WestinghouseメーカーSE 6000の使用説明書/サービス説明書
ページ先へ移動 of 180
W estinghouse Security Electronics an ISO 9001 certified company 5452 Betsy Ross Drive Santa Clara, CA 95054-1184 (408) 727-5170 FAX (408) 727-6707 P/N 66107919001, Rev.
LIMITED WARRANTY Westinghouse Security Electronics (WSE) warrants to the original user the equipment manufactured by WSE as described herein (the equipment) to be free from defects in material and wor.
iii T ABLE OF C ONTENTS SECTION 1: INTRODUCTION .................................................... 1-1 MANUAL ORGANIZA TION ............................................................................... 1-1 System Main Menu ........................
iv Doors .......................................................................................................... 2-6 Select Zone ................................................................................................. 2-6 REVIEW TRANSACTIONS (FULL SCREEN) .
v Keyholder Access Entry [empgentr] ............................................................ 4-5 Project Assignment [epj_entr] ..................................................................... 4-6 COPY KEYHOLDERS ..............................
vi Reader Access Assignment ........................................................................ 5-5 Reader Assignment — Sample Report ....................................................... 5-5 ACCESS DEFINITION ................................
vii SECTION 6: SYSTEM ADMINISTRA TION ................................. 6-1 INTRODUCTION ............................................................................................... 6-1 SECTION ORGANIZA TION ........................................
S ECTION 1: I NTRODUCTION 1-1 S ECTION 1 INTRODUCTION MANUAL ORGANIZA TION This manual follows the order of the seven standard product items in the system main menu, with the Key Inventory and Parking.
1-2 S ECTION 1: I NTRODUCTION Documentation Methods To avoid repetition and to reduce document size, detailed explanations for the system's principal data items are given only in Section 4: Master File Entry , which is used when creating the system database.
S ECTION 1: I NTRODUCTION 1-3 Keyholder ID . Keyholder's ID number. The unique ID number is used by the computer to keep track of all activity for that person. Once entered, the keyholder ID cannot be changed. Location . Location of the office or branch of the company to which a keyholder is assigned.
1-4 S ECTION 1: I NTRODUCTION Readers Digital Key Reader . Reads the unique number of 1 to 5 digital command keys simultaneously at a range of up to 36 inches. Keypad Controllers . The keypad controllers, normally used in conjunction with an ACU, provide additional security by requiring a personal identification number (PIN) entry.
S ECTION 1: I NTRODUCTION 1-5 Multiple Switch Monitor (MSM) . The MSM is a four-contact switch box that is connected to a WSE ACU and the MSM provides four contact-closure inputs. Points . A point is any basic element of an access control system, such as a door switch, an alarm contact, an output switch.
1-6 S ECTION 1: I NTRODUCTION Response Time . The SE 6000 is capable of fast response times in both single and multiple site configurations. Fast response times are important for security personnel who monitor alarms and are always appreciated by keyholders wishing to enter locked doors.
S ECTION 1: I NTRODUCTION 1-7 Multiple Occupancy Feature. Similar to the two-man rule except that it requires that two keyholders enter and leave a specified zone together; refer to Section 4 for details.
1-8 S ECTION 1: I NTRODUCTION CREA TING THE DA T ABASE Once the system is in place, first obtain the following from the system installer: System Interconnect Diagram . This shows all wiring and connections in the system, and provides information needed for entering pollers, devices, readers, and points.
S ECTION 1: I NTRODUCTION 1-9 1. Following the System Interconnect Diagram , number each element in turn with a four-digit number, including numbers for devices, pollers, and readers.
1-10 S ECTION 1: I NTRODUCTION System Screens There are two basic screen types: Menu and Application : Menu Screens Menu screens list application selections by group according to function (exception Monitor Security Activity — see Section 2). All menu screen IDs end in menu (example: [fmntmenu] — Master File Entry).
S ECTION 1: I NTRODUCTION 1-11 Indicates replace or insert mode. With replace , entries overwrite existing data. With insert , entries push existing data to the right. Toggle between the modes by pressing insert . Indicates if the information displaying is stored.
1-12 S ECTION 1: I NTRODUCTION USING SCREENS AND FIELDS Selecting Screens There are three screen selection methods: 1. Use the arrow keys to select the menu choice. Press Enter to place it in the Enter Selection field, and press Enter again to display the selection.
S ECTION 1: I NTRODUCTION 1-13 Moving to Prior Screens Press F1 to return to the previous screen displayed. If required, continue to press F1 to return to the system main menu. FINDING, ADDING, AND STORING DA T A Finding Data Use the find mode to locate and select data.
1-14 S ECTION 1: I NTRODUCTION The computer automatically changes to the update mode when a search completes, and the records selected can be updated if required. To start another search, press F4 to clear the screen and begin again. Adding / Changing Data The add mode is used to input new records.
S ECTION 1: I NTRODUCTION 1-15 ZOOM FEA TURE The zoom feature provides a fast method for accessing linked or dependent application screens and for copying data from these screens to other application screens. When the feature is available, zoom displays in the status bar.
1-16 S ECTION 1: I NTRODUCTION I MPORTANT Log off the SE 6000 system formally before you leave the terminal. If you do not log off, any action taken by the next person at the terminal will appear under your name. SHUTTING DOWN Always use the following procedures, in the order given, when powering off the SE 6000: 1.
S ECTION 1: I NTRODUCTION 1-17 3. The computer displays Enter new time ([yymmdd]hhmm). Change the date and time values as required (do not enter the parentheses or brackets); press Enter when completed. To keep the displayed date and time, press Enter.
1-18 S ECTION 1: I NTRODUCTION Controller Systems . Controller systems are computers running the SE 6000 local (LC) or remote location controller (RLC) software. The LC system is a computer attached via dedicated lines to the host. The RLC system is a computer attached via dial-up telephone lines to the host.
S ECTION 2: M ONITOR S ECURITY A CTIVITY 2-1 S ECTION 2 MONIT OR SECURITY ACTIVITY INTRODUCTION System monitoring and control is performed via the monitor menu, the first selection in the system main menu.
