0% found this document useful (0 votes)
1 views

EST-EST3-v1.0-Access-Control-Database-User-Manual

The Access Control Database (ACDB) User Manual provides detailed instructions for setting up and operating the ACDB software, which is designed for managing access control systems. It includes chapters on system requirements, basic operations, user management, task creation, and reporting functions. The manual is intended for users with a basic understanding of Windows-based programs and outlines the necessary steps for both novice and experienced users to effectively utilize the software.

Uploaded by

ahamedkyana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

EST-EST3-v1.0-Access-Control-Database-User-Manual

The Access Control Database (ACDB) User Manual provides detailed instructions for setting up and operating the ACDB software, which is designed for managing access control systems. It includes chapters on system requirements, basic operations, user management, task creation, and reporting functions. The manual is intended for users with a basic understanding of Windows-based programs and outlines the necessary steps for both novice and experienced users to effectively utilize the software.

Uploaded by

ahamedkyana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 268

Access Control Database

User Manual
P/N 270961 • Rev 1.0 • 25OCT01

Technical Manuals Online! - http://www.tech-man.com


DEVELOPED BY Edwards Systems Technology
6411 Parkland Drive
Sarasota, FL 34243
(941) 739-4300
COPYRIGHT NOTICE Copyright © 2001 Edwards Systems Technology, Inc.
This manual and the products it describes are copyrighted by
Edwards Systems Technology, Inc. (EST). You may not
reproduce, translate, transcribe, or transmit any part of this
manual without express, written permission from EST.
This manual contains proprietary information intended for
distribution to authorized persons or companies for the sole
purpose of conducting business with EST. If you distribute any
information contained in this manual to unauthorized persons,
you have violated all distributor agreements and we may take
legal action.
TRADEMARKS Microsoft, Microsoft Mouse, Microsoft Windows, Microsoft Word,
and Microsoft Access are either registered trademarks or
trademarks of Microsoft Corporation.
EPISUITE is a trademark of ImageWare Systems, Inc.
CREDITS This manual was designed and written by the EST Technical
Services - Documentation Department, Sarasota.

DOCUMENT HISTORY
Date Revision Reason for change
25OCT01 01.00 Initial release.

Technical Manuals Online! - http://www.tech-man.com


Content

Chapter 1 Introduction • 1.1


Using this manual • 1.2
Available versions • 1.3
Stand-alone system requirements • 1.4
Network requirements and installation • 1.5
System features • 1.8
What is access control? • 1.9
ACDB building blocks • 1.11
Special access • 1.14
Setting up the system • 1.15

Chapter 2 Getting started • 2.1


Starting the program • 2.2
Logging on for the first time • 2.4
Importing an RP file • 2.6
Importing a sample RP file • 2.9
Logging on after RP file import • 2.13
Importing an RP file into an existing company • 2.14
Deleting an SDU project • 2.17
Deleting a company • 2.18
Interface overview • 2.19

Chapter 3 Basic operations • 3.1


Entering a startup screen caption • 3.2
Setting system options and preferences • 3.3
Viewing the selection table • 3.7
Saving your changes • 3.9
Multiple selection • 3.10
Downloading information • 3.12
Backing up your system • 3.14
Moving your database to a new PC • 3.15
Exiting from the ACDB • 3.16

Chapter 4 System and hardware configuration • 4.1


Configuring your system • 4.2
Configuring your system in company view • 4.3
Configuring your system in hardware view • 4.7
Configuring the doors • 4.9
Viewing Keypad Displays (KPDISPs) • 4.18
Command lists • 4.20

Chapter 5 Operators • 5.1


What is an operator? • 5.2
Creating a new operator record • 5.3
Adding a photo to an operator record • 5.5
Setting operator privileges • 5.8
Activating and deactivating an operator • 5.11
Logging on as a new operator • 5.13

Access Control Database User Manual i

Technical Manuals Online! - http://www.tech-man.com


Content

Changing your operator password • 5.14


Editing and deleting an operator record • 5.16
Changing operator information • 5.17

Chapter 6 Tasks • 6.1


What is a task? • 6.2
Default tasks • 6.4
Creating a task • 6.5
Starting a task • 6.7
Assigning a task to CRCs and KPDISPs • 6.10
Associating a task with a report • 6.11
Activating and deactivating a task schedule • 6.12
Viewing the status of a task • 6.13
Editing and deleting a task • 6.15

Chapter 7 Outbound ports and routes • 7.1


Outbound ports and routes overview • 7.2
Creating an outbound port • 7.6
Creating a route • 7.7
Configuring the default route • 7.8
Configuring your system for an alternative route • 7.9
Editing and deleting an outbound port • 7.12
Editing and deleting a route • 7.13

Chapter 8 Schedules • 8.1


What is a schedule? • 8.2
Creating a schedule • 8.4
Editing and deleting a schedule • 8.7
Defining the timeline colors • 8.8

Chapter 9 Holidays • 9.1


What is a holiday? • 9.2
Creating a holiday • 9.3
Sorting your holidays • 9.6
Activating and deactivating a holiday • 9.7
Editing and deleting a holiday • 9.9

Chapter 10 Access levels • 10.1


What is an access level? • 10.2
Creating an access level • 10.6
Expanding and collapsing an access level • 10.8
Assigning a schedule • 10.10
Assigning a command list • 10.13
Setting door privileges • 10.16
Setting KPDISP privileges • 10.18
Deleting an access level • 10.22

Chapter 11 Cardholders: basic • 11.1


What is a cardholder? • 11.2
Creating a cardholder record • 11.3
Adding personal information • 11.8
Naming cardholder UD tabs and UDFs • 11.10
Adding a photo to a cardholder record • 11.13
Activating and deactivating cardholders • 11.16

ii Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Content

Filtering cardholder information • 11.18


Editing and deleting cardholder records • 11.20
Reissued cards vs. lost cards • 11.21

Chapter 12 Cardholders: advanced • 12.1


Adding a card format and a facility code • 12.2
Setting the default card format and facility code • 12.6
Configuring an auxiliary card reader input • 12.9
Assigning central monitoring station user IDs • 12.11
Exporting a cardholder for badging • 12.14
Importing cardholders from an external database • 12.17

Chapter 13 Reports • 13.1


What is a report? • 13.2
Default reports • 13.5
Creating a report • 13.7
Filtering reports • 13.9
Setting the styles for a custom report • 13.15
Adding fields to a custom report • 13.18
Running a report • 13.20
Viewing and printing a report • 13.22
Editing and deleting a report • 13.24

Y Glossary • Y.1

Z Index • Z.1

Access Control Database User Manual iii

Technical Manuals Online! - http://www.tech-man.com


Content

Important information
Limitation of liability
This product has been designed to meet the requirements of
Underwriters Laboratories, Inc., Standard 294. Installation in
accordance with this manual, applicable codes, and the
instructions of the authority having jurisdiction is mandatory.
EST shall not under any circumstances be liable for any
incidental or consequential damages arising from loss of
property or other damages or losses owing to the failure of EST
products beyond the cost of repair or replacement of any
defective products. EST reserves the right to make product
improvements and change product specifications at any time.
While every precaution has been taken during the preparation of
this manual to ensure the accuracy of its contents, EST assumes
no responsibility for errors or omissions.

iv Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Content

About this manual


This manual provides reference information to support the
Access Control Database (ACDB) software.

Intended audience
This manual was written for people who have a working
knowledge of Windows-based computer programs.

Organization
This manual is organized to serve as a guide for the first-time
user. It takes you through the steps required to set up the system
for the first time, introducing you to each ACDB feature or
function as it’s needed. The chapters are presented in the
sequence you will need as you work through the ACDB program
from start to finish.
If your system has already been set up by your administrator and
all you wish to do is add users, proceed to Chapter 11:
Cardholders basic. For you to be able to gain access to the
ACDB, your system administrator must set you up as an operator
with proper privileges.
The manual consists of the following chapters:
Chapter 1: Introduction. This chapter introduces you to the
manual and explains the basic concepts of access control.
Chapter 2: Getting started. This chapter provides information
and procedures required to navigate and customize the ACDB
program. It also describes the Log In process for first-time users
and shows how to import a Resource Profile (RP) file.
Chapter 3: Basic operations. This chapter shows you the steps
for common operations including downloading, saving, backing
up, and exiting from the program.
Chapter 4: System and hardware configuration. This chapter
provides information about the administration functions of the
ACDB. It also provides procedures for configuring hardware
elements of the program.
Chapter 5: Operators. This chapter provides general information
required for defining and creating additional operators. The
functions the operators can perform are controlled by the
privileges that are assigned to them.
Chapter 6: Tasks. This chapter defines ACDB tasks and the
important functions they perform. Some of the functions that
tasks perform are system updates, access event history
management, database maintenance, and report automation.
Chapter 7: Outbound ports and routes. This chapter shows you
how to configure your system to communicate with the access

Access Control Database User Manual v

Technical Manuals Online! - http://www.tech-man.com


Content

control system. Communication must be properly set up for


downloading information from the ACDB to the hardware
(CRCs and KPDISPs) of your access control system.
Chapter 8: Schedules. This chapter provides the information
required to create and define the time schedules you apply to
doors. A schedule defines the access times for each day of the
week. In addition, access times for holidays are defined.
Chapter 9: Holidays. This chapter describes the process for
defining holidays. Holidays tell the ACDB when to use the
holiday access times defined in a schedule.
Chapter 10: Access levels. This chapter provides the information
required to create and define access levels. You use access levels
to specify access privileges for cardholders.
Chapter 11: Cardholders: basic. This chapter shows you how to
create cardholders, assign access levels, and enter access card
IDs.
Chapter 12: Cardholders: advanced. This chapter explains the
more advanced functions of the cardholder tab and the ACDB.
This includes importing cardholders, creating new facility codes
and card formats, assigning CMS user IDs, and exporting
cardholders for badging.
Chapter 13: Reports. This chapter contains procedures for
defining and creating reports. You can produce reports showing
access event history, presence of cardholders, or data from the
ACDB.

Purpose
The purpose of this manual is to give users of the Access Control
Database (ACDB) detailed operating instructions for the
program.
This manual provides a reference for both novice and
experienced users of the ACDB software. The manual assumes
that the necessary hardware and software installation has been
successfully completed.
Note: Depending on your specific operator privileges, you may
not see all of the system menus shown or described in this
manual.

Before you start


As a user of the ACDB program, you should be familiar with the
general physical layout of your site, and the access control
equipment your building employs (example: how keypads and
card readers are used at doors).
If you are unsure about these items, check with your integrated
system installer.

vi Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Chapter 1
Introduction

Summary
Welcome to the Access Control Database (ACDB). The ACDB
has feature-rich software that makes it easier and more efficient
to manage access control at your site. This chapter introduces the
ACDB program, defines access control, and discusses the
program’s functions within an integrated life safety system. It
also covers the conventions we use in this manual when giving
the instructions for completing specific tasks.

Content
Using this manual • 1.2
Mouse vs. keyboard • 1.2
Step-by-step instructions • 1.2
Available versions • 1.3
Stand-alone system requirements • 1.4
Network requirements and installation • 1.5
General requirements • 1.5
Network installation • 1.6
System features • 1.8
What is access control? • 1.9
What is the ACDB program? • 1.9
Card types • 1.10
ACDB building blocks • 1.11
Schedules • 1.11
Holidays • 1.11
Access levels • 1.11
Cardholders • 1.13
Special access • 1.14
Setting up the system • 1.15

Access Control Database User Manual 1.1

Technical Manuals Online! - http://www.tech-man.com


Introduction

Using this manual


Mouse vs. keyboard
The ACDB design makes full use of the mouse when performing
function commands, navigating within forms, and making
selections. You may find it easier to use the keyboard for some
functions, but be aware that a mouse is required for certain
functions.
Whenever given the choice of using a keyboard or a mouse to
perform window functions, choose the mouse. Most user actions
performed in a Windows environment are easier using a mouse
or some other pointing device.

Step-by-step instructions
The table below shows the conventions used in this manual.

Notation Meaning
Ctrl + P Simultaneous key press: Press and
hold Ctrl, press and hold P, then
release both keys
Alt, P, N Sequence of key presses: Press and
release Alt, press and release P,
press and release N
Tip: Text of the tip. Tips, displayed in the left column, give
keyboard shortcut or alternative
method for the particular task
Note: Text of the note. Notes are important facts that can
save you time or prevent serious
mistakes

1.2 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Introduction

Available versions

ACDB versions
Model Description CRC KPDISP HASP Key Network
KPDISP-CF Keypad Display Configuration None Unlimited Not No
software version. Configures required network
keypad display devices only. support
No configuration of CRCs or
entry of cardholders.
ACDB8 Access Control Database 8 or less Unlimited Required No
software integrated with network
EST3 that supports 8 or fewer support
doors
ACDB8+ Access Control Database Unlimited Unlimited Required No
software integrated with network
EST3 that can support any support
number of doors
ACDB-CLNT ACDB client used with a Unlimited Unlimited Required Yes
networked ACDB database
server. Database is only
stored on the server.
ACDB-SVR ACDB database server and Unlimited Unlimited Required Yes
client combination. The
server portion supports other
clients on a network. The
client portion can be used like
any other client on the
network.

Access Control Database User Manual 1.3

Technical Manuals Online! - http://www.tech-man.com


Introduction

Stand-alone system requirements


The ACDB is a portable, upgradeable software package. It runs
on any Pentium 400 MHz or greater PC.
The following are the minimum system requirements for running
the ACDB stand-alone versions (KPDISP-CF, ACDB8, and
ACDB8+). Computers at or above this level should be fully
capable of running the ACDB program.
• 400 MHz processor or higher
• 64 Mb RAM
• Windows 98 Second Edition*, ME*, or 2000
• Internet Explorer 4.01 service pack 2 or greater
• Jet 4.0 service pack 3
• 16x CD-ROM Drive
• 650 Mb available hard disk space
• 800 x 600 video support
• Keyboard
• Mouse
• Modem, V.32bis 14.4 Kb (if using a modem connection)
• HASP key
* Windows 98 and ME are recommended only for databases
with less than 1000 cardholders.
Note: The ACDB program requires the HASP key. The HASP
key plugs into the PC’s parallel port. The Keypad Display
Configuration (KPDISP-CF) version does not require a HASP
key.

1.4 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Introduction

Network requirements and installation


General requirements
The ACDB is also available in a network version. The
ACDB-SVR works with the ACDB-CLNT workstation. All the
data is stored and saved on the dedicated server workstation.
This is ideal for multiple operators at multiple workstations.
The ACDB-SVR controls all uploads and downloads to your
access control system. The ACDB-CLNT communicates to the
ACDB-SVR via your LAN or peer-to-peer connection. The
following are minimum system requirements for network
applications:
• 400 MHz processor or higher
• 64 Mb RAM
• Windows 2000
• Internet Explorer 4.01 service pack 2 or greater
• TCP/IP communication protocol
• 16x CD-ROM Drive
• 650 Mb available hard disk space
• 800 x 600 video support
• Keyboard
• Mouse
• Modem, V.32bis 14.4 Kb (if using a modem connection)
• HASP key (one for server and one at each workstation)
If your network is set up with peer-to-peer connections, verify
that all connected PCs have the following:
• Jet 4.0 service pack 3 (The file can be found at:
http://microsoft.com/data/download.htm)
• Client for Microsoft Networks
• PC sharing enabled
Successful installation and operation of the ACDB depends on
the integrity of your network. While we have made every effort
to provide you with a rugged, efficient network version of the
ACDB, we are not responsible for issues related to your LAN or
peer-to-peer connections.
Although the ACDB includes database security provisions, it is
the responsibility of your IT staff to configure and ensure
database security. Refer to the topic Network installation, below.
Note: The ACDB-SVR package includes both client and server
software components. Running the client software on the server
computer degrades overall network performance. We suggest
that you do not run the client software on the server during your
daily operations.
The following figure shows a sample of a network diagram using
ACDB-CLNT and ACDB-SVR software. Note that all

Access Control Database User Manual 1.5

Technical Manuals Online! - http://www.tech-man.com


Introduction

computers running this software must have a HASP key. The


ACDB server connects to the fire alarm control panels using
either a modem connection or a direct connection (RS-232).

Desktop computer Desktop computer Laptop computer


running ACDB-CLNT running ACDB-CLNT running ACDB-CLNT

Network

Desktop computer
running ACDB-CLNT

Integrated system Integrated system


control panel control panel

RS-232

ACDB Server
Main Server running ACDB-SVR Modem
Example network diagram for the ACDB-CLNT and ACDB-SVR

Network installation
Begin a network installation with the server. After installing the
ACDB-SVR software, your IT staff should configure DCOM
settings on the server by running the DCOM Configuration tool
as follows.

To configure DCOM settings:

1. Click Start > Run, then type dcomcnfg and click OK.
This opens the Distributed COM Configuration Properties
dialog box.
2. From the Applications list, select the DataServerComponent
object.

1.6 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Introduction

3. Click Properties to open the DataServerComponent


Properties dialog box.
4. Click Security to display the Security tab.
5. Click Use custom launch permissions, then click Edit.
This opens the Registry Value Permissions dialog box.
6. Click Add to open the Add Users and Groups dialog box
7. From the Names list, select the Everyone item.
8. Click Add to add Everyone to the Add Names list.
9. Click OK to close the Add Users and Groups dialog box.
10. Click OK to close the Registry Value Permissions dialog
box.
11. Click Apply to apply your changes.
12. Click OK to close the DataServerComponent Properties
dialog box.
13. Click OK to close the Distributed COM Configuration
Properties dialog box.
Continue the installation with the client machines. During
installation of the ACDB-CLNT software, you will be prompted
to specify the ACDB server machine by selecting its name.

Access Control Database User Manual 1.7

Technical Manuals Online! - http://www.tech-man.com


Introduction

System features
The ACDB provides a user-friendly environment for entering
and tracking access control information and for integrating it into
an overall access control system. It makes managing your access
control system easier and more efficient.
The ACDB includes these features:
• Data import from several commonly used databases
• Filter-defined cardholder search capability
• Cardholder photo import/export
• Cardholder import from an external file
• Operator define options (PIN schedule, unlock time)
• Administrator definable operator privileges
• Access history event log
• Database, access event, and presence reports
• Predefined and user-defined reports
• Muster reports
• Task manager to automate routine functions
• Encrypted external communications

1.8 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Introduction

What is access control?


An access control system controls access to your site by
controlling who can open the site doors, and when they can open
them. An access control system can also record specific types of
access events.
This means you no longer need to issue new keys or change
locks when staff join or leave your company.
An access control system lets you monitor traffic within your
site, showing who went where, and when. You can use an access
control system to determine the current location of staff, as in an
emergency.
Your access control system is part of an integrated system that
includes fire alarm, security, and access control functions.
In this manual, when we use the term access control system, we
mean the access control functions and hardware of your
integrated system, plus the ACDB and the access control
database it maintains.

What is the ACDB program?


The Access Control Database (ACDB) program is the software
component of your company’s overall access control system. It
provides a means for defining schedules, holidays, access levels,
and cardholders to control access to your company.
The ACDB manages a collection of information about your
company that specifies who should have access to the site and
when that access should be granted. The access control system
uses this information to control access through doors, and into or
out of partitions, during specific times. Partitions are physical
areas that a security system protects with a group of related
devices. A site may consist of a single partition or multiple
partitions. Partitions can be armed and disarmed independently.
Each controlled door at your site has a Card Reader Controller
(CRC) mounted nearby. Cardholders badge in at card readers
connected to the CRC. The CRC controls the door lock, and
grants or denies the cardholder access.
Keypad Displays (KPDISPs) are used to arm and disarm security
partitions, select system functions, and display event messages.
They are located conveniently throughout your site, usually near
a door.
The data from the ACDB is downloaded to the individual CRCs
and KPDISPs. The CRCs and KPDISPs store their own
databases, which allow them to operate without continuous
support from a network connection.

Access Control Database User Manual 1.9

Technical Manuals Online! - http://www.tech-man.com


Introduction

The ACDB lets you search, sort, edit, and print access control
data. The data includes information on cardholders, schedules,
holidays, and access levels. The ACDB also lets you run reports
to track access event history from all CRCs.

Card types
The ACDB lets you use several types of cards and card readers
to restrict access to a site. Cards and readers can be any of the
following:
• Proximity
• Wiegand pin
• Magnetic stripe
• Keypad
• Smart card
A cardholder can only gain entry to an area by presenting a valid
card at a card reader located at a specific entry point.
Using card and card readers lets the ACDB and your access
control system uniquely identify and monitor individuals as they
enter or leave controlled areas. Other methods of restricting
access, such as door locks and keys don’t provide a record of
access events.

1.10 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Introduction

ACDB building blocks


The ACDB program grants and restricts access to employees and
visitors based on building blocks defined in the ACDB, such as:
• Schedules
• Holidays
• Access levels
• Cardholders

Schedules
Schedules let you grant or deny access based on the time of day.
Any controlled door of your facility can be assigned a schedule.
Schedules include access times for working days, nonworking
days, and holidays.
Example: General office staff working from 8 a.m. to 5 p.m.
require access during those hours. Janitorial staff working from 5
p.m. to 11 p.m. require a different schedule than the office staff.

Holidays
Holidays are the days on which the holiday schedule (defined as
part of each schedule) takes effect. The date of a holiday can be
defined as a fixed date or as a specific week and day of a month.
Example: Good Friday is not a fixed date holiday but is set to
the first week and first Friday of the month of April. Christmas is
a fixed date holiday and is set to December 25.
If the holiday falls on a weekend, you can set an alternative day
off rule for the holiday. The alternative day off rule has three
options:
• Friday off if holiday falls on Saturday. Monday off if holiday
falls on Sunday.
• No day off if holiday falls on Saturday. Monday off if
holiday falls on Sunday.
• Friday off it holiday falls on Saturday. No day off if holiday
falls on Sunday.
Example: If Christmas falls on a Saturday or Sunday, companies
often allow their employees an alternative day off. Christmas
could be set to use the rule: Friday off if holiday falls on
Saturday and Monday off if holiday falls on Sunday.

Access levels
Not all employees require the same type of access. Therefore, the
ACDB lets you create different groups of schedules, privileges
and command lists. These predefined groups are called access
levels.

Access Control Database User Manual 1.11

Technical Manuals Online! - http://www.tech-man.com


Introduction

In practice, you will define an access level for each group of


employees having the same access needs.
Example: A manager might have disarm privileges, while a
clerical worker would not.
Each access level consists of the following:
• Schedules applied to CRCs
• Privileges
• Command lists

Schedules applied to CRCs


Each access level contains all the CRCs in your site. Initially,
these do not have a schedule attached. When defining the access
level, you assign a schedule to each CRC requiring access.
If no schedule is attached to a CRC, then no access is allowed at
that particular CRC.

Privileges
In addition to access rights (as defined by schedules), you can
define additional privileges for an access level.
Command privileges determine which security commands the
cardholder can execute.
Example: Arming or disarming a partition.
Access privileges determine when access also disarms a
partition, or when access is permitted outside of scheduled times.
Example: A manager might have irregular entry privileges,
while a clerical worker would not.
For a CRC the following privileges apply:
• Disarm privilege
• Irregular entry privilege
KPDISPs have the following fire alarm privileges:
• Disable privilege
• Panel silence privilege
• Reset and alarm silence privilege
KPDISPs also have the following security privileges, which
apply only to the partition:
• Arm away privilege
• Arm stay privilege
• Bypass/Disable privilege
• Disarm privilege

1.12 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Introduction

Command lists
You can think of a command list as a predefined set of system
responses. Your system can include several command lists. Your
integrated system installer defines command lists.
When you add a command list to a CRC, the system performs
that set of responses when the CRC sees a given event (e.g.
access granted).
Example: A CRC controlling an outside door could have a
command list that activates a CCTV camera.

Cardholders
Each cardholder record you create has an access level. The
access level contains the CRC schedules, privileges, and
command lists that define the cardholder’s access. The access
level defines when and where this cardholder can gain access.
Cardholder records also include access card numbers, photos,
personal information, and activation and expiration dates.

Access Control Database User Manual 1.13

Technical Manuals Online! - http://www.tech-man.com


Introduction

Special access
You can also specify special access schedules and privileges that
override normal system operations.
The ACDB lets you define and apply three additional schedules
that are specific to individual doors. These door schedules
override the access levels of cardholders. The door schedules
are:
• Unlock schedule
• PIN schedule
• Suppression schedule
Unlock schedules define times when a door is unlocked to allow
free access.
Example: A front door of a retail business open during retail
hours.
PIN schedules define times when a cardholder must enter a PIN
number in additional to presenting a valid access card.
Example: Requiring a PIN at a back door during off-hours can
guard against the use of a stolen card.
Suppression schedules define times normal access granted events
are not logged to history.
Example: During normal office hours you may wish to suppress
access granted events at restroom doors.

1.14 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Introduction

Setting up the system


The sequence used to set up the Access Control System is very
important. The organization of this manual serves as a guide for
the first-time user. It presents the Access Control Database
(ACDB) functions and commands in the order in which you will
use them to set up the system.
The ACDB was designed for three levels of user: administrators,
operators, and cardholders. The administrator has all privileges,
and configures key aspects of the system. The administrator also
creates operators and assigns their privileges. Operators maintain
the cardholder database adding, changing, or removing
cardholders as required. Cardholders are issued access cards and
use the access control system.
If you are an administrator, follow the general steps presented
below to set up the system. If you are an operator, proceed to
Chapter 11: Cardholders: Basic.

To set up your system:

1. Install the software. Refer to EST Software Installation


Guide P/N 3100136 (for ACDB-CLNT and ACDB-SVR
installation, refer to Network requirements and installation
in this chapter).
2. Log on to the software. Refer to Chapter 2: Getting started.
3. Import the project’s Resource Profile (RP) zip file (if this
was not already done by your installer). Refer to Chapter 2:
Getting started.
4. Review the basic operations of the ACDB software. Refer to
Chapter 3: Basic operations.
5. Configure the system. Refer to Chapter 4: System and
hardware configuration.
6. Create and set privileges for the operators who will be using
the ACDB software. Refer to Chapter 5: Operators.
7. Set up tasks to automate routine functions. Refer to Chapter
6: Tasks.
8. Set up the outbound ports and routes. Outbound ports and
routes determine how the ACDB will download information
to the access control system. Refer to Chapter 7: Outbound
ports and routes.
9. Set up the company’s access schedules. Refer to Chapter 8:
Schedules.
10. Set up the company’s holidays. Refer to Chapter 9:
Holidays.

Access Control Database User Manual 1.15

Technical Manuals Online! - http://www.tech-man.com


Introduction

11. Set up an access level for each employee group. Attach the
appropriate schedule, privileges, and commands to each
access level created. Refer to Chapter 10: Access levels.
Note: To improve the overall performance of the ACDB,
download to the access control system after creating your access
levels.
12. Set up all the cardholders that will access the building. Each
cardholder must be assigned at least one access level and a
card ID. The access level has a schedule attached to it. The
schedule may or may not have a schedule for holidays. Refer
to Chapter 11: Cardholders: Basic.
Note: To improve the overall performance of the ACDB,
download cardholders after each 1000 created.
13. Select and print any of the default reports provided, or create
custom reports for your specific needs. Refer to Chapter 13:
Reports.

1.16 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Chapter 2
Getting started

Summary
This chapter defines the process of logging on for the first time
and importing the Resource Profile (RP) file for your company.
Not all of the ACDB’s features and functions become active
until an RP file is imported.
This chapter also provides general information about screen
layouts and navigation for the ACDB program. Included are
discussions on the menus, functions, and procedures of the
ACDB.

Content
Starting the program • 2.2
Logging on for the first time • 2.4
What is an RP file? • 2.4
Logging on as an installer • 2.4
Changing the installer password • 2.5
Importing an RP file • 2.6
Importing a sample RP file • 2.9
What you should and should not add to the sample
database • 2.9
Importing the real RP file into the sample RP file • 2.11
Removing the sample RP file hardware • 2.11
Logging on after RP file import • 2.13
Importing an RP file into an existing company • 2.14
Modifications to the existing SDU project • 2.14
Importing a new SDU project • 2.15
Deleting an SDU project • 2.17
Deleting a company • 2.18
Interface overview • 2.19
Title bar • 2.19
Menu bar • 2.20
Toolbar buttons • 2.23
Tabs • 2.25
Selection list or tree • 2.26
Left, middle, and right panes • 2.26
Status bar • 2.26

Access Control Database User Manual 2.1

Technical Manuals Online! - http://www.tech-man.com


Getting started

Starting the program


The ACDB uses the familiar Windows interface. If you are
familiar with the Windows environment, you should have no
problems using the ACDB.
To run the ACDB program, you must have a software key
installed on your computer. (No software key is needed for the
KPDISP-CF version.) If no software key has been installed,
follow the instructions in the ACDB Software Installation Guide
P/N 3100136 that comes with the software.

To start the program:

• Click Start > Programs > Access Control DataBase > Access
Control DataBase, or double-click the Access Control
DataBase icon on your desktop.
The ACDB displays a progress bar indicating that the program is
starting.

ACDB progress bar at startup

Once the starting sequence is complete, the ACDB displays its


start screen.

The ACDB start screen lets you log on to the software


From the start screen, you have four options:
• Log In
• Exit

2.2 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Getting started

• Help
• About

Log In
The Log In option is the entry point for using the software. Users
are issued an Operator ID and a password that lets them gain
entry to the program and make modifications to their access
control system.

Exit
The Exit option lets you exit from the program.

Help
The Help option launches an online version of this manual. The
online version includes three navigation tabs:
• The Contents tab provides a table of contents view of the
help system
• The Index tab is an alphabetical list of terms. Use the index
to find topics associated with each term.
• The Search tab lets you search for keywords you enter. This
is generally the fastest method of locating answers to your
questions.

About
The About option brings up a box displaying the current version
of the ACDB software. This information is useful if you decide
to upgrade your software and need to know what version you are
currently running.

Access Control Database User Manual 2.3

Technical Manuals Online! - http://www.tech-man.com


Getting started

Logging on for the first time


The integrated system installer is typically an employee of the
company that installed your access control system. Before
anyone can use the ACDB, the installer must create and import
the Resource Profile (RP) file.
After the RP file is imported, the system automatically assigns
an administrator ID and password. The administrator has all
privileges to the ACDB.
Note: Your integrated system installer creates the RP file. He
may also import the RP file into the ACDB. If your installer has
already imported the RP file, he should have given you the
administrator ID and password. If you have been given the
administrator ID and password, proceed to Logging on after RP
file import later in this chapter. If the installer has not imported
the RP file, you may do so now by following the instructions in
Importing an RP file.

What is an RP file?
The RP file defines the access control system for the ACDB
program. It includes detailed information about each CRC and
KPDISP used in your access control system. It contains the
following:
• CRCs, KPDISPs, partitions, and buildings in the system
• Routing required to access each device for downloads
• KPDISP fire alarm command privileges
• Primary company for each CRC
• Primary partition for each KPDISP
• Number of allocated cardholders for each CRC and KPDISP
• Number of allocated access levels, schedules, and holidays
for CRCs
• Command lists used for CRCs
• All MODCOM (integrated system dialer/modem card)
information

Logging on as an installer
If you do not have an operator ID and a password, you must
import an RP file to obtain them. Begin by logging on to the
software as the installer.
Note: The initial installer password is 3333. We suggest that you
change the installer password after your initial log on. Make sure
to record and save the revised password in a safe place.

2.4 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Getting started

To log on as the installer:


Tip: Operator IDs and 1. Click Start > Programs > Access Control DataBase > Access
passwords are not case
Control DataBase, or double-click the Access Control
sensitive so it makes no
difference if you type in all
Database icon on your desktop.
caps, in lowercase, or a 2. Click Log In on the start screen.
combination of both.
3. Type INSTALLER in the Operator ID field.
4. Type the password into the Password field.
5. Click OK.
The system will log you on as an installer. The installer only sees
a limited view of the software. The installer is prevented from
adding or modifying cardholders, access levels, schedules,
holidays, reports, and operators. This protects the end user from
unauthorized entries to the access system. The primary function
for an installer is to import the RP file.

Changing the installer password


The ACDB recommends that you change the installer password
after your initial log on. Make sure to record the new password
in a safe place.

To change the installer password:

Tip: Press Alt + T, O to 1. From the Tools menu, click Options.


launch the options dialog
2. Click the Operator tab.
box.
3. Click Modify.
4. Type your current password (3333).
5. Type the new password.
6. Retype the new password to confirm it.
7. Click Modify to change the password.
8. Click OK to accept the new password.

Access Control Database User Manual 2.5

Technical Manuals Online! - http://www.tech-man.com


Getting started

Importing an RP file
After logging on as an installer, your next task is to import an RP
file. The integrated system installer should have given you the
RP file for your company. The RP file contains the database for
a single site. This includes information about the company,
buildings, partitions, CRCs, and KPDISPs.
Note: To improve the performance of the ACDB, we
recommend that you download to the hardware of your access
control system immediately after importing your RP file. You
must log on as the administrator to download.
Each RP file represents one site of one company. A large
company may have multiple sites.
Example: A company has two different locations of operation.
One is in New York and the other is in Tennessee. Each site
would have a separate RP file.
You can only import one RP file at a time. Importing the first RP
file defines the company. If you have two sites, you import the
second RP file into the existing company.
Note: To import any additional RP files into an existing
company, you must log off as the installer and log on as the
administrator (ADMIN1).
At the end of the import, the ACDB assigns an administrator ID
and password, using the default password ADMIN.
Each company is assigned an administrator ID after the RP file is
imported. You can use this ID and password to begin to add
information to your ACDB system.
The default operator ID is ADMIN1, with password ADMIN.
ADMIN1 is always used for the first company imported by the
integrated system installer. If a second company is imported, the
operator ID is ADMIN2, again using password ADMIN.
If your integrated system installer has not completed or given
you your RP file, proceed to Importing a sample RP file in this
chapter. Importing a sample RP file allows you to begin adding
information to your database while your installer completes your
RP file.

2.6 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Getting started

Before using the ACDB you must import an RP file, using the
Resource Profile Manager (RPM) file import dialog box

To import an RP file:

Tip: Press Alt + F, I, R to 1. From the file menu, click Import > RPM Configuration
launch the Import Information.
Resource Profile Manager
(RPM) File dialog box. 2. Locate the RP ZIP file you want to import, select it, and
click Open.
If your integrated system installer gave you a floppy disk
containing your RP file, insert the disk and select the RP file
from your floppy drive.
3. Click OK to confirm that the ACDB has extracted your
database.
4. Type a company name if your company name does not
match the company name given and click Done.
5. Type a Site name and click Done.
Both company and site are new, since this is the first RP file
import. An example of a site name is Chicago Campus or
North Campus.
6. Click the OK button.
Note: The system displays the administrator operator ID and
password. Write these down in a safe place.
7. Click OK.
Note: To improve the performance of the ACDB and assure
hardware connection, we recommend that you download to the
hardware of your access control system immediately after
importing your RP file. Log on as the administrator to download.
See Chapter 7: Outbound ports and routes for information on
configuring the ACDB for downloading.

Access Control Database User Manual 2.7

Technical Manuals Online! - http://www.tech-man.com


Getting started

Verify the imported information


After your RP file is imported into the system, you will be able
to see the project tree on the Administration System tab.
Sites, buildings, partitions, KPDISPs, and CRCs are sub-levels
of the company and their icons are not displayed in the collapsed
tree view. To view all levels of the project, expand the tree view
by clicking the plus signs next to the icons.
You should review the information that your integrated system
installer entered for your company and buildings. We will show
you how to correct any errors in the chapters that follow. It is
important to remember that when you make changes to the RP
file you should contact your integrated system installer to inform
them of the corrections.
For installer contact information click on the Hardware View tab
and the SDU icon in your company tree.
Since you have just imported your actual RP file, skip the next
topic and proceed to Logging on after RP file import in this
chapter.

2.8 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Getting started

Importing a sample RP file


If your integrated system installer has not given you an RP file
because it is still being developed, then you can import a sample
RP file. By importing a sample RP file, you can start adding
information to the ACDB database while the installer completes
your RP file.
The sample RP file gives you full access to the ACDB software.
It gives you a visual representation of what a company, a site, a
building, a door, and a keypad look like in the ACDB.
Note: It is important that you do not download information while
the sample RP file is in your database. When you exit from the
ACDB, you are prompted to send hardware updates to the
system. Click No while the sample RP file is in your database.
When you receive your company’s RP file, you need to import it
into the existing sample company and site and then remove the
sample RP file hardware.

