Escolar Documentos
Profissional Documentos
Cultura Documentos
4.06
Trademarks
All trademarks, brand and product names are property of their respective owners. Pacom System Pty Ltd makes no warranty of any kind with regard to this product, including, but not limited to, the implied warranties of merchantibility and fitness for a particular purpose. Pacom Systems Pty Ltd shall not be liable for errors contained herein or for incidental consequential damages in connection with the furnishing, performance, or use of this product. This document contains proprietry information and is protected by copyright. The information contained within this document is subject to change without notice.
Table of Contents
Introduction ..............................................................................................................................5 Chapter 1 Setting .........................................................................................................8 Up Controllers
Setting DIP Switch Functions ...........................................................................................................................................9 Backing Up Controller Configurations and Using Templates .........................................................................................................................................10 Connecting to GMS ...........................................................................................................................................11 Using a Keypad for Basic Configuration .........................................................................................................................................15 Dialling in to Controllers .........................................................................................................................................16 Setting Controller ID ...........................................................................................................................................18 Using the Controller Dialog Box ...........................................................................................................................................19 Configuring Controller Ports for Alarm Messaging ...........................................................................................................................................23 Configuring Primary IP Communications Over Ethernet .........................................................................................................................................27 Configuring Secondary/Primary Communications Using PSTN .........................................................................................................................................33 Configuring Modems for GSM .........................................................................................................................................39 Configuring Controller Ports for Contact ID/SIA Reporting .........................................................................................................................................40 Configuring Controller RS485 Ports For Base Station Connection .........................................................................................................................................42 Configuring EMCS Connections .........................................................................................................................................43 Communications Protocol Parameters Reference .........................................................................................................................................45 Configuring the Controller Timezone ...........................................................................................................................................58 Configuring TAPI (Telephony) Devices ...........................................................................................................................................59 Advanced Configuration Options ...........................................................................................................................................60 Configuring Alarm Panel Types ...........................................................................................................................................64 Configuring Controllers for Transender Operation .........................................................................................................................................66 Configuring Third-Party Alarm Panels .........................................................................................................................................70 Configuring Generic Contact ID Alarm Panels .........................................................................................................................................75 Configuring a Galaxy Interface .........................................................................................................................................76 Configuring a Hisec Interface .........................................................................................................................................78 Configuring a Tecom Interface .........................................................................................................................................79 Using Controller Licensing Grace Period ...........................................................................................................................................80 Printing Controller Configuration Reports ...........................................................................................................................................81 Configuring and Using Controller Power Monitoring ...........................................................................................................................................82 Checking Controller Memory Battery Status ...........................................................................................................................................85 Controller User-Defined Commands ...........................................................................................................................................86
Configuring Controllers - Technician Guide Configuring Access Card Types ...........................................................................................................................................179 Configuring Degraded Mode Operation ...........................................................................................................................................181 Configuring Third-Party Access Control Interfaces ...........................................................................................................................................183 Configuring a Schlage Wyreless Interface .........................................................................................................................................184 Configuring Assa Abloy Aperio Lock-Readers .........................................................................................................................................186 Configuring Sargent & Greenleaf IP Series Locks .........................................................................................................................................188
Chapter 7 Using .........................................................................................................212 the IVR Facility Chapter 8 Using .........................................................................................................216 the 1057/8001 Controller LED Display Chapter 9 GMS .........................................................................................................220 Config Application Information
4 | Table of Contents
Introduction
This documentation is divided into several sections: Setting Up Initial Controller Communications - Initial configuration requires a PC connected directly to the Controller using a serial cable. Once you have established communications with GMS, the complete configuration can be completed directly, or remotely. Configuring Controller Hardware and Alarm Functions - The Controller requires configuration for its attached hardware and also how it interacts with them for alarm functionality. Note: Controller firmware version 5.00 (for 1057/1058) and 1.02 (for 8001) and later auto-detect connected devices. The basic device configuration is uploaded when the Controller detects the device on the RS485 device loop. To customize device configuration, proceed with normal Controller setup and GMS configuration steps. Configuring Access Control - The Controller requires configuration for access control functionality. Configuring Elevator Control - The Controller requires configuration for access control functionality, if required. Configuring Business Management Systems - The Controller requires configuration for interacting with third-party business management systems, if required. Controller Firmware - The Controller uses locally stored firmware to control its functionality. Firmware upgrades can be downloaded to Controllers without interruption to Controller operation. Note: Procedures detailed assume that the Controller is online to a GMS terminal, unless otherwise stated. Controllers and Remote Terminal Units 'Controller' is a generic security industry term that refers to a hardware device that controls the security of a site in a remote location from the monitoring center. Traditionally Pacom has used the term 'field controller' and 'Remote Terminal Unit' or 'RTU' for this type of device. This term is no longer used. Throughout this documentation the term 'Controller' is used. Within GMS, the site number and the Controller number are synonymous. Although some buildings may have more than one Controller, the term 'site' refers to all areas controlled by a single Controller. During any kind of configuration procedure it is always a good idea to have the Transaction Manager open. The Transaction Manager helps you see what is occurring, whether correctly or incorrectly and in real-time (as it happens) by continuously listing all communications between GMS and the Controller. Open the Transaction Manager by clicking on the GMS toolbar. Select the GMS Hardware menu for a range of configuration options. All hardware configuration is completed from this menu.
Supporting Material
The following documentation may provide further assistance for installing and configuring Pacom Controllers: Pacom Hardware Installation Guide. CCU Configuration Guide. TransIT Configuration Guide. Using GMS - Operator Guide. Configuring GMS - Administrator Guide.
Assumptions
For technicians, it is assumed that you have successfully completed an electrical trade or equivalent technical training to satisfy local requirements and authorities. You may also be required to meet the requirements of the local telecommunications authority during the installation of the equipment detailed in this guide. Some knowledge of networks and network types is also required.
Introduction | 5
blank page
Chapter
Setting Up Controllers
Configuring Controllers - Technician Guide For a Controller to communicate with the monitoring center over a network or using PSTN, some initial configuration is required. There are three methods you can use to perform the initial configuration: A laptop PC with GMS software installed (GMS laptop), connected to the Controllers diagnostic port using a serial cable. Assign the Controller an address and configure the network port for remote management. A keypad, connected to the Controller using an RS485 device line (see Using a Keypad for Basic Configuration 15 ). Configure the Controller internal modem so it can dial a remote GMS terminal. A pre-configured External EEPROM Module (EEM), referred to as a configuration dongle, that plugs directly in to the Controller RAP port. Using the appropriate DIP switch settings (see Setting DIP Switches 9 ), the Controller downloads the configuration information. The following is an outline of the steps required to bring a Controller online using a GMS laptop: 1. 2. 3. 4. 5. 6. For new installations, reset the Controller to default parameters (see Setting DIP Switch Functions 9 ). Connect a laptop/PC to the Controller (see Connecting to GMS 11 ). Program the Controller address (see Setting Controller ID 18 ). Configure port parameters (see Configuring Controller Ports for Alarm Messaging 23 ). Create Controller accounts on the linecard (see the TransIT or CCU Configuration Guides). Increase the Controller Diagnostic port connection speed (optional) (see Increasing the Diagnostic Port Connection Speed (Baud Rate) 12 )
This section also details the most common Controller configurations and related port protocol parameters (see Configuring Controller Ports for Alarm Messaging 23 ): IP Over Ethernet. PSTN. Dial-Backup. Dialup for Primary Connections.
Set the Diagnostic port to the default protocol settings. This setting is dependent on firmware version, as follows: Pre 5.00 - Pacom Communication Protocol (PCP) at 4800 baud rate regardless of setting. 5.00 - 5.01 - Enhanced PCP protocol (EPCP) at 38400 baud rate (OFF for PCP at 4800). 5.02 - PCP at 4800 baud rate (OFF for EPCP at 38400). Note: 8001 Controllers operate as per 105x Controller firmware 5.02. Clear access control parameters only.
Note: Having DIP Switches 1 and 4 ON at Controller power-up will set it to factory defaults
Note: The alarm panel type configured when the template was created is applied (see Configuring Alarm Panel Types 64 ). 3. 4. In the Controller Template dialog box, make the necessary changes for the Controller (you cannot have more than one Controller in the same system using the same ID number, IP address, etc). Click OK to close the dialog box and begin loading the configuration (with the new settings). The Transaction Manager will show the data download activity to the Controller. The Controller will restart after the download completes.
Connecting to GMS
Pacom Controllers can be configured using a laptop with GMS software installed. There are two methods of connection to the Controller from GMS: Connect a serial cable from the laptop to the Controller Diagnostic port. Connect a cross-over Ethernet cable from the laptop to the Controller Ethernet port. When communication is established with the Controller, the Transaction Manager displays connection messages and an icon is displayed in the lower right-hand corner of the main GMS application window indicating successful connection. Note: If there is no configuration PC/laptop available, you can program the Controller ID number and a dial-up phone number by connecting a keypad directly to a Controller RS485 device line port. See Using a Keypad for Basic Configuration 15 .
8001 Controller Diagnostic Cable Pin Connections PCB Terminal CN3 Pin 2 1 3 PC DB9 Pin 2 3 5
The Controller Diagnostic port parameters can be determined in one of three ways: For new installations, reset the Controller to default settings (see Setting DIP Switch Functions 9 ). For existing systems, where the Controller is in communication with the monitoring system, the parameters can be determined using the Controller Port Parameters dialog box from the monitoring PC (see Accessing Port Parameters 25 ). For existing systems, where the Controller is offline and cannot be reset to default, the only way to determine COM parameters is by trial and error. That is, the COM port parameters must be varied until communications are established. It is recommended that you try default parameters first. Failing that, select a Baud Rate setting of either 38400 or 9600. You can also set the Diagnostic port to 4800 PCP or 38400 Chapter 1 - Setting Up Controllers | 11
Configuring Controllers - Technician Guide EPCP using Engineering mode. 4. In the Connection Properties - Port 1 dialog box select the required Comm port from the COM list, and ensure the appropriate parameters are set. The default parameters for all Pacom Controller serial ports (excluding the Diagnostic port) are: Connection - Enhanced PCP. Baud Rate - 38400. Parity - None. Data Bits - 8. Stop Bits - 1. The default parameters for 105x Controller Diagnostic ports are: Connection - Enhanced PCP if DIP switch 3 is OFF during cold boot, or PCP if DIP switch 3 is ON during cold boot. Note: The above Connection setting applies only to 105x Controllers. 8001 Controllers always use EPCP regardless of DIP switch 3 setting. Baud Rate - 38400 if DIP switch 3 is ON during cold boot, or 4800 if DIP switch 3 is OFF during cold boot (see Setting DIP Switch Functions 9 ). Parity - None. Data Bits - 8. Stop Bits - 1. Note: To 'cold boot' a Controller, set DIP switches 1 and 4 to ON, then restart the Controller. This defaults the Controller to factory defaults and the Diagnostic port to 4800 PCP. Switches 1, 3 and 4 defaults the Controller also but sets the Diagnostic port to 38400 enhanced PCP. Note: You can set the diagnostic port to 4800 PCP or 38400 Enhanced PCP using Engineering Mode fro the system keypad. 5. Click OK to close the Connection Properties - Port 1 dialog box.
3. 4.
From the Protocol list, select Enhanced PCP. This protocol (Enhanced Pacom Communication Protocol) provides a 38400 baud rate and improved data transfer efficiency. Click Download to save the new settings, then click Close to close the dialog box. Note: Altering the Diagnostic port baud rate causes the Controller to lose communication with the GMS laptop. The final steps in this procedure will bring the Controller back online.
5.
In GMS select Hardware > Connection 1. The Connection Properties dialog box opens.
Configuring Controllers - Technician Guide 6. 7. 8. From the Connection list select Enhanced PCP over Serial. Set the Baud Rate setting to 38400. Click OK to close the dialog box. Communication with the Controller re-establishes shortly afterwards. Note: Make a note of the baud rate setting (for example, a note on the Diagnostic port), so future technicians will know what baud rate to set in GMS.
5.
Select a Connection ID number from the Connection ID list. This number represents a set of parameters that the Controller retains for automatically accepting future GMS connections. Note: Controllers can accept a Connection ID number of 1 to 4 only. If you are connecting to a TransIT the Connection ID can range from 1 to 16.
6.
In the Password ID field enter the number that is used to connect to the Controller. The Password ID can range between 1 and 8. By default, Connection ID 1 is the only one enabled in the Controller. To set passwords, see Setting Controller Passwords 63 . Note: Controllers can accept a Password ID number of 1 to 8 only. If you are connecting to a TransIT the Password ID can range from 1 to 10.
7.
In the Password field enter the password for the associated Password ID number set in Step 5. The default Connection ID 1 password is 'Pacom' (case-sensitive). When a Controller is reset to factory defaults, the password is reset to 'Pacom'. Note: The default password for a TransIT is 'Pacom001' (case-sensitive).
8.
The Connection ID allows for different options when receiving messages. If the value is set to 1 (default), all messages stored in the Controller are displayed upon connection. If 2, 3, or 4 are entered, messages stored in the Controller will not be displayed upon connection. Only messages occurring after the connection are displayed. In the IP Address 1 field enter the IP address of the Controller. The default IP address is '10.1.1.1'.
9.
10. Click OK to close the Connection Properties - Port 1 dialog box. When communication is established with the Controller, the Transaction Manager displays connection messages.
4.
Select a Connection ID number from the Connection ID list. This number represents a set of parameters that the Controller retains for automatically accepting future GMS connections. Note: Controllers can accept a Connection ID number of 1 to 4 only. If you are connecting to a TransIT the Connection ID can range from 1 to 16.
5.
In the Password ID field enter the number that is used to connect to the Controller. The Password ID can range between 1 and 8. By default, Connection ID 1 is the only one enabled in the Controller. To set passwords, see Setting Controller Passwords 63 . Note: Controllers can accept a Password ID number of 1 to 8 only. If you are connecting to a TransIT the Password ID can range from 1 to 10.
6.
In the Password field enter the password for the associated Password ID number set in Step 5. The default Connection ID 1 password is 'Pacom' (case-sensitive). When a Controller is reset to factory defaults, the password is reset to 'Pacom'. Note: The default password for a TransIT is 'Pacom001' (case-sensitive).
7.
The Connection ID allows for different options when receiving messages. If the value is set to 1 (default), all messages stored in the Controller are displayed upon connection. If 2, 3, or 4 are entered, messages stored in the Controller will not be displayed upon connection. Only messages occurring after the connection are displayed. Click OK to close the Connection Properties - Port 1 dialog box. Establish communications with the Controller using the Hardware > Dial Connect option (see Dialling in to Controllers 16 ).
8. 9.
10. Press the LOG ON softkey to display the Engineering menu. 11. Press the CONFIG softkey. 12. Press the NETWORK softkey. 13. Press the DIALUP softkey. 14. Press the PACOM softkey. 15. Enter the telephone number of the PSTN card in the Base Station. 'Attempting dialup recovery' is displayed on the keypad and the Controller attempts to connect to the GMS location. Press the REFRESH softkey every 10 seconds to update the status of the dialup connection. Once the connection is made the keypad displays 'Connected'. 16. Once the connection is made, configure the Controller from the GMS site or download an existing configuration using the dialup connection.
Dialling in to Controllers
You can use GMS to dial directly into a Controller to configure it. Dialling into a Controller is generally performed through a Pacom Base Station, where GMS dials into the Base Station, which in turn dials into the Controller. GMS can also dial directly into a Controller using an external modem. Pacom recommends the following modems to be used: U.S. Robotics Model 0701 U.S. Robotics Model 5686 Note: If another modem type is used, ensure the modem has auto-answer mode enabled. Note: This section applies to 1057/1058 Controllers with firmware 4.08 to 4.11. To dial into 1057/1058 Controllers with firmware 4.12, see Creating a Dialup Connection to the Controller 14 .
10. In the Port Priority list select No Priority. 11. Click Download, then Close. Network port configuration is now complete.
2.
In the TAPI Line list, select the modem (or other TAPI device) that is attached to the PC running GMS. Note: Only TAPI devices that have been registered with Windows and are functional with GMS are displayed. The TAPI device must support data transmission.
3. 4.
For modems, click Configure Line. The selected modem configuration options are displayed in a dialog box. a. In the Port Speed list select 38400 and click OK to close the dialog box and return to the Dial dialog box. In the Phone Number field, enter the phone number of the modem connected to the Controller. Use the country and area code prefix options, if required. To make the telephone number selectable from the Dialers list, so that you do not have to enter them manually each time, click Edit Speed Dial. The Speed Dial dialog box opens.
a. In the Name field enter a name to reference the telephone number by. b. In the Phone Number field enter the telephone number to dial. c. Click Save. You can add other speed dial numbers as required. When finished, click Close. Once GMS is connected, the Call Status region in the Dial dialog box displays 'Line Connected'. Watch the Transaction Manager until you see it confirming the connection, then you can configure the Controller as required. 5. When configuration is complete, click Hangup in the Dial dialog box and click Yes when a confirmation box displays.
Setting Controller ID
Each Controller in a system requires a unique identifier, or address. This ID is a number that GMS uses to recognize the Controller. Controller ID numbers can range from 1 to 9999, with '1' being the default address for all Pacom Controllers. Note: During installation, you must assign the Controller an ID not already in use by another Controller. To assign an ID (address) to a Controller, proceed as follows: 1. In GMS select Hardware > Change Controller ID. The Program Controller ID dialog box opens.
2. 3.
In the Enter Current Controller ID field type the existing ID number of the Controller you want to change. In the Enter New Controller ID field type the new ID number for the Controller. Caution: Make sure that you have the correct ID number for the Controller. If two Controllers are assigned the same ID number, the second one assigned may not be able to communicate with the system properly. Note: The Network Type and Encoding Type selections only apply to the 1050/1060 and are ignored by later model Controllers.
4.
You must use the new Controller ID to access the Controller parameters.
The Controller Status display (above) represents a summary of current Controller conditions. The Hardware display (below), also known as the 'device map' (select Alarm > Configure > Hardware) is a graphical representation of the hardware configuration, showing the various pieces of hardware (Keypads, I/O devices, etc) attached to the Controller. The areas configured in the Controller and those controlled by keypads are represented as colored squares. In the case of keypads, the colors also represent areas that are controlled by the keypad. Controller alarm parameters for each device are also uploaded to GMS when you open the device map. The device map is divided into three columns: Keypads 100 . Local Devices 101 . Remote Devices 101 .
While this dialog box is different to earlier versions, the functionality for configuring Controllers remains the same. It is the method for accessing each configuration function that has changed (see Layout of the Controller Dialog Box 20 ). The steps required to access the Controller dialog box are repeated regularly in the configuration documentation and is therefore described only once. To access Controller configuration options: 1. In GMS select Hardware > Controller Settings. The Controller dialog box opens. Alternatively, from the Summary Manager window, right-click the site you want to access the Controller for, then select the Controller Settings from the context menu. In the Controller ID field enter the Controller ID number, then click Change. Note: If you are accessing the Controller dialog box from the Summary Manager, there is no need to enter the Controller ID. At any time, click Refresh to update the dialog box display with any changes that have been made.
2.
To display/access a different Controller, type the address of the Controller you want to access in the Controller ID field, then click Change.
This dialog box acts as the access point to the various available configuration options (instead of through the Controller dialog box). To access the various configuration screens, select the configuration type from the Options list, then click OK. The corresponding dialog box opens, as it would from selecting the same option using the menu system in the Controller dialog box for Pacom Controllers.
Configuring Controllers - Technician Guide IP Token Ring (using adaptor). X.25. SLDC Poll. IP over PPP (for example, GPRS). For information regarding the configuration of Controllers for operation over other network types contact Pacom Support at support@pacom.com.
3.
Enable the Port Parameters option. Each port maintains a set of parameters and error statistics. The options at the bottom of the dialog box are used to select whether or not parameters or error statistics display when a port is selected. Click the required port. The Port Protocol Parameters dialog box opens for the selected port. The parameters displayed within the dialog box vary depending on the selected port. The following image shows the dialog box for the Ethernet port.
4.
Configuring Controllers - Technician Guide Note: GMS stores hardware connection information in a COMMS.INI file in the GMS\Customer\NotSynch folder. This file is not automatically synched between GMS servers, therefore, allowing individual connection parameters for each server. To configure the communication channel, proceed as follows: 1. In GMS select Hardware > Connection 1 or Connection 2. The Connection Properties dialog box opens for the selected channel.
2. 3. 1.
In the Connection list select the required connection type. Each connection type presents a range of parameters specific to it. Enter the parameters as required (see Connecting to GMS 11 ). In GMS select Hardware > Set Active Connection. A dialog box displays to confirm the switch.
2.
GMS stops displaying messages received on the previously active connection and begins displaying messages received on the newly selected one. Note: Two connections must be configured to be able to switch between them. Note: Releasing the connection (Hardware > Release Connection) stops GMS from displaying messages from the previously active connection, however, does not automatically start displaying messages from the other channel.
Parameter SAP to Use for LLC Level Window Size <1127> T1 message ACK time limit N2 message retry count SABME polling frequency RR Polling frequency SABME sending enabled macFlags Sending of RARP messages Sending of IP filters to 105x LLC test frame sending Token Ring source routing IEEE 802.3 (or DIX) framing Token Ring Speed MAC Address Parameter Enabled LLC Test Message timer Local MAC Address
Description LLC2 service access port number to use. LLC2 extended window size. Time to wait for a response to an LLC2 frame. Time to retry sending an Iframe on LLC2 Time between sending SABME requests to offline SAPs in LLC2. Time between LLC2 and Receiver Ready poll cycled. Enable sending SABME commands from our node to disconnect SAP.
Enables reverse address resolution protocol used with RARP sever on LAN. Used with 1051/1052/1053 devices to allow filtering of IP messages within the 1051/1052/1053 to minimize serial traffic. Only receive messages to our IP address. Enable sending of LLC test frames when route is not determined. Enables token ring source routing option. Enable Ethernet type messages (802.3 or DIX) framing. Selects between 4MHz and 16MHz token ring. Enable local MAC address programming. Used to select and alternate MAC address. Time between sending of LLC test frames. Used in conjunction with Use of MAC Address parameter (above) to program the alternate address. When not in use, will show the burned-in MAC Address.
Parameter Protocol LAN MAC Level Internal Ethernet Driver LAN MAC Level Internal Ethernet Driver Persistence
Description Selects which communications protocol is used by this port. If this port does not support this protocol the system will not allow its selection. Enables the LAN MAC Level parameter options. Enables the Internal Ethernet Driver parameter options. Displayed when LAN MAC Level option is selected. Displayed when the Internal Ethernet Driver option is selected. This parameter allows the driver to be less aggressive in its attempts to re-send data following a collision. Should normally be set to 0 but can be set from 1 to 9, 9 being the least aggressive. Used to increase signal transmission reliability over long distances. Enables full two-way communication, that is, Rx during Tx or vice-versa. Enables the sending of heartbeat pulses in the absence of data to confirm connection over the link. Enables this port to read all data on ethernet, not only that data which has been addressed to it. Used for re-routing.
Enable SQE Enable full duplex operation Enable link heartbeat pulses Operate in promiscuous Mode
Parameter UDP port to send data to IP time to live count IP Address of local node Subnet mask IP Address of router IP Address of another router Response time to message Max retrans attempts Time for pinging
Description This is the UDP port number for UDP messages. The default used by Pacom is '2800'. How many hops the IP data message will pass before being discarded. Controller IP address. Controller subnet mask. IP address of gateway router 1. IP address of gateway router 2 (where applicable). Time to wait for an IP/UDP data message to be sent to the LAN. The number of retries to send UDP/IP data message to the LAN if there is no response before discarding the message. Time between pings to an IP address in cache table. Set to 0 to disable pings.
Configuring Controllers - Technician Guide Parameter Time for pinging response Retry count for pinging Time for router ping Time for router response Retry count for router ping Disable SNMP Management Enable DHCP Description Used to verify that a remote device is still active. Time to wait for a response to a ping request from a remote node. How many times to retry pings to remote before the remote is marked as failed. Time between pings to the router. Time to wait for a response to a ping to one of the two routers. How many times to retry pings to remote before the router is marked as failed. The Controller can respond to SNMP messages over the network. if ticked, then the Controller will not respond to any SNMP messages. By default SNMP is enabled. Get the IP address, the subnet, and the Router IP address from a DHCP server on the network. When ticked, the IP Address, Subnet Mask, IP of Router, and IP for another Router fields are disabled. The addresses displayed in these fields will be those allocated by the DHCP server. If not allocated yet, '0.0.0.0' is displayed. If the Controller connects to a CCU or TransIT, the Controller should be added in into the CCU/TransIT with an IP Address of 0.0.0.0. Note: The Controller will not attempt to connect to the Base Station until at least the local IP address has been received. If the Controller requires a router to connect to the Base Station, it will not try to connect until the Router IP address is also obtained.
Linecard Addresses
This screen is used to enter the address and phone number of the line cards (in the Base Station) to which the Controller will report. You can program up to three line cards with up to two alternate address/phone numbers each.
Description Selects which communications protocol is used by the current port. If the port does not support this protocol the system selection is refused. Provides selection of the protocol for line card communication. Selection of a protocol enables the address field for the line cards. Enter the address of Line 1 of Linecard A. Used if Linecard A Line 1 fails. Enter the address of Line 2 of Linecard A.
Configuring Controllers - Technician Guide Parameter Linecard B - Line 1 Linecard B - Line 2 Backup Linecard A - Line 1 Backup Linecard A - Line 2 SNA Network ID Description Used if Linecard A Line 2 fails. Enter the address of Line 1 of Linecard B. Used if Linecard B Line 1 fails. Enter the address of Line 2 of Linecard B. Used if Linecard B Line 2 fails. Enter the address of Line 2 of Backup Linecard A. Used if Backup Linecard A Line 1 fails. Enter the address of Line 2 of Backup Linecard A. Appropriate field are enabled by selecting SNA LU name from the related Linecard Addresses list. It allows the linecards network ID to be specified.
Note: For more information regarding linecard addressing and protocols, see the CCU/TransIT Configuration Guides.
General Parameters
Description Specifies the length of time the Controller waits for the network to respond, after which it declares lost network communications. It will then attempt to connect using the secondary port. Specifies the length of time the Controller waits after it has lost network communications, including all retries and timeouts associated with recovering primary/secondary communications, before attempting to connect using the tertiary port. The approximate length of time the port waits to re-contact the Base Station following a series of failed attempts the Contact Sleep window setting. The amount of approximation for sleep time between contact cycles to avoid all Controllers trying to re-contact the Base Station at the same time. The length of time the port waits for a response from the Base Station before the attempt is considered to have failed. The number of times the port attempts to connect before the next priority port is activated. The port waits until the specified sleep time expires before attempting again. The length of time, following a failed attempt, before retry. The number of seconds that this port will wait for an acknowledgement of a sent message before sending it again. The number of times the port attempts to re-send the same message before communication is considered lost. The time that the Controller will wait for a heartbeat from the Base Station after a successful call establishment, before clearing the call and trying again. It is also the time that the Controller will wait for a new heartbeat from the Base Station during a heartbeat exchange. After a call, the Controller expects a first heartbeat from the Base Station. The Controller will then store the heartbeat and when the timer within the heartbeat expires, the Controller will send a heartbeat response to the Base Station. It then starts this timer and
Sleep time between contact cycles Contact Sleep window Contact response time Contact retry counter
Waiting time between contacts Time to wait for a response Retry counter for sending messages Waiting time for new heartbeat.
Configuring Controllers - Technician Guide Parameter Description waits for a new heartbeat from the Base Station. If it receives a new heartbeat, the process continues. If heartbeat is not received, the Controller will re-send the heartbeat response X number of times where X is the value specified in Retry Counter for Sending Messages. If there is still no response, the Controller will drop the connection and try to reestablish. Queue Non Important Alarms Use TCP for Base Station connection Enable Rijndael MAC Rijndael Data Encryption Forces all non-important alarms in to queue, until an 'important alarm' is activated, at which time all queued alarms report (see Include as Important Alarms in General System Parameters 60 ). Forces all linecard messages to be sent using TCP/IP instead of UDP/IP. Rijndael is a high-security method of message authentication used to encrypt messages between a Base Station and Controller. Different methods are available for encrypting data between a Base Stations and Controllers. Currently, only Method 1 is supported. Methods 2 and 3 are for future use.
Note: To comply with NIST AES(FIPS) 197, select Enable Rijndael MAC, and select Method 1 under Rijndael Encryption.
Configuring Controllers - Technician Guide b. From the Port Priority list select Secondary Priority. Note: Although the internal modem will provide the primary method of communication, it is recommended that the Port Priority setting be set to Secondary Priority. If no network connection is available, the Controller still dials out. 4. Click the Base Station tab and: a. Select the Telephone Numbers option. b. In the Telephone Numbers region, in the Comms #1 list select Pacom and enter the linecard telephone number in the adjacent field. Note: To set the port to report in SIA or Contact ID formats (for third-party monitoring) select the required format from the Comms list. c. In the Alarm #1 list select Pacom and enter the linecard telephone number in the adjacent field. d. For more information on the different phone numbers, see Telephone Numbers 36 . Note: Comms numbers report network status messages and alarm numbers report alarm messages. There must be at least one number present for each message type. While you can use the same number for both, it is not recommended because network status reporting may obstruct more important alarm messages from being received. It is therefore recommended that, as a minimum, the CCU/ TransIT linecard has at least two modems - one dedicated to alarm reporting and the other to network status reporting. For information regarding linecard configuration see the CCU or TransIT Configuration Guides. e. If required, in the Predial # for Telephone #1 field enter the prefix that corresponds to the telephone number entered. This is used for dialling an outside line where a PABX is used. If no prefix is required, leave the field blank. f. If required, in the Postdial # for Telephone #1 field enter the postdial number that corresponds to the telephone number entered in the previous step. Postdial numbers are used when, for example, a PIN or extension number is required after a connection has been established. If no postdial number is required, leave the field blank.
g. Under the Base Station tab, select the Parameters option. All parameters in this tab should remain as default. For more information regarding Base Station tab parameters for dialup operation, see Base Station Parameters for Dialup 36 . 5. Click Download to save and apply the new settings. The Transaction Manager displays a list of messages confirming the changes. Caution: The Close button does not save or apply any changes. You must click Download before closing the dialog box to save and apply your changes. 6. 7. Click Close to close the dialog box and return to the Port Parameters dialog box. Once configuration of Internal Modem Protocol Parameters is complete, you must disable the Ethernet port. For information regarding Ethernet port configuration Configuring Primary IP Communications Over Ethernet 27 .
Parameter Protocol Dial up Parameters & Modem Driver. Config Parameters DLU Telephone Number Message response Timeout time Max Num of no response
Description Selects which communications protocol is used by this port. If this port does not support this protocol the system will not allow its selection. Selects between the two parameters screens. See Asynchronous Driver Parameters 45 . Dial-back number for the Controller. The amount of time the port will wait for an acknowledgment to a transmitted message before it is resent. Not used in this release.
Configuring Controllers - Technician Guide Parameter Max Num of invalid polls Max NAKs before message Undeliverable Wait for dial tone time Description Max number of invalid polls from the dial card before it is marked as offline. The number of times a message can be 'not acknowledged' before it is discarded. The amount of time the port will wait for a dial tone before the dial tone is declared missing.
