master database. prompted. The process may take several
minutes. The progress bar shows the prog-
ress of the synchronization process. If you
To Perform a Fast Item Synchronization
wish to cancel the process, click Cancel.
1. From the P2000 Main menu, select Sys-
tem>Database Maintenance. Enter your
password if prompted. The Database Note: The Cancel button is available after you
Maintenance dialog box opens. click the Synchronize button, and is only used to
cancel the process, and not to close the window.
2. Select Item Synchronization from the
Maintenance Action list.
7. When the synchronization process is com-
3. Click Perform. At the verification mes- plete, click OK and close the Item Syn-
sage, click Yes if you wish to perform the chronization dialog box. Data stored by the
synchronization operation. You cannot Web UI is now updated with P2000 con-
reverse this action. The Item Synchroniza- figuration data.
tion dialog box opens.

To Perform a Detailed Item


Synchronization

1. From the P2000 Main menu, select Sys-


tem>Database Maintenance. Enter your
password if prompted. The Database
Maintenance dialog box opens.
2. Select Item Synchronization from the
Maintenance Action list.
3. Click Perform. At the verification mes-
sage, click Yes if you wish to perform the
synchronization operation. You cannot
reverse this action. The Item Synchroniza-
tion dialog box opens.
4. Click the Detailed tab.

24-10832-194 Rev. E
466 CHAPTER 5
System Maintenance

7. When the synchronization process is com-


plete, click OK and close the Item Syn-
chronization dialog box. Data stored by the
Web UI is now updated with P2000 config-
uration data.

Viewing Request Queue

The P2000 system provides a Request Queue


database table that contains requests originated
from external sources, such as Web Access
requests (see Web Access on page 406).

Since external requests involve adding, delet-


ing, or modifying data in the P2000 database,
the Request Queue has been designed to pro-
vide additional security measures in the
The list box displays in a hierarchical tree request processing by checking all records
format the P2000 objects that can be syn- before they are allowed to enter the P2000 sys-
chronized with the Web UI. The root of the tem.
P2000 objects is All; the All parent object
contains two top-level objects: Items and The Request Queue allows P2000 operators to
Alarms. intercept requests for the purpose of reviewing,
editing, and finally letting request data enter
5. Click the plus sign (+) for expanding items the P2000 database system. The requests are
in the tree and the minus sign (-) for col- packaged as XML documents and saved into
lapsing or hiding items in the tree. If you the P2000 Request Queue table.
click a check box for a parent object, all its
children objects are also selected. You can Once these requests enter the P2000 database,
clear all check boxes and select only the a system administrator can use the Request
objects you wish to synchronize. Queue View application to resolve Request
6. After you make your selections, click Syn- Queue-related problems. The Request Queue
chronize, then click OK when prompted. View window displays current requests or
The process may take several minutes. The requests that were archived in the Request
progress bar shows the progress of the syn- Queue database table. This tool is useful to, for
chronization process. If you wish to cancel example, verify which requests are pending for
the process, click Cancel. an approval, which requests have been com-
pleted, or have been rejected.

Note: The Cancel button is available after you


click the Synchronize button, and is only used to Note: The amount of time that request records
cancel the process, and not to close the window. are kept in the Request Queue history table is
defined in Site Parameters; see Retention Policy
Tab on page 39.

24-10832-194 Rev. E
467

To View Request Queue Items  Pending Approval 1 – The request is


waiting to be approved by the required
1. From the P2000 Main menu, select Sys- approver.
tem>Request Queue View. The Request
Queue View dialog box opens.  Pending Approval 2 – The request was
approved by Approver 1, and requires
The list box displays the following infor- approval of a second approver.
mation for each of the requests:
 Pending Approval 3 – The request was
Create Time – Displays the date and time approved by Approvers 1 and 2, and
the request was submitted. requires approval of a third approver.
Expire Time – Displays the date and time  Processing – The request is currently
the request expires. This date is defined by being processed.
the number of days entered in Expiration  Ready for Auto Processing – The request
Period for Requests, see Defining Web has been approved and is ready for auto-
Access Options on page 408. matic processing; without operator
Sender – Displays the source that origi- intervention.
nated the request.  Ready for Manual Processing – The
request has been approved and is ready
Details – Displays the Sender application
for manual processing.
requested for processing.
 Rejected – The request was rejected.
Operation – Displays the action (Add,
Delete, Update) requested and that is asso- Last Name – Displays the last name of the
ciated with the Sender application. cardholder specified in the request.

Status – Displays one of the following: First Name – Displays the first name of the
cardholder specified in the request.
 Cancelled – The request was cancelled
before being processed. 2. To display the details of a specific request,
select the line item in the list box and click
 Committed – The request has been com-
View. See Viewing Request Details on
pleted.
page 469.
 Error – There is an error in the request.

24-10832-194 Rev. E
468 CHAPTER 5
System Maintenance

3. To cancel a specific request, select the line 2. Enter a Sender name to view only requests
item in the list box and click Cancel; then that were originated from that source.
click Yes to confirm. 3. Select from the Status drop-down list the
4. To update the Request Queue View list box specific request status you wish to view.
with new data, click Refresh. For example, you may want to review only
5. To search for specific requests, click Filter requests that have been rejected or requests
and follow the instructions provided at the that require manual processing.
end of this section. 4. To view requests submitted for a specific
6. Click Done to close the Request Queue cardholder, enter the First Name or Last
View dialog box. Name of that cardholder.
5. To view requests that were submitted
during a specific period, select a Begin
Searching Specific Requests Date and End Date. You may also enter a
The Request Queue View application allows specific time if needed.
you to define filters to help you locate specific 6. In the Type drop-down list, select whether
requests quickly and easily, and in that way you wish to view requests that are cur-
reduce the number of requests displayed on rently on Queue or requests that are
screen. You can define, for instance, a filter to archived in the History table.
show only requests that were submitted on a 7. In the Max Count field, enter the number
specific date and that are waiting for manual of records you wish to display in the list.
processing.
8. Click OK to begin the search. The Request
1. In the Request Queue View dialog box, Queue View dialog box opens showing the
click Filter. The Filter dialog box opens. If requests that meet the filter criteria and the
you leave an asterisk (*) in a field, the filter number of requests found.
criteria includes all records for that field.
9. To display the details of a specific request,
select the line item in the list box and click
View. See the next section Viewing
Request Details.
10. To restore the list to display all requests,
you can either close and then open the
Request Queue View dialog box, or click
Filter and select to display all requests.

24-10832-194 Rev. E
469

Filter Criteria

Requests
matching the
Filter Criteria

Number of Requests found

Viewing Request Details The XML document contains information


about the originator of the request and infor-
1. In the Request Queue View dialog box, mation about the actual request.
select the individual request you wish to
display and click View. The Request View The top left side of the window offers two
window opens displaying information in viewing options:
XML format.  Original – Displays request information,
as it was originally submitted.
 Modified – Displays modified request
information. For example, if a request is
rejected, the requester can edit the
request to correct errors and then resub-
mit the request for processing.
2. After reviewing the request details, click
Done to close the window.

24-10832-194 Rev. E
470 CHAPTER 5
System Maintenance

24-10832-194 Rev. E
471

Chapter 6: System Reports

T
he P2000 Report feature gives you Using P2000 Standard
access to system data. Whether you
want a printout of cardholder informa-
Reports
tion or a list of specific system transac-
tions, there is most likely a P2000 standard P2000 standard reports provide the fields you
report that can meet your needs. P2000 stan- need to generate reports on system databases
dard reports are created using SAP® Crystal and activities. When you run a report, the
Reports® and can be sorted to produce the data report displays on a SAP Crystal Reports pre-
you need. See page 474 for a complete list of view window. You can use the options in the
these reports, a brief description of each, and toolbar at the top of the window to scroll
how to use them. Also, later in this chapter you through pages of the report, resize the window,
can find some commonly used reports, includ- or search for a specific record.
ing samples of each.

If you do not find a report that meets your


needs, you can create custom reports using Note: The Load Language Reports feature in
SAP Crystal Reports and then import them into the Report menu allows you to load reports in dif-
ferent languages. Use this feature if you have
the P2000 system. You can also export a P2000
installed the P2000 Foreign Language Pack in
standard report into SAP Crystal Reports for your system. When you select Report>Load
editing, and then import it back into the P2000 Language Reports from the P2000 Main menu,
system. a dialog box opens where you select the desired
language (previously installed from the foreign
language pack media), then click Load to load
the SAP Crystal Reports template into the data-
Note: While P2000 standard reports are very base. Once the selected language reports are
easy to understand and run, custom reports loaded you do not need to perform this procedure
should be created by someone experienced with again. You may have to modify some translated
report design and operation. You must have your reports using SAP Crystal Reports to fix truncated
own copy of SAP Crystal Reports to create a cus- text issues. In addition, because of a parameter
tom report. See Creating Custom Reports on value limitation in SAP Crystal Reports, some
page 486 for more information. reports have been hard-coded and have not been
translated, these reports also need to be modified
This section includes the following topics: using SAP Crystal Reports.

 Using P2000 Standard Reports


 P2000 Standard Report Definitions
 Selected Sample Reports
 Creating Custom Reports

24-10832-194 Rev. E
472 CHAPTER 6
System Reports

To Run a Standard Report 5. Click Run. Some reports have no specific


options and display directly in the preview
1. From the P2000 Main menu, select window after you click Run and enter the
Report>Run Report. The Run Report dia- printer options. Most reports, however,
log box opens. have several filtering options and present a
dialog box in which to select your choices.

6. To run the default report, which lists all


records, leave the asterisk in the field box.
7. To run a report on a specific option, choose
the option from the drop-down list. (See
Selected Sample Reports on page 479 for
detailed instructions.)
8. Click OK. Select a printer name and any
other printer setup information.

2. If your system is partitioned, select the


Partition that contains the data you want Note: You must configure a default printer to
retain the fonts displayed on a report. It is not
to report on. Also, the list box only dis- required to have a printer physically connected to
plays the report names that belong to the the workstation; you only need to set up the
partition selected. default printer. Do not use Generic Text printers.
The No Printer option in the Print Setup dialog
3. Select the name of the report you wish to
box displays P2000 reports correctly and is
run. selected by default if you have not installed any
4. Select the Database source. Select Nor- printer drivers. Alternatively, you can manually
mal to generate the report from the current select the No Printer option if you have installed
system database; you can also select to run one or more drivers, but you want to use a generic
printer driver.
the report from an archived database.
9. Click OK. After a moment, the report dis-
plays in the preview window, as shown on
Note: Before you run any Preprocessed the following page.
report against an archived database, you must
perform the Update Preprocessed Report 10. Click the Printer icon to print the report.
Archive tables task from the Database Mainte- (To use this option, you must set up your
nance application; see page 447. system to communicate with a printer. If
you need more information, see your sys-
tem administrator.)

24-10832-194 Rev. E
473

Go to
Export Report
next page

Go to
last page
Print
Report Go to
previous page Stop
Loading

Close Go to Go to Page Search


first page Field Box Text

Report Record (fields depend


on report and options selected)
Report
Title

24-10832-194 Rev. E
474 CHAPTER 6
System Reports

P2000 Standard Report To get the fullest benefit of this powerful fea-
ture, we recommend you read through the
Definitions entire list to get a complete understanding of
what is available.
Following is a list of all P2000 standard reports
Access Group – Lists all terminals, terminal
along with a brief description of each default
groups, floor groups, and door groups by
configuration. Any time you select an asterisk
access group.
(*) in a field, the report includes all records for
that field. Some reports provide options to fil- Access Template – Lists the details of all
ter and limit the search, and some present access templates created in the system.
check boxes listing all available values for a
field, allowing you to select multiple items. Alarm Activity - Simple – Lists alarm activities
in a simpler format than the Alarm Activity
If you use the Partition feature, report data is Log report. You can list all alarm activities or
restricted to the partition selected from the Run select specific alarm category, type, descrip-
Report window. However, some reports ignore tion, associated alarm item; as well as date and
the partition selected and may report data time beginning and ending periods.
across all partitions, unless you select a spe-
cific partition name within the specific report Alarm Activity Log – Lists all alarm activities,
to limit the data. or you can select specific alarm category, type,
description, associated alarm item; as well as
In addition, when running any of the audit, date and time beginning and ending periods.
alarm, or transaction history reports, you have
the option of selecting to report transactions at Alarm History – Lists all alarm history in the
your local site or you can enter the name of the system or you can select specific alarm cate-
remote site that you want to report on. gory, type, description, associated alarm item;
as well as date and time beginning and ending
Preprocessed reports display current data. Any periods. See an example of this report in the
changes made to database items in a Prepro- Selected Sample Reports section.
cessed report are not reflected until the follow-
ing day, unless you manually update the report Alarm History - Input Point – Similar to the
table using the Update Preprocessed Report Alarm History report, except that it only dis-
tables task in Database Maintenance; see plays panel input point alarms, and groups
page 447. them together by their associated terminal, fol-
lowed by input point. The alarms are listed for
Also, report names that start with RAW are each input point chronologically. This report
duplicates of existing reports, with the differ- allows users to see a list of alarms and state
ence that these RAW reports have been format- changes for the input points that are configured
ted to be exported into an Excel spreadsheet. in the system.
The preview window for these reports may not
display correctly, but the resulting Excel Alarm Instruction – Lists all alarm instructions
spreadsheet contains valid data. and associated text created in the system.

24-10832-194 Rev. E
475

Alarm Response Text – Lists all response text All Cardholders to Floor/Door - Preprocessed –
created in the system. Lists all cardholders and the floors or doors
assigned to each.
All Access Groups to Door – Lists all access
groups and the door terminals assigned to All Cardholders to Floor/Door Group - Prepro-
each. cessed – Lists all cardholders and the floor or
door groups assigned to each.
All Access Groups to Elevator/Cabinet – Lists
all access groups and the elevators or cabinets All Cardholders to Terminal Group - Prepro-
assigned to each. cessed – Lists by terminal group all cardhold-
ers that have access to that terminal group.
All Access Groups to Floor/Door – Lists all
access groups and the floors or doors assigned All Cardholders to Timezone – Lists by time
to each. zone all cardholders assigned to that time
zone.
All Access Groups to Floor/Door Group – Lists
all access groups and the floor or door groups All Cardholders with Executive – Lists the
assigned to each. names of all cardholders with executive privi-
leges.
All Access Groups to Terminal Group – Lists all
access groups and the terminal groups All Doors to Cardholder - Preprocessed – Lists
assigned. by cardholder name all doors and access
groups assigned to the cardholder.
All Areas to Cardholder - Preprocessed – Lists
by cardholder name, all areas the cardholder All Elevator/Cabinet to Cardholder - Prepro-
can access, and the terminal doors defined for cessed – Lists by cardholder name the eleva-
the area. tors or cabinets assigned to the cardholder.

All Cardholders to Access Group - Prepro- All Floor/Door Groups to Elevator/Cabinet –


cessed – Lists by access group the cardholders Lists by elevator or cabinet name all floor or
assigned to that access group. door groups assigned to the elevator or cabi-
net.
All Cardholders to Area - Preprocessed – Lists
by area name, the cardholders and badges that All Floor/Door Groups to Floor/Door – Lists by
have access to the area. elevator floor or cabinet door all floor or door
groups assigned to the elevator floor or cabinet
All Cardholders to Door - Preprocessed – Lists door.
by door terminal all cardholders that have
access to that terminal. All Floors/Doors to Cardholder - Preprocessed
– Lists by cardholder name all elevator floors
All Cardholders to Elevator/Cabinet - Prepro- or cabinet doors assigned to the cardholder.
cessed – Lists all cardholders and the eleva-
tors or cabinets assigned to each.

24-10832-194 Rev. E
476 CHAPTER 6
System Reports

All Terminal Groups to Door – Lists by terminal Cardholder Last Badge – Locates a cardholder
group the terminals (doors) assigned to each by last badging at a terminal (door).
group.
Cardholder Transaction History – Lists transac-
Area Configuration – Lists by area name, all tion history by cardholder, including issue
configuration information entered in the Area level and timed override parameters. You can
Configuration dialog box. select specific cardholder, badge number, ter-
minal, history type, elevator or cabinet transac-
Area Control – Lists the cardholders currently tions, begin and end dates and times.
in the area, including the total number of card-
holders for each count mode. Cardholder Transaction History - Simple – This
report is similar to the Cardholder Transaction
Area Transaction – Lists all transactions per- History report, except that it is presented in a
formed in the system for the specific area. simpler format.
Audit – Lists by operator name the menu items Cardholders - Preprocessed – Lists by card-
selected by that operator during the date and holder all personal and system information,
time period selected. including badge numbers, access groups, card
Auto-badge Number – Lists the number and sta- options, time zones, and so on. See an example
tus of the badges that were created using the of this report in the Selected Sample Reports
AutoBadge Management feature. section.

AV Camera – Lists all audio visual cameras and Cardholders - Preprocessed - with UDF – This
their associated configuration. report is similar to the Cardholders - Prepro-
cessed report, except that it lists any User
AV Dry Contact – Lists all audio visual dry con- Defined Fields (UDFs) entered for that card-
tact relays and their configuration. holder.

AV Input Point to Camera – Lists all audio Cardholders - Simple - Preprocessed – This is a
visual input to camera mappings and their con- simplified version of the Cardholders - Prepro-
figuration. cessed report that displays basic cardholder
information.
AV Monitor – Lists all audio visual monitors
and their associated configuration. Cardholders - Simple - Preprocessed - with UDF
– This report is similar to the Cardholders -
AV Summary – Lists by name all audio visual Simple report plus any UDFs entered for the
items defined in the CCTV/AV Configuration cardholder.
window.
Cardholders with Web Access - Preprocessed –
AV Switch – Lists all audio visual switches and Lists the cardholders that have been assigned
their associated configuration. with menu permissions to perform Web Access
Cardholder Entry–Exit Status – Lists cardholder functions.
information, the entry/exit times, and status of Cardholders without Badges – Finds all card-
the badge. This is useful to review cardholder holders in the system without badges assigned.
movement throughout the facility. See an example of this report in the Selected
Sample Reports section.

24-10832-194 Rev. E
477

CCTV Camera – Lists all CCTV cameras and Holiday – List all holidays configured in the
their associated configuration. system.

CCTV Monitor – Lists all CCTV monitors and Hours on Site – Lists a detailed report of a
their associated configuration. cardholder’s accumulated number of hours
present at a site.
CCTV Summary – Lists by name all CCTV
items defined in the CCTV/AV Configuration Hours on Site - Simple – Lists a summary
window. report of a cardholder’s accumulated number
of hours present at a site.
CCTV Switch – Lists all CCTV switches and
their associated configuration. Input Group – Lists by input group the associ-
ated input points and panels.
Disabled Cardholders and Badges – Lists all
cardholders that have been disabled or have Input Point – Lists by input point all configura-
disabled/inactive badges. tion information entered in the Input Point dia-
log box for all input points.
Elevator/Cabinet Configuration – Lists by ele-
vator or cabinet name all configuration infor- Input Point Disable/Suppressible – Lists all
mation entered in the Elevator or Cabinet Con- input points in the system that are disabled or
figuration dialog box for all elevators or suppressed.
cabinets.
Message Filter – Lists by message filter name
Elevator/Cabinet Transaction – Lists all trans- all the filtering information entered in the
actions performed in the system for the speci- Message Filter Configuration dialog box for
fied elevator or cabinet name. all message filters.

