Page 1
SE 6000 SE 6000 STANDARD PRODUCT MANUAL Westinghouse Security Electronics an ISO 9001 certified company P/N 66107919001, Rev. F ECURITY ANAGEMENT YSTEM...
ABLE OF SECTION 1: INTRODUCTION ... 1-1 MANUAL ORGANIZATION ... 1-1 System Main Menu ... 1-1 Documentation Methods ... 1-2 DEFINITIONS ... 1-2 General ... 1-2 System Hardware — Devices ... 1-3 System Software ... 1-5 Principal System Functions ... 1-6 SAMPLE SYSTEM ...
Page 4
Doors ... 2-6 Select Zone ... 2-6 REVIEW TRANSACTIONS (FULL SCREEN) ... 2-7 ALARM SERVICING ... 2-8 REAL TIME CONTROL MAPS ... 2-8 CONTROL PROJECTS ... 2-9 ABORT TIMERS ... 2-9 OTHER FUNCTIONS ... 2-9 Printer Control ... 2-9 Forgive Passback ... 2-10 Manual Access Granted ...
ECTION INTRODUCTION MANUAL ORGANIZATION This manual follows the order of the seven standard product items in the system main menu, with the Key Inventory and Parking Stickers items merged into the System Administration section: • Section 2: Monitor Security Activity •...
Documentation Methods To avoid repetition and to reduce document size, detailed explanations for the system's principal data items are given only in Section 4: Master File Entry, which is used when creating the system database. For introductory information concerning the data items, see Definitions below. Further, with the exception of the screens presented in Basic System Usage in this section, and the introductory menu screens for Sections 2 through Section 5, all other screens throughout this manual are limited to the particular screen area being discussed (i.e., full screens are not shown).
Keyholder ID. Keyholder's ID number. The unique ID number is used by the computer to keep track of all activity for that person. Once entered, the keyholder ID cannot be changed. Location. Location of the office or branch of the company to which a keyholder is assigned. Tenant.
Page 11
Readers Digital Key Reader. Reads the unique number of 1 to 5 digital command keys simultaneously at a range of up to 36 inches. Keypad Controllers. The keypad controllers, normally used in conjunction with an ACU, provide additional security by requiring a personal identification number (PIN) entry. Magnetic Card Readers.
The system can be programmed to control data flow between central and remote computers to create a large-size security system controlled from a central point. Integrated Software Support. The SE 6000 communicates with a variety of access control and alarm monitoring devices. Currently, the system interfaces with WSE ACUs and their peripheral...
Response Time. The SE 6000 is capable of fast response times in both single and multiple site configurations. Fast response times are important for security personnel who monitor alarms and are always appreciated by keyholders wishing to enter locked doors.
File Maintenance To perform its access control functions, the system must know the unique ID numbers of all keyholders and the doors and times they can enter. Further, the SE 6000 maintains other keyholder data to facilitate scheduling and reporting.
Because all system activity is based on four-digit ID numbers, you need to decide before data entry how these numbers are to be assigned to the system hardware elements. Although the numbering system is entirely the choice of the SE 6000 owner, we recommend one of the two following methods:...
If the login incorrect message continues, consult the system administrator. When logged in correctly, the system displays the SE 6000 title page, sets the terminal environment, then displays the main menu. Call WSE Customer Service if you have a login problem.
System Screens There are two basic screen types: Menu and Application: Menu Screens Menu screens list application selections by group according to function (exception Monitor Security Activity — see Section 2). All menu screen IDs end in menu (example: [fmntmenu] — Master File Entry).
Storing Data in this section). SCREEN EXAMPLES SE 6000 screen displays show the path used to access the screen. For example, the final screen used when setting up keyholders, [epj_entr], is accessed via three preceding keyholder setup screens: [key_entr], [key1entr], [empgentr]. This useful feature considerably assists the new SE...
USING SCREENS AND FIELDS Selecting Screens There are three screen selection methods: Use the arrow keys to select the menu choice. Press Enter to place it in the Enter Selection field, and press Enter again to display the selection. Use the arrow keys to select the menu choice, and press F2 to display the selection. Press Enter anywhere in the list of choices to move the highlight bar to the Enter Selection field.
Moving to Prior Screens Press F1 to return to the previous screen displayed. If required, continue to press F1 to return to the system main menu. FINDING, ADDING, AND STORING DATA Finding Data Use the find mode to locate and select data. A specific record (a single keyholder ID, for example) or a group of records (all keyholders in a particular job category, for example) can be found.
The computer automatically changes to the update mode when a search completes, and the records selected can be updated if required. To start another search, press F4 to clear the screen and begin again. Adding / Changing Data The add mode is used to input new records. Once a record is found using the search mode, update is automatically selected which allows the user to change the existing data.
• To save time when moving around the SE 6000 system, it pays to learn the screen titles of the most commonly used application screens (see the screen location trees and the table at the end of this section).
MPORTANT Log off the SE 6000 system formally before you leave the terminal. If you do not log off, any action taken by the next person at the terminal will appear under your name. SHUTTING DOWN Always use the following procedures, in the order given, when powering off the SE 6000: Go to the main system terminal (system console).