What you should and should not add to the


sample database
While your real RP file is being completed, you can begin to add
information to your database by importing the sample RP file. It
is important to follow these instructions on what you should and
should not add to the ACDB. After you have imported the
sample RP file, log on to the ACDB as the administrator.
What you can add:
• Operators
• Schedules
• Holidays
• Access levels
• Cardholders
When adding access levels, do not assign schedules, privileges,
or command list to any CRC or KPDISP.
When adding cardholders, do not download cardholders to the
hardware of your access control system.
What you should not add:
• Tasks
• Reports

Access Control Database User Manual 2.9

Technical Manuals Online! - http://www.tech-man.com


Getting started

When importing a sample file make sure to enter your company’s


name and site

To import a sample RP file:

Tip: Press Alt + F, I, R to 1. From the file menu, click Import > RPM Configuration
launch the Import Information.
Resource Profile Manager
(RPM) File dialog box. 2. Locate the Sample_Company ZIP file in the ACDB
directory, select it, and click Open.
3. Click OK to confirm that the database has been extracted.
4. Type your company name over the Sample_Company name
given and click Done.
5. Type your site name and click Done.
Both company and site are new, since this is the first RP file
import. An example of a site name is Chicago Campus or
North Campus.
6. Click OK.
Note: The system displays the administrator operator ID and
password. Write these down in a safe place.
7. Click OK.
Note: Once you have imported the Sample RP file, do not
download to the hardware of your access control system.

View the imported information


After importing the sample RP file you will be able to see the
project tree on the Administration System tab. Sites, buildings,
partitions, KPDISPs, and CRCs are sub-levels of the company
and their icons are not displayed in the collapsed tree view. To
view all levels of the project, expand the tree view by clicking
the plus signs next to the icons.

2.10 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Getting started

Importing the real RP file into the sample RP file


The sample RP file is only meant to be used temporally, while
your real RP file is being completed. The sample RP file lets you
access all features of the ACDB so you can begin to add
information to the ACDB database. Once you receive the
completed RP file, import it into the sample company and site,
and then remove the sample RP file hardware. This removes the
sample hardware while preserving any database entries you’ve
already entered.

To import the real RP file into the sample RP file:

1. Log on to the system as the administrator.


Tip: Press Alt + F, I, R to 2. From the file menu, click Import > RPM Configuration
launch the Import Information.
Resource Profile Manager
(RPM) File dialog box. 3. Locate and select the real RP ZIP file you want to import
and click Open.
If your integrated system installer gave you a floppy disk
containing your RP file, insert the disk and select the RP file
from your floppy drive.
4. Click OK to confirm that the database has been extracted.
5. Select the existing company name.
6. Select the existing site and click OK.
Both company and site are existing, since you are importing
your real RP file and not a new RP file.
7. In the Options tab, click an Update Option, then click Done.
• Always overwrite with data from import
• Ask for each change
• Never overwrite
Note: The overwrite options do not apply to the hardware of
your access control system. All CRCs and KPDISPs are
overwritten each time you import a new RP file. The overwrite
options only apply to company address and company contact
information, and building address and building contact
information.
8. Click OK.

Removing the sample RP file hardware


Now that you have imported your real RP file, you can remove
the sample RP file hardware from your system. By clicking the
Hardware > System > Hardware View tab, you can see two SDU
projects in the tree. One is your real SDU project and one is
labeled Sample R.

Access Control Database User Manual 2.11

Technical Manuals Online! - http://www.tech-man.com


Getting started

You want to remove the Sample R SDU project from your


database. This removes the sample project and all the hardware
associated with it.

To remove the sample RP file:

1. Log on to the ACDB as the administrator.


2. Click Hardware > System > Hardware View tab.
3. Select the SDU project labeled Sample R.
4. From the File menu, select Delete or click the Delete button
from the toolbar.
5. Click Yes to confirm the deletion.
This removes the sample hardware from your database. You can
now configure your complete ACDB database.
Note: To improve the performance of the ACDB and assure
hardware connection, we recommend that you download to the
hardware of your access control system at this point. See Chapter
7: Outbound ports and routes for information on configuring the
ACDB for downloading.

2.12 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Getting started

Logging on after RP file import


After the RP file has been imported, you need to log out of the
system as the installer and log on as the administrator, using the
Operator ID and Password you wrote down.

The ADMIN1 Operator ID is always used for the first company


imported

To log on after an RP file import:


Tip: Operator IDs and
1. On the Action menu, click Login.
passwords are not case
sensitive so it makes no The Login command logs you off as the installer and then
difference whether you lets you log on as a new operator.
type in all caps, in
lowercase, or in a 2. Click the OK button to log off as the INSTALLER.
combination of both. 3. Type your Operator ID, e.g. ADMIN1.
4. Type your Password, e.g. ADMIN.
5. Click OK to log on as the administrator.
Note: The password “ADMIN” should only be used the first
time you log on to the ACDB. Once you log on, we strongly
recommend that you change the password. ADMIN1 is the
operator ID you use to create all other operators. See Chapter 5:
Operators.
After you log on, the program displays the ACDB window with
all features and functions active.

Access Control Database User Manual 2.13

Technical Manuals Online! - http://www.tech-man.com


Getting started

Importing an RP file into an existing company


You’ll need to import an RP file into an existing company
whenever:
• You change the configuration of your access control system
• You import a new SDU project into your company

Modifications to the existing SDU project


There may come a time when the configuration of your
company’s access control system (referred to as an SDU project)
is changed or modified. Any changes to the company, site,
buildings, partitions, KPDISPs, or CRCs requires an updated RP
file. Import the updated RP file into the existing company and
the existing site. Possible changes include the following:
• Changes to the existing hardware of your SDU project
• The addition of hardware to your SDU project
• The removal of hardware from your SDU project
Importing into an existing company is much the same as
importing a new RP file, except that the imported information
goes into the existing company and existing site. This replaces
the old company information with the new information.
Importing an RP file into an existing company and existing site
has no impact on your existing ACDB database.
After the updated RP file has been imported, the ACDB displays
your new hardware configuration in the Hardware > System tab.
Note: You can only import an RP file into an existing company
when logged on to the ACDB as an administrator.

To modify the existing SDU project:

1. Log on to the system as the administrator.


Tip: Press Alt + F, I, R to 2. From the file menu, click Import > RPM Configuration
launch the Import Information.
Resource Profile Manager
(RPM) File dialog box. 3. Locate and select the updated RP ZIP file you want to import
and click Open.
If your integrated system installer gave you a floppy disk
containing your RP file, insert the disk and select the RP file
from your floppy drive.
4. Click OK to confirm that the database has been extracted.
5. Select the existing company name.
6. Select the existing site and click OK.
Both company and site are existing, since you are importing
an updated RP file and not a new RP file.

2.14 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Getting started

7. In the Options tab, click an Update Option, then click Done.


• Always overwrite with data from import
• Ask for each change
• Never overwrite
Note: The overwrite options do not apply to the hardware of
your access control system. All CRCs and KPDISPs are
overwritten each time you import a new RP file. The overwrite
options only apply to company address and company contact
information, and building address and building contact
information.
8. Click OK.

Importing a new SDU project


If your company has more than one SDU project, both projects
can be maintained in a single ACDB database. Each SDU project
is represented by a single RP file. After the first RP file is
imported, the additional RP files are imported into the existing
company. Both projects are maintained in a single ACDB
database.
There are two ways to import a new SDU project into the
ACDB:
• Import the new SDU project into the existing company but a
new site
• Import the new SDU project into the existing company,
existing site, and existing building
Note: The SDU project can not contain more than one building.
If your additional SDU project represents a separate location,
then import the RP file into the existing company and a new site.
Example: A company has two different locations of operation.
One is in New York and the other is in Tennessee. Each site has
a separate RP file both are maintained in a single database.
If your additional SDU project represents a separate project from
the same building, then import the RP file into the existing
company, existing site, and existing building.
Example: A large building contains two SDU projects. Each
project is imported into the ACDB separately. Both projects can
be maintained with a single ACDB database.
Note: You can only import an RP file into an existing company
when logged on to the ACDB as an administrator.

To import into an existing company:

1. Log on to the system as the administrator.

Access Control Database User Manual 2.15

Technical Manuals Online! - http://www.tech-man.com


Getting started

Tip: Press Alt + F, I, R to 2. From the file menu, click Import > RPM Configuration
launch the Import Information.
Resource Profile Manager 3. Locate and select the updated RP ZIP file you want to import
(RPM) File dialog box. and click Open.
If your integrated system installer gave you a floppy disk
containing your RP file, insert the disk and select the RP file
from your floppy drive.
4. Click OK to confirm that the database has been extracted.
5. Click Yes to confirm that you are importing a different
project into your database.
6. Select the existing company name.
7. Type the new site or select the existing site and click OK.
Type new site for a project from a separate location.
Select the existing site if the project is from the same
building.
8. If you selected an existing site, select an existing building
where the project is located.
A project being imported into an existing building can
contain no more than one building.
9. In the Options tab, click an Update Option, then click Done.
• Always overwrite with data from import
• Ask for each change
• Never overwrite
Note: The overwrite options do not apply to the hardware of
your access control system. All CRCs and KPDISPs are
overwritten each time you import a new RP file. The overwrite
options only apply to company address and company contact
information, and building address and building contact
information.
10. Click OK.

2.16 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Getting started

Deleting an SDU project


Each RP import represents an SDU project. A company in the
ACDB can contain multiple projects. If needed, you can delete
an SDU project from the ACDB database. Deleting the SDU
project does not delete any data from the database but removes
all buildings, partitions, CRCs, and KPDISPs associated with the
project.
To delete an SDU project you must log on as the administrator.
Note: If cardholders have an access level that has CRCs and
KPDISPs in the SDU project being deleted, the cardholder status
may become inaccurate.

To delete a SDU project:

1. Log on to the ACDB as the administrator.


2. Click the Administration > System > Hardware View tab.
3. Select the SDU icon that you want to delete.
4. From the File menu, click Delete or click the Delete button
on the toolbar.
5. Click Yes to delete the RP file.
The ACDB shuts down after deleting the RP file. Simply restart
the ACDB to continue operations.

Access Control Database User Manual 2.17

Technical Manuals Online! - http://www.tech-man.com


Getting started

Deleting a company
If needed, you can delete a company from the ACDB database.
A company represents all RP imports including all sites,
buildings, partitions, CRCs, KPDISPs, and MODCOMs.
Deleting the company removes all RP files and data from the
database (cardholders, access levels, schedules, and holidays).
After the company has been deleted, you can import a RP file
that contains the correct information for your company.
To delete a company you must log on to the ACDB as the
Installer. Refer to Logging on as an installer in this chapter.

To delete a company:

1. Log on to the ACDB as the Installer.


2. Select the company icon that you want to delete.
3. From the File menu, click Delete or click the Delete button
on the toolbar.
4. Click Yes to delete the RP file.
The ACDB shuts down after deleting the RP file. Simply restart
the ACDB to continue operations.

2.18 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Getting started

Interface overview
Once you log on, the first screen you see is the main window of
the program. This window contains the navigation tools that you
need for performing tasks within the program.
The program defaults to the CardHolder tab, but you can
navigate to any part of the program by selecting the appropriate
tab.
The main window has these features:
• Title bar
• Menu bar
• Toolbar with buttons
• Page tabs
• Selection list or tree
• Left, middle, and right panes
• Status bar

Title bar

Menu bar
Toolbar
Page tabs

Selection
list or tree

Status bar

Left pane Middle pane Right pane

ACDB window

Title bar
The title bar shows if the current record you are working on has
been modified or is currently being modified. This makes it
easier to track which records have been modified.

Access Control Database User Manual 2.19

Technical Manuals Online! - http://www.tech-man.com


Getting started

Menu bar
Below the title bar is the menu bar. The menus available are:
Tip: When a menu • File
command has a keyboard • Edit
shortcut, the shortcut is • View
displayed on the menu. • Action
This helps you learn faster, • Tools
more efficient ways to use • Reports
the program.
• Help

File menu commands


Command Description
New Creates a new file
Delete Deletes the selected file
Save Saves the ACDB in its current state
Import Imports CRC firmware (for future use),
RP configuration information, and
external cardholder databases
Print Preview Provides a preview of a report based on
your current location in the ACDB.
Example: From the Cardholder tab the
Cardholder report is previewed.
Printer Setup Selects the printer and sets its options
Print Not currently active
Exit Ends your session with the ACDB, logs
you off, and closes the window

Edit menu commands


Command Description
Undo Undoes your last action
Redo Repeats your last action
Discard All Changes Deletes the last series of actions and
keystrokes for the current tab.
Note: Once you discard all changes, the
information cannot be restored using
Undo.
Cut Moves the selected text to the Clipboard
Copy Copies the selected text to the
Clipboard

2.20 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Getting started

Paste Copies the data from the Clipboard to


the current cursor location

View menu commands


Command Description
Expand Branch Expands the entire selected branch
Expand Tree Expands all branches of the entire tree
Collapse Branch Collapses the entire selected branch
Collapse Tree Collapses all branches of the entire tree
Toggle All Selections Selects all CRCs and KPDISPs that are
not currently selected, and deselects all
CRCs and KPDISPs that are selected
Deselect All TreeView Deselects all CRCs and KPDISPs that
Nodes are selected
CardHolders Displays the Cardholder tab
Access Levels Displays the Access Levels tab
Schedules Displays the Schedule tab
Holidays Displays the Holiday tab
Reports Displays the Reports tab
Administration Displays the Administration tab and
subordinate tabs

Action menu commands


Command Description
Login Allows an operator to log off and a
different operator to log on
Select Current Record Selects the individual record that has
focus (contains the arrowhead)
Deselect Current Deselects the individual record that has
Record focus
Select All Records Selects all records for the current tab
Deselect All Records Deselects all records for the current tab
Resync with Server Refreshes data from the server to make
sure that the most current data is
displayed
Action Send Changes Sends all new and changed information
to the CRCs and KPDISPs

Access Control Database User Manual 2.21

Technical Manuals Online! - http://www.tech-man.com


Getting started

Message Center Not currently active


Reissue Card Reissues an access card to a new user.
Clears all cardholder information except
for the card information and access
level.
Add Access Level Adds a schedule to an access level
Schedule
Delete Access Level Removes a schedule from an access
Schedule level
Set Access Level Sets a specific access level privilege for
Privilege the selected level
Reset Access Level Resets a specific access level privilege
Privilege for the selected level
Add Access Level Adds a command list to an access level
Command List
Delete Access Level Removes a command list from an
Command List access level

Tools menu commands


Command Description
Photo Imports, exports, or clears a photo of a
cardholder or an operator
Options Sets several ACDB options
Troubles Display Displays any current troubles with the
ACDB
Set Network Server For network clients of the ACDB. Allows
the client to change the location of the
Data Server Component Object.

Reports menu commands


Command Description
Database Opens a submenu of database reports
that can be printed for the current tab.
The system displays a preview of each
report.
Access Events Opens a submenu of access event
reports that can be printed for the
current tab
Presence Opens a submenu of presence reports
that can be printed for the current tab

2.22 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Getting started

Resource Usage Opens a submenu of resource usage


reports that can be printed for the
current tab

Help menu commands


Command Description
Contents, Index Opens the table of contents, index, and
search tabs for the help system
About Shows the current version of the
software

Toolbar buttons
Below the menu bar is the toolbar. The toolbar buttons execute
many of the commands found in the menus.
When you point to a button, a tool tip is displayed indicating the
function of the button. Not all toolbar buttons are active at all
times. When a button is not active, it is grayed out.

Toolbar buttons

Toolbar button commands


Button Command Description
New Creates a new item

Delete Deletes the selected item

Save Saves the ACDB in its current state

Print Provides a preview of the Cardholder


preview Detail report
Undo Returns to the previous state by undoing
the last action
Redo Reverses the last Undo command,
reinstating the last action
Discard All Returns to the last saved state undoing
Changes all changes
Cut Removes an object to the clipboard
where it can be pasted to a file

Access Control Database User Manual 2.23

Technical Manuals Online! - http://www.tech-man.com


Getting started

Copy Copies an object to the clipboard where


it can be pasted to a file
Paste Copies an object from the clipboard to a
file
Select Selects the individual record item that
current has focused
record
Deselect Deselects the individual record item that
current has focused
record
Select all Selects all record items for the current
records window
Deselect all Deselects all record items for the current
records window
Expand Expands the entire selected branch
branch
Expand tree Expands all branches of the entire tree

Collapse Collapses the entire selected branch


branch
Collapse Collapses all branches of the entire tree
Tree
Toggle Selects all CRCs and KPDISPs that are
selection of not currently selected, and deselects all
eligible tree CRCs and KPDISPs that are selected
nodes
Deselect all Deselects all CRCs and KPDISPs that
tree view are selected
nodes
Re- Refreshes data from the server to make
synchronize sure that the most current data is
with server displayed
Send Sends all new and changed information
changes to to the CRCs and KPDISPs
access
equipment
Reissue Reissues an access card to a new user.
Clears all cardholder information except
for the card information and access
level.
Message Not currently active
center
Help Opens the online help system
contents

2.24 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Getting started

Tabs
Below the toolbar are the tabs. The tabs separate the ACDB
program into six main sections.

ACDB tabs

ACDB tabs
Tab Description
Displays the Cardholder tab

Displays the Access Levels tab

Displays the Schedules tab

Displays the Holiday tab

Displays the Report tab

Displays the Administration tab

CardHolders tab
The CardHolders tab stores all cardholder information. You can
attach a photo to the cardholder information tab, determine what
type of access card (badge) should be issued for each cardholder,
and assign two different access levels to the cardholder.

Access Levels tab


The Access Levels tab is used to create or modify access levels.
Assigning schedules and privileges to doors and keypads creates
an access level.

Schedules tab
The Schedule tab is used to create and maintain schedules.
Schedules are used for various functions, including restricting
access by day and time.

Holidays tab
The Holidays tab is used to record your company’s holidays.
You can program holidays to occur on fixed dates or days of the
week. Through schedules, a holiday schedule alters the access
times for a holiday.

Access Control Database User Manual 2.25

Technical Manuals Online! - http://www.tech-man.com


Getting started

Reports tab
The Reports tab is used to generate reports. Reports can be
generated with information in the ACDB database concerning
cardholders and data gathered from the CRC (Card Read
Controller). You can choose reports from templates that have
been included or you can customize your own reports to include
information that you specify.

Administration tab
The Administration tab includes these subordinate tabs: System,
Operators, Command List, Tasks, Outbound Ports, and Routes.
Only operators with administration privileges have access to the
Administration tab. Options on the administration tabs let your
system administrator tailor the features and functions of the
ACDB.

Selection list or tree


Each tab of the ACDB is displayed with a selection list or tree in
the left pane. The selection list contains the items that have been
created for the current tab. As more items are created, they are
added to the selection list.
The Access Level tab and the Administrator System tab contain
a tree view. The tree displays the components that make up your
access control system.

Left, middle, and right panes


The ACDB window is divided into left, middle, and right panes.
The left pane contains selection lists or tree views for the current
tab.
Examples: Cardholder name list, schedule list, or tree view of
access control hardware.
The middle pane displays information about the selected item.
You use the middle pane when creating cardholders, access
levels, holidays, and schedules.
The right pane contains the activation status or other special
functions for the current tab.
Note: Depending on the tab you have selected, one or more of
these panes may be combined into a single large work area.

Status bar
The status bar is located at the very bottom of the ACDB
window. The ACDB displays the following information in the
status bar:
• The operator that is currently logged on

2.26 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Getting started

• Summary of device troubles


• Number of operators currently logged on
• Who the currently selected record is locked by
• The current state of the record
• The last date and time the record was modified
• The current help message
To obtain additional information about any of the status bar
information, click on the information in the status bar. The
ACDB displays a dialog box with additional information.

Access Control Database User Manual 2.27

Technical Manuals Online! - http://www.tech-man.com


Getting started

2.28 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Chapter 3
Basic operations

Summary
The ACDB makes use of several basic functions. Learning these
basic functions will help you use the ACDB more effectively and
save you time in your day-to-day work. This chapter introduces
you to the basics of the ACDB.

Content
Entering a startup screen caption • 3.2
Setting system options and preferences • 3.3
Operator tab • 3.3
Preferences tab • 3.4
Company Information tab • 3.5
UD Cardholder Tab Labels tab and UDF Labels tab • 3.6
Card Code Formats tab • 3.6
Facility Codes tab • 3.6
Viewing the selection table • 3.7
Navigating with the arrow buttons • 3.7
Selecting with the letter tabs • 3.7
Saving your changes • 3.9
Multiple selection • 3.10
Selecting multiple records with the four action
commands • 3.10
Additional methods to select multiple records • 3.11
Downloading information • 3.12
When to download • 3.12
Downloading failure • 3.12
Backing up your system • 3.14
Moving your database to a new PC • 3.15
Exiting from the ACDB • 3.16

Access Control Database User Manual 3.1

Technical Manuals Online! - http://www.tech-man.com


Basic operations

Entering a startup screen caption


When you open the ACDB program, it displays the startup
screen, as shown below. The startup screen has a caption at the
bottom. You can edit the caption to suit your needs. The caption
can contain up to forty characters.
Note: Normally your integrated system installer enters the
caption for you. In order to enter or edit the startup screen
caption you must be log on to the software as the installer. Refer
to Chapter 2: Getting started for further information on logging
on as an installer.

Startup screen with sample caption

Entering a startup screen caption:

1. Log on to the ACDB as the installer.


Tip: Press Alt + T, O to
launch the Option dialog 2. From the Tools menu, click Options.
box.
3. Click the Installer tab.
4. In Splash Caption, type the caption text, as you want it to
appear on the start screen.
5. Click Apply.
6. Click OK.
The next time you start the ACDB, the ACDB displays the
modified caption at the bottom of the startup screen.

3.2 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Basic operations

Setting system options and preferences


Selecting Options from the Tools menu lets you create and
modify many system options and preferences. These include:
• Current operator information and password
• ACDB preferences for current operator
• Company address, contact information, and defaults
• User Defined Field (UDF) labels configuration
• User Defined (UD) cardholder tab configuration
• Card code format configuration
• Facility code configuration

Preferences and options dialog box for ADMIN1

Operator tab
The Operator tab lets you view information for the operator
currently logged on. You can also change the operator’s
password using this tab.
The Operator tab also shows the date and time for the current
operator’s last session. See Chapter 5: Operators for detailed
information regarding operators.

Access Control Database User Manual 3.3

Technical Manuals Online! - http://www.tech-man.com


Basic operations

Preferences tab
Preferences are set for the current operator of the ACDB.
Operators can set their own preferences. The Preference tab is
divided into three subtabs:
• General
• Confirmations
• Diagnostics

General tab
The General tab has the following fields:
• Time Display: Determines whether time is displayed in 12
hour or 24-hour format.
• Date Display: Determines whether dates are displayed in
short or long date format.
Example of long date: Thursday, January 11th, 2001
Example of short date: 01/11/01
• Automatic Logout: Sets the program to automatically log
you off after a specified time.
• Access Colors: Defines the colors of the time bars used for
schedules. See Chapter 8: Schedules for detailed
information.
In addition there is a group of fields called Miscellaneous
options. This includes:
• Weeks Start On Sunday: Determines the starting day
(Sunday or Monday) for calendars.
• Restore to Last Context: Saves your location in the ACDB
and starts each session where you ended the previous
session. Normally, the software opens at the Cardholder tab.
• Restore Last Operator ID at Login: Retains your login ID
when logging on to the software.

Confirmations tab
For some actions, the system displays a confirmation dialog box.
You can choose whether or not the system displays confirmation
dialogs for the following actions:
• Deleting photos
• Adding schedules
• Deleting schedules
• Setting privileges
• Resetting privileges
• Adding command lists
• Deleting command lists

3.4 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Basic operations

Diagnostic tab
The Preferences tab provides diagnostic information for client
activity within the ACDB. This section is for factory use only.

Company Information tab


The Company Information tab has two subtabs, General and
Defaults. The General tab is for company address and contact
information. The Default tab is where the default card format
and facility code are set. The Default tab also offers a
configuration button for an auxiliary card reader input.

General tab
Company information is the information specific to the owner
and controller of the entire site. This information includes the
company address and contact information.
Typically, the Resource Profile (RP) file provides company
information. The company information is imported into the
ACDB along with your access control system information, but
you can revise the imported information as required. See Chapter
4: System and hardware configuration for further information.
Note: If you make changes to the company information, contact
your integrated system installer and inform him of the
corrections. For installer contact information, click the Hardware
View tab and the SDU icon in your company tree. The installer
will need the information to correct his records for future contact
with you.

Default
For each cardholder you assign a card format and possibly a
facility code. Some cards formats do not require a facility code.
The majority of cardholders will be using the same card format
and facility code. Once you know the card format and facility
code for your access control system, you can set them as the
defaults.
Each new cardholder added will be assigned the default card
format and facility code. This avoids having to select the same
card format and facility code for every new cardholder.
For further information on setting the default card format and
facility code, refer to Chapter 12: Cardholders: Advanced.
You can also configure an auxiliary card reader input. A card
reader input device gives you the ability to scan a card number
into the cardholder file, instead of manually entering it. The card
is simply scanned with a standard card reader and the card
number is inserted into the cardholder file. For further
information on configuring an auxiliary card reader input, refer
to Chapter 12: Cardholders: Advanced.

Access Control Database User Manual 3.5

Technical Manuals Online! - http://www.tech-man.com


Basic operations

UD Cardholder Tab Labels tab and UDF Labels tab


The next tabs are the User Defined (UD) CardHolder Tab Labels
and User Defined Fields (UDF) Labels. These tabs let you define
additional custom tabs and fields for cardholders. The UD
cardholder tab label lets you define up to three custom
cardholder tabs. Each tab supports ten custom fields.
The UDF Labels tab lets you define up to ten custom fields. This
lets you customize the field labels for your unique requirements.
The fields can be labeled for internal company training dates,
pay levels, or contact information.
For further information, see Chapter 11: Cardholders: Basic.

Card Code Formats tab


The ACDB supports access cards in standard Wiegand formats.
The Wiegand format is binary encoded data that uniquely
defines cardholders across multiple sites and companies.
The following list is the card formats defined for you by the
ACDB. These card formats can not be modified.
• 26 Bit Wiegand Compatible
• 26 Bit Wiegand SIA Compatible
• 32 Bit Wiegand Compatible
• 34 Bit Wiegand Compatible
• 38 Bit Wiegand Compatible
If your access cards are in a different card format than the ones
listed above, you can create a custom card format. See Chapter
12: Cardholders: Advanced for detailed information on how to
add a custom card code format.

Facility Codes tab


Some access card formats need a facility code to complete their
access card number. The ACDB adds the facility code to the
access card number when downloaded to the hardware of your
access control system. Facility names and facility codes are
specified in Tools > Options > Facility Codes.
The Facility Codes tab provides a listing of the codes currently
used in your system. You may add to this list or delete facility
codes no longer in use. See Chapter 12: Cardholders: Advanced
for further information.

3.6 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Basic operations

Viewing the selection table


Each tab of the ACDB uses a selection table to list its records
(except for Access Levels tab and Administration > System tab).
The selection table is displayed in the left pane of the tab. The
table contains all of the current records that have been created for
that tab. There are two primary methods for navigating through a
selection table:
• Arrow buttons at the top of the table
• Letter tabs at the bottom of the table

The arrow buttons at the top and letter tabs at the bottom are two
ways to navigate through a selection table

Navigating with the arrow buttons


The four arrow buttons at the top of the selection table let you
easily move from one record to another. You can click the arrow
buttons to move trough the table.
Clicking the inner two arrow buttons moves you through the
table one record at a time. Clicking the outer two arrow buttons
moves you to the end or beginning of the table.
As you scroll from one record to another, the record is displayed
in the middle and right panes of the window. The small black
arrow at the left of the table shows the current record.

Selecting with the letter tabs


Letter tabs at the bottom of the table let you display only those
records beginning with an individual letter. When you click a
letter, the system displays all the records that begin with that
letter.

Access Control Database User Manual 3.7

Technical Manuals Online! - http://www.tech-man.com


Basic operations

You can display more letter tabs by clicking the left and right
arrows adjacent to the letter tabs. The tab on the far left displays
all records in alphabetical order.

3.8 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Basic operations

Saving your changes


Saving is very important to maintain correct and current data in
Tip: A tab with an asterisk your access control system. Saving is the only way to update the
(*) on either side of the tab database with any changes or additions that you make. An item
name shows that is not recognized as a permanent record until it is saved.
information on the tab has
been modified but not To save your changes:
saved.
When the information is • On the File menu, click Save, or click the Save button on the
saved the asterisks are toolbar.
removed.
Note: When you save data within a tab of the ACDB, only the
information in that tab is saved.
If information is not saved and you try to exit from the ACDB, a
Tip: Press Alt + F, S to dialog box is displayed reminding you to save before exiting.
save.

Access Control Database User Manual 3.9

Technical Manuals Online! - http://www.tech-man.com


Basic operations

Multiple selection
You can select two or more items at once and make a single
change to all selected items. Most tabs with selection tables
allow this functionality.
When you have selected multiple records, some fields can not be
changed. The ACDB automatically hides fields that can not be
changed with multiple selections.

The Holiday tab includes a selection table (list of holiday records


in the left pane) that allows multiple selections

Selecting multiple records with the four action


commands
You can select and deselect items using the four action
commands or corresponding toolbar buttons. The buttons and
commands are described in the following table.

Button Command Description


Select current Selects the current record
record
Deselect Deselects the current record
current record
Select all Selects all records in the
records selection table
Deselect all Deselects all records in the
records selection table

3.10 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Basic operations

Multiple selection functionality is available on the following


tabs:
Tip: Wherever multiple
selection is available, the
• Cardholders
user manual will present it • Holidays
to you as a Tip. • Administration > Command List
• Administration > Outbound ports
• Administration > Routes

Additional methods to select multiple records


In addition to using the four action commands, you can also
select multiple records by using the keyboard and the mouse.

To select Do this
A single Hold down Ctrl and select the record
record
Nonadjacent Hold down Ctrl and select the individual records
records
A large range Hold down Ctrl and select the first record of the
of records range, and then hold down Shift and click the
last record in the range

Access Control Database User Manual 3.11

Technical Manuals Online! - http://www.tech-man.com


Basic operations

Downloading information
Once information has been entered into the ACDB, the data must
be downloaded to your access control system. Only after the
information has been downloaded will cardholders be able to
gain access.
Any time changes are made to the ACDB that affect your access
control system, the revised data must be downloaded to your
access control system. No changes will be active in the CRCs or
KPDISPs until they are downloaded.
For you to be able to download to the CRCs and KPDISPs, the
Outbound port and Route of the ACDB must be configured. For
further information, see Chapter 7: Outbound ports and routes.
Note: You can download changes to your system at any time or
from any tab within the software. Make sure all information has
been saved before downloading.

To download changes to CRCs and KPDISPs:

• From the File menu, click Send Changes, or click the Send
Changes button on the toolbar.
Note: Verify that the date and time are current at the system
panel. Incorrect date and time causes incorrect operation of the
access control system.

When to download
To improve the performance of the ACDB, it is recommended
that downloads are performed at specific times while setting up
your database. The following gives the times when you should
download.
• After importing your companies RP file
• After creating and activating no more than 1000 cardholders

Downloading failure
When a yellow X is displayed over a CRC or KPDISP this
indicates that the system failed to download to this CRC or
KPDISP. This can be seen from the tree view in the Access
Levels tab and the Administration > System tab.
If you see a yellow X over a CRC or a KPDISP, confirm that the
device has not been removed from your system and that it is
functioning properly. Also, confirm that you have configured
your outbound ports and routes properly.

3.12 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Basic operations

The yellow X over CRC3 shows that the ACDB could not
download to it because of a communication error

Access Control Database User Manual 3.13

Technical Manuals Online! - http://www.tech-man.com


Basic operations

Backing up your system


Your access control system should be backed up on a regular
basis. You should back up your system any time you make
significant changes to the ACDB and at regular intervals.
By backup, we mean making and saving a copy of the
ACDB.mdb file.
There are several ways to back up your files. One popular way is
with a 3.5-inch floppy drive. If the file is too large for a floppy
disk, a Zip drive is an excellent alternative. Choose the method
that is best for you.
The following instructions specify the default locations of
system files. If you have installed the ACDB in a different
directory, navigate to this location when selecting the
ACDB.mdb file.
Note: If you want to save all access event from the CRCs, run an
access event task then back up the ACDB.mdb file. The access
event task loads all access events into the ACDB database.

To back up your system:

1. Exit from the ACDB software program.


2. Run Windows Explorer.
3. In C:\Program Files\EST\Access Control Databases, select
the ACDB.mdb file.
4. From the Edit menu, click Copy.
5. Navigate to the location where you would like to store a
copy of the ACDB.mdb file.
Example: Floppy drive or removable disk drive (Zip drive).
6. From the Edit menu, click Paste.
7. Once the files are copied, remove the disk and store it in a
safe location.

3.14 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Basic operations

Moving your database to a new PC


If you move the ACDB to a new computer, the database of the
ACDB needs to be moved to the new PC. Moving the database is
not a difficult process and can be done by following these simple
steps.
The following instructions specify the default locations of
system files. If you have installed the ACDB in a different
directory, navigate to this location when selecting the
ACDB.mdb file.

To move your database to a new PC:

1. Exit from the ACDB software program.


2. Run Windows Explorer on the existing computer.
3. In C:\Program Files\EST\Access Control Databases, select
the ACDB.mdb file.
4. From the Edit menu, click Copy.
5. Click the floppy drive or the removable disk drive (Zip
drive).
6. From the Edit menu, click Paste.
7. Install the ACDB software on the new computer.
Refer to the ACDB installation guide for instructions on
installing the ACDB.
8. Insert the disk with the ACDB.mdb file in the new computer.
9. Run Windows Explorer.
10. From the inserted disk, select the ACDB.mdb file.
11. From the Edit menu, click Copy.
12. In C:\Program Files\EST\Access Control Databases, paste
the ACDB.mdb file into the directory.
Note: When copying the ACDB.mdb file from one directory to
another, verify that the attributes of the file are not set to
Read-only. You can check the attributes of a file by right
clicking on the file name and selecting Properties.

Access Control Database User Manual 3.15

Technical Manuals Online! - http://www.tech-man.com


Basic operations

Exiting from the ACDB


You can exit from the ACDB at any time. If information needs
to be saved before exiting, you will be prompted to do so. We
recommend that you save all information before exiting.
If you have not downloaded changes to the CRCs and KPDISPs,
the system displays a confirmation dialog box. You can
download your changes, or continue without downloading.

To exit from the ACDB:


Tip: Press Alt + F, X to exit 1. From the File menu, click Exit, or click the Close button at
from the ACDB. the right end of the title bar.
2. If prompted to save, click Yes in all confirmation dialog
boxes.
3. If prompted to download, click one of the download options:
• Yes to perform the download now
• No to exit without downloading
• Cancel to return to the ACDB
After exiting, you can restart the program and log on just as
before. Refer to Chapter 2: Getting started for further
information about logging on to the ACDB.

3.16 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Chapter 4
System and hardware configuration

Summary
This chapter defines the process of configuring your access
control system including Keypad Displays (KPDISPs) and Card
Reader Controllers (CRCs).
This chapter also provides information about command lists.
Note: As an end user, you may not be required or allowed to edit
the configuration of your access control system. This section is
provided so you can have a complete understanding of all
program options, and is not meant to imply that all operators
must perform these configuration procedures. If you have any
questions regarding system setup, check with your ACDB
administrator for clarification.