Events – Lists by event name all configuration Message Filter Group – Lists by message filter
information entered in the Configure Events group the message filters associated with the
dialog box, including event trigger and action message filter group.
information.
Message Forwarding – Lists the workstation
Floor/Door Group – Lists all elevator floor or names from where and to where all current
cabinet door groups and the floor or door messages are forwarded.
masks assigned to each group.
Muster Analysis – Displays by group type the
Floor/Door Mask – Lists all elevator floor or list of personnel who are within a muster zone
cabinet door masks and the floors or doors in the specified time frame, and whether it was
assigned to each. a drill or real emergency.

Floor/Door Name – Lists all elevator floors or Mustering Configuration – Lists by muster zone
cabinet doors and the floor or door numbers name, all the zone definition configuration, as
and names assigned to each. set up in the Muster Zone Definition dialog
box.
Hardware Up/Down Status – Lists the name and
status of all operating hardware. Operator – Lists all operator information
entered in the Edit Operator dialog box.

24-10832-194 Rev. E
478 CHAPTER 6
System Reports

Operator Permissions – Lists the permissions Terminal – Lists by terminal name all terminal
assigned to each operator. configuration as set up in the Terminal dialog
box.
Output Group – Lists by output group the asso-
ciated output points and panels. Terminal Groups – Lists by terminal group the
terminals associated with the terminal group.
Output Point – Lists by output point all config-
uration information entered in the Output Point Terminal Unshunted – Lists all terminals with a
dialog box for all output points. shunt time of zero.

Panel – Lists all panels in the system with their Time Zone – Lists all time zones configured for
associated configuration as set up in the Panel the system.
dialog box. See an example of this report in the
Selected Sample Reports section. Tour Configuration – Lists by tour name, all
tour definition configuration, as set up in the
Panel Card Event – Lists by panel card event Guard Tour Definition window.
name all panel card event details configured
for the system. Tour Notes – Lists all the tour notes assigned to
a specific tour name, as set up in the Guard
Remote Server – Lists all remote servers in the Tour Control window.
system with their associated configuration, as
set up in the P2000 Remote Server dialog box. Tour Transaction History – Lists all tour trans-
actions performed in the system.
Security Level Ranges – Lists the security lev-
els defined in the Security Level Range Editor Transaction History – Lists all transactions per-
dialog box. formed in the system. See an example of this
report in the Selected Sample Reports section.
Site Parameters – Lists the details of the cur-
rent site parameters as set up in System Con- Unused Active Badges – Displays a list of
figuration. active badges that have not been used during
the specified period of time.
Station – Lists by workstation all workstation
configuration. Verification – Allows for a verification of the
commissioning process by providing a list of
all hardware to be checked off by the contrac-
tor. This list includes a list of all panels in the
system and their associated terminals, inputs,
and outputs.

24-10832-194 Rev. E
479

Selected Sample Reports 2. By default, the system displays the local


Site name. If you wish to run the report on
alarms generated at a remote site, select
Following are detailed instructions on how to from the drop-down list the name of the
run reports. Once you have experimented with remote site.
these, you should have a good understanding 3. If your system is partitioned, select a spe-
of how to select options to get the results you cific Partition name, or select (*) to gather
need. data from all partitions.
Each example shows a reporting criteria win- 4. Select a specific Alarm Type to report on
dow and the associated report generated from only one alarm type in the system, or select
the configuration selected. (*) to report on all alarm types.
5. The Type ID list box displays items that
Run the Alarm History Report are associated with the selected Alarm
Type. Select a specific or multiple type IDs
The Alarm History report gives you an over- to report only on those entries selected, or
view of alarm activity throughout the system. select (*) to report on all type IDs.
You can run it for all alarm types in the system
6. Enter a Description of the alarm. You can
(the default), or select a specific alarm type.
use wildcards. For example, you can enter
You can also specify a particular date and time,
*Min Req* to report only on alarms gener-
and review only those alarms that occurred
ated when the minimum number of card-
during that time. If your system is partitioned,
holders is not present at the same time in
select the partition you want to report on. In
the specific Area.
addition, you can select to run the report for
alarms generated at your local or at a remote 7. The default Alarm Category is P2000.
site. Select a specific alarm category to report
only on the alarm category selected.
1. In the Run Report list, select Alarm His-
8. Select a Begin and End date for the alarms
tory and click Run, or double-click Alarm
you wish to see.
History. The Alarm History dialog box
opens. 9. Select a Begin and End time for the alarms
you wish to see.
10. Click OK. Select a printer name and any
other information for the printer to be
used. See your system administrator if you
need more information, or refer to your
Microsoft Windows documentation.
11. Click OK. The Alarm History report dis-
plays in the preview window. You can use
the arrows at the top of the window to
scroll forward and back through the pages;
resize the window for the best display, and
print all or single pages of the report.

24-10832-194 Rev. E
480 CHAPTER 6
System Reports

The report displays the information according The alarm is in the Alarm state and is Pending,
to the options that you selected in the Alarm that is, it has not yet been acknowledged.
History dialog box. The report filter options When the alarm is acknowledged, the report
selected for reporting display just under the shows that as another date and time-stamped
report title. The results of the report query record, with the alarm status as Acknowledged,
begin in the next section. In the example, the and the Operator Name of the person who
first record shows an alarm that came in on acknowledged the alarm. The Operator Site
11/24/2014 at 10:52:01 A.M. displays the site name from where the operator
handled the alarm.

24-10832-194 Rev. E
481

Run the Cardholders - Preprocessed 3. Select a Cardholder Type.


Report 4. If your system is partitioned, select a spe-
The Cardholders report gives you information cific Partition name, or select (*) to gather
about all the cardholders in the system. This data from all partitions.
report contains personal, badge, and access 5. Select a specific or multiple Company
information as configured in the Cardholders names, or select (*) to report on all com-
window. pany names.
6. Select a specific or multiple Department
names, or select (*) to report on all depart-
Note: Preprocessed reports display current ment names.
data. Any changes made to database items in a
Preprocessed report are not reflected until the 7. Click OK. Select a printer name and any
following day, unless you manually update the other information for the printer to be
report table using the Update Preprocessed used. See your system administrator if you
Report tables task in Database Maintenance; need more information, or refer to your
see page 447. Microsoft Windows documentation.
8. Click OK. The Cardholders report displays
1. In the Run Report list, double-click Card- in the preview window. You can use the
holders - Preprocessed. The Cardholders arrows at the top of the window to scroll
- Preprocessed dialog box opens. forward and back through the pages; resize
the window for the best display, and print
all or single pages of the report.

The top part of the record lists the cardholder’s


name and personal information, along with
Company, Department, Cardholder type, and
badge start and void dates. Sponsor informa-
tion is included if the cardholder is a visitor.
The bottom section of the record lists the
badge information associated with the card-
holder.

2. Select a First or Last name to limit the


report to a specific cardholder, or select (*)
to show all cardholder records.

24-10832-194 Rev. E
482 CHAPTER 6
System Reports

24-10832-194 Rev. E
483

Run the Cardholders without Badges 2. Select a First or Last name to limit the
Report report to a specific cardholder, or select (*)
to show all cardholder records.
The Cardholders without Badges report is use-
ful to locate cardholders who have no access 3. Select a Cardholder Type.
badges. A popular use is to locate cardholder 4. Click OK. Select a printer name and any
records that were not deleted when badges other information for the printer to be
were removed. used. See your system administrator if you
need more information, or refer to your
1. In the Run Report list, double-click Card- Microsoft Windows documentation.
holders without Badges. The Cardholders
without Badges dialog box opens. 5. Click OK. The Cardholder without Badges
report displays in the preview window.
You can use the arrows at the top of the
window to scroll forward and back through
the pages; resize the window for the best
display, and print all or single pages of the
report.

This report lists the cardholder by first and last


name, personal information, along with Com-
pany, Department, Cardholder Type, and Start
and Void dates. Sponsor information is
included if the cardholder is a visitor.

24-10832-194 Rev. E
484 CHAPTER 6
System Reports

Run the Panel Report 2. Select a Panel Name to limit the report to
a specific panel, or select (*) to show all
The Panel Report lists by panel name the com- panel records.
plete panel configuration for each panel in the
system. Or you can select a specific panel to 3. Click OK. Select a printer name and any
report only that panel’s configuration. other information for the printer to be used.
See your system administrator if you need
1. In the Run Report list, double-click Panel. more information, or refer to your Micro-
The Panel dialog box opens. soft Windows documentation.
4. Click OK. The Panel report displays in the
preview window. You can use the arrows at
the top of the window to scroll forward and
back through the pages, resize the window
for the best display, and print all or single
pages of the report.

This report lists the panels with their associ-


ated configuration. The information presented
in this report varies according to the panel
type.

24-10832-194 Rev. E
485

Run the Transaction History Report 2. By default, the system displays the local
Site name. If you wish to run the report on
One of the most commonly used reports in the transactions that were originated at a
system is the Transaction History report. This remote site, select from the drop-down list
report can list every transaction in the system, the name of the remote site.
or be filtered to list by specific Site, Partition,
Terminal, Transaction Type, History Type, 3. If your system is partitioned, select a spe-
specific Dates and Times, and any combina- cific Partition name, or select (*) to gather
tion of these. The options available for selec- data from all partitions.
tion depend on the transaction type selected. 4. Select a specific Transaction Type to
report on only one transaction type in the
1. In the Run Report list, double-click Trans- system, or select <all> to report on all
action History. The Transaction History transaction types.
dialog box opens.
5. Select a History Type. History types avail-
able from the drop-down list depend on the
selection in the Transaction Type field.
6. If available for selection, select a specific
Terminal to limit your search.
7. Select a Begin and End date for the trans-
actions you wish to see.
8. Select a Begin and End time for the trans-
actions you wish to see.
9. Click OK. Select a printer name and any
other information for the printer to be
used. See your system administrator if you
need more information, or refer to your
Microsoft Windows documentation.

24-10832-194 Rev. E
486 CHAPTER 6
System Reports

10. Click OK. The Transaction History report


Note: Advanced SAP Crystal Reports users
displays in the preview window. You can who plan to include customized queries (manu-
use the arrows at the top of the window to ally-edited queries) in their reports, should note
scroll forward and back through the pages; that to run a manually-edited query against the
resize the window for the best display, and archived database, the database name must be
print all or single pages of the report. dynamically assigned in the customized query
object using the parameter DBName. The P2000
The top of the report shows the date and time software then passes the correct database name
settings for the report and the Transaction Type to the report table in SAP Crystal Reports.
selected. Each transaction is listed as a separate
date and time stamped record of the options
Database Table Definitions
selected in the Transaction History dialog box.
To create a custom report that is compatible
with the P2000 system, refer to the P2000
Creating Custom Reports Database Table Definitions Supplement. Once
you have the field/table relationship informa-
tion, create your report according to the meth-
If you have an independent copy of SAP Crys-
ods presented in your SAP Crystal Reports
tal Reports, you can create custom reports
documentation.
using the SAP Crystal Reports software and
import them into the P2000 system. You can
also export a P2000 report into SAP Crystal To Import a Custom Report into the
Reports for editing, and then import it back P2000 System
into the P2000 system. The following sections 1. Using your SAP Crystal Reports software,
describe each method: save your custom report in <name>.rpt
 Creating a Custom Report Using SAP Crys- format and copy it to a directory that is
tal Reports accessible to the P2000 Server.
 Editing a P2000 Standard Report in SAP 2. From the P2000 Main menu, select
Crystal Reports Report>Report Configuration. The
Report Configuration dialog box opens.

Creating a Custom Report Using


SAP Crystal Reports
The P2000 system uses SAP Crystal Reports
as its report engine, which allows you to create
custom reports that are compatible with the
P2000 system. You must have your own copy
of SAP Crystal Reports, and must have access
to the field and table relationships used within
the P2000 software (see the following section
Database Table Definitions). Once you com-
plete the report, export it as an .rpt file, and 3. If your system is partitioned, select the
then import it into the P2000 system. Partition that contains the imported report.
4. Click Add. The Edit Report dialog box
opens.

24-10832-194 Rev. E
487

To Export an Existing Standard Report


from the P2000 System

1. From the P2000 Main menu, select


Report>Report Configuration. The
Report Configuration dialog box opens.
2. Select from the scrolling list the report you
wish to edit in SAP Crystal Reports.
3. Click Edit. The Edit Report dialog box
5. Enter a Name for your custom report. This
opens. The Name and Size of the selected
name displays in your Run Report list once
report display.
the report is imported.
4. Click Export. In the Save As dialog box,
6. Select Public to make this report visible to
navigate to a directory that can be accessi-
all partitions.
ble from your SAP Crystal Reports pro-
7. Click Import. gram.
8. In the Open dialog box, navigate to the
directory in which the report resides and To Edit the P2000 Report in SAP Crystal
select the report. Reports
9. Click Open, the Size of the selected report
displays. As with full custom reports, you must know
the field/table relationships for the information
10. Select the Hide check box if you do not you need before you can create new fields for
wish to display this report in the Run the report, see Database Table Definitions on
Report dialog box. Clear the Hide check page 486. After you edit and save the report in
box if for example, you wish to run this <name>.rpt format, you are ready to import
report often and therefore you want to it back into the P2000 system. Save or copy
select it from the Run Report dialog box. the new report file to a directory that is acces-
11. Click OK. The new report displays in the sible to the P2000 Server.
Report Configuration dialog box and is
also added to the Run Reports list for the 1. From the P2000 Main menu, select
partition selected. Report>Report Configuration. The
Report Configuration dialog box opens.
You can now select the report and run it as you 2. If your system is partitioned, select the
would any other standard report. Partition that contains the imported
report.
Editing a P2000 Standard Report 3. Click Add. The Edit Report dialog box
in SAP Crystal Reports opens.

A P2000 standard report may have exactly


what you need with the exception of a couple
of fields. You can export a standard report and
then import it into SAP Crystal Reports for
revision; save it in .rpt format and import it
back into the P2000 system.

24-10832-194 Rev. E
488 CHAPTER 6
System Reports

7. In the Open dialog box, navigate to the


directory in which the report resides and
select the report.
8. Click Open, the Size of the selected report
displays.
9. Select the Hide check box if you do not
wish to display this report in the Run
Report dialog box. Clear the Hide check
4. Enter a Name for your edited report. You box if for example, you wish to run this
may want to rename it something other report often and therefore you want to
than the original. This name displays in select it from the Run Report dialog box.
your Run Report list once the report is 10. Click OK. The new report displays in the
imported. Report Configuration dialog box and is
5. Select Public to make this report visible to also added to the Run Reports list for the
all partitions. partition selected.
6. Click Import. You can now select the report and run it as you
would any other standard report.

24-10832-194 Rev. E
489

Appendix A: Event Triggers/Actions

T
his section lists all Trigger Categories, AV Dry Contact Alarm – Triggers when the sys-
Trigger Types, Trigger Conditions, and tem creates or acts upon an Audio Visual Dry
Event Action Types available for Event Contact alarm.
configuration. For more information,
see Create Events on page 335. AV Motion Alarm – Triggers when the system
creates or acts upon an Audio Visual Motion
To ensure that your events work properly, we alarm.
strongly recommend that you verify if the
events you define work as you expected. Some AV System Alarm – Triggers when the system
event triggers and actions that use hardware creates or acts upon an Audio Visual System
values such as panels, terminals, inputs, or out- alarm.
puts, may not be available if your hardware AV Video Loss Alarm – Triggers when the sys-
does not support the associated functions. For tem creates or acts upon an Audio Visual
example, the Badge trigger type Panel Card Video Loss alarm.
Event Activated is only available for CK721-A
panels, whereas a Security Level action cate- Event Alarm – Triggers when the system cre-
gory is only available with panels that support ates or acts upon an Event alarm.
the Security Level feature, such as CK721-A
and S321-IP. Before programming your system FDA – Triggers when the system creates or acts
events, see Appendix C: Panel Comparison upon an FDA alarm.
Matrix for the features supported by each panel Fire Detector – Triggers when the system cre-
type, and also refer to the instructions provided ates or acts upon a fire detector alarm.
with your hardware type to ensure that the trig-
gers and actions are available to you. Fire I/O Module – Triggers when the system cre-
ates or acts upon a fire Input/Output module
alarm.
Trigger Types
Fire Zone – Triggers when the system creates
or acts upon a fire zone alarm.
Category: Alarm
Guard Tour – Triggers when the system creates
Any Alarm – Triggers when the system creates or acts upon a Guard Tour alarm.
or acts upon any alarm.
Inputs – Triggers when the system creates or
Area – Triggers when the system creates or acts acts upon an Input alarm.
upon an Area alarm.
Integration Component – Triggers when the
AV Behavior Alarm – Triggers when the system system creates or acts upon an Integration
creates or acts upon an Audio Visual Behavior Component alarm.
alarm.

24-10832-194 Rev. E
490 APPENDIX A
Event Triggers/Actions

Intercom Station – Triggers when the system Category: Area


creates or acts upon an Intercom Station alarm.
Area Maximum allowed alarm – Triggers when
Intrusion Area – Triggers when the system cre- the system sets o resets an alarm when the
ates or acts upon an Intrusion Area alarm. maximum number of cardholders allowed in
the selected Area has exceeded.
Intrusion Zone – Triggers when the system cre-
ates or acts upon an Intrusion Zone alarm. Area Minimum required alarm – Triggers when
the system sets or resets an alarm when the
Muster Aborted – Triggers when the system minimum number of cardholders is not present
creates or acts upon a Muster Aborted alarm. at the same time in the selected Area.
Muster Running – Triggers when the system
Area Pre-Maximum allowed alarm – Triggers
creates or acts upon a Muster Running alarm.
when the system sets or resets an alarm when
Muster When Disabled – Triggers when the sys- the pre-maximum number of cardholders
tem creates or acts upon a Muster When Dis- allowed in the selected Area is reached.
abled alarm.
Conditions
Muster Zone Status – Triggers when the system
creates or acts upon a Muster Zone Status  Reset
alarm.  Set

Remote Messaging Receive – Triggers when


the system generates an alarm when a remote Category: Audio-Visual
message is received.
AV Behavior Alarm – Triggers when the system
Remote Messaging Transmit – Triggers when creates or acts upon an AV Behavior alarm.
the system generates an alarm when a remote
AV Dry Contact Alarm – Triggers when the sys-
message is transmitted.
tem creates or acts upon an AV Dry Contact
SNMP Alarm – Triggers when the system cre- alarm.
ates or acts upon an SNMP alarm.
AV Motion Alarm – Triggers when the system
Timesync – Triggers when the system creates creates or acts upon an AV Motion alarm.
or acts upon a time synchronization alarm.
AV System Alarm – Triggers when the system
creates or acts upon an AV System alarm.
Conditions
AV Video Loss Alarm – Triggers when the sys-
 Alarm Category tem creates or acts upon an AV Video Loss
 Alarm State alarm.
 Date (steady state)
 Day of the Month
 Day of the Week Conditions
 Escalation Level  AV Camera Name
 Month  AV Dry Contact Name
 SNMP Object Name  AV Switch Name
 Time  Date (steady state)
 Day of the Month

24-10832-194 Rev. E
491

 Day of the Week Deny Open Door – Triggers when a panel


 Month receives a Deny Door Open message. This
 Time message is available from CK721-A panels
that have the reader flag Deny If Door Open
enabled.
Category: Audit
Executive Privilege – Triggers when the badge
Add Badge Audit – Triggers when the system presented has executive privileges; that is, it
generates an audit message because an opera- has unlimited access and bypasses all time
tor has added a badge to the system. zones and access groups.
Delete Badge Audit – Triggers when the system
Host Grant – Triggers when the cardholder
generates an audit message because an opera-
presents a badge and the host grants access.
tor has deleted a badge from the system.
Host Grant Entry – Triggers when the card-
Edit Badge Audit – Triggers when the system holder presents a badge and the host grants
generates an audit message because an opera- access at an entry reader.
tor has changed a badge in the system.
Host Grant Exit – Triggers when the cardholder
Conditions presents a badge and the host grants access at
an exit reader.
 Badge
 Badge Configuration Invalid Badge – Triggers when the badge pre-
 Badge Purpose sented at the reader is not valid.
 Badge Reason
Invalid Badge Time Zone – Triggers when the
 Cardholder
badge presented at the reader has a disabled
 Date (steady state)
time zone.
 Day of the Month
 Day of the Week Invalid Biometric – Triggers when the badge
 Month presented at the reader does not match the
 Time information at the biometric device.