If any other message displays apart from those noted here, just press Enter. SYSTEM SCREEN TREES The SE 6000 screens are arranged in tree structures, with hierarchies established from the primary screen to the lowest level screens in each tree. Each screen has a unique title which displays in the upper-left.
Page 25
SE 6000. Keyholder information and photo IDs created on the Polaroid system are transferred via a LAN or serial connection to the SE 6000. Badges can be printed on film or on PVC. Keyholder maintenance may be initiated on either system; all data is stored in a single database resident on...
2: M ECTION ECTION ONITOR ECURITY CTIVITY MONITOR SECURITY ACTIVITY INTRODUCTION System monitoring and control is performed via the monitor menu, the first selection in the system main menu. The monitor menu screen is shown below. Notice this is a split screen, with the lower half constantly updated as transactions (any system event) occur.
FUNCTION KEYS Beneath the transactions display are the applicable function keys for each screen, with the key actions shown next to the key numbers. For most function key actions, the system displays messages confirming that the action has been completed, e.g., POLLER STOPPED. In general, F1 is used to exit from the current screen, and F7 and F8 are used respectively to display the previous screen and the next screen within the set of screens that apply to the particular data item being controlled or when there are more items then will fit into a single screen.
2: M ECTION ONITOR ECURITY CTIVITY When F4 is pressed, a second screen displays showing the connections between the host and the devices of the particular poller selected: Poller-device communication should be one of the first items checked whenever there is an apparent problem with the system.
F4 KEY RSET. Key Reset—Used when setting up new ACUs or reestablishing repaired ACUs, or when the integrity of the data currently resident in the ACU is suspected. Downloads all host key data to the ACU. F5 SHUNT. Shunt a device. F6 UNSHUNT.
2: M ECTION ONITOR ECURITY CTIVITY F6 UNSHUNT. Unshunt a door previously shunted. Input Points The Control Inputs screen displays point ID, description, point status, tamper, shunt. Control Inputs Function Keys F5 SHUNT. Shunt a selected input point. If no input point is selected, F5 shunts all input points in the zone.
F6 UNSHUNT. Unshunt a selected output point previously shunted. If no output point is selected, F6 unshunts all output points in the zone. Doors The Control Doors screen displays point ID, description, status, and shunt of the door switches. Control Doors Function Keys F5 SHUNT.
2: M ECTION ONITOR ECURITY CTIVITY — Number of keyholders currently in the zone. Count — Passback zone type—personal, vehicle, none. PBarea — Passback type —hard, soft, none. PBtype PBlevel — Passback control—global (host), local (ACU), none. Note that zone count is automatically reset whenever a zone is selected. Multi-user systems employ record locking techniques for keyholder file maintenance, and locked records are not updated by the passback routine that maintains keyholder location.
Review Transactions Function Keys F2 BACKWARD. Page backward through the transactions. F3 FORWARD. Page forward through the transactions. F4 OLDEST. Go to first transaction. F5 LATEST. Go to last transaction. ALARM SERVICING The system emits beeps when an alarm occurs, and displays the number of pending and active alarm data in the upper-right corner of the monitor menu screen: Pending—alarm condition no longer occurring but not yet formally resolved.
2: M ECTION ONITOR ECURITY CTIVITY CONTROL PROJECTS The Control Projects screen (not controllable on LC systems—host only) displays project, status, description, start, end. The control projects screen permits operator override of doors assigned to projects which directly affects keyholder access. Control Projects Function Keys F2 ACTIVATE.
2-10 F5 PRNT ON. Switch printer #1 on or off depending on current state (used to control log printer only). F6 PRNT ON. Switch printer #2 on or off depending on current state. Forgive Passback A passback violation occurs when a keyholder uses their key to reenter a door without first using their key to exit the same door.
2: M ECTION ONITOR ECURITY CTIVITY When requested, enter the number of the table to be downloaded and press Enter. The system requests confirmation — press F1. REPACK OK displays when transfer completes. Remote Devices This function is used to establish a telephone connection to a remote device to perform certain actions, for example, unlock a door to a remote ATM for Service.
2-12 F3 LIMITED. Change current building mode to limited. F4 CLOSED. Change current building mode to closed (takes approximately one minute to complete). If a device input point configured to prevent building closure is active, the building will remain in the limited mode until the point is cleared. Full Screen Monitoring Displays system logs in a manner similar to the review transactions feature (see Review Transactions—Full Screen in this section) except that new transactions display as they occur.
2: M ECTION ONITOR ECURITY CTIVITY Status Screen Function Timeout Some system functions temporarily disable the realtime display until the sub-menu is exited. The status screen function Timeout feature provides a user-defined method for controlling the length of time that the realtime display is disabled. If the system does not detect any keyboard or mouse activity for the number of seconds defined by the TIMEOUT parameter, the monitor program returns to the previous menu and resumes realtime display.
