Packard Bell EN TM80 – page 10

Packard Bell
EN TM80

Manual for Packard Bell EN TM80

Guard Tour Assignment Dialog Box

This window displays when you click Guard Tour Assignment, enabling you to select and assign Guard

Tours that you want to trigger an event.

Select, and then click the right arrow to assign a Guard Tour.

Select, and then click the left arrow to unassign a Guard Tour.

Click OK to display the results in the Assigned Guard Tours windowpane.

Group Tab

Digital Output Group Form

Use this tab to assign digital outputs to a selected digital output group on a specified micro.

Number

This is a read-only field displaying the number assigned to the digital output group.

Micro

This is a read-only field displaying the description of the micro on which this digital output group is

located.

Digital Outputs

This windowpane displays the digital outputs assigned to this group.

Assign Digital Outputs

Click this button to display the Digital Output Assignment dialog box. This dialog lists all digital outputs

available.

Guard Tour

Administration Menu

The Guard Tour option opens the Guard Tour form that allows you to enter a description for your Guard

Tour inspection and configure the Tour Manager PC, Start Point, tour time, and points.

This option is unavailable if you are not licensed for Guard Tour.

Guard Tour History

Reports Menu

The Guard Tour History option opens the Guard Tour History Report Form that allows you to generate a

report of completed tours displaying tour activities such as start points, hits, invalid points, pauses,

resumes, tour end points, tour time exceeded, manual start and manual stop.

Secure Perfect 6.1.1 User Manual 179

Guard Tour Tab - Guard Tour Form

Reference Topic:

Point Assignment Dialog Box

Badge Assignment Dialog Box

Configure the specifics of this tour by completing the elements displayed on this tab.

Requirements are indicated by an asterisk.

Element Description

Tour Host Computer*

From the drop-down list, select the computer that will host this tour. Guard

tours must be owned by a specific client host.

Start Tour Point*

From the drop-down list, select a tour point as the start point of this tour.

Only direct and network micro devices display in this drop-down list.

When you select a start point, becomes available.

Enter the maximum number of minutes that this tour is allowed to last.

Max tour time (min)*

When the maximum time is reached, a tour is ended automatically.

The default and maximum number of minutes in this field is 480.

Route Activity to

Select this check box to route badge activities to a selected and enabled

Printer

system printer at the client computer that is hosting the Guard Tour. You must

have two separate printers configured if you are using a printer for tour

activitiess and a printer for badges.

Displays a list of assigned tour points. All tours are random. A random tour

Tour Points*

is a tour where all of its points do not need to be hit in a particular order,

except the assigned start point.

Every time this tour is executed, the order of ‘hit’ points can vary. A random

tour ends automatically when all of its tour points have been hit.

Click to display a Point Assignment dialog box, allowing you to assign Tour

Assign Tour Points*

Points to this tour.

Selection results display in the Tour Points windowpane.

Move Up

Select and click to move this Tour Point up the list. This tour point order

displays on the Manual Control form, Guard Tour tab.

Move Down

Select and click to move this Tour Point down the list. This tour point order

displays on the Manual Control form, Guard Tour tab.

Tour Badges*

Displays a list of assigned tour badges. At least one badge must be assigned

to a tour.

Click to display a Badge Assignment dialog box, allowing you to assign

Assign Tour Badges

badges to this tour.

If a reader is assigned as a tour point, a badge must be assigned before

this Guard Tour record can be saved.

Click to save this tour record and simultaneously create a new alarm,

Save*

Guard Tour Max Time Exceeded.

If you have not completed the required elements, you cannot save.

Secure Perfect 6.1.1 User Manual 180

Guard Tour Tab - Manual Control Form

Reference Topics:

Guard Tours Form

Tour Point Form

This tab does not display if you are not licensed for Guard Tour.

The purpose of using this form is to manually start, pause, resume, or stop a Guard Tour that is currently

in progress. The upper windowpane displays all Guard Tours configured in your Secure Perfect system to

which this operator has access.

Element Description

Upper Windowpane:

Guard Tour

A list of configured tours descriptions in the Secure Perfect system.

Tour State

This column displays the current state of all Guard Tours in your Secure

Perfect system. Typical states are: 1) Tour Started; 2) Tour Not Started; 3)

Tour Paused.

