Packard Bell EN TM80 – page 6

Packard Bell

Manual for Packard Bell EN TM80

Quick Launch

Select to automatically access live and recorded video from the

camera(s) associated with the alarm’s transaction as defined by its

event trigger. Refer to Video Windows - An Overview for window

management information.

In order to view live and recorded video, the DVR must be

online and available, and not serving another request for playback

of recorded video based on this event.

The following windows open: 1) Digital Video Viewer; 2) Video

window(s) displaying the current live view of the camera(s)

associated with the alarm transaction. Each window displays a

dialog box containing the current date and time. For additional

information, click Help on the Digital Video Viewer window.

Alarm Monitor Form Toolbar

Reference Topic:

Alarm Monitor Form Shortcut Menu

Click To

Remove all alarms from the Alarm Monitor.

Remove an individual alarm from the Alarm

Monitor.

Alarm Notifier

Administration Menu

The Alarm Notifier option opens the Alarm Notifier form, allowing you to accomplish the following:

Assign the alarms/resets that will trigger an e-mail message.

Assign people who will receive e-mail notification of the alarm condition.

Format the e-mail message.

Alarm Response Tab

Reference Topic:

Alarm Monitoring Using the Alarm Monitor Form

Alarm Response Form

Use this tab to enter a predefined alarm response. This multi-line dialog box accepts 64 alphanumeric

characters. The responses you create and save will display as selections on the Alarm Monitor Form.

Alarm Routing and Bumping

Administration Menu Item

The Alarm Routing and Bumping option opens the Alarm Routing and Bumping form, allowing you to

do the following:

Route alarms to one or more Client Groups by time schedule or at all times.

Bump alarms to one or more Client Groups following a time lapse of an unacknowledged or

unpurged alarm to the Client Groups selected for bumping.

Secure Perfect 6.1.1 User Manual 99

Alarm Routing Client Group Assignment Dialog Box

This dialog box allows you to select and assign Client Groups for this routing record. Only Client Groups

in the operator’s facilities are available for assignment by this operator.

Select, and then click the right arrow to assign an available Client Group.

Select, and then click the left arrow to unassign a Client Group.

Click OK to close this dialog box and display the results in the Routing, Client Groups windowpane.

Alarm Selection Tab

Alarm Notifier Form

The Alarm Selection tab allows you to assign alarms in this operators’ facility that will trigger an e-mail

message.

Assigned Alarms:

This windowpane displays any previously assigned alarms.

Assign Alarms

Click Assign Alarms to display the Alarm Assignment dialog box that allows you to select specific alarms

that will trigger e-mail notifications. Click OK and the selected alarms will display in the Assigned Alarms

windowpane.

Transaction Type

Select one or both transaction types that will trigger an e-mail alarm notification.

Alarm: E-mail notification is sent at onset of the alarm.

Reset: E-mail notification is sent when an alarm is reset.

By default, no type is selected when you create a new Alarm Notifier record. A transaction type must be

selected in order to save this record.

Alarm Sense Time

This form allows you to add or edit the link between an event and an alarm sense time. The event

determines when and to what value the sense times for all alarms in the group are changed.

Event: Select an event from the drop-down list. If there are no events listed, you will need to

configure events using the Event Schedule Form.

New time: Select or enter a sense time. The value is in seconds and indicates the delay

before triggering an associated digital output or sending in a Secure Perfect alarm if the DI

type is Alarm. This number tells the system how many seconds to wait after sensing the input

has changed to Active State. Enter 00 to immediately send the transaction to the host,

notifying the host of a state change. Increase the Sense Time entry if using noisy or

chattering contacts.

Example: This value could indicate the delay time, in seconds, that elapses between the time a door

contact is broken and the time the output and alarms are triggered. If door contact is re-established

before the sense time elapses, the alarm would not come in to Secure Perfect and the output would not

activate.

Secure Perfect 6.1.1 User Manual 100

Alarm Tab

Alarm Form

The Alarm Tab configures the alarm.

Group: Displays the alarm group to which this alarm was assigned. The default is alarm group 0. You

can change to any other alarm group available on that micro, displayed on the drop-down list.

Owner Type: This is a read-only field and displays the object to which the alarm belongs or refers.

API: Alarm is bi-directional and owned by the external interface.

Board: Alarm is owned by the microcontroller.

CCTV Interface: Alarm is owned by an interface.