Invalid Event Privilege Level – Triggers when


Category: Badge the badge presented at the reader has an
invalid privilege level.
Anti-Passback Timer On – Triggers when a
cardholder presents a badge at an anti-pass- Invalid In-X-It Status – Triggers when the card-
back reader where the timer is on. holder presents the badge at the reader in an
out-of-sequence manner; that is, two times
Central Response Timeout – Triggers when a
sequentially at an exit reader or two times
cardholder presents a badge at a Mercury
sequentially at an entry reader.
reader to which the P2000 system did not
respond within the time defined by the Central Invalid Issue Level – Triggers when the badge
Response Timeout. presented at the reader has an invalid issue
level.

Invalid Keypad Event – Triggers when the card-


holder enters an invalid keypad code.

24-10832-194 Rev. E
492 APPENDIX A
Event Triggers/Actions

Invalid PIN Code – Triggers when the card- Valid & Unauthorized Access – Triggers when
holder enters an invalid PIN code. the badge presented at the reader is valid, but
the door remains locked because further autho-
Invalid Reader – Triggers when the badge pre- rization (for example, by the guard) is
sented has no access rights assigned to the required.
reader.

Invalid Reader Time Zone – Triggers when a Conditions


cardholder presents a badge at a reader that has
 Access Group of Badge
a disabled time zone.
 Access Group of Terminal
Invalid Security Level – Triggers when the sys-  Badge
tem denies access to a badge at a reader  Badge Configuration
because of an invalid security level.  Badge Purpose
 Badge Reason
Local Grant – Triggers when the cardholder  Cardholder
presents a badge and the panel grants access.  Date (steady state)
 Day of the Month
Operator Access Denied – Triggers when a
 Day of the Week
cardholder presents a badge at a Mercury
 Month
reader and the operator has rejected the access
 Panel Name
request.
 Terminal Index
Operator Access Request – Triggers when a  Terminal Name
cardholder presents a badge at a Mercury  Time
reader and the operator needs to be consulted  Timezone Active
to either grant or deny the access request.

Panel Card Event Activated – Triggers when the


Note: You can also use numeric UDFs as
cardholder presents a badge at a reader and badge conditions to activate a trigger.
activates a panel card event.

Panel Card Event Deactivated – Triggers when


the cardholder presents a badge at a reader and Category: Counter
deactivates a panel card event. Triggers when the selected counter reaches the
Soft In-X-It Violation – Triggers when the badge specified value.
presented generates an entry/exit violation;
that is, the system grants access but creates an Condition
error message.
 Value
Use Limit Exceeded – Triggers when a card-
holder presents a badge at a Mercury reader
but the maximum number of times that the
Category: External Trigger
Mercury panel can grant access to this badge is Database – Triggers when an external input in
exceeded. the form of a database write has been sent to
the P2000 system to trigger a host event.

24-10832-194 Rev. E
493

File – Triggers when an external input in the Fire IO Module Disabled – Triggers when the
form of an ASCII file has been sent to the fire Input/Output module enters the disabled
P2000 system to trigger a host event. state.

RS232 – Triggers when an external input in the Fire IO Module Enabled – Triggers when the
form of an RS232 serial message has been sent fire Input/Output module enters the enabled
to the P2000 system to trigger a host event. state.

TCPIP – Triggers when an external input in the Fire IO Module Pre Alarmed – Triggers when
form of a TCP/IP message has been sent to the the fire Input/Output module enters the pre
P2000 system to trigger a host event. alarmed state.

Fire IO Module Troubled – Triggers when the


Conditions fire Input/Output module enters the trouble
 Substring (the string sent to the host from state.
the external input).
Conditions
Category: Fire Detector  Date (steady state)
 Day of the Month
Fire Detector Alarmed – Triggers when the fire
 Day of the Week
detector enters the alarmed state.
 Fire IO Module Name
Fire Detector Disabled – Triggers when the fire  Month
detector enters the disabled state.  Time

Fire Detector Enabled – Triggers when the fire


detector enters the enabled state. Category: Fire Panel
Fire Detector Pre Alarmed – Triggers when the Fire Panel Down – Triggers when the fire panel
fire detector enters the pre alarmed state. is down.

Fire Detector Troubled – Triggers when the fire Fire Panel Troubled – Triggers when the fire
detector enters the trouble state. panel is in trouble state.

Fire Panel Up – Triggers when the fire panel is


Conditions up.
 Date (steady state)
 Day of the Month Conditions
 Day of the Week
 Fire Detector Name  Date (steady state)
 Month  Day of the Month
 Time  Day of the Week
 Fire Panel Name
 Month
Category: Fire IO Module  Time

Fire IO Module Activated – Triggers when the


fire Input/Output module is activated.

24-10832-194 Rev. E
494 APPENDIX A
Event Triggers/Actions

Category: Fire Zone Input Is Secure (steady state) – Triggers when


an input is in secure state. Use this trigger in
Fire Zone Alarmed – Triggers when the fire combination with other triggers.
zone enters the alarmed state.
Input Is Set (steady state) – Triggers when an
Fire Zone Disabled – Triggers when the fire input is in set state. Use this trigger in combi-
zone enters the disabled state. nation with other triggers.
Fire Zone Enabled – Triggers when the fire Input Is Short (steady state) – Triggers when an
zone enters the enabled state. input is in short state. Use this trigger in com-
Fire Zone Pre Alarmed – Triggers when the fire bination with other triggers.
zone enters the pre alarmed state. Input Is Suppressed (steady state) – Triggers
when an input is in suppressed state. Use this
Fire Zone Troubled – Triggers when the fire
trigger in combination with other triggers.
zone enters the trouble state.

Conditions
Conditions
 Date (steady state)
 Date (steady state)
 Day of the Month
 Day of the Month
 Day of the Week
 Day of the Week
 Input Point Name
 Fire Zone Name
 Input Point Number
 Month
 Month
 Time
 Panel Name
 Terminal Index
Category: Inputs  Terminal Name
 Time
Input Goes Open (transition) – Triggers when  Timezone Active
the state of an input point has changed to open.

Input Goes Reset (transition) – Triggers when Category: Integration Component


the state of an input point has changed to reset.
Down – Triggers when the selected integration
Input Goes Set (transition) – Triggers when the component is down.
state of an input point has changed to set.
Misconfigured – Triggers when the selected
Input Goes Short (transition) – Triggers when integration component is not properly config-
the state of an input point has changed to short. ured.
Input Goes Suppressed (transition) – Triggers Unavailable – Triggers when the selected inte-
when the state of an input point has changed to gration component is not available.
suppressed.
Up – Triggers when the selected integration
Input Is Open (steady state) – Triggers when an component is up.
input is in open state. Use this trigger in com-
bination with other triggers. Conditions
 Integration Component Name

24-10832-194 Rev. E
495

Category: Intercom Category: Intrusion Area


Station Busy (transition) – Triggers when the Alarmed/Armed/Bypassed/Sealed (transition) –
intercom station is busy. Triggers when the intrusion area enters the
alarmed, armed, bypassed, or sealed state.
Station Call Request (transition) – Triggers
when a call request has been placed to the Alarmed/Armed/Bypassed/Unsealed (transi-
intercom station. tion) – Triggers when the intrusion area enters
the alarmed, armed, bypassed, or unsealed
Station Connected (transition) – Triggers when state.
the intercom station has been connected.
Alarmed/Armed/No-Bypass/Sealed (transition) –
Station Idle (transition) – Triggers when the Triggers when the intrusion area enters the
intercom station shows no activity. alarmed, armed, not bypassed, or sealed state.
Station Output Active (transition) – Triggers Alarmed/Armed/No-Bypass/Unsealed (transi-
when the intercom station output is active. tion) – Triggers when the intrusion area enters
Station Output Inactive (transition) – Triggers the alarmed, armed, not bypassed, or unsealed
when the intercom station output shows no state.
activity. Alarmed/Disarmed/Bypassed/Sealed (transition)
– Triggers when the intrusion area enters the
Conditions alarmed, disarmed, bypassed, or sealed state.
 Date (steady state) Alarmed/Disarmed/Bypassed/Unsealed (transi-
 Day of the Month tion) – Triggers when the intrusion area enters
 Day of the Week the alarmed, disarmed, bypassed, or unsealed
 Intercom Station state.
 Intercom Station Output
 Month Alarmed/Disarmed/No-Bypass/Sealed (transi-
 Time tion) – Triggers when the intrusion area enters
the alarmed, disarmed, not bypassed, or sealed
state.
Category: Intrusion Annunciator
Alarmed/Disarmed/No-Bypass/Unsealed (transi-
Activated – Triggers when the intrusion annun- tion) – Triggers when the intrusion area enters
ciator has been activated. the alarmed, disarmed, not bypassed, or
unsealed state.
Deactivated – Trigger when the intrusion
annunciator has been deactivated. Armed (steady state) – Triggers when the intru-
sion area enters the armed state. Use this trig-
Conditions ger in combination with other triggers.

 Annunciator Name Armed (transition) – Triggers when the intru-


 Date (steady state) sion area enters the armed state.
 Day of the Month
 Day of the Week Armed/Bypassed/Sealed (transition) – Triggers
when the intrusion area enters the armed,
 Month
bypassed, or sealed state.
 Time

24-10832-194 Rev. E
496 APPENDIX A
Event Triggers/Actions

Armed/Bypassed/Unsealed (transition) – Trig- Category: Intrusion Device


gers when the intrusion area enters the armed,
bypassed, or unsealed state. Intrusion Device Goes Down (transition) – Trig-
gers when an intrusion device state has
Armed/No-Bypass/Sealed (transition) – Triggers changed to down.
when the intrusion area enters the armed, not
bypassed, or sealed state. Intrusion Device Goes Fault (transition) – Trig-
gers when an intrusion device state has
Armed/No-Bypass/Unsealed (transition) – Trig- changed to fault.
gers when the intrusion area enters the armed,
not bypassed, or unsealed state. Intrusion Device Goes Normal (transition) –
Triggers when an intrusion device state has
Disarmed (steady state) – Triggers when the changed to normal.
intrusion area enters the disarmed state. Use
this trigger in combination with other triggers. Conditions
Disarmed (transition) – Triggers when the intru-  Date (steady state)
sion area enters the disarmed state.  Day of the Month
Disarmed/Bypassed/Sealed (transition) – Trig-  Day of the Week
gers when the intrusion area enters the dis-  Device Name
armed, bypassed, or sealed state.  Month
 Time
Disarmed/Bypassed/Unsealed (transition) –
Triggers when the intrusion area enters the dis-
armed, bypassed, or unsealed state. Category: Intrusion Zone
Alarmed (steady state) – Triggers when the
Disarmed/No-Bypass/Sealed (transition) – Trig-
intrusion zone enters the alarmed state. Use
gers when the intrusion area enters the dis-
this trigger in combination with other triggers.
armed, not bypassed, or sealed state.
Alarmed (transition) – Triggers when the intru-
Disarmed/No-Bypass/Unsealed (transition) –
sion zone enters the alarmed state.
Triggers when the intrusion area enters the dis-
armed, not bypassed, or unsealed state. Bypassed (steady state) – Triggers when the
intrusion zone enters the bypassed state. Use
Conditions this trigger in combination with other triggers.

 Area Name Bypassed (transition) – Triggers when the


 Date (steady state) intrusion zone enters the bypassed state.
 Day of the Month
 Day of the Week Normal (steady state) – Triggers when the
 Month intrusion zone enters the normal state. Use this
 Time trigger in combination with other triggers.

Normal (transition) – Triggers when the intru-


sion zone enters the normal state.

24-10832-194 Rev. E
497

Open (steady state) – Triggers when the intru- Operator Logoff – Triggers when an operator
sion zone enters the open state. Use this trigger has logged off from the workstation.
in combination with other triggers.
Operator Logon – Triggers when an operator
Open (transition) – Triggers when the intrusion has logged on to the workstation.
zone enters the open state.
Conditions
Tampered (steady state) – Triggers when the
intrusion zone enters the tampered state. Use  Date (steady state)
this trigger in combination with other triggers.  Day of the Month
Tampered (transition) – Triggers when the  Day of the Week
intrusion zone enters the tampered state.  Month
 Operator
 Time
Conditions

 Date (steady state) Category: Outputs


 Day of the Month
 Day of the Week Output Goes Reset (transition) – Triggers when
 Month the state of an output point has changed to
 Time reset.
 Zone Name
Output Goes Set (transition) – Triggers when
the state of an output point has changed to set.
Category: Mustering
Output Is Reset (steady state) – Triggers when
Mustering Start – Triggers when the Mustering an output is in reset state. Use this trigger in
starts at a specified zone. combination with other triggers.

Mustering Stop – Triggers when Mustering Output Is Set (steady state) – Triggers when an
stops at a specified zone. output is in set state. Use this trigger in combi-
nation with other triggers.
Conditions
Conditions
 Zone Name
 Date (steady state)
 Day of the Month
Category: Operator  Day of the Week
Invalid Logon – Triggers when there has been  Month
an attempt to log on with an invalid user name  Output Point Name
or password.  Output Point Number
 Panel Name
Logon Disabled – Triggers when an operator  Terminal Index
has been inactive at the workstation for a spec-  Terminal Name
ified period of time and has been automatically  Time
logged off.  Timezone Active

24-10832-194 Rev. E
498 APPENDIX A
Event Triggers/Actions

Category: Panel Input Terminal Is Up (steady state) – Triggers


when an input terminal is up. Use this trigger
Panel Goes Offline (transition) – Triggers when in combination with other triggers.
the panel state has changed to offline.
Output Terminal Goes Down (transition) – Trig-
Panel Goes Online (transition) – Triggers when gers when an output terminal state has changed
the panel state has changed to online. to down.
Panel Is Down (steady state) – Triggers when Output Terminal Goes Up (transition) – Triggers
the panel is down. Use this trigger in combina- when an output terminal state has changed to
tion with other triggers. up.
Panel Is Up (steady state) – Triggers when the Output Terminal Is Down (steady state) – Trig-
panel is up. Use this trigger in combination gers when an output terminal is down. Use this
with other triggers. trigger in combination with other triggers.
Panel Load Database From Flash (transition) – Output Terminal Is Up (steady state) – Triggers
Triggers when the panel has loaded the data- when an output terminal is up. Use this trigger
base from flash memory. in combination with other triggers.

Conditions Reader Terminal Goes Down (transition) – Trig-


gers when a reader terminal state has changed
 Date (steady state) to down.
 Day of the Month
 Day of the Week Reader Terminal Goes Up (transition) – Triggers
 Month when a reader terminal state has changed to up.
 Panel Name Reader Terminal Is Down (steady state) – Trig-
 Time gers when a reader terminal is down. Use this
 Timezone Active trigger in combination with other triggers.

Reader Terminal Is Up (steady state) – Triggers


Category: Terminal when a reader terminal is up. Use this trigger
in combination with other triggers.

Note: HID panels may trigger multiple times for System Facility Code Error – Triggers when a
a single event. badge presented at the reader has an invalid
facility code.
Input Terminal Goes Down (transition) – Trig- Terminal Auxiliary Access – Triggers when a
gers when an input terminal state has changed Request to Exit input point activation allows a
to down. door to open without generating a forced door
Input Terminal Goes Up (transition) – Triggers alarm.
when an input terminal state has changed to Timed Override Disabled – Triggers when a
up. timed override has been manually disabled.
Input Terminal Is Down (steady state) – Triggers Timed Override Disabled Host – Triggers when
when an input terminal is down. Use this trig- a timed override has been manually disabled
ger in combination with other triggers. from the host.

24-10832-194 Rev. E
499

Timed Override Enabled – Triggers when a Event Action Types


timed override has been manually enabled.

Timed Override Enabled Host – Triggers when


a timed override has been manually enabled Category: Audio-Visual
from the host.

Timed Override Expired – Triggers when a


timed override has expired. Note: The following event actions may function
depending on the features provided by the manu-
facturer of the digital video integration software.
Conditions Refer to the P2000 DVR/VMS Integration manual
for details.
 Date (steady state)
 Day of the Month
 Day of the Week Camera Complete Alarm – Completes an alarm
 Month generated by the selected camera.
 Panel Name Camera Complete Alarm Associated Input –
 Terminal Index Completes an alarm generated by any config-
 Terminal Name ured camera that is associated with an input
 Time created in Input to Camera mapping. You can-
 Timezone Active not manually trigger this event action.

Camera Complete Alarm Associated Terminal –


Category: Time Zone Completes an alarm generated by any config-
Beginning Of Period – Triggers when the time ured camera that is associated with a terminal
zone period has started. mapped in Input to Camera. You cannot manu-
ally trigger this event action.
End Of Period – Triggers when the time zone
period has ended. Camera Preset – Activates the camera’s preset
action.
Conditions Camera Recording Quality – Changes the cam-
era’s recording quality. Enter a value from 1 to
 Time Zone
255 (255 provides the highest quality). Not all
digital video brands accept this command and
Category: Time/Date some may have a limited quality range. Refer
to the P2000 DVR/VMS Integration manual
Time/Date – The system activates the trigger on
for details on recording quality settings.
the specified time and date.
Camera Send Alarm – Sends an alarm message
Conditions generated by the selected camera.

 Date (steady state) Camera Send Alarm Associated Input – Sends


 Date (transition) an alarm message generated by any configured
 Day of the Month (steady state) camera that is associated with an input created
 Day of the Week (steady state) in Input to Camera mapping. You cannot man-
 Month (steady state) ually trigger this event action.
 Time (transition)

24-10832-194 Rev. E
500 APPENDIX A
Event Triggers/Actions

Camera Send Alarm Associated Terminal – Category: Badge


Sends an alarm message generated by any con-
figured camera that is associated with a termi- Add Access Group and Timezone – Adds the
nal mapped in Input to Camera. You cannot specified access group and time zone to the
manually trigger this event. badge associated with the message that trig-
gered the event. The access group and time
Camera Start Recording – Starts the recording zone are added in the first available position of
of the selected camera. the badge.
Camera Start Recording and Archiving – Starts Add Access Group and Timezone to Cardholder
the recording and archiving of the selected – Adds the specified access group and time
camera. zone to all badges associated with the Card-
holder displayed in the message that triggered
Camera Start Recording Associated Input – the event. The access group and time zone are
Starts the recording of any configured camera added in the first available position of all
that is associated with an input created in Input badges.
to Camera mapping. You cannot manually trig-
ger this event. Delete Access Group – Deletes the specified
access group from the badge associated with
Camera Start Recording Associated Terminal –
the message that triggered the event.
Starts the recording of any configured camera
that is associated with a reader reporting access Delete Access Group to Cardholder – Deletes
grant or access deny transactions. You cannot the specified access group from all badges
manually trigger this event. associated with the Cardholder displayed in the
message that triggered the event.
Camera Stop Recording – Stops the recording
of the selected camera. Increment Start Date of Access Group – Incre-
ments the start date of the selected access
Camera Stop Recording Associated Input – group by the number of days entered for the
Stops the recording of any configured camera associated badge.
that is associated with an input created in Input
to Camera mapping. You cannot manually trig- Set Badge Security Level – Sets the badge secu-
ger this event. rity level at the specified value.
Camera Stop Recording Associated Terminal – Set Badge Security Level to Reader Security
Stops the recording of any configured camera Level – Sets the badge security level to match
that is associated with a terminal mapped in the security level at the terminal.
Input to Camera. You cannot manually trigger
this event.
Category: CCTV
Launch AV Player – Starts the AV Player appli-
cation at the selected workstation. Camera Auxiliary Play – Activates the camera’s
auxiliary relay.
Monitor Camera – Displays the image from a
particular camera on the monitor. Camera Auxiliary Stop – Deactivates the cam-
era’s auxiliary relay.