2-2 S ECTION 2: M ONITOR S ECURITY A CTIVITY FUNCTION KEYS Beneath the transactions display are the applicable function keys for each screen, with the key actions shown next to the key numbers. For most function key actions, the system displays messages confirming that the action has been completed, e.
S ECTION 2: M ONITOR S ECURITY A CTIVITY 2-3 When F4 is pressed, a second screen displays showing the connections between the host and the devices of the particular poller selected: Poller-device communication should be one of the first items checked whenever there is an apparent problem with the system.
2-4 S ECTION 2: M ONITOR S ECURITY A CTIVITY F4 KEY RSET . Key Reset—Used when setting up new ACUs or reestablishing repaired ACUs, or when the integrity of the data currently resident in the ACU is suspected. Downloads all host key data to the ACU.
S ECTION 2: M ONITOR S ECURITY A CTIVITY 2-5 F6 UNSHUNT . Unshunt a door previously shunted. Input Points The Control Inputs screen displays point ID, description, point status, tamper, shunt. Control Inputs Function Keys F5 SHUNT . Shunt a selected input point.
2-6 S ECTION 2: M ONITOR S ECURITY A CTIVITY F6 UNSHUNT . Unshunt a selected output point previously shunted. If no output point is selected, F6 unshunts all output points in the zone. Doors The Control Doors screen displays point ID, description, status, and shunt of the door switches.
S ECTION 2: M ONITOR S ECURITY A CTIVITY 2-7 Count — Number of keyholders currently in the zone. PBarea — Passback zone type—personal, vehicle, none. PBtype — Passback type —hard, soft, none. PBlevel — Passback control—global (host), local (ACU), none.
2-8 S ECTION 2: M ONITOR S ECURITY A CTIVITY Review Transactions Function Keys F2 BACKWARD . Page backward through the transactions. F3 FORWARD . Page forward through the transactions. F4 OLDEST . Go to first transaction. F5 LATEST . Go to last transaction.
S ECTION 2: M ONITOR S ECURITY A CTIVITY 2-9 CONTROL PROJECTS The Control Projects screen (not controllable on LC systems—host only) displays project, status, description, start, end. The control projects screen permits operator override of doors assigned to projects which directly affects keyholder access.
2-10 S ECTION 2: M ONITOR S ECURITY A CTIVITY F5 PRNT ON . Switch printer #1 on or off depending on current state (used to control log printer only). F6 PRNT ON .
S ECTION 2: M ONITOR S ECURITY A CTIVITY 2-11 When requested, enter the number of the table to be downloaded and press Enter. The system requests confirmation — press F1.
2-12 S ECTION 2: M ONITOR S ECURITY A CTIVITY F3 LIMITED . Change current building mode to limited. F4 CLOSED . Change current building mode to closed (takes approximately one minute to complete). If a device input point configured to prevent building closure is active, the building will remain in the limited mode until the point is cleared.
S ECTION 2: M ONITOR S ECURITY A CTIVITY 2-13 Status Screen Function T imeout Some system functions temporarily disable the realtime display until the sub-menu is exited. The status screen function Timeout feature provides a user-defined method for controlling the length of time that the realtime display is disabled.
2-14 S ECTION 2: M ONITOR S ECURITY A CTIVITY N OTE 1. The control parameter is read by the alarm servicing program at log-on time and remains in effect as long as the alarm program is active. A change to the Timeout value does not take effect until the user logs off, and then logs back on to the system (reboots).
S ECTION 2: M ONITOR S ECURITY A CTIVITY 2-15 N OTE 1. If your system has been upgraded, and users created on a previous release have been saved, their user profiles must be updated with the new monitor security privileges. To do this, log on as addusers with the correct password, select system administration, and then select add users.
2-16 S ECTION 2: M ONITOR S ECURITY A CTIVITY 1. This feature affects the following displays and reports: - Monitor screen, both full- and half-screen displays - Review transactions screen - Point history report - Keyholder history report - Transaction history report - all sort options - Archive history report - all sort options 2.
S ECTION 3 SECURITY REPORTS INTRODUCTION Security management reports provide a permanent record of transactions, and are also used to examine specific events. The reports are accessed through the security management reports menu screen, [accsmenu], via the main menu.
3-2 S ECTION 3: S ECURITY M ANAGEMENTS R EPORTS N OTE 1. Some reports are over-wide (132 characters instead of the standard 80 characters), and have been formatted to use a smaller print size not available with some terminals (HP printers can handle the smaller print).
S ECTION 3: S ECURITY M ANAGEMENT R EPORTS 3-3 Keyholder History — Sample Report 06/27/96 Packlett Industries PAGE 1 14:36 Point History Point Point Description Date Time Access Type _____ _________.
3-4 S ECTION 3: S ECURITY M ANAGEMENTS R EPORTS Transaction History — Sample Report ACCESS CONTROL ARCHIVE REPORT The access control archive report, [acrtrprt], is identical to the transaction history report (previous report) except that it reads data from an archive tape rather than from the system database.
S ECTION 3: S ECURITY M ANAGEMENT R EPORTS 3-5 Alarm Servicing — Sample Report PASSBACK ZONE REPORT The passback zone report, [whowhere], lists keyholders currently present in passback zones. The summary selection provides totals by zone, while the detailed report lists specific keyholders.
3-6 S ECTION 3: S ECURITY M ANAGEMENTS R EPORTS Passback Zone — Sample Report 04/05/96 Easthaven Manufacturing Page 1 14:43 Passback Zone Report Keyholder Key No Keyholder Name Tenant Pzone Vzone __.
S ECTION 3: S ECURITY M ANAGEMENT R EPORTS 3-7 Possible system messages for this report are: Unprocessed — Information changed in the database, but has not yet been sent to the communications program module. Before Transmit — Information has been sent to the communications program module, but has not yet been sent to target device.
3-8 S ECTION 3: S ECURITY M ANAGEMENTS R EPORTS KEYHOLDER ZONE REPORT The report lists the most recent zone information for all keyholders that meet the search criteria; however, information is not necessarily current.
S ECTION 3: S ECURITY M ANAGEMENT R EPORTS 3-9 Event / Point — Sample Report 03/17/96 Security Electronics Page 1 09:15 Event/Point Report Point Point Description Tran.