Client: Alarm is owned by a Regional Database client.

th

Digital Input: Alarm is owned by the digital input, such as a motion sensor. (The 11

DI on a

Micro/PX-2000 or M/PXN-2000 is owned by the micro; it is a low-battery alarm from the

micro.)

Failover: Alarm is owned by the host client.

Guard Tour: Alarm is owned by a reader or digital input.

Kalatel Camera: Alarm is owned by a Kalatel camera.

Kalatel DVMR: Alarm is owned by a Kalatel DVR.

Micro: Alarm is owned by a micro.

Reader: Alarm is owned by a reader.

Region Failover: Alarm is owned by the host Regional Database Server.

Settings:

Monitor (Alarm, Short, Cut, Reset): If selected, this alarm, when triggered, will display all

alarm conditions available to this alarm on the Alarm Monitor Form. You have the option to

schedule alarm monitoring on the Schedule Tab of this form. If this option is NOT selected

but a schedule is in place, the schedule will monitor alarms only for the time that monitoring

th

is on. (Although the option to monitor is displayed for the 11

DI on a Micro/PX-2000 (low-

battery alarm), an alarm is not generated for Cut and Short.)

An operator can see alarms on the Alarm Monitor Form only for facilities that are currently

active and assigned to the current operator.

The option to monitor an alarm must be selected on the Alarm Form in order for a specific

alarm to display on the Alarm Monitor Form.

Alarms do not display on the Alarm Monitor Form if the selection to monitor an alarm is

removed, even though Alarm Routing and Bumping may be configured.

Always monitor (Short, Cut, Reset): If selected, this alarm will always display Cut, Short, and

Reset conditions of alarms on the Alarm Monitor Form. Select this option if a schedule

prevents monitoring an alarm/reset condition during certain periods of the day but you still

want Short, Cut, and Reset to be monitored and displayed. (Although the option to monitor is

th

displayed for the 11

DI on a Micro/PX-2000 (low-battery alarm), an alarm is not generated

for Cut and Short.)

Micro dial host: If selected, an alarm occurring on a dial-up micro, or micros downstream

from a dial-up micro, will cause the micro to dial the host in order to report the alarm.

Operator acknowledge: If selected, the operator must acknowledge the alarm on the Alarm

Monitor Form before the alarm can be cleared.

Priority: Select a number from 0 to 9 by clicking on the up and down arrow buttons to the

right of the field. This number indicates the priority of this alarm and tells the system (host) in

which order it should alert the operator should multiple alarms occur at the same time. The

lower the number, the higher the priority; therefore, 0 has the highest priority and 9 the

lowest.

Route alarms to history: If selected, alarm activity is written to the alarm history.

Print alarms: If selected, the alarm history transaction is printed on a selected system parallel/serial

printer when the alarm changes state between alarm and reset. Alarm transactions will print only if the

transaction is routed to the printer and the alarm transaction printer is selected. The selection of the alarm

transaction printer is done on the Client tab of the Client form.

If you modified this record, save before you exit the form.

Secure Perfect 6.1.1 User Manual 101

Alarms Tab - Alarm Routing and Bumping Form

Element Description

Alarms:

This windowpane displays the names of Alarms assigned to

this Routing and Bumping record.

Assign Alarms:

Click to display an Alarm Assignment dialog box that allows

you to assign Secure Perfect alarms to this Routing and

Bumping record.

Alarms Tab

Reference Topic:

Enable Alarm Video Pop-Up

Event Trigger Form

This tab allows you to select alarm(s) and alarm transaction type(s) that will become the source for this

Event Trigger.

Element Description

Transactions

Select one or both options as types of alarm transactions

to trigger an event. The alarm must be set for monitoring.

Alarm: An event is triggered as a result of an alarm.

Reset: An event is triggered as a result of an alarm reset.

Tag Selection

Select one of the Tag Selection options:

None: No tag is sent to the DVR for marking recorded

video or manipulating record rate.

Tag only: A tag is sent to the DVR for marking recorded

video at the camera(s) current record rate.

Tag as event: A tag is sent to the DVR for marking

recorded video and for changing the camera(s) record rate

to its event record rate settings.

Assign Alarms

Click to display an Alarm Assignment window, enabling

you to select and assign/unassign an alarm record for this

Event Trigger record. You can also unassign an alarm for

an Event Trigger.

Auto Pop-up

Select this checkbox to enable an automatic live video

pop-up window when an alarm occurs associated with this

alarm trigger. Additionally, the Enable Alarm Video Popup

must be enabled on the Operations menu. If this operators

Permission for Digital Video Viewer is not made available,

this option will not activate even though selected here.