Camera Pattern Play – Activates the camera’s


pattern.

24-10832-194 Rev. E
501

Camera Pattern Stop – Deactivates the cam- Download All Terminals – Downloads all
era’s pattern. defined terminals to the selected panel.

Camera Preset – Activates the camera’s preset Download All Time Zones – Downloads all
action. defined time zones to the selected panel.

Monitor Camera – Displays the image from a Download All to All Panels – Downloads all
particular camera on the monitor. defined access groups, badges, input and out-
put points, terminals, time zones, card events,
Monitor Sequence Play – Displays a sequence holidays, and soft alarms to all panels.
of camera images on the monitor.
Download All to Panel – Downloads all defined
Monitor Sequence Stop – Stops the display of a access groups, badges, input and output points,
sequence of camera images on the monitor. terminals, time zones, card events, holidays,
Switch Alarm Play – Activates the alarm switch. and soft alarms to the selected panel.

Switch Alarm Stop – Deactivates the alarm Download Card Events – Downloads all
switch. defined card events to the selected panel.

Switch Auxiliary Play – Activates the auxiliary Download Holidays – Downloads all defined
switch. holidays to the selected panel.

Switch Auxiliary Stop – Deactivates the auxil- Download Panel – Downloads panel informa-
iary switch. tion to the selected panel.

Switch Macro Play – Activates a set of pro- Download Soft Alarms – Downloads all defined
grammed steps that the switch can perform. soft alarms to the selected panel.

Switch Macro Stop – Deactivates a set of pro-


grammed steps that the switch can perform. Category: Host
Access Group Enable – Enables or disables the
Switch Tour Play – Activates a combination of
selected access group.
camera patterns and monitor sequences.
Backup Database – Performs backups of
Switch Tour Stop – Deactivates a combination
selected databases according to schedule.
of camera patterns and monitor sequences.
Cancel Event – Cancels any scheduled event
Category: Download actions for the selected event. There can only
be scheduled actions if you use a delay
Download Access Groups – Downloads all between the actions.
defined access groups to the selected panel.
Create Alarm – Creates an alarm and sends it to
Download All Badges – Downloads all defined the Alarm Monitor using an alarm instruction
badges to the selected panel. text as the description and a specified alarm
category. Click the shortcut button to edit
Download All Input Points – Downloads all
Alarm Options for the selected Alarm Cate-
defined input points to the selected panel.
gory. Make sure this action does not activate
Download All Output Points – Downloads all the trigger associated with this event.
defined output points to the selected panel.

24-10832-194 Rev. E
502 APPENDIX A
Event Triggers/Actions

Create Alarm Unique – Creates a unique alarm Display Message – Displays a predefined
and sends it to the Alarm Monitor using an instruction text message at the selected work-
alarm instruction text as the description and a station.
specified alarm category. Click the shortcut but-
ton to edit Alarm Options for the selected Execute Application – Starts an application at
Alarm Category. Make sure this action does not the workstation selected.
activate the trigger associated with this event. Execute Server Process – Starts a configured
Decrement Counter – Decrements the value of process. The process is started on the server
the selected counter. and runs in the security context of the RTL
Route service. The process does not have
Delete All Visitor Badges – Deletes all visitor access to the Windows desktop.
badges in the system.
Increment Counter – Increments the value of
Delete All Visitors – Deletes all visitors and the selected counter.
their badges in the system.
Message Filter – Adds or removes a specified
Delete Associated Badge – Deletes the badge Message Filter to (or from) the selected Mes-
associated with the message that triggered the sage Filter Group. This action only deletes fil-
event. ters that have been Auto Added by another
event. It never deletes the original filters con-
Delete Associated Cardholder – Deletes the figured for this group.
cardholder and the badges associated with the
message that triggered the event. Message Filter Group – Adds or removes a
specified Message Filter Group to (or from)
Delete Associated Visitor – Deletes the visitor the selected Message Filter Group. This action
and the badges associated with the message only deletes filters that have been Auto Added
that triggered the event. by another event. It never deletes the original
Delete Associated Visitor Badge – Deletes the filters configured for this group.
visitor badge associated with the message that Message Forwarding – Enables or disables
triggered the event. message forwarding from/to the selected work-
Delete Expired Visitor Badges – Deletes visitor station.
badges that have been expired for the selected Net Send Message – This feature is not
number of days. supported in this release.
Delete Unused Access Groups – Deletes all Open Document – Opens a document at the
unused access groups in the system. workstation selected.
Delete Visitors Without Badges – Deletes visi- Print Message – Sends a predefined instruction
tors without badges. text message to a selected printer.
Disable Badge – Disables the selected badge Real Time Printing – Enables or disables
number. real-time printing.
Display Map – Displays a specified map at the Real Time Printing Access Deny – Enables or
selected workstation. disables real-time printing of Access Deny
transactions.

24-10832-194 Rev. E
503

Real Time Printing Access Grant – Enables or Remote Server Receive – Enables or disables
disables real-time printing of Access Grant receiving remote messages at the selected
transactions. remote server.

Real Time Printing Alarm – Enables or disables Remote Server Transmit – Enables or disables
real-time printing of Alarm transactions. transmitting remote messages at the selected
remote server.
Real Time Printing Area – Enables or disables
real-time printing of Area transactions. Resync Badges – Adjusts the state of the
selected badges to In, Out, or Undefined and
Real Time Printing Audit – Enables or disables gives you the option to download the change.
real-time printing of Audit transactions.
Resync Badges - Last Terminal – Adjusts the
Real Time Printing AV – Enables or disables state of all badges presented at the selected ter-
real-time printing of Audio-Visual transac- minal to In, Out, or Undefined and gives you
tions. the option to download the change.
Real Time Printing Cabinet – Enables or dis- Resync Badges - Last Terminal Group – Adjusts
ables real-time printing of Cabinet transac- the state of all badges presented at the termi-
tions. nals in the selected terminal group to In, Out,
Real Time Printing Elevator – Enables or dis- or Undefined and gives you the option to
ables real-time printing of Elevator transac- download the change.
tions. Send Email – Sends a predefined instruction
Real Time Printing Fire – Enables or disables text message as email to the specified address.
real-time printing of Fire transactions. Serial Port Message – Sends a predefined
Real Time Printing Guard Tour – Enables or dis- instruction text message as a serial port mes-
ables real-time printing of Guard Tour transac- sage using the COM port selected.
tions. Set Counter – Sets the counter to a selected
Real Time Printing Host – Enables or disables value.
real-time printing of Host transactions. TCP/IP Port Message – Sends the configured
Real Time Printing Intrusion – Enables or dis- instruction text to the specified TCP/IP port on
ables real-time printing of Intrusion transac- the specified computer. The port closes after
tions. the text is sent.

Real Time Printing Mustering – Enables or dis- Text to Speech – Sends the selected instruction
ables real-time printing of Mustering transac- text to a workstation using the Windows Text
tions. to Speech feature. If the computer has a sound
card, the text can be spoken using a synthe-
Real Time Printing Panel – Enables or disables sized voice. The voice characteristics can be
real-time printing of Panel transactions. adjusted from the Speech icon in Windows
Control Panel.
Real Time Printing Trace – Enables or disables
real-time printing of Trace transactions. Trigger Event – Triggers the selected event.

24-10832-194 Rev. E
504 APPENDIX A
Event Triggers/Actions

UDF Decrement – Decrements the specified Input Point Enable Alarm – Enables or disables
numeric UDF field by one for the Cardholder the alarm of the selected input point.
displayed in the message that triggered the
event. Input Point Suppress – Suppresses the selected
Input Point for the specified time (0 seconds
UDF Increment – Increments the specified means forever).
numeric UDF field by one for the Cardholder
displayed in the message that triggered the Input Point Suppression Time Zone – Sup-
event. presses the selected Input Point during the
specified Time Zone.
UDF Set – Sets the specified numeric UDF
field to the specified value for the Cardholder Input Point Unsuppress – Unsuppresses the
displayed in the message that triggered the selected Input Point.
event.

UDF Set to UDF – Sets the first specified Category: Intercom


numeric UDF field to the value of the second Connect – Connects the selected intercom sta-
specified numeric UDF field for the Card- tion.
holder displayed in the message that triggered
the event. Disconnect – Disconnects the selected inter-
com station.

Category: Inputs Intercom Station Reset Output – Resets the out-


put associated with the master station and
Acknowledge Alarm – Acknowledges an alarm. intercom station selected.
Complete Alarm – Completes an alarm. Intercom Station Set Output – Sets the output
Input Group Disable – Disables an input group. associated with the master station and intercom
station selected.
Input Group Enable – Enables an input group.

Input Group Suppress – Suppresses the Category: Intrusion Annunciator


selected Input Group for the specified time (0
Activate – Activates the selected intrusion
seconds means forever).
annunciator.
Input Group Suppression Time Zone – Sup-
Deactivate – Deactivates the selected intrusion
presses the selected Input Group during the
specified Time Zone. annunciator.

Input Group Unsuppress – Unsuppresses the


selected Input Group.
Category: Intrusion Area
Arm – Arms the selected intrusion area.
Input Point Disable – Disables a selected input
point. Disarm – Disarms the selected intrusion area.
Input Point Enable – Enables a selected input
point.

24-10832-194 Rev. E
505

Category: Intrusion Zone Category: OPC Server


Bypass Off – The system does not detect intru- OPC Write – Writes an OPC Tag value in the
sion activities at the selected intrusion zone. data type selected.

Bypass On – The system detects intrusion


activities at the selected intrusion zone. Category: Outputs
Reset – Resets the selected intrusion zone. Reset Output – Resets the selected output.

Reset Ack – Resets and acknowledges the Reset Output Group – Resets the selected out-
selected intrusion zone. put group.

Set Output – Sets the selected output.


Category: Metasys Interlock
Set Output - Timed – Sets the selected output
Metasys Interlock – Activates the selected for the specified duration.
Metasys system object.
Set Output Group – Sets the selected output
group for the specified duration.
Note: You can only configure Metasys inter-
locks from a P2000 Server. For details, refer to Category: Panel
the P2000 Metasys System Integration manual.
Doors - Lock All Doors – Locks all doors.

Doors - Lock All Doors On Panel – Locks all


Category: Mustering
doors associated with the selected panel.
De-Muster – Resets personnel to their last
Doors - Unlock All Doors – Unlocks all doors.
badge location after the muster is terminated
for the selected Zone. Doors - Unlock All Doors On Panel – Unlocks
all doors associated with the selected panel.
Make Zone Ready – Resets zone status after a
muster is stopped so that the zone is ready for History Upload Disable – Disables history
another muster. upload at the selected panel.
Mustering Start – Starts the muster in the History Upload Enable – Enables history
selected Zone. upload at the selected panel.
Mustering Stop – Ends the muster at the In-X-It Disable – Disables the entry/exit feature
selected Zone. at the selected panel.
Save Muster Data – Saves the muster data in In-X-It Enable – Enables the entry/exit feature
the database. at the selected panel.

24-10832-194 Rev. E
506 APPENDIX A
Event Triggers/Actions

Set Time Offset – Sets the time offset of the Anti-Passback Enable – Enables the anti-pass-
selected panel by the specified number of min- back feature at the specified reader for the
utes. period of time selected.

Time Zone Check No – Disables time zone Door Access – Unlocks the door (it is not mon-
checking. itored whether the door is actually accessed or
not).
Time Zone Check Yes – Enables time zone
checking. Door Relock – Locks the door.

Door Timed Override – Enables from the host,


Category: Security Level the door timed override feature at the specified
reader for the period of time selected.
Clear – Removes the security level at the
selected Panel, Terminal, or Terminal Group. Local Timed Override Disable – Disables timed
override at the specified reader for the period
Set to Blue – Applies a Blue code security level of time entered at the keypad.
at the selected Panel, Terminal, or Terminal
Group. Local Timed Override Enable – Enables timed
override at the specified reader for the period
Set to Green – Applies a Green code security
of time entered at the keypad.
level at the selected Panel, Terminal, or Termi-
nal Group. PIN Suppression - set Time Zone – Enables PIN
Suppression at the specified reader during the
Set to Orange – Applies an Orange code secu- Time Zone selected.
rity level at the selected Panel, Terminal, or
Terminal Group. Reader - set Time Zone – Enables the specified
reader during the Time Zone selected.
Set to Other – Applies a specific security level
code at the selected Panel, Terminal, or Termi- Reader Override - Disable – Disables reader
nal Group. override at the specified reader.
Set to Red – Applies a Red code security level Reader Override - Enable – Enables reader
at the selected Panel, Terminal, or Terminal override at the specified reader.
Group.
Reader Override - set Time Zone – Unlocks the
Set to Yellow – Applies a Yellow code security specified reader door during the Time Zone
level at the selected Panel, Terminal, or Termi- selected.
nal Group.
Reader Valid & Unauthorized - Disable – Dis-
ables the valid and unauthorized feature at the
Category: Terminal specified reader.
Anti-Passback Disable – Disables the anti-pass- Reader Valid & Unauthorized - Enable – Enables
back feature at the selected reader, that is, a the valid and unauthorized feature at the speci-
person can re-badge at the same door without fied reader.
delay.

24-10832-194 Rev. E
507

Set Reader Mode – Sets the reader mode of Soft In-X-It Processing Enable – Enables the
operation at the specified reader, to the option soft entry/exit processing feature at the speci-
selected in the Set Reader Mode field. fied reader.

Suppress Forced/Propped Inputs – Suppresses


forced/propped inputs at the selected reader
Note: The Reader Mode selected here is in for the specified time (0 seconds means for-
effect until it is changed either through Mercury
Terminal, Door Control, Mercury Procedures, or ever).
Web UI Maps. This option is only available for
Terminal Enable – Enables or disables the ter-
Mercury panels.
minal selected.

Soft In-X-It Processing Disable – Disables the Unsuppress Forced/Propped Inputs – Unsup-
soft entry/exit processing feature at the speci- presses forced/propped inputs at the selected
fied reader. reader.

24-10832-194 Rev. E
508 APPENDIX A
Event Triggers/Actions

24-10832-194 Rev. E
509

Appendix B: Message Types and


Sub-Types

T
his appendix lists all message types and
Message Sub-Types (Continued)
sub-types available for configuring
Message Filters. For more information, 3 – Alarm (continued)
15 – AV Dry Contact Alarm
see Message Filtering on page 222. 17 – Intrusion Alarm
18 – Fire Alarm
19 – Integration Component
20 – Intercom Station
21 – Intrusion Area Alarm
Message Types 22 – Fire Detector Alarm
23 – Fire IO Module Alarm
1– Notify
24 – Fire Device Alarm
3– Alarm
25 – SNMP Alarm
5– System Action
258 – Muster Status 5 – System Action
259 – Muster Event Trigger 2 – Error or Log
305 – Routing Session 4 – Counter Changed
403 – Intrusion Status 5 – Muster Control Started
404 – Fire Status 258 – Muster Status
28673 – RTL Data
28675 – Audit
259 – Muster Event Trigger

305 – Routing Session

Message Sub-Types
403 – Intrusion Status
1 – Notify
204 – Alarm Filter 404 – Fire Status
207 – Comms Up
208 – Comms Down
210 – Guard Tour Up 28673 – RTL Data
1 – Panel: Reader Up/Normal
3 – Alarm 3 – Panel: System Restart
1 – Generic 5 – Panel: Reader Down
2 – Panel Input Point 10 – Panel: System Facility Code Error
3 – Area 11 – Panel: System Event Activated
4 – Guard Tour 12 – Panel: System Event De-activated
5 – Muster Running 15 – Panel: Unlock All Doors
6 – Muster Zone Status 16 – Panel: Lock All Doors
7 – Muster Disabled 17 – Panel: Output Set
8 – Muster Aborted 18 – Panel: Output Reset
10 – Event Alarm 19 – Panel: Terminal Reader Strike Locked
12 – AV Motion Alarm 20 – Panel: Terminal Reader Strike Unlocked
13 – AV Behavior Alarm 21 – Panel: Terminal Door Held Open
14 – AV Video Loss Alarm 22 – Panel: Terminal Door Forced Open

24-10832-194 Rev. E
510 APPENDIX B
Message Types and Sub-Types

Message Sub-Types (Continued) Message Sub-Types (Continued)


28673 – RTL Data (continued) 28673 – RTL Data (continued)
23 – Panel: Terminal Valid and Unauthr Access 130 – Kone IP Elevator: Kone IP Disconnect Msg
33 – Access Deny: Invalid Card 224 – Panel: Node Went Up
34 – Access Deny: Anti-passback Timer On 225 – Panel: Fallback
35 – Access Deny: Invalid Reader 226 – Panel: Converter Tamper Set Alarm
36 – Access Deny: Invalid In-X-It Status 227 – Panel: Converter Tamper Reset Alarm
37 – Access Deny: Invalid Card Timezone 228 – Panel: Node Went Down
38 – Access Deny: Invalid PIN Code 266 – Access Grant: Entry Granted Central
39 – Access Deny: Invalid Issue Level 267 – Access Grant: Exit Granted Central
40 – Access Deny: Access Denied Central 292 – Panel: Input Module Up
41 – Access Deny: Invalid Security Level 293 – Panel: Output Module Up
42 – Panel: Invalid Reader Timezone 294 – Panel: Input Module Down
43 – Panel: Timed Override Expiration 295 – Panel: Output Module Down
44 – Access Deny: Invalid Event 529 – Intercom: Busy
45 – Access Deny: Invalid Event Privilege Level 10752 – Intercom: Intercom Server Up
46 – Access Deny: Invalid Biometric 10753 – Intercom: Intercom Server Down
47 – Access Deny: Open Door 10754 – Intercom: Idle
48 – Elevator: Elevator Invalid Floor 10755 – Intercom: Intercom Server Disconnected
49 – Elevator: Elevator Invalid Timezone 10756 – Intercom: Connected
50 – Elevator: Elevator Invalid Card 10757 – Intercom: Call Request
65 – Access Grant: Access Granted Central 10758 – Intercom: Unknown
67 – Access Grant: Executive Privilege 10759 – Intercom: Station Output Set
68 – Access Grant: Access Granted Local 10760 – Intercom: Station Output Reset
69 – Access Grant: Timed Override Enabled 20481 – Panel: Node Went Up Duplicate
70 – Access Grant: Timed Override Disabled 20482 – Panel: Reader status unknown
71 – Access Grant: Timed Override Enabl Host 20483 – Panel: Input status unknown
72 – Access Grant: Timed Override Disabl Host 20484 – Panel: Output status unknown
73 – Panel: Panel Card Event Activated 20486 – Panel: Node is Misconfigured
74 – Panel: Panel Card Event De-activated 20503 – Panel: Panel Badge Database Full
75 – Access Grant: Soft In-X-It Violation 20504 – Panel: Panel Message Buffer Overflow
76 – Assisted Access: Assisted Access 20505 – Panel: Panel Message Buffer Cleared
78 – Access Grant: Manual Valid&Unauth Accss 20506 – Panel: Panel Fault
79 – Elevator: Access Granted 20507 – Panel: Panel Firmware Update Initiated
80 – Access Grant: Reader Egress 20508 – Panel: Panel Firmware Update Failed
96 – Input Point History: Alarm 20509 – Access Deny: No Override Privilege
97 – Input Point History: Secure 20510 – Access Deny:Timed Override Value Invalid
98 – Panel: Alarm Acknowledged Locally 20511 – Panel: Reader Status Input Fault
101 – Panel: Door Open Alarm 20512 – Access Grant: Operator Access Request
102 – Panel: Duress Alarm 20513 – Access Deny: Central Response Timeout
103 – Panel: PIN Code Retry Alarm 20514 – Access Deny: Operator Access Denied
104 – Panel: Forced Door Alarm 20515 – Access Deny: Use Limit Exceeded
105 – Panel: Card Parity Alarm 20576 – Input Point State Change: Alarm
106 – Panel: Prox Card Low Battery Alarm 20577 – Input Point State Change: Secure
111 – Panel: Reader Low Battery Set Alarm 20597 – Input Point State Change: Open
112 – Panel: Reader Low Battery Reset Alarm 20598 – Input Point State Change: Short
113 – Panel: Reader AC Set Alarm 20599 – Input Point State Change:Input Suppressed
114 – Panel: Reader AC Reset Alarm 24577 – Host: Event Triggered
115 – Panel: Reader Tamper Set Alarm 24578 – Host: Event Triggered Manual
116 – Panel: Reader Tamper Reset Alarm 28673 – Tour: Tour Alarmed
117 – Input Point History: Open 28674 – Tour: Tour Started
118 – Input Point History: Short 28675 – Tour: Station Checked in On Time
123 – Panel: Calibration results 28676 – Tour: Station Checked in Early
125 – Input Point History: Input Suppressed 28677 – Tour: Station Checked in Late
129 – Kone IP Elevator: Kone IP Status Response 28678 – Tour: Station Checked in Out of Order