3-10 S ECTION 3: S ECURITY M ANAGEMENTS R EPORTS REAL TIME PASSBACK DET AIL — SAMPLE REPORT 03/14/96 McPowell-Angus Aviation Page 1 15:18 Realtime Passback Detail Report Keyholder Key No Keyholder N.
S ECTION 4: M ASTER F ILE E NTRY 4-1 S ECTION 4 MASTER FILE ENTR Y INTRODUCTION The master file entry procedures are used to create and maintain the database.
4-2 S ECTION 4: M ASTER F ILE E NTRY KEYHOLDERS Four data entry screens are used to add new keyholders to the system, and to change or delete existing keyholder information: 1. Keyholder Entry - Page 1, [key_entr]. Used to enter primary keyholder information.
S ECTION 4: M ASTER F ILE E NTRY 4-3 Keyholder ID . Required in the Add mode (the system denies further screen access until this field is entered). Enter a unique nine-digit maximum keyholder ID number (alphabetical letters are not supported). Last Name .
4-4 S ECTION 4: M ASTER F ILE E NTRY Issue Date . Optional. Enter the date that the access control card for the keyholder will become valid. Default is current system date. Note that a future date will not permit access until that date is reached. Issue Time .
S ECTION 4: M ASTER F ILE E NTRY 4-5 Keyholder Access Entry [empgentr] Access Code . Optional. Enter an access code number that applies to this keyholder (the system automatically enters the access code description).
4-6 S ECTION 4: M ASTER F ILE E NTRY Y if the downloaded access code is to be sent to the ACU as a smart failsoft access code. Default is N. Note that this is used only in conjunction with the host access codes.
S ECTION 4: M ASTER F ILE E NTRY 4-7 A sample [epj_entr] screen follows. Enter the project number ( zoom available) then press Enter; the project description displays automatically. If multiple projects are to be assigned, enter and store each one separately.
4-8 S ECTION 4: M ASTER F ILE E NTRY ACCESS ASSIGNMENT Keyholder Access Assignment [egrpentr] The [egrpentr] and [egrpentr1] screens, accessed from Access Assignment (third item in the [fmntmenu] menu), are used as a fast way to make access assignments without using the keyholder data entry screens.
S ECTION 4: M ASTER F ILE E NTRY 4-9 ACCESS DEFINITION The access definition selection in the master file entry menu displays the access definition menu: • Access Code Entry, Access Code Definition,.
4-10 S ECTION 4: M ASTER F ILE E NTRY Access Code ID . Required. Enter a four-digit maximum access code number. Tenant . Required ( zoom available). Enter a four-digit maximum tenant code number. Default is tenant 0. Download Device ID . Optional ( zoom available).
S ECTION 4: M ASTER F ILE E NTRY 4-11 Reader ID . Required. Enter the reader number to be linked to this access code (the reader description is automatically displayed).
4-12 S ECTION 4: M ASTER F ILE E NTRY Group Description . Required. Enter a 30-character maximum description of the access group. When screen entry is completed press F6 to store the data, at which point the Access Group Definition screen displays automatically.
S ECTION 4: M ASTER F ILE E NTRY 4-13 W ARNING 1. Access codes that include the same reader(s) should not be included in the same group unless one code is a downloaded code, and it has been set up with the SFS (smart failsoft) flag set to Y. Mixing codes that include common readers with different time codes may cause unpredictable results.
4-14 S ECTION 4: M ASTER F ILE E NTRY F AILSOFT E NTRY 708P ACUs can be programmed to recognize up to 25 keyholders (based on key numbers) for use when communication with the host computer is temporarily unavailable.
S ECTION 4: M ASTER F ILE E NTRY 4-15 Project ID . Required. Enter a four-character maximum project ID code. Description . Optional. Enter a 40-character maximum description of the project. Starting Date and Time . Enter the project's starting date and time in the formats MM/DD/ YY and HH:MM.
4-16 S ECTION 4: M ASTER F ILE E NTRY TIME CODES [tmcdentr] Time codes are normally used to define when points and readers are active. The codes are also used to automatically lock / unlock doors, activate / deactivate output relays, and to initiate recurring tasks.
S ECTION 4: M ASTER F ILE E NTRY 4-17 Holiday Name . Optional. Enter a 20-character maximum holiday name. TENANTS [tententr] Two or more companies or groups can operate a single SE 6000 system, and they are referred to as tenants. (If required, the system can also be configured to allow individual tenants to share components.
4-18 S ECTION 4: M ASTER F ILE E NTRY Point ID . Required ( zoom available). Enter the point ID to which this instruction applies. Tenant . The tenant number entered when this point was created is automatically entered into this field. Instructions . Eight 40-character lines are provided for detailed instruction entry.
S ECTION 4: M ASTER F ILE E NTRY 4-19 Passback Area . Optional. This field is used to indicate if passback is in effect for this zone. Enter P if personnel passback is used, V if vehicle passback is used, N if passback is not used. The default is N. Passback Type .
4-20 S ECTION 4: M ASTER F ILE E NTRY The SE 6000 can run different pollers or multiple copies of the same poller concurrently but, with the exception of the NexSentry, 8xx-series, and 422 ACUs, the pollers can be run with one device type only. Poller parameter files are read when the poller programs start.
S ECTION 4: M ASTER F ILE E NTRY 4-21 Tenant . Optional ( zoom available). Enter a four-digit maximum tenant code number. Default is 0. Computer ID. Required. Enter the ID of the computer on which this poller is to run. Default is 0—host computer.
4-22 S ECTION 4: M ASTER F ILE E NTRY controlled exclusively by the SE 6000 ( deferred mode ), to operate entirely independently of the SE 6000 ( local mode ), or a combination of both.
S ECTION 4: M ASTER F ILE E NTRY 4-23 Address . Required. Enter the address of the device. Since each poller can poll a number of devices, the Address field is necessary to tell the host which device to poll. The address ranges are included in the Device Type table (see following field).