Modem Parameters
Parameter Protocol Dial up Parameters & Modem Driver. Port Priority Modem string to use Modem Type Force Download Modem string
Description Selects which communications protocol is used by this port. If this port does not support this protocol the system will not allow its selection. Selects between the two parameters screens. Selects the priority for this port and enables the Base Station window. 1, 2 or Default. 1 and 2 are preset modem types. Can be changed by changing the Modem Type setting. List of all modems supported. Select the type of modem used from the pulldown menu. To reduce the amount of data transmitted, modem strings are not downloaded, as they are not expected to change frequently and there is no need to send the strings if other parameters are changed. However, the modem strings are sent always if this option is selected. Selects either pulse or tone dialling for the modem. Number of seconds after it has dialled that this port will wait to receive a Data Carrier Detect signal. Number of times that the modem will allow an incoming call to ring before answering it. When set to 0 with the Answer on Redial option enabled, if an incoming call rings twice and hangs up, the Controller will answer the next incoming call (if within 60 seconds after the previous two ring call). Note: If the Controller shares the same line as another device (for example, a fax machine) it is recommended to set this to 0 and enable the Answer on Redial option, so that the Controller does not answer fax calls and that the fax doesn't answer Controller calls.
Pulse Dial / Tone Dial Time to wait for DCD after Dialling Num. Rings until answering incoming call
Time to wait for DCD after answering Time to wait for First data message Time allowed between data messages Time between polls to modem
The number of seconds the modem will wait to receive a Data Carrier Detect signal after answering an incoming call before hanging up. The number of seconds the modem will wait to receive data after answering a call, before hanging up. The number of seconds the modem will remain idle after receiving a message before hanging up. (Inactivity Timer) The regularity at which the modem is polled. In the case of ViControlleral Access ISDN T/A this is the frequency that the Controller checks to see if there is an ISDN line connected to the T/A.
Configuring Controllers - Technician Guide Parameter No responses before making modem failed Time for ACK response to a Tx Time between dial tone tests Description How many times the port will receive a no response to a poll from the modem before marking it as failed. Time waited for an acknowledgment to a transmission. Number of minutes between phone line checks. In the case of ViControlleral Access ISDN T/A this is the frequency that the Controller will test if the FEP T/A can be contacted. The regularity between checks to see if the port is still marked as online. If it is not then the Serial Comms Chip for this port is reset. Enable to have the Controller answer an incoming call if the Num. Rings until answering incoming call is set to 0 and an incoming call rings twice and hangs up, then is called again within 60 seconds after the previous two ring call.
Telephone Numbers
When connecting to other reporting systems, select the message format type from the Comms, Alarm or Disaster lists. The available message formats are: Pacom - Reports to a Pacom Base Station. Contact ID - Reports to receivers that support Contact ID message format. SIA - Reports to receivers that support SIA message format. SMS - Reports text messages to mobile/cell phones using a GSM Modem.
Description Input the first and second priority telephone numbers for communication, alarms and disasters. * or + can be added to the beginning of the telephone numbers to pause or to wait for a dial tone before dialling. Primary communications number - used for sending less important general communications messages to the Base Station. Select the message format type from the list. Secondary communications number - used for general communications messages when connection cannot be established with Comms #1. Select the message format type from the list. Primary alarms number - used to report alarm messages to the Base Station. Select the message format type from the list. Secondary alarms number - used to report alarm messages when connection cannot be established with Alarms Telephone #1. Select the message format type from the drop down list.
Comms #1
Comms #2
Alarm #1 Alarm #2
Configuring Controllers - Technician Guide Parameter Disaster #1 Description Used when a connection cannot be established with Comms #2, Alarm #2 and (if programmed) a Comms and Alarm numbers on a Tertiary Priority port. Select the message format type from the list. Used when a connection cannot be established with Disaster #1. Select the message format type from the list. Enter any numbers that need to be dialled prior to the phone number for the corresponding Comms, Alarm or Disaster number. Enter any numbers that need to be dialled after establishing connection with the Base Station or third-party receiver.
General Parameters
Parameter Sleep time between contact cycles Contact Sleep window Contact response time Contact retry counter
Description Approximately how long the port will wait to re-contact the Base Station after a series of failed attempts. +/- Contact Sleep window. Used to create a random window around sleep time between contact cycles to avoid all Controllers trying to re-contact the Base Station at the same time. How long this port will wait for a response from the Base Station before it is considered a failed attempt. The number of times that this port will retry connecting before the next priority port is activated. This port will wait until sleep time has expired and then attempt again. The amount of time after a failed attempt before retry. The number of seconds that this port will wait for an acknowledgement of a sent message before sending it again. The number of times that this port will attempt to re send the same message before considering communications lost. The number of non-important messages that the Controller will accumulate before making a dialup connection to send them all. If an 'important alarm' is activated, the Base Station is contacted immediately and all queued alarms are reported (see Include as Important Alarms in General System Parameters 60 ). How often a Controller dials in to the Base Station to check-in. The timings are applicable when using Contact ID and SIA formats. If contacting a Pacom Base Station, the timings for the specific Dialback time are set in the Base Station. Every time the Controller contacts the Base Station, the Base Station provides the times for the Dialup type selected: Dialup Type-1 - 1 - 2 minutes Dialup Type-2 - 30 - 60 minutes Dialup Type-3 - 1 - 2 hours Dialup Type-4 - 2 - 4 hours
Waiting time between contacts Time to wait for a response Retry counter for sending messages # Non-important alarms to activate dialup
Dial-Up type.
Configuring Controllers - Technician Guide Parameter Description Dialup Type-5 - 3 - 6 hours Dialup Type-6 - 6 - 8 hours Dialup Type-7 - 8 - 10 hours Dialup Type-8 - 10 - 12 hours. Note: These are default Base Station time intervals, however, they can be changed. DialBack time Random time between time specified +/- 30 mins Do dial tone test at midnight Multiple alarm reports capable SIA receiver Apply Message Filters Before Dialup A specific time when the Controller will dial in to a third-party receiver to check-in. The Controller will randomly dial in to the Base Station up to 30 minutes before or after the selected time. Applicable when DialBack time is selected, and used with Contact ID and SIA. When this flag is selected the Controller will check the phone line for a dial tone each night at midnight Select this flag only if you are reporting to an SIA receiver that is capable of handling multiple messages per data packet. This flag is only used if there is no Primary Priority port programmed. Apply message filter to messages before they are put in the queue to be reported to a Pacom Base Station or a third-party receiver so that only certain messages are sent. If a Controller is setup to send messages to a third-party receiver (that is, Contact ID, SIA etc.) users cannot view the messages stored in the network queue if they dial in from a Pacom Base Station. Selecting this option creates a separate queue which contains all alarm messages stored in the network queue. This allows GMS users to dial in and view the alarm messages in the queue. If a user has dialed in and an Important Alarm occurs, the connection is disconnected immediately and a telephone line is used to report the Important Alarm to the third-party receiver. The user will have to manually dial in again. The Controller will store 700 alarm messages. If card access queue is also selected it will store the last 350 alarms and 350 card access messages. If a Controller is setup to send messages to a third-party receiver (that is, Contact ID, SIA etc.) users cannot view the messages stored in the network queue if they dial in from a Pacom Base Station. Selecting this option creates a separate queue which contains all card access messages stored in the network queue. This allows GMS users to dial in and view the card access messages in the queue. If a user has dialed in and an Important Alarm occurs, the connection is disconnected immediately and a telephone line is used to report the Important Alarm to the third-party receiver. The user will have to manually dial in again. The Controller will store 700 card access messages. If alarm queue is also selected it will store the last 350 alarms and 350 card access messages.
Create Alarm messages queue for Pacom base station while reporting to 3rd party receiver
Create Access Control messages queue for Pacom base station while reporting to 3rd party receiver
Telephone number #1 Telephone number #2 Telephone number #3 Telephone number #4 Telephone number #5 Telephone number #6
2. 3. 4. 5. 6.
Click the Phone Line/Modem port image. The Port Protocol Parameters dialog box opens for it. Select the Modem Driver option. The Modem Driver parameters display. In the Port Priority list select the appropriate priority for using the GSM modem (generally, Secondary Priority or Tertiary Priority options). In the Modem Type list select Falcom GSM modem. Click the Base Station tab and: a. Select the Telephone Numbers option. b. In the Telephone Numbers region, in the Comms #1 list select Pacom and enter the mobile telephone number to receive the communications in the adjacent field. Note: GSM does not use tone dialling. Contact ID and SIA Format require tone handshaking to operate, therefore, will not operate with a GSM modem. A fixed phone line must be used for Contact ID and SIA. c. In the Alarm #1 list select Pacom and enter the mobile telephone number in the adjacent field. Generally, this number is the same as for Comms #1. d. If required, in the Predial # for Telephone #1 field enter the prefix that corresponds to the telephone number entered. This is used for dialling an outside line where a PABX is used. If no prefix is required, leave the field blank. e. If required, in the Postdial # for Telephone #1 field enter the postdial number that corresponds to the telephone number entered in the previous step. Postdial numbers are used when, for example, a PIN or extension number is required after a connection has been established. If no postdial number is required, leave the field blank. f. For more information regarding Base Station parameters for dialup operation, see Base Station Parameters for Dialup 36 .
g. Select the Parameters option. h. In the Dialback Parameters region, select the Dialback Time option and select a time of day for the Controller to contact the receiver from the adjacent list. This is a regular contact setting so that the system regularly checks that the communications are viable. Ensure that the receiver is not busy at the time you select. i. 7. Enable the Apply Message Filters before Dialup option to ensure that the required messages are sent. Click Download to save and apply the new settings. The Transaction Manager window displays a list of messages confirming the changes. Caution: The Close button does not save or apply any changes. You must click Download before closing the dialog box to save and apply your changes. 8. Click Close to close the dialog box and return to the Port Parameters dialog box.
. 3. 4. Click the Phone Line/Modem port image. The Port Protocol Parameters dialog box opens for it. Click the Base Station tab and: a. Select the Telephone Numbers option. b. In the Telephone Numbers region, in the Comms #1 list select either the Contact ID or SIA Format option and enter the telephone number in the adjacent field. c. In the Alarm #1 list select either the Contact ID or SIA Format option and enter the telephone number in the adjacent field. This is usually the same number as for Comms #1. For more information on the different phone numbers, see Telephone Numbers 33 . d. If required, in the Predial # for Telephone #1 field enter the prefix that corresponds to the telephone number entered. This is used for dialling an outside line where a PABX is used. If no prefix is required, leave the field blank. e. If required, in the Postdial # for Telephone #1 field enter the postdial number that corresponds to the telephone number entered in the previous step. Postdial numbers are used when, for example, a PIN or extension number is required after a connection has been established. If no postdial number is required, leave the field blank. For more information regarding Base Station parameters for dial-up operation, see Base Station Parameters for Dial-Up 33 . f. Select the Parameters option. g. In the Dialback Parameters region, select the Dialback Time option and select a time of day for the Controller to contact the receiver/alarm panel from the adjacent list. This is a regular contact setting so that the system regularly checks that the communications are viable. Ensure that the receiver/alarm panel is not busy at the time you select. h. Enable the Apply Message Filters before Dialup option. 5. Click Download to save and apply the new settings. The Transaction Manager window displays a list of messages confirming the changes. Caution: The Close button does not save or apply any changes. You must click Download before closing the dialog box to save and apply your changes. 6. Click Close to close the dialog box and return to the Port Parameters dialog box. Once the initial configuration is complete, the Controller can be remotely managed using the network.
3. 4. 5. 6. 7.
Click the RS485 port image. The Port Protocol Parameters dialog box opens for it. Click the Link Level tab. In the Protocol list select RTU dialup Protocol. Select the Modem Driver option. The modem driver parameters display. In the Port Priority list, select a priority for reporting. Generally, an Ethernet would be primary priority, with other ports used for back-up. There is also a dual reporting priority that reports alarms in parallel, using two communications channels. In the Modem Type list select CID/SIA over Serial Port. Set the Time between polls to modem field to 10. Select the Telephone Numbers option. In the Telephone Numbers region, in the Comms #1 list select either the Contact ID or SIA Format option and enter a dummy telephone number in the adjacent field. Note: If you select Contact ID for the Disaster #s setting, a copy of the alarms are saved to be transmitted over the primary communication port.
8. 9.
11. Click Download to save and apply the new settings. The Transaction Manager window displays a list of messages confirming the changes. Caution: The Close button does not save or apply any changes. You must click Download before closing the dialog box to save and apply your changes. 12. Click Close to exit the dialog box and return to the Port Parameters dialog box. Once the initial configuration is complete, the Controller can be remotely managed over the network.
4. 5. 6. 7. 8. 9.
Select the Port Parameters option. Click the RS485 port image. The Port Protocol Parameters dialog box opens for it. Click the Link Level tab, then from the Protocol list select HDLC/SDLC. The default parameters for the protocol display. Enable the Async mode option. The parameters for asynchronous operation display. Set them as required. Click the Application Level tab. In the Protocol list select HDLC/SDLC.
10. In the General Parameters region, enter the required message response time (default is 10 seconds) in the Response Time to a Message field. 11. In the Port Priority list select Primary Priority. 12. Click the Base Station tab. 13. Select the Linecard Addresses option. 14. In the Linecard A region, in the Line 1 list select SNA Luname and enter any value in the adjacent field. Note: Linecard address parameters reside at a network level. However, HDLC operation only requires an address at the link level. To be consistent with other protocol configurations the Controller requires an input of some type for HDLC in order to function correctly. 15. All parameters that display when the Parameters radio button is selected remain as default. 16. Click Download to save and apply the new settings. The Transaction Manager window displays a list of messages confirming the changes. Caution: The Close button does not save or apply any changes. You must click Download before closing the dialog box to save and apply your changes. 17. Click Close to close the dialog box and return to the Port Parameters dialog box. Once the initial configuration is complete, the Controller can be remotely managed over the network.
3. 4.
Ensure that the screen displayed is for protocol service 1. The Device Parameters region label will show 1/8. Use and to scroll through protocol services. Enable the Address Field Valid, Use TCP, Enable Event Reporting and Enable DTP Transfers options. These are required for successful communications and enables the automatic configuration of other protocol services. In the Encryption Type list select the encryption type being used for message verification. This encryption ensures that any messages that are altered will be identified as suspect and discarded. The EMCS and Controller must use the same encryption in order to be able to properly verify messages. Options are: Caution: Encryption settings for Controllers and EMCS must be identical. None - No encryption. HMAC - Uses a RFC 2104 compliant MD5 hash algorithm for all packet data and encrypts the result using the session key, which is known only to the Controller and protocol service. AES enc mac - For future use. Uses a FIPS 113 compliant AES algorithm for all packet data and encrypts the result using an AES 128 bit encrypted session key. This method is considered 'stronger' than HMAC. AES hash mac - For future use. Uses a MD5 algorithm for all packet data and encrypts the result using an AES encrypted session key. This method is considered slightly 'stronger' than HMAC. Note: The Enable Full Data Encryption option allows you to optionally encrypt the entire message data in addition to encrypted MAC verification.
5.
6. 7. 8. 9.
In the Physical Port list select the Controller port to use for the connection. For EMCS, this is generally an Ethernet port. In the Destination UDP/TCP Port field type the number of the port on the protocol service machine to connect using. In the IP Address field type the IP address of the protocol service machine. In the High Level Address field type in the telephone number for dialling in to the protocol service machine, if required.
Configuring Controllers - Technician Guide Note: Leave all other settings at their default values, the EMCS will configure and optimize all settings when it connects. 10. Click Download to load the settings into the Controller and close the dialog box. The Transaction Manager will show the download status. Note: If you click Close without downloading the settings, any changes will be lost. In order to confirm the connectivity of the Controller to the Pacom .is EMCS, check in Pacom .is if the Controller is available. For further details refer to Pacom .is documentation.
Parameter Baud rate No. of Data Bits Number of Stop Bits Parity
Description Asynchronous baud rate for connection (Speed of data transfer). Number of async data bits per byte. Number of stop bits used in byte (1 or 2). Parity is used to check the validity of data. An extra bit is added to the data to make the number odd or even. If the number received by the receiving port is not of the correct parity, the specified the data is rejected and must be sent again. None - Parity not used. Odd - Parity bit is set to 1 if byte is even to make it odd. Even - Parity bit is set to 1 if byte is odd to make it even. Space - Parity bit is always set to 1. Mark - Parity bit is always set to 0.
Size of receive message in multiples of 16 bytes. Range 1-255. The time to wait between characters before the buffer is closed and processed. Type of physical protocol to use (RS232, RS422, RS485, V36 etc.) This parameter only applies to the network pot which has a programmable communications chip. All other ports require changes to PCB link settings to change the physical layer protocol of the port. Sets the enveloping mode for the 68360 chips communications: RTS - Request To Send. CTS - Clear To Send. DCD - Data Carrier Detect.
Parameter Protocol Asynchronous Driver Poll Delay when offline Poll Delay during transitions Poll Delay when online Msg resp Timeout Time Receive Char Timeout Time No. of No Resps Till offline No. of invalid Resps Till offline Max NAKs before delete Msg Max Retrans before delete Msg Echo Timer No. of offline Polls to use SCC reset time when offline
Description Selects which communications protocol is used by this port. The system will not allow selection of a protocol that the selected port does not support. See Asynchronous Driver Parameters 45 . Time between re-polls when port is offline. Time between polls when port is online (but no response is received). Time between polls when port is online and receiving poll responses. The amount of time the port will wait for an acknowledgment to a transmitted message before it is timed out. The time period to wait for the entire message after receiving the start of the message. The number of polls with no response before the port is marked as offline. The number of polls without a valid response before the port is marked as offline. The number of times a message can be Not Acknowledged before it is deleted and discarded. The number of times a message has no response before it is deleted and discarded. Not used in the current version. The port will poll this many times then stop, until it receives a poll from the connected device. The time period to perform a background task of re-initializing the serial comms chip.
SNA Protocol
Link Level Parameters
Parameter Protocol Acync Mode Encoding Type HDLC/SDLC Address Receive Buff. Size Description Selects which communications protocol is used by this port. If this port does not support this protocol the system will not allow its selection. This flag enables this port to operate HDLC without synchronization. Selection will enable the Asynchronous HDLC Driver Parameters. Type of encoding (NRZ or NRZI). Link level address (in hex). Size of receive message in multiples of 16 bytes. This is the largest message
Configuring Controllers - Technician Guide Parameter Baud rate Physical Layer Protocol Operate in the 68360's Automatic enveloping mode Operating Mode Description that is expected to be received on the link, including Address Control and FCS. If the clock is supplied by a Controller, select the baud rate here. Type of physical protocol to use (RS232 etc.). Sets the enveloping mode for the 68360 chips communications. RTS-Request To Send CTS-Clear To Send DCD-Data Carrier Detect. Set the mode of operation. Options are: DCE Point to Point - Used for X25 LAPB operating as DCE mode. DTE Point to Point - Used for X25 LAPB operating as DTE mode. DCE Multidrop - Used for FEP SNA mode. DTE Multidrop - Used for SNA PU2.1. T1 Timer Low Byte The time the Controller will wait for a message from a Front End Processor (FEP). If the port is in active state and no message is received, the port will disconnect and enter a down state, and will require manual initialization. (Not implemented). Time between FEP/X25 Poll when operating in DCE mode. The number of times a message is sent without a response before the link level is considered to have failed. Window size for frames (module 8 is default). Enables module 8 sequencing. Used for DCE multidrop mode to poll offline devices. Time to reset SCC as a background check. ASCII line name. Block/ID number for XID frames.
T3 Timer Low Byte Time Between FEP/X25 Poll No response till link level fail Window Size Extended Sequence Numbering Num. Slow Poll SNRM cycles Time to Reset SCC Line Identifier Block Num for SNA
SFEP Protocol
The SFEP protocol displays the same parameters as the SNA protocol (see SNA Protocol 46 ).
X.25 Protocol
Link Level Parameters
The X.25 protocol displays the same Link Level parameters as the SNA protocol (see SNA Protocol 46 ).
UDP/IP on 1051/1052
Link Level Parameters
The UDP/IP on 1051/1052 protocol displays the same LAN MAC Level parameters as the UDP/IP on Ethernet protocol (see UDP/IP on Ethernet 27 ).
Driver Parameters
The UDP/IP on 1051/1052 protocol displays the same 1051/1052 Driver parameters as Link Level parameters as the Pacom Communications Protocol (PCP) (see Pacom Communications Protocol 46 ).
HDLC/SDLC Protocol
Link Level Parameters
The HDLC/SDLC protocol displays the same Link Level parameters as the SNA protocol (see SNA Protocol 46 ).
ASCII Protocol
Link Level Parameters
Parameter Protocol Asynchronous Driver Message forwarding time Message forwarding character SCC reset time when offline Enable forwarding data on Character Enable forwarding data on timer Description Selects which communications protocol is used by this port. If this port does not support this protocol the system will not allow its selection. See Asynchronous Driver Parameters 45 . Time to wait for no character before the message is transmitted. Character to look for to close buffer and transmit. Time to reset the SCC when no devices are online as a background check. Select to enable character for encoding. Select to enable timer for encoding.
Enable printer when network fail Filter access control messages Filter man number messages Filter RTU status Messages Filter internal alarms and resets. Filter external alarms and resets Use condensed message
Configuring Controllers - Technician Guide Parameter format Command supported Description message format. Sets the type of commands a Controller accepts.
UDP/IP on PPP
Link Level Parameters
Parameter Protocol Asynchronous Driver LCP ping/rsp timer LCP ping retry Time for Rx character SCC Reset time when offline Modem string to use Modem Type Force Download Modem string Enable LCP Echo Enable PAP Authentication Enable CHAP Authentication PAP User Name PAP Password Description Selects which communications protocol is used by this port. If this port does not support this protocol the system will not allow its selection. See Asynchronous Driver Parameters 45 . Link control protocol (LCP) ping timer. This is the timer used to send LCP ping requests to the router. Retry count of ping or LCP messages before LCP level re-initializes. Time to wait for link idle process receive message. Time to reset SCC as a background check, when LCP fails. 1,2 or default.1&2 are preset modem types. Can be changed simply by changing modem types. List of all modems supported. Select the type of modem used from the pull-down menu. To reduce the amount of data transmitted, modem strings are not downloaded, as they are not expected to change frequently and there is no need to send the strings if other parameters are changed. However, the modem strings are sent always if this option is selected. Enables LCP echo message to the router during no traffic periods to maintain link integrity. Select if Password Authentication Protocol (PAP) is used for authentication. Select if Challenge-Handshake Authentication Protocol (PAP) is used for authentication. Enter the user name required for authentication. Enter the password required for authentication.
Iris Protocol
Iris Protocol Parameters
Parameter Protocol Asynchronous Driver No of tries before offline Description Selects which communications protocol is used by this port. If this port does not support this protocol the system will not allow its selection. See Asynchronous Driver Parameters 45 . The number of times that this port will attempt to establish communications with the Iris reader before it is marked as offline.
Configuring Controllers - Technician Guide Parameter SCC reset time when offline Description The time period to perform a background task of re-initializing the serial communications chip.
IEC Protocol
Link Level Parameters
Parameter Protocol Asynchronous Driver Time to wait before panel offline Response Timer Max. NAKs before delete Time between idle polls Start address of camera on switcher Number of cameras on switcher Physical input on remote switcher physical output on local switcher Alarm directory size (x10) SSC Reset Time when Offline Pan/Tilt speed Enable Alarm Operation Description Selects which communications protocol is used by this port. If this port does not support this protocol the system will not allow its selection. See Asynchronous Driver Parameters 45 . The time of no response before the Controller marks the local switcher as offline. The time the local switcher has to respond to the Controller after a message is sent to it. Maximum number of NAK responses to a message before it is deleted from the queue. The amount of time waited while the line remains idle between polls. Address of the first camera attached to the local switcher. Number of cameras attached to the local switcher. Address of input on the remote switcher that is used by GMS if viewing video from within GMS. If no remote switcher is used, enter value as 0. Address of output of the local switcher. When set, the switcher will send data from a camera to the output to be viewed elsewhere. Size of the Alarm Directory that is used to store alarms sent to the local switcher. The regularity between checks to see if the port is still marked as online. If it is not, then the Serial Comms Chip for this port is reset. Set the pan/tilt speed of the cameras on the local switcher. When selected, alarms from the Alarm Directory are sent to the local switcher. The switcher can then carry out operations depending on its configuration.
Note: The local switcher is connected to the Controller. The remote switcher (if used) is connected to GMS.
Address of the Device SCC Reset Time When offline Enable Octal Addressing
VCS/Dialup Protocol
Link Level Parameters
For details regarding VCS/Dialup protocol parameters, see PSTN Dialup Parameters 34 .
Parameter Protocol Asynchronous driver Start of the device address range Poll all devices delay Poll cycles before offline
Description Selects which communications protocol is used by this port. If this port does not support this protocol the system will not allow its selection. See Asynchronous Driver Parameters 45 . Specifies the range of device addresses connected to this loop in multiples of 32. Time to poll devices. If set as Master/Slave, slave starts polling devices if it stops detecting polling from the master. Poll cycle retries before the device is marked as offline.
Configuring Controllers - Technician Guide Parameter Wait time for response Number of no response till offline. Transmit delay when not in Cont. Transmit delay when in Contention SCC reset time when offline Loop Operation Description Time to wait for a response to a message sent to a device. Number of retries to send message before the device is marked as offline. Number of characters/times to wait to send message when Tx is enabled and port is not in contention. Number of characters/times to wait to send message when Tx is enabled and port is in contention. Time to reset the SCC when no devices are online as a background check. None - Normal device loop operation Enable slave - Makes this port a slave ring port. Enable master - Makes this port a master ring port. This allows the device loop to be wired from the master ring port through all devices then to a slave ring port. Should the ring be broken, both master and slave ring ports will communicate with all devices still remaining on their section of loop.
IRISYS Driver
IRISYS Driver Parameters
Parameter Protocol Asynchronous driver Enable Status messages People counter logical number People counter area number Time between Polls Counter Description Selects which communications protocol is used by this port. If this port does not support this protocol the system will not allow its selection. See Asynchronous Driver Parameters 45 . This generates status messages when the counter changes. (Not implemented in this release.) The number that is reported in Online and Offline messages. (Not implemented in this release.) Time between consecutive polls by the Controller to a Controller Area Network (CAN) device. People Counter - The Controller will poll the counter devices connected and collect the data on how many counts have been detected. The counts are kept for seven days and have counts at 15 minute intervals. This allows a graph of counts vs time to be generated on a third-party device. The counts are reported to the Pacom Base Station, then reported on third-party Carrier ports, at around midnight, based on the Controller address. Evacuation Counter - Allows a third-party PC connected at the Base Station to send messages to the Controller and out to the People Counter to request directly the count of how many people are left. The value is sent then from the People Counter to the Controller and then back to the Base Station, then on to the PC using the Third Carrier Message Protocol.
Inovonics Protocol
An Inovonics device can be registered using GMS when no keypads are used in the setup. 1. 2. Open the Controller dialog box and select the required Controller (see Using the Controller Dialog Box 19 ). In the Controller dialog box select Commands > Inovonics. The Inovonics dialog box opens.
3. 4. 5.
Select the Register Transmitter option from the list. In the Input Number field enter the input number on the Inovonics device. Click Send. Watch the Transaction Manager to ensure an enrolment confirmation notification appears. The Transaction Manager example below shows Controller #25 registering transmitter on input number 204.
6.
To test Inovonics input, press Reset to send the input into alarm. Check that the Transaction Manager reports the alarm.
Inovonics Parameters
Parameter Protocol Asynchronous driver Supervision Window Description Selects which communications protocol is used by this port. If this port does not support this protocol the system will not allow its selection. See Asynchronous Driver Parameters 45 . This is the amount of time a transmitter has to report to the Controller before the Controller declares the transmitter offline. This should be the worst case check-in time as there are no individual timers. All transmitters may have different checkin times, so to avoid having any go offline, this time must be set to the value of the longest check-in time. This is the time between polls if no messages status messages are received from the receiver. Actual logical number that is reported in the Online and Offline messages to the
Configuring Controllers - Technician Guide Parameter SSC Reset Time Application ID Description GMS. Time to reset the SCC when no devices are online as a background check. The value of the application when using the FA400 receiver.
Modbus Protocol
Modbus Protocol Parameters
Parameter Protocol Asynchronous driver Transmission Mode Description Selects which communications protocol is used by this port. If this port does not support this protocol the system will not allow its selection. See Asynchronous Driver Parameters 45 . Two methods of transmission are available - Controller or ASCII transmission. Controller sends the data in 8-bit binary format, and ASCII sends the data in ASCII format, which is helpful for lines supporting 7-bit data transfer. Ensure that
Configuring Controllers - Technician Guide Parameter Bus Interface Mode Description the mode ends of the transmission line are identical. Modbus is a single-master/multi-slave poll-response system with the Controller always acting as a master. This is the default mode. Selecting Listen Mode prevents the Controller from sending polls, and instead relies on another master on the line to poll. This is how often each input is polled for data. If Listen Mode is selected, this field is disabled, as the Controller is not the Modbus bus master. Period for which the Controller will wait after issuing a Modbus request for the slave to reply before declaring a timeout
For more information on configuring the WAP modules, see Selecting Reader Types and Functionality 160 .
Selecting a Timezone
To configure the timezones, proceed as follows: 1. 2. Open the Controller dialog box and select the required Controller (see Using the Controller Dialog Box 19 ). In the Controller dialog box select Commands > Controller Commands > Set Controller Timezones. The Controller Timezone dialog box opens.
3. 4.
In the Select Timezone list select the local timezone that the Controller operates in. Click OK to apply the timezone and close the dialog box. The timezone setting is downloaded to the Controller. Note: The available timezones will depend on the timezones set up in the Controller. The Controller comes with a default selection, however, you can add or edit timezones as needed (see Editing and Adding Timezones 58 ). Note: You can also see the entire range of available timezones. To do this, in GMS select Tools > Timezones. The Configure Timezones dialog box opens, where you can see all available timezones. You cannot edit or add timezones in this dialog box.
2. 3. 4.
In the File Selection window, select RTU Time Zone Data and click OK. The GMS text editor opens with the 'RTU Time Zone Data' file loaded. Add or edit the timezones as required. Add a new timezone entries on new lines, with a new identifier. Click Save to save the file. Use the text editor controls to select another file, copy and paste, etc.
2.
In the TAPI Line list, select the modem (or other TAPI device) that is attached to the PC running GMS. Note: Only TAPI devices that have been registered with Windows and are functional with GMS are displayed. The TAPI device must support voice transmission. Note: For modems that require a password to establish full communications, you can delay when GMS attempts to use the connection in order to provide time for the password request to be received, displayed to the operator and responded to. Do this by entering a value (0 - 300 seconds) in the Password Delay field. This prevents GMS attempting to use the connection straight away and likely losing the call because either the password was never received correctly by the modem or GMS did not receive an appropriate response.
3. 4. 5. 1.
For modems, click Configure Line. The selected modem configuration options are displayed in a dialog box. Configure the modem according to the modem documentation. Click Use for Voice Line 1 to use the selected device for line 1 communication, or Use for Voice Line 2 for line 2 communications. Click Close. On the GMS main server, open the GMS32.INI file for editing (see Editing System Data Files) and add the following lines: [GMS TAPI] DialPrefix=xx Where xx is the dial prefix number.
If you need to use a prefix before dialling out through a PABX, you can use the GMS32.INI file to set it, as follows:
2. 3.