24-10832-194 Rev. E
511

Message Sub-Types (Continued) Message Sub-Types (Continued)


28673 – RTL Data (continued) 28675 – Audit (continued)
28679 – Tour: Tour Stopped 17 – Panel Holiday
28680 – Tour: Tour Restarted 18 – Access Template
28681 – Tour: Tour Aborted 19 – Alarm Response Text
28682 – Tour: Tour Completed 20 – Alarm Instruction
28683 – Tour: Station Late Timer Reached 21 – Company
28684 – Tour: Tour Terminated 22 – Output Point
32769 – Area: Reader Exit 23 – Output Group
32770 – Area: Reader Entry 24 – Department
32771 – Area: Input Exit 25 – Panel Timezone
32772 – Area: Input Entry 26 – Soft Alarm
32773 – Area: Manual Exit 27 – Site Parameters
32774 – Area: Manual Entry 28 – Workstation
36865 – Audio-Visual: Motion 29 – Map
36866 – Audio-Visual: Behavior 30 – Map Icon Set
36867 – Audio-Visual: Video Loss 31 – User Defined Fields
36868 – Audio-Visual: Dry Contact 32 – Event
41296 – Fire Alarm: Fire Server Connection Up 33 – Panel Card Event
41297 – Fire Alarm: Fire Server Connection Down 34 – Alarm Filter
41472 – Otis System: Component Went Up 35 – Message Forwarding
41473 – Otis System: Component Went Down 37 – Permission Group
41728 – Integration Component: Up 38 – Panel Relay
41729 – Integration Component: Down 39 – Report
41730 – Integration Component: Unknown 40 – MIS Interface
41731 – Integration Component: Unavailable 41 – Image Recall Filter
41732 – Integration Component: Misconfigured 42 – Counter
41733 – Integration Component: pivCLASS 44 – External IP
Certificate Manager Revoked 45 – Guard Tour Definition
41734 – Integration Component: pivCLASS 46 – Tour Station Definition
Certificate Manager Error 48 – Elevator
41735 – Integration Component: pivCLASS 49 – Floor Mask
Certificate Manager Activated 50 – Floor Group
41736 – Integration Component: pivCLASS Passed 51 – Floor Name Configuration
Validation 52 – Cabinet
41737 – Integration Component: pivCLASS Failed 53 – Door Group
Validation 54 – Door Mask
55 – Door Name Configuration
28675 – Audit
56 – Area
1 – User
57 – Muster Zone
2 – Badge
58 – Area Control Layout
3 – Badge Layout
60 – CCTV Server
4 – Badge Fields
61 – CCTV Switch
5 – Badge Encoding
62 – CCTV Tour
6 – ID Badge
63 – CCTV Alarm
7 – Cardholder
64 – CCTV Macro
8 – Panel
65 – CCTV System Auxiliary
9 – Terminal
66 – CCTV Monitor
10 – Partition
67 – CCTV Sequence
11 – Terminal Group
68 – CCTV Camera
12 – Access Group
69 – CCTV Preset
13 – Holiday
70 – CCTV Pattern
14 – Timezone
71 – CCTV Camera Auxiliary
15 – Input Point
78 – Auto-badge Number
16 – Input Group
79 – Air Crew PIN Number

24-10832-194 Rev. E
512 APPENDIX B
Message Types and Sub-Types

Message Sub-Types (Continued) Message Sub-Types (Continued)


28675 – Audit (continued) 28675 – Audit (continued)
81 – Remote Server 116 – Badging Setup
82 – Message Filter 117 – Request Approvers
83 – Message Filter Group 118 – FASC-N CCC
84 – Local Site 119 – Badge Purpose
85 – Service Startup Configuration 120 – Alarm Options
86 – Application 121 – Intrusion Entity
87 – Panel Card Format 122 – SIA Device
88 – Reason 123 – Alarm Category
89 – Security Level Range 124 – MSEA Graphic
94 – Audit 125 – OSI Facility
95 – Alarm History 173 – MSEA Registration
96 – Alarm 174 – MSEA Partition
97 – Generic Text 176 – Web Access Configuration
98 – Muster History 177 – Fire Alarm
99 – Guard Tour History 178 – Software Update
100 – Transaction History 179 – Badge Reason
101 – Redundancy 180 – Required Fields
102 – Mapping Configuration 182 – HID Facility
103 – Mapping Data Fields Configuration 183 – Kone IP Elevator
104 – Intercom Exchange 184 – Intercom Interface
105 – Intercom Station 185 – Integration Component
106 – AV Site 186 – Assa Abloy Facility
107 – AV Camera 187 – Badge Format
108 – AV Monitor 188 – Assa Abloy Badge Format
109 – AV Preset 192 – Mercury Input Point Calibration Table
110 – Input To Camera 193 – Mercury Card Format
112 – Enterprise Site 194 – Mercury Facility
113 – Enterprise Parameters 195 – Mercury Procedure
114 – AV Dry Contact 196 – Mercury Trigger
115 – Alarm Colors 198 – HID Badge Format

24-10832-194 Rev. E
513

Appendix C: Panel Comparison


Matrix

CK721-A (3.0 / 3.1)

CK721-A (3.2 / 3.3)

CK721-A (3.4 / 3.5)

Mercury EP1501

Mercury EP1502

Mercury EP2500
Assa Abloy
S321-IP

HID
OSI
Feature

128-Bit Card Support –   – – – – – – –


Access Grant on Door Open    – – – – – – –
Access Groups Per Badge 32 32 32 – – 8 32 32 32 32
Add Hardware Module Wizard    – – – – – – –
Air Crew PIN    – – – – – – –
Alarm Debounce     –  –   
Americans with Disabilities Act (ADA)    –      
Anti-Passback     –  –   
Anti-Tailgate    – – – –   
Aperio Lock – – – – – – –   
Backup DB to Flash Interval    – – – –   
Badge Capacity 200K1 200K1 200K1 5K 65K 250K2 2K 31K4 31K4 111K4
44K3
Badge Event Privilege Support    – – – – – – –
Badge Override Support     –  – – – –
Badge Time Shunt    – – – –   
Calibration/Uncalibration     – – –   
Card Formats (simultaneously supported) 21 21 21 25 2 U6 U6 16 16 16
Card ID Support      7    
Central Mode (Card Processing)    – – – – – – –
Custom Card Formats          
Custom PIN Code          
D620-ECG Elevator Mode    – – – – – – –
Door Control - Access Time (manual)    –   8   
Door Control - Timed (manual)     – – –   
Door Open Warning    – – – –   
Door Shunt Expiration Warning    – – – – – – –
Dual Ethernet Support – – – – – – – – – 9
Elevator Readers (max. per panel) 64 64 64 – – – – 16 64 64
Elevator Support    – – – –   

24-10832-194 Rev. E
514 APPENDIX C
Panel Comparison Matrix

CK721-A (3.0 / 3.1)

CK721-A (3.2 / 3.3)

CK721-A (3.4 / 3.5)

Mercury EP1501

Mercury EP1502

Mercury EP2500
Assa Abloy
S321-IP

OSI

HID
Feature

Encrypted Communications  10    –  –   
Encryption (FIPS 140-2 Compliant)  10   – – – – – – –
Entry/Exit Enforce    – – – –   
Executive Privilege    –      
Exempt from Archive to Flash    – – – – – – –
Extended Shunt Time    – – – – – – –
Extended Time Override    – – – – – – –
Facility Codes 12 12 12 U6 U6 U6 U6 16 16 16
FICAM Certification –   – – – – – – –
(pivCLASS Integration)
HI-O Bus (partially supported on HID EVO only) – – – – –  – – – –
HID Corp. 1000 Card Format          
High Level Elevator    – – – – – – –
High Performance Entry/Exit Status    – – – – – – –
Synchronization
High Speed RS485    – – – –   
History Upload With Seconds          
Holidays 40 40 40 40 – 64 32 40 40 40
Input Groups    – – – – – – –
Input Suppression     – – –   
Inputs (max. per panel) 326 326 326 12 – 16 11 – 64 12 256 12 512 12
5 3
Intrusion * – – – – – – –   
Issue Level per Badge    –      
Keyless Override Feature    – – – – – – –
KONE HLI Elevator Support    – – – – – – –
KONE IP Elevator Support  10   – – – – – – –
Multi Card Types     –     
Multiple Facility Codes per Badge Type    –      
N-Man Rule    – – – –  13  13  13
Network          
OSDP (Mercury devices) – – – – – – –   
OSDP Version 1 Reader Support (RDR2S-A and –   – – – – – – –
RDR8S)
Otis Compass Elevator Support  14  14  14 – – – – – – –
Otis EMS Serial Elevator Support –   – – – – – – –
Otis EMS - Security / BMS Elevator Support  – – – – – – – – –
Output Control (manual)     –  –   
Output Groups    – – – – – – –
Output Groups associated with Time Zones    – – – – – – –

24-10832-194 Rev. E
515

CK721-A (3.0 / 3.1)

CK721-A (3.2 / 3.3)

CK721-A (3.4 / 3.5)

Mercury EP1501

Mercury EP1502

Mercury EP2500
Assa Abloy
S321-IP

OSI

HID
Feature

Output Status Reporting     – – –   


Outputs (max. per panel) 208 208 208 8 – 4 11 – 64 12 256 12 512 12
2 3
Override Expiration Warning    – – – – – – –
Override Reset Threat Level     – – – – – –
Panel Card Events 20 20 20 – – – – – – –
Panel Relay Set/Reset    – – – – – – –
Panel Relays 1 1 1 – – – – – – –
Peer to Peer Badge Sync    – – – – – – –
PIN + 1 Duress    – – – –   
PIN Code Digits Supported (Custom) 9 9 9 4 3-6 9 – 9 9 9
Power over Ethernet (PoE) Connection – – – – –  8  – –
Raw 128 Bit Card Format – – –  – – – – – –
Reader Override       –   
Reverse Card Reading    – – – –   
Reverse Swipe Duress    – – – – – – –
Security Level     – – – – – –
Schlage AD300 Lock (without Wiegand – – – – – – –  – 
converter)
Schlage AD400 Lock (without Wiegand – – – – – – –  – 
converter)
Schlage ENGAGE Gateway – – – – – – –  – 
Schlage ENGAGE Lock – – – – – – –  – 
Set Reader Mode – – – – – – –   
Special Flags (A, B, C)    –      
Star Feature    – – – – – – –
Strike Status      – – – – –
Terminal Auxiliary Access – –  – – – – – – –
Terminal Override Status    –   8   
Terminal Readers 64 64 64 2 128 2 11 1 17 64 64
13
Terminal Time Zone Enabled       –  15  15  15
Terminal Time Zone Override        15 15 15
Terminal Time Zone PIN Suppression       –  15  15  15
ThyssenKrupp Elevator Support –   – – – – – – –
Time Zones per Badge 32 32 32 2 – 8 8 – 16 – 16 – 16
Time Zones per Panel 64 64 64 64 32 64 32 64 64 64
Valid and Unauthorized    – – – – – – –
* Intrusion is also supported with Aritech and Bosch panels.

24-10832-194 Rev. E
516 APPENDIX C
Panel Comparison Matrix

1 When the number of badges exceeds 120,000 (100,000 for 128-bit badges), the number of access groups should be
limited to 50,000.
2 Available for HID EVO if not using card ID; otherwise, the badge capacity is 125,000.3
3 For HID Edge.
4 Using the standard feature set EP2500 supports 111,000 badges. EP1501, EP1502, and Schlage PIM400-1501 
support 31,000. With a reduced feature set, EP2500 supports 500,000. EP1501, EP1502, and Schlage PIM400-1501
support 250,000. To exceed the lower numbers, contact Technical Support for details on changing the badge configuration.
5 One of five built-in card formats plus one custom card format. Card ID entry can also be configured.
6 Unlimited.
7 Up to 15 digits.
8 Supported by hard-wired (PoE) version only.
9 Supported by using Lantronix® Micro 125 Embedded Serial to Ethernet Module.
10 Supported by CK721-A Version 3.1.
11 For HID EVO.
12 For panels with no reader modules.
13 Mercury panels support the N-Man rule through the Two Badge Access feature defined at the terminal (for a maximum of
two people).
14 The Otis Compass integration with this version of P2000 requires CK721-A firmware version 3.5 or higher.
15 Provided via Mercury Triggers and Procedures.
16 Uses Access Group Details to associate Readers with Time Zones, on an access group basis, not on a badge basis.

24-10832-194 Rev. E
517

Appendix D: Using a Keypad


Reader on CK721-A Panels

T
he following sections describe how to To invoke access with PIN Only:
invoke access requests, Air Crew
access requests, Timed Overrides, and 1. Select the terminal PIN Only option in the
Panel Card Events using a keypad Card Type tab. PIN Only works exclu-
reader on CK721-A panels. sively with 5-digit algorithmic PINs.
2. Set the panel PIN Code Type to Algorith-
mic.
Note: For information on using keypad readers 3. Set the panel PIN Code Digits to 5.
that connect to other panel types, refer to the
instructions provided with those panels. 4. At the keypad reader, enter the PIN, and
press the # key.
There is a 15 second time-out on all keypads.
Whenever the keypad is idle for more than 15 To invoke access with Card ID:
seconds, all keys entered so far are ignored,
1. To invoke access with Card ID at any time,
and the entire key sequence needs to be
set the terminal PIN Suppression in the
re-entered.
Timezone tab to <none>. Otherwise,
access is granted only during active time
zones.
Note: Card ID (the badge number) can have up
to 19 digits. However, the total number of keys 2. Select the terminal Card ID option in the
pressed for PIN and Card ID combined must not Card Type tab.
exceed 21. 3. Verify that the terminal PIN Only option
in the Card Type tab is not selected.
4. Verify that the terminal PIN + Card ID
Invoking Access Requests option in the Card Type tab is not selected.
from a Keypad 5. At the keypad reader, enter the Card ID
number and press the # key.

To invoke access with a Badge: To invoke access with PIN and Card ID:
1. To invoke access using a badge at any 1. Select the terminal PIN + Card ID option
time, set the terminal PIN Suppression in in the Card Type tab.
the Timezone tab to <none>. Otherwise,
access is granted only during active time 2. Verify that the terminal PIN Only option
zones. in the Card Type tab is not selected.

2. At the keypad reader, present the badge. 3. At the keypad reader, enter the PIN, then
enter the Card ID number, and press the #
key.

24-10832-194 Rev. E
518 APPENDIX D
Using a Keypad Reader on CK721-A Panels

To invoke access using PIN and Badge: Invoking Timed Overrides


1. Set the terminal PIN Suppression in the from a Keypad
Timezone tab to an inactive time zone.
2. Verify that the terminal Allow PIN After
Badge option in the Flags tab is not To invoke Timed Override with Badge:
selected.
1. Select the terminal Cardholder Over-
3. At the keypad reader, enter the PIN and ride/Shunt option in the Access tab.
then present the badge.
2. Set the badge Override option in the Secu-
rity Options tab.
To invoke access with PIN and Badge,
3. To invoke Timed Override using badge at
allowing PIN after Badge:
any time, set the terminal PIN Suppres-
1. Set the terminal PIN Suppression in the sion in the Timezone tab to <none>. Other-
Timezone tab to an inactive time zone. wise, Timed Override is invoked only
during active time zones.
2. Select the terminal Allow PIN After
Badge option in the Flags tab. 4. To start Timed Override:
3. At the keypad reader, present the badge, Without the Star Feature, press the star (*)
enter the PIN, and press the # key. You key, enter the number of minutes, and pres-
may present the badge at any time before ent the badge.
pressing the # key. With the Star Feature, press the star (*) key
followed by number 0, enter the number of
minutes, and present the badge.
Invoking Air Crew Access
5. To stop Timed Override:
Requests from a Keypad
Without the Star Feature, press the star (*)
key, enter 0 (for minutes), and present the
badge.
To invoke Air Crew access:
With the Star Feature, press the star (*) key
1. The Server must be online. followed by number 0 and present the
2. Enable the respective Air Crew PIN for badge.
the terminal.
3. To request Air Crew access: To invoke Timed Override with PIN
Only:
Without the Star Feature, press the B key
followed by the Air Crew PIN number and 1. Select the terminal Cardholder Over-
the # key. ride/Shunt option in the Access tab.
With the Star Feature, press the star (*) 2. Set the badge Override option in the Secu-
key, then press number 2, followed by the rity Options tab.
Air Crew PIN number and the # key.
3. Select the terminal PIN Only option in the
Card Type tab. PIN Only works exclu-
sively with 5-digit algorithmic PINs.

24-10832-194 Rev. E
519

4. Set the panel PIN Code Type to Algorith- 7. To start Timed Override:
mic. Without the Star Feature, enter the Card ID
5. Set the panel PIN Code Digits to 5. number, press the star (*) key, enter the
6. To start Timed Override: number of minutes, and press the # key.

Without the Star Feature, enter the PIN, With the Star Feature, enter the Card ID
press the star (*) key, enter the number of number, press the star (*) key followed by
minutes, and press the # key. number 0, enter the number of minutes,
and press the # key.
With the Star Feature, enter the PIN, press
the star (*) key followed by number 0, 8. To stop Timed Override:
enter the number of minutes, and press the Without the Star Feature, enter the Card ID
# key. number, press the star (*) key, enter 0 (for
7. To stop Timed Override: minutes), and press the # key.
With the Star Feature, enter the Card ID
Without the Star Feature, enter the PIN, number, press the star (*) key followed by
press the star (*) key, enter 0 (for minutes), number 0, and press the # key.
and press the # key.
With the Star Feature, enter the PIN, press
To invoke Timed Override with PIN and
the star (*) key followed by number 0, and
Card ID:
press the # key.
1. Select the terminal Cardholder Over-
To invoke Timed Override with Card ID: ride/Shunt option in the Access tab.
2. Set the badge Override option in the Secu-
1. Select the terminal Cardholder Over- rity Options tab.
ride/Shunt option in the Access tab.
3. Select the terminal PIN + Card ID option
2. Set the badge Override option in the Secu- in the Card Type tab.
rity Options tab.
4. Verify that the terminal PIN Only option
3. To invoke Timed Override using badge at in the Card Type tab is not selected.
any time, set the terminal PIN Suppres-
sion in the Timezone tab to <none>. Oth- 5. To start Timed Override:
erwise, Timed Override is invoked only Without the Star Feature, enter the PIN,
during active time zones. enter the Card ID number, press the star (*)
4. Select the terminal Card ID option in the key, enter the number of minutes, and press
Card Type tab. the # key.