2-14 Monitoring Security - Passwords With enhanced monitor security function and the addition of password logic, any or all portions of the monitor functions can be set up to require a valid ID and password combination before the function can be initiated. In place of the factory-supplied status login, the user may create a similar login ID, with or without password, and control access to monitor capabilities.
2: M 2-15 ECTION ONITOR ECURITY CTIVITY Status Screen Function Timeout Feature Modified Usage of Invalid Facility Code Log This feature suppresses a keyholder's name from the monitoring screen and various reports when an INVALID FACILITY CODE message is logged. In some cases, this resulted in a log message erroneously associating a valid keyholder with an invalid facility.
Page 41
2-16 2: M ECTION ONITOR ECURITY CTIVITY...
ECTION SECURITY REPORTS INTRODUCTION Security management reports provide a permanent record of transactions, and are also used to examine specific events. The reports are accessed through the security management reports menu screen, [accsmenu], via the main menu. In this section, the reports are documented following the security management reports menu sequence (see section table of contents).
Some reports are over-wide (132 characters instead of the standard 80 characters), and have been formatted to use a smaller print size not available with some terminals (HP printers can handle the smaller print). These reports can be displayed but will 'wrap'; that is, some lines continue to the next display line .
Transaction History — Sample Report 11/15/96 10:34 Point Point Description Zone _____ _______________________ ____ HOST HOST HOST HOST HOST HOST ACCESS CONTROL ARCHIVE REPORT The access control archive report, [acrtrprt], is identical to the transaction history report (previous report) except that it reads data from an archive tape rather than from the system database. ALARM SERVICING REPORT The alarm servicing report, [almarprt], details actions taken by operators in response to alarms.
ECTION ECURITY ANAGEMENT Alarm Servicing — Sample Report 06/27/96 15:01 Alarm No Alrmtime Alrmdate Point Zone ________ ________ ________ _____ ____ Point Descrip = CHEMICALS GPS 3 2851 09:18:00 06/26/96 Operator Response: CALLED FIRE DEPT. CLEARED BUILDING OPENED VENTS LEFT BUILDING REENTERED WHEN ALL CLEAR PASSBACK ZONE REPORT The passback zone report, [whowhere], lists keyholders currently present in passback zones.
KEYHOLDER ZONE REPORT The report lists the most recent zone information for all keyholders that meet the search criteria; however, information is not necessarily current. A sample [kyznrprt] screen follows: Keyholder Zone — Sample Report 05/12/96 14:41 Keyholder Keyholder Name _________ ___________________ ______ 10556...
3: S ECTION ECURITY ANAGEMENT Event / Point — Sample Report 03/17/96 09:15 Point Point Description ______________________________________________________________ HOST HOST DATA BASE POLLER DATA BASE POLLER 808/422 POLLER 808/422 POLLER REALTIME PASSBACK ZONE REPORT The realtime passback zone report, [rpasrprt], is essentially the same report as the passback zone report (described earlier in this section), with one important difference.
4: M ECTION ASTER NTRY ECTION MASTER FILE ENTRY INTRODUCTION The master file entry procedures are used to create and maintain the database. All initial system data is entered following the methods detailed in this section. The data item menu screens are accessed via the master file entry menu [fmntmenu], displayed via the main menu.
KEYHOLDERS Four data entry screens are used to add new keyholders to the system, and to change or delete existing keyholder information: Keyholder Entry - Page 1, [key_entr]. Used to enter primary keyholder information. Keyholder Entry - Page 2, [key1entr]. Used to enter optional keyholder information. Keyholder Access Entry, [empgentr].
Page 54
4: M ECTION ASTER NTRY Keyholder ID. Required in the Add mode (the system denies further screen access until this field is entered). Enter a unique nine-digit maximum keyholder ID number (alphabetical letters are not supported). Last Name. Optional. Enter the keyholder’s last name. First Name.
Issue Date. Optional. Enter the date that the access control card for the keyholder will become valid. Default is current system date. Note that a future date will not permit access until that date is reached. Issue Time. Optional. Enter the time that the access control card for the keyholder will become valid.
4: M ECTION ASTER NTRY Keyholder Access Entry [empgentr] Access Code. Optional. Enter an access code number that applies to this keyholder (the system automatically enters the access code description). Default is 0—No access code. There is no limit to the number of access codes that can be assigned, with the following two exceptions: Do not assign a keyholder more than one access code for a single NexSentry, 8xx series, or 422 ACU.
Y if the downloaded access code is to be sent to the ACU as a smart failsoft access code. Default is N. Note that this is used only in conjunction with the host access codes. The smart failsoft option is not supported with any keys used in conjunction with 708P and 718P ACUs, but a function is built in to the units which does provide some measure of failsoft protection in the event of a communications failure with the host.
4: M ECTION ASTER NTRY A sample [epj_entr] screen follows. Enter the project number (zoom available) then press Enter; the project description displays automatically. If multiple projects are to be assigned, enter and store each one separately. COPY KEYHOLDERS Copy Keyholder Information Used when creating new keyholders who share data with existing keyholders, the [key_copy] screen is an important timesaving feature.