Parameter
Description
Note: The Settings for Port, Port Priority and Route to Port settings are provided as a convenience, where you can set multiple ports and priorities from the one dialog box. The other settings (shown below) are system wide settings and are not associated with any specific port. Settings for Port Port Priority Route to Port Select a port to apply the parameters to. Sets a port priority for the port selected in the Settings for Port list. Used for Controller message routing. Controller connection is set up between the port selected in Settings for Port and the port selected here. Select to apply the ID number offset (Offset field) to reader ID numbers. Select to apply the ID number offset (Offset field) to CCTV camera ID numbers. Enter the number (in multiples of 64) for the Controller (site) to report card reader or CCTV camera ID numbers as. This allows GMS to receive data from numerous Controllers (sites) and to use unique ID numbers for all of them. For example, if five sites are being monitored, set this field to 5. Thus, if CCTV camera 10 is reporting from the third site, it will report the ID as 138 (64 + 64 + 10). If the offset is not used, CCTV camera 10 will be reported as is and could be confused with which site it is associated with. The Holiday profile that the Controller will apply. Holiday profiles represent regions. You set up differing holiday profiles to represent regions in the system that have differing holidays. For example, in a multi-region installation where sites in one country (country A) do not observe a holiday that sites in another country (country B) do, you would have two holiday profiles - one for country A Controllers and one for country B Controllers. A Controller can accept a single holiday profile. Holiday profiles are applied from the Yearly Calendar (see Configuring GMS - Administrator Guide, Configuring Holidays in the Yearly Calendar). Capacity of the Controller backup battery. If more than one battery is used and connected in series, enter the capacity of one of the batteries. If connected in parallel, then enter the total combined capacity of all batteries. This affects Pacom Controllers 1057 and 1058. The Controller number that this Controller will report to if reporting to a disaster backup site using the disaster backup telephone number.
Battery AH Rating
Disaster Controller
Configuring Controllers - Technician Guide Parameter Number of Users Description Maximum number of card users (in thousands) for the Controller. If set to 0, which indicates no card access, the Linecard will not send any Card Access broadcast message to the Controller. Enter the RS485 address of a slave Pacom Witness. Note: This setting is used with Pacom Witness only when it is connected as a slave device.
Disable AC fail monitoring Disable DC supply monitoring Disable battery monitor Ignore Base Station Timesets
Used when the AC fail input on the Controller is not connected. Used when the external DC supply is not being used or does not require monitoring. When selected Controller batteries will not be monitored. Enable to prevent Controllers from accepting Base Station timesets (time references). This option is designed to be used in systems where an external time source is required for synchronizing Controllers, and not that of connected Base Stations. Disables the tamper alarm on the second DB9 RAP port of 1057 Controllers only. Same as Disable RAP port tamper (below). There is no effect on the 1058 as there is no second DB9 port. Pins 4 and 5 on the DB9 connector must be shorted at the remote end.
Disables the tamper alarm on the DB9 RAP port of the Controller. If not selected, pin 4 on the DB9 is monitored for a ground connection. If it is not terminated, a Main Unit Port Tamper message is generated. Pins 4 and 5 on the DB9 connector must be shorted at the remote end. Allows the Controller to activate a locally connected camera switcher so that video can be viewed at a remote monitoring station. Enable to include the date as part of the event message time stamp information to prevent any possibility of confusing when a message was actually generated. The time/date stamps for messages appear in the Transaction Manager and in reports. Note: In order to see dates in the Transaction Manager, it must be set to display them. To do this, select Options > Toggle Date Display.
Used to offset the Access Control reader numbers by 64 to make a reader number unique throughout the entire system. For example, if a 1 was entered, 64 would be added to all reader numbers when reporting to the monitoring system. If 2 was entered, 128 would be added to all numbers and so on. The maximum number of events (in thousands) that the Controller will store in memory. A separate queue is created that will store ONLY card access transactions. These are separate to all other alarms raised, and alarm messages are processed before card access messages. The number of events stored are shared by both queues, hence the size of both queues is half of the number of events. For example, if the number of events is 1000, then both the alarm and card access queues will be 500 events each. All available alarm types that can be classified as 'important' for are listed according to their basic category. Enable the checkbox next to each alarm type in order to classify it as 'important'. Note: The options may change depending on other dialog box settings. If Queue Non-important Alarms (see Dialup Base Station Parameters 33 ) is selected for network protocols, or if the Controller is on dialup, all nonimportant alarms are queued until an Important alarm is activated or when it dials in. When an Important alarm is activated, the Controller immediately contacts the Base Station to report all alarms. All External Alarms, Controller Restart and the Alarms selected here are Important Alarms.
Message Filters
Message filtering allows for various message types to be reported to a Pacom Base Station or a third-party receiver, so that not all messages are reported. This reduces message bandwidth consumption and stops unwanted messages. In addition to filtering messages, you can also select message encoding in either Contact ID or SIA format for
Configuring Controllers - Technician Guide compatibility with third-party monitoring systems (see Contact ID and SIA Event Codes 151 ).
Parameter Descriptions Table: Parameter Message Filters Description Select the message types that are to be reported to a Pacom Base Station, or a third-party receiver. Click a message type to select it. Clicking it again deselects it (that is, the message type is not reported). Click to select and report all available message types. Click to de-select all message types from being reported. That is, all message types are filtered. Number that is provided by the monitoring center to identify the Controller/site that is reporting. Select to report areas by their actual identification number. For example, area 1 is reported as area 1, area 2 is reported as area 2, and so on. If no selected areas are reported starting at 0, that is, area 1 is reported as area 0, area 2 is reported as area 1, and so on. When selected, the Controller reports supervisory messages as supervisory to the monitoring station. If not selected, supervisory messages are reported as standard messages. Enable so that the Controller will dial out and send alarm messages to a thirdparty monitoring station. Select to encode messages using the standard Contact ID format. Select to encode messages using the standard SIA format.
Report All Filter All Account Number Report true area number (1 as 1)
Supervisory Command
SNMP Parameters
A Controller can be setup to send messages to SNMP management servers on the network. Specific alarm messages can also be sent to the servers.
Description Enter the IP Address off the SNMP management server on the network that you want specific alarm messages sent to. Enter the IP Address off the second SNMP management server (if it exists) on the network that you want specific alarm messages sent to. Leave blank if there
Configuring Controllers - Technician Guide Parameter Community Name Message Text Description is only one SNMP server. Enter the community name that is set up on the SNMP server. Type in a message to use as part of messages to identify the Controller/site that the message has been sent from. For example, 'Controller No.1 in building 2'.
Parameter Password X
Note: When asked to enter a log on ID, enter the password number to use. For example, if Password 1 is used, enter log on ID as 1, and enter the password for Password 1.
Configuring an Alarm Panel Type and Setting the Number of Alarm User Types
The Controller dialog box contains an extensive list of panel types, including Pacom panels and third-party panels. By default all Pacom Controllers are defined as 'Pacom Standard', regardless of if it is an 8001, 1057, 1058, 1058A or Witness. Therefore, it is generally not necessary to set the alarm panel type for Pacom Controllers. To define a Pacom Controller alarm panel type, proceed as follows: 1. 2. Open the Controller dialog box and select the required Controller (see Using the Controller Dialog Box 19 ). In the Controller dialog box select General > Alarm Panel Type. The Set Remote Alarm Panel Type dialog box opens.
3.
In the RAP Types list select an alarm panel type. Note: Some third-party alarm panel types require additional set up procedures or hardware (see Configuring Third-Party Alarm Panels 70 ). For Pacom Alarm Panels: a. b. In the RAP Types list, select Pacom Standard for 1057/1058 Controllers or Pacom Enhanced for 8001 Controllers. In the Users region select 99 or 66. If 99 is selected, the maximum number of possible alarm users is 99 and the maximum PIN length for identifying them is four digits. If 66 is selected, the maximum number of possible alarm users is 66 and the maximum PIN length for identifying them is eight digits. For general operation, in the Custom Code list select Standard config. The options in the Custom Code list will automatically configure a number of Controller parameters according the requirements of the organization (for example, UK banks). The parameters that are configured remain editable, except for the SIA CP-01 config option (see Control Panel Standard Features for False Alarm Reduction (ANSI/SIA CP-01-200X) document 800 010 015). For example, the 1058 bank config option configures the following: Normal Hours 00:00 to 24:00. ATM and Cleaner Access Hours 00:00 to 24:00 with a duration of two hours. All other users are disabled and will not have access. Input 1 = Primary delay point (Perimeter) with output 1 to follow in Night mode. Input 2 = Secondary delay point (PIR) with output 1 to follow in Night mode. Input 3 = Raid (Holdup) Point with output 2 to follow in Day and Restricted mode. Input 4 = normal point with output 2 to follow in Day and Restricted mode. Input 5 = perimeter point with output 1 follow in Restricted, Night, ATM and Cleaner modes. Input 6 = Normal point with output 1 to follow in Night and ATM modes. Input 7 = Normal Point with output 1 to follow in Night and Cleaner modes. Input 8 = Normal Point 24 hours.
c.
4.
Click OK. A warning dialog box is displayed. Click Yes to proceed with the settings changes. To select another setting, click No. Note: Changing the alarm panel type defaults any configuration in the Controller (except for Port Settings) to default settings.
Once the alarm panel type has been changed, restart it before proceeding.
Configuring Controllers - Technician Guide differs from a single dialog box to multiple dialog boxes that you can access from the previous Controller Config Options dialog box (shown below).
This dialog box acts as the access point to the various available configuration options (instead of through the Controller dialog box). To access the various configuration screens, select the configuration type from the Options list, then click OK. The corresponding dialog box opens, as it would from selecting the same option using the menu system in the Controller dialog box for Pacom Controllers.
In a peer-to-peer network, the master Controller acts as the Transender, while all the other connected Controllers act as slaves. The Transender routes the slave Controller messages to third-party monitoring stations. The Transender (master Controller) will report its (Controller/site ID number) or account ID to the monitoring center for any slave Controller message. Using enhanced Transender configuration, slave Controllers can report their individual ID as part of the message (see Enhanced Transender Configuration 69 ).
2.
Configuring Controllers - Technician Guide b. Select the CPU Port A option, then click OK. 3. In the TransIT Options Menu dialog box: a. In the menu list select Port Parameters, then Click OK. The CCU Parameters/Errors dialog box for the TransIT opens.
b. Click the port image that the Transender is connected to. The CCU Port Parameters dialog box for the port opens. i. Click the Protocol tab. ii. In the Protocol list select Enhanced PCP. iii. In the Application list select Setup/Monitoring PC. iv. Click the Async Driver tab. v. In the Baud Rate list select 38400. vi. Click the Protocol tab, then click Download.
4. 5.
In the Master Controller region enable the Enable Transender and Send alarms to all ports options. Click Download.
3.
In the Message Filters list select the messages to report. Highlighted messages are reported. Note: Filters applied to the Transender will apply to all messages reported to it.
4.
In the Account Number field: For normal Transender operation, enter the Transender account number for identification by the third-party receiver. For enhanced Transender operation, enter the Controller account number for identification by the third-party receiver (see Enhanced Transender Configuration 69 ).
5.
Enable the Report true area number option to report areas by their actual identification number. For example, area 1 is reported as area 1, area 2 is reported as area 2, and so on. If no selected areas are reported starting at 0, that is, area 1 is reported as area 0, area 2 is reported as area 1, and so on. Select the Contact ID or SIA option to determine the message encoding required by the third-party receiver. Note: The message format must be consistent across all Controllers and the Transender.
6.
7.
Click Download.
If the Controller parameters are downloaded and the Controller dialog box shows the Controller status, communications are normal.
Aritech
Capabilities RS232 serial interface. Receives alarms. Receives trouble alarms. Supports up to 256 alarm points. Receives late-to-open/late-to-close data. Supports receiving duress alarms. Supports Day/Night/Engineering modes. Supports reporting AC fail. Supports reporting battery low/fail.
BT
Model Capabilities Redcare Interfaces directly with Pacom 1047 CCU. Receives alarms. Can isolate inputs. Receives trouble alarms. Supports up to 256 alarm points. Supports receiving duress alarms. Supports receiving output status data. Can control output points. Supports Day/Night modes. Supports Day/Night mode change commands.
Configuring Controllers - Technician Guide Supports reporting AC fail. Supports reporting battery low/fail.
Concept
Model Capabilities 3000 and 4000 Interfaces over a mezzanine modem card using frequency shift keying (FSK). Receives alarms. Can isolate inputs. Receives trouble alarms. Supports up to 256 alarm points. Supports receiving duress alarms. Can send active alarm points data. Supports receiving output status data. Can control output points. Supports Day/Night/Restricted/Program/Courier/Maintenance/Test/Remote Login modes. Supports Day/Night/Arm and Disarm sub-area mode change commands. Supports reporting AC fail. Supports reporting battery low/fail.
Diebold
Model Capabilities Presider Interfaces directly with Pacom 1047 CCU. Receives alarms. Can isolate inputs. Receives trouble alarms. Supports up to 64 alarm points. Supports receiving duress alarms. Can send active alarm points data. Supports receiving output status data. Can control output points. Supports Day/Night/Test modes. Supports Day/Night mode change commands. Supports reporting AC fail. Supports reporting battery low/fail. *Can send input point configuration data. *Can send firmware version data. *Supports programming system variables. *Supports programming alarm user PINs. Supports time synchronization from GMS (when comes online). Supports locking/unlocking readers. * Uses a separate software application.
DSC
Model Capabilities PowerSeries 832 using PC5401 data module RS232 serial interface. Receives alarms. Can isolate inputs. Receives trouble alarms. Receives late-to-open/late-to-close data. Supports receiving duress alarms. Supports receiving output status data. Supports Day/Night/Restricted modes. Supports mode change commands from GMS user-defined commands function. Supports reporting AC fail. Chapter 1 - Setting Up Controllers | 71
Configuring Controllers - Technician Guide Supports reporting battery low/fail. Can display messages on keypads. Can send input point configuration data. Supports programming system variables. Supports manual time synchronization from GMS.
Europlex
Model Capabilities 3GS V3 and 4 RS232 serial interface. Receives alarms. Can isolate inputs. Receives trouble alarms. Receives late-to-open/late-to-close data. Supports receiving duress alarms. Can send active alarm points data. Supports receiving output status data. Supports Day/Night/Restricted/Program/Courier/Maintenance/Test/Cleaner/ ATM/Engineer/Aux1/Aux2 modes. Supports mode change commands from GMS user-defined commands function. Supports reporting AC fail. Supports reporting battery low/fail. Can display messages on keypads. Supports open/close daily time scheduling (sent 3AM daily). Can send input point configuration data. Can send firmware version data. Supports programming system variables. Supports time synchronization from GMS (4AM daily). Supports locking/unlocking readers. Model Capabilities 3GS V5 RS232 serial interface. Receives alarms. Can isolate inputs. Receives trouble alarms. Receives late-to-open/late-to-close data. Supports receiving duress alarms. Can send active alarm points data. Supports receiving output status data. Supports Day/Night/Restricted/Program/Courier/Maintenance/Test/Cleaner/ ATM/Engineer/Aux1/Aux2 modes. Supports mode change commands from GMS user-defined commands function. Supports reporting battery low/fail data. Can display messages on keypads. Supports open/close daily time scheduling (sent 3AM daily). Can send input point configuration data. Can send firmware version data. Supports programming system variables. Supports programming alarm user PINs. Supports time synchronization from GMS (4AM daily). Supports locking/unlocking readers. Model Capabilities Aplex RS232 serial interface. Receives alarms. Can isolate inputs.
Configuring Controllers - Technician Guide Receives trouble alarms. Receives late-to-open/late-to-close data. Supports receiving duress alarms. Can send active alarm points data. Supports receiving output status data. Supports Day/Night/Restricted/Program/Courier/Maintenance/Test/Cleaner/ ATM/Engineer/Aux1/Aux2 modes. Supports Day/Night/Restricted/ATM/Courier/Sub-area mode change commands. Supports reporting AC fail. Supports reporting battery low/fail. Can display messages on keypads. Supports open/close daily time scheduling (sent 3AM daily). Can send input point configuration data. Can send firmware version data. Supports programming system variables. Supports programming alarm user PINs. Supports time synchronization from GMS (4AM daily).
Galaxy
Capabilities RS232 serial interface. Receives alarms. Can isolate inputs. Receives trouble alarms. Supports receiving output status data. Can control output points. Supports Day/Night/Restricted modes. Supports mode change commands from GMS user-defined commands function. Can display messages on keypads. Can send input point configuration data. Supports programming system variables. Supports programming alarm user PINs. For more information, see Configuring a Galaxy Interface 76 .
Hisec
Capabilities RS232 serial interface. Receives alarms. Can isolate inputs. Receives trouble alarms. Supports up to 256 alarm points. Supports receiving duress alarms. Supports receiving output status data. Can control output points Supports Day/Night modes. Supports Day/Night mode change commands. Supports reporting AC fail. Supports reporting battery low/fail. For more information, see Configuring a Hisec Interface 78 .
Tecom
Model Capabilities Challenger V5.9 (serial interface) RS232 serial interface. Receives alarms. Can isolate inputs. Receives trouble alarms.
Configuring Controllers - Technician Guide Supports up to 256 alarm points. Can send active alarm points data. Supports Day/Night/Restricted/Program/Courier/Maintenance/Test/Cleaner/ ATM modes. Supports Day/Night/Arm and Disarm sub-area mode change commands. Supports reporting battery low/fail. Model Capabilities Challenger V5.9 (subscriber terminal unit interface) STU (subscriber terminal unit) interface. Receives alarms. Receives trouble alarms. Supports up to 172 alarm points. Supports receiving duress alarms. Supports receiving output status data. Supports Day/Night/Restricted/Program/Courier/Maintenance/Test modes. Supports reporting battery low/fail. Supports reporting AC fail. Model Capabilities Challenger V6 STU (subscriber terminal unit) interface. Receives alarms. Receives trouble alarms. Supports up to 174 alarm points. Supports receiving duress alarms. Supports receiving output status data. Supports Day/Night/Restricted/Program/Courier/Maintenance/Test modes. Supports reporting battery low/fail. Supports AC fail. Model Capabilities Challenger V8 Interfaces over a mezzanine modem card using frequency shift keying (FSK). Receives alarms. Can isolate inputs. Receives trouble alarms. Supports up to 256 alarm points. Can send active alarm points data. Supports receiving duress alarms. Supports receiving output status data. Can control output points. Supports Day/Night/Restricted/Program/Courier/Maintenance/Test modes. Supports Day/Night/Arm and Disarm sub-area mode change commands. Supports reporting battery low/fail. Supports AC fail. Model Capabilities Challenger V8 (subscriber terminal unit interface) STU (subscriber terminal unit) interface. Receives alarms. Receives trouble alarms. Supports up to 238 alarm points. Supports receiving duress alarms. Supports receiving output status data. Supports Day/Night/Restricted/Program/Courier/Maintenance/Test modes. Supports reporting battery low/fail. Supports AC fail. For more information, see Configuring a Tecom Interface 79 .
Wiring Information
A Pacom 1050-204 mezzanine card is required for the Controller to communicate with the third-party Contact ID compatible panel. Install the mezzanine card on the Controller according to the installation instructions. Use a RJ12 cable with the following pin assignment to connect the two systems. Pacom PIN 3 4 Third-Party Panel Tip Ring
Configuring the Alarm Panel Type and Controller Port for Third-Party Contact ID Communications
To configure the alarm panel type and port parameters for Contact ID operation with a third-party alarm panel, proceed as follows: 1. 2. Open the Controller dialog box and select the required Controller (see Using the Controller Dialog Box 19 ). In the Controller dialog box select General > Alarm Panel Type. The Set Remote Alarm Panel Type dialog box opens.
3. 4. 5.
In the RAP Tyes list select CID-Dialler (Mezzanine). Click OK. A warning dialog box displays. Click OK to continue. The Controller restarts to apply the settings. In the Controller dialog box select General > Network > Port Settings. The Controller Port Parameters dialog box opens. This dialog box and the displayed ports vary depending on the type of Controller.
6. 7. 8. 9.
Enable the Port Parameters option. Click the image representing the port that the panel is connected to. The Port Protocol Parameters dialog box opens for the port. In the Protocol list select General Purpose Driver. In the Driver Type list select Dialer Interface.
10. In the Time between idle polls field enter a value according to the following rules. Values in the range of 1 127 is x100 milliseconds. 128 indicates termination on input for reporting online/offline messages. 129 indicates 1 hour check-in time one has to enter. Similarly, 130 indicates 2 hours check-in time, etc. 11. Click Download to save the settings to the Controller, then click Reboot. The Controller is now configured to receive communications from the third-party panel.
Wiring Information
You need to connect the Pacom Controller to the Galaxy panel using RS232. The Galaxy panel requires a DB25 connector and, depending on the attached Controller, a DB25 or DB9 connector, or hard wired to the Controller RS232 serial port. Note: Ensure that any Controller RS232/485 link settings for the port are set for RS232 operation. The cable requires the following pin connections: Controller DB25 Connector Controller Port Pin (DB25) 3 (Rx) 2 (Tx) 7 (GND) Controller DB9 Connector Controller Port Pin (DB9) 2 (Rx) 3 (Tx) 5 (GND) Galaxy Panel DB25 Connector Pin 2 (Tx) 3 (Rx) 7 (GND) Galaxy Panel DB25 Connector Pin 2 (Tx) 3 (Rx) 7 (GND)
Configuring the Alarm Panel Type and Controller Port for Galaxy Communications
To configure the alarm panel type and port parameters for operation with a Galaxy alarm panel, proceed as follows: 1. 2. 3. 4. Open the Controller dialog box and select the required Controller (see Using the Controller Dialog Box 19 ). In the Controller dialog box select General > Alarm Panel Type. The Set Remote Alarm Panel Type dialog box opens. In the RAP Type list select Galaxy Panel, then click OK. A warning dialog box is displayed. Click OK to continue. The Controller will restart to apply the new settings. In the Controller dialog box, select General > Network > Port Settings. The Controller Port Parameters dialog box opens. This dialog box and the displayed ports vary depending on the type of Controller.
5. 6. 7.
Enable the Port Parameters option. Click the image representing the port that the panel is connected to. The Port Protocol Parameters dialog box opens for the port. In the Protocol list select General Purpose Driver and make the following settings: a. Baud Rate: 38400. Note: The baud setting may vary according to the panel type. If the panel does not come online (indicated in the Transaction Manager), try other baud settings until communications are established. b. No. of Data Bits: 8. c. No. of Stop Bits: 1. d. Parity: None. e. Receive Buffer Size: 17. f. Maximum Idle Time: 10. g. Physical Layer Protocol: EIA RS232C. h. Time between idle polls: 2.
Configuring Controllers - Technician Guide i. SCC Reset Time when Offline: 5. 8. 9. In the Driver Type list select Galaxy Serial Interface. Click Download, then click Reboot.
The Controller is now configured to communicate with the Galaxy panel. The panel should come online, indicated by a Transaction Manager message:
2.
In the Options list select User IDs, then click OK. The Galaxy Panel Password Configuration dialog box opens.
3.
Select the user type option as required. Each user type has access to particular alarm panel functionality, for various purposes. The table below summarizes the available settings and limitations. Number 1 - 97 98 (fixed) 99 (fixed) 100 (fixed) N/A Name Alpha characters only (no numbers) up to six in total MGR (fixed) ENG (fixed) REMOTE (fixed) N/A Password Numerical characters only (no letters) between four and six digits in length
Wiring Information
You need to connect the Pacom Controller to the Hisec panel using RS232 cable connection and the Hisec GPI (General Purpose Interface) protocol.
Configuring the Alarm Panel Type and Controller Port for Hisec Communications
To configure the alarm panel type and port parameters for RS232 operation with a Hisec ThorGuard alarm panel, proceed as follows: 1. 2. Open the Controller dialog box and select the required Controller (see Using the Controller Dialog Box 19 ). In the Controller dialog box select General > Alarm Panel Type. The Set Remote Alarm Panel Type dialog box opens.
3. 4. 5. 6. 7. 8.
In the RAP Type list select Hisec ThorGuard. In the CU # field enter the Hisec panel number. In the Input Bank list select the range of inputs (in groups of 256) that are mapped to the Pacom Controller inputs. In the Output Bank list select the range of outputs (in groups of 64) that are mapped to the Pacom Controller outputs. Click OK. A warning dialog box is displayed. Click OK to continue. The Controller will restart to apply the new settings. In the Controller dialog box select General > Network > Port Settings. The Controller Port Parameters dialog box opens. This dialog box and the displayed ports vary depending on the type of Controller.
6. 7. 8. 9.
Enable the Port Parameters option. Click the image representing the port that the panel is connected to. The Port Protocol Parameters dialog box opens for the port. In the Protocol list select General Purpose Driver. In the Driver Type list select Hisec ThorGuard.
10. Click Download to save the settings to the Controller, then click Reboot. The Controller is now configured to receive communications from and send certain commands to the Hisec alarm panel.
Wiring Information
You need a Pacom 1050-202 mezzanine card for the Controller to communicate with the Tecom Challenger V8. Install the mezzanine card on the Controller according to the installation instructions. Use a standard RJ12 PSTN cable to connect the Tecom panel to the mezzanine card.
Configuring the Alarm Panel Type and Controller Port for Tecom Communications
To configure the alarm panel type and port parameters for operation with a Tecom Challenger alarm panel, proceed as follows: 1. 2. 3. 4. Open the Controller dialog box and select the required Controller (see Using the Controller Dialog Box 19 ). In the Controller dialog box select General > Alarm Panel Type. The Set Remote Alarm Panel Type dialog box opens. In the RAP Type list select Challenger-V8, then click OK. A warning dialog box is displayed. Click OK to continue. The Controller will restart to apply the new settings. In the Controller dialog box, select General > Network > Port Settings. The Controller Port Parameters dialog box opens. This dialog box and the displayed ports vary depending on the type of Controller.
5. 6. 7. 8. 9.
Enable the Port Parameters option. Click the image representing the port that the panel is connected to. The Port Protocol Parameters dialog box opens for the port. In the Protocol list select General Purpose Driver. In the Driver Type list select Challenger. Click Download, then click Reboot.
The Controller is now configured to receive communications from and send certain commands to the Tecom Challenger V8 panel.
Using GMS:
3. 4. 5.
In the Function Code field enter 46. In the Command Data field enter 4,0x81,0,0,0,0,0,0. Click Send.
The number of days remaining appears under the Controller serial number.
3. 4.
Click a numbered button at the top of the dialog box to select the 8303 to configure. Up to four 8303s can be monitored using a single Controller. Configure the parameters according to the following table. Click Download to send the configuration to the Controller. Description Enable to activate power monitoring and battery testing for the selected 8303. When disabled, the parameter controls are disabled. Note: 8303 devices are auto-detected by the system when the Controller is restarted and their device addresses are automatically assigned.
Enter the device address for the 8303. If the address is unknown, enable the Not Configured option and restart the Controller. The device address is automatically configured. The time of day to begin battery testing. Battery testing is performed daily. Click to display a list of time options. Click an option to select it. The period of time to run off the battery during testing. Battery testing is performed daily. Click to display a list of time options. Click an option to select it. If you select OFF, no battery testing is performed. Enter the ampere-hour (Ah) of the backup battery. This setting is used to calculate operating time when running off the battery. Entering 0 disable the Pre-warning time setting. Enter the anticipated current drain (in amperes) on the backup battery when running off it. This setting is used to calculate operating time when running off the battery. Entering 0 disables the Pre-warning time setting. Enter the time (in hours) before the battery will run out to generate an alarm. For example, if the backup battery is rated at 16Ah, and the current drain is 2A, the battery will last for eight hours. Setting the Pre-warning time to 2, will generate an alarm after the battery has been used continuously for six hours. Enable to charge the backup battery from the charger built into 1057 and 1058 Controllers. Enable to have the Transaction Manager report power monitoring alarms as though generated by the Controller and not specifically the attached 8303
Pre-warning time
Configuring Controllers - Technician Guide Parameter Battery Description device. Slide the bars to set the acceptable backup battery voltage range. The acceptable range is shown in green. If the voltage falls outside the range and into the red, an alarm is generated. Slide the bars to set the acceptable voltage range from the mains voltage to nominal 15V DC transformer. The acceptable range is shown in green. If the voltage falls outside the range and into the red, an alarm is generated. Slide the bars to set the acceptable 8303 internal temperature range. The acceptable range is shown in green. If the voltage falls outside the range and into the red, an alarm is generated.
Input Supply
Temperature
After the load test completes, result messages display in the Transaction Manager. You can also test power monitoring device backup batteries with a user-defined command (see Controller UserDefined Commands 86 ), as follows: 1. 2. 3. 4. 5. In GMS, select Hardware > User Defined Commands. The User Defined Commands dialog box opens. In the Element Type list select Controller. In the Element No. field type the ID number of the Controller(s) to accept the command. In the Function Code field type 21. In the Command Data field type 59, followed by a comma (',') and either 0, 1, 2, 3 or 255, where: 0 represents power monitoring device 1. 1 represents power monitoring device 2. 2 represents power monitoring device 3. 3 represents power monitoring device 4. 255 represents all power monitoring devices. For example, '59,2'. 6. Click Send. After the load test completes, result messages display in the Transaction Manager.
Battery Low or High Reset Battery Low or High High Temperature High Temperature Restored
Fuse Fail
Battery testing involves running the attached hardware devices from the backup battery for a specified period of time on a daily basis. During battery testing, the voltage is monitored, so that batteries that will require replacement can be identified before possible failure.
Configuring Controllers - Technician Guide 1. 2. Open the Controller dialog box and select the required Controller (see Using the Controller Dialog Box 19 ). Select Power Monitors from the list on the left-hand side. The power monitor status screen appears. If there are several 8303s being monitored, use the and buttons to switch between them.
2. 3.
Select the Set System Time option. Click OK. Check the Transaction Manager - it will show 'Reminder: Battery Test Fail' messages for each Controller where the test is not passed.
3. 4.
Create the command by entering the required values in the Function Code and Command Data fields. Type a command description in the Available Commands list, then click Save/Delete. To save the command, click Save from the confirmation context menu that appears. Open the Controller dialog box and select the required Controller (see Using the Controller Dialog Box 19 ). Select Commands > User Defined Commands > Available Commands, then select the command to run from the list that appears.
2.
In the Element Type list select the hardware type to be targeted by the command.
Configuring Controllers - Technician Guide 3. 4. In the Element No. field enter the ID number of the hardware to accept the command. Create the command by entering the required values in the Function Code and Command Data fields. To upload the data specified in the command to GMS memory, enable the Data Upload? option, then enter the function code required for the uploaded data in the Upload Function Code field. When the data is uploaded you can use the command to download the data into other hardware. For example, to copy the configuration of a Controller and download it into other Controllers. Enable the Hex Display option to display the returned data in hex format. The data appears within the User Defined Commands dialog box. 5. 1. 2. 3. Type a command description in the Available Commands list, then click Save. In GMS, select Hardware > User Defined Commands. The User Defined Command dialog box opens. In the Available Commands list select the saved command. Click Send. To run a saved user-defined command, proceed as follows:
blank page
Chapter
Managing Firmware
89
Configuring Controllers - Technician Guide Firmware is a term used to describe a program that resides between software and hardware. Generally, the program is embedded in some type of ROM (read-only memory) memory on a hardware product to control its operation. Firmware for Pacom Controllers is stored on EEPROM and can be updated using GMS. Firmware is downloaded into Controllers using GMS, either locally from a laptop connected using a diagnostic cable, or remotely from a monitoring workstation (if the Controller is online). Firmware can also be stored on TFTP (trivial file transfer protocol) servers. This process does not require you to load the firmware files into GMS first and can be a faster and more convenient way of managing firmware. Note: You can obtain the latest firmware from the Pacom website (www.pacom.com) in compressed format. Before you can load it into GMS, unzip the files to a folder on your system. This section contains information and procedures about obtaining firmware and downloading it to Pacom Controllers and devices, including: Checking Controller Firmware Version 91 . Downloading Firmware to Controllers 91 . Continuing Interrupted Downloads 92 . Running Firmware in Chip 1 or Chip 2 93 . Running the Latest Version Firmware 93 . Specifying the Active Chip 93 . Deleting Firmware Files. Downloading Firmware to 1064/1076/1068 Devices 94 .