Content
Configuring your system • 4.2
Configuring your system in company view • 4.3
Reviewing and editing company information • 4.3
Viewing the project site information • 4.4
Reviewing and editing building information • 4.5
Viewing the partition information • 4.6
Configuring your system in hardware view • 4.7
Viewing SDU, CPU, and 3-SAC • 4.8
MODCOM • 4.8
Configuring the doors • 4.9
Viewing door summary information • 4.9
Communication routes • 4.10
Other companies with access • 4.10
Configuring and viewing door options • 4.11
Configuring door timers • 4.13
Viewing miscellaneous door information • 4.16
Viewing Keypad Displays (KPDISPs) • 4.18
Communication routes • 4.19
Other companies with access • 4.19
Command lists • 4.20
Viewing a command lists • 4.20

Access Control Database Users Manual 4.1

Technical Manuals Online! - http://www.tech-man.com


System and hardware configuration

Configuring your system


The Administration System tab shows an expanded tree view of
your imported access control system. The Administration System
tab offers two views of your access control system. They are:
• Company view
• Hardware view
Both views are of the same access control system. They both
show the same Company, Card Reader Controllers (CRCs), and
Keypad Displays (KPDISPs). The hardware view shows the
hardware of your system based on the way it is wired together.
The company view shows the way your access control system is
set up with respect to buildings and partitions.
The information for both views is provided on your Resource
Profile (RP) disk. The hardware configuration information is
imported into the ACDB along with the company view
information. The ACDB offers the option of altering some of
this information for security purposes.
Unless otherwise noted, all functions can be completed in either
hardware or company view.

4.2 Access Control Database Users Manual

Technical Manuals Online! - http://www.tech-man.com


System and hardware configuration

Configuring your system in company view


The company view shows you how your access control system is
configured. The company view tree shows the sites, buildings,
and partitions in your company. CRCs and KPDISPs are
displayed under the buildings and partitions that they belong to.
The same KPDISP can be displayed under a building and a
partition.

The company view tree shows how your system is configured

Company view tree icons


Icon Meaning
Company
Site
Building
Partition
Door or Card Reader Controller (CRC)

Keypad Display (KPDISP)

Reviewing and editing company information


The first level in the tree, for both hardware view and company
view, is the company. You can only have one company in your
database. When you select the company, its information is
displayed in the right pane of the tab. This information includes
the company address and company contact information.
Note: If you make changes to the company information, contact
your integrated system installer. For installer contact
information, click the Hardware View tab and the SDU icon in

Access Control Database Users Manual 4.3

Technical Manuals Online! - http://www.tech-man.com


System and hardware configuration

your company tree. Your installer needs current information to


maintain contact with you.

Company information

To review and edit company information:

1. Click the Administration tab.


2. Click the System tab.
3. Click Company View or Hardware View.
4. In the tree, select the company name.
5. If needed, edit the address, city, state, country, and ZIP code
in the designated fields.
6. If needed, edit the company contact information for name,
telephone number, extension, and e-mail address of the
company contact.
7. Save the updated company information.
For information on setting the Default Card Format and Default
Facility Code see Chapter 12: Cardholders: Advanced.
Note: Company information can also be reviewed and edited by
clicking Tools menu > Options > Company Information.

Viewing the project site information


The second level in the company view tree is the site. Clicking
on the site displays its information and shows the company
associated with the site. You can’t edit any of the site
information.

4.4 Access Control Database Users Manual

Technical Manuals Online! - http://www.tech-man.com


System and hardware configuration

A single company can have multiple sites. Multiple sites are


used for companies that have multiple geographical locations.
Each site has its own access control system but these are all
maintained with a single ACDB program. Each site has a
separate RP file with the same company name. Each RP file is
imported separately.

Company view with multiple sites New York and Tennessee

To view the site information:

1. Click the Administration tab.


2. Click the System tab.
3. Click Company View.
4. Select the site in the tree view.

Reviewing and editing building information


The third level in the company view tree shows the company’s
buildings. A company can have multiple buildings. Clicking a
building displays the building information in the right pane. The
information is specific to the individual building you have
selected and includes the building’s address and contact
information. If any of this information is incorrect, you can edit
and correct it here.

To review and edit building information:

1. Click the Administration tab.


2. Click the System tab.

Access Control Database Users Manual 4.5

Technical Manuals Online! - http://www.tech-man.com


System and hardware configuration

3. Click Company View.


4. Select the desired building in the tree view.
5. If needed, edit the building address, city, state, country, and
ZIP code in the designated fields.
6. If needed, edit the building contact information for name,
telephone number, extension, and email address of the
building contact.
7. Save the updated building information.

Viewing the partition information


The fourth level in the company view tree is the partition. Each
building can have several partitions. Clicking on the partition
displays its information and shows the company, description,
site, and building of the partition. It also displays how many
doors and keypads are part of that partition. You can not edit any
of the partition information.

To view the partition information:

1. Click the Administration tab.


2. Click the System tab.
3. Click the Company View.
4. Select the desired partition in the tree view.

4.6 Access Control Database Users Manual

Technical Manuals Online! - http://www.tech-man.com


System and hardware configuration

Configuring your system in hardware view


The hardware view tree shows the physical interconnections of
the components in your access control system. See the table
below for the meanings of the icons in this tree. This display
makes it easy to see what each CRC and KPDISP connects to.
This view is particularly helpful when your system has more
than one fire alarm panel.
The hardware view is also very helpful in assigning routes to
CRCs and KPDISPs. Multiple non-networked fire alarm panels
have different communication routes for each panel. One fire
alarm panel might have an RS-232 (direct connect) route and a
second panel might have a modem (telephone) route. The
hardware view shows each CRC and KPDISP, and the fire alarm
panel to which each device is connected. This makes it easy to
know which route to assign to each CRC and KPDISP.
Note: Fire and security functionality cannot be programmed into
a control panel from a remote location. You must perform all fire
and security panel programming on site. Changes to the access
control or security database have no impact on the parameters or
operations of listed fire system equipment. Access control and
security functionality can be programmed from a remote site.

The Hardware View tree shows how the components of your


access control system are connected

Hardware view tree icons


Icon Meaning
Company
System Definition Utility (SDU)
Central Processing Unit (CPU)
Modem Communication Module (MODCOM)

Security Access Control Module (3-SAC)

Access Control Database Users Manual 4.7

Technical Manuals Online! - http://www.tech-man.com


System and hardware configuration

Hardware view tree icons


Icon Meaning
Card Reader Controller (CRC)
Keypad Display (KPDISP)

Viewing SDU, CPU, and 3-SAC


The SDU, CPU, and 3-SAC are view-only items. They are
configured, programmed, and installed by your system installer.
You can not change any of their parameters.

To view the SDU, CPU, and 3-SAC:

1. Click the Administration tab.


2. Click the System tab.
3. Click the Hardware View.
4. Select the desired SDU, CPU, or 3-SAC in the tree view.

MODCOM
The MODCOM is only visible in the hardware view. The
MODCOM has modem and dialer capabilities. It is used for
downloading information from remote sites. MODCOMs are
configured, programmed, and installed by your system installer.
You can not change any of their parameters except their
communication route.
Each MODCOM has one communication route. The
communication route defines how the ACDB downloads
information to the MODCOM. All MODCOMs are initially set
to a default route. For information on how to change the
communication route for a MODCOM refer to Chapter 7:
Outbound ports and routes.

4.8 Access Control Database Users Manual

Technical Manuals Online! - http://www.tech-man.com


System and hardware configuration

Configuring the doors


From the company view tree and the hardware view tree you can
see the CRCs or doors of your access control system. Your
integrated system installer configured most of the options for
each door. You set the remaining options using the ACDB.
Options that are configured by the installer are display-only and
cannot be edited with the ACDB. These items are dimmed. Door
configuration is divided into the following tabs:
• Summary
• Options
• Timers
• Miscellaneous

When you select a door from the company view tree or the
hardware view tree the door’s configuration tabs are displayed

Viewing door summary information


Door information is viewed on the Summary tab. The Summary
tab provides general information about the door you have
selected. This information includes:
• Serial number
• Firmware version
• Device address
• Last status
• Reason
• Communication route
• Other companies with access

Access Control Database Users Manual 4.9

Technical Manuals Online! - http://www.tech-man.com


System and hardware configuration

The status of several door options are also displayed. These


include:
• Suppression
• Unlock schedule
• PIN schedule
• 2-person rule
• Anti-passback
Finally, a third display shows summary information about the
current door. This includes:
• Project database
• Card reader partition
• Circuit 1 partition
• Circuit 2 partition
• Muster
• Keypad

To view door summary information:

1. Click the Administration tab.


2. Click the System tab.
3. Click either Company View or Hardware View.
4. Select the desired door from the tree view.
5. Click the Summary tab.

Communication routes
Each CRC and KPDISP has a communication route. The
communication route defines how the ACDB downloads
information to these devices. All CRCs and KPDISPs are
initially set to a default route. For information on how to change
the communication route for CRCs and KPDISPs refer to
Chapter 7: Outbound ports and routes.

Other companies with access


At the bottom of the door summary tab, is the Other Companies
With Access button. This button shows the number of other
companies that have access to this door. Clicking this button
opens a window that lists the other companies that have access to
this door and shows their contact information.
If you are not the primary owner of this door, the Other
Companies With Access button displays the primary company.
The primary company of the door controls its configuration. To
make a configuration change, only the primary company can
make changes to the designated door.

4.10 Access Control Database Users Manual

Technical Manuals Online! - http://www.tech-man.com


System and hardware configuration

This dialog box lists the other companies with access to the
door. It also displays the primary company contact information.
The primary company controls the configuration of the door.

Configuring and viewing door options


Only the primary owner of a door can configure the door
options. If you are not the primary owner of the door, the ACDB
dims these options. Door options include:
• Schedule
• Physical
• Anti-Passback
• Other
• Send upstream events
Your integrated system installer configures the door options for
Physical, Anti-Passback, Other, and Send Upstream Events. The
ACDB dims these options. The primary owner of the door
configures options for Schedules in the ACDB.

Access Control Database Users Manual 4.11

Technical Manuals Online! - http://www.tech-man.com


System and hardware configuration

The integrated system installer and the primary owner of the


door configure door options

Unlock schedule and unlock on first access granted options


The unlock schedule defines the day and time when the CRC
will automatically unlock the door. To create an unlock
schedule, see Chapter 8: Schedules.
When the Unlock on first Access Granted check box is checked,
the door does not unlock based on the unlock schedule alone.
The door unlocks when a valid cardholder badges in after the
schedule start time. The door stays unlocked until the schedule
time has elapsed.

PIN schedule option


For added security, a card reader can be equipped with a PIN
pad. The PIN schedule defines when a PIN number is required,
in addition to an access card, to gain entry. To create a PIN
Schedule, see Chapter 8: Schedules.
Note: Before adding a PIN schedule, check with your integrated
system installer to ensure that the card reader has a PIN pad.

PIN required for disarm schedule option


When the PIN Required For Disarm check box is checked, the
partition does not disarm until a valid cardholder badges in and
enters a PIN number. The door must be part of a partition. The
cardholder badging in must have disarm privilege for the
partition. When the cardholder badges in, the card reader LED

4.12 Access Control Database Users Manual

Technical Manuals Online! - http://www.tech-man.com


System and hardware configuration

flashes indicating that the cardholder must enter a PIN number.


After the PIN number is entered, the door opens and the partition
is disarmed.

Suppression schedule option


The suppression schedule defines when the CRC does not log
normal events into history. The CRC always logs access denied,
disarm, and irregular access events. This feature is provided to
reduce the large number of normal access events being put into
history during normal business hours. To create a suppression
schedule, see Chapter 8: Schedules.

To set a schedule option:

1. Click the Administration tab.


2. Click the System tab.
3. Click either Company View or Hardware View.
4. Select the desired door in the tree view.
5. Click the Options tab.
6. From the Unlock, PIN, or Suppression list, select the desired
schedule.

Configuring door timers


The next tab for doors is the Timers tab. The ACDB divides the
timers into four groups:
• Unlock timers
• Open timers
• Exit timers
• Control timer

Access Control Database Users Manual 4.13

Technical Manuals Online! - http://www.tech-man.com


System and hardware configuration

The Timers tab is divided into unlock, open, exit, and control
timers groups

Standard unlock timer


The standard unlock time is the number of seconds that the door
stays open before relocking, when a user badges in. The time can
range from 0 to 255 seconds. The default value is 10 seconds.

Handicap unlock timer


The handicap unlock time is the number of seconds that the door
stays open before relocking, when a cardholder designated as
handicapped badges in. The time can range from 0 to 255
seconds. The default value is 20 seconds. This unlock time is
generally longer than the standard unlock time, to allow added
time for a handicap person to gain entry.

Manual unlock timer


The manual unlock timer is the number of seconds that the door
stays open before relocking, when an unlock command is
received from the integrated system, FireWorks, or a local
request to exit device. The time can range from 0 to 255 seconds.
The default value is 20 seconds.

Manual open timer


The manual open time is the number of seconds that the
auxiliary relay stays active, when an open command is received
from the integrated system, FireWorks, or from a local ADA

4.14 Access Control Database Users Manual

Technical Manuals Online! - http://www.tech-man.com


System and hardware configuration

request to open device. The time can range from 0 to 255


seconds. The default value is 20 seconds.
Note: This option is unavailable (dimmed) if the relay is not set
to Access Door Motor Control by your integrated system
installer.

Relay open timer


The relay open timer is the number of seconds that the auxiliary
relay timer stays active, when a user who is designated as
handicapped badges in. The time can range from 0 to 255
seconds. The default value is 20 seconds. The relay output is
typically connected to a door opener.
Note: This option is unavailable (dimmed) if the relay is not set
to Access Door Motor Control by your integrated system
installer.

Door ajar timer


The door ajar timer is the number of seconds that an access door
can be left open before a signal is sent to the integrated system.
If the door is left ajar past the door ajar time, the local sounder in
the CRC (if installed) sounds for one second every minute. This
is a security feature, ensuring that doors are not propped open
and left for an extended time.
Note: Before setting the door ajar timer, verify with your
integrated system installer that the door has an access door
contact installed.

Emergency exit sounder timer


The emergency exit sounder timer is the number of seconds (0 to
255) the CRC sounder sounds when an emergency exit door is
violated without badging out or using a request to exit device
(without bypass). When set to zero (default), this feature is
disabled. When set to 255, the sounder will sound until manually
reset. In all cases, badging in on the sounding door silences the
sounder.

Delayed egress timer


The delayed egress time defines the number of seconds that
egress is delayed when a Request to Exit button with delayed
egress is pressed. When set to zero, the delayed egress feature is
disabled. This timer is configured by your integrated system
installer and is view-only (dimmed).
Note: Refer to NFPA 101 and the local AHJ to determine the
requirements for delayed egress applications.

Access Control Database Users Manual 4.15

Technical Manuals Online! - http://www.tech-man.com


System and hardware configuration

Bypass time
The bypass time is the number of seconds (0 to 255) that the
CRC suppresses signaling an event to the integrated system. The
default is 0 seconds, which means that there is no suppression.
The bypass timer is activated after a valid cardholder badges in
or upon activation of various exit devices with bypass features.

To set door timers:

1. Click the Administration tab.


2. Click the System tab.
3. Click either Company View or Hardware View.
4. Select the desired door in the tree view.
5. Click the Timers tab.
6. In the appropriate timer box, arrow up or down to set the
seconds for each timer.

Viewing miscellaneous door information


The Miscellaneous tab shows the limits of the following:
• Cardholders
• Access levels
• Schedules
• Holidays
Your integrated system installer configures all miscellaneous
information using the Resource Profile Manager.

Miscellaneous door information

To view door miscellaneous information:

1. Click the Administration tab.


2. Click the System tab.

4.16 Access Control Database Users Manual

Technical Manuals Online! - http://www.tech-man.com


System and hardware configuration

3. Click either Company View or Hardware View.


4. Select the desired door in the tree view.
5. Click the Miscellaneous tab.

Access Control Database Users Manual 4.17

Technical Manuals Online! - http://www.tech-man.com


System and hardware configuration

Viewing Keypad Displays (KPDISPs)


If your access control system has KPDISPs, they are displayed in
the company view and the hardware view. In the company view,
if the KPDISP is displayed under a building, it is used for fire
alarm applications. In the company view, if the KPDISP is
displayed under a partition, it is used for security applications.
The same KPDISP can be used for both fire alarm and security
applications. In this case, the KPDISP is displayed twice, under
the building and the partition.
Your integrated system installer configures all KPDISP
functions, except for the communication route. The following
information is displayed for each KPDISP:
• Function (company view only)
• Serial number
• Communication route
• Privileges (company view only)
• Other companies with access

KPDISP privileges
The privileges for a fire alarm KPDISP differ from the privileges
for a security KPDISP. The same KPDISP can be displayed
under a building for fire alarm applications and under a partition
for security applications.
The company view shows which fire alarm privileges are
available for a given KPDISP. These privileges are assigned
when you create access levels. See Chapter 10: Access levels for
more information.

Keypad display information

4.18 Access Control Database Users Manual

Technical Manuals Online! - http://www.tech-man.com


System and hardware configuration

To view KPDISP summary information:

1. Click the Administration tab.


2. Click the System tab.
3. Click either Company View or Hardware View.
4. Select the desired KPDISP in the tree view.

Communication routes
Each CRC and KPDISP has a communication route. The
communication route defines how the ACDB downloads
information to these devices. All CRCs and KPDISPs are
initially set to a default route. For information on how to change
the communication route for CRCs and KPDISPs refer to
Chapter 7: Outbound ports and routes.

Other companies with access


At the bottom of the KPDISP summary tab is the Other
Companies With Access button. This button shows the number
of other companies that have access to this KPDISP. Clicking
this button opens a window that lists the other companies that
have access to this KPDISP and shows their contact information.
If you are not the primary owner of this KPDISP, the primary
company is displayed. The primary company of the KPDISP
controls its configuration. If a configuration change needs to be
made, only the primary company can make it.

Access Control Database Users Manual 4.19

Technical Manuals Online! - http://www.tech-man.com


System and hardware configuration

Command lists
Your integrated system installer defines the command lists
available for your system. These are imported with the RP file.
Command lists are typically are used to:
• Transmit access events to the Central Monitoring System
(CMS)
• Activate remote gates
• Activate CCTV cameras
• Activate relays that control other devices, such as elevator
controls
The Command Lists tab shows all the commands that have been
imported for your company.
A command list can be attached to a CRC in an access level. The
system activates the command list when the CRC grants access.

The command list window shows all the command lists that have
been imported into the ACDB

Viewing a command lists


Commands lists are defined by your installer and can not be
edited in the ACDB. They are listed on the Command Lists tab
for you to review. The description of the command lists helps to
identify the command list’s function.

To view a command lists:

1. Click the Administration tab.


2. Click the Command List tab.
3. Select the command list you wish to view.

4.20 Access Control Database Users Manual

Technical Manuals Online! - http://www.tech-man.com


Chapter 5
Operators

Summary
Operators are users of the ACDB. The system administrator can
define as many operators as required. You define each operator
by specifying the command privileges that the operator has. This
chapter shows you how to define and create operators.

Content
What is an operator? • 5.2
Creating a new operator record • 5.3
Operator information • 5.3
Last Login and Logout • 5.4
Adding a photo to an operator record • 5.5
Importing and sizing an operator photo • 5.5
Exporting an operator photo • 5.6
Deleting an operator photo • 5.7
Setting operator privileges • 5.8
Default operator privileges • 5.8
Privilege tabs • 5.8
Activating and deactivating an operator • 5.11
Activating an operator • 5.11
Deactivating an operator • 5.11
Logging on as a new operator • 5.13
Changing operators while the system is running • 5.13
Changing your operator password • 5.14
Changing your password from the Operators tab • 5.14
Changing your password from the Tools menu • 5.15
Resetting an operator's password • 5.15
Editing and deleting an operator record • 5.16
Editing an operator record • 5.16
Deleting an operator record • 5.16
Changing operator information • 5.17

Access Control Database User Manual 5.1

Technical Manuals Online! - http://www.tech-man.com


Operators

What is an operator?
An operator is someone who enters data into the Access Control
Database (ACDB). An operator ID and password are required in
order for an operator to log on to the ACDB.
We suggest that you designate a single administrator for each
company in your ACDB. The administrator is an operator with
full privileges, including the ability to create and revise operator
records.
The ACDB assigns each company an administrator operator ID
and password when importing the RP file. When first logging on
to the ACDB you must use this ID and password.
The default administrator operator ID is ADMIN1, with
password ADMIN. ADMIN1 is always used for the first
company imported by the integrated system installer. If a second
company is imported, the operator ID is ADMIN2, again using
password ADMIN.
When you log on, the ACDB prompts you to change your
password for future use. To change the ADMIN password, see
Changing an operator password, later in this chapter.

All operators must log on to the ACDB with an Operator ID and


Password

The purpose of creating individual operators is to allow the


administrator of the ACDB to limit operator access and to make
only the appropriate tabs and commands available to specified
operators. Assigning privileges to each operator defines what an
operator can and cannot do.
Example: You may want to create a clerical level operator, who
has only the privileges required to enter and edit cardholder
information. This operator would not require access to all tabs
and commands in the ACDB.

5.2 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Operators

Creating a new operator record


You create operator records on the Administration tab under
Operators. The ACDB divides the Operators tab into two tabs:
• Information
• Privileges

Enter all users of the ACDB as operators. Only operators have


operator IDs and passwords that let them access the ACDB.

Operator information
You use the Information tab to enter personal information about
the operator, such as name and address.

Operator ID
Operator ID is the first field entered when logging in. The ID can
consist of up to 20 characters. You can use upper case letters or
numbers for Operator IDs. The Operator ID and Password are
required when logging on.

Name
The first information required is the operator’s full name and an
optional title, e.g., Mr., Mrs., Ms, or Miss. Operator names can
be up to 25 characters long.

Job Title, Location, Bus. Phone, Extension and Language


Depending on your company policy, additional operator
information may be required including, a job title, location,
business phone, extension, and preferred language.

Access Control Database User Manual 5.3

Technical Manuals Online! - http://www.tech-man.com


Operators

Passwords
Each operator has an individual password that is required when
logging into the system. The password is specific to the
individual operator. Operators are responsible for remembering
their own passwords. The Operator ID and Password are
required when logging in.
A new operator has the initial default password of PASSWORD.
The operator should change this default password after logging
in.

Last Login and Logout


The ACDB displays the dates and times of the Last Login and
Last Logout of the selected operator at the bottom of the
Information tab. (This is blank for a new operator, but is updated
when the operator logs on for the first time.)

Last Login and Logout dates and times as displayed on the


operator Information tab

To create a new operator:

1. Click the Administration tab.


2. Click the Operators tab.
Tip: Press Alt + F, N to
create a new operator. 3. From the File menu, click New or click the New button on
the toolbar.
4. Type the Operator ID.
5. Select the appropriate title.
6. Type the operator information.
7. Save the new operator record.
Note: The ACDB currently supports only English (USA) for
language. The ACDB will support additional languages in future
releases.

5.4 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Operators

Adding a photo to an operator record


Now that you have created an operator, you have the option of
including a photo of the operator for security and identification
purposes.

The Edit Photo dialog box allows the operator’s picture to be


added to their record

Importing and sizing an operator photo


The following graphic file types can be imported:
• JPG
• BMP
• ICO
• EMF
• WMF
There are two options for importing a photo. First, you can load
a photo by navigating to the file in the Edit Photo dialog box.
When the photo is loaded, it appears in the middle pane of the
screen.
Second, you can copy a photo from another graphics editing
program. Simply copy the photo and click the Copy from
Clipboard button. The photo appears in the middle pane of the
screen.
After importing a photo you need to size it. Controls for sizing
the photo are located in the middle pane of the Edit Photo dialog
box.
Default: Sizes the photo to the size of the right pane (default
area). If your photo is larger than the default area, it is cropped.
If your image is smaller than the default area, it is expanded to fit
the default area.

Access Control Database User Manual 5.5

Technical Manuals Online! - http://www.tech-man.com


Operators

Crop: Lets you select a certain portion of the photo. Using your
mouse, drag a selection box on the photo. When you release the
mouse button, the selected portion of the photo is displayed in
the right pane.
You can move the selection box to any location on the photo. To
do so, simply drag the box. Notice the mouse changes its
appearance once over the selected area. The display area changes
as you move the selected box.
Scale to fit: Lets you enlarge the selected area of the photo to fit
the display pane. You select a portion of the photo by dragging a
selection box.
Select Entire Image: Selects the entire photo image. You must
first click Scale to fit for the Select Entire Image button to
become available. Your entire photo is selected and displayed in
the right pane.
After sizing, the photo is displayed in the right display pane
exactly as it will appear on the Operators tab.

To import and size an operator photo:

1. In the left pane, select the operator for whom you want to
import a photo.
Tip: Press Alt + I to launch 2. Click Import.
the Edit Photo dialog box.
3. Load or copy the photo.
4. Size your photo.
5. Under Storage, move the Image Quality slider to the desired
quality.
The higher the quality, the larger the image size. The image
file size is displayed under the slider bar.
6. Click OK to import the file.
7. Save the operator record.

Exporting an operator photo


Once the photo has been loaded, you can export it if desired.
Exporting the file does not remove it from the operator record.

To export an operator photo:

Tip: Press Alt + E, to 1. In the left pane, select the operator you wish to export.
export a photo. 2. Click the Export button in the Photo group.
3. Browse to the desired location to export the photo.
4. Type a name for the file in the Name field. The default is the
operator's name.

5.6 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Operators

5. Click Open to export.

Deleting an operator photo


You can also delete a photo after it has been imported. This is a
useful function for maintaining up-to-date photos.

To delete an operator photo:

Tip: Press Alt + C to clear 1. On the Operator tab, click the Clear button in Photo group.
the photo. 2. Click Yes to delete the photo.
3. Save the Operator record.

Access Control Database User Manual 5.7

Technical Manuals Online! - http://www.tech-man.com


Operators

Setting operator privileges


After creating an operator and adding a photo, you can determine
what privileges should be assigned to the operator.
Setting operator privileges determines the operator’s ability to
create, browse, edit, or delete information.
You set the operator privileges on the Privileges tab.

Default operator privileges


You can use the Quick Defaults group of buttons at the top of the
Privileges tab to set default variables quickly. These buttons set
privileges on all three tabs (Regular, Administration, and
Special). The buttons make these settings:
• Grant All: Checks all privileges for the selected operator
• Revoke All: Clears all privileges for the selected operator
• Browse Only: Checks read-only rights for all privileges
• Operator: Checks privileges typically required by an
operator
• Administrator: Checks all privileges

Privilege tabs
The privilege check boxes are divided into three tabs.
Regular: The regular tab contains privileges for cardholders,
access levels, schedules, holidays, and reports.
Administration: The administration tab contains privileges for
systems, operators, command lists, CMS account user IDs, tasks,
outbound ports, and routes.
Special: The special tab contains privileges for company
information, cardholder user defined tab captions, cardholder
user defined field labels, sending changes to the system, and
importing external data.
Example 1: If you need to set privileges for an operator allowing
him read-only rights to the system, you deny all privileges, then
grant the ability to browse system information. You can do this
manually, or simply by clicking the Browse Only default button.
Example 2: If you need to set privileges for an operator to enter
cardholders only, you deny them all privileges except the ability
to create, browse, and edit information on the cardholder pages.
You would do this manually.

5.8 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Operators

Operator privilege tab

To assign operator privileges:

1. Click the Administration tab.


2. Click the Operators tab.
3. In the left pane, select the operator you want to assign
privileges to.
4. Click the Privileges tab.
5. Select the appropriate privileges for each item in each tab, or
click one of the Quick Defaults buttons. Select from one or
more of the five possible choices:
• Create: Gives the operator the create privilege. Selecting
Create automatically selects Browse and Edit.
• Browse: Allows the operator to view existing data.
• Edit: Allows the operator to edit existing data. Selecting
Edit automatically selects Browse.
• Delete: Allows the operator to delete existing data.
Selecting Delete automatically selects Browse and Edit.
• Permit: Allows the privilege to be activated by the
selected operator.
6. Save the operator record.
Example 1: If an operator is allowed to create, browse, edit, and
delete an Access Level, then all the check boxes for Access
Level must be selected.
Example 2: If the operator is allowed to create an Access Level,
then select the Create check box. Selecting the Create check box
also selects the browse and edit check boxes automatically.

Access Control Database User Manual 5.9

Technical Manuals Online! - http://www.tech-man.com


Operators

If there are only a few items you do not want to grant an operator
access privileges to, it may be easier to first select Grant All,
then go back and remove the privileges you do not want enabled.
The same procedure can be used for Browse Only if you want an
operator to be able to see most, but not all of the options. You
can go back and delete the privileges for certain items you do not
want them to be able to browse.
Since each site has different parameters for their operators, it is
up to the administrator of the ACDB to set and assign the
appropriate privileges for the operators in your system.

5.10 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Operators

Activating and deactivating an operator


Activating an operator
When operators are first created in the ACDB, they are initially
inactive. An inactive operator can not log on to the ACDB. Only
active operators are allowed to log on to the ACDB.
The right pane of the Operators tab displays the operator’s status.
It also includes a command button that lets you toggle the
operators status.

Operators are indicated as being Active or Inactive

To activate an operator:

1. Click the Administration Tab.


2. Click the Operators Tab.
3. In the left pane, select the operator you want to make active.
4. Click the Activate Operator button.
5. Save the operator record.
The operator can now log on to the ACDB system under the new
operator ID assigned to him.

Deactivating an operator
The ability to deactivate an active operator lets you temporarily
deny the operator access to the ACDB.
Example: An operator has a temporary job function in the
ACDB and can be activated and deactivated as needed. This
prevents you from having to reenter the operator each time you
need him to work in the ACDB.

Operators are indicated as being Active or Inactive

Access Control Database User Manual 5.11

Technical Manuals Online! - http://www.tech-man.com


Operators

To deactivate an operator:

1. Click the Administration Tab.


2. Click the Operators Tab.
3. In the left pane, select the operator you wish to deactivate.
4. Click the Deactivate Operator button.
5. Save the operator record.

5.12 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Operators

Logging on as a new operator


Once you have created all of the operators, you should log off.
Each operator should now log on using the assigned operator ID
and the default password: PASSWORD. After logging on, each
operator should change his password.

Changing operators while the system is running


You can change operators without exiting from the program. The
first operator simply logs off and the next operator logs on.

To change operators:

Tip: Press Alt + A, L to log 1. From the Action menu, click Login.
off.
2. Click OK to log off.
3. Type in the new operator ID and password and click OK.

Access Control Database User Manual 5.13

Technical Manuals Online! - http://www.tech-man.com


Operators

Changing your operator password


Passwords are very important to the security of your system.
Please be very careful with your password. Do not let others
know it and do not lose it.
A new operator is prompted to change his password when
logging onto the system for the first time.
For security reasons, each operator should change his password
periodically.
There are two ways to change your operator password: the
Operator tab and the Tools menu. Both methods open the
Modify Password dialog box.
Using the Operators tab lets you select the operator whose
password you want to change. Using the Tools menu lets you
change only the current operator’s password.

Modify Password dialog box

Changing your password from the Operators tab


To change a password from the Operators tab, you must have
operator edit privileges. If you do not have operator edit
privileges, refer to Changing your password from the Tools
menu in this chapter.

To change your password from the operators tab:

1. Click the Administration tab.


2. Click the Operators tab.
3. In the left pane, select the operator you wish to change the
password for.
4. Click the Password Modify button.
5. Type your session password.
6. Type the new password.
7. Retype the new password.

5.14 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Operators

8. Click Modify to change the password.


9. Save the operator record.

Changing your password from the Tools menu


When you click Tools menu > Options, the system opens the
Preferences and Options dialog box. This contains the Operator
tab. The Operator tab provides the option to change your
password. You can only change your own password from the
Tools menu.

To change your password from the Tools menu:

Tip: Press Alt + T, O to 1. From the Tools menu, click Options.


display the Options dialog 2. Click the Operator tab.
box.
3. Click Password Modify button.
4. Type your session password.
5. Type the new password.
6. Retype the new password.
7. Click Modify to change the password.
8. Click OK to accept the new password.

Resetting an operator's password


If an operator forgets or loses his password, the password must
be reset from the Operators tab. To reset a password, the
operator must have the privilege to edit operators. Typically,
only administrators have reset password privileges.
Note: If the administrator password is reset, it is reset to
PASSWORD not ADMIN. All passwords reset to PASSWORD.

To reset an operator's password:

1. Click the Administration tab.


2. Click the Operators tab.
3. In the left pane, select the operator you wish to reset the
password for.
4. Click Password Reset button.
5. Save the operator record.

Access Control Database User Manual 5.15

Technical Manuals Online! - http://www.tech-man.com


Operators

Editing and deleting an operator record


Editing an operator record
You can edit and modify operator information and privileges as
needed. Be sure to save your changes after you have completed
the modifications.

Deleting an operator record


Operator records can be deleted from the database at any time.
Deleting an operator removes the record completely from the
ACDB.
Note: Deleting an operator immediately denies the operator
access to the software.

To delete an operator record:

1. Click the Administration tab.


2. Click the Operator tab.
3. In the left pane, select the operator you want to delete.
Tip: Press Alt + F, D to
delete the operator. 4. From the File menu click Delete or click the Delete button
on the toolbar.
5. Click Yes to delete.

5.16 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Operators

Changing operator information


Clicking Tools > Options opens the Preferences and Options
dialog box. This contains the Operator tab, which lets you view
information for the current operator. It also provides the option
to change the operator password.
The Operator tab also provides information regarding the last log
on and log off dates and times for the current operator.
The information can be changed just as in the Administration >
Operators tab. See Editing and deleting an operator earlier in
this chapter.

The Operator tab in the Options and Preferences dialog box

To change operator information:

Tip: Press Alt + T, O to 1. From the Tools menu, click Options.


display the Options dialog
box. 2. Click the Operator tab.
3. Revise the operator information as required.
4. Click Apply to save your changes.
5. Click the Ok button.

Access Control Database User Manual 5.17

Technical Manuals Online! - http://www.tech-man.com


Operators

5.18 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Chapter 6
Tasks

Summary
Tasks let you automate important ACDB operations. For
example, tasks can update hardware, purge old data from the
database, retrieve access history for reports, or automate the
running of reports. This chapter provides information on how to
create, define, edit, activate, and schedule tasks.

Content
What is a task? • 6.2
Default tasks • 6.4
Creating a task • 6.5
AC history request • 6.5
DB maintenance • 6.5
Hardware initialization • 6.5
Presence request • 6.5
System update • 6.5
Cardholder re-initialization • 6.6
Hardware configuration initialization • 6.6
Run transaction queue • 6.6
Starting a task • 6.7
Starting a task manually • 6.7
Scheduling a task • 6.7
Configuring the time range of an AC history task • 6.8
Setting properties for a DB maintenance task • 6.8
Assigning a task to CRCs and KPDISPs • 6.10
Associating a task with a report • 6.11
Activating and deactivating a task schedule • 6.12
Activating a task schedule • 6.12
Deactivating a task schedule • 6.12
Viewing the status of a task • 6.13
Editing and deleting a task • 6.15
Editing a task • 6.15
Deleting a task • 6.15

Access Control Database User Manual 6.1

Technical Manuals Online! - http://www.tech-man.com


Tasks

What is a task?
Tasks let you automate important ACDB functions, such as:
• System updates
• Access control event gathering
• Database maintenance
• Automatic data gathering for reports
• Hardware initialization

System updates
Whenever you make changes to your ACDB, those changes must
be sent to the hardware of your access control system. System
update tasks send the new information from the database to the
doors and keypads of your access control system.

Access control event gathering


Each Card Reader Controller (CRC) stores up to 5,000 AC
events (CRCXMs store 20,000 AC events). Once the CRC
reaches its storage limit of AC events, old AC events are
replaced with new events. Tasks can take AC history events
from the CRCs and store them in the ACDB for later use. Tasks
can be customized to produce historic information on AC events
on a daily, weekly, or monthly basis.

Database maintenance
A task can be used to purge old records from the ACDB. You
can schedule a database maintenance task to routinely remove
old records. You can also define the age of the records to be
removed.

Automatic data gathering for reports


A task can be associated with a presence report and an access
event history report to automate the gathering of data for these
reports. If a report is associated with a task, the task gathers data
for the report and stores it in the ACDB database. The report can
be run at your convenience using the data the task has gathered.
If the task is associated to a report, the task uses the filters from
the report to gather its data. If no report is associated to a task,
the task use its filters (Doors/Keypads tab) to gather data.

Hardware initialization
A task can initialize the hardware of your access control system.
The task loads all access control information, including
cardholders and hardware configuration, to the designated
hardware. This task is used for new hardware that has been
added to your system. It also can be used for damaged hardware
that may have lost its access control information.