Time to Complete

This column displays the estimated time assigned for completion of a tour,

based on the clock time that this tour started and maximum tour time

allowed. If a tour is paused and later resumed before expiration of

estimated completion time, the remaining unused tour time is reflected in

the Time to Complete column.

Client Description

This column displays the client that is hosting the selected tour. A color

indicator displays the current connection status of the client that is hosting

the selected tour.

Green indicates online.

Red indicates offline.

Lower Windowpane:

Tour Point

This column displays a list of points associated with the selected Guard

Tour.

Point Status

This column displays a ‘hit’ or ‘not hit’ real-time status. You do not have to

refresh your window to see the current state of the tour points for the

selected tour.

Last Hit Time

This column has an entry following a valid ‘hit’ to this point.

Set Tour to:

Start

Verify that the appropriate tour is selected in the upper windowpane. Click

to manually begin a Guard Tour. The Tour State column indicates ‘Tour

Started.’

Stop

Verify that the appropriate tour is selected in the upper windowpane. Click

to prematurely stop a tour in progress. The Tour State column indicates

‘Tour Not Started.’ This button is not available if a tour is not in progress.

Resume

Verify that the appropriate tour is selected in the upper windowpane. Click

to resume a tour that was previously paused. The Tour State column

indicates ‘Tour Started.’ This button is unavailable if a tour is not in

progress. This button is not available if the time assigned for the selected

tour has expired.

Pause

Verify that the appropriate tour is selected in the upper windowpane. Click

to pause a tour that is currently in progress. The Tour State column

indicates ‘Tour Paused.’ This button is unavailable if a tour is not in

progress.

Purpose

Specify a reason for stopping or starting this tour. Enter a brief statement

about the operator’s actions.

Secure Perfect 6.1.1 User Manual 181

Guard Tours Tab - Guard Tour History Report

Click Edit to display the Guard Tour Assignment Dialog Box, enabling you to assign Guard Tours for

which this report will generate.

The assigned Guard Tours display in the open window pane of this tab.

Secure Perfect 6.1.1 User Manual 182

H

Help Doesn't Display in My Assigned Language

This occurs when you are using either a non-English operating system or a non-English Secure Perfect

and you did not correctly shut down SP. To eliminate this problem, you MUST select the File menu and

then Exit to correctly shut down SP.

Help Topics

Help Menu

Selection of this option starts the Secure Perfect Help system.

You can also click the Help icon to access Help , then move the ? over any area of your display and

click again. A window will open with information pertaining to the selected section.

Click the Show me icon to view a step-by-step animated demo.

Using Help Contents

Using Help Index

Using Help Search

Hex Characters

Valid and allowable hex characters include the base 16 numbering system (0 through 9 and A through F).

How Do I Perform a Search on a Specific Form

The Secure Perfect Search button can be found on any form that provides search capabilities. If you click

this button when the current form is blank, all records will be returned. To specify criteria, fill in the

information.

Example: If you want to find all badgeholders with the last name Smith, type Smith in the Last name

field and click Search.

You can also use the * character that allows you to search for patterns.

Example: A search for badgeholders with the last name starting with Sm* would yield such names as

Smith and Smythers.

How Do I Put a Reader Online

From the Secure Perfect main menu, go to Device, then Reader. Click Search to display existing reader

records. From the right windowpane, select the reader you want to set online, then select Online and

Active.

Secure Perfect 6.1.1 User Manual 183

How Do I Remove an Alarm from the Alarm Monitor Form

When an alarm displays on the Alarm Monitor Form, appropriate action should be taken. For example,

you may want to send a guard out to check that a door is secure. Once the alarm has been investigated

and reset, if necessary, it should be removed from the Alarm Monitor Form.

1. Some alarms may require an acknowledgment before they can be removed. This feature is set on

the Alarm Form. To acknowledge the alarm:

Without a response, click Acknowledge and the Process state for that alarm will change to

Acknowledged.

With a response, click Responses to select a predefined response or enter your own in the

Response field. Then, click Acknowledge and the Process state for that alarm will change to

Acknowledged.

2. To remove an individual alarm without waiting for it to reset, highlight the alarm and click Remove

Individual.

3. If you have permission, you can remove all alarms in one action by clicking the Remove All icon:

How Do I Troubleshoot My Global Edition System?

Reference Topic:

Replication and Synchronization Conflicts

Review the Secure Perfect 6.0 Installation Guide chapter covering "Installing Secure Perfect 6.0 Global

Edition." Confirm and review your configuration options, then review the Troubleshooting section.