5. Verify that the terminal PIN Only option With the Star Feature, enter the PIN, enter
in the Card Type tab is not selected. the Card ID number, press the star (*) key
followed by number 0, enter the number of
6. Verify that the terminal PIN + Card ID
minutes, and press the # key.
option in the Card Type tab is not selected.

24-10832-194 Rev. E
520 APPENDIX D
Using a Keypad Reader on CK721-A Panels

6. To stop Timed Override: To invoke Timed Override with PIN and


Without the Star Feature, enter the PIN, Badge, allowing PIN after badge:
enter the Card ID number, press the star (*) 1. Select the terminal Cardholder Over-
key, enter 0 (for minutes), and press the # ride/Shunt option in the Access tab.
key.
2. Set the badge Override option in the Secu-
With the Star Feature, enter the PIN, enter rity Options tab.
the Card ID number, press the star (*) key
followed by number 0, and press the # key. 3. Set the terminal PIN Suppression in the
Timezone tab to an inactive time zone.
4. Select the terminal Allow PIN After
To invoke Timed Override with PIN and Badge option in the Flags tab.
Badge:
5. To start Timed Override:
1. Select the terminal Cardholder Over-
Without the Star Feature, enter the PIN,
ride/Shunt option in the Access tab.
press the star (*) key, enter number of min-
2. Set the badge Override option in the Secu- utes, present the badge1, and press the #
rity Options tab. key.
3. Set the terminal PIN Suppression in the With the Star Feature, enter the PIN, press
Timezone tab to an inactive time zone. the star (*) key followed by number 0,
4. Verify that the terminal Allow PIN After enter the number of minutes, present the
Badge option in the Flags tab is not badge1, and press the # key.
selected. 6. To stop Timed Override:
5. To start Timed Override: Without the Star Feature, enter the PIN,
Without the Star Feature, enter the PIN, press the star (*) key, enter 0 minutes, pres-
press the star (*) key, enter the number of ent the badge1, and press the # key.
minutes, and present the badge. With the Star Feature, enter the PIN, press
With the Star Feature, enter the PIN, press the star (*) key followed by number 0,
the star (*) key followed by number 0, present the badge1, and press the # key.
enter the number of minutes, and present 1)
You may present the badge at any time
the badge. before pressing the # key.
6. To stop Timed Override:
Without the Star Feature, enter the PIN,
press the star (*) key, enter 0 (for minutes),
and present the badge.
With the Star Feature, enter the PIN, press
the star (*) key followed by number 0, and
present the badge.

24-10832-194 Rev. E
521

Invoking Panel Card Events 3. Select the terminal PIN Only option in the
Card Type tab. PIN Only works exclu-
from a Keypad sively with 5-digit algorithmic PINs.
4. Set the panel PIN Code Type to Algorith-
mic.
To invoke Panel Card Events with
Badge: 5. Set the panel PIN Code Digits to 5.
6. To activate the event:
1. Set the panel card event Trigger Type to
Card/Keypad Code. Without the Star Feature, enter the PIN,
press A, enter the keypad code, and press
2. To invoke a Panel Card Event using a the # key.
badge at any time, set the terminal PIN
Suppression in the Timezone tab to With the Star Feature, enter the PIN, press
<none>. Otherwise, the Panel Card Event the star (*) key followed by number 1,
is invoked only during active time zones. enter the keypad code, and press the # key.
3. To activate the event: 7. To deactivate the event:
Without the Star Feature, press A, enter the Without the Star Feature, enter the PIN,
keypad code, and present the badge. press D, enter the keypad code, and press
the # key.
With the Star Feature, press the star (*) key
followed by number 1, enter the keypad With the Star Feature, enter the PIN, press
code, and present the badge. the star (*) key followed by number 4,
enter the keypad code, and press the # key.
4. To deactivate the event:
Without the Star Feature, press D, enter the
To invoke Panel Card Events with Card
keypad code, and present the badge.
ID:
With the Star Feature, press the star (*) key
followed by number 4, enter the keypad 1. Set the panel card event Trigger Type to
code, and present the badge. Card/Keypad Code.
2. To invoke a Panel Card Event using Card
To invoke Panel Card Events with PIN ID at any time, set the terminal PIN Sup-
Only: pression in the Timezone tab to <none>.
Otherwise, the Panel Card Event is
1. Set the panel card event Trigger Type to invoked only during active time zones.
Card/Keypad Code or Card/PIN/Key- 3. Set the terminal Card ID option in the
pad Code. Card Type tab.
2. If set to Card/PIN/Keypad Code, set the 4. Verify that the terminal PIN Only option
terminal PIN Suppression in the Time- in the Card Type tab is not selected.
zone tab to an inactive time zone.
5. Verify that the terminal PIN + Card ID
option in the Card Type tab is not selected.

24-10832-194 Rev. E
522 APPENDIX D
Using a Keypad Reader on CK721-A Panels

6. To activate the event: 6. To deactivate the event:


Without the Star Feature, enter the Card ID Without the Star Feature, enter the PIN,
number, press A, enter the keypad code, enter the Card ID number, press D, enter
and press the # key. the keypad code, and press the # key.
With the Star Feature, enter the Card ID With the Star Feature, enter the PIN, enter
number, press the star (*) key followed by the Card ID number, press the star (*) key
number 1, enter the keypad code, and press followed by number 4, enter the keypad
the # key. code, and press the # key.
7. To deactivate the event:
Without the Star Feature, enter the Card ID To invoke Panel Card Events with PIN
number, press D, enter the keypad code, and Badge:
and press the # key.
1. Set the panel card event Trigger Type to
With the Star Feature, enter the Card ID Card/Keypad Code or Card/PIN/Key-
number, press the star (*) key followed by pad Code.
number 4, enter the keypad code, and press 2. Set the terminal PIN Suppression in the
the # key. Timezone tab to an inactive time zone.
3. Verify that the terminal Allow PIN After
To invoke Panel Card Events with PIN Badge option in the Flags tab is not
and Card ID: selected.
1. Set the panel card event Trigger Type to 4. To activate the event:
Card/Keypad Code or Card/PIN/Key- Without the Star Feature, enter the PIN,
pad Code. press A, enter the keypad code, and present
2. If set to Card/PIN/Keypad Code, set the the badge.
terminal PIN Suppression in the Time- With the Star Feature, enter the PIN, press
zone tab to an inactive time zone. the star (*) key followed by number 1,
3. Select the terminal PIN + Card ID option enter the keypad code, and present the
in the Card Type tab. badge.
4. Verify that the terminal PIN Only option 5. To deactivate the event:
in the Card Type tab is not selected. Without the Star Feature, enter the PIN,
5. To activate the event: press D, enter the keypad code, and present
Without the Star Feature, enter the PIN, the badge.
enter the Card ID number, press A, enter With the Star Feature, enter the PIN, press
the keypad code, and press the # key. the star (*) key followed by number 4,
With the Star Feature, enter the PIN, enter enter the keypad code, and present the
the Card ID number, press the star (*) key badge.
followed by number 1, enter the keypad
code, and press the # key.

24-10832-194 Rev. E
523

To invoke Panel Card Events with PIN With the Star Feature, enter the PIN, press
and Badge, allowing PIN after badge: the star (*) key followed by number 4,
enter the keypad code, present the badge1,
1. Set the panel card event Trigger Type to and press the # key.
Card/Keypad Code or Card/PIN/Key-
1)You may present the badge at any time
pad Code.
before pressing the # key.
2. Set the terminal PIN Suppression in the
Timezone tab to an inactive time zone.
3. Select the terminal Allow PIN After Quick Guide to Using
Badge option in the Flags tab. Keypad Readers
4. To activate the event:
Without the Star Feature, enter the PIN, Use the following quick guide to determine the
press A, enter the keypad code, present the key sequence at a keypad reader required for a
badge1, and press the # key. particular action. This section assumes that
With the Star Feature, enter the PIN, press you have configured all terminal and panel set-
the star (*) key followed by number 1, tings for this action.
enter the keypad code, present the badge1,
and press the # key.
5. To deactivate the event: Note: Use the terminal Star Feature if you want
to invoke Panel Card Events on a keypad that
Without the Star Feature, enter the PIN, does not have the A and D keys.
press D, enter the keypad code, present the
badge1, and press the # key.

24-10832-194 Rev. E
524 APPENDIX D
Using a Keypad Reader on CK721-A Panels

Legend

Keypad Code Enter the Keypad Code. badge Present the badge.
PIN Enter the PIN number.
* 0 1
Press the specified key.
Card ID Enter the Card ID number. # A D
Minutes Enter the number of minutes.

Invoking Access Requests from a Keypad

With Badge
To request access: badge

With PIN Only


To request access: PIN #

With Card ID
To request access: Card ID #

With PIN and Card ID


To request access: PIN Card ID #

With PIN and Badge


To request access: PIN badge

With PIN and Badge, allowing PIN after Badge


To request access: PIN badge1 #
1) You may present the badge at any time before pressing the # key, that is, before, during or
after you enter the PIN.

Invoking Air Crew Access Requests from a Keypad

To request access without Star Feature: B Air Crew PIN #


To request access with Star Feature: * 2 Air Crew PIN #

24-10832-194 Rev. E
525

Invoking Timed Overrides from a Keypad


With Badge
To start override without Star Feature: * Minutes badge
To stop override without Star Feature: * 0 badge
To start override with Star Feature: * 0 Minutes badge
To stop override with Star Feature: * 0 badge

With PIN Only


To start override without Star Feature: PIN * Minutes #
To stop override without Star Feature: PIN * 0 #
To start override with Star Feature: PIN * 0 Minutes #
To stop override with Star Feature: PIN * 0 #

With Card ID
To start override without Star Feature: Card ID * Minutes #
To stop override without Star Feature: Card ID * 0 #
To start override with Star Feature: Card ID * 0 Minutes #
To stop override with Star Feature: Card ID * 0 #

With PIN and Card ID


To start override without Star Feature: PIN Card ID * Minutes #
To stop override without Star Feature: PIN Card ID * 0 #
To start override with Star Feature: PIN Card ID * 0 Minutes #
To stop override with Star Feature: PIN Card ID * 0 #

With PIN and Badge


To start override without Star Feature: PIN * Minutes badge
To stop override without Star Feature: PIN * 0 badge
To start override with Star Feature: PIN * 0 Minutes badge
To stop override with Star Feature: PIN * 0 badge

With PIN and Badge, allowing PIN after Badge


To start override without Star Feature: PIN * Minutes badge1
badge #
To stop override without Star Feature: PIN * 0 badge1
badge #
To start override with Star Feature: PIN * 0 Minutes badge
badge 1
#
To stop override with Star Feature: PIN * 0 badge
badge 1
#

1
) You may present the badge at any time before pressing the # key, that is, before, during or
after you enter the PIN and the Timed Override sequence.

24-10832-194 Rev. E
526 APPENDIX D
Using a Keypad Reader on CK721-A Panels

Invoking Panel Card Events from a Keypad


With Badge
To activate event without Star Feature: A Keypad Code badge
To deactivate event without Star Feature: D Keypad Code badge
To activate event with Star Feature: * 1 Keypad Code badge
To deactivate event with Star Feature: * 4 Keypad Code badge
With PIN Only
To activate event without Star Feature: PIN A Keypad Code #
To deactivate event without Star Feature: PIN D Keypad Code #
To activate event with Star Feature: PIN * 1 Keypad Code #
To deactivate event with Star Feature: PIN * 4 Keypad Code #
With Card ID
To activate event without Star Feature: Card ID A Keypad Code #
To deactivate event without Star Feature: Card ID D Keypad Code #
To activate event with Star Feature: Card ID * 1 Keypad Code #
To deactivate event with Star Feature: Card ID * 4 Keypad Code #
With PIN and Card ID
To activate event without Star Feature: PIN Card ID A Keypad Code #
To deactivate event without Star Feature: PIN Card ID D Keypad Code #
To activate event with Star Feature: PIN Card ID * 1 Keypad Code #
To deactivate event with Star Feature: PIN Card ID * 4 Keypad Code #

With PIN and Badge


To activate event without Star Feature: PIN A Keypad Code badge
To deactivate event without Star Feature: PIN D Keypad Code badge
To activate event with Star Feature: PIN * 1 Keypad Code badge
To deactivate event with Star Feature: PIN * 4 Keypad Code badge

With PIN and Badge, allowing PIN after Badge


To activate event without Star Feature: PIN A Keypad Code badge1 #
To deactivate event without Star Feature: PIN D Keypad Code badge1
#
To activate event with Star Feature: PIN * 1 Keypad Code badge1
#
To deactivate event with Star Feature: PIN * 4 Keypad Code badge1
#

1
) You may present the badge at any time before pressing the # key, that is, before, during or
after you enter the PIN and the Panel Card Event sequence.

24-10832-194 Rev. E
527

Appendix E: Troubleshooting

T
his section explains the authentication The P2000 installation creates the following
process for a P2000 user. This helps user groups:
you understand what goes on behind
the scenes, the reason for each step, and User Group Properties
how to troubleshoot when problems arise. PEGASYS Connects to the Server and data-
Users base over the network.
PEGASYS Connects to the Server and data-
Authentication Process Administrators base over the network, and also
have database administrative
rights (needed to drop and create
database tables, and to restore
the database).
Windows Authentication PEGASYS MIS Connects to the Server and MIS
Users Interface portions of the data-
The first level of authentication for a P2000 base.
Workstation is the connection to the P2000
Server. The Workstation must connect to the
Server over the network to gain access to the SQL Server Authentication
database. Your Windows operating system per-
forms this authentication. The Workstation The second level of authentication for a P2000
sends to the Server the username and password Workstation is the SQL Server database. The
that the user used when logging on to Win- Workstation connects to the SQL Server with
dows. The Server then compares this username an ODBC connection. The ODBC connection
and password with the users configured in passes a username and password to the SQL
Windows. To connect the Workstation to the Server to be authenticated. The default config-
Server, this username and password must be a uration of a P2000 ODBC connection is to pass
valid account on the Server. the Windows username and password. The
username and password that the ODBC con-
The P2000 Server installation creates three nection sends must be a valid account in SQL
Windows user groups, which you can assign to Server for the Workstation to connect to the
a user account to allow connection to the database. The P2000 Server installation creates
Server. SQL Server accounts for each of the three
Windows user groups. Since SQL Server has
accounts for the user groups that the P2000
Server installation created, assigning a Win-
dows user account to one of those groups auto-
matically grants access to the SQL Server data-
base.

24-10832-194 Rev. E
528 APPENDIX E
Troubleshooting

P2000 Authentication Testing the Workstation


The third level of authentication for a P2000 Start the P2000 software and log on with the
Workstation is the list of users configured in correct username and password. If the login
the P2000 software. When the P2000 software succeeds, everything is OK. If the login fails,
is started, the user is presented with a login see P2000 Login Troubleshooting on page 529.
screen. The username and password that the
user enters is compared with the users config-
ured in the P2000 software. The Workstation is Troubleshooting Workstation
also checked against the list of valid worksta- Problems
tions configured into the P2000 system.
If the P2000 Login dialog box displays, follow
P2000 Login Troubleshooting on page 529.
Otherwise, follow P2000 Network Trouble-
shooting on page 530.

For troubleshooting CCTV, see CCTV Control


Troubleshooting on page 531.

24-10832-194 Rev. E
529

P2000 Login Troubleshooting

Yes Verify username


P2000 Login
and password in the
dialog box
P2000 software
displayed?

No

Verify Windows username


Client and password on the SQL
Yes Server computer. Also verify if
unable to establish
connection user is part of Pegasys Users
error or Pegasys Administrators
group.

No

Verify SQL Server username


and password in the database.
Login failed Yes Also verify if Pegasys Users
for user xxxxx and Pegasys Administrators
error have access to the SQL
database Pegasys.

No

Go to P2000
Network
Troubleshooting
(page 530)

24-10832-194 Rev. E
530 APPENDIX E
Troubleshooting

Can you Verify workstation NIC


ping the server Request Destination No installation and driver.
No No
from the workstation timed out unreachable Check TCP/IP
by address? error error Protocol Settings

Yes Yes

Yes There is a basic network There is a network routing


wiring problem. Check problem. Check TCP/IP
cables, hubs, and so on. gateway settings on
Also, verify IP addresses. workstation.

There is a name
Can you resolution problem at
ping the server No the workstation. Check
from the workstation TCP/IP DNS and
by name? WINS settings on
workstation.

Yes

Can you Verify server NIC


Request Destination No
ping the workstation No No installation and driver.
timed out unreachable
from the server Check TCP/IP Protocol
error error
by address? Settings

Yes Yes

Yes There is a basic network There is a network routing


wiring problem. Check problem. Check TCP/IP
cables, hubs, and so on. gateway settings on
Also verify IP addresses. server.

There is a name
Can you resolution problem at the
ping the workstation No server. Check TCP/IP
from the server DNS and WINS settings
by name? on server.

Yes

Contact Technical
P2000 Network Troubleshooting
Support

24-10832-194 Rev. E
531

CCTV Control Troubleshooting

Are the Start the following


Is the CCTV communications services:
Control correctly No No
with the CCTV Server
displayed? CCTV Server OPC Proxy
running? RTL Route

Yes

Check Windows
application log on CCTV
Server and main P2000
Server for more detailed
information

Yes

Could not CCTV configuration is


load valid Yes
wrong. Check the
configuration configuration.
error

No

Follow information
in error log

You are correctly


connected to the CCTV
Server Yes
Successful? Problem resolved

No

Save application event


log of CCTV Server
computer and Master
P2000 computer to file

Send file to
Technical Support

24-10832-194 Rev. E
532 APPENDIX E
Troubleshooting

24-10832-194 Rev. E
533

Appendix F: Secured Premises


Notification Settings

T
he steps in this section are specific for Panel Configuration
panels that support the Panel Card
1. The panel must contain at least one input
Event feature, and are necessary to
and one output terminal, in addition to a
ensure UL 1076 compliance when you
reader terminal. An acceptable alternative
use a panel card event to unsuppress (arm) pro-
is a terminal that includes input, output, and
tected premise alarm signals. reader capabilities, such as the
According to UL 1076 requirements, if you S300-DIN-RDR2S-A module.
unsuppress alarms at the protected premises See Configure Hardware Components on
(for example, through a panel card event), page 53.
when this event is invoked, you must receive
an indication, either audible or visible, that the Input Point Configuration
P2000 Server received the message that the
panel generated after the event was processed. 1. Set the protected premise input point Sta-
If you do not receive the expected indication, tus to Enable.
then either the panel is offline from the Server 2. Set the Disabled During Time Zone
or the panel did not process the panel card option to <none>.
event request. 3. From the Alarm Priority drop-down list,
select 4, 3, 2, 1, or 0, depending on individ-
Before you define the Host event configuration
ual company policy for protected premise
(see page 534), you should verify the follow-
alarms.
ing settings. Use your discretion to program
any parameters not specified. See Create Input Points on page 82.