ACCESS ASSIGNMENT Keyholder Access Assignment [egrpentr] The [egrpentr] and [egrpentr1] screens, accessed from Access Assignment (third item in the [fmntmenu] menu), are used as a fast way to make access assignments without using the keyholder data entry screens. Data entry is the same as for the keyholder access entry screen [empgentr].
ACCESS DEFINITION The access definition selection in the master file entry menu displays the access definition menu: • Access Code Entry, Access Code Definition, Elevator Definition • Access Group Entry, Access Group Definition • Access Override Entry • Fail Soft Entry •...
Page 61
Access Code ID. Required. Enter a four-digit maximum access code number. Tenant. Required (zoom available). Enter a four-digit maximum tenant code number. Default is tenant 0. Download Device ID. Optional (zoom available). This field must be used if the access code being created is to be downloaded to an ACU—enter the ACU ID number.
Reader ID. Required. Enter the reader number to be linked to this access code (the reader description is automatically displayed). The reader numbers can be entered in any order. Time Code. Optional. Enter up to four time codes, in any order, that apply to this access code (the time code parameters are displayed automatically).
Page 63
Group Description. Required. Enter a 30-character maximum description of the access group. When screen entry is completed press F6 to store the data, at which point the Access Group Definition screen displays automatically. This screen permits you to enter the access codes that will apply to this access group.
CCESS VERRIDE NTRY Access override codes are typically used for visitors to restrict or allow access to specific locations for specific time periods. This is a host function that must be used only if normal access is through host access codes: Override Code.
AILSOFT NTRY 708P ACUs can be programmed to recognize up to 25 keyholders (based on key numbers) for use when communication with the host computer is temporarily unavailable. Known as failsoft, the feature becomes active (access is granted) for these keyholders after 15 seconds following the occurrence of the communications interruption (response is not available for specific time periods, however).
Page 66
Project ID. Required. Enter a four-character maximum project ID code. Description. Optional. Enter a 40-character maximum description of the project. Starting Date and Time. Enter the project's starting date and time in the formats MM/DD/ YY and HH:MM. Ending Date and Time. Enter the project's ending date and time in the formats MM/DD/YY and HH:MM.
TIME CODES [tmcdentr] Time codes are normally used to define when points and readers are active. The codes are also used to automatically lock / unlock doors, activate / deactivate output relays, and to initiate recurring tasks. When combined with readers into access codes, the time codes define when access is valid for particular readers.
HARDWARE CONFIGURATION The hardware configuration item in the master file entry menu displays the hardware configuration menu [confmenu]: • Zones • Areas • Pollers • Devices • Readers • Points • Auto Opens/Activates ONES ZONEENTR zoom [confmenu] • Device Report Definition •...
[areaentr], [areaentr1] REAS For reporting purposes only, passback zones may be grouped into areas. Reporting (keyholder zone report) may be by zone or area, with the area report listing the zones contained in each area. Assign a number and optional description for the area using [areaentr]; enter the applicable zone numbers in [areaentr1].
Page 71
The SE 6000 can run different pollers or multiple copies of the same poller concurrently but, with the exception of the NexSentry, 8xx-series, and 422 ACUs, the pollers can be run with one device type only. Poller parameter files are read when the poller programs start. The parameters define the poller type, the physical port assignment, and other required control information.
local mode EVICE NTRY CREENS [dev_entr] EVICE NTRY Device ID. Required. Enter a unique, four-digit maximum device ID number in the range 1—9999. Device Description. Optional. Enter a 20-character maximum description of the device. If omitted, the system enters the device ID number in this field. Tenant.
Page 74
Address. Required. Enter the address of the device. Since each poller can poll a number of devices, the Address field is necessary to tell the host which device to poll. The address ranges are included in the Device Type table (see following field). Note that the system will not allow duplicate device addresses on the same poller.
Page 75
SE 8 ERIES EVICE ONFIGURATION The [d808entr] screen must be completed for all 8xx-series ACUs (use F2 to display the screen after the previous screen has been stored). A sample screen follows: Level, Name, Password. Required. These first three fields are entered to identify up to eight operators who will be permitted to set/change system parameters for a particular ACU from the ACU terminal port.
Page 76
Power Fail. Optional. Enter the power fail report number if a report has been created (see applicable ACU manual). The report states the actions that will be taken by the ACU should a power failure occur. Default is 0. Override. Optional. Enter the operator override report number if a report has been created (see applicable ACU manual).
SE N ENTRY EVICE Complete the [nexsentr] screen for the NexSentry ACU and then press F2 Next Form to display the [d818entr] screen. Enter all appropriate information and press F6 Store to complete the NexSentry device configuration. A sample [nexsentr] screen follows: Level, Name, Password.
Page 78
The Level, Name and Password fields are specific to the NexSentry and applies only to operators logging in directly via the ACU's terminal port. The fields are not part of the SE 6000 control parameters. Tamper. Optional. Enter the tamper report number if a report has been created (see applicable ACU manual).
Page 79
SE 818 D EVICE ONFIGURATION SE 422 Pin Definition PIN Timeout. Optional. Enter the maximum number of seconds allowed between key presentation and PIN entry. Default is 10. Max PIN Retries. Optional. Enter the allowed number of PIN entry retries. Default is 4. VIP Only Digits.