Secure Perfect 6.1.1 User Manual 102

Antipassback

Set the antipassback status to neutral for all badges in this micro.

Clicking this icon from the Micro Utility Form toolbar will access this option:

Antipassback Definitions

Antipassback (APB) is an access control feature designed and configured to reduce the chance of users

‘passing back’ their credential to another person attempting to gain access. When readers are designated

as entry (IN) or exit (OUT), the system is able to record whether a user in inside or outside at any time by

noting the last place their credential was used. If the last time it was used was at an IN reader, then the

system knows that they are inside. If the last time it was used was at an OUT reader, then the system

knows that they are outside.

Active APB does not let a person re-enter unless they first exit. The user is unable to ‘pass back’ their

credential to allow a friend to gain entry.

Passive APB records the status but does not enforce the status. The system knows where a person is

but does not stop them from entering twice. This type of system is often applied with time and

attendance.

Tailgating refers to a user following another user through a door without presenting a credential. They

follow closely enough so they can get through the door or gate before it closes. Only the first user is

recorded as IN or OUT.

Timed APB refers to a system where users are ‘forgiven’ after a certain length of time, configured in

minutes. After the configured time is expired, the user status is set to ‘neutral’ and the system allows

them to re-enter. This eliminates the need for an OUT reader and prevents a badge holder from re-

entering for that time period.

Global APB tracks the user throughout the entire Secure Perfect network and across all micros. No

matter where a user is, their APB status is recorded.

Regional APB (Secure Perfect Global Edition Systems) tracks the user within a Region. The user is

active in that Region only and inactive in all other Regions.

Secure Perfect 6.1.1 User Manual 103

APB Region Configuration Tab - Region Form

Use this tab to identify APB IN and APB OUT readers, and configure the APB behavior across Regions.

APB Entering Region: This listbox displays those readers that have been selected as APB IN readers

for the selected Region.

Assign: Click to assign APB IN readers to this region. Only readers previously configured as APB IN

readers are displayed for selection.

APB Exiting Region: This listbox displays those readers that have been selected as APB OUT readers

for the selected Region.

Assign: Click to assign APB OUT readers for this region. Only readers previously configured as APB

OUT readers are displayed for selection.

It may not be required or significant for the micros in a Region to report status to another Region. Select

from one of the following notification options:

1. Retain APB Status Across Regions: This is the default of three status options. If selected, the APB

status is recognized across all Regions in the Secure Perfect Global system. A badge can be

presented at an APB IN reader in one Region and at an APB OUT reader in a second Region. (Enable

Global APB must be selected on the Parameter Form.)

2. Invalidate Badge Across Regions: If selected, this option disables the badge in all other regions

when a person enters the selected Region by presenting the badge at an APB IN reader. The Activity

Monitor displays ‘Invalid APB IN’ or ‘Invalid APB OUT’ if you attempt to enter in or out of any other

Region. When a person exits the selected Region and the badge is presented at an APB OUT reader,

the badge becomes enabled in all other Regions. (Enable Global APB must be selected on the

Parameter Form.)

Example: Employees badging IN at a Miami office are tracked and not allowed to badge IN to another

location until they have presented their badge at an APB OUT reader in Miami.

3. Ignore APB Status Across Regions: If selected, the APB status is local to the selected Region and

status is retained within the Region. Regions are independent of each other and the status is not

recognzed by another Region.

API Connections

Reference Topic:

About Secure Perfect

Administration Menu

This option opens the API Connections form that allows you to define an interface license for external

application integration by assigning a description of the API (Application Program Interface), and then

assigning an application login, password, and host computer.

This option is unavailable if you are not licensed for an API connection.

Secure Perfect 6.1.1 User Manual 104

Appending Archive Databases

If you have a backup of a SecurePerfectArchive 3.x or later database, the data can be restored

using the SP Maintenance Utility. Backup and Restore functions are detailed in the Secure Perfect

Installation Guide.

The SP Maintenance Utility will also append badge history, alarm history, operator history, and where

appropriate, Digital Input history, Zone history, and DVR history data to the current

SecurePerfectArchive database. Current SecurePerfectArchive data will not be affected.

In order to use the Append utility, you must meet the following criteria:

Backup SecurePerfectArchive files must be restored to a local or mapped network

directory folder.

Free disk space that equals at least three times the size of your database backup file.

The ‘sa’ password.

Sufficient time and patience to complete the procedure.