Additionally, refer to Microsoft Replication software documentation in printed and electronic format.

Secure Perfect 6.1.1 User Manual 184

I

Installing the Printer Driver

To install the print driver for your badge printer:

1. Follow the instructions shipped with your printer.

2. Select the appropriate printer port.

3. Select a name for the printer and indicate if it is the default printer.

4. Do not print a test page; click Finish.

5. After the installation is complete, move the mouse pointer over the printer icon, click the right

mouse button, and select and set Properties.

6. Complete the printer setup and then click Exit.

NOTES:

The printer may NOT support transparent bitmaps.

If the printer run out of cards or the ribbon need to be replaced while in the process of producing

badges, an error message will display. Correct the condition at the printer and then put the printer back

online before continuing with your print job.

Instruction

Administration Menu

The Instruction option opens the Alarm Instruction Form that allows you to create instructions on how to

react to alarms and link with alarm records. The instruction(s) will then display on the Alarm Monitor Form

when the alarm occurs.

Intrusion Zone

Administration Menu

The Intrusion Zone option opens the Intrusion Zone Form that allows you to create zones, assign

intrusion DI, intrusion DO, alarms, and readers. The Status Tab displays current state of the zone and

status of all assigned devices.

Intrusion Zone Assignment Dialog Box

This window displays when Assign Intrusion Zone is clicked on the Intrusion Zones tab of the Access

Right form or Event Trigger form. The window displays a list of all intrusion zones for the micros in the

facilities available for assignment by this operator. You can assign an unlimited number of intrusion zones

to an access right.

Select, then click the right arrow to assign an available intrusion zone.

Select, then click the left arrow to unassign an intrusion zone.

Click OK to accept the selections and display the Intrusion Zones in the Assigned Intrusion Zones list

box.

Secure Perfect 6.1.1 User Manual 185

Intrusion Overview

Reference Topics:

Arm/Disarm an Intrusion Zone

Intrusion Zone Form

Activity Monitor Form

About Intrusion Options

Intrusion functionality provides the ability to define local intrusion zones per micro that consist of:

Readers

Alarms

Arm/disarm input point Intrusion DI

Arm/disarm output point DO

The defined intrusion zones have the ability to be armed and disarmed through access control by using a

card and keypad reader, DI, or manual control.

The intended application is suited for arming and disarming intrusion zones from outside of the monitored

and secured areas. Based on Secure Perfect system architecture, it is not our intent to fully emulate

traditional Burg/Intrusion panel functions but to provide similar functionality for less stringent

Burg/intrusion requirements that can be taken on natively within the access control system. Additionally,

the system provides increased value by allowing cross-system functionality between the Secure Perfect

micro and vendor-independent Burg/Intrusion panels.

Arm/Disarm Intrusion Point - Digital Input Form

An Intrusion DI Type has been added to the drop-down list on the Digital Input Form, Digital

Input tab.

When the Arm/Disarm Intrusion point is set/active (Armed), the associated zone is armed by

placing all readers offline, all alarm points monitored on, and the arm/disarm DO goes active.

When the Arm/Disarm Intrusion DI is reset/not active (Disarmed), the associated zone is

disarmed by placing all readers online, all alarm points monitored off (unless on a schedule),

and the arm/disarm DO goes inactive.

Intrusion Zone – Intrusion Zone Form

The Intrusion Zone Form is required for creating a relation between readers, alarm inputs, the

Arm/Disarm Intrusion point, and the arm/disarm DO.

1. An Intrusion Zone is defined with a description and facility assignment.

2. A micro selection is required to establish the zone source and its intrusion points.

3. The Intrusion Zone tab provides for the assignment of the following intrusion zone components:

arm/disarm DO, arm/disarm Intrusion DI, readers, and alarms.

Arm/Disarm Intrusion DI: This is a single record selection from a drop-down list filtered by

active facility that consists of all available Arm/Disarm Intrusion points for the micro. Only the

Dis that have not been assigned will be available.

Alarm Points: This is a multi-record selection from an assignment dialog filtered by active

facility that consists of available micro alarm points not already assigned to a zone. (24/7 4-

State Supervision rules apply regardless of the Armed/Disarmed state of the zone.)