Page 80
The security codes A through F control the degree to which the operator may add/change/ delete the system parameters. Code A has the most privileges, code F has the least. For detailed information concerning operator privilege levels, refer to the applicable ACU manual.
Page 81
VIPs Digits. Optional. The number of digits in the PIN number for doors using keypads only. The range is 4 to 8. Default is 4. Modem Definition. Not used when the SE 6000 is connected directly or in a dial-up configuration.
EADERS Readers are usually assigned to ACUs, but they may be used as standalone devices or linked to other security monitoring devices. Twelve reader types (1 — 12) are currently defined: Access Control. Controls power to a door lock allowing or denying entry. Time and Attendance (optional feature).
Page 84
Reader Type. Required. Enter the reader type number in the ranges 1 through 12 as described above. Assoc Reader ID (Associated Reader). Required if the reader is used in conjunction with a keypad. Enter the ID number of the Reader used with the keypad. Default is 0. Door Switch ID.
Page 85
active. For Mod, enter a transaction modifier code (A, B, etc.) to customize log messages and system actions (see Section 6: System Administration for details). The default for Mod is 0 (zero); use the standard log message. NTRY AND EADER The Auto Key Entry feature allows you to capture the key number from a key card and assign the number as well as enter the card number automatically in the Key Number field of the keyholder Entry [key_entr] screen.
Page 86
In addition, the MOR and the SE 6000 keep track of the people that are in a specified zone. NTERING A ULTIPLE CCUPANCY When a multiple occupancy zone is vacant, two keyholders are required to present their keys to the reader to unlock the door;...
Page 87
in response to various events occurring within the system. (The field titles indicate the event types.) See Device Report Definition in the section and the applicable ACU manual for detailed information. SE 422 R EADER EPORT EFINITION Mag Stripe Type. Enter the magnetic stripe type: 0 = MSR, 1 = MSR5, 2 = MSRK5. Mag Stripe Code.
Page 88
— The following ten fields, Forced Open through Exit Granted, require the entry of a report number. The word report in this context identifies a user-defined action or series of actions that the ACU is to take in response to various events occurring within the system. (The field titles indicate the event types.) See Device Report Definition in the section and the applicable ACU manual for detailed information.
Page 89
Proximity Type. Enter the proximity type: 0 = Sensor interface, 1 = DigiKey reader. The following thirteen fields, DKR/SCR Fail through VIP tamper, require the entry of a report number. The word report in this context identifies a user-defined action or series of actions that the ACU is to take in response to various events occurring within the system.
The following eleven fields, DKR/SCR Fail through Device Tamper, require the entry of a report number. The report in this context identifies a user-defined action or series of actions that the ACU is to take in response to various events occurring within the system. (The field titles indicate the event types.) See Device Report Definition in this section and the applicable ACU manual for detailed information.
PENS CTIVATES The auto open / activate feature is used to instruct the system to lock / unlock doors, or activate / deactivate output points, for a predefined amount of time. Examples: • A regular business door is configured to automatically unlock at a prescribed time each morning.
EVICE EPORT EFINITION Use this feature to create action reports for the SE 8xx-series and SE 422 ACUs. An action report is a set of user-defined tasks performed by the ACU when specified conditions occur. The actions are defined using the device report definition screen (sample screen shown below); the reports are assigned using screens described in the device entry subsection.
4-48 Section 4: Master File Entry DKR C ONFIGURATION NTRY In all cases, however, do not attempt these procedures without first contacting your dealer and/or WSE customer support.
Section 4: Master File Entry 4-49 USER-DEFINED INFORMATION The field titles are changed with the control file maintenance feature accessed from the System Administration menu (see Section 6: System Administration):...
ECTION MASTER FILE REPORTS INTRODUCTION The master file reports list comprehensive database information. The report menu screens are accessed via the master file reports menu [rprtmenu], displayed via the main menu. In this section, the reports are documented following the reports menu sequence (see section table of contents). A sample [rprtmenu] screen follows: All screens in this section show the system default values, with most screen fields requiring a numeric range entry.
ADDITIONAL INFORMATION An additional report feature not accessed via the reports menu, 132-xx Column Report Display, is detailed at the end of this section. KEYS MASTER Two versions of the keyholder master report are available — Keyholder Quick List and Keyholder Master List (extended).
ACCESS ASSIGNMENTS EYHOLDER CCESS SSIGNMENT This report prints the access codes and access groups assigned to keyholders. Regular and extended versions of the report are available. The regular report lists keyholder numbers and names, access code / group numbers and descriptions, and access override codes where applicable.
EYHOLDER CCESS 06/09/96 12:30 Access Code 1 = Host 422, 808, 818 Keyholder 331 Name Key No 1038 Addr1 S.S. No987-65-4321 Addr2 Tenant 1 Addr3 P.I.N. 2198 Privledge YES Remarks Phone 224-8089 Trace NO Visitor NO EADER CCESS This report prints keyholder access permissions at a specific reader and applicable time codes. A sample screen follows: EADER SSIGNMENT...