To append data:

1. Open the SP Maintenance Utility and select Append from the menu bar.

2. Navigate to the Drive on the local computer where the backup file is located.

3. Select the Folder in which the backup file is located.

4. Select SecurePerfectArchive from the Backup Source File list.

5. Drag and drop the backup SecurePerfectArchive file to the Secure Perfect Archive Databases

Only: dialog box.

6. Enter the ‘sa’ password.

7. Click Append.

8. The Append process can take a considerable amount of time, depending on the size of the backup.

During the Append process, the application looks like it is not responding. This is normal.

9. When you have finished using the data, we recommend that you delete the appended data using

the Secure Perfect Parameter Form, Clear Archive tab. This will keep the current

SecurePerfectArchive file from becoming too large in size.

Archiving

Reference Topic:

Backing Up Data

An archive is a history of transactions. The archive is created automatically by Secure Perfect, based on

the time interval that you selected on the Parameters Form (Daily, Weekly, or Monthly). When you select

Weekly, you must also select a day of the week.)

If you select:

Daily: The archive is appended every day beginning at 11:59:58 P.M.

Weekly: The archive is appended every week on the day that you select, beginning at

11:59:58 P.M. (You must select a day of the week.) Any change in the scheduling occurs

immediately. For example, if archiving is taking place on Tuesdays and the schedule is

revised to archive on Wednesday, the archiving will occur one day later, on Wednesday.

Monthly: The archive is appended on the last day of the month beginning at 11:59:58 P.M.

The Secure Perfect services do NOT have to be running. Archiving will occur as long as SQL Server

Agent services are running. Archiving process takes place independently of Secure Perfect. As long as

the SQL Server Agent services are running, the archive process will occur.

Determine the status of the SQL Server Agent service by navigating to Settings, Control Panel, then

Component Services through Windows Explorer. Check the Status of SQLAgent$SPSQL.

Archiving is performed on the database Server computer only.

Archiving creates a copy of the latest history transactions and then removes all the data from the history

Secure Perfect 6.1.1 User Manual 105

database. The data will be appended to the archive database until you decide the archive database has

grown too large.

The factors in determining whether the archive database is too large can be:

The size of your hard drive.

The performance you receive when running history reports.

The length of time you need to keep data.

Other factors specifically related to your installation.

To remove data from the archive database:

1. BACK UP YOUR SECURE PERFECT ARCHIVE DATABASE! You will have to back up the Secure

Perfect Archive database using utilities provided by SQL Server 2000 or by using the Secure

Perfect Maintenance Utility. After you perform the backup, label and store the media in a safe

place.

If you do not back up the SecurePerfectArchive, you will lose all the data stored in it.

2. Select the Administration menu, then Parameters.The Parameter Form opens with the Settings

tab displayed.

3. Select the Clear Archive tab. The Earliest Date in Archive DB and Latest Date in Archive DB

fields will indicate dates once you have clicked the Show Date button. If you do not have any

records in your archive database, the two date fields will state No Record.

4. Choose the Start Date of the data that you want to remove from your archive database by

selecting the month, then the day to begin your archive.

5. Choose the End Date of the data that you want to remove from your archive database by selecting

the month, then the day to end your archive.

6. Click Delete.

7. Click OK.

The deletion of an archive database is taking place in the background. Progress is indicated on

the status bar in the lower right side of the screen. The process may take hours to complete. The

length of time is dependent on the size of the archive database and the hardware components of

your computer.

8. Upon completion, a message displays: The records from the Archive database has been

successfully deleted! Click OK.

Arm/Disarm an Intrusion Zone

Arm/Disarm an Intrusion Zone Using Access Rights

Any card and keypad reader or keypad within a defined zone can be used to arm and disarm the zone

with a valid access right for the reader and an Intrusion Zone assigned.

Click the Show me icon to view a step-by-step animated demo.

Arm = * 1 # followed by a valid card read.

If all alarm points are reset (not in an active state of alarm) and all doors closed, then all

readers are placed offline (doors locked) and alarm points are monitored on. The

corresponding Digital Output is fired as selected on the Intrusion Zone Form.

When the zone is successfully armed, all readers in the zone provide visual indication that

the zone is armed.

We recommend using CASI brand readers, configured to display the PIN light ON or

flashing, depending on the selected reader model. A Zone armed transaction is generated

and displays on the Activity Monitor Form.

When a zone is not successfully armed due to an invalid zone configuration on the Access

Right Form, an Arm/Disarm Failed, Invalid Access Right transaction is generated.