Readers: This is a multi-record selection from an assignment dialog filtered by active facility

that consists of available readers not already assigned to a zone. (Readers must be active

and nonelevator type.)

A zone can be configured to contain the following:

An Arm/Disarm Intrusion Point with Alarm Points only and no Readers.

An Arm/Disarm Intrusion Point with Readers only and no Alarm Points

Alarm Points and Readers only with no Arm/Disarm Intrusion Point.

Readers only.

An arm/disarm DO can be assigned for any of these.

4. A Status tab provides the ability to request status of the zone and each of its associated points, as

follows.

Zone: Armed or Disarmed

Secure Perfect 6.1.1 User Manual 186

Arm/Disarm Intrusion DI: Active/Inactive/Trouble

Readers: Online or Off-Line

Alarm Points: Monitored Off/Monitored On

Arm/Disarm By Access Right

The Intrusion Zones tab of the Access Right Form allows you to assign multiple intrusion zones using an

assignment dialog.

Only badge holders with an Intrusion Zone assigned on the Access Right Form will be able to

arm and disarm zones using any of the card/keypad readers within a zone.

When a zone is armed, all readers within the zone will go offline, and normal access rights

will not gain access into the area.

When a zone is disarmed, all readers within the zone will go on-line and normal access rights

will gain access into the area. If schedules were assigned, then the reader will follow the

schedule.

If you expect to arm/disarm by using any one of the readers within a zone:

That reader must be assigned on the Access Right tab of the Access Right Form and be an

assigned reader in the Intrusion Zone listed on the Intrusion Zone tab.

OR

Individually created access rights must be assigned to the person that will arm/disarm the

Instrusion Zone. (One right will allow access to the readers and another right will allow

access to the Intrusion Zone.)

Arm/Disarm by Manual Control

Manual zone control for arming and disarming is accomplished using the Intrusion Zone tab on the

Manual Control Form. This follows the standard Manual Control Form conventions including a Purpose

entry by the operator.

Intrusion Zone Tab

Reference Topic:

Intrusion Zone Form

Intrusion Zone Assignment Dialog Box

Access Right Form

This tab allows you to assign intrusion zone control to previously created access rights. Access to a

reader and access to an intrusion zone are two separate access rights. Only badge holders with an

Arm/Disarm Intrusion Zone access right will be able to arm and disarm zones by accessing a

card/keypad reader within a zone. When a zone is armed, all readers within that zone go off-line;

therefore, normal access rights will not gain access into the area.

Assigned Intrusion Zones: This windowpane displays a list of previously assigned intrusion zones for

the currently selected access right record.

Assign Intrusion Zone: Click this button to display the Intrusion Zone Assignment dialog box, allowing

you to assign and unassign intrusion zones to the selected access right. If no intrusion zones display,

verify that intrusion zones were configured on the Intrusion Zone Form.

If you do not have valid access to a reader that belongs to an Intrusion Zone due to a schedule in that

access right, you will not be able to arm/disarm a zone.

Secure Perfect 6.1.1 User Manual 187

Intrusion Zone Tab - Event Trigger Form

Reference Topic:

Intrusion Zone Assignment

This tab allows you to assign Intrusion Zones and Intrusion Zone transaction type(s) that will become the

source for this Event Trigger.

Element Description

Transactions:

Select any one or all of the types of Intrusion Zone

transactions that will trigger an event.

Arm

Intrusion Zone arm transaction in progress.

Disarm

Intrusion Zone disarm transaction in progress.

Invalid

Intrusion Zone arm/disarm transaction failed for one of the

following reasons:

Device or badging failed. The zones are not secure.

The arm/disarm device is not a part of the selected

zones.

The 10-second time period allowed for completion of

the arm/disarm process at keypad and reader, has

expired.

The presented badge does not have access rights for

transactions in the selected Intrusion Zones.

Tag Selection:

Select one of the options.

None

No tag is sent for marking a recorded video or

manipulating the record rate.

Tag only

A tag is sent for marking recorded video at the camera(s)

current record rate.

Tag as event

A tag is sent to the DVR for marking recorded video and

for changing the camera(s) record rate to its event record

rate settings.

Assigned

This list box displays those Intrusion Zones that you have

Intrusion Zones

assigned to this Event Trigger.

Assign Intrusion

Click to display an Intrusion Zone Assignment dialog box,

Zone

listing available Intrusion Zones in your Secure Perfect

system. Those zones selected and assigned when you

close the dialog box, will display in this list box.