4-24 S ECTION 4: M ASTER F ILE E NTRY SE 8 XX -S ERIES D EVICE C ONFIGURATION E NTRY [d808entr] The [d808entr] screen must be completed for all 8 xx -series ACUs (use F2 to display the screen after the previous screen has been stored). A sample screen follows: Level, Name, Password .
S ECTION 4: M ASTER F ILE E NTRY 4-25 Power Fail . Optional. Enter the power fail report number if a report has been created (see applicable ACU manual). The report states the actions that will be taken by the ACU should a power failure occur. Default is 0.
4-26 S ECTION 4: M ASTER F ILE E NTRY Building Closed Time Codes . Optional. Provides up to four time intervals during which the building should be closed.
S ECTION 4: M ASTER F ILE E NTRY 4-27 N OTE The Level , Name and Password fields are specific to the NexSentry and applies only to operators logging in directly via the ACU's terminal port. The fields are not part of the SE 6000 control parameters.
4-28 S ECTION 4: M ASTER F ILE E NTRY SE 818 D EVICE C ONFIGURATION E NTRY [d818entr] Complete the [d818entr] screen for all 818-series and NexSentry ACUs (use F2 to display the screen after the previous screen, [d808entr] or [nexsentr], have been stored).
S ECTION 4: M ASTER F ILE E NTRY 4-29 Level, Name, Password . Required. These first three fields are entered to identify up to eight operators who will be permitted to set / change system parameters for this particular ACU. User 1 must be established (defaults to operator 1); operators 2 through 7 are optional.
4-30 S ECTION 4: M ASTER F ILE E NTRY PIN Timeout . Optional. The maximum amount of time, in seconds, which can pass between the presentation of a key and the entry of a verification PIN. Default is 10. Max Inv. PINs . Optional. The maximum number of invalid PIN entry attempts to permit before cancelling the key presentation.
S ECTION 4: M ASTER F ILE E NTRY 4-31 Duress Enable . Indicates with a Y or an N whether the PIN duress feature of the SE 422 is turned on or not. Show PIN . Indicates with a Y or an N whether the PIN number should be displayed on a local terminal connected to the SE 422 after it has been calculated.
4-32 S ECTION 4: M ASTER F ILE E NTRY R EADER E NTR Y [rdr_entr] Reader ID . Required ( zoom available). Enter a maximum four-digit reader ID number. Reader Description . Optional. Enter a maximum 20-character description of the reader. Default is the reader ID number.
S ECTION 4: M ASTER F ILE E NTRY 4-33 Reader Type . Required. Enter the reader type number in the ranges 1 through 12 as described above. Assoc Reader ID (Associated Reader). Required if the reader is used in conjunction with a keypad. Enter the ID number of the Reader used with the keypad.
4-34 S ECTION 4: M ASTER F ILE E NTRY active. For Mod , enter a transaction modifier code (A, B, etc.) to customize log messages and system actions (see Section 6: System Administration for details). The default for Mod is 0 (zero); use the standard log message.
S ECTION 4: M ASTER F ILE E NTRY 4-35 configured for a specific zone and includes the passback feature. In addition, the MOR and the SE 6000 keep track of the people that are in a specified zone.
4-36 S ECTION 4: M ASTER F ILE E NTRY in response to various events occurring within the system. (The field titles indicate the event types.) See Device Report Definition in the section and the applicable ACU manual for detailed information. SE 422 R EADER R EPORT D EFINITION [rdr2entr] Reader Mode .
S ECTION 4: M ASTER F ILE E NTRY 4-37 — The following ten fields, Forced Open through Exit Granted , require the entry of a report number. The word report in this context identifies a user-defined action or series of actions that the ACU is to take in response to various events occurring within the system.
4-38 S ECTION 4: M ASTER F ILE E NTRY Proximity Type . Enter the proximity type: 0 = Sensor interface, 1 = DigiKey reader. The following thirteen fields, DKR/SCR Fail through VIP tamper , require the entry of a report number.
S ECTION 4: M ASTER F ILE E NTRY 4-39 The following eleven fields, DKR/SCR Fail through Device Tamper, require the entry of a report number. The report in this context identifies a user-defined action or series of actions that the ACU is to take in response to various events occurring within the system.
4-40 Section 4: Master File Entry Point ID . Required. Enter a four-digit maximum point ID number. Point Description . Optional. Enter a 20-character maximum description of the point. If omitted, the system enters the point ID number into this field. Device ID .
Section 4: Master File Entry 4-41 Time . Required for point type 2 (door switch) and 6 (general, when used with an OPTO 22); disregard for all other types.
4-42 Section 4: Master File Entry Zone number . Required ( zoom available). Enter the zone number applicable for this point. The system enters the default value of 0 (zero) if this field does not apply. Tenant . Required ( zoom available).
Section 4: Master File Entry 4-43 Serial # . A nine-digit maximum control number automatically generated and displayed by the system when a new auto open / activate code is added. This information is not entered by the user. Reader ID or Point ID . Required.
4-44 Section 4: Master File Entry Assigned PIN numbers can be printed out (see Section 3 , SE 422 PIN Master Report ). A ls o , i t is possible, but not recommended, to override the system-wide default values entered here (see Device Entry , SE 422, in this section).
Section 4: Master File Entry 4-45 Dev Failure Rpt . Optional. Enter a device failure report number in the range 1 — 32. Default is 0 — No report.
4-46 Section 4: Master File Entry Host2 . Required, if applicable. Enter alternate host #2 phone number. For RDI units only, enter login string and password. Host3 . Required, if applicable. Enter alternate host #3 phone number. For RDI units only, enter login string and password.
Section 4: Master File Entry 4-47 Group ID . Enter a four-character maximum group ID number. Code . Enter a four-character maximum site code. Enter x in any position to act as a wild card; all characters in that position are matched. With the first 'x entry' in the sample screen, for example, the range 1230 through 1239 would be matched.
4-48 Section 4: Master File Entry Key B . Start position and length of second part of key. Key C . Start position and length of third part of key. Expiration Date Start . Expiration date start position. Site Code . Site code start position.
Section 4: Master File Entry 4-49 Read Range . Controls the maximum read range available with the particular digital reader. The range is 0—255; default is 255. Number of Reads . Controls the number of additional verification reads of a single key within the sensor’s range before declaring the key valid.