ACCESS DEFINITION CCESS ASTER This report details all access codes defined in the system (the report can be limited to a single code or a range of codes, as required). A sample screen follows: CCESS ASTER 05/02/96 11:26 Code Code Description Reader ____ ________________ ______...
— S NTELLIGENT AMPLE 03/25/96 08:24 Keyholder Keyholder Name _________ ______________________ 67100 708P PARKING CNTR 63455 DIGI FI-GI 61096 GUARD NEW 61099 1030 ALT+D+P ROJECT EPORT The Project Report includes number, description, start / stop times and dates, and current status. This report gives project status based on start / stop dates defined by the project entry function compared to the current system date and time.
— S ROJECT EPORT AMPLE EPORT 03/25/96 08:29 Project Project Description _______ ___________________________ ________ TEST PROJECT #1 TEST PROJECT #2 EMERGENCY CIRCUITBOARD REV. 12/17/96 NEW TEST PROJECT LAUNCH TEST PROJECT #3 EYHOLDER ROJECT EPORT The Keyholder Project Report includes keyholder ID, name, project ID and description, and current status.
EADER ROJECT EPORT The Reader Project Report lists project number, description, readers assigned, current status. This report gives reader project status based on start / stop dates defined by the project entry function compared to the current system date and time. Since the selection criteria and reported status do not consider operator overrides, actual and reported project status may differ.
— S ODES AMPLE EPORT 03/25/96 08:36 Tmcd Description ____ ________________________ _____ _____ NEVER ACTIVE 7-DAYS, 24-HOURS & HOLS OFFICE HOURS 7 am - 6 pm 07:00 18:00 WEEKENDS & HOLIDAYS HOLIDAYS This report lists all holidays that have been entered into the system. A sample screen follows: —...
— S ENANTS AMPLE EPORT 05/04/96 09:07 Number Description ______ ___________ 1 WESTWOOD SECURITY SYSTEMS 2 SOS PUBLISHING (CALIFORNIA) 3 BETA SOFTWARE 4 WALKINS PRODUCTS, INC COMPANY, DEPT, LOCATION, JOB CAT These reports list user-defined company, department, location and job category information. The report screens are identical for all four —...
AMPLE NSTRUCTIONS 03/25/96 08:45 Point Point Description _____ ______________________________ ____ ________________________________________ 7114 PRIORITY 10 ALARM 9011 RDI 808 #1 1.1 FIRE MAPS The map report lists all points incorporated into user-defined system maps. The report screen prompts only for the desired sequence: point ID, point type, or map name. —...
— S ONES AMPLE EPORT 03/25/96 08:47 Zone Description ____ _______________________________ ALPHA LAB ZONE HARD PASSBACK ZONE 2 HARD PASSBACK ZONE 3 HARD ANTI PASSBACK OLLERS The report lists all defined pollers in the system. A sample screen follows: — S OLLERS AMPLE EPORT...
— S EADERS AMPLE EPORT 06/03/96 12:57 Reader Reader Description Comp # ______ __________________ ______ RM-A EAST ENTRY RM-A WEST ENTRY OINTS This report lists all points defined in the system. A sample screen follows: — S OINTS AMPLE EPORT 07/16/96 11:51 Point Point Description...
PENS CTIVATES This report lists system points and readers which have auto-open or auto-activate times. A sample screen follows: CTIVATE 03/25/96 08:54 Point Point Description _____ ___________________________ 1830 818 #7 DOOR #3 +VIP 1850 818 #7 DOOR #5 1870 818 #7 DOOR #7 8240 TIM’S 804S DOOR 4 808 R...
808 D EVICE ONFIGURATION This report lists configuration information for the system 800-series ACUs. A sample screen follows: 808 D EVICE ONFIGURATION 06/05/96 15:25 DIAL-UP 808 #1 Level Name Password OPERATOR MGR NEW G. SAYLES SAYLSG LYNN VAUGHAN LYNSID TIM JONES TJO123 IALERS The two dialer report types detail the remote dialup interface (RDI) devices defined for the system...
— S EFINITION AMPLE 03/25/96 09:02 Group Code _____ ____ 0000 1000 1001 6016 7279 ABA C ONFIGURATION This report lists all the ABA configurations defined for the system, and gives the configuration parameters. A sample screen follows: ABA C —...
DKR C ONFIGURATION The reports lists the system default DKR parameters. A sample screen follows: DKR C — S ONFIGURATION 06/12/96 15:21 Config. ID Send Once Read Range Number of Reads Read Time SE 422 PIN M ASTER EPORT This report lists keyholders having system-calculated SE 422 PIN numbers. A sample screen follows: AMPLE EPORT...
5: M ECTION ASTER SE 422 PIN M ASTER 03/25/96 09:22 Keyholder Key No Keyholder Name ___________ ______ _______________________ 6109 1895573 Duane Eddie 6110 1784422 Juarez Sandi 6112 1901112 De Witt Charles 6113 1788122 Ames Linda 132-COLUMN REPORT DISPLAY The local print program was originally written to accommodate an 80-character terminal display. Some terminals now use up to 132 characters, and the new 132-Column Report Display feature allows for this.