6.2 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Tasks

The Tasks tab lets you create, edit, schedule, and run tasks

Access Control Database User Manual 6.3

Technical Manuals Online! - http://www.tech-man.com


Tasks

Default tasks
Several default tasks are included in the ACDB. Default tasks
serve as templates for most commonly used tasks.
You can modify the default tasks to meet your specific needs;
however, you cannot modify the Update task in any way. The
Update task is the task that runs when you click Send Changes
from the File menu or click the Send Changes button on the
toolbar.
All tasks, except Update, can be started manually or given a
starting schedule (see Starting a task in this chapter). The default
tasks are:

Default task Description


Update This task is activated when the Send
Changes toolbar button or Action menu
command is selected. This task is not
editable.
Daily AC Events A task that can be activated to retrieve
access control events from the hardware of
your access control system on a daily basis
Daily Updates A task that can be used to send changes
from the database to your access control
system at a daily scheduled time
Database A task that can be used to purge old records
Maintenance from the database
Destination DB A task that is used to initialize hardware with
Init access control information
Monthly AC A task that can be activated to retrieve
Events access control events from the hardware of
your access control system on a monthly
basis
Weekly AC A task that can be activated to retrieve
Events access control events from the hardware of
your access control system on a weekly
basis

6.4 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Tasks

Creating a task
New tasks can be created and added to the list of default tasks. A
task can be one of these types:
• Access Control (AC) history request
• Database (DB) maintenance
• Hardware initialization
• Presence request
• System updates
• Cardholder re-initialization
• Hardware configuration initialization
• Run transaction queue

AC history request
An AC history request task pulls access event information from
the CRCs and stores it in the database. The information stored in
the database can then be used to run access event history reports.
The task can be limited to specific doors and to events within a
specific time range. You can schedule the task to activate daily,
weekly, monthly, or on demand.

DB maintenance
DB maintenance tasks can be used to purge old data from the
database. A DB maintenance task is one of the default tasks
provided. The age of the data to be purged is set by you. You can
also schedule the task to run daily, weekly, or monthly.

Hardware initialization
Hardware initialization tasks initialize the hardware in your
system. If a piece of hardware (CRC or KPDISP) has lost its
database or had its data degraded, database information can be
restored using this task type. Typically, your service department
would use this task to restore data to hardware. Hardware
initialization tasks are also used when new hardware is added to
your access control system.

Presence request
Presence request tasks gather information about who is present
in a specified area of your site. This could be your entire site or a
single partition. The information gathered is stored in the
database where it is used to run presence reports.

System update
The system update task is used to send changes from your
database to the hardware (CRCs and KPDISPs) in your access
control system. This task only sends changes that have been

Access Control Database User Manual 6.5

Technical Manuals Online! - http://www.tech-man.com


Tasks

made since the last update. A default system update task is


provided, Update. Update is the task that activates when the
Send Changes button on your toolbar is pressed. If you want to
automate the system update task, create a new task and schedule
it to activate at a desired day and time.

Cardholder re-initialization
The Cardholder Re-init task reinitializes the cardholders of your
access control system. The task reloads all cardholders, not
including hardware configuration, to all hardware (CRCs and
KPDISPs).

Hardware configuration initialization


The Hrdwr Config Init task initializes the hardware configuration
of your access control system devices. The task loads all access
control information, not including cardholders, to all hardware
(CRCs and KPDISPs).

Run transaction queue


The Run Transaction Que task generates transactions that need
to be downloaded to the hardware of your system. The
transactions are only generated and not downloaded to the
hardware of your system.

To create a task:

1. Click the Administration tab.


Tip: Press Alt + F, N to
create a new task. 2. Click the Task tab.
3. From the file menu, click New or click the New button on
the toolbar.
4. In Name, type a name for the task.
5. In Description, type a description for the task.
6. In the Type list, select the type for your task.
7. Save the task record.

6.6 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Tasks

Starting a task
All tasks, except for Update, can be started manually or by a
schedule. A scheduled task can be run on a daily, weekly, or
monthly basis. If you do not want to schedule the start of your
task, it can be set to start on demand.

Starting a task manually


The Start Now button can be used to start a task manually, no
matter when it is scheduled to run.

The Start Now button can be used to start all tasks

To start a task manually:

1. In the left pane, select the task you want to start manually.
2. Click the Start Now button.

Scheduling a task
You can use the Schedule tab to schedule a task to run on a
daily, weekly, monthly, or demand basis. The frequency you
select determines the scheduling options for the task.

Tip: The yellow text box in


the lower right corner
provides information to
help you schedule your
task.

A task set to a monthly frequency requires the selection of the


month, day, and time

Note: If the task is active before scheduling it, the schedule time
will not take effect until the task is deactivated and reactivated.

To schedule a task:

1. In the left pane, select the task you want to schedule.

Access Control Database User Manual 6.7

Technical Manuals Online! - http://www.tech-man.com


Tasks

2. Click the Schedule tab.


3. Select the frequency with which you want the task to run.
4. Depending on the frequency you have chosen, set the
schedule options for the task.
5. If the task is active deactivated the task and reactivate it.
6. Save the task record.

Configuring the time range of an AC history task


In addition to scheduling, an AC history task needs a specific
time range for access events. You specify the day and time for
which you want to retrieve the access control events. You can set
the task to retrieve yesterday’s, today’s, or the overnight access
events.

Tip: The yellow text box in


the lower right corner
provides information to
help you set the time range
for your task.

Time range of access events set for yesterday

To configure the time range for an AC history task:

1. In the left pane, select the AC history task for which you
want to set the time range.
2. Click the Schedule tab.
3. In the Time Range of Access Events group, enter the time
range of access events you want to retrieve.
4. Save the task record.

Setting properties for a DB maintenance task


The properties of a DB maintenance task specify the age of the
records that are to be purged. Only those records older than the
specified date are removed from your database.
The Export Records before purging checkbox lets you save
purged records. The records are saved in the ACDB root

6.8 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Tasks

directory as a .CSV file. The .CSV file is viewable with


Microsoft Excel.

A DB maintenance task set to purge data older than sixty days

To set properties for a DB maintenance task:

1. In the left pane, select the task you want to schedule.


2. Click the Schedule tab.
3. In the DB Maintenance Properties group, set the DB
maintenance properties.
4. Save the task record.

Access Control Database User Manual 6.9

Technical Manuals Online! - http://www.tech-man.com


Tasks

Assigning a task to CRCs and KPDISPs


Tasks can be assigned to a company, site, building, partition, or
to individual CRCs and KPDISPs. Assigning a schedule to a
company, site, building, or partition assigns the same task to all
the doors shown within the selected item. This is the quickest
and easiest way to assign the same task to multiple CRCs and
KPDISPs.
All task types, except for DB maintenance and system update,
can be assigned to specific CRCs and KPDISPs in your access
control system.
If you do not want the task to run on all CRCs and KPDISPs,
you can limit the task to specific CRCs, and KPDISPs. Only the
specified devices are included in the task. When a device is
selected, it is highlighted in gray.
To assign a task to single CRC or KPDISP, simply select the
individual door or KPDISP.
Note: If nothing is selected, then all CRCs and KPDISPs are
included in the task.

This task includes CRC1 and CRC2 (highlighted in gray)

To assign a task to CRCs and KPDISPs:

1. In the left pane, select the task you want to assign.


2. Click the Doors/Keypads tab.
3. Hold down Ctrl and click to select the company, site,
building, partition, and individual CRCs and KPDISPs.
All CRCs and KPDISPs within a selected item are assigned
(as shown by the gray highlight).
4. Save the task record.

6.10 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Tasks

Associating a task with a report


A task can be used to gather access control events for reports.
Presence reports and Access Event History reports can be
associated with a task to automate the gathering of data. If a
report is associated with a task, data for the report is gathered
when the task is run. The data is stored in the database and can
be used to run the report later.
Example:You need to know if employees are present during a
late night shift. You schedule a task to gather data for a defined
presence report each morning. Only the data required for the
report is gathered and stored in the ACDB database.You can
then run the report at your convenience. The report can be
limited to the dates you specify, and the report uses the data
gathered by the task.
This speeds the process of running the report by eliminating the
need to retrieve all access event data from the hardware.
Preferences set in the task take precedence over the preferences
of the report. Only task types of AC History Request and
Presence Request can have a report associated with them. The
table below shows the task types and reports that can be
associated with each other.

Task type Report type


AC History Request Access Event History
Presence Request Presence

See Chapter 13: Reports for further information.

To associate a task to a report:

1. In the left pane, select the task you want to associate with a
report.
2. In the Associated Report list, select the report you want to
associate with the task.
3. Save the task record.

Access Control Database User Manual 6.11

Technical Manuals Online! - http://www.tech-man.com


Tasks

Activating and deactivating a task schedule


Activating a task schedule
Part of defining a task is specifying a schedule. However, the
task schedule must be activated before the task runs
automatically.
Note: Verify that all of the task information has been entered and
that it is correct before activating the task schedule. If the
Activate Task Scheduling button is dimmed, make sure the task
is scheduled correctly.

Activate Task Scheduling button

To activate a task schedule:

1. In the left pane, select the task you want to activate.


2. Click the Activate Task Scheduling button.
3. Save the task record.
The Task Schedule description changes from Inactive to Active,
indicating that the task will be activated according to the
specified schedule.
All default tasks are inactive unless you activate them.

Deactivating a task schedule


To stop a scheduled task form running, you can deactivate its
schedule. The task is not deleted, but the system no longer runs
the task automatically.

To deactivate a task schedule:

1. In the left pane, select the task you want to deactivate.


2. Click the Deactivate Task Schedule button.
3. Save the task record.
The Task Schedule description changes from Active to Inactive.

6.12 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Tasks

Viewing the status of a task


As a task runs, its status can be viewed on the Status tab. The
Status tab has three sub tabs:
• In process
• Task event log
• Transactions not sent

In process
The In Process tab shows the status of the task as it is running.
The In Process tab provides a table with the following columns:
• ID
• Started
• Type
• Priority
• Current Status
• Name
• Task ID
• tip.Current Status
This information lets you accurately track the process of the task
as it is running.

Task event log


After the task is complete, a record is stored on the Task Event
Log tab. Here you see all tasks that have been run. This tab
provides a table with the following columns:
• ID
• Time of Event
• Message
• Task ID

Transactions not sent


The Transactions Not Sent tab displays transactions of a task that
have been rejected by the hardware of your system.
Example: If the Update task downloads 5001 cardholders to a
CRC that stores 5000 cardholders, this and subsequent
transactions to this device would fail and be displayed here.
This type of problem usually occurs due to an error in the system
configuration. Only advanced users should attempt to correct this
and the underlying problem.
The failed transaction also blocks any future downloads to this
CRC. You must delete the failed transaction to allow future
downloads. The transaction is deleted by clicking the Delete
Transaction button.

Access Control Database User Manual 6.13

Technical Manuals Online! - http://www.tech-man.com


Tasks

Note: The Transaction Not Sent tab does not show task failures
due to communication errors.

To view the status of a task:

1. In the left pane, select the task for which you want to view
the status.
2. Click the Status tab.

6.14 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Tasks

Editing and deleting a task


Editing a task
The ACDB lets you edit tasks to meet your specific needs. You
can change the frequency of the task or change the CRCs or
KPDISPs associated with the task. A common change to an AC
history request task is to edit the time range of access events
collected.

To edit a task:

1. Click the Administration tab.


2. Click the Task tab.
3. In the left pane, select the task you want to edit.
4. Edit the task.
5. Save the task record.

Deleting a task
You can delete all tasks except for the Update task. You may
find it easier deactivate a task rather than deleting it. A
deactivated task can be reactivated later. A deleted task is gone
forever.
Note: Before deleting a task, you must deactivate its schedule.

To delete a task:

1. Click the Administration tab.


2. Click the Task tab.
3. From the left pane, select the inactive task you want to
Tip: Press Alt + F, D to
delete the task.
delete.
4. From the File menu click Delete or click the Delete button
on the toolbar.
5. Click Yes to delete.

Access Control Database User Manual 6.15

Technical Manuals Online! - http://www.tech-man.com


Tasks

6.16 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Chapter 7
Outbound ports and routes

Summary
This chapter shows you how to create and configure outbound
ports and routes. Outbound ports and routes define how the
ACDB downloads information to the hardware of your access
control system.

Content
Outbound ports and routes overview • 7.2
Outbound ports • 7.2
Routes • 7.3
Creating an outbound port • 7.6
Creating a route • 7.7
Configuring the default route • 7.8
Configuring your system for an alternative route • 7.9
Modifying the default route for MODCOMs, CRCs, and
KPDISPs • 7.9
Assigning a new route to MODCOMs, CRCs, and
KPDISPs • 7.10
Editing and deleting an outbound port • 7.12
Editing an outbound port • 7.12
Deleting an outbound port • 7.12
Editing and deleting a route • 7.13
Editing a route • 7.13
Deleting a route • 7.13

Access Control Database User Manual 7.1

Technical Manuals Online! - http://www.tech-man.com


Outbound ports and routes

Outbound ports and routes overview


The ACDB transfers information to and from the hardware of
your access control system (the CRCs. MODCOMs, and
KPDISPs). To do this, the ACDB needs to know how to
communicate with your system. Outbound ports and routes work
together to define the communication method between the
ACDB and your access control system.
The communication parameters are divided into two tabs:
• Outbound Ports
• Routes
You can configure multiple outbound ports and routes to satisfy
all your communication needs.
Example: You are in charge of access control for a large
university that has two campuses. The main campus has a direct
connection from the PC running the ACDB to the hardware of
your access control system. The second campus, being a large
distance from the main campus, requires a modem connection
from the PC running the ACDB to the hardware of your access
control system. You would need two outbound ports and routes
to communicate with both campuses.

Outbound ports
An outbound port specifies the computer and port you are
transmitting from.
During installation, the ACDB detects your PC ports
automatically. These are displayed on the Outbound Port tab of
the Administration tab.
Typically, a PC has communication ports at COM1 and COM2.
You are not bound to the automatically detected outbound ports.
You can edit, delete, and add outbound ports as needed.

7.2 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Outbound ports and routes

The Outbound Ports tab

Routes
Routes define how the ACDB connects to the hardware of your
access control system. There are two different types of routes:
• Modem connection
• Direct connection (RS-232)

Modem
A modem route uses a telephone line to communicate. The
connection leaves the modem from the PC and connects to the
modem at the control panel.
For a modem route, you configure the Outbound Properties tab
and ModCom tab for that route. The receiving modems are
imported into the ACDB with your RP file.

RS-232
An RS-232 route connects directly to the control panel. The
RS-232 line runs from your PC serial port and plugs directly into
the control panel.

Outbound properties for routes


Both an RS-232 and a modem route require the configuration of
outbound properties. This includes selection of an outbound port
(as created on the Outbound Ports tab) and specification of
communication parameters for each route. The table below
describes the communication parameters.

Access Control Database User Manual 7.3

Technical Manuals Online! - http://www.tech-man.com


Outbound ports and routes

Communication parameters
Field Default Description
Baud rate None The speed at which at which data can
be transmitted
Maximum 8 The number of times the ACDB will try
retries to communicate before timing out
Maximum 800 The maximum length of the message
message sent at any one time
length
Timeout 20 The amount of time before the ACDB
will retry to connect
Tracing None Tracing tells the ACDB to generate trace
files of the communications stream.
Technical support uses the trace files to
determine communication problems.

Default routes
The ACDB automatically creates two default routes for you. (If
your system does not contain a MODCOM, the ACDB will not
create a Modcom default route.) The default routes are:
• 3-CPU Default
• Modcom Default
If your control panel has no MODCOM, the ACDB uses the
3-CPU Default route to communicate to the hardware of your
access control system. The ACDB assigns all CRCs and
KPDISPs to this default route.
If your control panel has a MODCOM, the ACDB uses the
Modcom Default route to communicate.
When you click Send Changes from the Action menu or click the
Send Changes button on the toolbar, the system uses the
appropriate default route to communicate to your access control
system. The system will not use the default route if you create an
alternative route and assign it to the CRCs and KPDISPs. See
Configuring your system for an alternative route in this chapter.
Although the ACDB creates a default route for you, the default
route still requires configuration. See Configuring default routes
in this chapter.

7.4 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Outbound ports and routes

Routes tab

Access Control Database User Manual 7.5

Technical Manuals Online! - http://www.tech-man.com


Outbound ports and routes

Creating an outbound port


ACDB communication requires an outbound port and a route
that uses the outbound port. The ACDB automatically detects
your outbound ports. You can use the detected outbound ports or
create new ports as needed.
For the ACDB to recognize a modem on your PC, the modem
must be installed properly in your Windows operating system. At
each startup of the software, the ACDB redetermines all
communication ports.
If you want to create a new outbound port, follow the
instructions below.

To create an outbound port:

1. Click the Administration tab.


2. Click the Outbound Ports tab.
Tip: Press Alt + F, N to 3. From the File menu, click New or click the New button on
create a new outbound
the toolbar.
report.
4. In Name, type a name for the outbound port.
5. In Description, type a description for the outbound port.
6. In the Computer Name field, type the computer name for the
computer where the port is located.
7. In the Serial/Tapi Port field, select the direct connection
COM port.
8. Save the outbound report record.

7.6 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Outbound ports and routes

Creating a route
After you have created your outbound port, you can either assign
the outbound port to the default route or create a new route.
Each CRC and KPDISP automatically uses the default route. For
a CRC or KPDISP to use a different route, you must manually
assign that route to the device. See Configuring your system for
an alternative route in this chapter.

To create a route:

1. Click the Administration tab.


2. Click the Routes tab.
Tip: Press Alt + F, N to 3. From the File menu, click New or click the New button on
create a new route.
the toolbar.
4. In Name, type a name for the route.
5. In Description, type a description for the route.
6. In the Type list, select RS-232 or Modem.
7. On the Outbound Properties tab, select the Outbound Port.
Tip: The Default button
8. In the Baud Rate list, select the appropriate baud rate.
sets all communication
parameters to the default 9. In the Maximum Retries box, click the up and down arrows
settings. to select the number of times the ACDB will try to
communicate before timing out.
10. In Maximum Msg Length box, select the maximum length of
the message sent at any one time.
11. In the Timeout box, click the up and down arrows to select
the number seconds before the system will timeout.
12. If you are using a modem, click the ModCom tab. If using a
RS-232, skip to step 14.
13. In Name, select the MODCOM for the control panel.
The MODCOMs are imported into the ACDB with the RP
file.
14. Save the Route record.

Access Control Database User Manual 7.7

Technical Manuals Online! - http://www.tech-man.com


Outbound ports and routes

Configuring the default route


The ACDB creates the default route for you. Although ACDB
creates the default route, you must still configure it to
communicate with your access control system.

To configure the default route:

1. Click the Administration tab.


2. Click the Routes tab.
3. In the left pane, select the Default Route (3-CPU Default or
Modcom default).
4. In the Type list, select RS-232 or Modem.
5. On the Outbound Properties tab, select the Outbound Port.
6. In the Baud Rate list, select the appropriate baud rate.
Tip: The defaults button
sets all communication 7. In the Maximum Retries box, click the up and down arrows
parameters to the default to select the number of times the ACDB will try to
settings. communicate before timing out.
8. In Maximum Msg Length box, select the maximum length of
the message sent at any one time.
9. In the Timeout box, click the up and down arrows to select
the number seconds before the system will timeout.
10. If you are using a modem, click the ModCom tab. If using an
RS-232, skip to step 12.
11. In Name, select the MODCOM for the control panel.
The MODCOMs are imported into the ACDB from the RP
file.
12. Save the default Route.

7.8 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Outbound ports and routes

Configuring your system for an alternative route


There are two ways you can change the communication route
used by the ACDB:
• Modify the default route for MODCOMs, CRCs, and
KPDISPs
• Assign a new route to specific MODCOMs, CRCs, and
KPDISPs

Modifying the default route for MODCOMs, CRCs,


and KPDISPs
In some cases, it is easier to modify the properties of the default
route, rather than creating a new route. All MODCOMs, CRCs,
and KPDISPs are initially assigned the default route (3-CPU
Default). Modifying the default route changes its communication
configuration. This affects all MODCOMs, CRCs, and KPDISPs
that use the default route.

You can modify a default route to meet your communication


needs

To modify the default route:

1. Click the Administration tab.


2. Click the Routes tab.
3. Select the default route you want to modify.
4. Modify the route as needed.
5. Save the route record.

Access Control Database User Manual 7.9

Technical Manuals Online! - http://www.tech-man.com


Outbound ports and routes

Assigning a new route to MODCOMs, CRCs, and


KPDISPs
Rather than modifying the default route, you can create and
assign a new route to the MODCOMs, CRCs, and KPDISPs. If
you wish to use a new route, each MODCOM, CRC, and
KPDISP must have its communication route modified
individually.
This can be a time consuming process if your access control
system has a large number of MODCOMs, CRCs, and KPDISPs.
In some cases, it is easier to modify the default route rather than
creating a new route. You must decide which method is best for
your company.
A new route is assigned to a MODCOM, CRC, or KPDISP from
the Administration System tab. The System tab has two views:
• Hardware view
• Company view
The hardware view shows the physical interconnections of the
components in your access control system. The company view
shows the logical organization of the components into buildings
and partitions.
The hardware view is very helpful in assigning routes to
MODCOMs, CRCs, and KPDISPs. An access control system
can have several control panels that are not connected by a
network. In such systems, each panel uses a different
communication route.
One fire alarm panel might have an RS-232 (direct connect)
route and a second panel might have a modem (telephone) route.
The hardware view shows each MODCOM, CRC, and KPDISP,
and the control panel to which each device is connected. This
makes it easy to determine the correct route to assign to each
MODCOM, CRC, and KPDISP.
Both views are of the same access control system. They both
show the same CRCs and KPDISPs. From both views, you can
assign a new route to any individual CRCs and KPDISPs.
MODCOMs are only shown in the hardware view. Assigning a
new route to a MODCOM can only be done in the hardware
view.

7.10 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Outbound ports and routes

MODCOMs, CRCs, and KPDISPs are assigned new


communication routes individually form the Administration >
System tab

To assign a new route to a MODCOM, CRC, or KPDISP:

1. Click the Administration tab.


2. Click the System tab.
3. Click the Company View or Hardware View tab.
MODCOMs can only have their communication route
changed from the hardware view.
4. Select the desired MODCOM, CRC, or KPDISP from the
tree.
5. In Comm. Route, select the new route.
6. Save the new communication route.

Access Control Database User Manual 7.11

Technical Manuals Online! - http://www.tech-man.com


Outbound ports and routes

Editing and deleting an outbound port


Editing an outbound port
You can edit an outbound port to change its location, name, or
description.

To edit an outbound port:

1. Click the Administration tab.


2. Click the Outbound Ports tab.
3. In the left pane, select the outbound port you want to edit.
4. Edit the outbound port as needed.
5. Save the outbound port record.
Tip: Use the multiple select Deleting an outbound port
toolbar buttons or the
multiple select action menu You can delete an outbound port at any time. You might want to
items to select multiple delete an outbound port if your access system is no longer using
outbound ports for deletion. the port to download information.
You can delete all selected
records at once. To delete an outbound port:

1. Click the Administration tab.


2. Click the Outbound Ports tab.
3. In the left pane, select the outbound port you want to delete.
Tip: Press Alt + F, D to
delete an outbound port. 4. From the File menu click Delete or click the Delete button
on the toolbar.
5. Click Yes to delete.

7.12 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Outbound ports and routes

Editing and deleting a route


Editing a route
You can edit an existing route using the Route tab. These
changes might be the result of a new communication route from
your PC to the hardware of your access control system.

To edit a route:

1. Click the Administration tab.


2. Click the Route tab.
3. Select the route you want to edit.
4. Edit the route as needed.
5. Save the route record.

Deleting a route
You can delete a route at any time. You might want to delete a
Tip: Use the multiple select route if your access system is no longer using the route to
toolbar buttons or the
download information.
multiple select action menu
items, to select multiple
routes for deleting. You can To delete a route:
delete all selected records
at once.
1. Click the Administration tab.
2. Click the Route tab.
3. In the left pane, select the route you want to delete.
Tip: Press Alt + F, D to
delete an outbound port. 4. From the File menu click Delete or click the Delete button
on the toolbar.
5. Click Yes to delete.

Access Control Database User Manual 7.13

Technical Manuals Online! - http://www.tech-man.com


Outbound ports and routes

7.14 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Chapter 8
Schedules

Summary
Schedules establish the days and times when cardholders can
gain access to your site. This chapter provides the information
required for creating, defining, editing, and deleting schedules.
The chapter also defines schedules for holidays and door options.

Content
What is a schedule? • 8.2
Monday through Sunday schedules • 8.2
Holiday schedule • 8.3
Door option schedules • 8.3
Creating a schedule • 8.4
Copying from one timeline to another • 8.5
Resetting a timeline • 8.5
Editing and deleting a schedule • 8.7
Editing a schedule timeline • 8.7
Deleting a schedule • 8.7
Defining the timeline colors • 8.8
Adding a custom color to your pallet • 8.8

Access Control Database User Manual 8.1

Technical Manuals Online! - http://www.tech-man.com


Schedules

What is a schedule?
A schedule is a group of eight timelines, one for each day of the
week and one for holidays. Each timeline is divided into 15-
minute increments. You select blocks of time on these timelines
to define when access is granted.
Schedules define the days and times when access is granted,
when doors are unlocked, when PIN numbers are required, and
when normal access events are suppressed.
Schedules are an integral part of controlling how cardholders
access your site. You assign schedules to the individual doors of
an access level. You then assign the access level to individual
cardholders. You also use schedules to define the days and times
when door options are in effect.

Monday through Sunday schedules


You can create custom schedules to meet the specific needs of
your company. Remember that you can create schedules for any
length of time and for each day of the week.
Five default schedules provided by the ACDB. They are:
• Monday–Friday, 24 hours
• Monday–Sunday, 24 hours
• Monday–Friday, 7 a.m. to 4:30 p.m.
• Monday–Friday, 8 a.m. to 5 p.m.
• Monday–Friday, 9 a.m. to 5 p.m.
You can modify the default schedules to meet your needs or
create new schedules.
You can also create schedules for part-time employees with
shorter workdays.
Examples:
• Monday–Friday, 8 a.m. to noon
• Monday–Friday, 1 p.m. to 5 p.m.
• Monday, Wednesday, and Friday, 5 p.m. to 9 p.m.
These are only examples of schedules that could meet the needs
of your company. You can customize your schedules according
to whatever times your company requires.
Note: You should normally allow 15 to 30 minutes of access
time before opening and after closing. This allows for time
differences between the cardholder’s clock and your access
control system. It also allows employees who arrive early or
leave late extra time to enter and exit the building.

8.2 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Schedules

Holiday schedule
A schedule contains a holiday timeline in addition to timelines
for Monday through Sunday. The holiday timeline defines the
time when the ACDB grants or denies access for any of the
holidays you define. To learn how to define holidays see Chapter
9: Holidays.

Door option schedules


In addition to creating schedules for cardholders, schedules are
also used to control three door options. These options are:
• Unlock schedule
• PIN schedule
• Suppression schedule
Your access control system may or may not use door option
schedules. To locate door option schedules in the ACDB select
the System tab from the Administration tab then select a door.
Once you have selected a door, click the door Options tab.

Unlock schedule
The unlock schedule defines the days and times when the CRC
automatically unlocks the door.

PIN schedule
For added security, a card reader can be equipped with a PIN
pad. The PIN schedule defines when a PIN number is required,
in addition to an access card, to gain entry.

Suppression schedule
The suppression schedule defines when the CRC does not log
normal events into history. The CRC always logs access denied,
disarm, and irregular access events. This feature is provided to
reduce the large number of normal access events being put into
history during normal business hours.

Access Control Database User Manual 8.3

Technical Manuals Online! - http://www.tech-man.com


Schedules

Creating a schedule
To facilitate the creation of schedules, you may want to start
with a list of the allowable access times you want to set up. This
will make the process much easier and faster.
Each interval on the timeline represents 15-minute increments.
The exact time for each block is shown in a pop-up display as
you roll your mouse over the timeline. The time is also displayed
in the bottom status bar.
When you drag the mouse along the timeline, the schedule
blocks you select change from red to green. This indicates that
the selected time period is enabled: Red bars indicate disabled
times. You can define as many blocks on a timeline as needed.

The Schedule tab

To create a schedule:

1. Click the Schedules tab.


Tip: The name and
description of a schedule 2. From the File menu, click New or click the New button on
should always reflect the the toolbar.
time when the schedule
3. Type a name for the schedule.
grants access. For
example: Mon - Fri 8 - 4. 4. Type a detailed description of the schedule.
5. For each day, click the beginning start time on the timeline
and drag the cursor to the desired end time. Repeat for
multiple blocks.
6. If this schedule is to allow access during holidays, set the
holiday timeline.

8.4 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Schedules

7. Save your schedule record.

Copying from one timeline to another


When you create a schedule for a week, many of the days will
have the same timelines. You can copy a timeline from one day
to another. When you copy a timeline, the ACDB pastes it into
the current timeline.

Right clicking on a timeline lets you copy one timeline to another

To copy from one timeline to another:

1. Right-click on the timeline for the day you wish to copy the
schedule to.
2. Click Copy From.
3. Select the day of the week or holiday that contains the
schedule you wish to copy.
4. Save your schedule record.

Resetting a timeline
You can reset the timeline for a specific day or for the entire
schedule. When you reset a timeline for a day, the timeline is set
to deny access for the entire day. You can also reset an entire
schedule, which changes all timelines to deny all access.

Access Control Database User Manual 8.5

Technical Manuals Online! - http://www.tech-man.com


Schedules

By right clicking on a timeline the ACDB displays the Reset


option

To reset a timeline:

1. Right-click on the day's timeline you want to reset.


2. Click Reset.
3. Select the day to reset only the current day, or click All to
reset the entire schedule.
4. Save your schedule record.

8.6 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Schedules

Editing and deleting a schedule


Editing a schedule timeline
You can edit an existing schedule within the Schedules tab.
Revisions may be needed due to changing office policies
regarding specific hours of operation, or changes to specific shift
times.

To edit a schedule timeline:

1. Click the Schedule tab.


2. In the left pane, select the schedule you want to edit.
3. Edit the Name or Description.
4. Edit the schedule’s timelines.
5. Save the schedule.

Deleting a schedule
If a schedule is no longer being used in your access control
system, it can be deleted. Deleting a schedule completely
removes it from the ACDB.
Note: Before deleting a schedule, make sure the schedule is not
assigned to an access level. The ACDB will not allow you to
delete a schedule that is assigned to any door of any access level.

To delete a schedule:

1. Click the Schedule tab.


2. In the left pane, select the schedule you want to delete.
Tip: Press Alt + F, D to
delete the schedule. 3. From the File menu click Delete or click the Delete button
on the toolbar.
4. Click Yes to delete.

Access Control Database User Manual 8.7

Technical Manuals Online! - http://www.tech-man.com


Schedules

Defining the timeline colors


You can change the colors used on timelines for access granted,
access denied, and the interval divider. The default timeline
colors are red for access denied, green for access granted, and
white for the interval divider.

Color pallet dialog box for customizing the timeline colors

To define the timeline colors:


Tip: Press Alt + T, O to 1. From the Tools menu, click Options.
display the Options dialog
box. 2. Click the Preference tab.
3. Click the General tab.
4. In the Access Colors group, click the Color Pallet button
associated with Access Granted, Access Denied, or Interval
Divider.
5. Click a color from the color pallet.
You can choose a basic color or a custom color. You must
define custom colors before they can be selected.
6. Click the OK button on the color pallet screen.
7. Click the OK button on the preference screen.
8. Click Yes to save changes.

Adding a custom color to your pallet


The ACDB lets you define custom colors that can be used to
color the timelines of a schedule.

8.8 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Schedules

To add a custom color to your pallet:

Tip: Press Alt + T, O to 1. From the Tools menu, click Options.


display the Options dialog 2. Click the Preference tab.
box.
3. Click the General tab.
4. In the Access Colors group, click the Color Pallet button
associated with Access Granted, Access Denied, or Interval
Divider.
5. Click the Define Custom Colors button.
6. Click anywhere on the rainbow color display to choose your
custom color.
7. Click Add to Custom Colors button.
The ACDB adds the custom color to your color pallet and
can now be applied to the timeline.

Access Control Database User Manual 8.9

Technical Manuals Online! - http://www.tech-man.com


Schedules

8.10 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Chapter 9
Holidays

Summary
This chapter provides general information explaining what
holidays are and how you create and modify them.

Content
What is a holiday? • 9.2
Creating a holiday • 9.3
Setting alternate days off for a holiday • 9.3
Projected day calendar • 9.3
Sorting your holidays • 9.6
Activating and deactivating a holiday • 9.7
Activating a holiday • 9.7
Deactivating a holiday • 9.7
Editing and deleting a holiday • 9.9
Editing a holiday • 9.9
Deleting a holiday • 9.9

Access Control Database User Manual 9.1

Technical Manuals Online! - http://www.tech-man.com


Holidays

What is a holiday?
Holidays are exceptions to the normal seven-day workweek
schedules. A holiday automatically changes a timeline schedule
for the given day, to the holiday timeline. The holiday timeline
in a schedule, typically has different access granted and access
denied times. Timelines for holidays are defined by your
company or organizational requirements.
Note: Holiday timelines are defined on the bottom of the
Schedules tab (see Chapter 8: Schedules). Each schedule
contains one holiday timeline that applies to all holiday dates.
Active holidays will occur yearly on their specified date. Inactive
Holidays will not occur until you make them active.
Here are the default holidays:
• New Years Day
• Memorial Day
• Independence Day
• Labor Day
• Thanksgiving
• Christmas
• New Years Eve
You can modify the default holidays to your needs or create new
holidays.

9.2 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Holidays

Creating a holiday
To facilitate the creation of holidays, you will want to have your
company’s holidays determined before getting started. Holidays
can occur on a fixed date, or a numbered week of the month and
a numbered day of the week (see Week starts on Monday or
Sunday in this chapter for day number).

Setting alternate days off for a holiday


When entering fixed date holidays, it is important to consider
what will happen when the holiday falls on the weekend. The
Alternate Day Off Rule group gives you several options for
selecting additional days off for holiday scheduling. You can
only choose one of the options for any fixed date holiday. There
are four alternate day off rules:
• Friday off if the holiday falls on Saturday. Monday off if
holiday falls on Sunday.
• No day off if holiday falls on Saturday. Monday off if
holiday falls on Sunday.
• Friday off if holiday falls on Saturday. No day off if holiday
falls on Sunday.
• No alternate day off.

The Alternate Day Off Rule group lets you choose one option for
each fixed date holiday

Projected day calendar


At the bottom of the middle pane, a box displays calendars for
Projected Day and Alternative Day Off. These calendars provide
a visual representation of where the days you have selected fall
on the calendar for the current year, as well as for future or
previous years.
Note: The ACDB does not display a calendar under Alternative
Day Off unless you configure an alternative day off rule.

Access Control Database User Manual 9.3

Technical Manuals Online! - http://www.tech-man.com


Holidays

The Holiday tab lets you use the default holidays given to by the
ACDB or create your own

Week starts on Monday or Sunday


Your company may begin their workweek on Monday or
Sunday. If the workweek begins on Sunday, select Week start on
Sunday. If you change the workweek to begin on Sundays, the
projected day off calendar displays Sunday to the far-left
column. As well, the number in Day of the Week changes to
reflect the new order of the days. The following table lists the
number and associated day of the week depending on what day
the workweek starts on.