4-50 Section 4: Master File Entry MAPS The DRAWMAPS function is used by the event monitoring function to display the location of doors, points, alarms, etc. To use this feature on an SE 6200 and above, it must be operating under the Reflection 4 terminal emulation software (mouse required).
Section 4: Master File Entry 4-51 ReDraw Redraws screen. Use if graphics appear incorrect. Rectify Makes all lines close to horizontal or vertical exactly horizontal or vertical. Lines nearly 45° are drawn at exactly 45°. Rescale Rescale (resize) map.
4-52 Section 4: Master File Entry SE 422 Input Table 01 23 4 5 6 ACU (2-state) 0: 1 2 3 4 5 6 7 M16 /RO1 1: 8 9 10 11 12 13 14 (4-state input) 2: 15 16 17 1 8 19 20 21 3: 22 23 24 25 26 27 28 4: 29 30.
S ECTION 5 MASTER FILE REPORTS INTRODUCTION The master file reports list comprehensive database information. The report menu screens are accessed via the master file reports menu [rprtmenu], displayed via the main menu. In this section, the reports are documented following the reports menu sequence (see section table of contents).
5-2 S ECTION 5: M ASTER F ILE R EPORTS ADDITIONAL INFORMA TION An additional report feature not accessed via the reports menu, 132-xx Column Report Display , is detailed at the end of this section. KEYS MASTER Two versions of the keyholder master report are available — Keyholder Quick List and Keyholder Master List (extended).
S ECTION 5: M ASTER F ILE R EPORTS 5-3 06/02/96 BAYOU INDUSTRIES Page 1 14:45 Key Quick List KeyholderKey No Keyholder Name Dept. Pos. Phone Title Bldg ________________________________________________.
5-4 S ECTION 5: M ASTER F ILE R EPORTS ACCESS ASSIGNMENTS K EYHOLDER A CCESS A SSIGNMENT This report prints the access codes and access groups assigned to keyholders.
S ECTION 5: M ASTER F ILE R EPORTS 5-5 K EYHOLDER A CCESS A SSIGNMENT : E XTENDED — S AMPLE R EPORT R EADER A CCESS A SSIGNMENT This report prints keyholder access permissions at a specific reader and applicable time codes. A sample screen follows: R EADER A SSIGNMENT — S AMPLE R EPORT 06/09/96 Nova Systems, Inc.
5-6 S ECTION 5: M ASTER F ILE R EPORTS ACCESS DEFINITION A CCESS C ODE M ASTER This report details all access codes defined in the system (the report can be limited to a single code or a range of codes, as required).
S ECTION 5: M ASTER F ILE R EPORTS 5-7 A CCESS G ROUP M ASTER L IST — S AMPLE R EPORT A CCESS O VERRIDE The report lists access override codes in the database, with descriptions, start / end dates, and permissions (allow / deny access).
5-8 S ECTION 5: M ASTER F ILE R EPORTS I NTELLIGENT F AIL S OFT — S AMPLE R EPORT 03/25/96 Soames Industries Page 1 08:24 Intelligent Fail Soft Report Keyholder Keyholder Name 7110 7120 7130 7140 71.
S ECTION 5: M ASTER F ILE R EPORTS 5-9 P ROJECT R EPORT — S AMPLE R EPORT 03/25/96 Security Electronics Page 1 08:29 Project Report Project Project Description S.
5-10 S ECTION 5: M ASTER F ILE R EPORTS R EADER P ROJECT R EPORT The Reader Project Report lists project number, description, readers assigned, current status. N OTE This report gives reader project status based on start / stop dates defined by the project entry function compared to the current system date and time.
S ECTION 5: M ASTER F ILE R EPORTS 5-11 T IME C ODES — S AMPLE R EPORT 03/25/96 Security Electronics Page 1 08:36 Timecode Report Tmcd Description Start End Mon Tue Wed Thu Fri Sat Sun Hol ____ ____.
5-12 S ECTION 5: M ASTER F ILE R EPORTS T ENANTS — S AMPLE R EPORT 05/04/96 TRADE CENTER MAIN Page 1 09:07 Tenant Report Number Description ______ ___________ 1 WESTWOOD SECURITY SYSTEMS 2 SOS PUBLI.
S ECTION 5: M ASTER F ILE R EPORTS 5-13 S AMPLE I NSTRUCTIONS 03/25/96 General Electronics Co Page 1 08:45 Instruction Master List Point Point Description Zone Instructions _____ _____________________.
5-14 S ECTION 5: M ASTER F ILE R EPORTS Z ONES — S AMPLE R EPORT 03/25/96 Leigh-Haffner Enterprises Page 1 08:47 Zone Report Zone Description Area Prim Level ____ _______________________________ ___.
S ECTION 5: M ASTER F ILE R EPORTS 5-15 D EVICES — S AMPLE R EPORT R EADERS This report lists all readers defined in the system. A sample screen follows: 03/25/96 McCartney Foundation Page 1 08:50 D.
5-16 S ECTION 5: M ASTER F ILE R EPORTS R EADERS — S AMPLE R EPORT P OINTS This report lists all points defined in the system. A sample screen follows: P OINTS — S AMPLE R EPORT 06/03/96 LOVELL-WATKINS INC.
S ECTION 5: M ASTER F ILE R EPORTS 5-17 A UTO O PENS / A CTIVATES This report lists system points and readers which have auto-open or auto-activate times. A sample screen follows: A UTO O PEN / A CTIVATE — S AMPLE R EPORT 808 R EPORT D EFINITION This report lists all action reports defined for the system 800-series ACUs.
5-18 S ECTION 5: M ASTER F ILE R EPORTS 808 D EVICE C ONFIGURATION This report lists configuration information for the system 800-series ACUs. A sample screen follows: 808 D EVICE C ONFIGURATION — S.
S ECTION 5: M ASTER F ILE R EPORTS 5-19 S ITE D EFINITION — S AMPLE R EPORT 03/25/96 Security Electronics Page 1 09:02 Site Code Master Report Group Code _____ ____ 1 0000 100 1000 101 1001 6016 7279 ABA C ONFIGURATION This report lists all the ABA configurations defined for the system, and gives the configuration parameters.
