Westinghouse SE 6000 Product Manual page 127

Westinghouse se 6000 security management system standard product manual
Table of Contents

Advertisement

S
6: S
A
ECTION
YSTEM
DMINISTRATION
Program Security Level. Optional (range 1—9999). Code number indicating the specific
screens the user can access. Default is 1 (complete access).
Tenant. Optional. Enter tenant number (if applicable). Default is tenant 0.
"
Monitoring Group. Optional. System code indicating transaction types available to this
#
user. Default is * — All transaction types.
Transactions may be defined as elements of monitoring groups. For example, access
granted transactions could be placed in monitoring group A, door forced open transactions
could be placed in monitoring group B, all other transactions could be placed in monitoring
group 0 (zero)—the field default. Assignments for these groups could be:
Group A
Group B
Group 0
Monitoring Security Level. System code (0, 1, or 2) indicating the user's monitoring / data
$
changing capabilities. Monitoring security level 0 allows full monitoring / changing capabili-
ties, including disabling points and halting pollers. Monitoring security level 1 is recom-
mended for general use, since it permits a user to control certain functions, such as doors,
but not pollers and points. Monitoring security level 2 limits users to a purely observational
capacity; no functions can be controlled.
I
MPORTANT
1.
We recommend that level 0 be assigned only to completely trained and responsible
personnel, since some level 0 operations could easily disable the system if not
performed correctly.
2.
Enter C in this field to use the new enhanced security monitoring feature (see Enhanced
Monitor Security below).
Allow Alarm Servicing. Y / N / F field indicating if the user has the authority to respond to
%
alarms in the monitor program, or enter F if the alarm fast acknowledgment feature is to be
allowed.
Jump Alarm Servicing. Y / N field indicating if the user has the authority to automatically
&
jump to alarm servicing from monitor when an alarm occurs.
— Assigned to those who need only to monitor day-to-day access granted
transactions.
— Assigned to security guards who need to see all door forced open transac-
tions.
— Assigned to the system administrator who needs to see all transactions.
6-3

Advertisement

Table of Contents
loading

Table of Contents