If any alarm points are set (in an active state of alarm) or a door is open, the zone does not

become armed. An Arm/disarm Failed Zone not secure transaction is generated and

displayed on the Activity Monitor Form.

Secure Perfect 6.1.1 User Manual 106

Disarm = * 0 # followed by a valid card read.

All alarm points in the zone are monitored off and readers in the zone are placed online for

normal operation.

We recommend using CASI brand readers, configured to display the PIN light switching

from ON or flashing to OFF, depending on the selected reader model. A Zone disarmed

transaction is generated and displays on the Activity Monitor Form.

When a zone is not successfully disarmed due to an invalid badge, an Arm/disarm Failed,

Invalid Access Right transaction is generated.

When a zone is disarmed, all normal access control rules apply for gaining access.

Arm/Disarm an Intrusion Zone Using Arm/Disarm Intrusion DI

All of the same rules apply as if arming or disarming using an access right.

When the zone is successfully armed, all readers in the zone should provide visual indication

that the zone is armed and a Zone Armed transaction is generated on the Activity Monitor

Form.

When a zone is not successfully armed, an Arm/disarm Failed transaction is generated.

When a zone is disarmed, all normal access control rules apply for gaining access and a

Zone Disarmed transaction is generated.

Arrange Icons

Windows Menu

This option allows you to control multiple windows or forms. If you have several forms in progress, you

can temporarily minimize a form from view. Select this option to arrange the minimized form icons across

the bottom of your Secure Perfect display screen.

Assign Micro Phone Numbers Dialog Box

This dialog box allows you to select a micro from the Dial-Up Micro drop-down list and assign telephone

numbers used by this micro to reach the selected backup client.

Click to display a list of only Dial-Up and Network + Dial-Up micros for the client record

displayed.

When you select a micro from the drop-down list, the Phone numbers to reach backup client

xxxxxx fields become available for entry (where xxxxxx = name of selected client in the

Backup Clients list box ).

When you enter a number in the first field, the Save button becomes available.

All Number fields must contain a telephone number of up to 20 digits. If there is only one

telephone number for this micro to reach the backup client, repeat this number in all four

fields. (If you click Save after completing the first Number field, the system will automatically

complete all Number fields with a duplicate number.)

Click Save to save the list of telephone numbers. The micro will dial the number in Number 1:

and then try the others in numerical order until connection it made.

Click Close to exit the dialog box.

Repeat the process for each micro in the Dial-up Micro drop-down list.

Click Save to save this client record.

Secure Perfect 6.1.1 User Manual 107

Auto Shutdown of Client Services

Services will automatically shut down when a client closes the Secure Perfect application and meets ALL

of the following criteria:

1. Does not host any micros or DVRs.

2. Does not have any API connections.

3. Is not a Thin Client.

4. Is not a backup client or have any backup clients of its own.

5. Is not a CCTV client.

6. Is not hosting a Guard Tour.

7. Client form Enable Auto Shutdown is selected.

The shutting down of a particular client computer designates that license capacity unused. Now, that

license is available for another computer that can now be designated a Secure Perfect client.

Auto Update

Administration Menu

The Auto Update option opens the SP Auto Update Configuration Form that allows you to configure your

Secure Perfect network computer for automatic notification and installation of the latest Quick Fixes and

Service Packs.

Secure Perfect 6.1.1 User Manual 108

B

Backing Up Data

Reference Topics:

Appending Archive Databases

Archiving

Restoring Secure Perfect Databases

A backup is a copy of selected data. Since Secure Perfect does not contain a backup option, you can use

any method you like to back up the data. Because the Server computer contains the database, there is

no need to back up your Secure Perfect folder on your client computers.

You should keep two sets of backups, of the following Server computer files:

Secure Perfect Data: The data includes the following:

Database: Contains configuration data such as badges and micros.

History: Contains current history including badge transactions and operator history.

Archive: Contains the latest copy of Secure Perfect history data.

Images: Backup needed if you have Imaging installed. Contains the picture files of badge

holders.

Signatures: Backup needed if you have Imaging installed. Contains the signature files of

badge holders.

Graphics: Backup needed if you are using Alarm Graphics. Contains the alarm graphics

maps.

The SP Server program MUST NOT BE RUNNING when you attempt a backup of images,

signatures, or graphics!

You should back up this data more often since it changes so frequently. While your internal policies may

dictate your backup requirements, we recommend that you create a backup at least every week.

Entire Secure Perfect Installation

The entire Secure Perfect folder should be backed up when you first set up the system and

have confirmed that it is working, and any time you upgrade. It is very important that you also

back up the registry settings. In most backup programs, you will be prompted to back up

these settings.