Secure Perfect 6.1.1 User Manual 188

Intrusion Zone Tab

Reference Topic:

Arm/Disarm an Intrusion Zone

Intrusion Zone Form

This tab allows you to edit or create an intrusion zone record and associate DI, DO, and devices such as

readers and alarms in the operators’ selected facilities.

Number: Assign and enter a number for the intrusion zone, between 1 and 96. Duplicate numbers are

allowed but not on the same micro.

Micro:

Select a micro from the drop-down list of available micros that will control this intrusion zone. This is a

one-to-one relationship and establishes the zone source and intrusion/access points. The micro must be

connected and online.

A Reader or Digital Input and Alarm must be selected in order to save this record.

Arm/Disarm DO: Select one DO from the drop-down list of DOs that will trigger when an Intrusion Zone

is armed/disarmed. This is an optional assignment. This DO can be assigned to another Intrusion Zone.

Arm/Disarm DI: Select one DI for the drop-down list of available DIs of the Type Intrusion, as

assigned on the Digital Input Form. This DI can arm/disarm an Intrusion Zone and is an optional

assignment. This DI cannot be assigned to another Intrusion Zone.

When you unassign a DI, save this record. It is now available to re-assign this DI to another Intrusion

Zone.

Last Status:

Date: Date of last zone history transaction on record.

Time: Time of last zone history transaction on record.

Status: Status as of last zone history transaction on record.

In order to refresh this status section, click off of this record then back or close then reopen the form

Devices

Assigned Readers: This list box displays a list of available, active readers in the same zone, belonging

to the selected micro. You must assign at least one reader OR a digital input and alarm to an Intrusion

Zone. The reader cannot be assigned to an elevator. Click Assign Readers to display a dialog box that

enables you to assign active readers.

Assigned Alarms: This list box displays a list of intrusion alarms in the same zone, not already

assigned, on the selected micro. This cannot be an external, DVMR, or a logical such as Host Comm or

Lost Badge alarm. Click Assign Alarms to display a dialog box that enables you to assign alarms. This is

an optional assignment.

Arm Delay (sec)

Arm Delay: Enter the number of seconds to delay the arming of this intrusion zone. This field accepts up

to 255 seconds. This time limit should allow a person to pass into or out of a monitored area before the

zone is armed.

If your system is UL-listed, the delay cannot exceed 60 seconds. Refer to the UL Certification

Requirements in your Secure Perfect Installation Manual.

Secure Perfect 6.1.1 User Manual 189

Intrusion Zone Tab

Reference Topic:

Intrusion Overview

Manual Control Form

This form allows you to manually control the Intrusion Zone, and takes the Intrusion Zone from one

condition (armed) to another condition (disarmed), depending on the current operator’s permissions.

Example:

When the Zone is Armed, readers will not allow access to anyone, alarm points are

monitored, and schedules are ignored.

When the Zone is Disarmed, personnel require only access rights for readers.

Select micro

Immediately following selection of a micro, the system searches and displays Intrusion Zone records in

the list box windowpane, associated with the selected micro.

All displays all micros in the operator’s facilities.

By Micro displays records for a specific micro. Click the down arrow to display the list of

micros.

Columns in Windowpane

Description: Description of the Intrusion Zone in the database.

Micro: Micro on which the Intrusion Zone Control is located.

Set State To:

Arm: Immediately arms the selected Intrusion Zone.

Disarm: Immediately disarms the manual Intrusion Zone.

Purpose

When you select an Intrusion record, this box is enabled. Enter an explanation for arming/disarming the

Intrusion Zone. This field accepts 255 alphanumeric characters. These comments are written to the

operator history file and display in the Purpose Field, on the Operator History Report.

Secure Perfect 6.1.1 User Manual 190

K

Keypad Alarm Shunting

Reference Topics:

Both Read/Keypad Type Reader

Keypad Only Type Reader

Normal Type Reader

The keypad alarm shunting feature allows you to turn the monitoring of a group of alarms off or on using

the keypad. This can also be accomplished by setting up a schedule for an alarm group using a time

schedule.

Only reader board door inputs and 20DI board input points can be shunted from a keypad.

To identify a reader board door input, look for a default description that follows this format: 0001-1-01

Reader.

To identify a 20DI board input point, look for a default description that follows this format: 0001-1-01

DI.