3. 4. 5.
Enable Options and select Delete Firmware Files from the list below it. The Select File to Delete list displays. Select the file to delete, then click OK. The file is removed from the list and will no longer appear in the Select File to Download list. Click Exit to close the dialog box.
Controller Firmware
Controller firmware is stored in non-volatile flash memory chips. Some Controllers use two physical chips and some use a single chip divided into two virtual chips. In either case, operation is the same. Controllers operate using firmware stored on either chip. The chip that is not being used to operate the Controller is available to store updated firmware while it is being downloaded. This minimizes interruption to the system during firmware upgrades. Once the new version has been downloaded, use a Controller command to run the latest software version. The Controller automatically determines the newer version, or it can be commanded to run from a specific chip. Pacom Controllers are shipped with the latest firmware at the time of manufacture. However, it is always a good idea to check if for later versions at www.pacom.com.
3. 4. 5. 6. 7. 8.
Select Options, then select TFTP Download from the list below it. In the TFTP Server IP Address field enter the IP address of the server. In the Controller Port list select Ethernet. Optionally, in the File Name field type the name of the *.EPR file. If no entry is made, default filename values are applied according to the Controller type. Click OK. A Download Confirmation dialog displays. Click Yes to download the firmware, or No to return to the Firmware Commands dialog box. If Yes is clicked, the Download dialog box opens and the: The Controller EEPROM is erased. Chapter 2 - Managing Firmware | 91
Configuring Controllers - Technician Guide The firmware downloads. This can takes several minutes. When the download is complete, a status alarm generates, confirming a successful download. 9. Once the download completes, click Exit to close the dialog box (do not click OK). The Controller must be commanded to run the new software version (see Running Firmware in Chip 1 or Chip 2 93 ).
3. 4.
Select Options, then select Load Firmware Files from the list below it. Specify the location of the *.EPR and *.BTD files using one of the following methods: Type the entire path to the directory directly in to the Enter Source Dir field, or Click ... to browse for the files using the Browse for Folder dialog box.
5. 6. 7. 8. 9.
Once the file locations are specified, click OK. If the files are successfully located by GMS a confirmation message is displayed. Click OK to return to the Firmware Commands dialog box. In the Options list select Download Firmware. The Select File to Download list displays below the Options list. Select the required firmware version from the Select File to Download list. In the Target list select Controller, or 1064/1068/1076/8303 (for Card Reader Interface firmware downloads).
10. Click OK. A Download Confirmation dialog displays. Click Yes to download the firmware, or No to return to the Firmware Commands dialog box. 11. If Yes is clicked, the Download dialog box opens: The Controller EEPROM is erased. The firmware then downloads. This can takes approximately 20 to 30 minutes at 38400 baud. The firmware version number displays in the Download dialog box title bar. The Bank and Pointer No. information also displays. When the download is complete, a status alarm generates, confirming a successful download. 12. Once the download completes, click Exit to close the dialog box (do not click OK). The Controller must be commanded to run the new software version (see Running Firmware in Chip 1 or Chip 2 93 ). If a Card Reader Interface firmware version has been downloaded to the Controller do not click Exit, but continue as described in Downloading Firmware to 1064/1076/1068 Devices 94 . Caution: Once the download is complete, do not click OK in the Firmware Commands dialog box. Doing so restarts the download, erasing the previous data before the abort key can be pressed.
Configuring Controllers - Technician Guide Continue Download command. GMS automatically detects the bank and pointer values at which the operation failed and continues the download from that point. Note: This does not apply to TFTP downloads 91 , where a timeout or other download interruption has occurred. For TFTP download failures, the download must be tried again. To continue downloading a cancelled or erroneous download, proceed as follows: 1. 2. 3. In the Firmware Commands dialog box Options list, select Continue Download. The Select Process to Continue list displays. In the Select Process to Continue list select the process to continue, then click OK. The Download dialog box opens and the downloads continues from where it was previously stopped. Once the download completes, click Exit to close the dialog box (do not click OK). The Controller must be commanded to run the new software version (see Running Firmware in Chip 1 or Chip 2 93 ). Caution: Once the download is complete, do not click OK in the Firmware Commands dialog box. Doing so restarts the download, erasing the previous data before the abort key can be pressed.
Device Firmware
Pacom 1064 and 1076 Card Reader Interfaces (CRI) and 1068 I/O also support firmware upgrades. Note: For 1064 firmware upgrade capability, it must use a PIC18F252 chip and firmware version 4.07 or later.
Note: The Controller requires firmware version 5.00 or later for this feature to be available.
Error Messages
The error message 'Operation aborted' is displayed when the Controller cannot communicate with a device while performing a firmware download. The message is displayed if the device goes offline (for example, power failure), or there is no activity between the Controller and the device for 10 minutes. The error message 'Software version error' is displayed if the device firmware is corrupted. This may happen if the device goes offline (for example, power failure) during the download. On the next startup, the error message is displayed. The device will come online, but may not operate correctly. Download the device firmware again.
Chapter
95
Configuring Controllers - Technician Guide Remote alarm panel (RAP) configurations represents to the alarm system functions of a Controller. Alarm functions are different from access control functions. Access control involves identifying each individual user and authorizing or denying access, for example, securing areas, doors, or elevator floors. Commonly, the alarm system is generally deactivated when the first user enters the area and places the system into Day mode. Although the alarm system and the access control system closely interact, they are considered separate functions and are therefore configured separately. See the following topics: Configuring Alarm Users 97 . Configuring Keypads and Device Hardware 96 . Contact ID and SIA Event Codes 151 . Configuring Input Point Groups 114 . Configuring Alarm Areas 130 . Configuring General Alarm System Parameters 122 . Configuring Alarm System Flags 126 . Configuring Alarm Area Access 133 (operational hours). Creating Event Drivers and Macros 140 .
4.
Enter parameters for the user ID type as required according to the following table. Note: ATM Access, PIN Management, Test Mode, Allow Camera Management, Alarm Cancel, Chapter 3 - Configuring Hardware Devices and Alarm Functions | 97
Configuring Controllers - Technician Guide Isolate and Late Work options are available only to user Staff Type ID 1 to 4. Parameter User ID User Name User PIN ID Type ID Options Description Select a user ID type number by clicking the adjacent and clicking User ID. Enter the user name (max. 20 characters) Enter a 4 or 8 digit PIN. Select a user ID type is selected from the list. Some options change depending on the type you select. Click to open the Options for Staff ID dialog box, where you can apply a range of management functions to the user ID type. See User ID Options 98 . Note: This option is available only for Staff Type 1 - 4 user ID types. or , or by typing the number in
Allow Entry Outside Hours Can log On to All Areas Allow Access Control Allow Camera Management
Enable to allow users access to the building after the Late Work time setting (see Configuring Alarm Area Access 133 ). Enable to allow users to unset/set all assigned areas when unsetting their first area. Not used. Enable to allow users to access camera management functions from the keypad. Note: that this option applies to film cameras only, not CCTV cameras.
Enable to allow users to isolate points in alarm. Isolating a point effectively turns it off and stops any reporting or functionality.
5. Click OK to close the dialog box and download changes to the Controller.
4.
Enter parameters for the Staff Type ID user type as required according to the following table. Description Enable to allow staff members to log on to the area using an ATM user ID type to isolate ATM areas. Enable to allow staff members to change the PINs of all users through the keypad Management mode. Enable to allow staff members to activate Test mode. Tied to the Linked to setting in area configuration (see Configuring Alarm Areas 130 ). When the user logs on, if Can Log On to All Areas is disabled, then the only areas affected are the linked areas. Enable to allow staff members to cancel alarms using the cancel softkey from
Parameter ATM Access PIN Management Test Mode Single Area Log On
Alarm cancel
Configuring Controllers - Technician Guide Parameter Isolate Late Work Description the menu mode. Enable to allow staff members to isolate alarm points from the keypad Menu mode. Enable to allow staff members to select Late Work from the keypad to extend staff access from the Staff Exit time (default) to the Latest Staff Exit time (see Configuring Alarm Area Access 133 ). The premises is put in Night mode after this time. If Late Work is selected twice at the keypad, access is granted all night (24hrs). Enable to allow users to change the alarm system from Day mode to Restricted/ Night modes, or from Restricted/Night modes to Day mode. Click to enable all options for all areas. Click to enable all options for a single area. Click to disable all options for all areas. Click to disable all options for a single area.
Change Mode
Select All (large button) Select All (small button) Clear All (large button) Clear All (small button) 5.
Click OK to close the Options for Staff ID dialog box and save your changes.
Keypads
All keypads display on the left of the device map. Keypads do not count towards the 64 total I/O items. The areas controlled by keypads are represented as colored squares. By default, all Controllers are configured with two keypads: Pacom 1061. Pacom 1062. 100 | Chapter 3 - Configuring Hardware Devices and Alarm Functions
Configuring Controllers - Technician Guide Keypads that appear on the device map initially contain default parameters. This allows a keypad, that is set to default, to communicate with an offline Controller without requiring any configuration. The keypad is then used to configure the Controller to establish communications with a remote GMS terminal, from where further configuration is performed. For further information regarding initial configuration of a Controller using a keypad, Using a Keypad for Basic Configuration 15 .
Local Devices
Local devices display in center of the device map. These include inputs and outputs, and the Controller itself. Local devices are those that connect directly to the Controller PCB or to an expansion card mounted on the PCB.
Remote Devices
Remote devices display on the right of the device map. Remote devices are those that connect to the Controller RS485 device line. For example, 1065 16 I/O expansion modules, 1064 or 1076 reader interfaces, wireless inputs, etc. There is not a requirement for the input and output points to be wired consecutively, although wiring them consecutively does simplify the configuration. Extra entries must be added to the configuration for each group of consecutively wired inputs or outputs. A Controller has memory to store a maximum of 32 device entries (excluding keypads). This can become a limiting factor if this has not been taken into account when the system was designed and installed.
Adding Keypads
To add a Keypad to the device map, proceed as follows: 1. 2. Open the Controller dialog box and select the required Controller (see Using the Controller Dialog Box 19 ). Upload the current hardware and alarm parameter configuration (see Uploading Hardware Configuration and Associated Alarm Parameters 100 ). By default, all Controllers are configured with two keypads - a Pacom 1061 and Pacom 1062. If the required keypad(s) is displayed on screen, delete any keypads not required (see Deleting Devices 105 ). To add a keypad, right-click a blank area of the device map and select Add Keypad from the context menu. The Configuration (for Keypad) dialog box opens. The table below outlines the parameters available in the Configuration dialog box.
3.
Description Select the type of device that is to be configured from the list: Undefined - Not in use. Pacom 1028 (Main Keypad) - use a Pacom 1028 (obsolete). Pacom 1062 (Remote Keypad) - use a 1062 keypad without an LCD screen. Pacom 1061 (Main Keypad) - use a 1061 keypad with an LCD screen. Pacom 1061 (Remote Keypad) - use a 1061 keypad without an LCD screen. Mosler RSD - using a Mosler RSD keypad (obsolete). Pacom 1062 (Main Keypad ) - use a 1062 keypad with an LCD screen. Pacom 1061 (Queuing Type ) - use a 1062 keypad without an LCD screen.
Device Address
For local alarms and outputs leave as default (1). The next available device address is automatically shown. If the Controller has multiple device lines, each device line is allocated a range of 32 devices (1-32, 33-64, 65-96 or 97-128). A valid device address can be
Configuring Controllers - Technician Guide Parameter Description any number from 1-128. When entering the Device Address the highest address in the previous range must be added to the address that was programmed into the device, that is: For Address range 1-32, add 0. For Address range 33-64, add 32. For Address range 65-96, add 64. For Address range 97-128, add 96. For example, if a device is programmed with device address 3, and it is connected to a device line that has been allocated the 65-96 range of addresses, the Device Address should be entered as 67 (3 + 64). The device range and physical device address will appear in the shaded fields below the Device Address field. For Areas Select the areas that the keypad will control. Note: Pacom 8001 Controllers support up to 32 areas. Other Pacom Controllers support up to eight areas. Return to Idle Causes the keypad to switch to the first configured area after the Idle Time for Display setting has expired (see Configuring General Alarm System Parameters 122 ). Enable to allow valid user card swipes to unlock the keypad. This feature allows valid users to access keypad functionality without having to use a PIN (see Configuring Card Activated Keypad Access 117 ). Appears in place of the Return to Idle setting for keypads that do not do not have a LCD screen. A specific LED will flash when an alarm occurs in a particular area. Disables the keypad during the hours set for Day mode operation. This also allows the welcome message to be displayed (if configured). Pacom keypads have eight LEDs. Each LED represents an area that the keypad controls. The keypad LEDs show users which areas are in Day mode (green), Night mode (amber) or flash red (alarm during Night mode). For Pacom 8001 Controllers that support up to 32 areas, you can define which LEDs represent areas from nine onwards (see Setting Keypad Area Mapping 102 ).
2. 3.
Enable the checkbox for each area to be represented by the selected LED. In the example above, LED 1 will represent areas 1, 9 and 17. Click OK.
Now if, for example, the alarm system is in Night mode (amber color LEDs) and area 9 goes into alarm, LED 1 will flash red.
Configuring Controllers - Technician Guide following parameters in the Reader tab: Set the Reader Type to be Pacom 1061 Type or Pacom 1062 CRI Type as required. Note: For 1061 keypads, which do not have a built-in RF antenna, a reader is required to be attached to it. Set the Reader Category to Enrolment reader. The keypad displays 'RENEW PIN SWIPE CARD'. 2. Once the keypad has been set up as an enrolment reader, activate the PIN validity function and define the number of days that a user PIN is valid for. On the enrolment reader keypad: a. b. c. d. e. f. g. h. Press the MENU key. The display shows '[ENROL MENU] 1. PIN enrolment'. Press the ENT key. The display shows 'Enable PIN Enrol'. Press the 1 key to activate the function (press 0 to deactivate it). Press ENT. Press MENU twice. The display shows '[ENROL MENU] 2. Set PIN Expiry'. Press ENT. The display shows 'Set PIN Expiry'. Enter the number of days (1 to 90) for PIN validity. Press ENT.
Caution: Access to the PIN enrolment menus on the keypad is not secure as it does not require a log on.
Adding Devices
To add a device to the device map, proceed as follows: 1. 2. 3. Open the Controller dialog box and select the required Controller (see Using the Controller Dialog Box 19 ). Upload the current hardware and alarm parameter configuration (see Uploading Hardware Configuration and Associated Alarm Parameters 100 ). To add a device, right-click a blank area of the device map and select Add Device from the context menu. The Configuration (for Device) dialog box opens. The table below outlines the parameters available in the Configuration dialog box.
Description Select the type of device that is to be configured. For device type descriptions see the Device Types table 104 . For local alarms and outputs leave as default (1). The next available device address is automatically shown. If the Controller has multiple device lines each device line is allocated a range of 32 devices (1-32, 33-64, 65-96 or 97-128). A valid device address can be any number from 1-128. When entering the Device Address the highest address in the previous range must be added to the address that was programmed into the device, that is: For Address range 1-32, add 0. For Address range 33-64, add 32. For Address range 65-96, add 64. For Address range 97-128, add 96. For example, if a device is programmed with device address 3, and it is connected to a device line that has been allocated the 65-96 range of addresses, the Device Address should be entered as 67 (3 + 64). The device range and physical device address will appear in the shaded fields below the Device Address field.
Port Number
This appears only when 3rd Party Device is selected in Device Type - the Device Address setting will change to Port Number. Select the port that the third-party device is connected to. Is the point at which the input/output devices are physically wired to the boards (For example, 1st point is wired to the IN 6 Input on Witness). Defines the device hardware to the Controller. The different device types on each device must usually be added separately. Exception: Witness inputs and CCTV Cameras. Options are:
Configuring Controllers - Technician Guide Parameter Description Input - Defines the device as providing input signals. Output - Defines the device as providing output signals. Film Camera - Defines the device specifically as a film camera controller. CCTV Camera - Defines the device specifically as a CCTV camera. Analog Input - Defines the device as providing analog input signals. Pulse Counter - Defines the device as providing input signals for a pulse counter. Report Point Start Address: No. of Report Points 4. Is the number of the first device wired, as it is recognized by the system. For example, call the first device on the PCB input No 17. The remaining points are numbered sequentially starting from this number. The number of physically wired inputs, outputs or CCTV cameras on the device. For example, 7 devices connected (devices must be wired consecutively).
Select the appropriate device type from the Device Type list. See the table below for device type options for 8001, 1057 and 1058 Controllers. Description Pacom 1050-004, 16 Input Mezzanine card mounted on the Controller PCB - this device appears in the center column. Note: For 8001 Controllers, the Point Type setting can be Input or Analog Input.
Pacom 1050-003, 8 Output Mezzanine card mounted on the Controller PCB - this device appears in the center column. Pacom Remote I/O expansion card. This card has been superseded by the Pacom 1065. Camera controller with four inputs. To program a set of sequentially programmed Inovonics transmitters. Add 1 to the IDM and IDL programmed into the first transmitter and enter them as the IDM and IDL. Enter the number of transmitters used in the Number of Report Points setting. The wireless inputs are numbered in the system sequentially, starting from the Report Point Start Address setting. Once configured, Inovonics inputs are treated like any other input and can be used to trigger alarms, outputs, macros, etc (see Configuring Inovonics Devices 120 ). Third-party device with up to 256 inputs. For example, a Digital Video Recorder (DVR). Pacom 40 character x 2-line, 1061 LCD keypad. Use this device type to configure a Pacom 1065 16I/O card. It has 16 onboard inputs and 4 onboard outputs. The 1065 also has two mezzanine card slots which can accommodate any combination of the 16 input and 8 output cards. Inputs and outputs must be added to the configuration in separate entries, however, onboard points, and points connected to mezzanine cards are combined and added in a single entry. Input and output points must be wired consecutively from the Start Point No. on Device setting. If the No. of Report Points setting exceeds the number available on the PCB, the system will assume that an expansion card has been installed. See Device Configuration Parameters 103 .
Use this device type for input points connected directly to the onboard inputs of the 1065A, 1058, 1058A or Witness. Use this device type for output points connected directly to the onboard outputs of 1065A, 1058, 1058A or Witness Controllers, plus up to eight CCTV cameras which can be triggered for recording to the Witness hard drive or display on its local monitor output. Use this device type to configure any spare input or outputs on a Pacom 1064 that is being used as a Card Reader Interface (CRI). Use this device type to configure the inputs or outputs on a Pacom 1064 that is being used in I/O mode (6 inputs and 4 outputs). Use this device type to configure the inputs or outputs on an Iris I/O panel. Pacom 16-character x 2-line LCD keypad. Use this device type to configure a Pacom Witness CCTV recording and management device. Pacom 1067 or 1076 dual card reader interface. Use this device type to configure spare inputs or output on a Pacom 1067 or 1076.
PACOM 1064 (CRI) PACOM 1064 I/O IRIS Panel PACOM 1062 Pacom Witness PACOM 1067/1076
Configuring Controllers - Technician Guide Device Type PACOM 1068 I/O Chubb I/O Card Pacom 1074 Dialler/ Leased Line Unit Pacom Vault Controller PACOM 1076 I/O onSafe DVR I/O 5. Description Use this device type to configure a Pacom 1068 intelligent end of line card (2 inputs and 1 output). Not used at present. Use this device type to configure up to 4 inputs and 1 output on a Pacom 1074. Use this device type to configure a Pacom vault controller device. Use this device type to configure the inputs or outputs on a Pacom 1076 I/O (8 inputs and 4 outputs). Use this device type to configure the inputs or outputs on an OnSafe DVR I/O (see Configuring DVRs in GMS Guide).
Assign an address to the selected device. It should be noted that when you select from the Device Type list, GMS automatically enters an address in the Device Address field. However, the address can be specified by the operator. Enter the start point number. The start point is the first physical point on the device where an input or output is wired. Specify the Point Type setting. The options in the Point Type list vary depending on the type of device being configured. In the Report Point Start Address field, enter a logical address for the first physical point on the device. This is the address the system uses to identify the point. For example, if a start point address of 4 is entered, and the number 1 is entered for the report point start number, the system will see point number 1 on the device, as point 4. In the No. of Report Points field, enter the number of points used. For example, if all input points on a Pacom 1065 are to be used, the number entered would be 16. Furthermore, if a Pacom 1050 mezzanine expansion module, with 16 input points, is added to the 1065, and all points on the module were required, the number of report points would be 32. Because a 1065 has only 16 input points, when the number of report points specified exceeds 16, GMS intuitively assumes a 1050 expansion module is present.
6. 7. 8.
9.
10. Click OK to complete the procedure. The Configuration dialog box closes and the new device displays on the device map. Note: For devices that have both input and output points (for example, 1064 I/O), you can use both point types. To do this, you need to add the device twice, using the same device address, however, assign one instance with an input Point Type setting and the other with an output Point Type setting.
Deleting Devices
To delete a device from the device map, proceed as follows: Note: Any device, except the Controller, can be deleted. 1. 2. 3. Open the Controller dialog box and select the required Controller (see Using the Controller Dialog Box 19 ). Upload the current hardware and alarm parameter configuration (see Uploading Hardware Configuration and Associated Alarm Parameters 100 ). Right-click the device you want to remove and select Delete Device from the context menu. A prompt will confirm if you want to delete the device.
Description The point number of the selected output. Select an appropriate vocab description for the output type. For information regarding I/O point vocabs and customizing them, see Configuring Point Description Vocabs 116 . Use to cycle through configured outputs. These are information only fields (greyed out). They detail the device type, its address and the point number that the output is connected to.
Select an appropriate description for each output from the Vocab list, clicking Next to select the next output. Click OK to close the dialog box when you have configured all outputs.
6. 7.
Description The number of the input as it is recognized in the system. Specify the required input number and click Input No.. Specify the area number to assign the point to (see Configuring Alarm Areas 130 ). Note: The number of areas available depends on the Controller type.
Input Vocab
Select Standard to use a description from the in-built list or User Defined for six definable descriptions. For information regarding I/O point vocabs and customizing them (see Configuring Point Description Vocabs 116 ). Selects whether or not the point transmits an alarm to the monitoring system. Selects whether or not the point transmits trouble (open and short circuit) conditions. Trouble conditions can only be reported if the input point has been terminated with a pair of input resistors. Sets when the point is active and when you require the zone to transmit an alarm. Selecting the required mode isolates the point during that mode. Instant alarm when active. First point on entry. Starts primary time delay (entry timer) to allow access to the keypad. Walk through point send a full alarm if activated before the primary delay point (normal). These points are active in day mode only. This flag is also tied to the Pending Delay Count and False Alarm Timeout settings (see Configuring Alarm Areas 130 ). Select when the point requires testing. This feature is used to test devices such as PIRs during normal office hours. When this flag is set, the alarm point is expected to be triggered at least once during Day mode as staff conduct their normal business activities. If the alarm point has not been triggered at all during the test period the point is marked as being faulty. This function is used to test points that have a self test facility, such as seismic detectors which use a small vibrator to test the sensor. The output used to activate the self test facility for the sensor is specified in the Output No. field. Self test of these points can be selected on entry/exit of different modes. The output is automatically activated on entry to test mode. The point has to be triggered on the set test day. The test day is set to: Monday 1, Tuesday 2, Wednesday 3, Thursday 4, Friday 5. Lists various categories to classify activity from the point. In cases of reporting to third-party receivers using Contact ID or SIA formats, these options can make messages more specific. Options are: Normal Alarm - For all other devices that do not fit any of the following categories. Tamper/24 Hr - For all tamper points or points that are live 24 hr/day (sonalert). PIR Point - For all PIRs other than entry route devices. PIR Perimeter Point - For all PIRs on the entry/exit route. Follows Anti False Alarm setup. Perimeter Point - For all entry/exit points. Environment Point - This point classification passes through the point incident without causing the panel to activate. Final Set Point - For devices such as push button sets. Chapter 3 - Configuring Hardware Devices and Alarm Functions | 109
Notify Alarms Report Trouble Alarms as Normal Point Isolated During No delay Primary Delay Secondary Delay Pending Delay
Self Test
Configuring Controllers - Technician Guide Parameter Description Alarm Cancel Point - This point classification is used to reset alarm points (alternative to the keypad). Vault Point - For all vault protection except vibration. These points may require group isolation (these are used in association with a Vault Area) only. Vibration Point - For all vibration points that may require group isolation. Shunt Point - This selects this point as a shunting point. If selected the point shunts the next point numerically. Upon activation, that is, using a shunt lock, a message is transmitted to the control room as alarm point (x). Where x is the point being shunted when the shunt is restored, then the restore signal is transmitted. Lockset/Unset Point - This point, if selected, sets and un-sets the corresponding area. No primary delay points are required and all points within that area should be of no delay (instant). If the area has a restricted area as well as a full day mode, on un-setting the system it will go to restricted mode and require the user to un-set to full day mode. Fire Point - These points cannot be isolated. They also enable a set of subcategories. These sub-categories allow the selection of further types of fire alarms to report as follows: No Special Sub-category. Pre-Fire Point. Fire Fault Point. Test Key Point. Fire test will generate an alarm entry to the fire test mode, and will trigger a test period (set in System General Parameters 60 ). Any normal fire alarms are inhibited while in test mode. Other types are transmitted. Raid Point - Not be isolated, and will remain active at all times, including Engineering mode. Day Delay Alarm - These points follow the delay rule, whereby if the point resets within a prescribed period of time, no alarm is transmitted. If the point stays in alarm past the programmed time, then it transmits an alarm condition. This flag is also linked to the Sonalert On Day Delay flag which can set the maximum number of actuations of the day delay alarm before an alarm is sent during a one day period (see Adding Devices 103 ). Alarm Confirmation - Attached to the Pending Alarms setting. Activation of this point by-passes the Pending Alarm Count and False Alarm Count settings. Latched Point Point Category 2 The input has to be restored before another activation can be transmitted. This is only removed after a user resets the point. Available if Contact ID or SIA are set up in the dialup (Modem or Mezzanine) port parameters 34 . The options in the list depend on the configuration of the port priority port and if Assign CID/SIA Event Type is selected in the Advanced Input Configuration dialog box (see Advanced Input Configuration Parameters 111 ). If either port is configured to use Contact ID or SIA, then the menu appears. If both ports are configured, then the settings of the Secondary Priority port are used. Select the Contact ID/SIA alarm type that will be sent to the monitoring centre when this point is in alarm. The options vary depending upon the Point Category setting, and the alarm type (Contact ID or SIA). Copies all attributes of the alarm point entered in the adjacent field to the current alarm point. Opens the Advanced Input Configuration dialog box for more alarm point options.
In the Advanced Input Configuration dialog box, enter the required parameters (see Advanced Input Configuration Parameters 111 ).
Description Report all alarms during Day mode from this point to a locally connected GMS machine. Alarms will also be reported to the GMS machine connected to the master Controller in a peer-to-peer configuration (see the Peer-to-Peer Configuration Guide). Report all alarms during Night mode from this point to a locally connected GMS machine. Alarms will also be reported to the GMS machine connected to the master Controller in a peer-to-peer configuration (see the Peer-to-Peer Configuration Guide). (Not implemented in this release). Report all messages from the selected point while the point remains inactive/ isolated. Alarms are reported to a Pacom Base Station or a third-party receiver as supervisory messages. Ensure that Supervisory Mode is enabled in the Message Filters 61 dialog box. When the Controller is in Test mode, the alarm messages will still be reported. This will reverse the logic of the input. Normal state is treated as alarm state and vice-versa. That is, 10K is alarm, and 5K or 20K are normal. Enable the input to utilise the Abort Window Time setting (see Configuring General Alarm System Parameters 122 ). The input must be active for the time selected before an alarm is generated. Assign a CID/SIA Event Type for this point. The Event Type can be set from the Input Configuration dialog box. Note: In order to do this the port must be set up for reporting events in either SIA or Contact ID formats. See Contact ID and SIA Event Codes. 151
Delay Backup Reporting Report Change while Inactive Report Alarm in Supervisory Mode Report Input During Test Mode Inverse Polarity for the Alarm Point Enable Abort Window Held in Time Assign CID/SIA Event Type
Enable Groups 9.
In the Input Point Configuration dialog box, click Outputs to configure the output activations for each input. The Output Activations for Input dialog box opens.
10. In the Activate During region, select the appropriate modes in which the alarm output is activated. 11. To activate an output, select it from the Select an output or camera... list and the click Add Activation. The output and its vocab is added to the Activate list and the Activation Duration dialog box for the selected output opens. Activation Lists When you use the input configuration dialog boxes to set up output activations for various inputs, GMS records the Chapter 3 - Configuring Hardware Devices and Alarm Functions | 111
Configuring Controllers - Technician Guide settings as you make them in what are known as 'activation lists'. These lists are based on the Point Isolated during and Activate During mode settings and are available to other inputs with the same settings. Activation list entries are available from the Programmed Activations region of the Output Activations for Input dialog box. For example, an input that is active in Restricted mode and activates a range of outputs when it is triggered becomes available to other inputs that are also active in restricted mode. This makes making common activation settings for different input points easier. The following table outlines the parameters available in the Output Activations for Input dialog box. Parameter Activate During Activate Description Select which alarm system mode the output is active for. List outputs that are activated when this input is tripped. These selections are made from the Select an... list below. To edit or delete and activation, select it here first. Located below the Activate field. Lists all configured outputs. Once an output is selected, click Add Activation. The output is added to the Activate field. When you add an activation the Activation Duration dialog box opens. Displays the Activation Duration dialog box for the output selected in the Activate list. Removes the selected output from the Activate list. This allows actuation of the outputs in the active list to be used when the delay count is reached. Used in conjunction with the Pending Delay Count setting in Area configuration (during unset). In Area configuration, set Preliminary Delay Count = 2. This means after two activations of any alarm with the Pending Delay option enabled (set in the Input Configuration dialog box) an alarm is sent immediately. If there is only one activation of this type, then the false alarm timeout begins and no alarm is sent until this time expires (this only occurs in Day mode). This timeout allows the operator time to cancel the alarm. When configuring outputs, specify in the Delay Count field the count of Delay Points Active to trigger the listed outputs. Programmed Activations Delete All Lists Delete List Previous List Next List Browse Select List the output activation settings that have previously been applied to other inputs. Clears all entries in all current activation lists. Clears all entries in the current activation list. That is, for inputs that share the current Point Isolated during setting. Click to load the last available activation list. Click to load the next available activation list. Click to view the activation lists applicable to the input. Click to add the contents of the Programmed Activations list to the Activate list.
The table below outlines the parameters in the Activation Duration dialog box. Parameter Follow Input Latched Time Duration Activation time in Min. Hold-On Delay Enabled Hold-Off Delay Enabled Capture Pre and Post Alarm Video Set Video to Local Playback Port Write Video to disk Description The output follows the input (on and off with the alarm). The output changes state until manually reset or a mode change occurs. Enables the Duration time setting. The output changes state for the set time when activated. The number of seconds (or minutes if the Activation time in min. option is enabled) that the output is activated for. Enable for the Duration setting to be in minutes instead of seconds. The output follows the area parameter for Hold on delay . The output follows the area parameter for Hold off delay . Only available for CCTV Camera Activations. Selection of this flag will enable the capture of video before and after the event. The amount of video captured that occurred prior to the alarm activation is configurable. Only available for CCTV Camera Activations. Will display the video from this channel on the local video out port when the input is activated. Select to have any video captured by this activation saved to the Witness hard disk drive.