Output Point Configuration


Configuration
1. Set the output point Active State to
Timed.
Cardholder Configuration
2. Set the Duration to 5 seconds or longer.
1. Create a badge for a cardholder with an 3. You must wire the output point to an audi-
Event Privilege equal to or greater than ble or visible indicator. Depending on the
the panel card event privilege level used terminal type used and the device selected,
for suppressing or unsuppressing protected you may need to supply external power for
premise alarms. the indicating device.
See Entering Badge Information on page 251 4. The indicator must be visible or audible
for detailed instructions. from the point (location) the panel card
event is deactivated.
See Create Output Points and Groups on
page 80.

24-10832-194 Rev. E
534 APPENDIX F
Secured Premises Notification Settings

Input Group Configuration


Note: The Logic and Value selected must
1. Define the input group to use with the include the badges that are allowed to unsup-
press protected premise alarms.
panel card event, and that includes the pro-
tected premise alarm input points defined
in Input Point Configuration on page 533. 4. Define the Action condition as:
See Create Input Groups on page 89.  Delay: 00:00:00 (none)
 Category: Outputs
Panel Card Event Configuration  Type: Set Output - Timed
 Outputs: select the output defined in
1. Select an appropriate Privilege Level to Output Point Configuration on page 533
use with the card.
 Duration: 0 seconds
2. Set the event Trigger Type to Card/Key-
See Create Events on page 335.
pad Code or Card/PIN/Keypad Code.
3. Set the Event Duration to 0. (The panel
card event must not specify an event dura-
Sequence of Events
tion time.) The following information describes a typical
4. In the Input Group box, select Enable and sequence of events given in the configurations
Suppress, and select the affected Input described before.
Group (previously defined).
1. Applicable protected premise alarms are in
5. In the Valid Readers for Current Event a secure state and are not suppressed.
box, select the readers to use for initiating
2. An authorized cardholder initiates (acti-
the card event.
vates) a panel card event, which suppresses
See Configure Panel Card Events on page 91. an input group including protected premise
alarm signals.
Host Event Configuration 3. All protected premise alarm signals associ-
ated with the panel card event are now sup-
To meet the UL requirement, you must create a pressed and do not report to the host.
Host event to be triggered when a panel card
event is deactivated. 4. An authorized cardholder deactivates the
previously activated panel card event.
1. Create an Event. 5. All protected premise alarm signals associ-
2. Make sure the event Allow Manual Trig- ated with the panel card event are now
ger flag is not selected. unsuppressed (armed) and report to the
3. Define the Trigger condition as: host (if the panel is online).

 Category: Badge 6. The host, having received the panel card


event deactivate message, initiates its event
 Type: Panel Card Event Deactivated
and sets the appropriate output point.
 Condition: Badge
7. The output point activation causes an audi-
 Logic: make appropriate selection ble or visible indicator to be annunciated at
 Value: make appropriate selection the location where the panel card event was
deactivated.

24-10832-194 Rev. E
535

Appendix G: Secured Premises


Notification Settings for Mercury
Panels with Keypad DM-21 (MRDT)

T
he following steps are specific for pan- Mercury Hardware Configuration
els that support the intrusion feature,
and are necessary to ensure UL 1076 1. Create a Mercury panel that contains at
compliance when you use a Mercury least one terminal with an available output,
intrusion keypad terminal DM-21 (MRDT) to in addition to the DM-21 intrusion keypad
unsuppress (arm) protected premise alarm sig- terminal, and the defined protected premise
nals. input points.
See Configure Mercury Panels and Compo-
nents on page 151.
Note: Throughout this section, the terms
DM-21 and MRDT are used interchangeably and
refer to the Mercury intrusion keypad terminal. Input Point Configuration

1. Set each protected premise input point Sta-


According to UL 1076 requirements, if you
tus to Enable.
unsuppress alarms at the protected premises
(for example, through the arming command at See Configure Mercury Inputs on page 172.
a DM-21 intrusion keypad terminal), then you
must receive an indication, either audible or Output Point Configuration
visible, that the P2000 Server received the
message that the area was armed after the com- 1. Set the output point Status to Enabled.
mand was processed. If you do not receive the 2. Set the Drive Mode to Normal.
expected indication, then either the panel is
offline from the Server or the panel did not 3. Set the Offline Mode to No Change.
process the arming command as requested. 4. Set the Active State to Timed.
Before you define the Host event configuration 5. Set the Duration to 5 seconds or longer.
(see page 536), you should verify the follow- 6. You must wire the output point to an audi-
ing settings. Use your discretion to program ble or visible indicator. Depending on the
any parameters not specified. terminal type used and the device selected,
you may need to supply external power for
the indicating device.
Configuration
7. The indicator must be visible or audible
from the point (location) the DM-21 intru-
Cardholder Configuration
sion terminal is used to arm the system.
1. Create a badge that has access rights to the
See Configure Mercury Outputs on page 176.
DM-21 intrusion keypad terminal and that
can manage protected premise alarms.
See Entering Badge Information on page 251
for detailed instructions.

24-10832-194 Rev. E
536 APPENDIX G
Secured Premises Notification Settings for Mercury Panels with Keypad DM-21 (MRDT)

Mercury Intrusion Zone Configuration


Note: The Logic and Value selected must
1. Create a Mercury intrusion zone that include the areas from which protected premise
alarms can be unsuppressed.
includes the protected premise input point
defined in Input Point Configuration on
page 535. 4. Define the Action condition as:
2. Set the Mercury intrusion zone to  Delay: 00:00:00 (none)
Enabled.  Category: Outputs
3. Set the Point Type in the Mercury tab to  Type: Set Output - Timed
Input Point.  Outputs: select the output defined in
4. Edit your Alarm Category in the Alarm Output Point Configuration on page 535
Options tab to set the Alarm Priority to 4,  Duration: 0 seconds
3, 2, 1, or 0, depending on individual com- See Create Events on page 335.
pany policy for protected premise alarms.
See Configuring Mercury Intrusion Zones on
page 323. Sequence of Events
The following information describes a typical
Mercury Intrusion Area Configuration sequence of events given in the configurations
described before.
1. Create a Mercury intrusion area that
includes the Mercury intrusion zone previ- 1. Applicable protected premise alarms are in
ously defined, which includes the protected a secure state and are not suppressed.
premise input points defined in Input Point
2. An authorized cardholder initiates a disarm
Configuration on page 535.
command at the DM-21, which suppresses
See Configuring Mercury Intrusion Areas on a Mercury intrusion area including pro-
page 324. tected premise alarm signals.
3. All protected premise alarm signals associ-
Host Event Configuration ated with the panel are now suppressed and
do not report to the host.
To meet the UL requirement, you must create a
Host event to be triggered when a user arms an 4. An authorized cardholder arms the previ-
area that includes the protected premise input ously disarmed area.
points from the DM-21. 5. All protected premise alarm signals associ-
ated with the area are now unsuppressed
1. Create an Event.
(armed) and report to the host (if the panel
2. Make sure the event Allow Manual Trig- is online).
ger flag is not selected.
6. The host, having received the arm com-
3. Define the Trigger condition as: mand message, initiates its event and sets
 Category: Intrusion Area the appropriate output point.
 Type: Armed (transition) 7. The output point activation causes an audi-
 Condition: Area Name ble or visible indicator to be annunciated at
the location where the DM-21 intrusion
 Logic: make appropriate selection
keypad terminal was armed.
 Value: make appropriate selection

24-10832-194 Rev. E
537

Index

Numerics Address 66 Allow Manual Trigger 336


24 Hour Zone 324 ADS Repository Name 370 Allow Multiple Alarm Handling 25
ADS/ADX 370 Allow PIN after Badge 67
ADS/ADX server 368 Allow PIN before Badge 168
A Aimetis Interface Service 429 Always upload when greater
Abort Time 378 Air Crew PIN 63, 75 than 56
Access Grant Message 197 alarm beep 275 Annunciator 318
Access Grant Message on Door Alarm Category 270, 274 Anti Tailgate 68
Open Only 67 Alarm Category Filters 228 Anti-Passback 70, 114, 130
Access Groups 37, 232 Alarm Colors 277 Anti-Tailgating 167
Access Levels 152 Alarm Debounce Time 69 Any Guard 379
Access Method 129 Alarm Description 274 Any Void Card 92
Access Privileges 243 Alarm Details 277 Application Path 48
Access Requests 7 Alarm Escalation Ranges 227 Apply Security Options
badge privileges 7 Alarm Instruction 84 ‘Enterprise’ 405
invalid badges 7 Alarm Late 379 Apply Security Options
time 7 Alarm Monitoring 270 Enterprise 253
valid badges 7 acknowledge alarms 271, 275 Approval Levels 409
Access Rights 255 activate an event 277 Approved Visits 262, 418
Access Template 256 alarm handling 271 Area Alarms Setting 298
apply options to badges 258 alarm monitor definitions 273 Area Control 296
Access Templates 236 audible alarm button 275 Area Filters 301
Access Time 70 complete an alarm 272, 277 configure the Area 296
Account Disabled 25 date/time 273 control the Area 299
Account Type 25 escalation 273 display details 301
Acknowledgement Required before locate alarms on maps 275 reports 304
Completion 85 priorities 273 Terminals and Inputs Points 298
ACR Number 165 priority sounds 274 Area Details 301
Action Date/Time 275 refresh the window 272 Area Filters 301
Actions 337 remove an alarm 272, 277 Area Layout 303
create an action 338 respond 271, 275 Aritech Intrusion Alarms 326
definitions 338 Alarm Options 34 Aritech Intrusion Server 319
order of occurrence 338 Alarm Popup 84 armed 318
Activated Devices 383 Alarm Priority 84 Assa Abloy DSR Interface
Active Directory 24 Alarm Processing Group 24 Service 429
Active State 81 Alarm Shunt Only for Auxiliary Assa Abloy Facility Parameters 137
Active States 177 Access 67 Assa Abloy Locks 136
Active Tours 383 Alarm Site 275 Assa Abloy Panel 144
Active-off 87 Alarm Skip 379 Assa Abloy Terminals 146
Active-on 87 Alarm State 274 Assigning Operators 23
AD Account 24, 409 Alarm Status 274 Assisted Access 72, 169
AD Profile 24, 409 Alarm Timezone 84 Assisted Access Time 169
ADA Indicator 153 Alarms 8 Assisted Shunt Time 169
ADA Relay Connector 73 door alarms 8 Associated AV Channel 85
ADA Relay Delay 73, 169 external device alarms 8 Associated Real Time Map 85
ADA Relay Mode 169 host alarms 8 At Risk 306, 317
ADA Relay Time 73 remote alarms 8 Audit Trail 39, 392
Add Hardware Module 76 software only alarms 8 Authorized Users 392
Add Mag Track Formula 360 Allow Any IP Address 46 Auto Badge Management 264
Add Visitor 261 Allow devices 47 Auto Disarm 325
sponsor information 262 Allow expansion 309 Auto Duress Alarm 379

24-10832-194 Rev. E
538 INDEX

Auto Forward 378 Bosch Intrusion Alarms 327 Chime Flag 324
Auto Process 409 Bosch SIA 279 CIM Override 256
Auto Reverse 378 Broadcast Port Number 58 CK721-A and S321-IP Data Import
Auto Start 429 Bulk Badge Change 259 and Export 458
Automatic Employee IDs 241 Bypass 440 CK721-A Download Service 430
Automatic Software Updates 434 Bypass Off 329 CK721-A Priority Service 430
Auxiliary Access 7 Bypass On 329 CK721-A Upload Service 430
AV Service 429 bypassed 318 CK721-A/S321-IP Data Import and
Avigilon Interface Service 429 Bypassed on startup 324 Export 448
Clear DSR 141
Clear Lock 144
B C Clear Text 46
B426 Configuration Rules 321 Cabinet Access Control 216 Commend Intercom 395
Backup and Restore 448 Cabinet Configuration 218 Commend Outputs 396, 398
Backup Controller Name 209 Calculate Digital Signature 448, Comms Server 34
Backup DB to Flash Interval 55 458 Communication
Backup Device 40 Calibrate 75 downloads 6
Backup IP Address 209 Calibrate with Resistor 116, 119 operating modes 6
Backups 451 Calibration 87 central 6
automatic 453 Card Data Formatting 169 local 6
backup device 451 Card Events 9 shared 6
manual 452 Card Format 154, 155 transactions 6
restoring database 455 Card Format Types with Offline Communication Modes 6
Badge Data Support 170 Company 246
badge field definitions 252 Card Format Types without Offline Company definition 234
entering badge information 251 Support 170 Concealed UDFs 27
Facility Code 252 Card Only 92 Connect Interval 147
issue level 252 Card Track 100 Connection String 158
viewing 258 Card Type 74 Contractor Request 416
Badge Design 359 Card Use Limit 254 Control all Doors 291
Badge Device Setup 362 Card/Keypad Code 92 Control Point Number 176
Badge Format 123, 193, 237 Card/PIN Code 92 Control Station Groups 400
Badge ID Allowed 114 Card/PIN/Keypad Code 92 Control Sub-Stations 400
Badge Information 258 Cardholder Data 245 Convert to Current Version After
Badge Layout 362 cardholder email address 410 Restore 456
Badge Layout Fields 359 Cardholder Information 345 COP Destination When
Badge Override 114 Cardholder Override 130 Connected 209
Badge Purpose 238, 253 Cardholder Override/Shunt 71 Count All 298
Badge Reason 238, 253 Cardholders Count Inputs 298
Badge Resync 265 cardholder field definitions 245 Count Terminals 298
Badge Station 20, 359 cardholder image 247 Create NT user account on
Badge Trace Alarm for Denied cardholder information 244 server 25
Access 34 cardholder types Cross Site Access Group Editing 34
Badge Trace Alarm for Granted regular 245 Current Count 302
Access 34 visitor 245 Current Firmware Version 446
Badge Transaction History 258 edit cardholder information 250 Custom Card Formats 64
Base Name 77 Journals 248 Custom Configuration Number 55
Base64 46 searching 250 Custom Reports 486
Basic Configuration 5 user defined fields 249 create custom reports 486
Basic System Components 2 visitor sponsor 247 edit reports in Crystal 487
external device 4 Cart Service 256 export existing reports 487
field panels 4 CCTV 389 import custom reports 486
Server 2 CCTV Server 429
system printer 3 Central 70
central Enterprise site 403 D
terminals 4
workstations 3 Central In-X-It 168 Data Style 253
Baud Rate 59 Central Response Timeout 158 Database External Trigger 45
Begin Suppression 295 Chain Rules 184 Database Maintenance 447
Bind Server 41 Change Password 28 advanced backups 452
Blanking Time 268, 269 change password at next logon 25 automatic backups 453
Bosch Intrusion 320 Check Use Limit 169 backup device 451

24-10832-194 Rev. E
539

database backup 451 Door Service Router 140 Access Groups 404
database restore 455 Door Tracking 219 Global Access Rights 405
manual backups 452 DOP Destination When Parameters 403
Database Server 403 Connected 210 Sites 247, 403
Database Table Definitions 486 DOP Source When Connected 210 Time Zones 404
Daylight Savings 101 Download Access Groups of Entry Delay 176
Daylight Savings Used 112 badge 42 Entry Exit Delay 83
DB Server 34 Download badges with Undefined Escalation 85
Debounce Scan Count 170, 171, entry/exit status 42 Escalation based upon visibility 86
175 Download Function 425 Escalation Increment 86
Debounce Time 133 Download options 41 Escalation Repeat 86
Decoding Rules 194 Download Status 426 Escalation Service 430
Decrement Use Limit 169 by panel 427 Escalation Timeout 86
Default Alarm Colors 277 Download to disabled panels 42 Evaluate Exported Data 464
Default Reader Mode 166 Downstream Connections 159 Evaluating Imported Data 461
Default Status 325 Drill 315 Event Action Types 499
Default Timezone 233 Drive Mode 171, 177 Event Actions 337
Degraded 314 DSR 136 Event Counters 340
Delay Downloads Until 436 DSR Downloading 143 add event counters 340
Delay Trigger 324 DSR Status 149 reset event counters 341
Delayed download for badges and Duplicate Maps 352 view event counters 340
access groups 42 Duress 94 Event Privilege 254
Delete all badges from OSI Duress Alarm 380 Events 9
database 448 DVR/VMS 390 card events 9
Delete all hardware from OSI DX4020 Configuration Rules 321 create events 335
database 448 event configuration 335
Delete Badge Layout Fields 360 system events 9
delete badges from panel before E timed events 9
download 426 Edit Button Image 353 Exact Match 251, 259, 266, 301
delete elevators from panel before Elevator 59 Executive Privilege 254
download 426 Elevator Access Grant 197 Exit Delay 176
Delete Expired Visitor Badges 448 Elevator with feedback 166 Expand Zone 316
Delete history older than 56 Elevator without feedback 166 Expiration Period for Requests 408
Delete Selected Alarm 448 Elevators 196 Export 350
Delete Unique Badge Entries 448 EMail 44 Export CK721-A and S321-IP
Delete Unused Access Groups 448 Email 246 Data 463
Delete Visitors Without Badges 448 Emergency Access Disable 416 Extended Access 7
De-Muster 309, 315 Emergency Override 219 Extended Access Flag 98, 123
Deny If Door Open 68 Empty Alarms 448 Extended Access Time 98
Department 246 Empty Alarms History 448 Extended Shunt Time 99
Department definition 235 Empty Archive Database 448 External Event Trigger 44
Destination Entry Computer 207 Empty Audit History 448 External IPs 46
Device ID 370 Empty Download Queue 449 External Trigger Service 430
Dial Number Length 396 Empty Fire Data 449
digital video 390 Empty Guard Tour Note 449
Direct Output Control 197 Empty Saved Muster Data 449 F
Directory Services Password Empty Smart Download Queue 449 Facility Code Only when Offline 67
Validation 27, 41, 409 Empty Transaction History 449 Facility Codes 74
Directory Services Path 28, 41 Enable Input Suppression Failed Attempts Lockout 131
Disable Alarm 84 Messages 59 failed download connections 436
Disabled During Time Zone 83 Enable Mifare Encoding 423 failed download transfers 436
Disarmed 318 Enable Panel Relay Group Fast Flash 81, 292
Display All alarm options 272 Outputs 59 FDA Backup 40
Display asterisks instead of pin Enable Printing 346 FDA Backup Performed 449
code 34 Enable Secondary Interfaces 111 FDA Backups 454
Door controls 290 Encoder Configuration 421 FDA Retention Policy 40
Door Groups 220 Encoding Rules 194 FDA Title 21 CFR Part 11 392
Door Masks 218 Encryption 60, 110, 125 File External Trigger 45
Door Names 217 Enforce Entry/Exit 57 Fire Alarm 282
Door Open Warning 71 Enforce Limitations 36 Fire Devices Configuration 286
Door Sensors 106 Enterprise 3, 402 Fire Panel Status Details 437