Keypad Only Type Reader

Only reader board door inputs and 20DI board input points can be shunted from a keypad. (To

identify a reader board door input, look for a default description that follows this format: 01-1-01 Reader.

To identify a 20DI board input point, look for a default description that follows this format: 01-1-01 DI.)

Follow the steps below to shunt alarm groups within a micro connected to a keypad reader.

1. Click the start key on the keypad. The start key is labeled with either an asterisk <*> or a plus <+>

depending on the reader model.

2. Type one of the following:

0 - to turn monitoring off

1 - to turn monitoring on

3. Type the alarm group number (00 to 15) you want shunted.

4. Click the end key that is labeled with either a pound sign (#) or an <x>.

5. Click the start key on the keypad again.

6. Type your badge number on the keypad.

7. Click the end key (<#> or <x>).

Secure Perfect 6.1.1 User Manual 191

L

Launch Client

Select this icon from the Client Monitor toolbar, to enable a CCTV interface (other than integrated CCTV).

This option also displays on the shortcut menu for this form. The shortcut menu displays when you click

the right mouse button.

Licensing

Reference Topic:

About Secure Perfect

Your Secure Perfect software is licensed during the installation process. The license sequence is also

an item on the Start, Programs, Secure Perfect menu. Refer to the SP License Help system for

additional details of the licensing procedure.

Your license included Imaging software for Secure Perfect that controls the number of clients that can

launch Imaging. Imaging installs with every Secure Perfect installation; however, you cannot enable

Imaging on more computers than you have Imaging licenses. (Only clients that have an Imaging license

enabled can capture images and signatures, create badge designs, and print badges. If not all computers

require the license at the same time, you can enable and disable the license for the appropriate

computers.)

Thin client licenses are limited to Enterprise Server computers running Windows 2000/2003 operating

system. Licensing controls the number of computers that can host remote Secure Perfect sessions. You

cannot enable thin client on more computers than you have licenses. (If not all computers require the

license at the same time, you can enable and disable the option for the appropriate computers.)

To run the License program, click in this sequence: Start, Run, Programs, Secure Perfect, SP

License. The LicenseSetup window opens. Follow instructions as displayed. SP License has a separate

Online Help system.

Location Tab

Reference Topic:

Alarm Notifier

Person Form

Use this tab to enter location information for this person. The fields accept 64 alphanumeric characters,

making possible exceptionally lengthy street addresses or E-mail addresses.

Address1/Address2/ Address3/Address4/Address5

The labels of these five fields are defined on the Parameters Form.

Any fields can be used as an E-mail Address, but must first be designated as the E-mail address on

the Parameter Form, as a User Field or Address Field entry.

Telephone

Enter the telephone number of this person. You may use up to 14 alphanumeric characters. There are no

restrictions in format (whether you use hyphens, parentheses, or spaces). Enter in a format meaningful

and understandable to your organization or application.

Secure Perfect 6.1.1 User Manual 192

LogFile

Administration Menu

The LogFile option opens the LogFile Form that allows you to select the computer, name your log file,

and navigate to, or enter the path and directory to your LogFile.

LogFile Tab

Reference Topic:

Diagnostic Settings Form

LogFile Form

Click Add to create a new logfile record or Search to display a list box of previously created LogFiles.

Computer

This field will be unavailable when creating a new

record. The name of your computer will display in this

field.

LogFile

Name or identify your file.

You must enter an .spl extension. Example:

COM1log.spl

Path

Designate the path and directory in which to place

your LogFile.

Browse

Click to display a Browse for Folder window, allowing

you to navigate to the directory in which to place your

LogFile.

Save. Now, open the Diagnostic Settings Form from the Administration menu. You will want to select this

LogFile name from the list of files displayed, and assign components for monitoring.

Logoff

File Menu Item

Refer to Log On/Log Off or Shut Down.

Low-Battery Alarm

Micro/PX-2000 ONLY: When you create and save a Micro/PX-2000 record, Secure Perfect creates and

th

th

supports 11 DI points; however, the 11

DI is a low-battery alarm. To configure the 11

DI to function as

a low-battery alarm, refer to DI Board Records Creation. If power is off and the backup battery is running

low, the micro sends an alarm transaction to the Alarm Monitor form. The alarm displays until the battery

is reset by recharging or the micro is powered back on.