12. Select the appropriate parameters for the output activation duration (see Activation Duration Parameters 112 ). 13. Click OK to close the Activation Duration dialog box and return to the Outputs Activations for Input dialog box. 14. When you have configured all outputs for the selected input, click OK to save all settings and close the Output Activations for Input dialog box and return to the Configuration for Input dialog box.
Configuring Controllers - Technician Guide 15. When you have configured all inputs, click OK to save all settings and close the dialog box. 16. Click Close to exit the PCB graphic dialog box. 17. When you have configured all devices, close the Controller dialog box. A prompt to download the hardware parameters is displayed. Click Yes to download the settings to the Controller and complete the input point configuration procedure. The Transaction Manager confirms the download.
Note: If the No Delay option is enabled for the point, the area the input point group belongs to will apply its False Alarm Timeout setting to it. 7. 8. In the Point Group Number field enter the number that represents the main group category for the input point (for example, a vault). In the Point Subgroup Number field enter the number that represents the subgroup of the Point Group Number setting (for example, subgroups to a bank vault may be vibration sensors, motion detectors, door contacts, etc).
Configuring Controllers - Technician Guide If an input point group consists of one input point only, an alarm from that point gives a full-transmitted alarm. If an input point group consists of several input points, an alarm lasting more than eight seconds, from any input point within the group, generates a full-transmitted alarm. If an input point group consists of several input points, an alarm lasting less than eight seconds, from any of the points within the point group, generates a pending alarm. An alarm from a point during the Alarm Confirm Time from the same point group, will generate a fulltransmitted alarm for that point. The following conditions apply to isolating input points in subgroups: If a sub-group consists of one point only, that point cannot be isolated locally (that is, from a keypad). If a sub-group consists of more than one point, only one of the points in the sub-group can be isolated locally (that is, from a keypad).
In Transaction Manager select Options > Edit Message Files. The Edit System Files dialog box opens.
d. Click OK to save changes and close the Configuration for Keypad dialog box. 2. Add a reader (see Configuring Readers 159 ) with the following parameters: a. Set the device address to 1 in the Device Address field. b. In the Reader tab, Reader Interface list select Pacom 1061 Type.
c. Click OK to save changes and close the Configuration for Reader dialog box. 3. Configure an alarm user ID type with mode change permission for the area(s) that the keypad can control (see Configuring Alarm Users 97 ) with the following parameters: a. In the ID Type list select either Staff Type 1 ID, Staff Type 2 ID, Staff Type 3 ID or Staff Type 4 ID. b. Enable the checkbox for each area(s) that the keypad can control. c. Enable the Change Mode option for the area(s).
d. Click OK to save changes and close the Configuration for User ID dialog box. 4. Configure the cardholders that will have mode change access (see Using GMS - Operator Guide, Creating New Cardholders) with the following parameters: a. In the Card Details tab, User Type list select same alarm user ID type defined in step 3.
b. In the Access Level tab, Selected Reader Access list, ensure that the cardholder has access to the reader defined in step 2.
c. Save, then download that cardholder details to the Controller. Repeat this process for each cardholder.
2. 3.
In the Port# field, enter the port address to use for communications. The default port for Pacom devices is '3435' and '2800'. In the Protocol list select Invonics and in the adjacent list select UDP. Note: You can use either UDP or TCP. UDP is faster because it does not require acknowledgement, however, may be less reliable than TCP.
4. 5. 6. 7. 8.
In the Local Port list select (1) Ethernet. In the IP Address field, enter the IP address of the Inovonics receiver. In the Logical Device Number field enter the logical device ID number for the receiver. For example, if it is the second receiver, enter 2. In the Supervise Time field enter the time that the Controller will wait for a response from the device before marking it as offline. Click Download to save the settings to the Controller, then click Close.
When the Inovonics receiver comes online to the Controller, a corresponding message is displayed in the Transaction Manager.
2. 3. 4.
a. Select Program Transmitter from the list. b. In the Transmitter Option field enter the hex code for the options. The bit codes for options are: 0..2 - Check-in interval. 120 | Chapter 3 - Configuring Hardware Devices and Alarm Functions
Configuring Controllers - Technician Guide 3 and 4 - Unused. 5 - Internal contact. 6 - Normally open. 7 - End of line (EOL) resistor. c. In the Transmitter Address field enter the hex code for the device address for the transmitter. The value represents: IDM - System ID number. IDL - Transmitter ID number. d. Click Send and perform the required action on the transmitter (see Inovonics documentation). For EchoStream Transmitters:
a. Select Register Transmitter from the list. b. In the Input Number field enter the device address (input number) for the transmitter. c. Click Send and perform the required action on the transmitter (see Inovonics documentation).
Description The time (in minutes) to allow systems users to complete Test mode. A warning on the keypad occurs 60 seconds before expiry. A timeout alarm is sent if this time expires and the area returns to Day mode. The time (in minutes) to allow users with Out of Hours access to gain access to areas after the Latest Staff Exit Time setting and before the earliest Staff Entry setting (see Configuring Area Access 133 ). If set to 255 allows unlimited access. If set to 0 then no access is allowed. The time (in minutes) to allow the remote central station to give access to ATM mode when commanding ATM mode. The time (in minutes) to allow a remote central station to give a user entry into any other mode. The time (in minutes) before the set area exit time that the system sonalerts the keypad to warn the user that the area(s) require to be set within. This time (in minutes) used for all areas to define when after the Day Start time (see Configuring Area Access 133 ) the system expects the area to be unset by. This timer is also used to select when Auto Lockout comes into effect. Day lockout prevents users from accessing Day mode after the timer expires if Day mode not entered before day start and open warning timers expire. To enable this, set the Open Warning Time to a non-zero value and enable the Warning Messages option. If the Day Start time is '0' (zero), then Auto Lockout is disabled. The time (in minutes) allowed for the user to re-enter the premises to retrieve a bag etc after the system is set. The period of time that this activates is between the Staff Exit Time and Latest Staff Exit Time settings. This is also the time that is extended to for late working, when selected from the menu mode on the keypad (see the Pacom 1061 or 1062 manual). If set to
Duration for Remote ATM Mode Duration for Remote R/A Mode Display Exit Message before Exit Open Warning Time
Briefcase window
Configuring Controllers - Technician Guide Parameter/Option Areas to Use Briefcase Window Keypad Parameters Normal Inactivity Time-out The length of time (in minutes and seconds) that the keypad waits before sending keyboard inactivity time-out alarm, if a user accesses the system and leaves the keypad without either logging off or completing the process that they started. The length of time (in minutes and seconds) to replace the Normal Inactivity Time-out setting with if the system is in Test mode or the system has any unsealed points that require a longer period of time to attend. The length of time (in minutes) to use if the system is using its own camera controllers to allow film counting. The length of time (in seconds) that the systems keypad locks out a after multiple PIN entry attempts. The length of time (in seconds) that the keyboard takes between displaying different items, that is, when viewing alarms. The number of tries that the user has to correctly enter their PIN code. After this number of tries the system keypad locks the user out for the length of time entered in the Multiple PIN Attempt Time-out setting. The length of time (in seconds) that the keypad takes before reverting back to displaying area one (if more than one area is being used) and displaying the welcome message (if configured). This also requires the Return to Idle option being enabled (for keypad configuration information, see the Pacom Keypad Manual). The length of time (in minutes) to allow for a point to remain in alarm before it is automatically isolated and a message is sent to the monitoring center notifying of the isolation. If the point is restored, the timer continues counting down and, if another point goes into alarm within this time period, then both alarms are reported immediately. The following conditions should be met: System in Night mode. Be a PIR, PIR Perimeter, Perimeter, Vibration or Vault point category. The Enable Night Delay system option is enabled. The area in which the point is defined is selected in the Alarm Confirm Areas setting. Alarm Confirm Output Alarm Confirm Areas Ambush Areas Abort Window Time This will activate when an alarm is confirmed, that is, two alarms are activated during the Confirm Time. Enable the checkbox for the areas to use the Alarm Confirm Time function. Enable the checkbox for the areas to use the Ambush Timer function. The length of time (in seconds) to allow for a triggered input that has been configured to utilise the abort window to be disarmed before an alarm is generated. The number of weekdays that pass between device test days. For example, to set the test period to one week, set the number of test cycles to 5. Note: Testing cannot be performed on Saturday or Sunday. Current Test Day The weekday number that the system uses, in conjunction with the Device Test Cycle Days setting, to set the present day. Monday = 1, Tuesday = 2, Wednesday = 3, Thursday = 4, Friday = 5. Note: Ensure that whatever day you are commissioning the system that this number corresponds to that day. This number will change every 24 Hrs. Note: Testing cannot be performed on Saturday or Sunday. Self Test Output ON Time Self Test Output OFF Time The length of time (in seconds) that the self-test output changes state for. The length of time (in seconds) to apply after the Self Test Output ON Time setting to allow tested devices to restore. The system expects that a normal test of the device will produce an alarm but that the device should restore by a certain time after being triggered. If the device does not restore before this Description 255 it allows unlimited access. Enable the checkbox for the areas to use the Briefcase window setting.
Extended Inactivity Time-out Multiple PIN Attempt Timeout Message Scroll Speed No of PIN Attempts before Fail Idle Time For Display
Configuring Controllers - Technician Guide Parameter/Option Entry/Exit Delay 2 Beeper Description timer has expired then the device is judged to have failed the self test. The beep repetition frequency of the secondary entry/exit time beeper. The number set is the period of the beep repetition in 0.1 sec increments. The frequency of this beeper should be set faster than the Delay Timer 1, which is one beep/sec, therefore the number set here should be less than 10 (10 x 0.1 = 1 sec) (5 or less recommended) (see Entry Delay 2 131 or Exit Delay 2 131 ). The length of time (in seconds) associated with the Anti-False Alarm settings that is added to the Exit Time setting to allow Perimeter or PIR Perimeter points time to settle and restore after an exit. If the Enable Local Isolation option is enabled and a point is still in alarm after the Exit Time and Anti-False Timer have expired, then the point(s) are automatically isolated and a corresponding message is sent to the monitoring center. If the Enable Local Isolation option is disabled and a point is still in alarm after the Exit Time and Anti-False Timer have expired, then a full alarm is sent to the monitoring center. Ambush Timer The length of time (in minutes) that the user has to un-set the system and press the ENT key on the 1061/1062 keypad before an ambush signal is sent to the monitoring center. Set to 0 to disable the timer. The length of time (in seconds) to allow for the lock to fully set. This time should be kept as low as possible and can be judged if the site has a sticking lock or ill-fitting door. Note: Any effort to start the entry cycle before the timer expires is ignored by the system. Final Set Debounce Time No of ATMs Accessed Suspect Device Activation Counter Day Delay Alarm Time As per Lock-set Debounce Time, but for the final set button. The number of areas that can be put into ATM mode at the same time. The number of times (0 - 127) over a 30 second period that if an input activates, it is reported as faulty and is automatically isolated. The length of time (in minutes or seconds) that applies to any Day Delay category point to allow before the system starts the sonalert and transmits an alarm to the monitoring center. Selection of Sec or Min changes the time value between seconds and minutes. The number of Day Delay category point alarm actions allowed in a one day period (set to 0 for timer only operation). If the count is reached, then the alarm is sent without delay. Enable to cause sonalert on keypads with the area displayed where the day delay alarm has been triggered after the Day Delay Alarm Timer expires. Enable to bypass the Day Delay Alarm Timer and activate the sonalert immediately. Note: This option becomes available only after the Enable Sonalert for Day Delay Points option is enabled. Reset Activation Latch by User Welcome Message Staff Help Message on Exit Enable to have the system reset the latched alarm count back to zero whenever a user logs on and changes the alarm system mode. The text that keypads will show after a normal inactivity time-out. The text that keypads display when the user has a fault and requires a prompt to inform them of the procedure to follow. For example, providing a help contact telephone number. Additional text to the Staff Help Message on Exit setting. For example, a contact name. The length of time (in minutes) that ATM personnel must wait after specifying their code before being allowed to enter an ATM. The maximum number of points that can be isolated from a keypad. If the number is set to 0 (zero), then any number of points can be isolated. Note: Points isolated from GMS do contribute to this number, however, isolations from GMS are possible when this setting is exceeded. Message Log Size Supervision Window [Inovonics FA400] The maximum number of messages that can be viewed on a keypad. The length of time (in minutes) that an Inovonics transmitter has to report to the Controller before it is marked as offline. This should be the worst case check-in time as there are no individual timers. All transmitters may have
Anti-False Timer
Contact
Configuring Controllers - Technician Guide Parameter/Option Description different check-in times, so to avoid having any go offline, this time must be set to the value of the longest check-in time. Inovonics Application ID The ID of the Inovonics receiver connected to the Pacom 1068 device. This ID is stored in the 1068, and only messages from the device with the specified ID are accepted. Enable for GMS to report and display all invalid user ID/PIN combinations entered into a keypad. If no user ID is entered (PIN only entry, see Configuring Alarm System Flags 126 ) GMS reports the user ID as 256. Enable for power alarm messages to display when viewing alarms from a keypad. Enable for alarm messages to display on keypads without requiring a user ID/ PIN to log on to the keypad first. Enable so that if an area has one or more outstanding alarms it cannot be manually or automatically set. Enable so that a staff type user must log on before an engineer can log on. The engineer must enter their user ID and/or PIN within the Normal Inactivity Timeout setting. If the timer expires and the system has not entered engineering mode, the staff type user must log on again. Enable so that Staff Type ID 1 - 4 alarm users can change their PIN at a keypad. If the user has access to more than one Controller (site), GMS updates all relevant Controllers with the user's new PIN. Note: Only the original PIN owner can change their PIN. Note: For added security, it is possible to have the system force users to change their PIN after a set period of time, using an enrolment reader (see Setting Mandatory User PIN Changing with 1061/1062 Keypads 102 ). Do not show status on keypads when idle Extended Late Work on area 1 only Enable so that when idle, 1061 and 1062 keypads will not show the status of areas. Enable so that the Extended Late Work option (if enabled) applies to area 1 only. Note: Areas linked to area 1 will not inherit this setting. 4. Click OK to download the parameters to the Controller and complete the general alarm system settings. The Transaction Manager confirms the download.
Enable PIN Code Error Reporting Enable scrolling of power alarms Enable scrolling of alarms without logon Prevent Set/Autoset when area is in alarm Engineer requires staff to log on first
Flag Enable Local Isolation Enable Local De-isolation Enable Forced Exit
Description Enable to allow users to isolate points locally. Enable for the system to automatically de-isolate any isolated points when entering Day mode. Enable for the system to automatically log off any users from keypads when the system is entering Night mode. If users are still in the building, they must log on again and select an appropriate alarm system mode. Enable so that after the Open Warning Time (see Configuring General Alarm System Parameters 122 ) expires, the system automatically locks all areas in the current mode (Night/Restricted Access) and prevents local users putting the system into Day mode. The local user will have to contact the monitoring center to take the system to Day mode. Enable to display any abnormal state of system power supplies on keypads during exit. Enable to display any abnormal state of system communications on keypads during exit. Enable to display any alarm activations for an area that occurred during the alarm armed period on keypads when the area is being disarmed. Enable for the system to apply the Exit Delay timer (see Configuring Alarm Areas 130 ) to any partial areas when users are exiting from Day mode. When the exit delay beeper starts, a pending message displays in the Transaction Manager indicating that the Controller is waiting for the timer to expire. Partial areas refer to areas that can have mode settings independent of other areas within the system. Enable for the system to allow partial areas to remain in their current mode when a user changes the mode of an area. Partial areas refer to areas that can have mode settings independent of other areas within the system. Enable so that all states of an input are reported as an alarm. Enable to make all Raid category points live in Engineering and Test modes. Enable for GMS to report any pending (conditional) alarms. If disabled, the pending alarm still occurs, but is not reported. The conditions for pending alarms (number of alarm counts and the time period that they must occur
Enable AC/Battery Low Display on Exit Enable Comms Display on Exit Enable Night Alarm Display on Entry Enable Exit Delay in Day for Partials
Enable Partial during Mode Exit Always Report Open/Short Circuits Raid Alarm in Engineering Mode Enable Pending Alarms
Configuring Controllers - Technician Guide Flag Description within) before reporting takes place is set in the area configuration (see Configuring Alarm Areas 130 ). Disable AREA Soft-key Option Enable IGNORE Soft-key for Unsealed Points Late Work for Linked Areas Enable Extended Late Work Enable CCTV Output Enable Sub-areas Enable to prevent area soft-key options being displayed on keypads. Enable to display an 'Ignore' soft-key option on keypads to allow users to be able to accept unsealed points at keypads on setting the alarm system. Enable for the system to apply the late work setting to all linked areas when a user sets the displayed area to late work. Enable to allow users to extend late work to all day (24 hours). Enable to allow Controller outputs 33 to 48 to report as CCTV type outputs. Enable for the system to support sub-areas. A sub-area is an area that resides within another area for the purposes of supporting a different configuration and different reporting. For example, an office with a safe that is located within an existing area configuration. Enable to force the function keys below the keypad LCD to function in the same way as the DAY and NIGHT keypad keys. Enable to force all areas to follow area 1 (the master area) in/out of Night mode, regardless of the mode the other areas are in. Enable to allow pending alarm operation in Night mode. There are two instances of this: Enabling this flag, with the input point configured for Pending Delay, forces the point to use pending operation in both Day and Night modes (see Enable Pending Alarms 126 ). If the input point is not set for pending operation and its category is either PIR, Perimeter, Perimeter PIR, Vault or Vibration and it goes into alarm it delays reporting for eight seconds to allow the alarm to be cleared. If it doesn't clear in eight seconds then a real alarm is reported. After being triggered, if there is another night alarm from a similar input point within the next 30 minutes, then it is sent immediately. After 30 minutes, the system returns to a normal state, and allows delay before sending. Disable Outputs for Trouble Alarms Enable to prevent any output linkages (that is, output points that are switched by an input point) being triggered when an input point goes into alarm from a trouble condition (either open, short or trouble). If the alarm is normal (genuine), then output linkages activate as configured. Enable to force the system not to check for points that have not seen movement during the day, if they are sealed. This is linked to the input Self Test while Inactive option (see Configuring Device Input Points 108 ), where points are monitored for activity during the day, and a report is sent when going to Night mode if there has been no activity from the device. This could mean that it is faulty. If the keypad used when exiting has links to other areas that are in Night mode, the system will not check for points set to Self Test While Inactive in the areas already in Night mode. Enable for the system to display the physical zone number on the keypad when displaying the vocab (point description) as additional information. This occurs whenever the display scrolls for unsealed points etc. Enable to force keypads to switch the display automatically to any areas that have warnings or alarms (for example, 'STAFF EXIT NOW') and sonalert. If there are multiple areas with warnings, the keypad switches between them. For example, if the keypad is displaying area 1, and there is an alarm or warning on area 2, the keypad will display area 2 and begin sonalert. Enable so that alarm messages are not reported when activating outputs that have not been assigned a vocab, that is, outputs assigned 'Null Vocab' (default). Enable to allow tamper alarms to be latched when they occur. That is, they can only be cancelled from a keypad or GMS. Enable to allow tamper alarms to be reported even after they have been latched. That is, if the tamper switch is latched (needs to be manually restored to be reset) it will still report tamper switch activity before being restored. Enable to perform the self test upon exit of Day mode. Enable to perform the self test upon entry to Day mode. Enable to perform the self test upon entry to Test mode. Enable to perform the self test on the camera system upon entry to Day mode.
Soft-keys to follow DAY/ NIGHT keys Enable Master Area Enable Night Delay
Do not report outputs with null vocab Latch Tamper Alarms Report Tampers when point is latched
Test on Exit from Day Test on Entry to Day Test on Entry to Test Mode Test Cameras on Entry to Day
Configuring Controllers - Technician Guide Flag Enable Combined ID and PIN Entry Enable PIN Entry Only Enable PIN Entry when Exiting Enable Random Rejection of PIN Description Enable for the system to prompt users for a single entry code that combines the user ID number and PIN. For example, if an ID is 8 and a PIN is 1234, then the user only has to enter '81234' for access. Enable for the system to prompt users for their PIN only for access. User ID numbers are not required. Enable for the system to prompt users for their PIN when exiting. Enable so that when adding a user in MGMT mode using a keypad, the Controller will randomly reject the PIN, and will require the user to enter another PIN. Note: This setting applies only when adding a user with a keypad.
Enable to send a duress alarm if a user enters a PIN containing three consecutive ascending digits. For example, a duress alarm is sent if PIN is 7456. Users can enter a duress PIN when he/she is threatened or when unusual circumstances exist and they wish to secretly alert security. After entering a duress PIN access is granted and operation appears normal to an observer, however, a duress alarm is sent to the monitoring station. When adding users to the system, it automatically checks to ensure that a user does not select an unacceptable duress PIN. For example, if Duress with 3 Ascending Digits is enabled, a user cannot have a PIN similar to 1238.
Enable to send a duress alarm if a user enters a PIN containing three consecutive descending digits. For example, a duress alarm is sent if a PIN is 8762. Users can enter a duress PIN when he/she is threatened or when unusual circumstances exist and they wish to secretly alert security. After entering a duress PIN access is granted and operation appears normal to an observer, however, a duress alarm is sent to the monitoring station. When adding users to the system, it automatically checks to ensure that a user does not select an unacceptable duress PIN. For example, if Duress with 3 Ascending Digits is enabled, a user cannot have a PIN similar to 1238.
Enable to send a duress alarm if a user enters a PIN containing three of the same digits consecutively. For example, a duress alarm is sent if a PIN is 7771. Users can enter a duress PIN when he/she is threatened or when unusual circumstances exist and they wish to secretly alert security. After entering a duress PIN access is granted and operation appears normal to an observer, however, a duress alarm is sent to the monitoring station. When adding users to the system, it automatically checks to ensure that a user does not select an unacceptable duress PIN. For example, if Duress with 3 Ascending Digits is enabled, a user cannot have a PIN similar to 1238.
Enable to send a duress alarm when the Enable PIN Entry Only option is enabled by the user entering a PIN incremented by one (1). For example, if the normal PIN is 9623, then the duress PIN is 9624. Note: In this case system administrators must ensure that user ID PINs are not consecutive. Users can enter a duress PIN when he/she is threatened or when unusual circumstances exist and they wish to secretly alert security. After entering a duress PIN access is granted and operation appears normal to an observer, however, a duress alarm is sent to the monitoring station. When adding users to the system, it automatically checks to ensure that a user does not select an unacceptable duress PIN. For example, if Duress with 3 Ascending Digits is enabled, a user cannot have a PIN similar to 1238.
Enable to send a duress alarm if a user enters a PIN containing a specific digit as the last digit. For example, a duress alarm is sent if a PIN is 1659, where 9 is set as the specific digit. Enter the duress digit in the adjacent field. Users can enter a duress PIN when he/she is threatened or when unusual circumstances exist and they wish to secretly alert security. After entering a duress PIN access is granted and operation appears normal to an observer, however, a duress alarm is sent to the monitoring station. When adding users to the system, it automatically checks to ensure that a user does not select an unacceptable duress PIN. For example, if Duress with 3
Configuring Controllers - Technician Guide Flag Ask Duress Description Ascending Digits is enabled, a user cannot have a PIN similar to 1238. Enable for the system to prompt the user for confirmation after entering a valid duress code. Enable so that keypads sonalert if any tamper conditions are encountered during Day (unset) mode only. Enable so that keypads sonalert if any Environment category input point is activated during Day (unset) mode only. Enable so that keypads sonalert if any points tested during Test mode are still active when they scroll across the display. Enable so that keypads sonalert with a series of short beeps as any unsealed points scroll across the display. Enable so that the system automatically activates the following outputs as mode and alarm indicators: Output 57 - Activated when the system is in Night mode. Output 58 - Activated when any point is in alarm. Output 59 - Activated when any point is isolated. Output 60 - Activated when the system is in Restricted Access mode. Output 61 - Activated when the system is in Test mode. Output 62 - Activated when there is a power (AC/battery) alarm. Output 63 - Activated when there is a duress alarm. Output 64 - Activated when there is a comms alarm. Output 56 to Follow AC & Battery OK Disable Voltage Switching for Alarms Enables output 56 to activate following a passed AC power and backup battery check. Enable for the system to remove voltage switching from inputs and look for a 7 or 12 volts DC voltage input. Use the 12V or 7V options to determine the required voltage. Note: This setting is for Asia only. CP-01 Enabled Indicates whether or not the Controller has been configured to operate within CP-01 standards of operation. CP-01 is generally a number of parameters that are designed to minimize false alarms. This is selected with the alarm panel type (see Configuring Alarm Panel Types 64 ). Select a vocab file from the list to determine the list of descriptions available ( Input Vocabs) when configuring inputs (see Configuring Input Points 108 ). Select a language for display on the keypads from the list. There is hard-coded translation in the Controller for all keypad messages. The languages available are: English. Chinese. Swedish. German. Hebrew. French. Spanish. You can also create alarm vocab files and downloaded to the Controller (using vocab file 5 to 16). 4. Click OK to download the parameters to the Controller. The Transaction Manager confirms the download.
Enable Sonalert for Tampers Enable Sonalert for Environmental Points Enable Sonalert during Test Mode Enable Sonalert during Scroll Output 57 - 64 to Follow Graphics Status
Language
4.
Enable the Report on this Area option to activate the area parameter controls and set them according to the following table. Description Enables the area to be processing by the system. No parameters can be specified unless this option is selected. The system will not report or process any function unless at least one area is configured with the Report on this Area option enabled. For programming consecutive areas, click Next Area - the current area number displays in the dialog box title bar. To return to Area 1, cycle the Next Area button through the remaining areas.
Forces the system to report only during Restricted Access and Night modes only (see Configuring Area Access 133 ). Changes the format of the Normal and Temporary Hours, allowing a vault time window. All points that are defined as vault type in alarm configuration category are inhibited between the vault start and vault end times. If enabled, Normal and Temporary hours are used (see Configuring Area Access 133 ). Alarms are reported only to local ports and not to the Base Station using the network. Enable the checkbox next to each area to be linked. If areas are linked, when securing the area the user is prompted to close any linked areas, provided they have authorization (see Configuring Alarm User Types 97 ). The time allowed for the user to enter the premises and deactivate the alarm system from the keypad using their PIN. The timer is activated when the user is detected entering the premises. If Enable Beeper On Entry is selected the keypad emits a slow beep until the timer has expired, at which time it will
Configuring Controllers - Technician Guide Parameter Entry Delay 2 Description activate the Entry Delay 2 timer. This timer is activated when the Entry Delay 1 timer expires. During this time the keypad will beep at a faster rate than for Entry Delay 1. This indicates that an alarm is about to be sent and to give the user an increased sense of urgency. The beep repetition frequency is controlled using system Entry/Exit Delay 2 Beeper setting (see Configuring Alarm System Flags 126 ). Entry delay applies only to input points that have the Primary Delay or Pending Delay option selected (see Configuring Device Input Points 108 ). Exit Delay 1 Exit delay is the time allowed for the user to leave the premises after they have armed the alarm system. The Exit Delay 1 timer is activated when the user enables Night mode from the keypad. If the Enable Beeper On Exit option is enabled the keypad emits a slow beep until the timer has expired at which time it will activate Exit Delay 2 . This delay timer is activated when the Exit Delay 1 timer expires. During this time the keypad will beep at a faster rate than for Exit Delay 1. This is to indicate that the system is about to be armed and to give the user an increased sense of urgency. The frequency of this beep is controlled by the Entry/Exit Delay Beeper 2 setting (see Configuring Alarm System Flags 126 ). If a final set point (see Configuring Device Input Points 108 ) point is activated, all exit delays are immediately terminated and the system will change to Night mode . Enter the time (minutes and seconds) for any linked output points to be delayed from activating. Enter the time (minutes and seconds) for any linked output points to be activated for. Select to display the text (in the field to the left) on the keypad instead of the default (Night) when the area is in Night mode. The text is restricted to ten characters, click the text field and enter the text. Select to display the text (in the field to the left) on the keypad instead of the default (Restricted) when the area is in Restricted mode. The text is restricted to ten characters, click the text field and enter the text. Select to display the text (in the field to the left) on the keypad instead of the default (Day) when the area is in Day mode. The text is restricted to ten characters, click the text field and enter the text. Select to display the text (in the field to the left) on the keypad instead of the default (Staff). The text is restricted to ten characters, click the text field and enter the text. Select a user type so that when they are logged on, the system periodically reminds them log on again by beeping the keypad. The interval is set in the Reminder Timer field. This is a security setting to avoid the selected user type from logging on and failing to log off. After the timer expires the keypad beeps for 60 seconds and, if the selected user type fails to log on to the system again, they are logged off and an alarm is sent. Enter the time (in multiples of 10 minutes) that the user type can remain logged on for before the reminder beeping begins and the user has to log on again. Allows any user to reset alarms. Allows the client to reset alarms at the keypad. Allows a Pacom engineer to reset tamper alarms at the keypad. Enable the beeper/sonalert on the keypad during log on or entry operations, starting the entry procedure. Enable the beeper/sonalert on the keypad during log off or exit operations. Enable the beeper on the keypad when a warning message is displayed. The beeper sounds every 10 seconds for the following warnings: Film Count Low. Staff Exit xx Min. Staff Exit Now. User Exit xx Min. User Exit Now. Display Welcome Message Display the welcome message, if required. This message is linked to the Idle
Exit Delay 2
Restricted
Day
Staff
Reminder Timer Reset Type No Special Reset Type Client Reset Engineer Reset General Parameters Enable Beeper on Entry Enable Beeper on Exit Enable 10 Sec. Warning Beeper
Configuring Controllers - Technician Guide Parameter While Idle. Description Time setting (see Configuring Alarm System Flags 126 ) and the keypad Return To Idle setting (see Pacom keypad manual). When a key is pressed on the keypad, the display shows the current status. After the Idle Time has expired the welcome message is displayed again. If the Welcome Message field (see Configuring General Alarm System Parameters 122 ) is left blank the keypad display will go entirely blank after the Idle Time expires. Stops the following alarm warning messages: Late to Open Vault. Late to Close Vault. Pending Delay Count Enter a number to determine the number of pending alarms that have to be tripped before a full alarm is sent. If the pending alarms count is higher than the Pending Delay Count setting, the alarms are transmitted immediately. The pending alarm delay timer. This is how long the system will wait until it transmits all pending alarms. Select the M option for the timer to be in minutes, or S for seconds. If you have the Pending Delay Count set to more than 1, several pending alarms need to occur within the pending alarm delay timer for the alarm to be reported. The name of the area that appears on the keypad. It is restricted to eight characters. Select a message for display on the keypad during log on/log off.
Area Description
Log On/Log OFF Message String on Keypad Log On/Log OFF Message String on Keypad 5. 6. 7.
Specify the area parameters as required. To set up other areas, click Next Area or Previous Area, or enter an area number at the top of the dialog box and click Goto. Proceed from step 4 for each new area. Click OK to download the area parameters to the Controller. The Transaction Manager window confirms the download.
2.
Referring to the following section, enter parameters as required. Description The hour settings that you program into the system for repeated use. To program a set of hours, in Permanent Selection select Default, then proceed to enter the hours as required. Click Add to add the settings to the Programmed Hours list (see Quick Select 134 for how to apply Programmed Hours list settings). Permanent Selection is used to define the type of alarm status of that particular day. Options are: Night - Used to select Night mode for alarm operation from 00:00 to 24:00. Times are not entered in the fields for that day. Day - Used to select Day mode for alarm operation from 00:00 to 24:00. Times are not entered in the fields for that day. Default is used to program the times of entry and exit to the premises for that day.