ECTION SYSTEM ADMINISTRATION INTRODUCTION The administration functions are used to control and maintain the system. These functions are accessed from the system administration menu, [sys_menu], via the main menu. (Depending on the operator's program security level, some or all of these functions may not be available.) A sample screen follows: SECTION ORGANIZATION The procedures in this section are in the order shown in the system administration menu (above).
ADDITIONAL INFORMATION Additional system administration-related information is provided at the conclusion of this section. ADD USERS [addusers] The add users screen, [addusers], is entered to add, change, or delete system users / operators. MPORTANT The administration log-on and password must be used to access this screen. If you are already logged on with your regular password, first log off in the normal way, then log on again using the administration log-on and password.
Page 127
ECTION YSTEM DMINISTRATION Program Security Level. Optional (range 1—9999). Code number indicating the specific screens the user can access. Default is 1 (complete access). Tenant. Optional. Enter tenant number (if applicable). Default is tenant 0. " Monitoring Group. Optional. System code indicating transaction types available to this user.
Jump Timer Servicing. Y / N field indicating if the user has the authority to automatically jump to timer servicing from monitor when an timer event occurs. Language. The code number entered will determine what language the system will use for this user.
ECTION YSTEM DMINISTRATION PROGRAM SECURITY [sec_menu] ROGRAM ECURITY EVEL NTRY Begin creating program security level types by first displaying the program security level entry screen [pgacentr]: Enter the security level number (four digits maximum). Enter a description (30 characters maximum). Press F6 Store, then press F2 for the program security level definition screen ROGRAM ECURITY...
Enter Y or N in the add/update/delete fields to give or deny access to these functions on the selected screen. If you do not make any Y/N selection in the Add, Update, and delete fields, the keyholder will not have access to the screen. Press F6 Store and then, before any other action is taken, press F5 to return to the add mode for the next entry.
ECTION YSTEM DMINISTRATION DISPLAY ALL VALID LOGINS Use the [showuser] screen to identify — by hard copy printout or report display at the system terminal — all operators who have access to the system (use the [showwho] (Display All Valid Logins) screen to display operators currently logged on.
[key_entr] and [key1entr] can be changed to suit the individual user. Since keyholder records may be considered the primary data items for an access control system, many SE 6000 owners use the field title change feature to tailor the system to their precise requirements. Change fields A through F and 1 through 7 as required.
ECTION YSTEM DMINISTRATION [evenentr] VENTS The task / event subsystem is used to program one or more tasks to be automatically performed in response to the occurrence of a user-defined event. Tasks and events are linked, and the task must be entered and stored before the system allows the creation of a related event. Events can initiate the same task, or a single event can initiate multiple tasks.
6-10 Modifier. Optional. If applicable, the transaction modifier which defines the event if the message is user-defined. Event Date. Optional. If the task referenced by this event is to be system-initiated, enter the applicable date. Event Time. Optional. If the task referenced by this event is to be system-initiated, enter the applicable time.
ECTION YSTEM DMINISTRATION Activate Code, Extension. Required. System code number for the type of action to be performed. The extension applies to camera presets for pan and tilt, or image verification when used with a Polaroid ID-4000 system. See table following this field description list. Deactivate Code, Extension.
ACTIVATE PROJECT DEACTIVATE PROJECT NORMALIZE or CLEAR PROJECT VENT ASTER EPORT This report shows all tasks / events established in the system: 04/14/96 13:02 Task Task Description ____ _ _______________________ 42 UNLOCK DOOR EVENTS [tranentr] RANSACTIONS Customized versions of any system transaction (log message) can be created. The custom transactions are created using the transaction entry screen, where they are linked to the point or reader screens by a transaction modifier code.
Page 137
ECTION YSTEM DMINISTRATION Transaction Type (ID). The unique ID number of a transaction. The system is pre- programmed to use specific transaction types for certain events at certain types of points. (See Appendix C: System Transactions for a complete list of standard transactions.) Transaction Modifier.
Green Cyan (light blue) Blue Display Icon. For future use. Printer Group. Each log printer must include the selected printer group in its list of available printer groups. If the selected printer group is not included, the transaction will not be printed on the log printer.
Page 139
ECTION YSTEM DMINISTRATION . A database backup copies all information in the database (exceptions user and map ATABASE ACKUP information). If you make a number of changes to keyholder, hardware, and / or access information in a single day, then the database backup should be performed each day. For these purposes, use two alternating tapes (one for odd days, one for even) to guarantee that no information will be lost in the event of a hardware malfunction.
LARM RANSACTION LEAN Each time an alarm is triggered, a record is created and stored in a separate file along with the operator's alarm servicing response. This table is then available for reporting using the alarm servicing report. Over time, the size of this table grows and takes up excessive space on the hard disk.
Keyholder ID 1 to 9 digits; both name fields 15 characters maximum ID SECURITY MAINTENANCE The ID Security Maintenance function controls access to the information shared by the SE 6000 and the Polaroid ID-4000 Identification System. It also controls access to selected fields in the keyholder record.