Workweek beginning on Workweek beginning on


Monday Sunday
1 Monday 1 Sunday
2 Tuesday 2 Monday
3 Wednesday 3 Tuesday
4 Thursday 4 Wednesday
5 Friday 5 Thursday
6 Saturday 6 Friday
7 Sunday 7 Saturday

To create a holiday:

1. Click the Holidays tab.

9.4 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Holidays

Tip: Press Alt + F, N to 2. From the File menu, click New or click the New Button on
create a new holiday. the toolbar.
3. Type a name for the holiday.
4. Select a month.
5. Select the week.
• Holiday is a Fixed Date
• 1st Week
• 2nd Week
• 3rd Week
• 4th Week
• Last Week
Example: If you enter a holiday such as President’s Day,
which occurs the third Monday in February, you would
select third week.
6. Type or scroll to the day of the week or day of the month the
holiday will occur.
• If it is a fixed date holiday, type or scroll to the day of
the month the holiday is on.
• If it is a specific day of the week, type or scroll to the
number of the day of the week that the holiday falls on.
See Week starts on Monday or Sunday in this chapter.
Example: For President’s Day, you would select 1 for
Monday, which is the first day of the week (for week that
begins on Monday).
7. If the holiday is a fixed date, click the appropriate Alternate
Day Off Rule for the holiday.
Example: Christmas Day is a fixed date holiday on
December 25. If your organization allows observance of the
holiday on an alternate day when the holiday falls on a
Saturday or Sunday, you would need to select this
Alternative Day Off Rule.
8. Save your holiday record.

Access Control Database User Manual 9.5

Technical Manuals Online! - http://www.tech-man.com


Holidays

Sorting your holidays


If you desire to sort the holiday list by name, select Sort By
Holiday Name. The ACDB displays the holiday record list in
alphabetical order.
If Sort By Holiday is not checked, then the ACDB displays the
holiday record list in chronological order.

The ACDB displays the holiday record list in chronological order


if the Sort By Holiday Name check box is not selected

9.6 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Holidays

Activating and deactivating a holiday


Activating a holiday
After you have entered all holidays for your company, you must
activate each holiday before the ACDB will recognize the
holiday. All holidays are initially inactive.
When you click the Activate Holiday button, the holiday changes
from inactive to pending active. Only the pending active
holidays are downloaded to your access control system. For
downloading information see Chapter 3: Basic operations.
After you download the holiday to your access control system,
the holiday changes to active.
Note: Verify that you have entered all of the holiday information
and that it is correct before downloading.

All inactive holidays all indicated as being so

To activate a holiday:

1. In the left pane, select the holiday you wish to activate.


2. Click the Activate Holiday button.
3. Save the Holiday record.
The description of the holiday changes from inactive to pending
active indicating that the information is now ready for you to
download to the your access control system.
Note: Holidays are not active until they are downloaded to the
CRCs. See Chapter 3: Basic operations for information
regarding downloading to the CRC.

A pending active holiday will become active after the next


download to your access control system

Deactivating a holiday
Any holiday that you can activate you can also deactivate.
Inactive holidays will not affect the ACDB schedules until you
make them active.

Access Control Database User Manual 9.7

Technical Manuals Online! - http://www.tech-man.com


Holidays

To deactivate a holiday:

1. In the left pane, select the holiday you wish to deactivate.


2. Click the Deactivate Holiday button.
3. Save the Holiday record.
The description of the holiday will change from active or
pending active to pending inactive, indicating that the
information is now ready to be downloaded to your access
control system.
Note: Holidays are not deactivated until they are downloaded to
the CRCs. See Chapter 3: Basic operations for information
regarding downloading to the CRC.

9.8 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Holidays

Editing and deleting a holiday


Editing a holiday
To meet the changing demands of holidays and how your
organization develops policy regarding specific dates, you may
have to edit existing holidays. The ACDB lets you edit holidays
at any time.

To edit a Holiday:

1. Click the Holiday tab.

Tip: By using the 2. In the left pane, select the holiday you want to edit.
multi-select toolbar buttons 3. Edit the holiday.
or the multi-select action
menu items, you can select 4. Save the holiday record.
multiple holidays for Note: If you are unable to navigate and select a specific holiday,
editing and deleting. All the list may be locked. You need to save the changes to the
selected holidays can be holiday currently being modified before you can select a
edited or deleted at one different holiday.
time. Only limited editing
functionality is available Deleting a holiday
when selecting multiple
holidays. The need may arise for you to remove a holiday.
Example: Your organization may have an employee
appreciation day that has been given annually, but this holiday
has been eliminated and will no longer be used.

To delete a holiday:

1. Click the Holiday tab.


2. In the left pane, select the holiday you want to delete.
Tip: Press Alt + F, D to
delete the holiday. 3. From the File menu, click Delete or click the Delete button
on the toolbar.
4. Click Yes to delete.
Note: If you think that the Holiday may be used again at a later
date, it is a better to make the holiday inactive rather than
deleting it. Making a holiday inactive is like putting it on hold. It
can easily be made active again.

Access Control Database User Manual 9.9

Technical Manuals Online! - http://www.tech-man.com


Holidays

9.10 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Chapter 10
Access levels

Summary
This chapter describes access levels and shows you how they
work. It also covers the process of creating access levels and
assigning schedules, command lists, and privileges to an access
level.
A cardholder can not enter through a door until access levels are
created. Assigning access levels to cardholders defines their
access properties.

Content
What is an access level? • 10.2
Access level tab • 10.2
Icons on the access level tree • 10.2
Access level toolbar and view buttons • 10.3
States of an access level • 10.4
Creating an access level • 10.6
Expanding and collapsing an access level • 10.8
Assigning a schedule • 10.10
Assigning a different schedule • 10.11
Removing a schedule • 10.11
Assigning a command list • 10.13
Assigning a different command list • 10.14
Removing a command list • 10.15
Setting door privileges • 10.16
Setting door privileges • 10.17
Setting door privileges for multiple doors • 10.17
Removing door privileges • 10.17
Setting KPDISP privileges • 10.18
KPDISP security privileges • 10.18
KPDISP fire alarm privileges • 10.20
Setting KPDISP privileges • 10.20
Setting KPDISP privileges for multiple KPDISPs • 10.20
Removing KPDISP privileges • 10.21
Deleting an access level • 10.22

Access Control Database User Manual 10.1

Technical Manuals Online! - http://www.tech-man.com


Access levels

What is an access level?


An access level determines access properties for cardholder
groups. Properties of an access level consist of the following:
• Schedules for doors
• Command lists for doors
• Privileges for doors
• Privileges for KPDISPs
Normally you give each access level a name based on the job
functions of a group of cardholders. Cardholder groups that need
different access properties are assigned a different access level.
You can define up to 255 access levels. Each cardholder can be
assigned up to two access levels.
An access level defines the doors and times at which cardholders
are granted access. It also defines what privileges a cardholder
has at each door and each KPDISP. A command list can be
assigned to a door, so that each time the CRC grants access, the
attached command list is activated.
For example, you could define one access level that grants all
employees access to a retail area, but denies them access to a
stock room. A second access level could grant mangers access to
the retail area and the stock room.

Access level tab


You create and edit access levels on the Access Level tab. On
this tab access levels are shown in tree form. All access levels
appear in the same pane.
Each access level tree can be expanded to show the sites,
buildings, partitions, CRCs, and KPDISPs it contains. In general,
you define an access level by assigning schedules, command
lists, and privileges to these components.

Icons on the access level tree


Each access level has a tree. The access level tree uses several
icons to represent the different parts of the access level. The
icons are described in the following table.

Access level tree icons


Icon Definition
Access level
Site
Building
Partition

10.2 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Access levels

Access level tree icons


Icon Definition
CRC or door
KPDISP
Schedule
Command list

Access level example


You have a group of cardholders that work Monday through
Friday, from 7 a.m. to 4 p.m. These cardholders only need access
to the manufacturing area of your building. You create an access
level for these cardholders as follows.
First, define a schedule that allows access from Monday through
Friday, from 7 a.m. to 4 p.m.
Next, attach the schedule to the manufacturing doors show on
the access level tree.

In the access level shown above, the two doors for


manufacturing have schedules of Monday through Friday, from 7
a.m. to 4 p.m. A red X indicates that no entry is permitted into the
New York site, or the Inventory building.

Access level toolbar and view buttons


The Access Level tab has a toolbar and view buttons. Buttons on
this toolbar let you execute many of the commands found on the
Action menu. View buttons let you select different views of an
access level tree, by showing or hiding devices.
When you roll your mouse over a toolbar button, a tool tip is
displayed that names the command.

Access Control Database User Manual 10.3

Technical Manuals Online! - http://www.tech-man.com


Access levels

Access level tab buttons


Button Command Description
Add access Assigns a schedule to an
level schedule access level
Delete access Removes a schedule from an
level schedule access level
Set access Sets a privilege for a CRC or
level privilege KPDISP
Reset access Removes a privilege for a CRC
level privilege or KPDISP
Add access Assigns a command list to an
level access level
command list
Delete access Removes a command list from
level an access level
command list
View all Displays all CRCs and KPDISPs

View only Displays only CRCs and


granted KPDISPs that have a schedule
or a privilege assigned to them
View only Displays only CRCs and
denied KPDISPs that do not have a
schedule or a privilege assigned
to them

States of an access level


An access level can have one of six states. The system manages
these states automatically for each access level. A pending state
is one that has not been downloaded to your access control
system.
Every access level displays its current state.

10.4 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Access levels

An access level with the state of Pending Inactive

Access level states


State Description
Inactive An access level with no cardholders,
schedules, or privileges assigned
Pending Active An access level with assigned
cardholders, schedules, or privileges
that has not been downloaded
Active An access level with assigned
cardholders, schedules, or privileges
that has been downloaded
Pending Inactive An access level that was previously
Active, from which you have removed all
cardholders, schedules, and privileges.
The access level has not been
downloaded.
Pending Deletion An access level that has been deleted
but has not been downloaded
Deleted An access level that was previously
Pending Deletion and has no cardholder
assigned this access level

Access Control Database User Manual 10.5

Technical Manuals Online! - http://www.tech-man.com


Access levels

Creating an access level


Before creating your access levels, make sure you have created
schedules for your access control system. Part of creating an
access level is assigning finished schedules.
The ACDB assigns a unique, default name to each new access
level you create. When naming your access level, it is helpful to
use a name that can be associated with a group of cardholders.
The group of cardholders should share the same access
properties. Examples: Managers, Janitors, Customer Service, or
Marketing.
A new access level initially denies access at all levels, indicated
by the red X over the icons. Assigning a schedule or privilege
removes the red X. If an individual door or KPDISP has not been
assigned a schedule or privilege, then the red X remains over it.
All newly created access levels have the state Inactive.

The Manager Shift 1 access level has a red X over all icons. This
indicates that no schedules or privileges have been assigned to
this access level.

To create an access level:

1. Click the Access Levels tab.


Tip: Press Alt + F, N to
create a new access level. 2. From the File menu, click New or click the New button on
the toolbar.
3. In Access Level, type a name for the access level.

10.6 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Access levels

Note: The Access Level name is not updated in the tree view,
until you save the access level.

Access Control Database User Manual 10.7

Technical Manuals Online! - http://www.tech-man.com


Access levels

Expanding and collapsing an access level


Now that you have added an access level, you should become
familiar with expanding and collapsing the access level branch.
The access level is a graphical, hierarchical display of all sites,
buildings, partitions, CRCs, and KPDISPs.
You can expand the access level branch by clicking the plus-sign
(+) icon. You can collapse the access level branch by clicking
the minus-sign (-) icon.

An expanded access level branch

To expand and collapse an access level branch:

1. Click the plus-sign icon next to the access level.


2. Continue clicking all plus-sign icons until you have extended
all branches.
3. Click the minus-sign icons.
4. Continue clicking all minus-sign icons until you have
collapsed all branches.
You can expand branches several ways:
• From the View menu, click Expand Branch
• Click the Expand Branch button on the toolbar
• Press Shift + F5
• Double-click the name of the collapsed access level
You can collapse branches several ways:
• From the View menu, click Collapse Branch
• Click the Collapse Branch button on the toolbar
• Press Shift + F7
• Double-click the name of the expanded access level
You can expand the entire tree in one step using any of the
following methods:
• From the View menu, click Expand Tree

10.8 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Access levels

• Click the Expand Tree button on the toolbar


• Press Shift + F6
You can collapse the entire tree in one step using any of the
following methods:
• From the View menu, click Collapse Tree
• Click the Collapse Tree button on the toolbar
• Press Shift + F8

Access Control Database User Manual 10.9

Technical Manuals Online! - http://www.tech-man.com


Access levels

Assigning a schedule
Assigning a schedule to a door in an access level determines the
time when access is granted at that door. The cardholders that
have this access level assigned to them can enter the door during
the scheduled time.
Doors that do not have a schedule are not accessible by
cardholders with this access level. Doors without schedules are
displayed with a red X.
Schedules can be assigned to an access level, site, building,
partition, or individual doors. Assigning a schedule to an access
level, site, building, or partition assigns the same schedule to all
the doors shown within the selected item. This is the quickest
and easiest way to assign the same schedule to multiple doors.
To assign a schedule to single door, simply select the individual
door and assign the schedule.
After a schedule has been assigned, the associated schedule
name is shown below the door.

Tip: You can make multiple


In the access level Manager Shift 1, Partition 1 is selected
selections of single doors
(highlighted in blue). With Partition 1 selected, you can assign a
by pressing Ctrl and
schedule to all doors within this partition (CRC1 and CRC2).
clicking the doors. All
selected doors can be
assigned a schedule in one
To assign a schedule:
step.
You can see the number of 1. Select the access level, site, building, partition, or individual
doors currently selected in doors.
the Total Doors Selected
box on the Access Levels All doors within the selected item are assigned the same
tab. schedule.

10.10 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Access levels

2. From the Action menu, click Add Access Level Schedule or


click the Add Schedule button on the toolbar.
3. In the Select Schedule list, select the schedule you want to
assign.
4. Click Select.
5. Click Yes to confirm and assign the schedule.
6. Save the access level record.
The access level’s state changes to Pending Active, indicating
that the access level must be downloaded to your access control
system before it goes into effect.

Assigning a different schedule


If you have assigned a schedule and you find that the schedule is
not correct, you can assign a new schedule that replaces the
existing one.

To assign a different schedule:

1. Select the access level, site, building, partition, or individual


doors.
All doors under the selected item are assigned the same
schedule.
2. From the Action menu, click Add Access Level Schedule, or
click the Add Schedule button on the toolbar.
3. In the Select Schedule list, select the schedule you want to
assign.
4. Click Select.
5. Click Yes to confirm and assign the schedule.
6. Save the access level record.

Removing a schedule
If a group of cardholders no longer requires access to an area in
the access level, the schedule for that area can be removed.

To remove a schedule:

1. Select the access level, site, building, partition, or individual


doors.
All doors under the selected item will have their schedule
deleted.
2. From the Action menu, click Delete Access Level Schedule,
or click the Delete Access Level Schedule button on the
toolbar.

Access Control Database User Manual 10.11

Technical Manuals Online! - http://www.tech-man.com


Access levels

3. Click Yes to confirm and delete the schedule.


4. Save the access level record.

10.12 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Access levels

Assigning a command list


Command lists are defined by your integrated system installer
and are imported with the RP file. The Command List tab shows
all the commands that have been defined for your company. You
can view your command lists by clicking Administration tab >
Command List tab. The name and description of the command
list shows you what the command list controls. Refer to your
installer for more information about individual command list
functions.
Typical uses of command lists include:
• Transmission of access events to a central monitoring station
• Activation of remote gates
• Activation of CCTV
• Activation of relays for elevator control
For a command list to be activated, it must be added to an
individual door in an access level. The command list is activated
when access is granted to a cardholder at that door.
A command list can be assigned to an access level, site, building,
partition, or an individual door. Assigning a command list to an
access level, site, building, or partition assigns the same
command list to all the doors shown within the selected item.
This is the quickest and easiest way to assign the same command
list to multiple doors.
To assign a command list to single door, simply select the
individual door and assign the command list.
After a command list is assigned, the associated command list
name is shown below the door.

Access Control Database User Manual 10.13

Technical Manuals Online! - http://www.tech-man.com


Access levels

The access level Manager is selected (highlighted in blue). With


Manager selected, you can assign a command list to all doors
within Manager (CRC1 and CRC2).

To assign a command list:

1. Select the access level, site, building, partition, or individual


Tip: You can make multiple doors.
selections of single doors
by pressing Ctrl and All doors within the selected item are assigned the same
clicking the doors. All command list.
selected doors can be
assigned a command list in
2. From the Action menu, click Add Access Level Command
one step. List, or click the Add Command List button on the toolbar.
You can see the number of 3. In the Select Command List, select the command list you
doors currently selected in want to assign.
the Total Doors Selected
4. Click Select.
box on the Access Levels
tab. 5. Click Yes to confirm and assign the command list.
6. Save the access level record.

Assigning a different command list


If you have assigned a command list and you find that the
command list is not correct, you can assign a new command list
that replaces the existing one.

10.14 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Access levels

To assign a different command list:

1. Select the access level, site, building, partition, or individual


doors.
All doors within the selected item are assigned the same
command list.
2. From the Action menu, click Add Access Level Command
List, or click the Add Command List button on the toolbar.
3. In the Select Command list, select the command list you
want to assign to the door.
4. Click Select.
5. Click Yes to confirm and assign the command list.
6. Save the access level record.

Removing a command list


If a door no longer requires the command list assigned to it, the
command list can be removed from the door.

To remove a command list:

1. Select the access level, site, building, partition, or individual


doors.
All doors within the selected item will have their command
list deleted.
2. From the Action menu, click Delete Access Level Command
List, or click the Delete Command List button on the toolbar.
3. Click Yes to confirm and delete the command list.
4. Save the access level record.

Access Control Database User Manual 10.15

Technical Manuals Online! - http://www.tech-man.com


Access levels

Setting door privileges


In each access level, each door has two check box privileges:
• Disarm privilege
• Irregular entry privilege
Disarm privileges only apply to doors that are under a partition.
Note: A schedule must first be assigned to the door before any
privileges can be granted.

The above figure shows the access level Manager. In Manager,


finished goods entrance door has disarm and irregular entry
privileges.

Disarm privilege
A door with disarm privilege disarms the associated partition
when a valid cardholder badges in. For the door to have disarm
privilege it must be associated with a partition.

Irregular entry privilege


Occasionally it is desirable to grant a cardholder access during
unscheduled entry times. Defining a door with an irregular entry
privilege allows cardholders to gain access outside the times
defined by the schedule.
Each time a cardholder enters a door outside the assigned time,
an Access Granted Irregular history event is created. Access
Granted Irregular history events let the site owners keep track of
who is entering the doors during the off-hours. A report can be
printed that shows the irregular entry events. See Chapter 13:
Reports for more information.
Example: Irregular entry privileges may be required for
cardholders working after hours or weekends. This allows access
to the door outside the normally scheduled time.

10.16 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Access levels

Setting door privileges

To set door privileges:

1. Check or clear the desired door privilege check boxes for the
door.
2. Save the access level record.

Setting door privileges for multiple doors


You can save time by setting door privileges for all doors within
the selected item. The Set Access Level Privilege command
assigns all the doors within the selected item the same door
privileges.

To set door privileges for multiple doors:

1. Select the access level, site, building, partition, or doors.


All doors within the selected item will be granted the door
privilege.
2. From the Action menu, click Set Access Level Privilege or
click the Set Access Level Privilege button on the toolbar.
3. Click the door privilege you want to assign.
4. Click Yes to grant the door privilege.
5. Save the access level record.

Removing door privileges


Just as a door privilege can be added, it can also be removed.
You can also remove the privileges by simply clicking the check
box of the privilege at each door, removing the check.

To remove door privileges:

1. Select the access level, site, building, partition, or doors that


need to have privileges removed.
All doors within the selected item will have door privileges
removed.
2. From the Action menu, click Reset Access Level Privilege,
or click the Reset Access Level Privilege button on the
toolbar.
3. Click the door privilege you wish to remove.
4. Click Yes to confirm and remove the door privilege.
5. Save the access level record.

Access Control Database User Manual 10.17

Technical Manuals Online! - http://www.tech-man.com


Access levels

Setting KPDISP privileges


The Keypad Display (KPDISP) is a control and display module
used in security and fire alarm systems. It includes an LCD
display and a telephone-type keypad. The KPDISP is menu-
driven, and lets the system user:
• Arm and disarm partitions
• Review off-normal points
• Bypass or disable points
• Execute fire alarm and security panel commands
If your access control system uses KPDISP modules, they are
displayed in your access level tree. KPDISPs can be displayed
within buildings or within partitions.
Your integrated system installer defines where each KPDISP
appears when he configures your system. A KPDISP appears
within its building if it is configured to permit fire alarm
command privileges. A KPDISP also appears in each partition
for which it is configured to permit security privileges.

KPDISP security privileges


A KPDISP can be assigned to one or more partitions. Security
settings define which functions a KPDISP can perform for each
partition.
Each KPDISP has four security privileges:
• Arm away
• Arm stay
• Bypass and disable
• Disarm
Note: If no privileges have been set for the keypad, it is
displayed with a red X.

Arm away privilege


Security systems distinguish two types of arming: arm stay and
arm away. A KPDISP with arm away privileges allows
cardholders to arm the partition so the system monitors all
perimeter and interior devices in the partition.

Arm stay privilege


A KPDISP with arm stay privileges allows cardholders to arm
the partition so the system monitors the perimeter devices (door
and window opening detectors) but ignores the interior detectors
(motion detectors). This protects the site, but lets you move
about freely inside.

10.18 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Access levels

Bypass and disable privilege


You can not arm a partition when devices in the partition are in
an active state. Normally, you would check the devices, return
them to their normal condition, and then repeat the arming
process. For example, you may need to close a door that was left
ajar or clear obstructions from the path of an infrared detection
beam.
If the alarmed device can not be returned to its normal state, then
it may be necessary to bypass the broken device. This lets you
arm the partition and gain a reduced level of security.
When a device is bypassed, the system ignores its alarm events
but continues to monitor other events.

Caution: Bypassing devices reduces the security of your site.


You should consider bypassing a device only when it is
unavoidable. You should consider the bypass as a temporary
measure and make every effort to get the device repaired and
back in service as soon as possible.

Disarm privilege
An KPDISP with disarm privileges allows cardholders to disarm
a partition with the keypad. When you disarm a partition, you are
advising the system to stop monitoring devices in the partition
for security alarm events.

A keypad display (KPDISP) with disarm privileges for Partition 1

Access Control Database User Manual 10.19

Technical Manuals Online! - http://www.tech-man.com


Access levels

KPDISP fire alarm privileges


When a KPDISP is configured to allow fire alarm command
privileges, it appears within its building. This lets you set fire
alarm privileges for the access level. The fire alarm privileges
for the KPDISP are:
• Disable
• Reset and alarm silence
• Panel silence

Disable privilege
The fire alarm disable privilege allows a cardholder to disable a
fire alarm device from a keypad.

Reset and alarm silence privileges


The fire alarm reset and alarm silence privilege allows the
cardholder to reset a fire alarm system or silence the audible
devices in an alarm mode. This privilege is the same as pushing
the corresponding buttons on the fire alarm panel.

Panel silence privilege


The fire alarm panel silence privilege allows the cardholder to
silence a fire alarm panel from a keypad. This privilege is the
same as pushing the Panel Silence button on the fire alarm panel.

Setting KPDISP privileges

To set KPDISP privileges:

1. Check or clear the desired privilege check boxes for the


KPDISP.
2. Save the access level record.

Setting KPDISP privileges for multiple KPDISPs


You can save time by granting KPDISP privileges to multiple
devices in a single process. The Set Access Level Privilege
command assigns all the KPDISPs within the selected item the
same KPDISP privileges.

To set KPDISP privileges to multiple KPDISPs:

1. Select the access level, site, building, partition, or KPDISPs.


All KPDISPs within the selected item are granted the
privileges you specified.
2. From the Action menu, click Set Access Level Privilege or
click the Set Access Level Privilege button on the toolbar.
3. Click the KPDISP privilege you want to set.

10.20 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Access levels

4. Click Yes to grant the KPDISP privilege.


5. Save the access level record.

Removing KPDISP privileges


Just as a KPDISP privilege can be added, it can also be removed.
You can also remove the privilege by simply clicking the check
box of the privilege at each KPDISP, removing the check.

To remove KPDISP privileges:

1. Select the access level, site, building, partition, or KPDISPs


that need to have privileges removed.
All KPDISPs under the selected item will have privileges
removed.
2. From the Action menu, click Reset Access Level Privilege,
or click the Reset Access Level Privilege button on the
toolbar.
3. Click the KPDISP privilege you want to remove.
4. Click Yes to confirm and remove the KPDISP privilege.
5. Save the access level record.

Access Control Database User Manual 10.21

Technical Manuals Online! - http://www.tech-man.com


Access levels

Deleting an access level


At some point, the need may arise to delete an access level.
Example: If an access level required a large number of changes,
you might find it easier to delete that access level entirely and
create a new access level.
Note: You can not delete an access level currently assigned to
any cardholders. If the access level is assigned to any
cardholders, you must reassign those cardholders to a different
access level before proceeding.

To delete an access level:

1. Select the access level you want to delete.

Tip: Press Alt + F, D to 2. From the File menu, click Delete or click the Delete button
delete an access level. on the toolbar.
3. Click Yes to delete the access level.
The access level state changes to Pending Deletion.
4. From the File menu, click Send Changes or click the Send
Changes button on the toolbar.
This downloads the database to your access control system.
After the download, the system changes the access level’s state
to Deleted. When you exit from and restart the ACDB, the
deleted access level is no longer present.

10.22 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Chapter 11
Cardholders: basic

Summary
This chapter provides instructions for creating a cardholder
record and entering basic cardholder information. Cardholders
are granted access to your site by assigning access levels and an
access card ID.
Content
What is a cardholder? • 11.2
Creating a cardholder record • 11.3
Card information • 11.4
KPDISP password • 11.5
Access levels • 11.5
Adding personal information • 11.8
Naming cardholder UD tabs and UDFs • 11.10
UD cardholder tabs • 11.10
UDF labels • 11.11
Adding a photo to a cardholder record • 11.13
Importing and sizing a cardholder photo • 11.13
Exporting a cardholder photo • 11.14
Clearing a cardholder photo • 11.15
Activating and deactivating cardholders • 11.16
Activating a cardholder • 11.16
Deactivating a cardholder • 11.16
Filtering cardholder information • 11.18
Letter tabs • 11.18
Filters • 11.18
Editing and deleting cardholder records • 11.20
Editing cardholder records • 11.20
Deleting a cardholder record • 11.20
Reissued cards vs. lost cards • 11.21
Reissuing a card • 11.21
Lost cards • 11.21

Access Control Database User Manual 11.1

Technical Manuals Online! - http://www.tech-man.com


Cardholders: basic

What is a cardholder?
A cardholder is any person to whom you issue a card that grants
access to your site. To access a building, a cardholder must have
an access level and an access card ID. The cardholder is then
downloaded to the Card Reader Controllers (CRCs) of your
access control system.
When a cardholder presents his card at a card reader, the CRC
verifies that the request for access falls within the parameters of
the cardholder’s access level and either grants or denies him
access based on this assessment.
Each cardholder can be assigned different levels of access.
Access levels are customized according to site specifications. A
photograph of the cardholder can be added for additional
security and identification purposes.

11.2 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Cardholders: basic

Creating a cardholder record


A cardholder record must be created and defined before you can
grant access rights to the cardholder. All cardholder information
is entered via the CardHolder tab. The CardHolder tab has
several sub-tabs that are used to define specific cardholder
information.
Note: If your access control system has a large amount of
cardholders, it is recommended that no more than 1000
cardholders be created, activated, and downloaded at any one
time.

Cardholders tab

Name
The first field in a cardholder record is the cardholder’s full
name. The title (Mr., Mrs., Ms, or Miss) is optional.

Status
In the interest of controlling building access, cardholders are
placed in one of three main status categories: Employee, Visitor,
or Visitor Requiring Escort. One of these categories must be
selected for each cardholder.
Visitor requiring escort means that a visitor can not gain access
without an escort (a cardholder with access to the door) badging
in at the same door and at the same time.

Access Control Database User Manual 11.3

Technical Manuals Online! - http://www.tech-man.com


Cardholders: basic

Disability
Cardholders with a disability can be assigned disability
privileges by checking the Has Disability check box. A disabled
cardholder is granted extra access time when badging into a
door. If the door has an automatic door opener installed, the
CRC can be configured to activate the door opener.

Card information
After selecting the correct status for the cardholder, information
specifying the card type, card ID, and PIN number can be set.

Format
Wiegand 26-bit to 38-bit card formats are available in the Format
list. You can use one of the card formats provided or create your
own card format.
To create your own card format and to set the default card
format, refer to Chapter 12: Cardholders advanced.

The ACDB provides several card formats

Facility
Some card formats use a facility code. You can define the name
and number for each facility code you need to use. Facility
names and facility codes are specified in Tools>Options>Facility
Codes.
For more information on facility codes and to set the default
facility code, refer to Chapter 12: Cardholders: advanced.

Card ID number
Each cardholder has a 10-digit card ID number that uniquely
identifies the cardholder in your access control system.
Specific types of cards are used within the ACDB. They include:
• Construction cards: used when the system is being set up,
installed, and programmed (Number = 000,000,001)
• HID Prox cards: have a number preprinted on the card
(Number range = 000,000,002 to 129,999,999)

11.4 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Cardholders: basic

• User assigned cards: provided by other companies, without


card number control. This type of card is only recommended
for companies with a single, security-only location where a
multi-user database is not needed. (Number range =
130,000,000 to 130,999,999)
When a card is assigned to a cardholder, the card ID number is
entered into the cardholder record. You can do this by manually
typing the information into the cardholder record, or by scanning
the card using a Cypress interface. This allows a card reader to
directly enter the card number into the ACDB.
The Cypress interface connects to a serial port on the PC running
the ACDB. See Chapter 12: Cardholders: advanced for more
information.
Note: Check with your integrated system installer to find out
how to acquire the Cypress interface option.

Access card PIN numbers


For added security, some card readers also have a PIN keypad
that allows a PIN number to be entered in addition to the card
code. For these applications, the users must be assigned a PIN
number of one to four digits.
PIN numbers can only be used at doors that have card readers
with keypads. In addition, a PIN schedule must be selected for
the door. This schedule identifies when a PIN is required.

KPDISP password
The PIN number is also used to log on to the Keypad Display
(KPDISP). The password to log on to a KPDISP must consist of
seven digits. The password consists of the last three digits of
your card ID plus a four-digit PIN number.

Access levels
An access level defines access properties for cardholder groups.
Properties of an access level consist of the following:
• Schedules for doors
• Command lists for doors
• Privileges for doors
• Privileges for KPDISPs
Normally you give each access level a name based on the job
function of a group of cardholders. Cardholder groups that need
different access properties are assigned a different access level.
An access level defines the doors and times at which cardholders
are granted access. It also defines what privileges a cardholder
has at each door and each KPDISP. A command list can be

Access Control Database User Manual 11.5

Technical Manuals Online! - http://www.tech-man.com


Cardholders: basic

assigned to a door, so that each time the CRC grants access, the
attached command list is activated.

Access Level #1 list contains all the access levels you created
earlier, using the Access Level tab

Level name
Cardholders access properties are determined by assigning the
appropriate access levels. You can assign up to two different
access levels per cardholder.
Note: Access levels must be created before you can assign them
to cardholders.
While only one access level is required to grant a cardholder
access, you can grant an additional, optional access level. Two
different access levels can be used to set up employees who
work rotating shifts.
When the access levels are used to control access during rotating
time shifts, the first access level is the current schedule and the
second is the future schedule.
Access levels and dates can also be used to control parking lots
and enable the use of temporary schedules.
Note: If you need the second access level to override the first,
check the Second Access Level Overrides First check box.

Activation date
An activation date is required for each access level you assign.
The default is the current date, but if you need to delay activation
for any reason, you can select a future date and the system denies
access until that date.

Expiration date
In some cases, an expiration date is required. An expiration date
is used to deactivate a cardholder’s access to your site.
You can enter activation and expiration dates by selecting them
from the calendar tool that opens when you click the list drop-

11.6 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Cardholders: basic

down arrow. You can edit dates using this tool, or by typing in
the list box.
Example: If you had a telephone technician in your facility, he
could be classified as a visitor requiring escort. If he needed to
be there for two days, you could set the expiration date so that
the assigned access level would expire in two days.

To create a new cardholder:

1. Click the CardHolder tab.


Tip: Press Alt + F, N to 2. From the File menu, click New or click the New button on
create a new cardholder. the toolbar.
3. Select the appropriate title.
4. Type the name of the cardholder.
5. Select the cardholder status.
6. Select the appropriate card format.
7. If applicable, select the appropriate facility name.

Tip: You can press the Tab 8. Type the card’s ID or swipe the card to obtain the card’s ID.
key on the keyboard to 9. If applicable, type a PIN number for the cardholder.
move from field to field
within the CardHolder tab. 10. In Access Level #1, select an access level for the cardholder.
11. Select an activation date.
12. If the cardholder’s access level needs to have an expiration
date, clear the Does not expire check box and select an
expiration date.
13. If the cardholder requires an additional access level, select a
second access level in Access Level #2 .
14. Repeat steps 11 and 12 for Access Level # 2.
15. If Access Level #2 overrides Access Level #1, check the
Second Access Level Overrides First check box.
16 Save the cardholder record.

Access Control Database User Manual 11.7

Technical Manuals Online! - http://www.tech-man.com


Cardholders: basic

Adding personal information


Information can be added to a cardholder’s record. This
information has no bearing on the cardholder’s access.
You can use the Personal tab to store information for
easy access.
Note: Remember, entering personal information is
optional. These are not required fields, but they can be
useful in various applications.
The additional information you enter depends on your
site security manager’s requirements. Personal
information can include an address, telephone number,
and emergency contact information.
This information is fully searchable. Reports can be
compiled from the information to create comprehensive
listings of employee contact information.

Cardholders’ personal information tab

To enter personal information:

1. From the left pane, select the cardholder to whom you wish
to enter personal information.

11.8 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Cardholders: basic

2. Click the Personal tab.


3. Type the cardholder’s address.
4. Type the cardholder’s city.
5. Select the cardholder’s country.
6. Type the cardholder’s ZIP code.
7. Type the cardholder’s home and business phone numbers
and extension.
8. Type the employee ID.
9. Type the emergency telephone number, extension, and
contact information.
10. Save the cardholder record.

Access Control Database User Manual 11.9

Technical Manuals Online! - http://www.tech-man.com


Cardholders: basic

Naming cardholder UD tabs and UDFs


You can add your own custom fields to the cardholder record.
Custom fields are arranged on three custom tabs, ten fields per
tab. You can name the custom tabs and fields to meet your
specific needs.
Custom fields are referred to as user-defined fields or UDFs.
Custom tabs are called user-defined tabs or UD cardholder tabs.
The default names for the UD cardholder tabs are Extra #1,
Extra #2, and Extra #3. Each of the three tabs has ten UDFs. The
default names for the UDFs are UDF Label #1, UDF Label #2,
UDF Label #3, and so on, to UDF Label #30. You assign custom
names to the tabs and fields in Tools > Options.

Cardholder UD tabs and UDFs can be customized to your needs

UD cardholder tabs
The UD CardHolder Tab Labels tab is where you customize the
three UD cardholder tabs. Each tab supports ten UDFs. This lets
you group custom cardholder fields together, to meet your needs.
Operator privileges can be set individually for each UD
cardholder tab, so you can restrict sensitive data from all but
authorized operators.

11.10 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Cardholders: basic

You can customize the three extra UD tab names

To name UD tabs:

Tip: Press Alt + T, O to 1. From the Tools menu, click Options.


launch the Options dialog
box.
2. Click the UD Cardholder Tab Labels tab.
3. In Tab 1, type your name for the tab.
4. In Tab 2, type your name for the tab.
5. In Tab 3, type your name for the tab.
6. Click OK.
7. Click Yes to save your custom names.

UDF labels
The UDF Labels tab is where you name the thirty custom fields
on the UD cardholder tabs. You can create custom fields to store
such information as internal company training dates, pay levels,
or family information.

Access Control Database User Manual 11.11

Technical Manuals Online! - http://www.tech-man.com


Cardholders: basic

UDF labels 1–10 are for tab one, 11–20 are for tab two, and 21–
30 are for tab three

To name UDFs:

Tip: Press Alt + T, O to 1. From the Tools menu, click Options.


launch the Options dialog 2. Click the UDF Labels tab.
box.
3. Select UDF Label #1.
4. Type your label for the field. ID 1 is the first field on Extra
Tab #1.
ID numbers 1–10 are on Extra Tab #1, ID numbers 11–20
are on Extra Tab #2, and ID numbers 21–30 are on Extra
Tab #3.
5. Repeat steps 3 and 4 for as many of the 30 fields you want to
customize.
6. Click OK.
7. Click Yes to save your custom names.