Secure Perfect 6.1.1 User Manual 193

M

Manual Control

Operations Menu

The Manual Control option opens the Manual Control Form that allows you to control:

DO (digital output) states for Door DOs and other DOs.

DI (digital input) states for Alarm DIs and other DIs.

Intrusion Zone states.

The shortcut key combination for Manual Control Form is CTRL+O.

Clicking this icon from the Secure Perfect toolbar can also access this option:

Manual Control Tab

Digital Output Form

Use this tab to manually set the state of a specified digital output.

Purpose

Enter the reason for manually changing the state of the specified digital output. The text entered here is

recorded in Operator History.

Set state to:

On for Duration: Click to set the selected digital output to its Active state for the On time

specified on the Digital Output tab.

On Indefinite: Click to set the selected digital output to its Active state until it is manually set

to its inactive state. The only way to turn it off is by selecting Off on this tab or Off on the

Manual Door/DO Control Form.

Off: Click to set the selected digital output to its inactive state.

Sched. Override: Use this option to change the state of the DO if you want the schedule to

override its setting. For example, use Sched. Override to unlock a door if you want a

schedule at a later time to lock this door. If you don’t want the scheduler to lock your door,

use the On Indefinite selection.

Secure Perfect 6.1.1 User Manual 194

Mass Update

Reference Topic:

Conditions of Mass Update

This option is not available until at least one record exists in the list box to the right of the form. The Mass

Update mode allows you to simultaneously update properties on a group of records within Secure

Perfect. This is very helpful when a number of records for a single form require the identical property or

value change. Forms where Mass Update is applicable include the Person Form and Badge Form.

Click the Show me icon to view a step-by-step animated demo.

Mass Update mode of processing is enabled as follows:

1. Open a blank form.

2. Click Search to display a list of existing records. We recommend entering search criteria to

narrow your search results to only records that are to be updated. Records that match your

search criteria display in the list box to the right of the form.

If there are no records, Mass Update is not available.

3. Move the mouse pointer below any of the tabs and right-click to display a shortcut menu to

related forms. To enable the Mass Update mode, select Mass Update from the shortcut menu.

4. Note the change in the appearance of the form. ONLY those fields or dialog boxes that are

available for mass update changes are now enabled and blank. Certain conditions apply.

5. Select the records you want to adjust from the list box on the right. Typical Microsoft Windows

selection/deselection process is used in this application

6. Make the required adjustment to the form.

7. Click Save. The update of records begins immediately. A window displays with a progress bar,

indicating the update progress. Click Abort if you want to stop the update in progress.

You cannot close a form during the Mass Update process.

Right-click shortcut menu navigation is unavailable when you are in Mass Update

mode.

If you have changed any parameter but did not Save, a message reminds you to discard or

save your changes.

Smaller batch updates are recommended to prevent performance issues during a mass

update.

A Mass Update Complete dialog box displays, indicating completion or failure.

When mass updates are processed to an access right, a log file is generated and a

View Results key displays in the dialog box. Click to view the completion log. We

recommend that you rename and save this file to another location for reference purposes.

Renaming the log prevents an overwrite. The questionable log will be available for

Customer Support to review and locate discrepancies. Be aware that this log file is

automatically overwritten every 7 days, in order to prevent unnecessary data that would

accumulate on your hard drive.

8. When the process is complete, a Mass Update Complete dialog message displays.

9. Right-click and select Mass Update from the shortcut menu to disable and exit Mass Update

mode. The records refresh at this point.

10. Updates display in the list box to the right.

Secure Perfect 6.1.1 User Manual 195

Menu Buttons

View Menu

The Menu Buttons option determines whether or not the Secure Perfect graphics display beside options

in the drop-down menus.

Clear the check box to hide the graphics from view.

Message Format Tab

Alarm Notifier Form

This tab allows you to format the appearance of the e-mail alarm notification, based on your Windows

regional font settings.

Date/Time Format

Select a date/time format from the drop-down list.

Header

Select this check box to display a header greeting. In the Header field, enter text up to 256 alphanumeric

characters. This could be additional details explaining the alarm condition.

If you do not select the check box, any header message you create will NOT be included in

your e-mail.

If you do not enter a header greeting, an equivalent white space will display at the beginning

of the e-mail notification.

Footer

Select this check box to display a footer closing. In the Footer field, enter text up to 256 alphanumeric

characters. This space could provide a name and number to contact if the receiver has a question.