Permanent Selection
Staff Entry
Used when the Permanent Selection setting is Default. This time is the earliest time a staff member may enter the premises. The premises is in Restricted Access mode after this time and in Night mode before. Used when the Permanent Selection setting is Default. This time is the start of normal hours. The premises is in Day mode after this time. If selected, the system will automatically switch to Day mode at the Day Start time. This setting is not available for selection during Night mode. Used when the Permanent Selection setting is Default. The time entered here is the end of normal hours. The premises is put in Restricted Access mode after this time. If selected, the system will automatically switch to Restricted mode at the Staff Exit time. This setting is not available for selection during Day mode. Used when the Permanent Selection setting is Default. This time is the normal staff exit time. The premises is in restricted access mode after this time. Used when the Permanent Selection setting is Default. This time is only active if Latework is selected from the keypad. If Latework is selected twice, access is granted all night. The premises are put in Night mode after this time. Used when the Permanent Selection setting is Default and in conjunction with the Programmed Hours list. Select the required hours from the Programmed Hours list, then click Quick Select to apply them. Allows the user with Allow Entry Outside Hours permission set, to access this area outside normal hours (see Configuring Alarm User Types 97 ). Used in conjunction with the . When selected, it applies the time for Duration for Remote R/A mode setting (see Configuring General Alarm System Parameters 122 ) for access to this area. After this time the system will ask the user to exit the area (alarm sent and keypad beep).
Quick Select
3.
Configuring Controllers - Technician Guide 1. Select Alarm > Area Access > Temporary Hours in the Controller dialog box (see Using the Controller Dialog Box 19 ). The Temporary Hours for Area dialog box opens.
2.
Referring to the following section, enter parameters as required. Description The hour settings that you program into the system for repeated use. To program a set of hours, in Permanent Selection select Default, then proceed to enter the hours as required. Click Add to add the settings to the Programmed Hours list (see Quick Select 134 for how to apply Programmed Hours list settings). Permanent Selection is used to define the type of alarm status of that particular day. Options are: Night - Used to select Night mode for alarm operation from 00:00 to 24:00. Times are not entered in the fields for that day. Day - Used to select Day mode for alarm operation from 00:00 to 24:00. Times are not entered in the fields for that day. Default - Used to program the times of entry and exit to the premises for that day.
Permanent Selection
Staff Entry
Used when the Permanent Selection setting is Default. This time is the earliest time a staff member may enter the premises. The premises is in Restricted Access mode after this time and in Night mode before. Used when the Permanent Selection setting is Default. This time is the start of normal hours. The premises is in Day mode after this time. If selected, the system will automatically switch to Day mode at the Day Start time. This setting is not available for selection during Night mode. Used when the Permanent Selection setting is Default. This time is the end of normal hours. The premises is put in Restricted Access mode after this time. If selected, the system will automatically switch to Restricted mode at the Staff Exit time. This setting is not available for selection during Day mode. Used when the Permanent Selection setting is Default. This time is the normal staff exit time. The premises is in restricted access mode after this time. Used when the Permanent Selection setting is Default. The time entered here is only active if Latework is selected from the keypad. If Latework is selected twice, access is granted all night. The premises are put in Night mode after this time. Used when the Permanent Selection setting is Default and in conjunction with the Programmed Hours list. Select the required hours from the Programmed Hours list, then click Quick Select to apply them.
Quick Select
3.
2.
Referring to the following section, enter parameters as required. Description The hour settings that you program into the system for repeated use. To program a set of hours, in Permanent Selection select Default, then proceed to enter the hours as required. Click Add to add the settings to the Programmed Hours list (see Quick Select 134 for how to apply Programmed Hours list settings). The earliest time of day that an ATM service person can access the premises. The latest time of day that an ATM service person can access the premises. The length of time on the premises available to an ATM service person once they have logged on. If the service person does not exit the premises before this time has elapsed, an alarm is sent. Used when the Permanent Selection setting is Default and in conjunction with the Programmed Hours list. Select the required hours from the Programmed Hours list, then click Quick Select to apply them.
Quick Select
3.
2.
Referring to the following section, enter parameters as required. Description The hour settings that you program into the system for repeated use. To program a set of hours, in Permanent Selection select Default, then proceed to enter the hours as required. Click Add to add the settings to the Programmed Hours list (see Quick Select 134 for how to apply Programmed Hours list settings). The earliest time of day that a cleaner can access the premises. The latest time of day that a cleaner can access the premises. The length of time on the premises available to a cleaner once they have
Configuring Controllers - Technician Guide Parameter Description logged on. If the cleaner does not exit the premises before this time has elapsed, an alarm is sent. Quick Select Used when the Permanent Selection setting is Default and in conjunction with the Programmed Hours list. Select the required hours from the Programmed Hours list, then click Quick Select to apply them.
3.
2.
Referring to the following section, enter parameters as required. Description Enable the checkbox for each day that security personnel are allowed into the premises. The earliest time of day that a security person can access the premises. The latest time of day that a security person can access the premises. The length of time on the premises available to a security person once they have logged on. If the security person does not exit the premises before this time has elapsed, an alarm is sent.
3.
2.
Configuring Controllers - Technician Guide Parameter Days Allowed Points Isolated Start Time End Time Duration Description Enable the checkbox for each day to allow input points to be isolated for servicing. Enable the checkbox for each input point type to be isolated for servicing The earliest time of day that a service person can access the premises. The latest time of day that a service person can access the premises. The length of time on the premises available to a service person once they have logged on. If the service person does not exit the premises before this time has elapsed, an alarm is sent.
3.
2.
Referring to the following section, enter parameters as required. Description Enable the checkbox next to each date that you want to exclude normal access (that is, Night mode for the entire day). Enable the checkbox next to each area that the Yearly Calendar will apply to. Note: The areas you select will be the common to the Yearly Calendar for all months.
Next Month 3.
2.
Referring to the following section, enter parameters as required. Description This is the ID number to associate with the User PIN code. The PIN (personal identification number) that the user must enter to gain access. Enable to allow all users with a Staff ID type to use this schedule. Select the user ID type allowed for the schedule. You can enter text here so that when the user logs on, the system display states who is present (used for auxiliary users). Select which days that schedule is to be allowed to be used by the system. These are the areas that the user is allowed to enter using the schedule. This is the time from which the user can gain entry. This is the time after which the user will not be given entry. Enable to delete the schedule after one use. Enable to allow the user access outside Normal Hours. Enable to allow the user access to more than one area (requires log on) after logging on to one area. Enables the user to log on using fingerscan, if attached to the system. Enable to allow the user to use the systems ability of having a card reader and PIN pad associated with an area to un-set.
Parameter User ID no User PIN Allow any Staff ID ID Type Temporary ID Vocab Days of Schedule Area to Access Start Time End Time Delete Schedule after Use Allow Entry Outside Hours Can Log on to All Areas Allow Fingerscan Allow Access Control 3.
2.
Referring to the following section, enter parameters as required. Description Enable the checkbox next to each day that the event driver can activate during. Enable the checkbox next to the area that the event driver can activate from. Click to go back to the previously created event driver settings. After making settings, click to create a new event driver. Click to open the Macro Configuration dialog box. Enable to have the activation driven by the time of day. When selected, the Time field becomes active. Enable to have the activation driven by a change in mode. When selected, the Activate on Entry to options become active. You can select multiple options, unless the two definitions contradict, for example, day/night. Enable to have the activation driven by an alarm system condition, for example, whenever an 'Entry Warning' or 'Exit Warning' message is sent. When selected, the Activate During options become active. You can select multiple options. Enable to have the activation driven by an event, for example, a device tamper event. When selected, the Activate on options become active. You can select multiple options. Enter the time that you require the event to happen. The output changes state at that time. Another event can then be raised to turn the output off. This setting requires the Time Driven option to be selected. Select for the event driver to switch an output. Enter the output number in the adjacent field. Select for the event driver to run a macro. Enter the macro number in the adjacent field. See Creating Macros 141 . Select for the event driver to turn the output or trigger ON. Select for the event driver to turn the output or trigger OFF. Select so that the relay will not change back until the system has exited the mode that drives the relay. Select so that the relay will only change state for five seconds when the event occurs.
Parameter For Days For Areas Previous Next Macros Activation Type Time Driven Mode Driven
Condition Driven
Event Driven
Time
Click OK. The dialog box closes and the event driver details are downloaded to the Controller.
Creating Macros
The concept of macros is based on a series of basic logical functions performed on specified conditions, resulting in an action. Macros allow you to be very specific with the conditions that need to be met and with the subsequent actions to take, providing you with complete flexibility. Event drivers are used to activate macros (see Configuring Event Drivers 140 ). The key functions in macro programming are the NOT, AND, OR and THEN functions. These can be used in any combination to establish an action. The AND function is used to link two conditions that must both be correct before the action is performed or to link multiple actions to be performed. The OR function is used to link two conditions so that the action is performed when either condition is correct. The NOT function is added to any condition to denote that it must be in a negative or untrue state to satisfy the condition, for example, when input number four is NOT active. The THEN function is used to lead the macro from the end of the conditions into the action.
In macro programming the AND function takes priority over OR function where multiple functions are used, for example:
To program a macro, proceed as follows: 1. In the Controller dialog box (see Using the Controller Dialog Box 19 ) select Macros > Alarm Macros (or click Macros in the Time/Event Driven Activation dialog box). The Macro Configuration dialog box opens. The dialog box is divided into two regions - Macro Conditions and Functions and Actions. If macros have been programmed previously, you can enter the macro number at the top of the dialog box, and click Goto to display it.
2.
Select Edge Triggered or Level Triggered. If you select Edge Triggered, the action occurs at the time the condition is met and will not effect the action after this. If you select Level Triggered, the action will continue to be performed while the condition is true.
3.
Select the first condition from the list in the Macro Conditions and Functions region. Conditions are tests performed on the current state of the system and are continuously monitored. The following table lists the available macro conditions.
Description Conditions not used. Defined using an event driver. There are up to 256 triggers available, depending on the Controller model. Triggers can be set to = TRUE or FALSE, or be reset by an action from another macro expression. The associated number is the number as set in the associated event driver. Inputs that have reported as alarms to the system. A masked input is active only if the alarm reporting criteria for it are correct when the sensor goes active. Any input can be used as masked or unmasked. The associated number is the input number. The normal GPOs (General Purpose Outputs) that are used throughout the system. The associated number is the output number. Information the system uses during general operation to summarize the status of an area. In macros the status can be used as conditions. Click Edit to open the Graphic Status for Condition dialog box, where you can define further options. Make no selections in this dialog box for Day mode. There are ten in the system that can be used for general purpose operation within the macros. A timer set as an action with a value in one macro, can be used as a condition in another macro. Functions are performed and tested when the timer has completed its count. The associated number is the macro number in which the timer is defined as an action. There are ten in the system that can be used for general purpose operation within the macros. A timer set as an action with a value in one macro, can be used as a condition in another macro. Functions are performed and tested on the timer being active (it has a value loaded and counting). The associated number is the macro number in which the timer is defined as an action. Information the system uses during general operation to summarize the status of the network. In macros the status can be used as conditions. Click Edit to open the Network Status for Condition dialog box, where you can define further options. Information the system uses during general operation to summarize the status of the panel. In macros the status can be used as conditions. Click Edit to open the Panel Status for Condition dialog box, where you can define further options. Unmasked inputs are not affected by any alarm reporting criteria. An unmasked input is active whenever the sensor is active. Any input can be used as masked or unmasked. The associated number is the input number. Triggered when an RS485 devices tamper input is activated. The associated number is the RS485 address of the device.
Masked Input
Timer Expired
Timer Active
Network Status
Panel Status
Unmasked Input
Tamper State
Configuring Controllers - Technician Guide Condition Offline State Point Category Description Triggered when an RS485 device goes offline. The associated number is the RS485 address of the device. Triggered when any input of a particular programmable input goes into alarm. Click Edit to open the Point Category for Condition dialog box, where you can select the category and set whether or not it is to be triggered by the masked or unmasked status. Allows a trigger based on the current value of an analog input being greater or less than a set value. Click Edit to open the Analog Input for Condition dialog box, where you can select the input and set the threshold levels for when the input is considered active. Active during a particular days and times (time schedules). Click Tz to open the Time Zone Number dialog box, where you can define the days and hours during which the condition can be met. Active when a special input condition is met, for example, when a 'Battery Low', 'Alarm Restored', 'Open Circuit' condition occurs for an input device. Click Edit to open the Extended Macro Conditions dialog box, where you can define the type of condition required and the input to apply it to.
Analog Input
Time Zone
Advanced Condition
After you select a condition, a number of further controls in the Macro Conditions and Functions region appear. Change details as required. 4. 5. Enable the ! checkbox to impose a NOT function to the condition. The list to the right of the condition are is for selecting the trigger, input, output, bit or timer number for the condition. When you select a trigger the number in this field is set to the macro number where the trigger is defined. For certain conditions a button appears. Clicking it opens a dialog box where you can further define the condition. The second list to the right of the condition is for selecting a logical function for the next condition. Selecting OR or AND will display similar fields for defining the next condition. For the last condition in the macro, set this field to Then to lead the macro into the Action region. Setting this field to None disables the macro (no action is taken). In the Action region select the first action to perform. Depending on the type of action you select, a variety of parameter fields appear so you can enter the parameters in the required format. Each action has an associated number and their required parameters are as follows: Note: An Area mask is represented by a series of checkboxes that appear below an action requiring you to select which alarm areas are affected by the action. Enable the checkbox next to an area to include it in the selection. Note: A Zone Number corresponds to the Input Number to which the sensor for that zone is connected. Note: Pseudo Number refers to the Trigger Number as set in the event driver configuration. 8. 9. Select And to define another action and so on. Click Next to define another macro, Prev to view or edit a previous macro, OK to exit and save all macros, or Cancel to exit without saving. Note: There is a finite amount of space available in the Controller memory for storing macro code. The title bar of the Macro Configuration dialog box displays available memory. Action Numbers and Parameters Action Number 00 01 02 03 04 05 06 07 08 Description Change the alarm system to Night mode for the selected alarm areas (1 - 8 or 32 depending on Controller type). Change the alarm system to Day mode for the selected alarm areas (1 - 8 or 32 depending on Controller type). Change the alarm system to Restricted Access mode for the selected alarm areas (1 - 8 or 32 depending on Controller type). Allow user type Cleaner entry to the selected alarm areas (1 - 8 or 32 depending on Controller type). Allow user type Cleaner exit from the selected areas (1 - 8 or 32 depending on Controller type). Allow user type ATM entry to the selected alarm areas (1 - 8 or 32 depending on Controller type). Allow user type ATM exit from the selected alarm areas (1 - 8 or 32 depending on Controller type). Allow user type Guard entry to the selected alarm areas (1 - 8 or 32 depending on Controller type). Allow user type Guard exit from the selected alarm areas (1 - 8 or 32 depending
6.
7.
Configuring Controllers - Technician Guide Action Number 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 Description on Controller type). Allow user type Aux1 entry to the selected alarm areas (1 - 8 or 32 depending on Controller type). Allow user type Aux1 exit from the selected alarm areas (1 - 8 or 32 depending on Controller type). Allow user type Aux2 entry to the selected alarm areas (1 - 8 or 32 depending on Controller type). Allow user type Aux2 exit from the selected alarm areas (1 - 8 or 32 depending on Controller type). Change the alarm system to Engineering mode for the selected alarm areas (1 8 or 32 depending on Controller type). Ignore any input point activity during the selected zone (time schedule). Accept any input point activity during the selected zone (time schedule). Activate the selected output point for a set time in minutes or seconds. Deactivate the selected output point. Activate the selected CCTV camera (1 - 32) for a set time in minutes or seconds. Deactivate the selected CCTV camera (1 - 32). Set the selected trigger (pseudo state) to = TRUE. Set the selected trigger (pseudo state) to = FALSE. Set timer 1 to a set time in seconds and begin counting down. Set timer 2 to a set time in seconds and begin counting down. Set timer 3 to a set time in seconds and begin counting down. Set timer 4 to a set time in seconds and begin counting down. Set timer 5 to a set time in seconds and begin counting down. Set timer 6 to a set time in seconds and begin counting down. Set timer 7 to a set time in seconds and begin counting down. Set timer 8 to a set time in seconds and begin counting down. Set timer 9 to a set time in seconds and begin counting down. Set timer 10 to a set time in seconds and begin counting down. Reset all input and output points in the selected areas. Force setting of the selected alarm input point. Force resetting of the selected alarm input point. Lockout the selected keypad so that it cannot be used for access. Reset the selected keypad so that it is no longer locked out, and can be used for access. Stop all PIR input points in the selected alarm areas (1 - 8 or 32 depending on Controller type) from functioning. Allow all PIR input points in the selected alarm areas (1 - 8 or 32 depending on Controller type) to function. Stop all Perimeter PIR input points in the selected alarm areas (1 - 8 or 32 depending on Controller type) from functioning. Allow all Perimeter PIR input points in the selected alarm areas (1 - 8 or 32 depending on Controller type) to function. Stop all Perimeter input points in the selected alarm areas (1 - 8 or 32 depending on Controller type) from functioning. Allow all Perimeter input points in the selected alarm areas (1 - 8 or 32 depending on Controller type) to function. Stop all Vibration input points in the selected alarm areas (1 - 8 or 32 depending on Controller type) from functioning. Allow all Vibration input points in the selected alarm areas (1 - 8 or 32 depending on Controller type) to function. Stop all Vault input points in the selected alarm areas (1 - 8 or 32 depending on Controller type) from functioning. Allow all Vault input points in the selected alarm areas (1 - 8 or 32 depending on Controller type) to function. Activates the sonalert (beeping) function at the selected keypad.
Configuring Controllers - Technician Guide Action Number 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 Description Deactivates the sonalert (beeping) function at the selected keypad. Lock the selected reader (1 - 64) so that it cannot be used for access. Unlock the selected reader (1 - 64) so it can be used for access. Allow a single passage through the selected reader (1 - 64). Restore the selected reader (1 - 64) so that it resumes normal access controlled operation Disable the egress button associated with the selected reader (1 - 64) to prevent exiting. Ignore any door contact signals associated with the selected reader (1 - 64). Enable the egress button associated with the selected reader (1 - 64) to allow exiting. Accept any door contact signals associated with the selected reader (1 - 64). Clear the access card passback list for the selected reader (1 - 64). Reset the selected area count (0 - 25) back to zero. Prevent the selected output point (1 - 64) from being activated. Allow the selected output point (1 - 64) to be activated. Prevent the selected CCTV camera (1 - 32) from being activated. Allow the selected CCTV camera (1 - 32) to be activated. Prevent the selected film camera output point from being activated. Allow the selected film camera output point to be activated. Force the Controller to immediately send all alarms queued on dialup. Allow access to the selected floor for a set time in minutes or seconds. Force the selected input point (1 - 256) to send a SNMP alarm alert message. Force the selected input point (1 - 256) to send a SNMP alarm reset message. Send footage from the selected CCTV camera (1 - 32), connected to a Pacom Witness, to the local output connection (usually a monitor) for a set time in minutes or seconds. Stop sending footage from the selected CCTV camera (1 - 32), connected to a Pacom Witness, to the local output connection. Start recording footage from the selected CCTV camera (1 - 32) for a set time in minutes or seconds. Stop recording footage from the selected CCTV camera (1 - 32). Instruct the system to record footage from the selected CCTV (1 - 32) as part of an event, including settings such as pre and post recording times. This command applies to Pacom Witness and third-party DVRs. Reset any alarms on the selected reader (1 - 64). Send the selected macro action command (from this list) to Controller(s). The target Controller can be: A single selection. A local broadcast to all Controllers on the same linecard. A global broadcast to all Controllers in the system. 76 77 78 79 80 81 82 83 84 85 86 Apply the Alternate Bandwidth setting (including length of time) for footage generated by the selected CCTV camera, connected to a Pacom Witness. Instruct the selected CCTV camera (1 - 32) to the selected preset pan/tilt/zoom (PTZ) orientation. Activate the buzzer on the selected reader (1 - 64) for a set time in minutes or seconds. Deactivate the buzzer on the selected reader (1 - 64). Activate the green LED on the selected reader (1 - 64) for a set time in minutes or seconds. Deactivate the green LED on the selected reader (1 - 64). Activate the red LED on the selected reader (1 - 64) for a set time in minutes or seconds. Deactivate the red LED on the selected reader (1 - 64). Enable or disable reporting alarms on the backup line. Stop the selected input point (1 - 256) from functioning. Allow the selected input point (1 - 256) to function.
70 71 72 73
74 75
Configuring Controllers - Technician Guide Action Number 87 88 89 90 91 92 93 Description Stop the selected output point (1 - 64) from functioning. Allow the selected output point (1 - 64) to function. Stop door alarm reporting from the selected input point (1 - 256). Allow door alarm reporting from the selected input point (1 - 256). Allow access card passback operation on the selected reader (1 - 64). Disable passback operation on the selected reader (1 - 64). Prevent all access cards with the selected card type from having access. Card type identifiers do not have to have an actual number, it is the position in the list of card types that you select. For example, if you want to select a card type called 'apprentice', which is fifth in the list of card types, select 5. Allow all access cards with the selected card type to have access. Card type identifiers do not have to have an actual number, it is the position in the list of card types that you select. For example, if you want to select a card type called 'apprentice', which is fifth in the list of card types, select 5. Transmit live video from the selected CCTV camera (1 - 32) to the selected receiver (1 - 8). Stop transmitting live video from the selected CCTV camera (1 - 32) to the selected receiver (1 - 8). Force the interlock function on the door associated with the selected reader (1 64). Force resetting the interlock function on the door associated with the selected reader (1 - 64). Set the security level (1 - 8) for the selected alarm area (1 - 8 or 32 depending on Controller type). Start exit to Night mode in the selected alarm areas (1 - 8 or 32 depending on Controller type). Stop exit to Night mode in the selected alarm areas (1 - 8 or 32 depending on Controller type). Sets the selected reader (1 - 64) to validate access cards using the facility code only. Disable system ID check for reader + reader number (1 - 64). Enable or disable local Controller ports. Sets late work operation in the selected alarm areas (1 - 8 or 32 depending on Controller type). Allow override of the selected reader time zone (time schedule) (1 - 256) settings. Prevent override of the selected reader time zone (time schedule) (1 - 256) settings. Clear the passback status for all access cards that have been used on the selected reader (1 - 64) for the current day. Resets the selected pulse counter (1 - 256) back to zero. Load tests the selected power monitor (1 - 256) for a set time in minutes or seconds. Override PIN access control at the selected access area (1 - 256) for a set time in minutes or seconds. Extend access at the selected reader (1 - 64) for a set time in minutes or seconds. Override the configured wait time setting of the selected Vault Controller to a set time in minutes or seconds. Reset the wait time setting of the selected Vault Controller to its configured value. Test the selected Controller port for communications. The selected port number must be on of the primary ports (primary, secondary or tertiary). If the test fails a message displays in the Transaction Manager. Activate the selected listen-in device (1 - 4).
94
95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115
116
Macro Examples
The following example macros show you how conditions must be set to achieve the desired result. Example 1:
In the macro shown above, the conditions are set as follows: The conditions are Edge Triggered. That is, once the conditions are met the macro will run and is not affected by the state of the conditions until they are reset. The action is performed when trigger #1 (as defined in the event driver) is active AND unmasked input #72 inactive (! option enabled). The input is unmasked, which means that the input is active any time that the sensor goes into an active state and is not be affected by any conditions that may have been placed on it to prevent it from triggering an alarm during certain modes or conditions. The action will also be performed at any time when masked input #3 is active. This is achieved by selecting OR between the second and third conditions. THEN the action is defined as follows: Change area 1 to Night mode AND activate output #15 for 10 minutes. This example is summarized as:
Note: Note how the AND function takes priority. Example 2: The following example further refines macro example 1 by changing the conditions to look for either trigger #1 being active AND unmasked input #72 inactive OR trigger #1 being active AND masked input #3 active. That is, trigger #1 must be active for either condition to be met.
Example 3: The following example demonstrates how a timer set in one macro is then utilized in a second macro to perform further actions when the timer expires.
In the above example the conditions are set as follows: The conditions are Edge Triggered. Perform the action when unmasked input #1 AND unmasked input #2 are both active. THEN perform the following action: Set Timer #1 to 60 seconds (the timer begins immediately) AND lockout keypad #7 AND activate output #1 for five seconds. This example is summarized as:
To use the timer set in the example above, click Next to define macro #2.
In the example above, the condition for this macro is that timer #1 (set in the previous macro) expires. The conditions are set as follows: The condition is Edge Triggered. Perform the action when timer #1 has expired. THEN perform the following actions: Force alarm input #1 to reset AND reset the locked out keypad #7. This example is summarized as:
The Controller and attached expansion card serial numbers are shown at the top of the dialog box. Note: In the case of 8001 Controllers, the serial numbers for attached mezzanine cards are also shown.
4.
In the Enter Code field type the activation code, then click OK.
The hardware feature or option becomes enabled and is shown as enabled in the Controller License Options dialog box. To disable a feature or option, click Disable for the required feature and use the required activation code to confirm the action.
Chapter
Configuring Access Control
153
Configuring Controllers - Technician Guide Access control allows the security system to control and monitor the movement and location of personnel throughout a site. Access control is accomplished with the combination of GMS software, Controller software/firmware, and Pacom 1064 and 1076 Single and Dual Card Reader Interfaces (CRIs). The 1064 and 1076 act as the local hardware interface for various types of third-party card reader devices and associated electronic door lock devices. Note: For information on the installation of access control hardware, see the Pacom 1064 and 1076 Installation Manuals. Within any given system the level of access control implementation can vary widely. It can range from a simple system, with a single card reader on the front door for controlling access to the premises during restricted hours of the day, to a fully controlled premises, divided into secured areas by controlled access points using sophisticated readers that enable tracking and monitoring of users throughout a premises. Access to secured areas can be limited to particular cardholders or types of cardholders, during certain times, modes or in various circumstances. Cardholder access to secured areas is controlled by assigning a range of options and parameters to the areas themselves, or to individual readers or cardholders. Note: Cardholder options are covered in the Using GMS - Operator Guide, Using the Card Access Manager. Cardholder options are not discussed in this section, except where they directly effect or are affected by hardware options or parameter settings. GMS has an integrated reporting module that you can use to produce reports on any card access transaction data. For example, reports can be made on the number of users passing through a particular door or area, or about individual cardholder activities. Time and attendance (T&A) reports can be created on cardholder activities for payroll purposes.
Stand-Alone Readers
Stand-alone readers are the cheaper and more commonly installed method of controlling access. A stand-alone reader is where a single card reader is placed on each door and access is controlled on entry to the area only. In some cases a door may use a lock that can be opened from the inside, or an egress button can be connected to the reader to unlock the door, for exit. Egress buttons may also be installed when there is a door lock that can be opened from the inside. The button is used to mask out the door contacts during the Shunt Time (see I/O parameters 164 tab in Configuring Readers 159 ) and prevent a 'Forced Door' alarm from being sent when the door is opened. When stand-alone readers are used, the system cannot monitor who is actually in the area, and certain functions that require in/out readers are not possible.
In/Out Readers
An in/out reader is a pair of card readers mounted on a single access point. Each reader is used to control access in a single direction through the access point. Readers can be connected as: Two master readers that have their own door contact inputs (from the same door) and the strike can be connected to both readers in parallel. Separate one-way doors can also be used with this configuration for high traffic areas. Master readers connected to the same door do not require consecutive reader numbers. A master/slave pair, where the door contacts and strike output are connected to the master reader, and the slave reader monitors the door contacts of the master reader and activates the master reader strike relay. A slave reader must be the next consecutive reader number from its associated master. Note: Sending commands to one reader in an in/out reader pair does not affect the operation of the other reader. For example, sending a lock command to the 'in' reader will not lock the associated 'out' reader. Readers are setup in an in/out configuration to allow the system to keep track of all users entering and leaving individual areas. This determines the location and/or the number of users within a site or area. For the system to work, all access points to any secured area must be controlled. Note: The system keeps track of the area a user is in and, before accepting the new area after a valid read, the system checks that the door has actually been opened. If the door contacts are not connected, the Shunt Time setting can be set to 0 so that the user is accepted to the new area immediately upon a valid read. Each in/out reader is programmed using the areas that they are in and control access to. These are the Area No. Leaving and the Area No. Entering parameters. The Area No. Leaving setting is the same number as the Area Number (the location of the reader). When you assign these parameters the easiest way to identify the correct area to enter is to draw a diagram of all the areas and the location of the readers within them.
An extension to in/out readers are parking lot readers. The system keeps a count of the entries/exits and compares it with the area profile configuration (see Configuring Area profiles 157 ). For example, when the car park is full, it could trigger an event, such as activating an output to turn on a 'Car Park Full' sign or to change modes. You can program the output in the access area profile configuration (see Configuring Access Area Profiles 157 ). As in the above example, a GPO is activated while the count for the area remains at or above the maximum. This output is ignored if the count is set to 0. If the system is only concerned with the number of valid cardholders in the area (parking lot in this example) and not identities, an input device, such as a push button, can be used to allow egress from the area and command the system to decrement the number of cardholders still present.
Interlocks
In some instances you may want to ensure that one door is closed before another is opened and vice-versa. For example, if there are two access controlled doors that lead to a high security area, you can interlock them so that no other person can open the first interlocked door whilst the second door is currently open. Once the second door is closed and locked, the first door can be opened again. Interlock doors from their associated reader configuration. Each reader/door can be interlocked with up to eight others. Note: When a door is interlocked, it can only be opened through the interlock functionality. That is, it will reject access and unlock commands or egress requests whilst interlocked. Note: Doors that are interlocked by another door, or are commanded into an interlocked state, will illuminate the red LED on their associated readers.
Anti-passback
Anti-passback is a function that prevents two users gaining access to an area using a single card. When you enable anti-passback, the system remembers up to the last 16 cards used on the reader, and can optionally do so for a set amount of time. These cards will not be allowed access to the reader again until they drop out of the remembered list, time out, or are reset by using another reader. There is also an option for clearing the reader passback memory in other readers, if the card is used in a particular reader. With peer to peer communications between Controllers, Pacom access control has the ability for 'global antipassback'. This is where the anti-passback can be reset using any reader, including those connected to other Controllers.
Configuring Controllers - Technician Guide Note: You can assign anti-passback functionality to stand-alone readers only. In/out readers do not require anti-passback as they will generate an error if a card is used to attempt entry to the same area twice, without exiting.
Degraded Mode
Under normal operating conditions the Controller performs all access processing. Degraded mode occurs when the reader becomes disconnected from the Controller. The reader will allow entry to cards with specific facility codes to enter certain areas. There are two forms of degraded operation. Option 1 - When the reader first comes online, a Master card is downloaded to the reader and stored in nonvolatile memory. If the reader goes offline, the Master card is always allowed access. Option 2 - As each valid transaction occurs while the reader is online, an instruction is sent to the reader to store a configurable part of the code read in to non-volatile memory (maybe the facility and/or issue, or the whole card number), so that in degraded mode, any card that matches this code is validated. Up to 256 codes can be stored in a 1064 card reader interface, and up to 1000 in 1067/1076 models (These values are based on the 26-bit Weigand format. Higher bit counts per card reduce the maximum number.). The reader can be programmed to store individual users (selectable in the user configuration). If the masked part of the code is already in the table, the entry is not stored. This ensures that there are no repeated entries in the list. In addition to this, the 1067/1076 can store 500 offline transactions per reader. To configure degraded mode, see Configuring Degraded Mode Operation 181 .