11.12 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Cardholders: basic

Adding a photo to a cardholder record


When you create a cardholder record, you have the option of
including a photo of the cardholder for security and
identification purposes.

The Edit Photo dialog box lets you add the cardholder’s picture
to their record

Importing and sizing a cardholder photo


The following graphic file types can be imported:
• JPG
• BMP
• ICO
• EMF
• WMF
There are two options for importing a photo. First, you can load
a photo by navigating to the file in the Edit Photo dialog box.
When the photo is loaded, it appears in the middle pane of the
screen.
Second, you can copy a photo from another graphics editing
program. Simply copy the photo and click the Copy from
Clipboard button. The photo appears in the middle pane of the
screen.
After importing a photo, you need to size it. Controls for sizing
the photo are located in the middle pane of the Edit Photo dialog
box.
Default: Sizes the photo to the size of the right pane (default
area). If your photo is larger than the default area, it is cropped.
If your image is smaller than the default area, it is expanded to fit
the default area.

Access Control Database User Manual 11.13

Technical Manuals Online! - http://www.tech-man.com


Cardholders: basic

Crop: Lets you select a certain portion of the photo. Using your
mouse, drag a selection box on the photo. When you release the
mouse button, the selected portion of the photo is displayed in
the right pane.
You can move the selection box to any location on the photo. To
do so, simply drag the box. Notice the mouse changes its
appearance once over the selected area. The display area changes
as you move the selected box.
Scale to fit: Lets you enlarge the selected area of the photo to fit
the display pane. You select a portion of the photo by dragging a
selection box.
Select Entire Image: Selects the entire photo image. You must
first click Scale to fit for the Select Entire Image button to
become available. Your entire photo is selected and displayed in
the right pane.
After sizing, the photo is displayed in the right display pane
exactly as it will appear on the Cardholders tab.

To import and size a cardholder photo:

1. In the left pane, select the cardholder for whom you want to
import a photo.
Tip: Press Alt + I to launch 2. Click Import.
the Edit Photo dialog box. 3. Load or copy the photo.
4. Size your photo.
5. Under Storage, move the Image Quality slider to the desired
quality.
The higher the quality, the larger the image size. The image
file size is displayed under the slider bar.
6. Click OK to import the file.
7. Save your changes.

Exporting a cardholder photo


Once the photo has been loaded, the photo can be exported for
backup storage or use elsewhere. Exporting the file does not
remove it from the cardholder record.

To export a cardholder photo:

1. In the left pane, select the cardholder for whom you want to
export a photo.

Tip: Press Alt + E to export 2. Click the Export button in the Photo group.
the photo. 3. Browse to the desired location to export the photo.

11.14 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Cardholders: basic

4. Type a name for the file in the Name field. The default is the
cardholder’s name.
5. Click Open to export.

Clearing a cardholder photo


You can also clear a photo after it has been imported. This is a
useful function for maintaining up-to-date photos.

To clear a cardholder photo:

1. In the left pane, select the cardholder for whom you want to
Tip: Press Alt + C to clear clear a photo.
the photo.
2. Click the Clear button in Photo group.
3. Click Yes to clear.

Access Control Database User Manual 11.15

Technical Manuals Online! - http://www.tech-man.com


Cardholders: basic

Activating and deactivating cardholders


Activating a cardholder
After all of the cardholder information has been entered, the card
must be activated before the record can be downloaded to your
access control system. When information is sent to the CRCs,
only pending active cardholders are downloaded. Cardholders
are not recognized by the access system until they have been
downloaded to the CRCs.
Note: Only cardholders with a card ID and access level can be
activated.

An inactive cardholder

To activate a cardholder:
Tip: By using the
multi-select toolbar buttons 1. In the left pane, select the cardholder you want to activate.
or the multi-select action
menu items, you can select 2. Click the Activate Card button.
multiple cardholders for 3. Save the cardholder.
activating or deactivating.
All selected cardholders The status of the cardholder record changes from Inactive to
can be activated or Pending Active indicating that the information is now ready to
deactivated at one time. be downloaded to the hardware of your access control system.
It is recommended that no more than 1000 cardholders be
activated and downloaded at any one time.
Note: Cardholder data that is saved is not active until it is
downloaded to the access control system. See Chapter 3: Basic
operations for information about downloading.

Deactivating a cardholder
Any card that can be activated can also be deactivated. A
deactivated cardholder does not have any access privileges. A

11.16 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Cardholders: basic

card that is made inactive is removed from your access control


hardware (CRCs and KPDISPs), but not from the database.

To deactivate a cardholder:

1. In the left pane, select the cardholder you want to deactivate.


2. Click the Deactivate Card button.
3. Save the cardholder record.
The status of the cardholder record changes from Active or
Pending Active to Pending Inactive, indicating that the
information is now ready to be downloaded to the access control
system. The cardholder is not deactivated until the information is
downloaded.

Access Control Database User Manual 11.17

Technical Manuals Online! - http://www.tech-man.com


Cardholders: basic

Filtering cardholder information


The ACDB includes two methods for filtering and selecting
cardholder records. These are the Filter check box, and the letter
tabs.
To locate information more precisely, you can use both the letter
tabs and filters while searching for cardholder information.

Letter tabs
The simplest method is to use the letter tabs at the bottom of the
cardholder selection list. These tabs let you display only those
records beginning with the letter you select.

Filters
You can show specific cardholders by applying various filters to
the list. To apply a filter, you select a field from the On list, then
specify a value for that field. On records matching the specified
value are displayed.

You can filter cardholders on several different fields

Filter Definition

Access Level Access Level filters show cardholders that


match the specified level of access
Active? Active filters show cardholders that match the
specified status (active, pending active, etc.)
Card ID Card ID filters show the cardholder that
matches the specified card ID
Derived Card Derived Card Number filters show the
Number cardholder that matches the specified card
number
Last Name Last Name filters show cardholders that match
the last name specified.

11.18 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Cardholders: basic

Filter Definition

Address Address filters show cardholders that match


the specified address. The address information
must be typed exactly as it appears in the
database.
City City filters show cardholders that match the
specified city
State/Province State/Province filters show cardholders that
match the specified state or province
ZIP/Postal Code ZIP/Postal Code filters show cardholders that
match the specified ZIP or postal code
Status Status filters show the cardholders that match
the specified status (Employee, Visitor, or
Visitor requiring Escort)
Disability Disability filters show cardholders that match
the specified value for Disability field (true for
checked or false for unchecked)
No Expiry No Expiry filters show cardholders that match
the specified value for the Does not expire
field. True shows cardholders that have no
expiration date, and false shows cardholders
that have an expiration date.
Second Second Overrides First filters show
Overrides First cardholders that match the specified value for
the Second Access Level Overrides First
check box. True means second overrides first,
and false means no override.
User Defined User Defined Field filters show cardholders
Field that match the specified value for the selected
user defined field.

To apply a filter:

1. At the top of the cardholder record list in the left pane, check
the Filter check box.
2. In the On list, select the desired filter.
3. In the field below, select or type the desired value.
Cardholders that meet the filtered criteria are shown in the left
pane.

Access Control Database User Manual 11.19

Technical Manuals Online! - http://www.tech-man.com


Cardholders: basic

Editing and deleting cardholder records


Editing cardholder records
There are many reasons why you would need to edit cardholders.
Cardholders may need to have their access level changed or may
need to be issued a new access card. Be sure to save your
Tip: By using the changes after you have completed the modifications.
multi-select toolbar buttons
or the multi-select action Note: Editing a cardholder locks the selected record in the
menu items, you can select cardholders list. Current changes must be saved to release that
multiple cardholders for record and allow additional records to be edited.
editing and deleting. All
selected cardholders can Deleting a cardholder record
be edited or deleted at one
time. Only limited editing You can delete cardholder records from the database at any time.
functionality is available
Note: Deleting a cardholder does not immediately deny access
when selecting multiple
cardholders. for that cardholder. The deletion must be downloaded to the
access control system before the changes will take place.

To delete a cardholder record:

Tip: Press Alt + F, D to 1. In the left pane, select the cardholder record you want to
delete a cardholder. delete.
2. From the File menu click Delete or click the Delete button
on the toolbar.
3. Click Yes to delete the record.

11.20 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Cardholders: basic

Reissued cards vs. lost cards


Reissuing a card lets you reassign an existing access card to a
new cardholder.
Example: When an employee leaves the company, he returns his
access card. You can reissue this card to a new employee.
Do not reissue a card to assign a new card to a cardholder that
has lost his card. Rather, use the procedure described below
under Lost cards.

Reissuing a card
Reissuing a card removes all cardholder data from the record
except for information about the access card itself. The
information that is retained is the Card Format, Facility Code,
and Card ID. The cardholder’s last name is changed to !Reissue-
x.
For a card to be reissued the cardholder must be deactivated
before reissuing.
Any card activity that occurred before the reissue date is
attributed to the previous cardholder, but once the card is
reissued; all future activity is attributed to the new cardholder.
Note: The undo function is NOT available when reissuing a
card. Once you execute the reissue command, the data associated
with that card is deleted and can not be retrieved.

To reissue a card:

1. In the left pane, select the cardholder record for the card to
be reissued.
2. From the Action menu, click Reissue Card or click the
Reissue button on the toolbar.
3. Click Yes to reissue the card.
The card is now ready to be issued to a new cardholder.

Lost cards
If an ACDB cardholder loses his access card, you have two
options.
• Wait to see if the cardholder finds his card
• Issue the cardholder a new card
If you are not going to issue the cardholder a new access card,
deactivate the cardholder. Deactivating the card prevents anyone
who finds the access card from illegally entering your site. Keep
the cardholder inactive until he finds his card or until you issue

Access Control Database User Manual 11.21

Technical Manuals Online! - http://www.tech-man.com


Cardholders: basic

him a new card. See Deactivating a cardholder in this chapter


for more information.
If you are going to issue the cardholder a new access card,
simply type the new access card number into the Card ID field of
the cardholder’s record. The cardholder’s state changes from
Active to Pending Active. Save and download the cardholder’s
new access card.
This effectively removes the lost card number from your access
control system. The lost card can no longer be used to gain
access to your site.

11.22 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Chapter 12
Cardholders: advanced

Summary
This chapter provides detailed instructions on the advanced
features for cardholders in the ACDB.
Content
Adding a card format and a facility code • 12.2
Adding a custom card format • 12.2
Adding a facility code • 12.4
Setting the default card format and facility code • 12.6
Administration > System tab • 12.6
Options command • 12.7
Configuring an auxiliary card reader input • 12.9
Scanning in card numbers • 12.10
Assigning central monitoring station user IDs • 12.11
Modifying a CMS user ID • 12.12
Deleting a CMS user ID • 12.13
Exporting a cardholder for badging • 12.14
Exporting a cardholder • 12.14
Exporting additional fields to EPISUITE • 12.15
Changing the EPISUITE database • 12.15
Importing cardholders from an external database • 12.17
Start the database import utility • 12.17
Creating an import definition • 12.17
Assigning import fields • 12.20
Formatting photos • 12.21
Importing the data • 12.22

Access Control Database User Manual 12.1

Technical Manuals Online! - http://www.tech-man.com


Cardholders: advanced

Adding a card format and a facility code


When a cardholder’s access card is downloaded to a CRC, the
ACDB sends a bit code that has been translated according to the
card format. The card format translates the card number into a
string of bits that the CRC recognizes when the access card is
presented.
Some existing access cards include a facility code. If your access
card includes a facility code, it can be added to the card format.
This is dependent upon the access card being used.
The ACDB contains definitions for the Wiegand card formats.
These formats can not be edited or deleted. They are:
• 26 Bit Wiegand Compatible
• 26 Bit Wiegand SIA Compatible
• 32 Bit Wiegand Compatible
• 34 Bit Wiegand Compatible
• 38 Bit Wiegand Compatible

Adding a custom card format


The ACDB contains definitions for the Wiegand card codes. If
your company’s access cards have a different card format than
the ones given, you can create a custom card format. These
specify the format and coding for the card ID and (optional)
facility code.
The card ID can include between 1 and 32 bits.
The facility code can include between 1 and 32 bits. The facility
code can be added to the beginning or end of the Card ID
number.
To add a custom card format, you need to:
1. Create a new card format.
2. Specify the card ID format.
3. Specify the facility code format.

12.2 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Cardholders: advanced

Card Code Format Editor dialog box lets you create a custom
card format

To a create a new card format:

Tip: Press Alt + T, O to 1. From the Tools menu, click Options.


launch the Options dialog 2. Click the Card Code Format tab.
box.
3. Click the New button.
4. Type a name for the card format.
5. If the card format has a facility code, check the Has a
Facility Code check box. If not proceed to Formatting the
card ID.
6. If you specified a facility code, click Precedes Card ID or
Trails Card ID (in the Facility Code Position box) to show
the position of the facility code.

To specify the card ID format:

1. Click the Card ID tab.


2. Scroll up or down to select the bit size of the card ID.
3. Type a test value for the card ID (optional).
4. If the card ID has a parity bit, check the Has a Parity Bit
check box. If not skip to step 7.

Access Control Database User Manual 12.3

Technical Manuals Online! - http://www.tech-man.com


Cardholders: advanced

5. In the Type box, click Even or Odd to specify the parity bit
type.
6. In the Position box click Precedes or Trails to specify the
position of the parity bit.
7. Type the binary constants for the card ID.
The binary constants are constant values included at the
beginning or end of each card ID.

To specify the facility code format:

1. If the card format has a facility code, click the Facility Code
tab.
2. Scroll up or down to select the bit size of the facility code.
3. Type a test value for the facility code (optional).
4. If the facility code has a parity bit, check the Has a Parity Bit
check box. If not skip to step 7.
5. In the Type box, click Even or Odd to specify the parity bit
type.
6. In the Position box click Precedes or Trails to specify the
position of the parity bit.
7. Type the binary constants for the facility code.
The binary constants are constant values included at the
beginning or end of each card ID.
Note: If most of your cardholders will be using this card code
format, make it the default. See Setting the default card format
and facility code in this chapter.

Adding a facility code


An access card may or may not include a facility code. Facility
codes provide extra security so that access card IDs have less
chance of being duplicated at different facilities.
The facility codes are assigned to a cardholder from the
Cardholder tab.

12.4 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Cardholders: advanced

The Facility Codes tab let you define facility codes

To enter a new facility code:

1. From the Tools menu, click Options.


Tip: Press Alt + T, O to
launch the Options dialog 2. Click the Facility Codes tab.
box.
3. Click the New button.
4. In the Name column, type a name for the facility code.
5. In the Code column, type a code for the facility code.
6. Click OK.
7. Click Yes to save the facility code.
Note: If most of your cardholders will be using this facility code,
make it your default. See Setting the default card format and
facility code in this chapter.

Access Control Database User Manual 12.5

Technical Manuals Online! - http://www.tech-man.com


Cardholders: advanced

Setting the default card format and facility code


Each cardholder is assigned a card format and possibly a facility
code. The majority of cardholders use the same card format and
facility code. You can set these as the defaults.
Each new cardholder is automatically assigned the default card
format and facility code. This eliminates the need to select the
card format and facility code for every new cardholder.
If you are importing cardholders from an external source, make
sure to set the default card format and facility code before
importing the cardholders. All imported cardholders are assigned
the default card format and facility code.
There are two ways to set the default card format and facility
code:
• Using the Administration > System tab
• Using the Options command in the Tools menu

Administration > System tab


The default card format and facility code can be set using the
Administration > System tab.

Setting default card format and facility code from the


Administration > System tab

To set the default card format and facility code using the
System tab:

1. Click the Administration tab.


2. Click the System tab.
3. Select the company name in the tree.

12.6 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Cardholders: advanced

4. In the Default Card Format list, select the card format that
your company will be using most often.
5. In the Default Facility Code list, select the facility code that
your company will be using most often.

Options command
The default card format and facility code can also be set using
the Options command on the Tools menu.

Setting the default card format and facility code from Tools >
Options > Company Information tab > Default

To set the default card format and facility code using the
Options dialog box:

1. From the Tools menu, click Options.


Tip: Press Alt + T, O to
launch the Options dialog 2. Click the Company Information tab.
box.
3. Click the Default tab.
4. In the Default Card Format list, select the card format that
your company will be using.
5. In the Default Facility Code list, select the facility code that
your company will be using.

Access Control Database User Manual 12.7

Technical Manuals Online! - http://www.tech-man.com


Cardholders: advanced

Note: If the card format or facility code is not listed, you can
create a new one. Click the New button to the right of the
appropriate list. The New buttons open the Card Code Format
tab or the Facility Code tab. You can create a new card format or
facility code using these tabs. See Adding a custom card format
and facility code in this chapter.

12.8 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Cardholders: advanced

Configuring an auxiliary card reader input


A card reader input device lets you scan a card ID into the
cardholder’s record, rather than entering it manually. You scan
the card with a standard card reader and the ACDB inserts the
card ID into the cardholder record.
The ACDB is designed to work with the Cypress CVT-2110
Wiegand ASCII converter. The Cypress converter connects
directly to the serial port of your computer. Any Wiegand output
card reader connects to the Cypress converter. For installation,
follow the manufacturer’s instructions.
After installing the Cypress converter, you must configure the
ACDB for the auxiliary reader input. Configuration must be
done before access cards can be scanned into cardholder records.

Configuration dialog box for an auxiliary card reader. The ACDB


is compatible with the Cypress CVT-2110 Wiegand ASCII
converter.

To configure an auxiliary card reader:

Tip: Press Alt + T, O to 1. On the Tools menu, click Options.


launch the Options dialog 2. Click the Company Information tab.
box.

Access Control Database User Manual 12.9

Technical Manuals Online! - http://www.tech-man.com


Cardholders: advanced

3. Click the Default tab.


4. Click the Configure button for Configuring Auxiliary Card
Reader Input.
5. In Pick Input Device group, click Serial Port Input Reader.
6. In Serial Port Configuration group, select the COM port the
auxiliary reader is connected to.
7. In Speed list, select 9600. (The Cypress CVT-2110 has a
connection speed of 9600 BPS.)
8. Click OK to save your configuration settings.

Scanning in card numbers


After the Cypress converter is installed and the ACDB is
configured, you are ready to scan a card ID directly into the
cardholder records.

To scan a card ID into the cardholder record click the swipe


button

To scan a card number:

1. Click the Cardholder tab.


2. In the left pane, select the cardholder whose card you want
to scan.
3. Click the Swipe button next to the ID field.
4. Scan the card with the auxiliary card reader.
5. Click OK to accept the scan.
6. Save the cardholder record.

12.10 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Cardholders: advanced

Assigning central monitoring station user IDs


When an access event is reported to a central monitoring station
(CMS), the CMS uses the assigned user ID to identify the
cardholder that created the event.
Your site may report events to several CMSs or alpha numeric
pagers. A cardholder can have multiple CMS user IDs, but each
ID must be unique for a given CMS account.
The CardHolder > System tab lets you assign a CMS user ID to a
cardholder. A single cardholder can have up to three user IDs.
Each CMS has an account for your company. The CMS accounts
are created by your installer and imported with your RP file. You
can have multiple CMS accounts and a corresponding CMS user
ID for each cardholder.
Example: A cardholder creates an after-hours irregular access
event into a controlled partition. The cardholder’s access level
has a command list that reports all irregular access events to the
CMS. The message would include the event and the cardholder’s
CMS user ID, so that the CMS could identify the person.
After assigning CMS user IDs to all cardholders, you need to run
the User ID Translation Report and send it to the CMS. See
Chapter 13: Reports for more information on the User ID
Translation Report.
Note: To use a CMS account, it requires coordination between
the ACDB and the integrated system. Contact your installer of
the access control system for further information.

Access Control Database User Manual 12.11

Technical Manuals Online! - http://www.tech-man.com


Cardholders: advanced

The CardHolder > System tab lets you assign CMS user ID
numbers to individual cardholders

To assign a CMS user ID:

1. Click the CardHolder > System tab.


2. In the left pane, select the cardholder to whom you want to
assign a CMS user ID.
3. In the CMS Account list, select the CMS account for which
you want to assign a user ID.
4. Click the New button next to the CMS Account field.
The ACDB assigns the next available CMS user ID number
to the cardholder.
5. Save the cardholder record.
Note: If all CMS user IDs have been assigned to cardholders, the
ACDB will create groups of cardholders, sharing the same user
ID.

Modifying a CMS user ID


You can modify a CMS user ID. After you modify the user ID,
be sure to notify the CMS of the new user ID. You may want to
send a copy of the User ID Translation Report.

12.12 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Cardholders: advanced

If the CMS user ID is already used by another cardholder, the


ACDB displays a message. Choose another user ID that is not in
use.

To modify a CMS user ID:

1. Click the CardHolder > System tab.


2. In the left pane, select the cardholder whose CMS user ID
you want to modify.
3. In User ID, type the new ID.
4. Save the cardholder record.

Deleting a CMS user ID


If your company switches CMS accounts or no longer wants to
use a CMS account, the CMS user ID for that account can be
deleted from a cardholder record.

To delete a CMS user ID:

1. Click the CardHolder > System tab.


2. In the left pane, select the cardholder from whom you want
to delete a CMS user ID.
3. Click the Delete button next to the User ID field.
The ACDB removes the CMS account and user ID from the
cardholder.
4. Save the cardholder record.

Access Control Database User Manual 12.13

Technical Manuals Online! - http://www.tech-man.com


Cardholders: advanced

Exporting a cardholder for badging


Badging is the process of creating an identification card for an
individual. Typically, the identification card includes a
cardholder photo. The ACDB has the option of using EPISUITE
software to create badges. EPISUITE is a feature-rich electronic
photo identification system used to create and print badges. The
EPISUITE software and badge printing equipment must be
purchased separately. Contact your installation company for
purchasing information.
See EPISUITE literature for software support and compatible
badge printers. The ACDB is compatible with EPISUITE
version 5.0. The EPISUITE software must be installed on the
same computer as the ACDB. Network EPISUITE applications
are not supported, but normally you will only need one badging
workstation.

Exporting a cardholder
You must install the EPISUITE software on the same computer
as the ACDB to activate the Badge button.
When the Badge button is pushed from the CardHolder tab the
following ACDB fields are exported to the corresponding
EPISUITE fields:

ACDB EPISUITE
Title Title
First Name First Name
Last Name Last Name
Address Line 1 Address
City City
State State
ZIP ZIP Code
Country Country
Phone Number Home Home Phone
Phone Number Business Work Phone
IDs Company Company
IDs Employee Employee Number
Card ID Person ID

Each cardholder is added to the end of the EPISUITE database.


If the new cardholder is not displayed at the end of the database,
verify that EPISUITE is using the database EPISUITE.mdb. See
Changing EPISUITE database below.

12.14 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Cardholders: advanced

To export a cardholder:

Tip: By using the 1. Click the CardHolder tab.


multi-select toolbar buttons 2. In the left pane, select the cardholder to be badged.
or the multi-select action
menu items, you can select 3. Click the Badge button below the photo of the cardholder.
multiple cardholders for 4. Log on to the EPISUITE Guard Card program.
export. All selected
cardholders can be 5. Click the EPISUITE Refresh button. The new cardholder is
exported at one time. added to the end of the EPISUITE database.
6. Select the new EPISUITE cardholder and proceed with the
EPISUITE instructions for creating and printing badges.

Exporting additional fields to EPISUITE


If you would like to export additional fields to EPISUITE, create
the fields as UDFs in the ACDB. Make sure that the label of
your UDF matches the EPISUITE field label exactly. When you
click the export button the ACDB will match the identical fields
and export the data.

To export additional fields to EPISUITE:

1. Create a User Defined Field (UDF) in the ACDB that


exactly matches the field in EPISUITE. See Chapter 11:
Cardholders: Basic for information on how to create a UDF.
Example: EPISUITE has a field called Department. Create a
UDF in the ACDB called Department.
2. Export a cardholder from the ACDB to EPISUITE, with data
in the newly created matching UDF.
Example: Data entered in the UDF Department field in the
ACDB is exported to EPISUITE Department field.

Changing the EPISUITE database


When installing the EPISUITE software, you can install it with a
blank database or a sample database. If the software was
installed with a blank database, EPISUITE uses the file
TEMPLATE.mdb as its database. If the software was installed
with a sample database, EPISUITE uses the EPISUITE.mdb file
as its database. The ACDB exports to EPISUITE.mdb file.
Make sure that Guard Card is using the EPISUITE.mdb file by
clicking View > Options > Database in the EPISUITE software.
If the EPISUITE.mdb file is not being used, you can change the
database by clicking Change Database and navigating to the
EPISUITE.mdb file.

Access Control Database User Manual 12.15

Technical Manuals Online! - http://www.tech-man.com


Cardholders: advanced

To change the EPISUITE database:

1. Log on to the EPISUITE Guard Card program.


2. On the View menu, click Options.
3. Click the Database tab.
4. Click Change Database.
5. In Use and Access (Jet) database, click the Browse button.
6. Navigate to the EPISUITE.mdb file and select it.
Note: The EPISUITE.mdb file is in the same directory as the
TEMPLATE.mdb file.
7. Click Open, click Open and click Ok.

12.16 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Cardholders: advanced

Importing cardholders from an external database


The ACDB lets you import cardholders from an external source.
You may already have cardholders entered into a card access or
human resource program. Rather than having to reenter the
cardholder information into the ACDB, you can move data from
an external database to the ACDB database. This offers a huge
saving in time and resources when first setting up your access
control system.
The database import utility lets you match fields from your
existing database to fields in the ACDB. You can import files
from any OLE DB Providers installed on your PC.
When importing cardholders from an external source, make sure
to set the default card format and facility code before importing
the cardholders. All imported cardholders are assigned the
default card format and facility code.
Note: Importing data from an external source is an advanced
procedure, which requires knowledge of Open Database
Connectivity (ODBC). Consult with your company’s IT
professional about ODBC issues.
The procedures that follow are based on the import of a
Microsoft Access database. In general, you will follow these
steps to import cardholder data:
1. Start the database import utility.
2. Create an import definition.
3. Assign import fields.
4. Format photos.
5. Import the data.

Start the database import utility


All import procedures start from the Database Import Utility
dialog box. All the procedures described below start and end at
this dialog box.

To start the database import utility:

• Click File > Import > External Card Holders

Creating an import definition


Before you can import a database, you must create an import
definition for the external database. The import definition
defines what type of data is being imported and where the file is
located. It also lets you select the database table you want to
import.

Access Control Database User Manual 12.17

Technical Manuals Online! - http://www.tech-man.com


Cardholders: advanced

You can create multiple import definitions for external


databases. This can be from the same database or different
databases.
You will follow these steps to create an import definition:
1. Create a new import definition.
2. Create a connection string.
3. Select the database table to import.

The Import Source Properties dialog box defines what type of


data is being imported and where the file is located

Creating a new import definition

To create a new import definition:

1. In the Database Import Utility dialog box, click Source.


2. Click New.
3. Type a name for the import definition.
4. Click OK.

Creating a connection string


The connection string identifies the source database you want to
import. By clicking the Browse button (...), you open the Data
Link Properties dialog box. The Data Link Properties dialog box
shows the OLE DB providers that are installed on your PC. For
more information, click the help button in the Data Link
Properties dialog box.
Example: If your existing database is a Microsoft Access file
(file extension: MDB), then you will use the Microsoft Jet 4.0
OLE DB Provider. On the Connection tab, identify where your
Microsoft Access database file is located and any log on
information for the file.
Note: The following dialog boxes represent the example given.
Your dialog boxes may vary depending on your system and on
the database provider chosen.

12.18 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Cardholders: advanced

Typical Data Link Properties dialog boxes for Microsoft Access

To create a connection string:

1. In the Connection String group, click the Browse button (...).


2. Select the OLE DB Provider for your external database.
3. Click Next.
4. Fill in the Connection tab information.
Note: This dialog box varies according to which OLE DB
Provider you have selected.
5. Click OK.

Selecting the database table to import


Once you have established the connection string for the external
database, you need to select a specific table from the database.
This table contains the data you want to import into the ACDB.
Controls in the Configure Source Table group let you select any
of the tables from the database or write an SQL statement.
Once you select the table from the database, the system displays
the field names or the field values of the table. The field names
or field values are displayed in the Available Fields list. This
makes it easy to verify that you have selected the correct table
for import. The field values are the actual data that the fields
contain. If the field names and values do not appear to be the
data you want to import, the source table may not be correct. Use
the Configure Source Table controls to select the correct table.

Access Control Database User Manual 12.19

Technical Manuals Online! - http://www.tech-man.com


Cardholders: advanced

After creating a connection string, you select a database table.


The system displays the fields in the table.

To select the database table:

1. In the Configure Source Table group, click SQL to create a


query, or click the list box to select a table.
2. If you clicked SQL, click Edit and write the SQL Statement.
If you clicked the selection list, select the table from which
you want to import the data.
3. In the Display group, click Field Names and verify that the
fields are the fields you want to import. The fields are
displayed in the Available Fields list.
Note: The fields displayed are the fields available for import.
You decide which fields are actually imported in the step
Assigning fields to the ACDB database, shown below.
4. In Display group, click Field Values and verify that the
fields contain the data you want to import.
Note: You can scroll through different records by clicking
the forward and backward arrow buttons. The data is
displayed in the Available Fields list.
5. Click Save to save your import definition.
6. Click Close to close Import Source Properties dialog box.
The system returns you to the Database Import Utility dialog box
for the next step in the process.

Assigning import fields


The Database Import Utility dialog box lets you select which
fields you want to import and where you would like the data to
be stored in the cardholder record.
After you select an import definition, the fields from the external
database are displayed in the Unassigned External Fields column
on the left. Each of these fields can be dragged to the Crossed
Field Name column. Drag the field to the corresponding row in

12.20 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Cardholders: advanced

the CH Display Name column. This is where the imported field


will be stored and displayed in the ACDB.

You control which data is imported and where by clicking and


dragging the external fields to the crossed field name column

To assign import fields:

1. From the bottom left list, select the import definition you
want to use.
2. From the Unassigned External Fields list, drag each field
you want to import into the Crossed Field Name column.
Place it beside the CH Display Name (ACDB) in which the
data should be stored.
Note: The CH Display Name is where the imported data will
be stored in the ACDB. Not all fields need to be dragged
from the Unassigned External Fields column to the Crossed
Field Name column. Only drag the fields you want to import
into the ACDB.

Formatting photos
If your external database includes photos for import, you can edit
the import properties for the photos. The Image button becomes
active as soon as a crossed field name is dragged to the photo
row. The Image button opens the Set Photo Properties dialog
box.
The Set Import Photo Properties dialog box lets you set import
properties for all photos being imported. The properties you set
apply to all photos. You can not set individual properties for

Access Control Database User Manual 12.21

Technical Manuals Online! - http://www.tech-man.com


Cardholders: advanced

each photo. You can view each photo by clicking the arrow
buttons to preview all photos before import.
For information on how to set photo properties refer to Chapter
11: Cardholder: Basic.

The Set Photo Import Properties dialog box lets you set the
properties for all photos being imported

To format photos:

1. Click the Image button.


2. Using the Set Photo Import Properties dialog box, size your
photo.
3. In the Storage group, move the Image Quality slider to the
desired quality.
The higher the quality, the larger the image size. The image
file size is displayed under the slider bar.
4. Click the arrow buttons to preview each of the photos for
import.
5. Click OK to save the settings for your import.

Importing the data


Once you have created your import definition, assigned your
fields, and set your photo format, you are ready to import the
external data into the cardholder records. Clicking Import in the

12.22 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Cardholders: advanced

Database Import dialog box opens the Cardholder Import dialog


box.
The Cardholder Import dialog box requires the configuration of
two import options. First, you must specify how the system
handles import records that match existing records in the ACDB.
Second, you must specify how the system mismatches between
the format of import fields and ACDB fields.
The Start button in the Cardholder Import dialog box changes its
name as the import proceeds.
After you click the Start button, if the database import utility
detects possible import problems, it displays appropriate
messages in the Import Status list. Review the warning messages
and save them if you wish. The Start button changes to the
Continue button.
Clicking the Continue button resumes the import of the external
data. As the data is being imported, the status is displayed in
Import Status and if the data includes a photo, the photo is
displayed in Imported Cardholder Photo.
After importing the last record, the Start or Continue button
becomes a Done button. Clicking Done closes the Cardholder
Import dialog box. Clicking Close in the Database Import Utility
dialog box returns you to the ACDB. The newly imported
cardholders are displayed in the CardHolder tab.

The Cardholder Import dialog box

To import the data:

1. From the Database Import Utility dialog box, click Import.

Access Control Database User Manual 12.23

Technical Manuals Online! - http://www.tech-man.com


Cardholders: advanced

2. In the Cardholder Import groups, click the radio buttons that


indicate your preferences.
3. Click Start.
4. Acknowledge any warning messages. If you wish to save the
warnings, click the Save Log button.
5. After acknowledging any warning messages, click Continue
to resume the import.
6. Click Done.
7. Click Close.

12.24 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Chapter 13
Reports

Summary
This chapter describes the ACDB reports, and shows how to
create and run reports. You will find that reports are a valuable
tool for providing information about your access control system.

Content
What is a report? • 13.2
The Reports tab • 13.2
Reports and tasks • 13.3
Default reports • 13.5
Customizing a default report • 13.5
Creating a report • 13.7
Filtering reports • 13.9
Filtering doors • 13.9
Filtering access events • 13.10
Filtering conditions • 13.11
Setting the styles for a custom report • 13.15
Creating report headings • 13.15
Creating report groups • 13.16
Setting report fonts • 13.16
Setting report orientation • 13.17
Adding fields to a custom report • 13.18
Running a report • 13.20
Viewing and printing a report • 13.22
Deleting a previously requested report • 13.22
Editing and deleting a report • 13.24
Editing a report • 13.24
Deleting a report • 13.24

Access Control Database Users Manual 13.1

Technical Manuals Online! - http://www.tech-man.com


Reports

What is a report?
A report is information that is gathered about your access control
system, then displayed in a preview format. Information for
reports can come from your ACDB database, or from the
hardware of your access control system.
Several types of report provide information about your access
control system. Each report falls into one of three categories.
• Access event reports
• Database reports
• Presence reports

Access event reports


The hardware of your access control system includes all Card
Reader Controllers (CRCs). The CRCs store information on
access events as they happen. Reports can be run against the
events that are stored in the CRCs. You can filter reports to limit
their contents to the date and time range, event types, and CRCs
you specify. Further filtering can be done by adding conditions
to the report.

Database reports
Database reports use data from the ACDB. They can include
information that is stored about cardholders, access levels,
schedules, or holidays.

Presence reports
A presence report shows where cardholders are located in the
site. In order to run a presence report, you must set up an access
control system that has partitions, and entry and exit card
readers.

The Reports tab


The Reports tab lets you select and run default reports,
customize default reports, and create new custom reports.
The Report list in the left pane shows the default reports
provided with the ACDB. The name, description, and type of
each report is shown at the top of the right pane. Various sub-
tabs in the right pane let you create and customize reports.

13.2 Access Control Database Users Manual

Technical Manuals Online! - http://www.tech-man.com


Reports

The Reports tab lets you run reports on access events, database
information, and cardholder location or presence

Reports and tasks


Each CRC in your access control system stores up to 5,000
access events (20,000 for CRCXMs). Once the CRC meets its
storage limit of access events, the oldest access events are
replaced with new events. The Tasks tab, a sub-tab of the
Administration tab, provides a method to gather and store access
control events from the CRCs. Once stored in the ACDB, these
can be used for reports.
An Access Control (AC) History Request task takes the AC
event history from the CRCs and stores it in the database for
later use. When you run an AC history report, the ACDB
prompts you, asking if you want to run your report from the
ACDB database or from the hardware of your access control
system. If you choose to retrieve your data from the hardware,
all data is retrieved and stored in the ACDB. The data is then
used for your current report and is available in the database for
later reports.

Automate the gathering of data for reports


Presence reports and access event history reports can be
associated with a task to automate the gathering of data for these
reports. If a report is associated with a task, data for the report is
gathered when the task is run. The data is stored in the database
and can be used to run the report.
Example: You may need to know if employees are present
during a late night shift. You can schedule a task to gather data

Access Control Database Users Manual 13.3

Technical Manuals Online! - http://www.tech-man.com


Reports

for a defined presence report each morning. Only the data


defined by the report is gathered and stored in the ACDB
database.
You can run the report at your convenience. The report can be
specified for the dates you want, and the report is prepared from
the data gathered by the task.
This speeds the process of running the report since the ACDB
does not have to retrieve all data from the hardware.
See Chapter 6: Tasks for further information.