24-10832-194 Rev. E
540 INDEX

First Person Through 148 HID Output Points 134 Intrusion Interface Service 430
Fixed IP Address 110 HID Panels 122 Intrusion Panel Status Details 437
flash memory 444 HID Terminals 128 Intrusion Status 330
Floor Groups 216 Hide from MIS 240 Intrusion Transactions 330
Floor Masks 198 Hide reports 487 Inverted 177
Floor Names 197 High Level Interface 59 IP Address 56
Floor Tracking 185 High Priority 427 IPL version 436
Force Logoff 433 HI-O hardware module 127 Item Name Filters 226
Forced Arm 329, 440 History Retention Period 111 Item Synchronization 449
Forced Door 88 Hold Time 170, 175
Forced Door/Propped Door 94 Holiday 51
Found in DB 262, 418 Holiday Calendar 52 J
Four-Digit PINs 80 Holiday Types 51, 52 Journal 248
FS (Full Screen) 268 Host No Reception Timeout 111,
Fully Qualified Name 368 126
Host Poll Timeout 56 K
Hours On Site 332 Keyless Override/Shunt Time 72
G Reporting 333 Keypad 517
Genetec Security Center Interface Zones 332 Keypad Code 92
Service 430 HTTP Disconnect Delay 111 Keypad Credential Length 98
Global Badge Entry/Exit Status Keypad Mode 166
Synchronization 33 Kill All Reports 449
Global In-X-It Tracking 33 I KONE HLI/KONE ELINK High
Global Sub-Station 397 I/O Linking 86 Level Interface 202
Grant Only 379 IFC Interface Service 430 Kone IP Controller Id 208
Group Controller Address 59 Image Recall 267 Kone IP Group 209
Guard 375 activate 268 KONE IP High Level Interface 208
Guard Tour 374 filters 267 KONE IP Portal 212
adding stations 380 Image Recall FS 268
assigning to a specific guard 379 Import Standard Values 133
assigning tour badges 375 importing an image 364
L
configuring guard tours 376 Importing CK721-A and S321-IP LAN (local area network) 3
control all tours 383 Data 458 Language selection 48
controlling guard tours 383 Index 66 Last Badging Terminal 266
Details 386 Inoperable 314 Last Badging Terminal Group 266
forward and reverse 374 Input Count 302 Last poll communication 436
guard tour priority 376 Input Groups 89 Latch Output 58
principles and definitions 374 Input Point Calibration 153 Latching 176
scheduled times 378 Input Point Suppression 295 Late Alarm 380
system hardware 375 Input Points 82 Launch Automatically 21
tour abort 375 non-alarms 8 LED Mode 166
traversal time 382 Input/Output Mode 113 Load Archive Database from
Guard Tour Control 383 Insert Macro 91 Backup 449
Guard Tour Priority 254 Instruction Conventions 13 Load Language Reports 471
Guard Tour Reports 388 menu shortcuts 13 Local 70
Guard Tour Service 374, 430 Intercom 393 Local Alarms 43, 273
Control 398 Local Configuration 48
Events 401 Local Site 47
H Exchange 394 Lockout 290
Handicap Access Time, KONE Real Time Map Control 400 Lockout Mode 150
IP 212 Stations 397 Log Operator Action 380
Hardware Components 53 Intercom Interface Service 430 Log Output Status Message 69,
Hardware Module 76 Intercom Transaction History 121, 439
Heartbeat Transmit Interval 110, Reports 401 Log Reader Strike Message 67
126 Interior Zone 324 Log Tour Operation 380
Help 14 Intrusion Alarms 326 Log Type 175
context sensitive 14 Intrusion Area 318 Logging on to P2000 10
online 14 Intrusion Configuration 319 changing the default login
HID Facility Parameters 123 Intrusion Control 328 name 11
HID Input Points 131 Intrusion Detection 317 default login values 11
HID Interface Service 430 Intrusion Events 331 passwords 10

24-10832-194 Rev. E
541

Super User 11 Message Filter Group 21, 24, 43, No Change-of-State 175
User Name 10 273 No Configuration Archive to
Logging Out of P2000 12 Message Filter Groups 229 Flash 55
Low Level Interface 199 Message Filtering 221, 222 No Fault-to-Fault 175
Lowest Floor for Group Message Forwarding 281 No Green Light on Aux Access 68
Controller 60 Message Routing 230 None.wav 275
Message Routing Status 275 Non-latching 175
Message Types 224, 509 Normal Popup 85
M Message Void Period 232 Normal Priority 427
Machine Room Enclosure 207 Metasys system 368 Number of Doors 34
Mag Track Formulas 360 Mifare Encoder 421 Number of Floors 34
Magnetic Formula Track 360 Migrate 241
Magnetic Stripe 100 Milestone Interface Service 430
Main Menu 4 Mimic 87 O
Manager Flag 98 Min Required 297 ODBC Data Source 48
Manual Conventions 2 Min Required Alarmed 300 Offline Mode 171, 177
Manual Process 409 MIS image folder 366 Offline Reader Mode 166
Manual Reset 379 MIS Interface 365 Offset / Append Value 152
Manual Tour 378, 385 input and output tables 366 OPC Aritech 319
map icons 350 partitioned systems 366 OPC Proxy Service 431
Map Maker 346, 348 prerequisites 365 OPC Server 339
create an importable image 349 using the interface 366 OPC Tag 339
image sets 352 MIS Interface Service 430 OPC Tags 320
import an image 349 Momentary Auxiliary Access 68, Open for Access Time 290
map attachments 352 113 Operational Mode 121
normal map 349 Monitor Point Number 175 Operator Access 167
place device icons 350 Monitoring Remote Alarms 272 Operator Controls 290
popup map 349 Mouse Conventions 12 control doors 290
system map 349 MSEA 86 control panel relays 292
Mark Secondary Tables 449 MSEA Graphic 86 Operator Name Filters 228
Master Station 397 MSEA Graphics 368 Operators 21
Max Allowed 297 MSEA Registration 369 Optimize for LAN 48
Max Allowed Alarmed 300 Multi-Card Access Time Out 152 Option Keys 31
Max Badge Number 37 Muster 305 OSI Facility 97
Max Inactive Period 33 Muster Control 307 OSI Interface Service 431
Max Issue Level 37 Muster Control Service 430 OSI Panels 95
Max PIN Code Digits 34 Muster Reports 308 OSI portals 102
Max Security Level 37 Muster Shift Setup 309 OSI Terminals 104
Max. consecutive Invalid Logins 40 Muster Startup Rules 308 OSI wireless readers 442
Maximum Queue Length 232 Muster Terminals 305, 310 Otis Compass 204
Maximum Retries 158 Muster Zone 305 Otis Compass Elevator Modes 205
Mercury Elevator Floors 186 Muster Zone Alarm Settings 309 Otis Compass Elevator Options 255
Mercury Elevator Inputs 187 Mustered 306, 317 Otis EMS - Security / BMS
Mercury Elevator Outputs 187 Mustering 305 Protocol 203
Mercury Elevators 184, 185 control 313 Otis Interface Service 431
Mercury Facility Parameters 151 define Muster Zones 306 Otis PIN 207
Mercury Inputs 172 events 312 Otis Unsecured Elevators 207
Mercury Interface Service 430 reports 316 Out Of Order Alarm 380
Mercury Intrusion 323 Out of Sync 148
Mercury Intrusion Areas 324 Output Control 291
Mercury Intrusion Zones 323 N Output Delay 59
Mercury Legacy Mode 152 Name for DNS Address Output Groups 81
Mercury Outputs 176 Resolution 110 Output Points 80
Mercury Panel Type 157 Naming Conventions 53 Output Relays 9
Mercury Panels 151, 156 Navigating through the System 12 activated by events 9
Mercury Procedures and Network Communication 5 activated manually 9
Triggers 180 New Firmware Version 446 input linking 9
Mercury Terminals 160 N-Man Rule 73 output linking 9
Message Filter Configuration 273, No Access Group Archive to Override 254
342 Flash 55 Override Reset Threat Level 69,
No Badge Archive to Flash 55 294

24-10832-194 Rev. E
542 INDEX

P PIN Code Retry 94 printing 345


P2000 Account 24 PIN Code Type 58 view all options 344
P2000 Authentication 528 PIN Codes 78 view specific options 344
P2000 Location 3 PIN Duress 80 Real Time List Transactions 343
P2000 Remote Server 273, 343 PIN Duress Mode 152 Real Time Map 346
P2000 Services 428 PIN Only 78 activate events 348
P2000 Services Definitions 429 PIN Plus 1 Duress 68 create a real time map 348
P2000 System Adapter Service 431 PIN Required 114, 148 open a door 348
P2000 VMS 429 PIN Required when Offline 67 sub maps and attachments 346
P2000 Web UI 3 PIN Retry Alarm 80 view the real time map 347
Pad character 361 pivCLASS Interface Service 431 Real Time Map Alarms 351
Paired Reader 166 Port 159 Reboot 107
Paired, Master 165 Port Configuration 42 Reboot on any failure 429
Panel avg. clock drift (seconds) 437 Portal Packet Ratio 443 Receiving Messages (sec) 43
Panel Card Events 91 Portal Signal Strength 442 Record Persistence 392
Panel Card Formats 64 Pre Max Allowed 297 Record Retention 392
Panel Comparison Matrix 513 Pre Max Allowed Alarmed 300 Record Validation 392
Panel Components 61 Preprocessed reports 474 Redundancy 390
Panel Configuration 53 Primary Badge Format 99, 139 Region Number 396
Panel Details 436 Print All 275, 346 Registration Parameters 5, 31
Panel Holidays 63 Print Displayed 275, 346 Re-lock on Door Open 68
Panel Lost AC 94 Priority Access Time, KONE Remain Time 384
Panel Low Battery 94 IP 212 Remote Alarms 43, 272, 273
Panel max clock drift (seconds) 437 Priority Ranges 227 Remote Call Giving Interface
Panel Poll Interval 56 Privilege Level 92 (RCGIF) 211
Panel Relay Control 292 Procedures 180 Remote Message Service 43, 272,
Panel Status When DSR is Process Received Remote 342, 431
Down 141 Messages 43, 273, 343 Remote Messages in Real Time 342
Panel Tamper 94 Processing Mode 409 Remote Partitions 26
Panel Time Zones 62 Processor Rule 324 Remote Servers 230
Panel Types 35 Programmer Flag 98 Remove Access Groups from
Panel UTC Offset 112, 126, 160 Propped Door 88 Disabled Badges 449
Panels 4, 53 Protocol Type 59 Remove Expired Access Groups
Parity Definition 193 Public 20 from Badges 449
Partial Match 251, 260, 266, 301 Public Access Timezone 186, 201 Report Alarm 219
Partition Name Filters 225 Push to Talk 399 Report Configuration 486
Partitions 9, 355 Report Delay 83
creating partitions 357 Report Disarmed Not Ready to
Q Arm 325
deleting partitions 357
regular 356 Query String 55, 275 Report on Terminal 94
super user 356 Query String Filters 225 Report Strike Status 114
types 356 Queued Download Actions 427 Reporting Delay 58
Passenger Type 255 Reports 471
Password Mode 46 alarm history report 479
R cardholders without badges
Password never expires 25
Random Watch 378 report 483
Password Policy 40
Raw Data 195 cardholders-preprocessed
Password Validation 40
RAW reports 474 report 481
Password Verification 14
Read Configuration 322 custom reports 486
Peer to Peer Badge Sync 57
Reader 66 database table definitions 486
Periodic Service 431
Reader Feedback Mode 152 definitions 474
Permission Groups 21
Reader Mode 113 field/table relationship 486
Permissions 25 Reader Override Timezone load language reports 471
Personalized Access Groups 258 Enable 68 panel report 484
Personnel In Group 314 Reader Packet Ratio 443 print 472
PIN + Card ID 79 Reader Sign On Badge 99 samples 479
PIN After Badge 148 Reader Signal Strength 442 transaction history report 485
PIN Append 152 Readers with Keypads 104 Request Approval 415
PIN Code 252 Readers without Keypads 104 Request Approvers 410
PIN Code Digits 58 Real Time List 342 Request Queue 466
PIN Code Offset 152 color coded transactions 345 Request Queue Service 431

24-10832-194 Rev. E
543

Request Queue View 466 Security level control 293 SNMP 111
details 469 Security Options 253 SNMP Trap Receiver Service 431
filtering 468 Send COP 209 snow emergency 190
Request Status 415, 416 Send DOP 209 Soft Alarms 93
Required Approval Levels 408 Send Email to Request Soft Input Points 54
Required Cardholder Fields 239 Approvers 408 Soft In-X-It 68, 94
Required Fields 245 Sequester 317 Software Updates 434
Required fields 249 Sequester Terminals 305, 311 Source Time Zone 322
Rescuer 306, 317 Sequestered 306 Special Access 7, 34, 73, 254
Resend All Events 322 Server 2 basic access override 7
Resend Attempt Interval 111, 126 Service Controls 432 auxiliary access 7
Reset Counters 437 stop and start services 432 extended access 7
Reset Counters to Zero 449 stop/star a specific service 432 timed override 7
Reset Panel Before Download 163, stop/start all services 432 granting badge privileges 8
426 Service Monitor 432 Special Access Flags 92
Reset Reserved Autobadge Service Override 219 Special Access Privileges, KONE
Numbers 449 Service Pack 434 IP 212
Reset Time 437 Service Startup Configuration 428 Split Group 256
ResetAck 329, 441 Session Type 433 sponsors 247
Response Required before Set Alarm Color 384 SQL Server Authentication 527
Completion 85 Set all Input Status to Unknown 450 Standard Reports 471
Response Text 279 Set all Output Status to run a standard report 472
create 279 Unknown 450 Star Feature 68
Restart on 1st failure then Set all Panel Status to static text objects 351
reboot 429 Unknown 450 Station Group 397
Restart on 2 failures then reboot 429 Set all Terminal Status to Station Type 381
Restart on failure 429 Unknown 450 Statistics Update Interval 106
Restore to archive 456 Set Computer Default Stop Suppression 295
Resume Normal Operation 291 Language 450 Sub-Station 397
Retention Period 40 Set Panel Relay When Active 83 Super User 11, 356
Retention Policy 39 Set Reader Mode 290 Support Regions 396
Return Address 44 Shared 70 Suppress 93
Return to Normal 290 Shared Path 434 Suppress Input Points 295
Reverse Reading 67 Show All 300, 301 Sync cardholder/badge active
Reverse Swipe Duress 68 Show Only 300, 301 flags 450
Reverse Track 87 Show UDF Fields 268 Synchronize OSI Transaction
REX Contact 129 Shrink Database 450 Counter 450
RMS 43 Shunt Alarm on Request to Exit 113 System Components 31
RS232 External Trigger 45 Shunt Only on REX 168 System Configuration 17
RS-485 Baud Rate 55 Shunt Time 71 System Events 9
RTL Route Service 431 Shunt Warning Auto Off 71 System Information URL 34
Run Time 378 Shunt/ADA Relay 172 System Maintenance 425
SIA Device 280 System Override 57
SIA Interface 279 System Overview 5
S SIA Interface Service 431 System Status 435
S321-IP Input Points 116 SIA Message View 280 Fire Detector 441
S321-IP Interface Service 431 Sign On Key 98 Fire IO Module 441
S321-IP Output Points 120 Silence 330 Fire Zone 441
S321-IP Panels 108 SIO 160 Input Terminals 438
S321-IP Terminals 112 SIO Number 164 Inputs 439
Save the Log File 463 Site Director 368, 370 Integration Components 443
SaveXAction 395, 396, 401 Site Name Filters 224 Intrusion Annunciators 441
Scramble Mode 58 Site Parameters 32 Intrusion Areas 440
searching for cardholders 250 Site Parameters Printing 34 Intrusion Zones 440
Secure Authentication 41 Skip Alarm Cancel 325 Legend 436
Secured Premises Notification Slow Flash 81, 292 Mustering Zones 439
Settings 533, 535 Smart Download Control 427 OTIS Elevator Status 439
Secure-off 87 Smart Download Rules 42 Output Terminals 438
Secure-on 87 Smart Download Service 431 Outputs 439
Security Level 254, 293 SMTP Hello Domain 44 Reader Terminals 438
Security Level By Color 294 SMTP Server 44 Security Level Terminals 439

24-10832-194 Rev. E
544 INDEX

Wireless Parameters 442 edit a trigger condition 337 defining a workstation 358
System Validation 457 field definitions 337 printing a badge 363
manual triggers 341 specifications 358
trigger conditions 336 viewing and printing a badge 364
T Troubleshooting Video Imaging station 359
TCP/IP External Trigger 45 CCTV Control 531 View Inoperable Hardware 316
Template Terminal 77 Login 529 Violation Alert Period 40
Temporary Access 257 Network 530 VIP Indicator 153
Terminal Count 302 Workstation Problems 528 Visitor Escort Mode 73
Terminal Down 89 Turnstile 166 Visitor Information 261
Terminal Groups 78 Type Descriptor 256 Visitor Management 415
Terminal Siblings 160 Visitor Request 416
Terminal Status to “Unknown” when Field Definitions 418
Panel Offline 38 U sponsor 419
Terminals 65 UDF Choices 240 Visitor Validity Period 33
Terminals associated with UI Style 409 visitors 245
Timezone 37 UIstyle 421
This Location Only 417 Uncalibrate 75, 87
Time Before Propped Door unique time pairs 38 W
Reported 131 Unlock 290 Wakeup Communication 138
Time Blocks 49 Unlock All Doors 291 WAMS 95
Time Offset 57 unreliable icons 347 Wandering 306, 317
time pairs 38 unsuppress protected premise Warning Auto Off 72
Time Zones 49 alarms 533, 535 Warning Output Group 71, 72
Timed Events 9 Update CK721-A Panels 444 Warning Time 71, 72
Timed Override 7, 71 Update Database Default Watchdog Service 431
Timed Override/Anti-Tailgate 57 Strings 450 Web Access 406
Timed Shunt 71 Update Mercury Panels 446 Alarm Monitor 414
Timed Suppression 295 Update Preprocessed Report Archive Area Search 414
Timed/Pulse 292 tables 450 Audit 415
Timezone Checking 57 Update Preprocessed Report Badge Print 414
Today Only 417 tables 450 Badge Resync 414
Toolbar 15 Upload only when greater than 56 Cardholder Search 414
Tour Activation 375 Use Authorized SMTP 44 Command Outputs 414
Tour Alarms Setting 380 Use Encryption 41 Customizing the interface 420
Tour Badge 375 Use for XmlRpc 47 Door Command 414
Tour Badge priority 376 Use Operator Account / Profile Employee Services 413
Tour Configuration 376 Authentication 409 Guard Services 414
Tour Configuration Report 388 User Accounts 29 In Out Displays 414
Tour Notes 387 User Authentication 409 Logging on 413
Tour Notes Report 388 User Defined Fields 239, 249 Management Services 415
Tour Sequence Number 381 User Name 274 Menu Permissions 246, 407
tour shunt devices 383 User Site 274 Options 408
Tour Station 380 Username Formatting 41 Processing requests 416
Tour Transaction Report 388 Using a Keypad Reader 517 Submitting Requests 413
Tour Types 378 invoking access requests 517 Web Request Queue Status 407
Trace 254 invoking air crew access 518 WebBadging Setup 415
Track 87 invoking panel card events 521 Windows Authentication 527
Track Fields 361 invoking timed overrides 518 Workstation Status 433
Track Movement 311 Quick Guide 523 Workstation Test 528
Transmit Filter 231 Workstations 19
Transmit Queue 231 Alarm Monitor 20
Transmit Session 232
V
location 20
Transmitting Messages (sec) 43 Valid & Unauthorized 68 Workstations and Operators 19
Trapped 306, 317 Validate 415 World Time Zone 112, 126, 160
traverse time 382 Validate Digital Signature 450, 457 Write Panel Database to Flash
Trigger Logic 336 Verify Password for Critical Memory 444
Trigger Manually 341 Functions 25
Trigger Types 489 Version description 436
Triggers 182 Vertigo 256 X
create triggers 336 Video Imaging 358 XmlRpc 46

24-10832-194 Rev. E
545

XmlRpc Interface Service 431

Z
Zenitel Intercom 394
Zone 313
Zone Hardware Status 314
Zone Name 307
Zone Status 313
Zone Terminals 305, 310

24-10832-194 Rev. E
546 INDEX

24-10832-194 Rev. E
Security Solutions
(805) 522-5555
www.johnsoncontrols.com

We welcome your comments at BE-techpubs-security@jci.com.

Potrebbero piacerti anche