ID S [ID2_ entr] ECURITY ROUP NTRY This function is used to create ID security groups. A sample screen follows: Required. Enter a unique security group number in the range 1—999. Optional. Enter a group description (30 characters maximum). ID S [ID1_ rprt] ECURITY EPORT...
Multiple baud rates are supported for the diverse mix of communications equipment available for the SE 6000 system. The baud rate is set by changing the HOSTBAUD parameter in the $DATAPATH/NPOLLER.x file where x is the associated poller number. The baud rate is entered during installation or changed as needed by the system administrator;...
This feature is enabled / disabled using the REXEXTEND parameter in the $DATAPATH/ NPOLLER.x file where x is the associated 708P poller number. The feature is enabled / disabled during installation, or may be changed as needed by the system administrator. If changed, the poller must be halted and restarted for the parameters to take effect.
ECTION YSTEM DMINISTRATION 03/25/96 15:52 Code Code Description ____ ________________ AVAILABLE ASSIGNED LOST UNUSABLE DAMAGED TERMINATED REISSUED RECOVERED PREVIOUS OWNER RESERVED [cdinentr] NVENTORY NTRY This function is used to add/change key inventory information (to delete a key record, use the system delete record feature —...
03/25/96 15:55 Keyholder Keyholder Name _________ ____________________ 29205 THORPE JAMES 31408 ROSS MICHAEL 33244 DESJARDINS ROBERT 36427 JERRY TIMOTHY 37441 JUDD AL PARKING STICKERS [stkrmenu] This feature is used to control parking stickers issued to keyholders. The initial screen is accessed from the main menu: [stkrentr] ARKING...
B: S PPENDIX YSTEM CREEN ONITOR ECURITY CTIVITY CREEN ITLE UNCTION monitor Watch events and activities as they occur; menu to other monitoring and control screens. ctrlmenu Menu to control functions. Zone selection stays in effect until this screen is exited. ctrlpoll Select pollers to halt or restart, and to check device communication.
Page 155
key_copy Create new keyholder record by copying from an existing keyholder record. egrpentr Select a keyholder for access privilege assignment. Can also be reached from key1entr. egrpentr1 Assign access privileges to a keyholder. egrpcopy Copy one keyholder's information to another keyholder. acc_menu Menu to reach the access definition functions.
Page 156
B: S PPENDIX YSTEM CREEN ASTER EPORTS CREEN ITLE UNCTION rprtmenu Menu to database reporting functions. key_rprt Report keyholder information. aassmenu Menu to the access assignment reporting functions. egrprprt Report access codes / access groups assigned to keyholders. emrdrprt Report specific readers assigned to keyholders. accrmenu Menu to the access definition reporting functions.
Page 157
ARKING TICKERS CREEN ITLE UNCTION stkrmenu Menu to parking sticker and license plate management functions. stkrentr Select keyholder for parking sticker and / or license plate information entry. stk1entr Enter parking sticker or license plate information for keyholder. stkrrprt Locate keyholder by license plate or parking sticker. stkrrprt1 Display keyholder location information by license plate or parking sticker number.
PPENDIX ROGRAM ECURITY Level 1 = COMPLETE SYSTEM ACCESS ID1_entr ID Security User Entry ID1_rprt ID Security Report ID2_entr ID Security Group Entry ID_menu ID Security Report aassmenu Access Assignments abacentr ABA Configuration Entry abacrprt ABA Configuration acc_menu Access Definition accrmenu Access Definition accsarch...
Page 169
outsrprt Outstanding Tickets overrprt Tenant Overage p422rprt SE/422 PIN Report padmmenu Parking Administration parkmenu Parking Control pgacentr Security Entry pgacrprt Security Master List phstrprt Point History plotentr Point/Lot Association pndfentr SE422 PIN Definition pnt_entr Points pnt_rprt Points pol_entr Pollers pol_rprt Pollers prd_rprt Project Reader Report...
Review Transactions Full Screen, 2-7 Review Transactions Function Keys, 2-8 REX, 1-5 Sample System, 1-7 Screen Access, 4-1 Screen Examples, 1-11 Searching With Partial Information, 1-13 Section Organization, 2-1 Security Master List [pgacrprt], 6-6 Security Reports, 3-1 Select Zone, 2-6 Select Zone Function Keys, 2-6 Selecting Screens, 1-12 Shutting Down, 1-16...
Page 180
Tenant, 1-3 Tenants, 4-17, 5-11 Time and Attendance, 1-18 Time Code, 1-3 Time Codes, 4-16, 5-10 Trace, 1-3 Transaction History Report, 3-3 Sample Report, 3-4 Transactions, 1-3 Transactions [tranentr], 6-12 Two-Man Rule, 1-6 User Defined Information, 4-49 Using Screens and Fields, 1-12 Moving Between Data Fields, 1-12 Moving to Prior Screens, 1-13 Selecting Screens, 1-12...
Need help?
Do you have a question about the SE 6000 and is the answer not in the manual?
Questions and answers