5-20 S ECTION 5: M ASTER F ILE R EPORTS DKR C ONFIGURATION The reports lists the system default DKR parameters. A sample screen follows: DKR C ONFIGURATION — S AMPLE R EPORT SE 422 PIN M ASTER R EPORT This report lists keyholders having system-calculated SE 422 PIN numbers.
S ECTION 5: M ASTER F ILE R EPORTS 5-21 SE 422 PIN M ASTER R EPORT — S AMPLE 132-COLUMN REPORT DISPLA Y The local print program was originally written to accommodate an 80-character terminal display. Some terminals now use up to 132 characters, and the new 132-Column Report Display feature allows for this.
S ECTION 6 SYSTEM ADMINISTRA TION INTRODUCTION The administration functions are used to control and maintain the system. These functions are accessed from the system administration menu, [sys_menu], via the main menu. (Depending on the operator's program security level, some or all of these functions may not be available.
6-2 S ECTION 6: S YSTEM A DMINISTRATION ADDITIONAL INFORMA TION Additional system administration-related information is provided at the conclusion of this section. ADD USERS [addusers] The add users screen, [addusers], is entered to add, change, or delete system users / operators.
S ECTION 6: S YSTEM A DMINISTRATION 6-3 Program Security Level . Optional (range 1—9999). Code number indicating the specific screens the user can access. Default is 1 (complete access). Tenant . Optional. Enter tenant number (if applicable). Default is tenant 0.
6-4 S ECTION 6: S YSTEM A DMINISTRATION Jump Timer Servicing . Y / N field indicating if the user has the authority to automatically jump to timer servicing from monitor when an timer event occurs. Language . The code number entered will determine what language the system will use for this user.
S ECTION 6: S YSTEM A DMINISTRATION 6-5 PROGRAM SECURITY [sec_menu] P ROGRAM S ECURITY L EVEL E NTRY [pgacentr] Begin creating program security level types by first displaying the program security level entry screen [pgacentr]: Enter the security level number (four digits maximum).
6-6 S ECTION 6: S YSTEM A DMINISTRATION Enter Y or N in the add/update/delete fields to give or deny access to these functions on the selected screen. If you do not make any Y/N selection in the Add, Update, and delete fields, the keyholder will not have access to the screen.
S ECTION 6: S YSTEM A DMINISTRATION 6-7 DISPLA Y ALL VALID LOGINS [showuser] Use the [showuser] screen to identify — by hard copy printout or report display at the system terminal — all operators who have access to the system (use the [showwho] (Display All Valid Logins) screen to display operators currently logged on.
6-8 S ECTION 6: S YSTEM A DMINISTRATION PURGE A PENDING REPORT [purgrprt] Use this feature to halt a report currently being printed (applies only to reports created under your ID). The feature can also be used to display reports. Note that if you log on using addusers you will have complete printer control.
S ECTION 6: S YSTEM A DMINISTRATION 6-9 E VENTS [evenentr] The task / event subsystem is used to program one or more tasks to be automatically performed in response to the occurrence of a user-defined event. Tasks and events are linked, and the task must be entered and stored before the system allows the creation of a related event.
6-10 S ECTION 6: S YSTEM A DMINISTRATION Modifier . Optional. If applicable, the transaction modifier which defines the event if the message is user-defined. Event Date . Optional. If the task referenced by this event is to be system-initiated, enter the applicable date.
S ECTION 6: S YSTEM A DMINISTRATION 6-11 Activate Code , Extension . Required. System code number for the type of action to be performed. The extension applies to camera presets for pan and tilt, or image verification when used with a Polaroid ID-4000 system.
6-12 S ECTION 6: S YSTEM A DMINISTRATION 100 ACTIVATE PROJECT Activate an inactive project. 101 DEACTIVATE PROJECT Deactivate an active project. 102 NORMALIZE or Change project status to its normal condition (clears an override CLEAR PROJECT condition).
S ECTION 6: S YSTEM A DMINISTRATION 6-13 Transaction Type (ID) . The unique ID number of a transaction. The system is pre- programmed to use specific transaction types for certain events at certain types of points. (See Appendix C: System Transactions for a complete list of standard transactions.
6-14 S ECTION 6: S YSTEM A DMINISTRATION 2 = Green 3 = Cyan (light blue) 4 = Blue Display Icon . For future use. Printer Group . Each log printer must include the selected printer group in its list of available printer groups. If the selected printer group is not included, the transaction will not be printed on the log printer.
S ECTION 6: S YSTEM A DMINISTRATION 6-15 D ATABASE B ACKUP . A database backup copies all information in the database (exceptions user and map information). If you make a number of changes to keyholder, hardware, and / or access information in a single day, then the database backup should be performed each day.
6-16 S ECTION 6: S YSTEM A DMINISTRATION A LARM T RANSACTION C LEAN U P [alrmcln] Each time an alarm is triggered, a record is created and stored in a separate file along with the operator's alarm servicing response. This table is then available for reporting using the alarm servicing report.
S ECTION 6: S YSTEM A DMINISTRATION 6-17 KEYHOLDER LOADING [loadmenu] This function copies keyholder IDs and names from an DOS ASCII file to a Unix then creates keyholder records.
6-18 S ECTION 6: S YSTEM A DMINISTRATION ID S ECURITY G ROUP E NTRY [ID2_ entr] This function is used to create ID security groups. A sample screen follows: Required. Enter a unique security group number in the range 1—999. Optional. Enter a group description (30 characters maximum).
S ECTION 6: S YSTEM A DMINISTRATION 6-19 MISCELLANEOUS INFORMA TION A DJUSTABLE B AUD R ATE —708P / 800 P OLLERS Multiple baud rates are supported for the diverse mix of communications equipment available for the SE 6000 system. The baud rate is set by changing the HOSTBAUD parameter in the $DATAPATH/NPOLLER.