Time Schedules
User Time Schedule Profiles
User time schedule profiles define access times to readers and are assigned to cardholders. The system allows for up to 100 time schedules and up to three individual time ranges (shifts) per day. Each time schedule entry has a start and end time (in multiples of ten minutes) for each day of the week (starting at Sunday). Holidays are also programmable. See Configuring Reader Time Schedules 174 .
Note: GMS 2.xx with 4MB expansion on a 1057 Controller supports up to 128,000 cards and 10,000 on a 1058.
3.
Set that area parameters according to the following table. Description The access of cardholders to secured areas can be limited by assigning the area one of four special Area Types as follows: Supervised Area - Requires in/out readers. A cardholder is designated as a supervisor in the cardholder options. The supervisor must be present in the area for non-supervisors to enter. The supervisor will not be allowed to leave if they are the only supervisor and non-supervisors are still present. This option requires in/out readers and is applied to the area number entering, that is, the area to which the reader is granting access. Dual Entry Area - Used to prevent any user from entering a secured area alone. The first valid user cannot access the area until a second user is validated. This option is used in conjunction with the Dual User Control option in the Card Details tab for each user (see Using GMS - Operator Guide, Using the Card Access Manager). The order in which the cards are swiped is not important. If the access point is a type of turnstile, the reader Dual Strike activation when Accessed option should be enabled to activate the strike twice (see Configuring Readers 159 ). This will allow the entry of both users once the valid transactions are complete. This option applies to the operation of the reader that is in the area assigned this profile and is not compatible with Supervised Area operation described above. Supervised Dual Entry - Same as Dual Entry Area except that at least one of the cardholders must also be designated as a supervisor in the cardholder options. If the access point is a type of turnstile, the reader Dual Strike activation when Accessed option should be enabled to activate the strike twice (see Configuring Readers 159 ). This will allow the entry of both users once the valid transactions are complete. This option applies to the operation of the reader that is in the area assigned this profile and is not compatible with Supervised Area operation described above. Limited Count Area - Used in areas that have a maximum capacity. Valid cardholders are granted access until the number of users in the area has reached the Max. Allowed Access Count setting. The output set in Activate when Max Access Count Reached setting will remain activated while the maximum number of users are still present. Limited Count Area operation requires in/out readers or a reader with egress button configured to track the number of users.
Card access areas 1-8 can be associated with alarm areas 1-8 respectively. When this option is enabled and a valid card is read by a reader in the area, the corresponding alarm area is sent to Day mode. Used with Pin Entry Modes or Card Swipe after PIN Entry PIN operation (see Configuring Readers 159 ). This timer starts when a card is swiped or a PIN is entered within the area. If the card swipe and PIN entry combination are not completed before the timer expires, access is denied and the cardholder will have to start again.
Configuring Controllers - Technician Guide Parameter Description If you are using event drivers driven by multiple reader swipes in the access area, this setting also determines the time limit that the swipes must occur in. Change Mode when Maximum Count reached When enabled, this option causes the system to change modes when the Max Allowed Access Count setting is reached. The system will revert to the previous mode when the number of cardholders in the area falls below the Max Allowed Access Count setting. Card access areas 1-8 can be associated with alarm areas 1-8 respectively. When this option is enabled and a valid card is read by a reader twice in the area within a certain time, the corresponding alarm area is sent to Night mode. Note: This option is valid only when Enable Mode Changes is enabled. Max. Allowed Access Count Used in conjunction with Limited Count Area operation. Determines the maximum number of authorized cardholders that are granted access to the area. This is the number of the GPO (General Purpose Outlet) or trigger to activate when the Max. Allowed Access Count setting is reached. This number is the output number (0-127) as set up in alarm configuration (see Configuring Input and Output points 108 ). Enable the GPO or Trigger option to specify what to activate. A duress code is used when a cardholder is being forced to grant someone unauthorized access, or during any other suspicious circumstance. The cardholder is granted access as normal so that suspicion is not aroused, however, a duress alarm is sent to the monitoring center. The numeric code entered in this field is the duress PIN for this area only. Enable to allow users to use the Duress Code for Readers in This Area setting, after entering their PIN. Enable to allow users to send a duress signal to the monitoring center by entering their PIN with the last digit incremented by one. For example, a normal PIN of '4855' would send a duress signal if it is entered as '4856'. Sets the master access card code for Degraded mode 156 reader operation. This setting is stored in the area readers and always allows the card with this code to access the area during degraded mode. Enter the number of an area with the same or similar parameters in this field to copy its settings to the area.
Duress Code at End Duress by Pin Incremented by 1 Master Code for Degraded Mode Copy From Area No. 4.
Click OK to close the dialog box and download the settings to the Controller.
Configuring Readers
There are various options available for controlling the operation of card readers. The Configuration for Reader dialog box has a set of common controls for selecting readers and configuring their address and other general details, and a number of tabs for setting specific reader parameters and options. To configure readers, proceed as follows: 1. 2. Open the Controller dialog box and select the required Controller (see Using the Controller Dialog Box 19 ). In the Controller dialog box select Access Control > Hardware > Readers. The Configuration for Reader dialog box opens. Use the following sections as a guide to available parameters.
Configuring Controllers - Technician Guide 225-256, add 224. For example, if the device is programmed with device address 3, and it is connected to a device line that has been allocated the 65-96 range of addresses, the device address should be entered as 67 (3 + 64). The address ranges of device lines do not all have to be different, as long as the individual device addresses are kept unique. The total number of devices must not exceed 32 for lines assigned the same range.
Description Select the card reader interface that the reader is attached to. Options are: Undefined - Not in use. Local Proximity Type - Connected directly to a serial port on the Controller. Local Motorola Type - Connected directly to a serial port on the Controller. Local Fingerscan Type - Connected directly to a serial port on the Controller. Pacom 1061 Type - Using a Pacom 1061 keypad with reader. Pacom 1065 Type - Using a Pacom 1065 I/O module with reader. Pacom 8101/1062 CRI Type - Using a Pacom 8101 or 1062 keypad with internal or external reader. Pacom 1064 CRI Type - Using a Pacom 1064 (CRI). Pacom 8101/1062 Type - 8101 or 1062 keypad used in access control mode as a PIN pad. Pacom 1067/1076 IF1 Type - Using a Pacom 1067 or 1076 Interface A. Pacom 1067/1076 IF2 Type - Using a Pacom 1067 or 1076 Interface B. Wyreless Access Point (WAP) - Using a Wyreless Access Point device. Note: The device address of a WAP configured using third-party software must be incremented by 1 to be compatible with GMS. For example, if a WAP is configured in the third-party software as address '3', it is configured in the device address as address '4'. Timecon TTC Reader - Using Timecon TTC Reader. Virtual Door - Using a Controller to send door commands to a third-party access control panel. Timecon (spare) - Reserved for future use. Pacom 8102 128x64x1 Access - Reserved for future use. Pacom 8102 128x64x1 - Reserved for future use. Pacom 8102 256x64x16 Access - Reserved for future use. Pacom 8102 256x64x16 - Reserved for future use. Aperio - Using Aperio wireless readers connected to an Aperio hub.
Reader Type
Select the installed reader type from the list of options. If you are setting up a keypad, see Configuring Keypads 168 . Note: To support Online/offline messages from a HID RK40 reader, select Multi-Card Format. For programming multi-card format readers, see Programming Card data Formats 170 .
Configuring Controllers - Technician Guide Parameter Reader Category Description Select a category for determining reader operation. Options are: No Special Category - Unused. Anti-Passback Enabled - Sets the area for anti-passback to prevent the same card from being used to gain access through the same door more than once. The method of passback reset can be set for timer and/or by a count of users according to the following settings. Passback Time - Set the time that a card is denied access after it has been used on the reader. This setting is in seconds unless the Time in Minutes option is enabled. Passback Count - Set the number of other cards that need to be used on the reader before a card that has been used on the reader can gain access again. Note: Anti-passback operation is automatically implied when using in/ out readers. IN/OUT Master Type Reader - Used in conjunction with in/out slave readers (see In/Out Readers 154 ). IN/OUT Slave Type Reader - Used in conjunction with in/out master reader (see above). The slave reader must have the next consecutive reader number from the master reader. The Shunt and Strike times can differ between the master and slave readers, even though the door connections are controlled through the master. Muster Reader - Used in situations where the users can swipe to be registered as out of the system. For example, in the case of a fire it can be used for the system to report if people are still in the building. If a reader is configured as a muster reader, it will reset the area the user is currently accessing. Enrolment Reader - Used to enrol cards and user PINs into the system. When a card is used the system creates a new database entry in GMS, registering the card enrolled number. Queuing Type - Contact Pacom Systems for information. Area No. Entering Enter the access control area number (1-254) that the reader controls access to. Note: This setting applies only if the Reader Category is set to In/ Out Master Type or In/Out Slave Type (see In/Out Readers 154 ). Area No. Leaving Shows the access control area number (1-254) that the reader controls exit from. As this is the area where the reader is located, this defaults to the area number. Note: This setting applies only if the Reader Category is set to In/ Out Master Type or In/Out Slave Type (see In/Out Readers 154 ). Area No. Configure Area Enter the access control area number for the reader (1-254). Click to open the Configuration for Area Profile dialog box, where you can configure the area profile for the area entered in the Area No. field (see Configuring Access Area Profiles 157 ). Select the access card data format from the list. The options are If the access card data is not a standard configuration, you can program the reader for the required data format by clicking Configure (see Programming Card Data Formats 170 ). Note: If the Reader Type setting is Multi-Card Format, you can select up to four other card data formats.
Format 1
Parameter Accept LED Control Duration to Activate for Valid Card Flash During Activation for Valid Card During Unlock During Embarrassment
Description Enter the time (in seconds) that the green LED is lit on the card reader after a valid card has been read. Enable to flash the green LED (instead of just being lit) during the Duration to Activate for Valid Card time. Select a behavior for the green LED while the door is unlocked/open. Options are On, Off or Flashing. Select a behavior for the green LED during the Embarrassment Timer setting (I/O Parameters 164 tab). Options are Do Nothing, Flash, On or Flashing then On. Enter the time (in seconds) that the red LED is lit on the card reader after a invalid card has been read. Enable to flash the red LED (instead of just being lit) during the Duration to Activate for Denied Card time. Select a behavior for the red LED while the door is locked. Options are On, Off or Flashing. Select a behavior for the red LED during the Embarrassment Timer setting ( I/O Parameters 164 tab). Options are Do Nothing, Flash, On or Flashing then On. Enter the time (in seconds) that the red LED is lit on the card reader after a read error. Enable to flash the red LED (instead of just being lit) during the Duration to Activate for Read Error time. Select a behavior for the buzzer during the Duration to Activate for Read Error time. Options are No buzzer during error, Buzzer On during error or Beep during error. Select a behavior for the Card Reader Interface buzzer when a valid card is swiped. Options are No buzzer, Continuous or Pulse. Select a behavior for the Card Reader Interface buzzer during the Embarrassment Timer setting (I/O Parameters 164 tab). Options are No buzzer, Continuous, Pulse. or Pulse and then Continuous. Select a behavior for the Card Reader Interface buzzer when an invalid card is swiped. Options are No buzzer, Continuous or Pulse. Select a behavior for the Card Reader Interface buzzer during reader interlocking (see Interlocks 155 ). Options are No buzzer, Continuous or Pulse. Enable to stop 1064 Card Reader Interface PCBs from flashing their operational LED. By default, the 1064 LED flashes every 10 seconds to indicate that it is operating. Note: This setting functions with a 1064 CRI with firmware 4.07 or above. A 1064 with firmware lower than 4.06 will not flash at all. A 1064 with firmware 4.06 will flash every ten seconds, regardless of the flag status.
Denied LED Control Duration to Activate for Denied Card Flash During Activation for Denied Card During Lock During Embarrassment
Denied LED Control During Read Error Duration to Activate for Read Error Flash During Activation for Read Error Unlabelled List
Parameter TZ no.
Description Click to open the Configuration for Reader Timezone dialog box, where you can select, edit or create a time schedule to apply to the relevant function (see Configuring Time Schedules 174 ). Any selected time schedule ID number is shown beside the relevant option During the selected time schedule, door alarms from the reader will not be reported. During the selected time schedule, the reader is locked automatically. During the selected time schedule, select this option for the door to be unlocked automatically. During the selected time schedule, the system will prompt the reader for PIN entry for users requiring PIN operation. During the selected time schedule, the reader will only check the facility field of the access card for the transaction.
to Inhibit Alarms to Keep Reader Locked to Keep Reader Unlocked for Entry of PIN Required: for System ID Only Required
Note: Time schedule operation for lock and unlock overrides any manual lock/unlock command sent to the reader from the GMS Reader/Elevator Status dialog box unless the Enable Timezone Override option is also selected.
Description Select to allow the system to automatically lock the reader when its area is in any of the modes selected in the Modes region (beneath). Select to allow the system to automatically unlock the door when its area is in any of the modes selected in the Modes region (beneath). Select to allow the system to automatically unlock the reader, but require a PIN for access, when its area is in any of the modes selected in the Modes region (beneath).
Configuring Controllers - Technician Guide Parameter Inhibit Alarm Modes Modes Description Select to allow the system to prevent the reader reporting alarms when its area is in any of the modes selected in the Modes region (beneath). Enable the checkbox next to each mode for it to perform the functions as detailed above while that area is in that mode.
Parameter Debounce Time for Door Contact Debounce Time for Egress Input Debounce Time for Strike Input Invert Strike Output Relay Invert Door Contact Invert Egress Input Invert Strike Input 1067/1076 Spare Output Operation
Description Enter a time (in milliseconds) for the system to wait for activation to restore the door input. You can filter noisy or poor contacts digitally by setting longer debounce times. Enter a time (in milliseconds) for the system to wait for activation to restore the egress input. You can filter noisy or poor contacts digitally by setting longer debounce times. Enter a time (in milliseconds) for the system to wait for activation to restore the strike input. You can filter noisy or poor contacts digitally by setting longer debounce times. Enable to reverse the polarity of the strike output relay so, for example, that 'closed' become 'open'. Enable to reverse the logic or state of the door contact so for example, that an 'alarm' report becomes 'secure'. Enable to reverse the polarity of the egress input so, for example, that an 'alarm' report becomes 'secure'. Enable to reverse the polarity of the strike input so, for example, that an 'alarm' report becomes 'secure'. 1067 and 1076 Card Reader Interface PCBs are equipped with an extra output point that you can activate in set circumstances. For example, to turn on a light (see Configuring Input and Output Points 108 ). Options are: None - Never activate the output. Activate during shunt timer - Activate the output during the Shunt Time timer. Activate on extended access - Activate the output during any extended access timer (Extended Shunt/Strike Time, Warning Time and embarrassment timers).
Strike Time
Enter the number of seconds that the door is unlocked for after a valid card is read. In Minutes - Enable this option to count the Strike Time setting in minutes. Permanent - Enable this option leave the door unlocked.
Shunt Time
Enter the number of seconds that the door contact alarm will be masked for after a valid card is read. In Minutes - Enable this option to count the Shunt Time setting in minutes. Permanent - Enable this option leave the door unlocked.
Configuring Controllers - Technician Guide Parameter Extended Shunt/Strike Time Description Enter the number of seconds to add to the Shunt Time and Strike Time settings for cardholders with the Extended Shunt/Strike Time option enabled in their cardholder profile (take longer to get through doors) (see Using GMS - Operator Guide, Using the Card Access Manager). Note: If the Dual Mode Exit Enable 157 option is selected for the area, then the two card reads required to send the system to Night mode must be completed within the Extended Shunt/ Strike Time setting. Warning Time Enable this option for a second embarrassment timer to count down before an alarm is reported, or activating an output. When selected, the Door warning to start after strike and Door warning output fields appear in place of the Extended Shunt/Strike Time and Remote I/O Address settings. Enter the number of seconds after the strike has been activated before activating the Door warning output to signify the door being open. This setting is displayed when Warning Time is selected. Enter the number of seconds after the strike has been activated before sounding the beeper to signify the door being open. This setting is used when the door strike and door contact are controlled by a remote device, so that the wiring for the door contacts cannot be accessed by ripping devices from the wall. This parameter is the RS485 address of a 1064 where the remote contacts are connected. 0 = not used. Select an output to activate after the Door warning to start after strike (second embarrassment timer) setting expires (see Configuring Input and Output Points 108 ). This setting is displayed when Warning Time is selected. This setting controls the locking behavior the door strike mechanism after a valid card swipe and is designed for different functionality based on the door lock type. Options are: Normal Strike Operation - Select to make the door strike reset as soon as the door is opened. If the door is not opened, the strike resets after the Strike Time setting expires. Door Bolt Mode - Select for electronically operated door locking bolts, where after the door is opened, the system waits for it to be fully closed again, regardless of Strike Time setting, before power can be applied to the locking bolt. Magnetic Lock Mode - Select for electronically operated magnetic door locks, where after the door is opened, the system waits for the Strike Time setting to expire before re-energizing the magnetic lock. Note: Whenever an opened door is closed it is immediately locked, regardless of lock mode.
Door warning to start after strike Embarrassment Timer to start after the Strike Remote I/O Address
Description Enable to prevent a card entering more than once through the same reader, or any other reader that it is interlocked with, before the card has exited (see AntiPassback 155 ).
Configuring Controllers - Technician Guide Parameter Keypad Device Address Enable Input for Permanent Unlock Input no. for Permanent Unlock Description Enter the hardware address of the keypad to obtain PIN entry for the reader. Enable to allow the reader to be unlocked when the Input no. for Permanent Unlock input is activated. Enter an input number that will unlock the reader when it is activated (through alarm operation). When the input is restored, the reader is also restored.
Keypad Configuration - These options appear only when the Reader Type setting is a keypad and the Reader Interface setting is a Pacom 1064, 1067 or 1076 type (set in the Reader 160 tab). Inactivity Timer No. of Digits to Enter Enter the time in seconds that the keypad allows after each key press before the user must re-enter their PIN. Enter the number of digits that make up a valid PIN code. Note: GMS requires a minimum PIN length of four digits. Set to use '*' as part of PIN data When selected, the reader will send all PIN data to the Controller, including asterisk ('*') characters. This is required for readers that are configured for mode changing on entry in order to change mode back again on exit. For example, a user enters through the reader, causing a change of mode. Then, on exit the mode can be changed back again by the user entering '0*' followed by their PIN. Enable the checkbox next to each reader number to interlock it. The reader will only allow access if all other readers that it is interlocked with are closed. Enable so that the Controller memory bytes usually used to store information about interlocked readers is used to store the address of the 1065 Elevator Controllers used for controlling each group of 16 floors. This option is displayed when the Elevator Reader option is enabled (Flags 166 tab). Enter the RS485 address of the 1065EC controlling each range of 16 floors. For the installation and configuration of elevator control, see the Hardware Installation Guide. These settings are displayed when the Elevator Reader option is enabled (Flags 166 tab). Select how users gain access using the reader. Options are: Card Only - Users must swipe a valid access card. Card Swipe before PIN entry - Users must swipe a valid access card then enter a valid PIN. Card Swipe after PIN entry - Users must enter a valid PIN then swipe a valid access card. Card or PIN - Users can either swipe a valid card or enter a valid PIN. Allow PIN/Card Swipe Outside PIN Timezones and PIN Modes Enable to allows users access by PIN entry or card swipe outside any specified time schedules or modes (Timezones 163 and Modes 163 tabs).
Interlock Parameters Readers to be Interlocked Use interlock bytes for elevator addr
Description Enable to allow dual user operation with a turnstile type access point. This allow the strike to activate twice and let two users enter after two cards have been
Configuring Controllers - Technician Guide Parameter Report Exceptions Only Clear Pass Back Memory on Other Readers Enable Strike Contact Monitoring Process Egress in the CRI Egress Activates Shunt Timer Only Store Code Locally for Degraded Mode Elevator Reader Description validated. Enable to report invalid transactions from the reader. No valid transactions are reported. Enable to clear the swiped card from the passback list (see Anti-Passback 155 ) of all other readers after a valid access. For example, an exit door. Enable for the strike input contact to report its state to the system. Enable to allow the reader to process egress button use, to actuate the door strike during degraded mode (see Configuring Degraded Mode Operation 181 ). Enable when an egress button is required only to disable the door contact input and not activate the strike. That is, door has a handle on the inside and the egress button is used to prevent a forced door alarm during exit. Enable to force the Card Reader Interface to check the access card mask and, if the mask is not stored in the CRI, it will add it to the list (see Configuring Degraded Mode Operation 181 ). Enable for an elevator car reader for floor access control. This option also changes the Keypads/Interlocks tab to allow the input of the Floor Relay Controller Addresses, which are the RS485 address of the 1065ECs used for each group of floors (see Keypads/Interlocks 165 tab). Enable so the door remains unlocked whilst the egress button is pressed. Enable so that the current user position is reset after a permanent unlock is complete. When a permanent unlock occurs, user location data is no longer valid because they can move freely through permanently unlocked points. Used in conjunction with the Enable Input for Permanent Unlock setting (see Keypads/Interlocks 165 tab). Enable to report valid transactions (per access control area) to the system, as 'Time in Attendance Transactions'. This allows GMS to provide Time in Attendance (T&A) Reports (for example, for payroll purposes). See T&A Reporting Example 168 . Enable so the reader, when used as a PIN pad, can be accessed using Alarm User Type PINs instead of a user access PINs (see Configuring Alarm Panel Types 64 and Configuring Alarm Users 97 ). Enable to report an alarm whenever the door has not been correctly sealed and the Shunt and Embarrassment timers have expired. Enable to report card transaction messages to a locally connected GMS machine. Messages will not be sent over any network connections. Enable to send a message to the monitoring system whenever the reader is accessed, and again when the reader is restored (resealed). Enable to prevent cardholders without a User Type assigned to them from accessing the area after it is sealed (see Configuring Alarm Panel Types 64 and Configuring Alarm Users 97 ). Enable to prevent the door strike from being activated when the user is exiting. Used when a card is required to seal an area, but access to the area is not required. In some instances, door strike activation can cause extra delays because of large timed bolts. Enable to send a message to the monitoring system whenever the egress button is pushed. Enable to generate Time In Attendance Reports data based on the state of the inputs of a 1064 Card Reader Interface. Contact Pacom Systems for further information. Enable so that card swipe in/out data is maintained when the reader is unlocked. Enable to report tamper messages from a tamper switch connected to a 1064 CRI input. Enable so that if a door is opened without a valid read (that is, forced open), the alarm is latched on and can only reset from GMS. Enable for the system to count the number of users in an area by incrementing the total up by 1 for each valid read. Used with a limited count area (see Configuring Access Area Profiles 157 ). Enable for the system to count the number of users in an area by incrementing the total down by 1 for each egress. Used with a limited count area (see Configuring Access Area Profiles 157 ). Enable to ignore user entry data from the reader for T&A reporting (see T&A Chapter 4 - Configuring Access Control | 167
Egress to Keep Strike Picked Reset User InOut when Alarm Secured
Always Report Ajar Alarms Report Card Transaction Messages Locally Only Report Access/Restore Messages Prevent Access When Area Sealed Do Not Activate Strike on Exit
Process Valid Cards During Unlock Report tamper from CRI Latch Door Alarms Enable Count Up
Configuring Controllers - Technician Guide Parameter Description Reporting Example 168 ). This option appears in place of Enable Count Up if the Enable Time and Attendance Reports option is enabled. Disable T&A Exit reports Enable to ignore user exit data from the reader for T&A reporting (see T&A Reporting Example 168 ). This option appears in place of Enable Count Down if the Enable Time and Attendance Reports option is enabled. Enable to extend anti-passback functionality to readers connected to other Controllers in the system. See Anti-Passback 155 . Enable so the Card Reader Interface reports the states of open and short circuit door contacts as trouble alarms. Note: The door contacts need to be terminated with end-of-line (EOL) monitoring resistors. Enable Buzzer/LED for Egress Process Multiple Swipes after Timer Expiry Enable so that the buzzer and LED are activated when the egress button is used. Enable so that events driven by double and/or triple badging must occur within the Inactivity Timer for Pin Entry setting for the access area (see Configuring Access Area Profiles 157 ), and that the event is triggered once the timer expires. When disabled, events driven by multiple swipes are processed immediately. See Configuring Reader Event Drivers and Macros 177 . Note: If the same card is not badged consecutively (that is, another card is badged), the timer will restart for the newly badged card. Note: If both double and triple badging event drivers are used, when a card is triple badged within the specified time, both double and triple badging events are triggered. Report Door Alarm as Supervisory Report Ajar Alarm as Day Local Report Ajar Alarm as Night Local Report Forced Alarm as Day Local Report Forced Alarm as Night Local Enable Auto Egress Activation when Contact Activates Enable so that door alarms are reported to a Pacom Base Station or third-party receiver as 'supervisory' messages. Ensure that the Supervisory Command option is enabled in the Controller Message Filters 61 dialog box. Report ajar alarms from the reader during Day mode to a locally connected GMS machine. Report ajar alarms from the reader during Night mode to a locally connected GMS machine. Report forced alarms from the reader during Day mode to a locally connected GMS machine. Report forced alarms from the reader during Night mode to a locally connected GMS machine. Enable so that if a secured door is opened without a card and/or PIN, an 'Egress' message is reported instead of 'Door Forced'. Ensure that the Magnetic Lock Type option is also enabled. This option is designed for free handle doors where egress wiring may be impractical. Caution: When enabled, 'Door Forced' messages will not be reported. Disable Door Access for Guard Tour Enable so that during a guard tour, all valid guard tour card transactions are processed by the reader, however, the reader does not provide access. Note: Normal user type cards operate with the reader as per normal.
Configuring Controllers - Technician Guide Cardholders required to use a PIN must have the Use PIN to Access option enabled and a PIN set in the PIN field of the Card Details tab in the Card Access Manager dialog box. If Card or PIN operation is used, the only duress PIN option available is Duress by PIN Incremented by 1 (see Configuring Access Area Profiles 157 ). Note: System administrators must ensure that PINs are not consecutive so that one user's PIN is not another user's duress PIN. In systems with many users this is usually best achieved by only allowing all odd or all even PIN numbers.
Description Enter the reader number in the adjacent field to copy the settings from. Enter the reader number (or the first reader in a range of consecutive readers) to copy the reader (Copy From Reader)settings to. Enter the last reader in a range of consecutive readers to copy settings to. To copy settings to a single reader, leave this field set to 0. Enable to automatically define the device address (see Setting Device Addresses and Address Ranges 159 ) for each reader you are copying settings to. The addresses are consecutive, starting from the reader number in the Copy to Readers setting.
After configuring the reader(s), click OK to close the dialog box and download the settings to the Controller.
Standard Format Example: For example, for a reader head that outputs 26 bit Wiegand and uses: A parity bit on either end of the key data. An 8 bit facility field length. An 8 bit issue field length. An 8 bit code field length. Set the card format data fields according to the following diagram. The field offsets are incremental, so each progressive field offset must include the previous field(s) offset and field length(s). GMS knows the overall key data length, so no information is required for the final parity bit.
Program the data format according to the parameters below. Note: Some parameters change depending on the card format you are programming. Parameter New Format Prev Next Delete Field Length Field Offset Field Type Description Click to clear all settings and create a new card data format. Enter a name for the format in the field beside the Save button. Click to revert the dialog box settings back to the previously saved card data format. Click to revert the dialog box settings to the next saved card data format. Click to remove the current card data format from the GMS database. Specify the length as the number of consecutive bytes/nibbles of data. Specify the offset as the start of the data to be interpreted by GMS. Specify the data portion required for Facility data. Unused - Select to ignore any field data. Bits - Select to specify field data in data bits (1 bit). Nibble - Select to specify field data in nibbles (4 bits). Bytes - Select to specify field data in bytes (8 bits). Include Facility Field in Mask for Degraded Check See Configuring Degraded Mode Operation 181 .
Configuring Controllers - Technician Guide Parameter Field Designator in Nibbles Description This is the number of nibbles used to report the Facility data to the GMS in transaction reports. Caution: Do not change this setting. Issue Field Data Specifications Field Length Field Offset Field Type Specify the length as the number of consecutive bytes/nibbles of data. Specify the offset as the start of the data to be interpreted by GMS. Specify the data portion required for Issue data. Unused - Select to ignore any field data. Bits - Select to specify field data in data bits (1 bit). Nibble - Select to specify field data in nibbles (4 bits). Bytes - Select to specify field data in bytes (8 bits). Include Issue Field in Mask for Degraded Check Field Designator in Nibbles See Configuring Degraded Mode Operation 181 . This is the number of nibbles used to report the Issue data to the GMS in transaction reports. Caution: Do not change this setting. Code Field Data Specifications Field Length Field Offset Field Type Specify the length as the number of consecutive bytes/nibbles of data. Specify the offset as the start of the data to be interpreted by GMS. Specify the data portion required for Code data. Unused - Select to ignore any field data. Bits - Select to specify field data in data bits (1 bit). Nibble - Select to specify field data in nibbles (4 bits). Bytes - Select to specify field data in bytes (8 bits). Include Code Field in Mask for Degraded Check Field Designator in Nibbles See Configuring Degraded Mode Operation 181 . This is the number of nibbles used to report the Code data to the GMS in transaction reports. Caution: Do not change this setting. GMS Profile Save Click to store the data card format in the GMS database. Note: You need to save any new format as a GMS profile in order order to be able to select it as a valid card data format
Configuring Controllers - Technician Guide Multi-Card Format Example: For example, for a reader head that outputs 34 bit Wiegand and uses: A parity bit on either end of the key data. A 12 bit facility field length. A 12 bit issue field length. An 8 bit code field length. Set the card format data fields according to the following diagram and parameters. The field offsets are incremental, so each progressive field offset must include the previous field(s) offset and field length(s).
Setting Parity Checking: 1. 2. 3. 4. Enter the key data length (bits) in the No. of Weigand Bits field. Enable a Parity Enable checkbox - the available bits become active (white) along the bar below the checkbox for the relevant Parity Check region. You can perform up to three separate parity checks. Right-click the rectangle in the bar that represents the parity bit - it will show as red. Left-click the rectangle(s) in the bar that represent the bits to check parity against - they show as blue.
Program parity checking according to the parameters below. Note: The table below lists only parity checking parameters that are additional to those available for standard format card programming (see Programming Readers for Standard Card Format 170 ). Parameter No. of Weigand Bits Description Enter the number of bits that make up the overall key data length (max. = 64). When you enter a value in the field, if any parity checking is enabled, the available bits become active in the parity bar. Enable to have the card data interpreted from right to left, instead of left to right. Enable to have the card data interpreted inversely. That is, 0s are read as 1s, and 1s as 0s. Enable to set a parity bit and the bits to check parity against. Specify the length as the number of consecutive bytes/nibbles of data. Specify the offset as the start of the data to be interpreted by GMS.
Description The hour settings that you program into the system for repeated use. To program a set of hours, proceed to enter the hours as required. Click OK to close the dialog box and add the settings to the Programmed Hours list. The next time you open the dialog box, the hour settings become available. See Quick Select 174 for how to apply Programmed Hours list settings. Enable the checkbox next to each day or holiday to activate the time setting fields for it. The Holiday types allow you to create up to three different holiday time schedules that you can set in the Yearly Calendar for various holidays (see Setting the Yearly Calendar 175 ). For example, you may have a holiday type to use when the premises is denying all access and another type that can allow access for part of the day. Note: If you had Holiday 4 time schedules configured from a previous version of GMS, these are automatically changed to Holiday 3.
Sunday to Holiday 3
Start Time
Enter the beginning time for the schedule (Shift) in 24 hour format. Times must increase from left to right across the three time shifts. Times must end by midnight, or else be configured in for the next day. Note: Times need to be set in multiples of 10 minutes. For example, '22:25' is not accepted, whereas '22:30' is. Note: You do not have to create schedules for all three shifts.