The first step in running an access event report is to tell the


ACDB where to get its information for the report

13.4 Access Control Database Users Manual

Technical Manuals Online! - http://www.tech-man.com


Reports

Default reports
The ACDB has several predefined or default reports. You can
use the default reports as they are, customize them, or create new
custom reports. The default reports are listed below.

Default report Description


Access Level Provides a detailed look at the access levels
of the ACDB
Cardholder Provides a detailed report on each
(Detail) cardholder including User Defined Fields
(UDFs)
Cardholder Provides a summary report on each
(Summary) cardholder, excluding UDFs
Event History Provides a report on access events from the
hardware (CRCs/doors and KPDISPs) of the
access control system
Modcom User ID Provides a report on each cardholder’s
Translation central monitoring station user ID
Muster Provides a report on who is currently
present after cardholders have evacuated
and badged in at a muster station.
For a Muster report to run correctly the
CRCs must be configured properly in the
SDU.
Projected Provides five-year projections on all holidays
Holidays defined for your system
Resource Usage This report shows the number of resources
(cardholders, access levels, schedules, and
holidays) assigned and the maximum
number allowed for each CRC.
Schedule Provides a detailed graphical look at the
schedules defined for your system

Customizing a default report


You can customize the following default reports.
• Cardholder (Detail)
• Cardholder (Summary)
• Event History
The custom check box on these reports allows additional
configuration of the reports. The Custom check box adds the
Style and Fields tabs to the right pane. The Style tab lets you
configure the headings and fonts of the report. The Fields tab
gives you full control over which database fields are included in
the report. See Filtering reports and Setting the styles for a

Access Control Database Users Manual 13.5

Technical Manuals Online! - http://www.tech-man.com


Reports

report in this chapter for further information on customizing a


default report.

To customize a default report:

1. In the left pane, select the default report you want to


customize.
2. Check the Custom check box.
3. Customize the report (as described in subsequent topics in
this chapter).
4. Save the report record.

13.6 Access Control Database Users Manual

Technical Manuals Online! - http://www.tech-man.com


Reports

Creating a report
If the default reports or customized default reports do not meet
your needs, an entirely new custom report can be created. All
reports fall into one of the following report types.

Report type Description


Access event An access event history report is based on
history information from the CRCs (doors) of your
access control system. The CRCs store
information on access events as they happen. A
report can be created to track any access events
over a specified period.
Resource Each CRC, KPDISP, and MODCOM has a
usage maximum number of resources (cardholders,
access levels, schedules, and holidays)
assigned to it. A resource usage report shows
the number of resources assigned and the
maximum allowed for each CRC, KPDISP, and
MODCOM.
Cardholder The cardholder (detail) report gives a detailed
(detail) report on each cardholder, and includes user-
defined fields (UDFs)
Cardholder The cardholder (summary) report gives a
(summary) summary report on each cardholder, but
excludes UDFs
Projected The project holiday report gives a five-year
holiday projection of the holidays defined in your ACDB
Schedule A schedule report gives a detailed graphical look
at the schedules defined in your ACDB
Access level An access level report gives a detailed look at
the access levels defined in your ACDB
Modcom user Provides a report listing each cardholder’s
ID translation central monitoring station user ID
Presence Presence reports let you identify who is present
in a controlled area of your site during a
specified time

Access Control Database Users Manual 13.7

Technical Manuals Online! - http://www.tech-man.com


Reports

Report type Description


Muster After the evacuation of a building, you can use a
muster report to verify that everyone has exited
the building.
During an evacuation, everyone exits from the
building immediately and goes to a
predetermined muster station. At the muster
station, personnel badge their access cards into
a card reader. The card reader is attached to a
CRC designated as a muster station.
After everyone has badged in at the muster
station, the security staff runs a muster report.
The report indicates personnel that have badged
into the building but who have not badged out at
the muster station.
For a Muster report to run correctly the CRCs
must be configured properly in the SDU.
Operator An operator report gives a detailed report on all
the operators of the ACDB. The report includes
each operator’s privileges, photo, last login and
logout, status, and other operator information.

Example of a custom report: A TV was reported missing from


a controlled stockroom. The stockroom showed no signs of
physical damage to the lock of the door securing the stockroom.
Management would like to question the people who entered the
stockroom from the time the TV was last seen to the time it was
reported missing. Management would define and run an access
event history report to find the cardholders that entered the room
during this time.

To create a new report:

1. Click the Reports tab.


Tip: Press Alt + F, N to
2. From the File menu, click New or click the New button on
create a new report.
the toolbar.
3. Type a name for the report.
4. Type a detailed description of the report.
5. In the Type box, select the type of the report.
6. Save the report record.
Refer to Filtering reports, Setting Styles for a report, and Adding
fields to a report in this chapter to finish customizing any report.

13.8 Access Control Database Users Manual

Technical Manuals Online! - http://www.tech-man.com


Reports

Filtering reports
Default reports, customized reports, and new reports can be
filtered, using the Filter tab. Filtering lets you narrow the
information provided in a report. The Filter tab contains up to
three sub-tabs, which can be used to filter a report:
• Doors
• Access events
• Conditions
Not all report types have the Filter tab or all filter options. The
following table shows the reports you can filter, and the sub-tabs
available.

Report type Doors Access events Conditions


Access event history X X X
Cardholder (detail) X
Cardholder (summary) X
Presence X
Muster X

The following report types do not allow filtering:


• Resource usage
• Projected holiday
• Schedule
• Access level
• Modcom user ID translation
• Operator

Filtering doors
Filtering doors limits reports to specific areas of your site. A
report can be filtered by selecting your entire building or any
combination of partitions, KPDISPs, and CRCs (doors). The
CRCs and KPDISPs that are to be included in the report are
highlighted in gray when selected.
Note: Selecting no keypads or doors includes all doors and
keypads in the report. This is the default.

Access Control Database Users Manual 13.9

Technical Manuals Online! - http://www.tech-man.com


Reports

This report includes the KPDISPs from the partition 1

To filter a report:

1. In the left pane, select the report you want to filter.


2. Click the Filter tab for the report.
3. Click Doors.
4. Hold down Ctrl and click to select the sites, buildings,
partitions, and doors you want to include in the report.
Selecting a site, building, or partition includes all doors
within the selected icon.
5. Save the report record.

Filtering access events


Access events can be filtered in three ways:
• By access date range
• By reader
• By access event type
The access date range filter lets you specify the dates and times
for your report. Only the access events that occurred during the
specified date and time range are included in the report. Times
are displayed in military or 24-hour format.
The reader filter lets you create a report for specific exit or entry
card readers.
The access event filter lets you filter any number of the possible
access denied and access granted event types. You can use the
selection buttons, Toggle All, Select All, and Deselect All, to aid
in your selection of access events.

13.10 Access Control Database Users Manual

Technical Manuals Online! - http://www.tech-man.com


Reports

Example: A TV is missing from the stockroom. You would


filter to select access events from 1/15 to 1/17. The report should
include entry card readers and all access granted events.

Filtered access events for the Missing TV report

To filter access events:

1. In the left pane, select the report you want to filter.


2. Click the Filter tab.
3. Click the Access Events tab.
4. Set the Start and End times.
• Click the down arrow and use the calendar to select a
date.
• Use the arrow keys to set the time.
5. Check the Exit and Entry check boxes to specify card
readers for your report.
6. Check the access event types you want to include in your
report.
7. Save the report record.

Filtering conditions
You can create complex selection and filtering criteria to further
refine your reports. The logical statements you create on the
Conditions tab limit the data included in the report.

Access Control Database Users Manual 13.11

Technical Manuals Online! - http://www.tech-man.com


Reports

Each statement is composed of brackets and conditions that limit


the data included in your report. You can use the brackets and
conditions to include or exclude data.
The filter begins with a bracket (the first bracket is provided for
you). The bracket reads Choose records where all of the
following apply. Each bracket can have one of four properties.
• All
• Any
• None
• Not all
Clicking the word all lets you select one of the four properties.
The bracket will apply to every condition added under it.
You can add a condition by clicking on the circle to the left of
the bracket. The condition is defined by clicking on the three
underlined parts of the condition.
You can continue to add as many conditions and brackets as
necessary.
Note: The following procedures are based on adding conditions
to a cardholder report. This is only one of several possible
scenarios for conditioning a report.

To filter conditions for a cardholder report:

1. In the left pane, select the report you want to filter.


2. Click the Filter tab.
3. Click the Conditions tab.
4. Select a property of the bracket by clicking all. Select all,
any, none, or not all.

5. Click the circle in front of the word Choose and select Add
Condition.

13.12 Access Control Database Users Manual

Technical Manuals Online! - http://www.tech-man.com


Reports

6. Click Actual Status (Actual Status is the default setting).


Select a condition from the list.

7. Click is equal to. Select the appropriate qualifier for the


condition.

8. Click the blank line at the end of the condition, and select
from the list or type the specific item of the condition.

Access Control Database Users Manual 13.13

Technical Manuals Online! - http://www.tech-man.com


Reports

If a list is provided, it is displayed (as shown below). If no


list is provided, a text box appears in which you can type
your specific item.

9. Click the circle in front of the numbered condition and


continue to add conditions or brackets as necessary.

This report includes all cardholders with the status equal to


Active. Additional conditions and brackets can be added or
deleted.

10. Save the report record.

13.14 Access Control Database Users Manual

Technical Manuals Online! - http://www.tech-man.com


Reports

Setting the styles for a custom report


Styling a report lets you create headings, group data, change
fonts, and change the print orientation of the report. After you
create a report, you can specify the style of the report. Styles can
only be set for custom reports. Styling a report includes:
• Headings
• Groups
• Fonts
• Orientation
The Style tab lets you customize the look and feel of your report.

Style tab for a custom report

Creating report headings


Report headings are the headings printed on each page of your
report. They include a main heading and a subordinate heading.
The main heading and subordinate heading can have up to 132
characters. The main and subordinate headings are displayed at
the top of the report.

Main and subordinate headings

Access Control Database Users Manual 13.15

Technical Manuals Online! - http://www.tech-man.com


Reports

To create a report heading:

1. In the left pane, select the report you want to style.


2. Click the Style tab.
3. In the Headings group, type the Main heading for the report.
4. Type the Subordinate heading for the report.
5. Save the report record.

Creating report groups


You can group report records so they total and break on a change
in the first or first and second fields. These fields must be sorted
(either ascending or descending) using the fields tab.

To group a report:

1. In the left pane, select the report you want to style.


2. Click the Style tab.
3. Under Groups, click either Group by first selected field or
Group by first and second selected fields.
4. If you would like a count of each group displayed, check the
Count records in each group check box.
5. Save the report record.

Setting report fonts


You can specify the fonts used in your report. Fonts can be
selected for the following sections:
• Main heading
• Subordinate heading
• Font of first group heading
• Font of second group heading
• Field heading font
• Field font

13.16 Access Control Database Users Manual

Technical Manuals Online! - http://www.tech-man.com


Reports

To select fonts:

1. In the left pane, select the report you want to style.


2. Click the Style tab.
3. Under Fonts, click the font button for the report component
you want to style. The font dialog box opens.
4. In the font dialog box, select the font.
5. Click OK.
6. Save the report record.

Setting report orientation


You can specify the orientation of your report. Orientation
determines how the report is displayed and printed. There are
two orientation options, portrait and landscape. If your report has
many columns, you can use the landscape option.

Portrait

Landscape

To orient a report:

1. In the left pane, select the report you want to style.


2. Click the Style tab.
3. Under Orientation, click Portrait or Landscape.
4. Save the report record.

Access Control Database Users Manual 13.17

Technical Manuals Online! - http://www.tech-man.com


Reports

Adding fields to a custom report


For a custom report, you specify which fields you want to
display in the report. On the Fields tab, you move each field into
your report one at a time. Once a field is moved into your report
it can be sized to make sure the text in the field is displayed
correctly. You can sort each field in ascending or descending
order.

Custom reports need to have fields added to the report

To add fields to a custom report:

1. In the left pane, select the report you want to add fields to.
2. Click the Fields tab.
3. Select the field you want to include in your report and click
the large right arrow to add the field. Fields must be selected
and added one at a time.
4. If you want to sort a field, select the field from the right pane
and click the sorting arrow. Select Not sorted, Ascending, or
Descending.
Note: Not Sorted is the default setting. The first item sorted
takes priority over any items that follow.

13.18 Access Control Database Users Manual

Technical Manuals Online! - http://www.tech-man.com


Reports

Example: For the TV example you would sort on the


Cardholder’s last name by clicking Ascending.
5. For each of your report fields, click and drag the column
width to the desired width in the Set Report Column Widths
box.
Note: This is the width of the column as it appears in your
report. You may have to adjust this after running and
viewing your report. If you want a column to be wider or
narrower, adjust it and then run the report again.
6. Save the report record.

Access Control Database Users Manual 13.19

Technical Manuals Online! - http://www.tech-man.com


Reports

Running a report
You can run a report at any time by clicking the Run Now
button.
For access event history reports, the ACDB prompts you to
select a source for the report data. You have two options, the
ACDB database, or your access control system hardware.
If you click Assemble report from database, the report uses the
data that is in the ACDB. This includes any data that has been
collected by AC History type tasks. See Chapter 6: Tasks for
more information.
If you click Collect from hardware, the report uses the data from
each CRC you have specified. This report gives the most current
information from your access control system. The data collected
from the hardware is stored in the database for later reports.

An access event report uses data from the database or the


hardware of the access control system

If you are running a report type other than access event history,
the report will run as soon as you click Run Now. As the report
is running, its status can be viewed on the Status tab.
Once all the information for the report is gathered, the ACDB
displays a preview of the report. From the preview window the
report can be reviewed, saved, and printed. All reports are stored
and can be viewed from the Reports Status tab.

To run a report:

1. In the left pane of the Report tab, select the report you want
to run.
2. Click the Run Now button.

13.20 Access Control Database Users Manual

Technical Manuals Online! - http://www.tech-man.com


Reports

3. For access event history reports select a data source by


clicking Assemble reports form database or (Re-) Collect
from hardware.
The ACDB displays the report for you.

Access Control Database Users Manual 13.21

Technical Manuals Online! - http://www.tech-man.com


Reports

Viewing and printing a report


Each report that you run is saved in the ACDB, and listed on the
Status > Finished Reports tab. This lets you review and print
previously requested reports. The window displays all requests
for the report. You can view these reports at any time. The
display for each report shows the name of the report, date and
time requested, status, status description, report ID, and request
ID.

Report window showing two previously requested reports

To view and print a report:

View button 1. In the left pane, select the report you want to view.
2. Click the Status tab.
Delete button
3. Click the Finished Reports tab.
4. From the Finished Reports table, select the report you want
to view.
5. Click the View button.
6. From the Preview window click the Print button.
7. Click the Close button.

Deleting a previously requested report


You can also delete a requested report by following the same
steps as viewing a report and clicking the Delete button instead
of the View button.

13.22 Access Control Database Users Manual

Technical Manuals Online! - http://www.tech-man.com


Reports

To delete a previously requested report:

1. In the left pane, select the report.


2. Click the Status tab.
3. Click the Finished Reports tab.
4. From the Finished Reports table, select the report you want
to delete.
5. Click the Delete button.

Access Control Database Users Manual 13.23

Technical Manuals Online! - http://www.tech-man.com


Reports

Editing and deleting a report


Editing a report
Reports can be edited as needed. If a report needs a lot of
editing, it may be easier to delete the report and create a new
one.

To edit a report:

1. Click the Report tab.


2. In the left pane, select the report you want to edit.
3. Edit the report.
4. Save the report record.

Deleting a report
You can delete a Report at any time. It may be easier to edit the
report into a new report rather than delete it and start over.

To delete a report:

1. Click the Report tab.

Tip: Press Alt + F, D to


2. Select the report you want to delete.
delete the report. 3. From the File menu click Delete or click the Delete button
on the toolbar.
4. Click Yes to delete.

13.24 Access Control Database Users Manual

Technical Manuals Online! - http://www.tech-man.com


Y
Glossary

3-SAC See Security Access Control module.


access card Any of the different types of credential that can be used in an
access control system. We use card as a general term to refer
to proximity, Wiegand pin, magnetic stripe, and smart cards.
access control The control of persons through entrances and exits of a
controlled area.
Access Control Database ACDB. Lets the user create and maintain a database of
program information about CRCs, cardholders, schedules, and access
levels. The ACDB runs on the user's PC and transmits
database changes by dial-up or direct connection.
access control system Part of an integrated system intended to control access through
the site doors, and thereby control access to the site.
access level A predefined set of access or security rights and privileges for
use in an electronic access control system.
ACDB See Access Control Database program.
activate To turn on or make active.
AHJ Authority having jurisdiction.
alarm The state of a fire alarm or security alarm device that has
detected a fire or burglary condition.
anti-passback An access control application that prevents successive use of
the same card to pass through a door in the same direction.
Anti-passback prevents a card from being passed back to
another person for the purpose of gaining unauthorized access.
arm Arming a partition means advising the system to monitor the
devices for burglar alarm events. Conversely, when you disarm
a partition, you are advising the system to stop monitoring for
burglar alarm events.
Note that all other types of event are monitored continuously,
so as to maintain the integrity of the security system.
Security systems distinguish two types of arming: arm stay and
arm away.
armed away Security systems distinguish two types of arming: arm stay and
arm away. Arming away causes the system to monitor all
devices in the partition, both perimeter and interior.
armed stay Security systems distinguish two types of arming: arm stay and
arm away. Arming stay causes the system to monitor the
perimeter devices (door and window opening detectors) but to
ignore the interior detectors (motion detectors).
away See armed away.

Access Control Database User Manual Y.1

Technical Manuals Online! - http://www.tech-man.com


Glossary

badging (in or out) A general term for the process whereby a cardholder presents
credentials to a reader in order to request access into or out of
a controlled area.
bypass Devices can be bypassed or disabled. When a device is
bypassed, the system ignores its alarm events, but continues to
monitor other events. When a device is disabled, the system
ignores all event messages from the device.
bypass time The bypass time is the number of seconds (0 to 255) that the
CRC suppresses audible annunciation and alarm notification.
card reader Any of the different types of credential reader supported by the
CRC. We use card reader as a general term to refer to
proximity, Wiegand pin, magnetic stripe, and smart card
readers, as well as readers equipped with a keypad.
Card Reader Controller CRC. A module that performs card access processing
module (CRC) decisions for a door, and grants or denies access to a
cardholder. Each CRC stores a complete database and is
capable of granting or denying access without external
communication.
cardholder A general term used to refer to any user of an access control
system issued with a valid access card (or other access
credentials). This also refers to users of a security system.
central monitoring station CMS. A station to which alarm and supervisory signaling
devices at the site transmit event messages. The central
monitoring station is staffed continuously to monitor, record,
and investigate alarm or trouble signals.
Central Processor module CPU. The primary processing module for an EST3 control
panel.
CMS See central monitoring station.
command list A predefined event that can be used to trigger execution of
SDU rules The CRC can be programmed to transmit these to
the control panel in response to certain access events.
Command lists are typically used to trigger transmission of
access event messages to a CMS, or to trigger activation of
remote gates, CCTV, or relay modules.
common door An access control application where a given door is used by
several different companies, as in the main entrance of an
office building.
company General term for a group of end-users who use the access
control or security system at the project site. Projects can
include one or more companies. Generally, the resources of
dedicated security and access control devices are controlled by
a single company. Several companies may share the resources
of common devices.
construction card Special access cards that will work with any CRC prior to a
database being downloaded.
construction mode Before a database is downloaded to a CRC it is in construction
mode. Building contractors can use specially coded

Y.2 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Glossary

construction cards for access and for testing.


control panel An electronics cabinet housing the 3-CPU1, 3-LCD, and related
modules, acting as the central controlling point for an integrated
system, or as one control node of a networked, integrated
system.
CPU See Central Processor module.
CR Card reader.
CRC See Card Reader Controller module.
CRCXM See Card Reader Controller module. This option of the CRC
has extended memory and holds a larger database.
database A file composed of records, each containing fields, together
with a set of operations for searching, sorting, recombining, and
other functions. In this manual, database often refers to the
access control database that is created by the ACDB and
downloaded through the control panel to individual CRCs.
degraded mode A mode of operation used when a module has lost
communication with its supporting system. The CRC can
operate when communication with the control panel is
disrupted, providing enhanced survivability.
delayed egress An access control application intended to control shoplifting at
retail sites. A delayed egress door is fitted with card readers
and a request to exit (REX) button. Employees can badge in
and out as at any other door. In an emergency, customers can
press the REX to unlock the door. Pressing the REX generates
a security alarm but does not unlock the door immediately.
delayed egress timer The delayed egress time defines the number of seconds that
egress is delayed when a Request to Exit button with delayed
egress is pressed.
device Any detector or module. Devices are electronic sensing units
that monitor an area for unwanted conditions and report those
conditions to the system control panel. Devices are also
referred to as points.
Typical fire alarm devices are heat detectors, smoke detectors,
and pull stations. Security devices include door status sensors,
motion detectors, and broken glass detectors.
device address A number which uniquely identifies a detector or module in an
integrated system.
disable Devices can be bypassed or disabled. When a device is
bypassed, the system ignores its alarm events, but continues to
monitor other events. When a device is disabled, the system
ignores all event messages from the device.
disarm Arming a partition means advising the system to monitor the
devices for burglar alarm events. Conversely, when you disarm
a partition, you are advising the system to stop monitoring for
burglar alarm events.
Note that all other types of event are monitored continuously,
so as to maintain the integrity of the security system.

Access Control Database User Manual Y.3

Technical Manuals Online! - http://www.tech-man.com


Glossary

door ajar timer The door ajar timer is the number of seconds that an access
door can be left open before a signal is sent to the fire alarm
system. If the door is left ajar past the door ajar time, the local
sounder in the CRC (if installed) sounds for one second every
minute. This is a security feature, ensuring that doors are not
propped open and left for an extended time.
door contact A switch that monitors the position (open or closed) of the door.
download Sending a compiled project database from a PC to the fire
alarm control panel. Also, sending an access control database
from a PC to the CRC devices via the control panel.
elevator control An access control application that determines which floors are
available to a given cardholder.
emergency exit door An access control application where an exit door can be
unlocked from the inside by badging out or by mechanical
means. If the door is opened without badging out, it causes an
immediate security alarm.
emergency exit sounder timer The emergency exit sounder timer is the number of seconds (0
to 255) the CRC sounder sounds when an emergency exit door
is violated without badging out or using a request to exit device
(without bypass).
enable Permit an input, output, or system feature to function. Also, to
instruct the system to monitor event messages from a device.
See also disable.
FireWorks A computerized display and control system used with EST2,
EST3, FCC, and IRC-3 fire networks. FireWorks uses one or
more display computers to monitor and control several
networks of multiplex signaling systems, card access systems,
and CCTV systems.
handicap access door An access control application for a door that provides
mechanical assistance and extended access time for a
handicapped cardholder.
Handicap unlock timer The handicap unlock time is the number of seconds that the
door stays open before relocking, when a cardholder
designated as handicapped badges in.
holiday An exception to the normal way of operating an access control
system.
holiday schedule Exceptions to normal schedules, when different access times
are desired.
input circuit Each CRC has two input circuits for use with access control
and security devices. These are typically used for a door
position sensor and a request to exit device. The input circuits
can also be used as security input points.
integrated system A panel-based system that can integrate fire alarm, security,
and access control functions.
integrated system Installer Typically an employee of the company that installed the access
control system.

Y.4 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Glossary

irregular entry Entry into a building outside the cardholders normal access
time.
keypad Some card readers are equipped with a keypad to allow entry
of a PIN number in addition to the access card. We do not use
the term keypad to refer to the KPDISP Keypad Display
module.
Keypad Display module KPDISP. A control and display module used in security and life
safety applications. The KPDISP includes an LCD display, a
telephone-style keypad, a variable-tone sounder, and an
internal processor. It is most typically used to arm and disarm
security partitions.
KPDISP See Keypad Display module.
KPDISP password A password that allows cardholders access to the KPDISP. It
contains seven digits, the last three digits of the cardholder’s
access card and a four digit PIN number.
LED Light emitting diode.
lock Any type of door securing device. We use lock as a general
term to refer to both strikes and maglocks.
maglock Magnetic lock. A type of lock that secures the door (holds it
shut) when power is applied.
magnetic stripe card A type of access card having a data encoded magnetic tape or
stripe on one side.
manual open timer The manual open time is the number of seconds that the
auxiliary relay stays active, when an open command is received
from the fire alarm system, Fireworks, or from a local ADA
request to open device.
manual unlock timer The manual unlock timer is the number of seconds that the
door stays open before relocking, when an unlock command is
received from the fire alarm system, Fireworks, or a local
request to exit device.
MODCOM See Modem Communication module.
Modem Communication MODCOM. An communication module with modem and dialer
module capabilities. The MODCOM can be used to download
information from remote sites or to report events to a central
monitoring station. The MODCOMP can communicate to
telephone pagers using TAP protocol.
muster An access control application that lets users determine who has
exited a controlled area in the event of an emergency
evacuation.
muster report station A PC located in a secure area, outside the controlled area,
equipped with the ACDB program. Security staff use this PC to
create a muster report after an emergency evacuation.
muster station A CRC located outside the controlled area at which cardholders
badge out after an emergency evacuation.
NFPA 72 National Fire Alarm Code.

Access Control Database User Manual Y.5

Technical Manuals Online! - http://www.tech-man.com


Glossary

normal Devices can be in different states. States are classified as


normal or off-normal.
When a smoke detector is operating perfectly and there is no
smoke in the area, the device is said to be in a normal state.
If smoke is detected the device goes into an alarm state. If the
device is damaged, it goes into a trouble state. Both alarm and
trouble are off-normal states.
off-normal See normal.
open schedule A type of access control schedule, defined with the ACDB, that
specifies times when a door is unlocked. For example, access
to a building lobby may be determined with an open schedule.
When the open schedule is active, the lobby door is unlocked.
operators Users of the ACDB software. Operators are controlled by
privileges that allow them enter and edit certain areas of the
ACDB.
outbound port An outbound port specifies the computer and port you are
transmitting from.
output circuit The CRC includes common, NO, and NC outputs from a Form
C relay. These can be used to control auxiliary devices such as
fans and dampers, as well as devices that support handicap
functions.
partition A physical area that a security system protects with a group of
related devices. A site may consist of a single partition or of
multiple partitions. Partitions can be armed and disarmed
independently.
PIN schedule A type of access control schedule that defines when a PIN must
be entered to verify the badging-in operation and grant access
proximity card A type of access card containing a microcircuit. When placed in
close proximity to a card reader, the card activates the reader's
circuitry and registers a unique code.
Relay open timer The relay open timer is the number of seconds that the auxiliary
relay timer stays active, when a user who is designated as
handicapped badges in.
Resource Profile RP. A file that defines the system security and access control
devices for the ACDB program.
Resource Profile Manager tool RPM. Part of the SDU that uses the project database to create
a separate resource profile for each company that uses the
access control system.
REX Request to exit button.
route Routes define how the ACDB connects to the hardware of your
access control system. There are two different types of route:
modem connection and direct connection (RS-232).
RP See Resource Profile
RPM See Resource Profile Manager tool.
RS-232 An asynchronous communication format used to communicate

Y.6 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Glossary

between a PC and a control panel.


RS-485 A serial differential communications format used to
communicate between the panel and some remote
annunciators
Rule A logical relationship between objects defined in the network’s
object list. Rule format: [rule label] (input state) (input device
type) ‘input label’ : Output command (output device type)
(priority) ‘output label’ {comments};
schedule Identifies specific times (in 15 minute increments) and days
when access is granted.
SDU See System Definition Utility.
Security Access Control 3-SAC. An EST3 module that supports an RS-485 line for
module security and access control devices.
security alarm When a security device goes into alarm, it generates a security
alarm event. This triggers programmed responses from the
system control panel, and may result in a message being sent
to a central monitoring station or a telephone pager. The end
result will be the dispatch of a police or security officer to
investigate the problem.
security partition See partition.
security system Part of an integrated system intended to monitor and report
unauthorized access to specific areas of the site, thereby
preventing vandalism and burglary.
security trouble When a security device goes into trouble it generates a security
trouble event. This triggers programmed responses from the
system control panel, and may result in a message being sent
to a central monitoring station or a telephone pager. The end
result will be the dispatch of maintenance personnel to
investigate and resolve the problem.
standard unlock timer The standard unlock time is the number of seconds that the
door stays open before relocking, when a user badges in.
stay See armed stay.
strike A type of lock. A strike unlocks the door when power is applied.
suppression schedule A type of access control schedule that defines times when the
CRC does not log normal events. This reduces the number of
events that would otherwise be stored in the CRC during
normal business hours.
System Definition Utility A Windows based program used to enter and modify
information contained in the EST3 system.
task Tasks are used by the ACDB to update hardware, purge old
data from the database, retrieve access history for reports, and
automate the running of reports.
timeline Used in a schedule to define the time when access is granted
and when access is denied.
two-person rule An access control application that ensures that no staff member
can be in the controlled area alone. A CRC operating under

Access Control Database User Manual Y.7

Technical Manuals Online! - http://www.tech-man.com


Glossary

two-person rule prevents the entrance of a single person into


the controlled area. When two people are present in the area,
one cannot exit without the other.
unlock schedule Define times when a door is unlocked to allow free access.
visitor and escort An access control application where a visitor is issued a
temporary access card. Access to specific doors is granted only
when an employee (escort) with a permanent access card
badges in with the visitor. This application may make use of
multiple card readers to handle different types of visitor and
employee access card.
Wiegand pin card A type of access card embedded with encoded ferromagnetic
wires.
zone A physical area that a fire alarm system protects with a group of
related devices. A site usually consists of two or more zones.

Y.8 Access Control Database User Manual

Technical Manuals Online! - http://www.tech-man.com


Z
Index

3 ACDB (Access Control Database)


start screen • 2.2
3-CPU default routes • 7.4 ACDB-CLNT • 1.5, 1.6
3-SAC • 4.8 ACDB-SVR • 1.5, 1.6
Action menu • 2.21
A Action Send Changes command • 2.21
Activate Holiday button • 9.7
About command (Help menu) • 2.23 Activate Operator button • 5.11
About option (start screen) • 2.3 Activate Task Scheduling button • 6.12
AC (access control) history requests • 6.5, 13.3 activating
access cardholders • 11.16
colors • See General tab (Preferences) holidays • 9.7
control systems • 1.9 operators • 5.11
event history reports • 13.7 task schedules • 6.12
event reports • 13.2. See also AC (access control) activation dates • 11.6
history requests; Tasks tab active holidays • 9.2
granted irregular history events • 10.16 active state • 10.5
privileges • 1.12 Active? filter • 11.18
special • 1.14 Add Access Level Command List button • 10.4
times • 1.11 Add Access Level Command List command • 2.22
Access Events command • 2.22 Add Access Level Schedule button • 10.4
access level Add Access Level Schedule command • 2.22
command buttons • 10.4 adding
command lists • 10.13 custom card formats • 12.2
filter • 11.18 custom colors • 8.8
names • 11.6 facility codes • 12.4
properties • 11.5 fields to custom reports • 13.18
reports • 13.5 personal information • 11.8
reports • 13.7 photographs to cardholder records • 11.13
states • 10.5 photographs to operator records • 5.5
tab buttons • 10.4 security to card readers • See schedules under
toolbar • 10.3 PIN (Personal ID Number)
tree icons • 10.2 Address filter • 11.19
view buttons • 10.3 ADMIN1 • 2.6, 5.2
access levels Administration command • 2.21
collapsing • 10.8 Administration tab • 2.26
creating • 10.6 Administration tab (Privileges) • 5.8
defined • 1.11, 10.2 Administrator button • 5.8
deleting • 10.22 administrators • 1.15, 5.2
expanding • 10.8 Alarm Silence privilege • 10.20
naming • 11.6 alphabetical queries • See filtering cardholder
rotating • 11.6 information
Access Levels command • 2.21 Alternate Day Off Rule group • 9.3
Access Levels tab • 2.25, 10.2 alternative day off
accounts, CMS (Central Monitoring Station) • 12.13 calendars • 9.3
ACDB (Access Control Database) rules • 1.11
building blocks • 1.11 Arm Away privilege • 10.18
description • 1.9 Arm Stay privilege • 10.18
features • 1.8 arrows, navigation • 3.7
import field assignments • 12.20 assigning
interface overview • 2.19 CMS user IDs • 12.11
interface tabs • 2.25 command lists • 10.13
interface window • 2.19 default card formats and facility codes • See
Login dialog box • 2.13, 5.2 Default tab
network diagram • 1.6 different command lists • 10.14
network version • 1.5, 1.6 different schedules • 10.11
software versions • 1.3 disability privileges • See disabilities, cardholder
import fields to the ACDB database • 12.20

Access Control Database Users Manual Z.1

Technical Manuals Online! - http://www.tech-man.com


Index

assigning buttons
new routes • 7.10 Start Now • 6.7
operator privileges • 5.9 Toggle Selection of Eligible Tree Nodes • 2.24
privileges • See Access Levels tab toolbar • 2.23
schedules • 10.10 Undo • 2.23
tasks to CRCs and KPDISPs • 6.10 Bypass privilege • 10.19
associating tasks with reports • 6.11 Bypass time • 4.16
attaching
command lists to access levels • See Add Access
Level Command List command
C
schedules to access levels • See Add Access calendars • 9.3
Level Schedule command canceling data entry mistakes • See Undo command
automatic logout settings • See General tab captions, startup screen • 3.2
(Preferences) card
automating ID numbers • 11.4
data retrieval for reports • 13.3. See also information • 11.4
associating tasks with reports number ranges • 11.4
system updates • See system updates types • 1.10
Card Code Format Editor • 12.3
B card code formats • 3.6, 12.2
Card Code Formats tab • 3.6
backing up your system • 3.14 Card ID filter • 11.18
Badge button • 12.14 CardHolder Import dialog box • 12.23
badging • 12.14 cardholder re-initialization • 6.6
Baud Rate field • 7.4 cardholder reports • 13.5, 13.7
Boolean filters • See brackets and conditions cardholders
brackets and conditions • 13.12 defined • 11.2
branches, access level • 10.8 deleting • 11.20
Browse Only button • 5.8 editing • 11.20
building blocks, ACDB • 1.11 filtering • 11.18
buildings, company • 4.5 introduced • 1.13, 1.15
Bus. Phone field • See Information tab sorting and searching • See cardholder information
buttons under filtering
access level tab • 10.4 CardHolders command • 2.21
Activate Holiday • 9.7 CardHolders tab • 2.25, 11.3
Activate Operator • 5.11 categorizing specific data • See reports under filtering
Activate Task Scheduling • 6.12 caution, reduced security • 10.19
Administrator • 5.8 changing
Browse Only • 5.8 EPISUITE database software • 12.15
Collapse Branch • 2.24 installer passwords • 2.5
Collapse Tree • 2.24 multiple items simultaneously • 3.10
Copy • 2.24 operator information • 5.17
Cut • 2.23 operators • 5.13
Deactivate Operator • 5.11 passwords • 5.14. See also Operator tab
Delete • 2.23 (Preferences for Operator ADMIN1 and
Deselect all records • 2.24, 3.10 Options)
Deselect All Tree View Nodes • 2.24 checking operator status • See operators under
Deselect current record • 2.24, 3.10 activating
Discard All Changes • 2.23 Christmas • See definition under holiday
Expand Branch • 2.24 City filter • 11.19
Expand Tree • 2.24 clearing cardholder photographs • 11.15
Grant All • 5.8 CMS (Central Monitoring Station) user IDs • 12.11,
Help Contents • 2.24 12.12
Message Center • 2.24 codes, facility • 12.4
New • 2.23 Collapse Branch button • 2.24
Operator • 5.8 Collapse Branch command • 2.21
Other Companies With Access • 4.10, 4.19 Collapse Tree button • 2.24
Paste • 2.24 Collapse Tree command • 2.21
Print Preview • 2.23 collapsing access levels • 10.8. See also Collapse
Redo • 2.23 Branch command; Collapse Tree command
Reissue • 2.24 Color dialog box • 8.8
Re-synchronize with Server • 2.24 colors • 8.8
Revoke All • 5.8 column widths, report • 13.19
Run Now • 13.20 command
Save • 2.23 lists • 1.13, 10.13
Select all records • 2.24, 3.10 privileges • 1.12
Select current record • 2.24, 3.10 Command Lists tab • 4.20
Send Changes to Access Equipment • 2.24