6-20 S ECTION 6: S YSTEM A DMINISTRATION This feature is enabled / disabled using the REXEXTEND parameter in the $DATAPATH/ NPOLLER. x file where x is the associated 708P poller number. The feature is enabled / disabled during installation, or may be changed as needed by the system administrator.
S ECTION 6: S YSTEM A DMINISTRATION 6-21 03/25/96 Ataraxia Electronics Page 1 15:52 Inventory Status Code Report Code Code Description ____ ________________ 1 AVAILABLE 2 ASSIGNED 3 LOST 4 UNUSABLE 5 .
6-22 S ECTION 6: S YSTEM A DMINISTRATION 03/25/96 Alpha Systems Page 1 15:55 Key Inventory Report Keyholder Keyholder Name Key No Date Time Status Descrip Remarks _________ ____________________ ______.
S ECTION 6: S YSTEM A DMINISTRATION 6-23 P ARKING S TICKER M ASTER R EPORT [stkrprt] The report lists assigned parking stickers. A sample screen and report follow: 06/25/96 Security Electronics Page 1.
A PPENDIX A: S YSTEM S CREEN T REES A-1 monitor ctrlpoll ctrllock ctrlprnt ctrlinp ctrldoor selzone ctrlout ctrldev devstat viewmap insrtns response download psbkfrgv manacc devcomm ctrlmenu dispmap o.
A-2 A PPENDIX A: S YSTEM S CREEN T REES acrtrprt almarprt whowhere excprprt phstrprt chstrprt accsmenu mainmenu ky2nrprt evptrprt rpasrprt downrprt Screen Location Tree — Security Management Reports.
A PPENDIX A: S YSTEM S CREEN T REES A-3 empgentr egrpentr1 key_entr tmcdentr hol_entr tententr pol_entr d422entr zoneentr dev_entr rdr1entr rdr_entr dialentr abacentr d808entr fmntmenu acodentr eleven.
A-4 A PPENDIX A: S YSTEM S CREEN T REES rprtmenu hol_rprt key_rprt deptrprt job_rprt maprprt instrprt pol_rprt zonerprt dev_rprt rdr_rprt pnt_rprt autorprt mainmenu accrmenu siterprt dconrprt rdefrprt.
A PPENDIX A: S YSTEM S CREEN T REES A-5 Screen Location Tree — Key Inventory invtmenu statentr cdinrpt statmenu statrprt cdientr mainmenu stkrentr stkrprt stkrprt1 stk1entr stkrrprt stkrmenu mainmen.
A-6 A PPENDIX A: S YSTEM S CREEN T REES loadmenu purgrprt pgacrprt showwho sec_menu syclmenu accsarch beepentr mnaccopy pgacentr evenentr tranentr db_menu showuser mod_pass addusers mainmenu sys_menu josprprt jourrprt alrmcln accsarch jourarch bkup downcln dbstats ctrlentr taskentr pg1_entr showdate .
A PPENDIX B: S YSTEM S CREEN H IERARCHIES B-1 M ONITOR S ECURITY A CTIVITY S CREEN T ITLE F UNCTION monitor Watch events and activities as they occur; menu to other monitoring and control screens. ctrlmenu Menu to control functions. Zone selection stays in effect until this screen is exited.
B-2 A PPENDIX B: S YSTEM S CREEN H IERARCHIES key_copy Create new keyholder record by copying from an existing keyholder record. egrpentr Select a keyholder for access privilege assignment. Can also be reached from key1entr. egrpentr1 Assign access privileges to a keyholder.
A PPENDIX B: S YSTEM S CREEN H IERARCHIES B-3 M ASTER F ILE R EPORTS S CREEN T ITLE F UNCTION rprtmenu Menu to database reporting functions. key_rprt Report keyholder information. aassmenu Menu to the access assignment reporting functions. egrprprt Report access codes / access groups assigned to keyholders.
B-4 A PPENDIX B: S YSTEM S CREEN H IERARCHIES P ARKING S TICKERS S CREEN T ITLE F UNCTION stkrmenu Menu to parking sticker and license plate management functions. stkrentr Select keyholder for parking sticker and / or license plate information entry. stk1entr Enter parking sticker or license plate information for keyholder.
# Message Explanation A PPENDIX C: S YSTEM T RANSACTIONS — N UMERICAL S EQUENCE C-1 0 Negative Acknowledge 708P unable to understand message from host. 1 Access Granted Card or keypad entry granted access by ACU or host. 2 Key Trace Card flagged as TRACE has been read.
# Message Explanation C-2 A PPENDIX C: S YSTEM T RANSACTIONS — N UMERICAL S EQUENCE 29 Printer On Log printer switched on. 30 Device Reset 708P / 8xx-series powered up / re-initialized. 31 Return From Failsoft 708P communication restored — no longer in failsoft mode.
# Message Explanation A PPENDIX C: S YSTEM T RANSACTIONS — N UMERICAL S EQUENCE C-3 54 Device Online ACU communicating with host. 55 Request Manual Access Manual access command entered. 56 (Building Closed Trace) Obsolete message 58 Repack OK Host has loaded new database information.
# Message Explanation C-4 A PPENDIX C: S YSTEM T RANSACTIONS — N UMERICAL S EQUENCE 83 Enter Unattended Mode Optional parking function. 84 Batch Request Received Not used at this time. 85 Remote Comm Ended Not used at this time. 86 Global Silence Request Silence global beeping command issued.
# Message Explanation A PPENDIX C: S YSTEM T RANSACTIONS — N UMERICAL S EQUENCE C-5 115 Power Report Unshunted Device power fail report unshunted. 116 COAX Report Shunted Reader coax fail report shunted. 117 COAX Report Unshunted Reader coax fail report unshunted.
# Message Explanation C-6 A PPENDIX C: S YSTEM T RANSACTIONS — N UMERICAL S EQUENCE 142 Host Dial Start Remote device dialing host. 143 Carrier Off SE 422—Incoming phone line or host port has lost DTR. 144 Carrier On SE 422 — Incoming phone line or host port DTR high.
# Message Explanation A PPENDIX C: S YSTEM T RANSACTIONS — N UMERICAL S EQUENCE C-7 178 VIP Failure VIP keypad not responding. 179 VIP Okay VIP keypad returned from failed status. 180 VIP Tamper Fail VIP tamper fail reported. 181 VIP Tamper Okay VIP tamper switch OK.