End Time
Enter the end time for the schedule (Shift) in 24 hour format. Times must increase from left to right across the three time shifts. Times must end by midnight, or else be configured in for the next day. Note: Times need to be set in multiples of 10 minutes. For example, '22:25' is not accepted, whereas '22:30' is. Note: You do not have to create schedules for all three shifts.
Quick Select
Used in conjunction with the Programmed Hours list. Select the required hours from the Programmed Hours list, then click Quick Select to apply
Configuring Controllers - Technician Guide Parameter Prev Next Description them. Click to load the settings for the next configured reader time schedule. Click to load the settings for the previously configured reader time schedule.
Note: If any shifts overlap, the settings of the last shift covering the time apply. For example, if shift 1 ends at 12:00 and shift 2 starts at 11:00, shift 2 settings will apply after 11:00. 3. Click OK to save the reader time schedules.
Description Enable the checkbox next to each date that you want to apply a holiday time schedule to. Right-click to display the Holiday Type list. Click to display the available holiday types (below the calendar), then click to select one and apply it. This setting will apply to subsequent holidays until you change the type. Click to display the calendar for the previous month. Click to display the calendar for the next month.
Description Lists all access areas for the Controller. Click the list next to the area number to select a time schedule by its ID number. Click to open the Configuration for Reader Timezone dialog box, where you can browse through the details of all configured time schedules. Use Prev TZ and Next TZ to switch between schedules. Click OK to apply a schedule and close the dialog box.
2.
Click OK to close the dialog box and download the settings to the Controller.
2.
Referring to the following section, enter parameters as required. Description Enable the checkbox next to the reader that the event driver can activate from. Note: 1057/1058 Controllers require firmware version 5.00 or later to support up to 64 different reader macros. Click to open the Configuration for Reader Timezone dialog box (see Configuring Reader Time Schedules 174 ), where you can select a reader time schedule. The reader can only initiate the event driver during the selected time schedule. The number of the time schedule appears in the to Trigger this Event field. Select a reader event to initiate the event driver (activate an output) as detailed in output control: Undefined - No action is taken. Event active when valid card accepted - The event driver initiates when a valid card is used on the reader. Event active when card denied - The event driver initiates when an invalid card is used on the reader. Event active when contact alarm active - The event driver initiates when the reader contact goes into an alarm state. Event active when strike alarm active - The event driver initiates when the reader strike goes into an alarm state. Event active when any readers locked - The event driver initiates when the reader is locked. Event active when any readers unlocked - The event driver initiates when the reader is unlocked Event active when duress PIN entered - The event driver initiates when a user enter a duress PIN. Event active when invalid PIN entered - The event driver initiates when a user enters an invalid PIN. Event active when any reader is interlocked - The event driver initiates when the reader becomes interlocked. Event active when egress activated - The event driver initiates when a user presses the egress button. Event active when extended strike enabled - The event driver initiates when any extended strike time starts.
TZ no.
Event Type:
Configuring Controllers - Technician Guide Parameter Description Event active when card blocked - The event driver initiates when a blocked card is used on the reader. Event active when card expired - The event driver initiates when an expired card is used on the reader. Event active when card anti-passback - The event driver initiates when a card is passed back for use on an anti-passback reader. Event active when card in/out error - The event driver initiates when the reader generates an in/out error. Event active when valid guard tour - The event driver initiates during a valid guard tour. Event active when card traced - The event driver initiates when a traced card is used on the reader. Event active when unmasked door contact active - The event driver initiates when the unmasked reader contact goes into an alarm state. Event active when dual swipe with same card - The event driver initiates when a card is used twice in succession on the reader. The time for the swipes can be limited. Event active when triple swipe with same card - The event driver initiates when a card is used three times in succession on the reader. The time for the swipes can be limited. Event active when valid system ID card - The event driver initiates when a card with a valid facility code (system ID) is used on the reader. Event active when Door Ajar - The event driver initiates when the reader generates a 'Door Ajar' message. Event active when Door Forced - The event driver initiates when the reader generates a 'Door Forced' message. Output CCTV Trigger On/Off Permanent Activation Time Time in Min. Prev Next 3. Select for the event driver to switch an output. Enter the output number in the Output field. Select for the event driver to switch a CCTV camera. Enter the camera number in the CCTV field. Select for the event driver to run a macro. Enter the macro number in the Trigger field. See Creating Macros 141 . Select the behavior for the selected Output, CCTV or Trigger. The event driver can either turn it ON or OFF. Enable to permanently activate the Output, CCTV or Trigger until it is reset from GMS. When selected, you cannot set an Activation Time. Enter the time (in seconds) for how long to activate the Output, CCTV or Trigger for. This option is disabled if the Permanent option is enabled. Enable to count the Activation Time setting in minutes. Click to go back to the previously created event driver settings. After making settings, click to create a new event driver.
Click OK to close the dialog box and download settings to the Controller.
2.
Referring to the following section, enter parameters as required. Description Select a card type to configure from the list. Use and to scroll through all card types. Any settings changed will apply to the card type selected. Enable to activate the warning controls for the number of this card type allowed in any access area. The system warns when the Warning Count setting is reached. Enter a number for the maximum allowable cards of this type in any access area. When the setting is reached, an output, CCTV, or trigger is activated. Select for the Warning Count to switch an output ON. Enter the output number in the Output Number field. Select for the Warning Count to switch a CCTV camera ON. Enter the camera number in the CCTV Number field. Select for the Warning Count to run a macro. Enter the macro number in the Trigger Number field (see Creating Event Drivers and Macros 141 ). Enter the time (in seconds) for how long to activate the Output, CCTV or Trigger for. Enable to count the Activation Time setting in minutes. Select to enable a maximum limit on the number of cards of this card type. Enable to activate the limit controls for the number of this card type allowed in any access area. The system prevents access to the card type when the Maximum Count setting is reached. Access is allowed when the number drops below the Maximum Count setting. Enable to allow access beyond the Maximum Count setting. Every time access is given over the Maximum Count setting, the selected output, CCTV, or trigger is activated. Select for the Maximum Count to switch an output ON. Enter the output number in the Output Number field. Select for the Maximum Count to switch a CCTV camera ON. Enter the camera number in the CCTV Number field. Select for the Maximum Count to run a macro. Enter the macro number in the Trigger Number field (see Creating Event Drivers and Macros 141 ). Enter the time (in seconds) for how long to activate the Output, CCTV or Chapter 4 - Configuring Access Control | 179
Warning Count Output CCTV Trigger Activation Time In Minutes Maximum Limit Control Maximum Count
Allow Access Over Maximum Count Output CCTV Trigger Activation Time
Configuring Controllers - Technician Guide Parameter In Minutes Months used before card disabled Set for allowing card type to reset latched door alarms Allow Passback Override Auto block card after 5 invalid attempts (Card only or Card with PIN) Allow access in Security level 1/5 Allow access in Security level 2/6 Allow access in Security level 3/7 Allow access in Security level 4/8 Description Trigger for. Enable to count the Activation Time setting in minutes. Enter the number of months to elapse since the card type was last used before denying access to the card type. A setting of 0 means indefinite. Enable to have the system reset any latched door alarms when this card type is used. Enable to have the system allow passback (if anti-passback is enabled) when this card type is used. Enable to have the system block access to this card type after five failed card or card with PIN access attempts. Enable to have the system allow access to this card type if the area is currently on Security Level 1 or 5 (see Setting Security Levels 180 ). Enable to have the system allow access to this card type if the area is currently on Security Level 2 or 6 (see Setting Security Levels 180 ). Enable to have the system allow access to this card type if the area is currently on Security Level 3 or 7 (see Setting Security Levels 180 ). Enable to have the system allow access to this card type if the area is currently on Security Level 4 or 8 (see Setting Security Levels 180 ).
Note: The 1064 with v4.xx firmware can store from 96 to 384 cards, depending on the configuration of Facility, Issue, and Code. Please contact Pacom for more information.
Configuring Controllers - Technician Guide 2. Click the Flags tab and enable the Store Code Locally for Degraded Mode option, then click OK.
Wiring Information
You need to connect the Pacom Controller to the Wyreless Panel Interface Module (PIM) using the RS485 port. Note: Only Wyreless PIMs can be connected to a Pacom RS485 port configured for Wyreless. The following diagram outlines required wiring and RF connectivity.
3. 4. 5.
Enable the Port Parameters option. Click the RS485 port image that the PIM is connected to. The Port Protocol Parameters dialog box opens for it. In the Protocol list select Wyreless Access Protocol.
Configuring Controllers - Technician Guide Caution: Only Wyreless PIMs can be attached to the RS485 port used for the Wyreless Access Protocol. Other devices attached to the same RS485 port may not operate correctly. 6. 7. 8. 9. In the Address Range list select the appropriate address range (in groups of 64) that the WAPMs are configured in. Click Download to save the settings to the Controller, then click Close. In the Port Protocol Parameters dialog box click Close. In the Controller dialog box select Access Control > Hardware > Readers. The Configuration for Reader dialog box opens.
10. In the Reader Interface list select Wyreless Access Point. 11. In the Device Address field enter the appropriate address. Note: The device address of a WAPM configured using the third-party software must be incremented by 1 to be compatible in GMS. For example, if a WAPM is configured in the third-party software as address 3, it is configured in GMS as address 4. 12. Configure all other parameters as per a standard reader, then click OK to save the settings and close the dialog box.
4. 5. 6. 7.
In the Enter Code field type the license code (in hexadecimal format). In the Enter Limits field type the number of card readers to be supported. Click OK to close the dialog box and save the settings Click OK to close the Controller License Options dialog box.
Configuring Controllers - Technician Guide 4. 5. Default communication settings is displayed. Click Download to save the settings to the Controller, then click Close.
Aperio readers are auto-detected on the RS485 port and have a default configuration applied to them. Note: Messages from Aperio lock-readers are reported in the Transaction Manager. Aperio lock-readers can report battery low and online/offline status.
2. 3. 4. 5.
The Port 1 and Port 2 settings represent port numbers on the device. If left at '0', it defaults to: Port 1 = 2000 (the command port) and Port 2 = 5000 (the event port). In the Protocol list, select IP Series Lock. From the adjacent list, select TCP. In the Local Port list, select the Controller port to which the lock is connected. In the IP Address field enter the IP address of the device. The IP address cannot be assigned using GMS and should be available from IT administrators or installers. Note: The Login Name and Password Index settings are not required.
6.
Click Download, then check to see whether an online message is reported in the Transaction Manager.
Once the lock comes online, its clock is updated to match that of GMS. Note: Messages from S&G IP Series locks are reported in the Transaction Manager. Locks can report tamper and online status.
2. 3.
In the Function Code field type 21. In the Command Data field, program the lock using the following ASCII format: '68,xx,yy,zz', where: 68 denotes communication to S&G IP Series locks. xx is the index number of the lock. 0 is the first lock, 1 is the second lock and so on. yy represents the number of bytes that make up the command, so the lock can determine the end of the command. zz represents the actual configuration command. Some of the IP Series commands supported are: US - add lock user (represented in ASCII as '85,83'). HA - enable previously added lock user (represented in ASCII as '72,65'). DE - disable previously enabled lock user (represented in ASCII as '68,69').
Configuring Controllers - Technician Guide BU - delete previously added lock user (represented in ASCII as '66,85'). For example, '68,2,9,85,83,1,6,5,4,3,2,1' represents communicating with a SG IP Series device (68); index number 2 (2), which is lock 3; a following command byte code length of ten bytes (9); lock command US to add a user (85,83) [two bytes]; a user ID number of 1 (1) [one byte]; a six-digit PIN for the user that is 654321 (6,5,4,3,2,1) [six bytes]. Note: If you are configuring several locks, save the command and re-use it (see Controller User-Defined Commands 86 ). 4. Click Send. The Transaction Manager will show a 'Security Modified' message if the command is accepted, or an 'Authority Denied' message of the command has failed. Note: All IP Series lock commands are supported, however, reply messages other than acknowledge or deny are ignored by GMS. For more command information refer to S&G IP Series protocol documentation. The following example command adds user '1' with password '654321' on the third lock '2':
blank page
Chapter
191
Configuring Controllers - Technician Guide Pacom Controllers can control and monitor elevator floor access. There are two interfaces configured for elevator control: a High Level Interface (HLI) and a Low Level Interface (LLI). It supports Kone and Otis elevator systems using HLI, and other elevators by LLI. High level interfacing is where the Controller talks to third-party Elevator Security Systems. Low level interfacing is using a Pacom 1065EC. The following provisions on Pacom Controller support elevator functionality: RS232, 2 wire RS485 and 4 wire RS422 for HLI (RS422 is not available on 1058 Controllers). Support for up to 64 elevators, with a maximum of 128 floors. GMS is required to configure elevator functionality, and to manage the card access database. Each elevator car must be fitted with a Pacom compatible card reader. The readers are assigned numbers from 1 64. The corresponding elevator must have the same number as the reader. On a LLI configuration, each card reader can control eight elevator controllers (Pacom 1065EC), and each elevator controller can control 16 floors. Pacom Controllers can obtain the current elevator floor location (floor level) from a Pacom 1065EFM or 1064EFM. GMS can use this to display a graphical representation of elevator position. Note: The current elevator floor number can be available from HLI, however, this is not a standard feature.
3. 4.
Select the Port Parameters option, then click the port that the third-party elevator security system is connected to. The Port Protocol Parameters dialog box for the port opens. In the Port Protocol Parameters dialog box, from the Protocol list select Elevator Interface. The Elevator Interface parameters appear.
5.
Enter the elevator parameter according to the following section. Description See Asynchronous Driver Parameters 45 . Select the type of elevator connected. Supported types are Kone and Otis. Note: Schindler is in the menu, but is not supported.
Groups (Banks)
Enable the checkboxes for the number of banks that will be used. Applies to Otis and Kone systems, with either capable of handling multiple banks of elevators. Note: Readers are numbered from 1 - 64. It is a requirement that the elevator has the same number as its reader. By assigning matching reader and elevator numbers, it is not possible to have more than one card reader in an elevator.
Enter the number of floors that an elevator will service (max. 128).
Configuring Controllers - Technician Guide Parameter Slow poll time Description Enter the number of seconds that the system will wait between polling the elevator for its position if an elevator bank stops responding within normal polling time. Enter the time (in multiples of 100 milliseconds) for the system to wait for a response to a message. Enter the number of times that the port attempts to send a message without getting a response before the marking the elevator bank as offline.
Click Download to save the new settings, then click Close to close the dialog box.
Configuring Elevators
The following procedure apply to both HLI and LLI. There are minor differences in configuration options which are shown. 1. 2. Open the Controller dialog box and select the required Controller (see Using the Controller Dialog Box 19 ). In the Controller dialog box select Access Control > Elevators > Elevator Settings. The Configuration for Elevator dialog box opens. Configure the elevator parameters according to the following sections.
Configuring Controllers - Technician Guide Parameter Floors Serviced Select All Deselect All Floor Relay's Controller Address Area Configuration Apartment Mode Description Enable the checkbox next to each floor number for the elevator to service it. Floors 1-64 as shown by default, click Floors 65-128 to display floors 65-128. Click to enable the checkbox for all floors. Click to disable the checkbox for all floors. Enter the device loop address of the 1065EC controlling the specified floors. For example, floors 1-16 are controlled by a 1065EC with a device loop address of 11. This option applies to LLI only. The area with which the elevator is associated (see Configuring Access Area Profiles 157 ). Enter the time (in seconds) that a floor remains off security when triggered from an input. For example, in an apartment building, a tenant on the fifth floor can set a floor to be off security to allow a guest to enter the elevator and press the fifth floor button without requiring a card. In this mode of operation the inputs on 1065EC are not used for button press feedback (see the 1065EC Installation Manual, option 3 Configuration). This option applies only to the 1065EC and not to the elevator HLI.
Parameter TZ no.
Description Click to open the Configuration for Reader Timezone dialog box, where you can browse through the details of all configured time schedules. Use Prev TZ and Next TZ to switch between schedules. Click OK to apply a schedule and close the dialog box. Shows the selected time schedule number.
Description Enable to discontinue HLI elevator control. For HLI, ensure this option is disabled. Note: You can use a combination of HLI and LLI on the same elevator. For example, LLI for fast response and floor access, and HLI for status information (that is, which floor the elevator is on), then disable this option.
Enable so that only secure floors (those with access control) chosen by elevator users are reported to GMS. See Configuring Floor Access 198 . Enable so that the floors chosen by elevator users are not reported to GMS. Note: This option overrides the Only report secure floors chosen option. Enable to prevent the system reporting which floor it is on to GMS.
After configuring the elevator(s), click OK to close the dialog box and download the settings to the Controller.
Description Enter the elevator number in the adjacent field to copy settings from. Enter the elevator number (or the first in a range of consecutive elevators) to copy the elevator (Copy From Elevator) settings to. Enter the last elevator in a consecutive range to copy settings to. To copy settings to a single elevator, leave this field set to 0. Enable to automatically define the device address (see Setting Device Addresses and Address Ranges 159 ) for each elevator you are copying settings to. The addresses are consecutive, starting from the elevator number in the Copy to Elevators setting.
Description Enable the checkbox next to each elevator that will provide unrestricted access during the time schedule. Only available elevators can be enabled. Click to open the Configuration for Reader Timezone dialog box, where you can browse through the details of all configured time schedules. Use Prev TZ and Next TZ to switch between schedules. Click OK to apply a schedule and close the dialog box. Shows the selected time schedule number. Enable the checkbox next to each floor number for the elevator to service it with unrestricted access. Floors 1-64 as shown by default, click Floors 65-128 to display floors 65-128. Click to enable the checkbox for all floors. Click to disable the checkbox for all floors. View the previous unrestricted floor access configuration. View the previous unrestricted floor access configuration (max. 32). Click to clear all fields back to default values for the current floor access configuration.
3. Click OK to close the dialog box and download the settings to the Controller.
3. 4.
Select a card reader by typing a number in the adjacent field and clicking Reader Number. Or, use and to scroll through all readers. All configuration options are applied to the reader with the ID number displayed here. Click the Flags tab, and enable the Elevator Reader option.
5.
Click the I/O Parameters tab, and set the Extended Shunt/Strike Time setting to 0.
6.
Click OK to close the dialog box and download the settings to the Controller.
Chapter
201
Configuring Controllers - Technician Guide This section contains information about Pacom Controller Building Management Systems (BMS) functionality, and the configuration requirements for BMS.
Overview
Building Management Systems are designed to operate a range of building services that are wired to operate using a centralized controller. For example, to control lights and air-conditioning or heating systems. There are a number of manufacturers producing BMS hardware, many of which utilize the industry standard BACnet and Modbus protocols for communications. Pacom Controllers support both BACnet and Modbus protocols, so that they are compatible with most building management controllers. To configure the system to use these protocols, see: Configuring BMS BACnet Protocol 203 . Configuring BMS Modbus Protocol 206 .
Description Enter the time in minutes for how often the BMS analog input and pulse count data from the Controller hardware device configuration is sent to the Controller TFTP message queue. Once in the TFTP message queue, the update time in the TFTP server settings control when the data is forwarded to a TFTP server (see the Peer To Peer Configuration Guide, TFTP General Operation). Enable so that BMS analog input and pulse count data from the Controller hardware device configuration is sent to the Controller TFTP message queue at midnight each day. Once in the TFTP message queue, the update time in the TFTP server settings control when the data is forwarded to a TFTP server (see the Peer To Peer Configuration Guide, TFTP General Operation). When enabled this setting overrides the Time to update data to TFTP server setting. Enable the checkbox next to each BMS protocol you want to configure the system to use. Options are: BACnet only enabled - Allows for up to 32 digital inputs and up to 64 digital outputs. No allowance for Modbus. Modbus only enabled - Allows for up to 256 digital inputs, 64 digital outputs and 16 analog inputs. No allowance for BACnet. BACnet and Modbus enabled - Allowance for both BACnet and Modbus. Allows for up to 32 digital inputs and up to 64 digital outputs for BACnet. Allows for up to 32 digital inputs, 16 digital outputs and 16 analog inputs for Modbus.
Midnight
Enable Protocol
Description Enter the Controller port number to use for BACnet. Note: Currently this must be the Ethernet port.
Select the link layer protocol to use for BACnet operation. Note: Currently only BACnet/IP protocol supported.
Enter the Controller ID number. This associates the Pacom Controller with the BACnet device. Enter the number of the BACnet network that the Pacom Controller is on. Enter the number of retries that the Controller will attempt to contact the BACnet device without a response before communication using BACnet is marked as offline. Enter the time in seconds that the Controller will wait for a response before ending the communications attempt. For future use only. For future use only. For future use only. Enter the time in minutes over which the Pacom Controller will keep contacting the BACnet device until it is enrolled.
APDU timeout APDU segment timeout Tx. Segment window size Rx. Segment window size Alarm Enrolment Time
Configuring Controllers - Technician Guide Parameter BACnet UDP Port Description Enter the UDP port number to use for BACnet. Note: Port 47808 is the recommended port for BACnet. Address of BBMD For future use only.
Parameter Input No. Notify Device Notification Class Object Type Object Instance Event Type Point Type Point Number Delete Copy
Description Enter the ID number for the input. Or, use Click Input No. to load its settings. For future use only. Enter the ID number of the remote BMS device. For future use only. Select the type of the object assigned to this input. For example, if the object is a light on/off switch, select binary value. Object number of the object inside the remote device. For future use only. Select if the input is a normal input or an analogue input. For future use only. Delete current input. Copy the parameters from an existing input to this input (see Copying Settings To/From Other BACnet Settings 205 ). and to scroll through all inputs.
Description Enter the ID number for the action. Or, use Click Action No. to load its settings. and to scroll through all actions.
Select how the action is to be performed on the 'present value' of the object in the remote device. Currently, only the Write Property option is supported. Enter the device number of the remote BMS device.
Configuring Controllers - Technician Guide Parameter Object Type Object Instance New "Present Value" Output Point Number Delete Copy 2. Description Select the type of the object assigned to this input. For example, if the object is a light on/off switch, select binary value. Object number of the object inside the remote device. For future use only. For future use only. Delete current action. Copy the parameters from an existing action to this action (see Copying Settings To/From Other BACnet Settings 205 ).
Click Reboot to load the BACnet protocol settings on the Controller for them to apply. Click OK to close the dialog box.
Description Enter the BACnet configuration number in the adjacent field to copy the settings from. Enter the BACnet configuration number (or the first BACnet configuration in a range of consecutive BACnet configurations) to copy the BACnet configuration (Copy From) settings to. Enter the last BACnet configuration in a range of consecutive BACnet configurations to copy settings to. To copy settings to a single BACnet configuration, leave this field set to 0.
to
Note: If the required device type or a specific input/output type does not appear in the list, contact Pacom support.
Description Enter the ID number for the input. Or, use Click Input No. to load its settings. and to scroll through all inputs.
Select the port that has been configured with the Modbus Protocol. Items in black text show the ports that have been configured. Select the device that is to be used. Select the device that is to be used. Devices currently supported are: Hsiang Cheng HC6000 Power Meter. Advantech ADAM-4068 Relay Output Module. Advantech ADAM-4055 Input Output Module. Liaison PLC Device Module.
Enter the address of the device. Select the digital input number on the selected Device Type option. Delete current digital input. Copy the parameters from an existing digital input to this digital input. (see Copying Settings To/From Other Modbus Settings 207
Description Enter the ID number for the output. Or, use and outputs. Click Output No. to load its settings. to scroll through all
Select the port that has been configured with the Modbus protocol. Items in black text show the ports that have been configured. Select the device that is to be used.Select the device that is to be used. Devices currently supported are: Hsiang Cheng HC6000 Power Meter. Advantech ADAM-4068 Relay Output Module. Advantech ADAM-4055 Input Output Module. Liaison PLC Device Module.
Enter the address of the device. Select the Digital Output on the Device Type selected. Delete current digital output. Copy the parameters from an existing digital output to this digital output. (see Copying Settings To/From Other Modbus Settings 207
Parameter Input No. Modbus Port Device Type Device Address Analog Input Type Delete Copy
Description Enter the ID number for the input (max. 16). Or, use all inputs. Click Input No. to load its settings. and to scroll through
Select the port that has been configured with the Modbus Protocol. Items in black text show the ports that have been configured. Select the device that is to be used. Enter the address of the device. Select the Analog Input on the Device Type selected. Delete current analog input. Copy the parameters from an existing analog input to this analog input (see Copying Settings To/From Other Modbus Settings 207 ).
Description Enter the Modbus configuration number in the adjacent field to copy the settings from. Enter the Modbus configuration number (or the first Modbus configuration in a range of consecutive Modbus configurations) to copy the Modbus configuration (Copy From) settings to. Enter the last Modbus configuration in a range of consecutive Modbus configurations to copy settings to. To copy settings to a single Modbus configuration, leave this field set to 0.
to
Description Enter the ID number of the macro (max. 170). Or, use and through all BMS macros. Click Macro No. to load its settings. to scroll
Select the method of counting. That is, what to count. Options are: Pulse Counter - Increments the count every time the device activates. People Counter - Increments the count for valid card swipes only.
No Condition
Enter the ID number of the device that is providing the count. Select the condition (rule) type that has to be met in relation to the Count setting to activate the Output Type setting. Options are: Undefined - No condition is checked for and the macro does not activate any output. Equal To - The output will activate when the Count setting is reached. Greater Than - The output will activate when the Count setting is passed. Less Than - The output will activate when the Count setting is not reached. Greater Than and Equal To - The output will activate when the Count setting is reached or passed. Less Than and Equal To - The output will activate when the Count setting is reached or not reached.
Enter the value that the Condition setting watches for to activate the Output Type setting. Select what to activate if the condition is met. Options are: GPO - Select for the macro to activate an output. Enter the output ID number in the Output Number field. CCTV - Select for the macro to activate a CCTV camera. Enter the camera ID number in the CCTV Number field. Trigger - Select for the macro to activate a trigger (for another macro). Enter the trigger ID number in the Trigger Number field.
The number of seconds (or minutes if the In Minute option is enabled) that the output is activated for. Enable for the Activation Time setting to be in minutes instead of seconds.
Description Click after entering the Controller input number in the adjacent field (max. 32). Or, use and to scroll through all inputs. The device that is providing the input signal (for example, a Pacom 1064) needs to be set as a pulse counter. Select the pulse counter category, which defines how the count is used. Options are: Normal Pulse Counter - The count is based on a signal being monitored by the system. This could range from an I/O device that can be used as a counter (for example, a 1064 CRI), which counts the number of door openings to monitoring an electrical output for changes in values that will count as a pulse. Card Counter - The count is not incremental in that it is designed to be used in ensuring that a single person has passed into an area after a valid card swipe. The system requires a detection device in addition to the card reader that is able to 'see' how many people have passed it. For example, having a turnstile in conjunction with the reader that will cause the system to perform some action if the turnstile is operated more than once after a single valid card swipe. That is, the system is double-checking that one person passes into an area per card swipe. This type of feature can be used where, after a valid card swipe, you want to double-check that the user has gone on to enter a particular area. Area People Counter - The count is based on number of users in the area the counter belongs to. This is used in conjunction with an I/O device that can be used as a counter, which is set to increment by one when there is a valid access to an area and to decrement by one for each egress from the area. This can be used in conjunction with area profile settings to prevent more than a set number of people being in an area at the same time. Another example can be a access controlled car park, where the number of vehicles entering and leaving is counted so that when the car park is full a sign can be illuminated.
Category
Area Trigger
Enter the area number for the pulse counter to operate in. Enter the trigger ID number for the pulse counter to work in conjunction with. The trigger looks at the relevant pulse counter and performs its actions according to the counter rules. Enable for the Transaction Manager to display pulse count change messages. That is, each time the counter changes.
Click OK to close the dialog box and download the settings to the Controller.
Chapter
Using the IVR Facility
211
Configuring Controllers - Technician Guide The GMS interactive voice response (IVR) facility allows engineers to call a GMS workstation in order to place a site in Suspend mode and to send commands to Controllers. IVR requires a voice over Internet protocol (VoIP) and/or ISDN (using Dialogic hardware) drivers for operation. Suspend mode is a temporary system mode that disables alarm reporting for the purposes of testing input and output points for correct operation. An example of use would be a technician on site wanting to check the operation of input points. They could use IVR to call in and place the site in Suspend mode. Then, walk around to the various input points and activate them - GMS keeps a record of all point activity during Suspend mode. The technician can then use IVR to play back all the events that have been recorded during Suspend mode for the site, confirming the operation of each tested input point. Note: A site can be entered into Suspend mode only from Day mode. Note: If a site (master) has other sites linked to it (slaves) that will normally follow its mode changes, you can control whether or not they will follow the master site into Suspend mode using the GMS32.INI file on the GMS server. In the GMS32.INI file, under [SYSTEM PARAMETERS] add the line Linked RTUs=x, where x = 0 for linked sites to ignore the master site entering Suspend mode, or x = 1 for linked sites to follow the master site into Suspend mode. In cases where linked sites are being used in this way, the Summary Manager may require holding the SHIFT key whilst refreshing the display for the site colors to update. IVR callers must supply a valid user ID number and PIN as well as an overall system security code in order to gain access to IVR menus. In addition to the log on requirements, callers must also be: In the GMS global contacts list. Categorized as 'Engineer' user type. The following image shows the general IVR structure. For information on configuring the IVR facility, see Configuring GMS - Administrator Guide, Configuring IVR Operation.
Logging On to IVR
To log on to the IVR facility, proceed as follows: 1. Call the GMS workstation. When the IVR facility answers, you are prompted for a: User ID number. PIN. Security code (this is common for all IVR users). Enter security credentials as required. When the system logs you on, the main menu options are presented.
Configuring Controllers - Technician Guide 1. 2. 3. 4. Call and log on to the IVR facility. You will immediately be able to interact with the site you previously placed into Suspend mode. Select the option for changing Suspend mode time. Enter the new length of time for Suspend mode to last for. Select the option to confirm the request. The site Suspend mode time is amended and begins counting down.
Once you have begun playing back events, use the stated options as required to replay an event message or abort event play back.
blank page
Chapter
215
Configuring Controllers - Technician Guide Pacom 1057 and 8001 Controllers indicate current operating conditions on a seven-segment LED display, located on the front panel. There are two sets of characters, one set that is displayed on start-up during self test and initialization, and one that is a running diagnostic, displayed at any time after start-up.
Initialize alarm panel and access control modules. Initialize PSP, BMS and software download modules. Cold start initialize of all ports. Initialize all ports. Blank - finished stage two initialize. Blank display Cycles and displays running diagnostic codes (see table below). Outer segment cycle
Decimal point
blank page
Chapter
GMS Config Application Information
219
Configuring Controllers - Technician Guide GMS Config is a license-free version of GMS without access control, card management and other database related GMS features. It is designed for Pacom technicians to perform Controller and hardware configuration on individual sites. This is carried using direct cable connection between the computer running GMS Config and the target Controller (site). Note: GMS Config cannot be installed on a computer that has an existing version of GMS installed. GMS Config cannot connect to a Base Station or TransIT, only directly to a Controller. The operation of GMS Config is identical to standard GMS, so there is no additional learning or other procedures to understand. It is the reduced feature set and limited connectivity only that are different between the two. In order for GMS to track configuration changes and identify the user responsible, previous versions of GMS Config would send the GMS Config dongle number as the identifier. In the license-free GMS Config application, because no dongle is required, the serial number of the hard drive (in decimal format) that GMS Config is installed on is used as the identifier. The identifier is recorded in the GMS transaction log as part of configuration change records.