Z.2 Access Control Database Users Manual

Technical Manuals Online! - http://www.tech-man.com


Index

commands configuring
About • 2.23 doors • 4.9
Access Events • 2.22 hardware • See Hardware View tab
Access Levels • 2.21 site information • See Company View tab
Action Send Changes • 2.21 system hardware • See new routes under
Add Access Level Command List • 2.22 assigning
Add Access Level Schedule • 2.22 system sites • See new routes under assigning
Administration • 2.21 time ranges for AC history tasks • 6.8
CardHolders • 2.21 Confirmations tab • 3.4
Collapse Branch • 2.21 construction cards • 11.4
Collapse Tree • 2.21 Contents, Index command • 2.23
Contents, Index • 2.23 controlling access privileges • See Set Access Level
Copy • 2.20 Privilege command
Cut • 2.20 converter, Cypress • 12.9
Database • 2.22 Copy button • 2.24
Delete • 2.20 Copy command • 2.20
Delete Access Level Command List • 2.22 copying from one timeline to another • 8.5
Delete Access Level Schedule • 2.22 CPU (Central Processor Unit) • 4.8
Deselect All Records • 2.21, 3.10 CRC (Card Reader Controller)
Deselect All TreeView Nodes • 2.21 functions • 1.9
Deselect Current Record • 2.21, 3.10 new route assignments • 7.10
Discard All Changes • 2.20 privileges • 1.12
Exit • 2.20 schedules • 1.12
Expand Branch • 2.21 task assignments • 6.10
Expand Tree • 2.21 creating
Holidays • 2.21 access levels • 10.6. See also Access Levels tab
Import • 2.20 cardholders • 11.3
Login • 2.21 connection strings • 12.18
Message Center • 2.22 holidays • 9.3
New • 2.20 identification cards • See badging
Options • 2.22 import definitions • 12.17
Paste • 2.21 new card formats • 12.3
Photo • 2.22 new card formats and facility codes • 12.8
Presence • 2.22 new files • See New command
Print • 2.20 new operator records • 5.3
Print Preview • 2.20 outbound ports • 7.6
Printer Setup • 2.20 report groups • 13.16
Redo • 2.20 report headings • 13.15
Reissue Card • 2.22 reports • 13.7
Reports • 2.21 routes • 7.7. See also Hardware View tab
Reset Access Level Privilege • 2.22 schedules • 8.4. See also Schedules tab
Resource Usage • 2.23 tasks • 6.5
Resync with Server • 2.21 cropping photographs • 5.6, 11.14
Save • 2.20 customizing
Schedules • 2.21 ACDB features • See Administration tab;
Select All Records • 2.21, 3.10 Preferences tab
Select Current Record • 2.21, 3.10 applications and requirements • See UDF Labels
Set Access Level Privilege • 2.22 tab
Set Network Server • 2.22 card code formats • See card code formats
Toggle All Selections • 2.21 default reports • 13.5
Troubles Display • 2.22 Cut button • 2.23
Undo • 2.20 Cut command • 2.20
communication Cypress
errors • See yellow X symbols converter • 12.9
routes • 4.10, 4.19 interface • 11.5
Company Information tab • 3.5
company view icons • 4.3
Company View tab • 4.2, 4.3, 7.10
D
conducting a filtered query • See cardholder information Daily AC Events task • 6.4
under filtering Daily Updates task • 6.4
Configure Card Reader dialog box • 12.9 Data Link Properties dialog box • 12.18, 12.19
configuring database
alternative routes • 7.9 maintenance • 6.2, 6.5
auxiliary card reader inputs • 12.9. See also reports • 13.2. See also running reports
Default tab Database command • 2.22
default routes • 7.8 Database Import Utility • 12.21
door options • 4.11 Database Maintenance task • 6.4
door timers • 4.13 date displays • See General tab (Preferences)

Access Control Database Users Manual Z.3

Technical Manuals Online! - http://www.tech-man.com


Index

Deactivate Operator button • 5.11 Deselect All Tree View Nodes button • 2.24
deactivating Deselect All TreeView Nodes command • 2.21
cardholders • 11.16. See also expiration date; lost Deselect current record button • 2.24
cards Deselect Current Record command • 2.21
holidays • 9.7 deselecting CRCs • See Toggle All Selections
operators • 5.11 command
task schedules • 6.12 Destination DB Init task • 6.4
Default tab • 3.5 determining operator logon status • See Status bar
defaults Diagnostic tab • 3.5
3-CPU • 7.4 dialog boxes
activation date • 11.6 CardHolder Import • 12.23
administrator operator ID • 5.2 Color • 8.8
card format • 12.6 Configure Card Reader • 12.9
facility code • 12.6 Data Link Properties • 12.18, 12.19
holiday • 9.2 Edit Photo • 5.5, 11.13
MODCOM route • 7.4 Import Resource Profile Manager (RPM) file • 2.7
operator ID • 2.6 Import Source Properties • 12.18, 12.20
operator privilege • 5.8 Modify Password • 5.14
password • 5.4 Options • 13.4, 13.20
photograph size • 5.5, 11.13 Preferences for Operator ADMIN1 and Options •
report • 13.5 3.3, 5.17
route • 7.4, 7.9 Set Photo Import Properties • 12.21, 12.22
schedule • 8.2 disabilities, cardholder • 11.4
sorting • 13.18 Disability filter • 11.19
task • 6.4 Disable privilege, Fire Alarm • 10.20
timeline color • 8.8 disabling fire alarms • See fire alarm privileges, KPDISP
timer • 4.14, 4.15 Disarm privilege • 10.16, 10.19
defining Discard All Changes button • 2.23
custom labels • See UDF Labels tab Discard All Changes command • 2.20
custom tabs • See UD Cardholder Tab Labels tab displaying current data • See Resync with Server
data for import • See import definitions under command
creating door
timeline colors • 8.8 option schedules • 8.3
Delayed Egress timer • 4.15 timers • 4.13, 4.14, 4.15, 4.16
Delete Access Level Command List button • 10.4 Door Ajar timer • 4.15
Delete Access Level Command List command • 2.22 downloading information • 3.12
Delete Access Level Schedule button • 10.4
Delete Access Level Schedule command • 2.22
Delete button • 2.23
E
Delete command • 2.20 Edit menu • 2.20
deleted state • 10.5 Edit Photo dialog box • 5.5, 11.13
deleting editing
access levels • 10.22 cardholder information • See CardHolders tab
actions by series • See Discard All Changes cardholders • 11.20
command company information • 4.3
cardholder photographs • See clearing cardholder databases without RP files • See sample RP files
photographs under importing
cardholders • 11.20 holidays • 9.9
CMS accounts • 12.13 operator records • 5.16
companies • 2.18 outbound ports • 7.12
holidays • 9.9 reports • 13.24
operator records • 5.16 routes • 7.13
outbound ports • 7.12 schedules • 8.7
photographs • 5.7 tasks • 6.15
previously requested reports • 13.22 Emergency Exit Sounder timer • 4.15
reports • 13.24 ending an ACDB session • See exiting the ACDB
routes • 7.13 entering new facility codes • 12.5
RP files • 2.17, 2.18 EPISUITE software • 12.14, 12.15
sample RP files • 2.12 event history reports • 13.5
schedules • 8.7 events, access granted irregular history • 10.16
SDU project • 2.17 exchanging network information between operators •
SDU projects • 2.11 See Message Center command
tasks • 6.15 Exit command • 2.20
denying operator access • See operators under Exit option • 2.3
deactivating exiting the ACDB • 3.16
Derived Card Number filter • 11.18 Expand Branch button • 2.24
Deselect all records button • 2.24 Expand Branch command • 2.21
Deselect All Records command • 2.21 Expand Tree button • 2.24

Z.4 Access Control Database Users Manual

Technical Manuals Online! - http://www.tech-man.com


Index

Expand Tree command • 2.21 handling cardholder/operator photographs • See Photo


expanding access levels • 10.8. See also Expand command
Branch command; Expand Tree command hardware
expiration dates • 11.6 initialization • 6.2, 6.5
exporting reports • See running reports
additional fields to EPISUITE • 12.15. See also view icons • 4.7
UDF Labels tab hardware configuration initialization • 6.6
cardholder photographs • 5.6, 11.14 Hardware View tab • 4.2, 4.7, 7.10
cardholders • 12.14 HASP key • 1.3, 1.4, 1.6
Extension field • See Information tab heading styles • 13.15
Extra # tabs • See UD CardHolder Tab Labels tab Help Contents button • 2.24
Help menu • 2.23
Help option • 2.3
F HID prox cards • 11.4
facility codes • 11.4, 12.4 holiday
Facility Codes tab (Preferences for Operator ADMIN1 definition • 9.2
and Options) • 3.6, 12.5 schedules • 8.3. See also schedules under
Fields tab • 13.5, 13.18 creating
File menu • 2.20 timelines • 8.3, 9.2
filtering weekends • 1.11
access events • 13.10 holidays
cardholder information • 11.18 activating • 9.7
conditions • 13.11 creating • 9.3
doors • 13.9 deactivating • 9.7
reports • 13.9 editing • 9.9
finding sorting • 9.6
current status • See Status bar Holidays command • 2.21
installer contact information • 2.8 Holidays tab • 2.25, 9.4
fire alarm privileges, KPDISP • 1.12, 4.18, 10.20 how to… • See under procedures
fixed-date holidays • 9.3
fonts, configurable report • 13.16 I
formats
card code • 3.6, 12.2 icons
cardholder • 11.4 access level tree • 10.2
Wiegand-compatible • 12.2 company view • 4.3
formatting hardware view • 4.7
card IDs • 12.3 identifying the ACDB software version • See About
facility codes • 12.4 option (start screen)
photographs for import • 12.21 Import command • 2.20
frequencies, task • See scheduling tasks import problems • 12.23
Friday off rule • 9.3 Import Resource Profile Manager (RPM) file dialog box
functions, task • 6.2 • 2.7
Import Source Properties dialog box • 12.18, 12.20
importing
G cardholder data • 12.22
gathering cardholder photographs • 11.13
access control events • See Tasks tab cardholders from external databases • 12.17
data for reports • 6.2 new SDU projects • 2.15
General tab (Company Information) • 3.5 photographs • 5.5
General tab (Preferences) • 3.4 real RP files into sample RP files • 2.11
generating reports • See Reports tab RP files • 2.6
getting sample RP files • 2.9
more information from the status bar • 2.28 SDU project modifications • See modifications,
online help • 2.3. See also Contents, Index SDU project
command updated RP files into existing companies • 2.14
reader trouble summaries • See Status bar improving ACDB performance • See setting up your
Grant All button • 5.8 system under procedures
graphic file types, importable • 11.13 In Process tab • 6.13
grouping inactive
cardholder fields • See UD CardHolder Tab Labels holidays • 9.2
tab state • 10.5
similar report items • See report groups under Independence Day • See definition under holiday
creating Information tab • 5.3
initial installer passwords • 2.4
initializing system hardware • 6.5
H installer contact information • 2.8
Handicap Unlock timer • 4.14 interface overview • 2.19
Irregular Entry privilege • 10.16

Access Control Database Users Manual Z.5

Technical Manuals Online! - http://www.tech-man.com


Index

issuing new cards • 11.22 lost cards • 11.21

J M
Job Title field • See Information tab main headings • 13.15
maintenance, database • 6.5. See also setting
properties for DB maintenance tasks under
K procedures
keyboard shortcuts managing lost cards • 11.21
clearing photographs • 5.7, 11.15 Manual Open timer • 4.14
collapsing trees and branches • 10.8 Manual Unlock timer • 4.14
creating new access levels • 10.7 Maximum Message Length field • 7.4
creating new cardholders • 11.7 Maximum Retries field • 7.4
creating new holidays • 9.4 Memorial Day • See definition under holiday
creating new operators • 5.4 Menu bar • 2.20
creating new outbound ports • 7.6 menus
creating new reports • 13.8 Action • 2.21
creating new routes • 7.7 Edit • 2.20
creating new tasks • 6.6 File • 2.20
deleting access levels • 10.22 Help • 2.23
deleting cardholders • 11.20 Reports • 2.22
deleting operators • 5.16 Tools • 2.22
deleting reports • 13.24 View • 2.21
deleting schedules • 8.7 Message Center button • 2.24
deleting tasks • 6.15 Message Center command • 2.22
expanding trees and branches • 10.8 middle pane description • 2.26
exporting photographs • 5.6, 11.14 minimum system requirements • 1.4
finding • 2.20 miscellaneous door information • 4.16
launching the Edit Photo dialog box • 5.6, 11.14 MODCOM
launching the Options dialog box • 2.5, 5.17, default routes • 7.4
11.11, 12.3 route assignments • 7.10
launching the RPM Import dialog box • 2.10 user ID translation reports • 13.5, 13.7
logging off • 5.13 modem routes • 7.3
saving information • 3.9 modifications, SDU project • 2.14
selecting multiple holidays • 9.9 Modify Password dialog box • 5.14
selecting multiple outbound ports • 7.12 modifying
selecting multiple routes • 7.13 CMS user IDs • 12.12
selecting records • 3.11 default routes • 7.9
KPDISP (Keypad Display) Monday through Sunday schedules • 8.2. See also
applications • 4.18 Monday workweeks; Sunday workweeks
fire alarm privileges • 1.12, 4.18, 10.20 Monday workweeks • 9.4
functions • 1.9 monitoring
new route assignments • 7.10 employee attendance • See data retrieval for
password • 11.5 reports under automating
PINs (personal ID numbers) • 11.5 personnel on location • See presence requests
security privileges • 1.12, 4.18, 10.18 Monthly AC Events task • 6.4
task assignments • 6.10 moving
databases to new PCs • 3.15
text to and from the clipboard • See Edit menu
L multiple
labels, UDF (User-Defined Field) • 11.11 record selections • 3.10, 3.11
Labor Day • See definition under holiday sites and RP files • 4.5. See also RP file imports
landscape orientation • 13.17 muster reports • 13.5, 13.8
Language field • See Information tab
Last Login and Last Logout display • 5.4 N
Last Name filter • 11.18
left pane description • 2.26 Name field • 5.3
letter tabs • 3.7, 11.18 names, cardholder • 11.3
Level Name field (access level groups) • 11.6 navigation arrows • 3.7
levels, access • 1.11 network, ACDB
limits, system • See miscellaneous door information diagram • 1.6
lists, command • 4.20 versions • 1.5
Location field • See Information tab New button • 2.23
Log In option • 2.3 New command • 2.20
logging on after RP file imports • 2.13 New Year • See definition under holiday
logging on as a new operator • 5.13 No alternate day off rule • 9.3
logging on as an installer • 2.4 No day off rule • 9.3
Login command • 2.21 No Expiry filter • 11.19

Z.6 Access Control Database Users Manual

Technical Manuals Online! - http://www.tech-man.com


Index

notes Options) • 3.3


access door contact requirement • 4.15 operators • 1.15
access-level overrides • 11.6 defined • 5.2
activated holiday downloads • 9.7 entering information about • 5.3
activating cardholders • 11.16 Operators tab (Administration) • 5.3
adding optional personal information • 11.8 Options command • 2.22, 12.7
ADMIN password • 2.13 Options dialog box • 13.4, 13.20
administrator password resets • 5.15 options, door • 4.11
administrator passwords • 2.7, 2.10 options, system • 3.3
agency requirements for delayed egress • 4.15 orientations, report • 13.17
alternative day off calendars • 9.3 Other Companies With Access button • 4.10, 4.19
assigned CMS user IDs • 12.12 outbound ports
assigning access levels to cardholders • 11.6 creating • 7.6
available fields for table imports • 12.20 defined • 7.2
CH (CardHolder) Display Name • 12.21 deleting • 7.12
changing company configuration • 3.5 editing • 7.12
combined panes • 2.26 Outbound Ports tab • 7.2, 7.3
communicating with your installers • 4.3 overriding
Cypress interface • 11.5 access levels • 11.6
deactivated holiday downloads • 9.8 normal system operations • See special access
deleting assigned access levels • 10.22
deleting assigned schedules • 8.7
deleting cardholders • 11.20
P
deleting operators and denying access • 5.16 Panel Silence privilege, Fire Alarm • 10.20
deleting tasks • 6.15 panes, ACDB window • 2.26
door filter selections • 13.9 partitions • 1.9, 4.6
downloading changes • 3.12 passwords • 5.4
EPISUITE.mdb location • 12.16 ADMIN • 2.13
extra access time • 8.2 administrator • 2.7, 2.10
holiday timelines • 9.2 changing • 5.14
improving ACDB performance • 1.16, 2.6, 2.7 changing installer • 2.5
inactive cardholder data • 11.16 initial installer • 2.4
initial installer passwords • 2.5 Paste button • 2.24
language support • 5.4 Paste command • 2.21
locked holiday lists • 9.9 pending states • 10.5
making holidays inactive • 9.9 performance improvements, ACDB • See setting up
Manual Open timer availability • 4.15 your system under procedures
new card formats and facility codes • 12.8 personal information • 11.8
overwrite option • 2.11, 2.15, 2.16 Personal tab • 11.8
PIN pad requirement • 4.12 Photo command • 2.22
previously created RP files • 2.4 photographs
Relay Open timer availability • 4.15 adding • 5.5, 11.13
remote programming limitations • 4.7 cropping • 11.14
report column widths • 13.19 default sizes • 11.13
reviewing and editing company information • 4.4 deleting • See clearing cardholder photographs
RP file imports • 2.15 exporting • 11.14
saving edits to cardholder information • 11.20 formatting for import • 12.21
saving information within tabs • 3.9 PIN (Personal ID Number)
scrolling through imported data records • 12.20 access card • 11.5
selecting CRCs and KPDISPs • 6.10 schedules • 1.14, 4.12, 8.3
setting default card formats • 12.4 PIN Required For Disarm check box • 4.12
setting default facility codes • 12.5 portrait orientation • 13.17
sorting default • 13.18 ports, outbound • 7.2
startup screen captions • 3.2 Preferences for Operator ADMIN1 and Options • 3.3,
task verification and activation • 6.12 5.17, 12.7
undoing card reissues • 11.21 Preferences tab • 3.4
verifying holiday information • 9.7 Presence command • 2.22
presence reports • 13.2, 13.7
O presence requests • 6.5
preserving ACDB sessions • See Save command
opening reports • See Reports menu previewing reports • See Print Preview command
Operator button • 5.8 Print command • 2.20
operator ID Print Preview button • 2.23
administrator defaults • 5.2 Print Preview command • 2.20
characters • 5.3 Printer Setup command • 2.20
defaults • 2.6 printing
operator reports • 13.8 files • See Print Preview command
Operator tab (Preferences for Operator ADMIN1 and reports • 13.22. See also Access Events

Access Control Database Users Manual Z.7

Technical Manuals Online! - http://www.tech-man.com


Index

printing procedures
command; Database command; Presence deactivating operators • 5.12
command; Print Preview command; Resource deactivating task schedules • 6.12
Usage command; running reports deleting access levels • 10.22
privilege tabs • 5.8 deleting cardholder photographs • See clearing
privileges cardholder photographs
access • 1.12 deleting cardholders • 11.20
Alarm Silence • 10.20 deleting CMS accounts • 12.13
Arm Away • 10.18 deleting companies • 2.18
Arm Stay • 10.18 deleting holidays • 9.9
Bypass • 10.19 deleting operator records • 5.16
command • 1.12 deleting outbound ports • 7.12
default operator • 5.8 deleting photographs • 5.7
Disable • 10.19 deleting reports • 13.24
Disarm • 10.16, 10.19 deleting routes • 7.13
Fire Alarm Disable • 10.20 deleting sample RP files • 2.12
Fire Alarm Panel Silence • 10.20 deleting schedules • 8.7
Fire Alarm Reset • 10.20 deleting SDU project • 2.17
Irregular Entry • 10.16 deleting tasks • 6.15
KPDISP fire alarm • 10.20 downloading changes • 3.12
KPDISP security • 10.18 editing company information • 4.4
problems, import • 12.23 editing holidays • 9.9
procedures editing outbound ports • 7.12
activating cardholders • 11.16 editing reports • 13.24
activating holidays • 9.7 editing routes • 7.13
activating operators • 5.11 editing schedules • 8.7
activating task schedules • 6.12 editing startup screen captions • 3.2
adding custom colors • 8.9 editing tasks • 6.15
adding fields to custom reports • 13.18 entering new facility codes • 12.5
applying cardholder filters • 11.19 entering personal cardholder information • 11.8
assigning CMS user IDs • 12.12 exiting the ACDB • 3.16
assigning command lists • 10.14 expanding access levels • 10.8
assigning different command lists • 10.15 exporting additional fields to EPISUITE • 12.15
assigning different schedules • 10.11 exporting cardholder photographs • 11.14
assigning fields to the ACDB database • 12.21 exporting cardholders • 12.14
assigning new routes • 7.11 exporting photographs • 5.6
assigning operator privileges • 5.9 filtering access events • 13.11
assigning schedules • 10.10 filtering conditions for cardholder reports • 13.12
assigning tasks to CRCs and KPDISPs • 6.10 filtering reports • 13.10
associating tasks with reports • 6.11 finding installer contact information • 2.8
backing up your system • 3.14 formatting photographs for import • 12.22
changing installer passwords • 2.5 grouping reports • 13.16
changing operator information • 5.17 importing and sizing cardholder photographs •
changing operators • 5.13 11.14
changing passwords • 5.14, 5.15 importing data • 12.23
changing the EPISUITE database • 12.16 importing new RP files into existing companies •
clearing cardholder photographs • 11.15 2.15
collapsing access levels • 10.8 importing photographs • 5.6
configuring auxiliary card readers • 12.9 importing real RP files • 2.11
configuring default routes • 7.8 importing RP files • 2.7
configuring time ranges for AC history tasks • 6.8 importing sample RP files • 2.10
copying from one timeline to another • 8.5 logging in as an installer • 2.5
creating access levels • 10.6 logging on after RP file imports • 2.13
creating connection strings • 12.19 modifying CMS user IDs • 12.13
creating holidays • 9.4 modifying default routes • 7.9
creating import definitions • 12.18 modifying SDU projects • 2.14
creating new card formats • 12.3 moving databases to new PCs • 3.15
creating new cardholders • 11.7 naming UD cardholder tab labels • 11.11
creating new operators • 5.4 naming UDF labels • 11.12
creating new reports • 13.8 orienting reports • 13.17
creating outbound ports • 7.6 printing reports • 13.22
creating report headings • 13.16 reissuing lost cards • 11.21
creating routes • 7.7 removing access level schedules • 10.11
creating schedules • 8.4 removing command lists • 10.15
creating tasks • 6.6 removing door privileges • 10.17
customizing default reports • 13.6 removing KPDISP privileges • 10.21
deactivating cardholders • 11.17 removing sample RP files • 2.12
deactivating holidays • 9.8 resetting operator passwords • 5.15

Z.8 Access Control Database Users Manual

Technical Manuals Online! - http://www.tech-man.com


Index

procedures removing
resetting timelines • 8.6 access level schedules • 10.11
reviewing building information • 4.5 command lists from access levels • 10.15. See
reviewing company information • 4.4 also Delete Access Level Command List
running reports • 13.20 command
saving changes • 3.9 door privileges • 10.17
scanning card numbers with auxiliary card readers KPDISP privileges • 10.21
• 12.10 schedules from access levels • See Delete Access
scheduling tasks • 6.7 Level Schedule command
selecting database tables for import • 12.20 removing sample RP files • 2.12
selecting report fonts • 13.17 repeating the last action • See Redo command
setting default card formats • 12.6, 12.7 report
setting default facility codes • 12.6, 12.7 customized default • 13.5
setting door privileges • 10.17 database-assembled • See running reports
setting door timers • 4.16 default • 13.5
setting KPDISP privileges • 10.20 hardware-based • See running reports
setting properties for DB maintenance tasks • 6.9 previously requested • 13.22
setting schedule options • 4.13 task associations • 6.11
setting up your system • 1.15 reports
sizing photographs • 5.6 AC (access control) history • 13.3
specifying card ID formats • 12.3 adding fields to custom • 13.18
specifying facility code formats • 12.4 defined • 13.2
starting external database imports • 12.17 filtering • 13.9
starting tasks manually • 6.7 printing • See running reports
starting the ACDB program • 2.2 running • 13.20
viewing 3-SAC information • 4.8 styling • 13.15
viewing command lists • 4.20 viewing • See running reports
viewing CPU information • 4.8 Reports command • 2.21
viewing door summary information • 4.10 Reports menu • 2.22
viewing KPDISP summary information • 4.19 Reports tab • 2.26, 13.2
viewing miscellaneous door information • 4.16 requirements, minimum system • 1.4
viewing partition information • 4.6 Reset Access Level Privilege button • 10.4
viewing reports • 13.22 Reset Access Level Privilege command • 2.22
viewing SDU information • 4.8 Reset privilege, Fire Alarm • 10.20
viewing site information • 4.5 resetting
viewing task status • 6.14 fire alarms • See fire alarm privileges, KPDISP
programming holidays • See Holidays tab operator passwords • 5.15
project sites • 4.4 timelines • 8.5
projected Resource Usage command • 2.23
day calendars • 9.3 resource usage reports • 13.5, 13.7
holiday reports • 13.5, 13.7 restoration settings • See General tab (Preferences)
prompts, save information (*) • 3.9 restoring system hardware • See initialization under
properties, access level • 10.2, 11.5 hardware
purging old data • See maintenance, database Resync with Server command • 2.21
Re-synchronize with Server button • 2.24
retrieving
Q access event information • See AC (access
queries, alphabetical • See filtering cardholder control) history requests
information information about logged-on operators • See
Quick Defaults group • 5.8 Operator tab (Preferences for Operator
ADMIN1 and Options)
reviewing
R building information • 4.5
records, new operator • 5.3 company information • 4.3
red X symbols • 10.10 project data • See View menu
Redo button • 2.23 reports • See running reports
Redo command • 2.20 Revoke All button • 5.8
Regular tab • 5.8 right pane description • 2.26
Reissue button • 2.24 rotating shifts • 11.6
Reissue Card command • 2.22 route
reissuing lost cards • 11.21 alternative • 7.9
Relay Open timer • 4.15 communication • 4.10, 4.19
relocating ACDB network servers • See Set Network default • 7.4, 7.9
Server command modem • 7.3
RS-232 • 7.3

Access Control Database Users Manual Z.9

Technical Manuals Online! - http://www.tech-man.com


Index

routes setting
creating • 7.7 operator preferences • See Options command
defined • 7.3 operator privileges • 5.8
deleting • 7.13 properties for DB maintenance tasks • 6.8
editing • 7.13 report fonts • 13.16
RP (Resource Profile) functions • 2.4 report orientation • 13.17
RP file deletions • 2.17 styles for custom reports • 13.15
RP file imports • 2.6, 2.7 system access privileges • 1.15
RS-232 routes • 7.3 system preferences and options • 3.3
rules, alternative day off • 1.11 task frequencies • See scheduling tasks
Run Now button • 13.20 silencing fire alarms • See fire alarm privileges, KPDISP
run transaction queue • 6.6 sites, project • 4.4
running reports • 13.20 sizing photographs • 5.5, 11.13, 11.14
software, EPISUITE • 12.14, 12.15
Sort By Holiday Name checkbox • 9.6
S sorting
sample RP file imports • 2.10 cardholders • See cardholder information under
Save button • 2.23 filtering
Save command • 2.20 holidays • 9.6
save information prompts (*) • 3.9 special access • 1.14
saving your changes • 3.9 Special tab • 5.8
scaling photographs • 5.6, 11.14 specifying
scanning card numbers with auxiliary card readers • computers and COM ports • See Outbound Ports
12.10 tab
schedule reports • 13.5, 13.7 facility code formats • 12.4
schedules workweek start days • 9.4
assigning • 10.10 Standard Unlock timer • 4.14
CRC • 1.12 Start Now button • 6.7
creating • 8.4 start screen, ACDB • 2.2
defined • 8.2 starting
deleting • 8.7 ACDB programming sessions • 2.2
editing • 8.7 external database imports • 12.17
Schedules command • 2.21 tasks • 6.7
Schedules tab • 2.25 starting tasks manually • 6.7
scheduling tasks • 6.7 start-on days • See General tab (Preferences)
SDU (Systems Definition Utility) • 4.8 startup screen • 3.2
SDU project deletions • 2.17 startup screen captions • 3.2
Second Overrides First filter • 11.19 State/Province filter • 11.19
security privileges, KPDISP • 1.12, 4.18, 10.18 states, access level • 10.5
Select all records button • 2.24 Status bar • 2.26
Select All Records command • 2.21 Status filter • 11.19
Select current record button • 2.24 Status tab (Tasks) • 6.13
Select Current Record command • 2.21 status, cardholder • 11.3
selecting Style tab • 13.5, 13.15
alphabetical entries • See letter tabs subordinate headings • 13.15
database tables for import • 12.19 Summary tab • 4.9
doors (Card Reader Controllers) • See Toggle All Sunday workweeks • 9.4
Selections command suppression schedules • 1.14, 4.13, 8.3
entire images • 5.6, 11.14 Swipe button • 12.10
multiple records • 3.10, 3.11 system features • 1.8
printer options • See Printer Setup command system responses, predefined • See lists under
report source options • See running reports command
selection lists • 2.26 System tab (Administration) • 7.10, 12.6
Send Changes to Access Equipment button • 2.24 System tab (CardHolders) • 12.12
sending system updates • 6.2, 6.5
changes from the database to the hardware • See systems, access control and integrated • 1.9
system updates
new information to CRCs and KPDISPs • See T
Action Send Changes command
Set Access Level Privilege button • 10.4 tab
Set Access Level Privilege command • 2.22 Access Levels • 2.25, 10.2
Set Network Server command • 2.22 Administration • 2.26
Set Photo Import Properties dialog box • 12.21, 12.22 Administration (Privileges) • 5.8
setting Card Code Formats • 3.6
alternate days off for holidays • 9.3 CardHolders • 2.25, 11.3
default card formats and facility codes • 12.6 Command Lists • 4.20
door privileges • 10.16 Company Information • 3.5
KPDISP privileges • 10.18 Company View • 4.2, 4.3, 7.10

Z.10 Access Control Database Users Manual

Technical Manuals Online! - http://www.tech-man.com


Index

tab tips
Confirmations • 3.4 creating new access levels • 10.7
Default • 3.5 creating new cardholders • 11.7
Diagnostic • 3.5 creating new holidays • 9.4
Extra # • See UD CardHolder Tab Labels tab creating new operators • 5.4
Facility Codes (Preferences for Operator ADMIN1 creating new outbound ports • 7.6
and Options) • 3.6, 12.5 creating new reports • 13.8
Fields • 13.5, 13.18 creating new routes • 7.7
General (Company Information) • 3.5 creating new tasks • 6.6
General (Preferences) • 3.4 default communication parameters • 7.7, 7.8
Hardware View • 4.2, 4.7, 7.10 deleting access levels • 10.22
Holidays • 2.25, 9.4 deleting cardholders • 11.20
In Process • 6.13 deleting operators • 5.16
Information • 5.3 deleting outbound ports • 7.12
Operator (Preferences for Operator ADMIN1 and deleting reports • 13.24
Options) • 3.3 deleting routes • 7.13
Operators (Administration) • 5.3 deleting schedules • 8.7
Outbound Ports • 7.2, 7.3 deleting tasks • 6.15
Personal • 11.8 exporting photographs • 5.6, 11.14
Preferences • 3.4 finding keyboard shortcuts • 2.20
Regular • 5.8 information for scheduling tasks • 6.7
Reports • 2.26, 13.2 information for scheduling time ranges • 6.8
Schedules • 2.25 launching the Edit Photo dialog box • 5.6, 11.14
Special • 5.8 launching the Options dialog box • 2.5, 5.15,
Status (Tasks) • 6.13 11.11, 12.3
Style • 13.5, 13.15 launching the RPM Import dialog box • 2.7, 2.10,
Summary • 4.9 2.16
System (Administration) • 7.10, 12.6 logging off • 5.13
System (CardHolders) • 12.12 multiple selection • 3.11
Task Event Log • 6.13 quickening field navigation • 11.7
Tasks • 6.3, 13.3 save information prompts (*) • 3.9
Timers • 4.13 saving information • 3.9
Transactions Not Sent • 6.13 schedule names and descriptions • 8.4, 8.7
UD CardHolder Tab Labels • 3.6, 11.10 selecting multiple cardholders • 11.16, 11.20,
UDF Labels • 3.6, 11.11, 11.12 12.14
task selecting multiple doors • 10.10, 10.14
Daily AC Events • 6.4 selecting multiple holidays • 9.9
Daily Updates • 6.4 selecting multiple outbound ports • 7.12
Database Maintenance • 6.4 selecting multiple routes • 7.13
default • 6.4 Title bar • 2.19
Destination DB Init • 6.4 Toggle All Selections command • 2.21
functions • 6.2 Toggle Selection of Eligible Tree Nodes button • 2.24
Monthly AC Events • 6.4 toolbar buttons • 2.23
report associations • 6.11 toolbar, Access Level • 10.3
Update • 6.4 Tools menu • 2.22
Weekly AC Events • 6.4 Tracing checkbox • 7.4
Task Event Log tab • 6.13 tracking
tasks cardholder movements • See presence reports
activating scheduled • 6.12 CRC events • See event reports under access
creating • 6.5 database queries • See reports under database
deactivating scheduled • 6.12 modified records • See Title bar
deleting • 6.15 progress on a task • See task status under viewing
editing • 6.15 Transactions Not Sent tab • 6.13
scheduling • 6.7 tree view • 2.26
starting manually • 6.7 Troubles Display command • 2.22
tracking • See task status under viewing
Tasks tab • 6.3, 13.3
telephone communications • See modem routes
U
Thanksgiving • See definition under holiday UD CardHolder Tab Labels tab • 3.6, 11.10
time displays • See General tab (Preferences) UDF Labels tab • 3.6, 11.11, 11.12. See also EPISUITE
time ranges, AC history • 6.8 software
timelines • See schedules under creating Undo button • 2.23
Timeout field • 7.4 Undo command • 2.20
Timers tab • 4.13 Unlock on first Access Granted check box • 4.12
times, access • 1.11 unlock schedules • 1.14, 4.12, 8.3
tips unsaved information reminder • 3.9
case sensitivity • 2.5 unscheduled access • See Irregular Entry privilege
clearing photographs • 5.7, 11.15 Update task • 6.4

Access Control Database Users Manual Z.11

Technical Manuals Online! - http://www.tech-man.com


Index

updates, system • 6.5 partition information • 4.6


User Defined Field filter • 11.19 project site information • 4.4
user IDs, CMS (Central Monitoring Station) • 12.11 reports • 13.22. See also Access Events
command; Database command; Presence
command; Resource Usage command; running
V reports
verifying imported information • 2.8 SDU information • 4.8
View All button • 10.4 selection tables • 3.7
view buttons, access levels • 10.3. See also Action site information • See Company View tab
menu system organization • See Company View tab
View menu • 2.21 task status • 6.13
View Only Denied button • 10.4
View Only Granted button • 10.4 W
viewing
3-SAC information • 4.8 Weekly AC Events task • 6.4
ACDB software version information • See About Wiegand-compatible formats • 11.4, 12.2. See also
command (Help menu) auxiliary card reader inputs under configuring; card
ACDB troubles • See Troubles Display command code formats
command lists • 4.20. See also command lists workweek start days • 9.4
under assigning
CPU information • 4.8
door options • 4.11
Y
door summary information • 4.9 yellow X symbols • 3.12
hardware connections • See Hardware View tab
import status • 12.23
imported information • 2.7, 2.10 Z
KPDISP information • 4.18 Zip/Postal Code filter • 11.19
miscellaneous door information • 4.16
MODCOM information • 4.8

Z.12 Access Control Database Users Manual

Technical Manuals Online! - http://www.tech-man.com

You might also like