If you do not select the check box, any footer message you create will NOT be included in

your e-mail.

If you do not enter a foot or closing, an equivalent white space will display at the end of the e-

mail notification.

Alarm Information: The information displayed on the e-mail message may look similar to:

0151-1-01 DI|Alarm|10/16/02 15:20:59

where:

0151-1-01 DI = The micro, board and reader.

Alarm = The alarm state.

10/16/01 15:20:59 = The micro date and time.

Add Alarm Instruction

Select this check box to include the alarm instruction associated with this alarm, in this e-mail notification.

If this check box is not selected, any associated alarm instruction will not be included in the

message.

If this check box is selected and there are no alarm instructions, no instructions will be

included in the message.

Alarm/Reset Text

This text is how you want the alarm State to display to the receiver. You can do one of the following:

Accept the default alarm state entry, as displayed in the language of the current operator.

Select and replace the existing text with alarm state text in another language, such as the

language of the receiver. You can also add to the text with additional text (no more than 32

alphanumeric characters total) describing the state.

Alarm Text: Default alarm state text is Alarm, displayed in the language of the current operator.

Reset Text: Default alarm reset state text is Reset, displayed in the language of the current operator.

Secure Perfect 6.1.1 User Manual 196

Micro

Device Menu

The Micro option opens the Micro Form that allows you to identify and configure micros.

Micro/5-PX or Micro/PX-2000 Records Generation

When you select a micro type on the Micro Definition tab of the Micro Form, a Power/Comm board is

automatically added to the Configuration column on the Micro Configuration tab of the Micro Form. As a

result, certain additional records are created:

Alarm Records:

Tamper

Power

Lost Badge Alarm

Invalid Badge

Host Comm Alarm

8RP Reminder: The Micro/PX-2000 supports 4 readers.

16DO Reminder: The Micro/PX-2000 supports 8 DO points.

20DI Reminder: The Micro/PX-2000 supports 11 DI points.

Micro/PX-2000 boards shipped after November 1, 2003, support the 11th DI as a low-battery

alarm for the micro.

None of these alarms are monitored. If you want them to display on the Alarm Monitor when the alarm is

triggered, you will need to go to the Alarm Form, Alarm Tab and enable Monitor in the Settings section.

In addition, all alarms are automatically assigned to Alarm Group 0. You can change the Alarm Group on

the Alarm Group Form.

Digital Input Records:

Tamper

Power

Sixteen (16) Alarm Group Records:

As mentioned above, all alarms are automatically assigned to Alarm Group 0. You can change this on the

Alarm Group Form.

Micro Assignment Dialog Box

This window displays when you click Edit, allowing you to select and assign micro association for this

form. Only micros in the operators’ facilities are available for assignment by this operator.

Select, and then click the right arrow to assign an available micro.

Select, and then click the left arrow to unassign a micro.

Secure Perfect 6.1.1 User Manual 197

Micro Configuration Tab

Reference Topics:

Micro/5-PX or Micro/PX-2000 Records Generation

Reader Board Records Generation

DO Board Records Generation

DI Board Records Generation

Micro Form

Use this tab to assign the appropriate boards to this micro.

Before continuing, verify that the micro type (Micro/5-PX, Micro/5-PXN, Micro/PX-2000, or Micro/PXN-

2000) is correct. The boards listed in the Boards column depend on the type of micro you have selected.

Boards

Lists all boards supported by Secure Perfect and the micro type you have selected. To add a board to the

current micro record, click and drag to the Configuration column. If the addition of the board violates a

micro configuration rule, you will get an error and the board will not be added.

Configuration

Lists the current configuration of the micro. A Power/Comm board is automatically added when you

create the micro record. The reader, digital input, and digital output boards will need to be added to

match the physical setup of the micro.

Following the addition or deletion of a board, you MUST click Save for the appropriate records to be

generated or deleted.

Once you add a board, you are restricted to that type of board only. For example, if you add one 2RP

board, any additional boards MUST be 2RP boards. Likewise, you cannot violate any micro configuration

rule. These are based on the capacities for each micro. For example, for the Micro/5-PX, you can only

add up to four 2RP boards, four 2SRP boards, two 4CRP boards, two 8RP boards, or two CK8RP

boards.

Secure Perfect 6.1.1 User Manual 198