# Message Explanation C-8 A PPENDIX C: S YSTEM T RANSACTIONS — N UMERICAL S EQUENCE 242 Disk Almost Full Disk space at value of DISKWARN parameter (usually 90% full). 250 Over Max Key Limit Attempt made to download more keys than the device will hold.
Message # Message # A PPENDIX C: S YSTEM T RANSACTIONS — A LPHABETICAL S EQUENCE C-9 ABA Card Data 1 ........................................ 173 ABA Card Data 2 ........................................ 174 ABA Card Data 3 ..........................
Message # Message # C-10 A PPENDIX C: S YSTEM T RANSACTIONS — A LPHABETICAL S EQUENCE Max Tenant In Lot ........................................ 8 0 Meal Counter - Excp. .................................. 136 Meal Counter - Valid ...................
A PPENDIX D: P ROGRAM S ECURITY M ASTER L IST D-1 Level 1 = COMPLETE SYSTEM ACCESS ID1_entr ID Security User Entry Y Y Y ID1_rprt ID Security Report N N N ID2_entr ID Security Group Entry Y Y Y ID_men.
D-2 A PPENDIX D: P ROGRAM S ECURITY M ASTER L IST outsrprt Outstanding Tickets N N N overrprt Tenant Overage N N N p422rprt SE/422 PIN Report N N N padmmenu Parking Administration N N N parkmenu Parki.
INDEX-1 I NDEX A Access Assignment, 4-8, 5-4 Keyholder Access, 5-4 Keyholder Access Assignment, 4-8 Readers, 5-5 Access Code, 1-2 Access Code Entry , 4-9 Distributed Access codes, 4-9 Host, 4-9 Smart .
INDEX-2 Auto Opens/Activates, 4-42 Automatic Access Control, 1-6 Automatic Activate / Deactivate, 1-6 Automatic Restart, 1-16 Automatic Unlock/Lock, 1-6 B Basic System Usage, 1-16 Logging Off, 1-15 Bi.
INDEX-3 D Data Entry Sequence, 1-9 Data Item Selection, 2-2 Database Changes, 1-7 Database Maintenance [db_menu], 6-14 Definition, General T race, 1-3 T ransactions, 1-3 Definition, Inputs Fire Alarms.
INDEX-4 Definitions, Principal System Functions, 1-6 Auto Activate/Deactivate, 1-6 Automatic Access Control, 1-6 Communications Monitor , 1-6 Flexible Event Handling, 1-6 Independent PIN Entry , 1-6 M.
INDEX-5 NexSentry Reader Report Defined, 4-38 Reader Entry , 4-32 Reader Report, 4-35 Readers, 4-31 Devices Configuration Reports Devices, 5-14 Readers, 5-15 Digital Key Reader , 1-4 Disk Almost Full .
INDEX-6 Forgive Passback, 2-10 Full Screen Monitoring, 2-12 Function Keys, 2-2 G General Definitions Keyholder , 1-2 Guard T our , 1-18 H Hardware Configuation 422 Hardware Definition, 4-44 Hardware C.
INDEX-7 J Job Category , 1-2 Journal Archive [jourarch], 6-16 Journal Reporting [jourrprt], 6-16 K Key Inventory [invtmenu], 6-20 Key Inventory Entry [cdinentr], 6-21 Key Inventory Report [cdinrprt], .
INDEX-8 Microprocessor Access Control Units, 1-3 Biometric Hand Reader , 1-3 Miscellaneous Information, 1-15, 2-12 Modified Usage of Invalid Facility Code Log, 2-15 Modify Passwords [mod_pass], 6-4 Mo.
INDEX-9 Program Security Entry Definition [pg1_entr], 6-5 Purge a Pending Report [purgrprt], 6-8 R Reader Entry , 4-32 Reader Report, 4-35 818, 4-37 NexSentry , 4-38 Reader Report, 422, 4-36 Readers, .
INDEX-10 Review T ransactions Full Screen, 2-7 Review T ransactions Function Keys, 2-8 REX, 1-5 S Sample System, 1-7 Screen Access, 4-1 Screen Examples, 1-1 1 Searching With Partial Information, 1-13 .
INDEX-11 T enant, 1-3 T enants, 4-17, 5-1 1 T ime and Attendance, 1-18 T ime Code, 1-3 T ime Codes, 4-16, 5-10 T race, 1-3 T ransaction History Report, 3-3 Sample Report, 3-4 T ransactions, 1-3 T rans.
デバイスWestinghouse SE 6000の購入後に(又は購入する前であっても)重要なポイントは、説明書をよく読むことです。その単純な理由はいくつかあります:
Westinghouse SE 6000をまだ購入していないなら、この製品の基本情報を理解する良い機会です。まずは上にある説明書の最初のページをご覧ください。そこにはWestinghouse SE 6000の技術情報の概要が記載されているはずです。デバイスがあなたのニーズを満たすかどうかは、ここで確認しましょう。Westinghouse SE 6000の取扱説明書の次のページをよく読むことにより、製品の全機能やその取り扱いに関する情報を知ることができます。Westinghouse SE 6000で得られた情報は、きっとあなたの購入の決断を手助けしてくれることでしょう。
Westinghouse SE 6000を既にお持ちだが、まだ読んでいない場合は、上記の理由によりそれを行うべきです。そうすることにより機能を適切に使用しているか、又はWestinghouse SE 6000の不適切な取り扱いによりその寿命を短くする危険を犯していないかどうかを知ることができます。
ですが、ユーザガイドが果たす重要な役割の一つは、Westinghouse SE 6000に関する問題の解決を支援することです。そこにはほとんどの場合、トラブルシューティング、すなわちWestinghouse SE 6000デバイスで最もよく起こりうる故障・不良とそれらの対処法についてのアドバイスを見つけることができるはずです。たとえ問題を解決できなかった場合でも、説明書にはカスタマー・サービスセンター又は最寄りのサービスセンターへの問い合わせ先等、次の対処法についての指示があるはずです。