ALWAYS MAINTAIN A CURRENT BACKUP. Should you have any problems with your

system, you can always restore your backup.

SP Enterprise Edition Systems use SQL Server utilities to back up the Secure Perfect database,

Secure Perfect History, and Secure Perfect Archive.

Click the Show me icon to view a step-by-step animated demo.

Secure Perfect Professional Edition Systems use the Secure Perfect Maintenance Utility to back up

the Secure Perfect database, Secure Perfect History, and Secure Perfect Archive information (tables and

queries).

Click the Show me icon to view a step-by-step animated demo.

Secure Perfect 6.1.1 User Manual 109

Backup Clients Assignment Dialog Box

This dialog box allows you to select and assign backup clients associated with the selected client. This

list includes only clients available for assignment by the current operator and defined as a client that does

not exceed the limit of micros and DVRs allowed. When you select a client from the list, you will note that

the client statement defines the total combined number of DVRs and micros of the default client and

backup client. (The total number of micros cannot exceed 64. The total number of DVRs cannot exceed

16.)

Select, and then click the right arrow to assign an available client.

Select, and then click the left arrow to unassign a client.

Click OK to display results in the Backup Clients list box.

Backup Clients Tab

Reference Topic:

Client Monitoring

Takeover and Recovery Timing

Client Form

This tab displays ONLY at client computers that are licensed for Client Redundancy. Use this tab to

configure your backup clients that would take over the devices in case of a failure at the default client

computer.

Backup Clients:

This list box displays those clients you have assigned to take over control of any nondirect micros and

DVRs in the event of a failure at the default client computer. The order in which the client names display,

determines which client is next in line to take over. The timing of the takeover is a variable. Backup

clients must be online (Secure Perfect services are running). In the event of a failover, the client entry

includes the client computer name, and then the total combined number of DVRs and micros of the

default client and backup client.

Move Up: Select and click to move this client up the list.

Move Down: Select and click to move this client down the list.

Assign: Click to display a Backup Clients Assignment dialog box, listing client computers

found on your Secure Perfect system. Those computers selected and assigned when you

close the dialog box, will display in the Backup Clients list box.

Database Connection Heartbeat

The Secure Perfect system validates communication with backup clients by pinging (sending continuous

broadcast messages). If there is a communication failure between the default client and the backup

client, the backup client looks for a Heartbeat (time stamp in the database) as an indication that the

default client is online and connected. a) If a Heartbeat exists, the default client is "alive" and the backup

client will not initiate takeover of the devices from the default client. b) If a Heartbeat does NOT exist, the

backup client initiates takeover of devices from the default client. The backup client will use the following

values:

Heartbeat (seconds): Select a computer from the Backup Clients list box and assign an

interval of seconds (the range is 10 to 180) between Heartbeat checks. The default number

is 60 seconds. This number can be reset at any time.

Heartbeat Retries: Select the number of times (the range is 1 to 3) this backup client checks

for a Heartbeat stamp in the database, before initiating takeover of devices from the default

client. The default number of retries is 2.

Assign Micro Phone #s

This button is only available after completing the following:

Backup clients have been assigned.

The currently displayed client is host to Dial-up and/or Network + Dial-up micros.

Secure Perfect 6.1.1 User Manual 110

In the event of a system failure, the micros associated with the failed client must have available telephone

numbers to reach the backup client. Click to display an Assign Micro Phone Numbers dialog box.

Redundancy

Display Redundancy Notification:

By default, this check box is checked. If licensed for Client Redundancy, this check box must be selected

to generate a notification message, that will display at all clients (based on facilities available to the

current operator), when:

A client failure occurs.

A device takeover succeeded.

A device takeover did not succeed. [Select Details button for explanation.]

(If the first-in-line backup client is not available, a second backup client will take over control

of devices and a notification message displays, updating you.)

Recovery of the default client and transfer of devices failed. [Select Details button for

explanation.]

Recovery succeeded.

If you clear this check box, you will not receive a notification message; however, indication of a take over

displays on the Client Monitor Form.

Perform Backup on Normal Shutdown: This check box is unchecked or clear by default. Select this

check box to trigger the takeover, by a specified backup client, of devices associated with a client during

a normal shut down.

If your system is not licensed and you are operating in demo mode, this option is not available for

selection.

Backup Region Assignment Dialog Box

A list displays, of available backup Regional Database Server computers.

Select one or more computer names from the available list and then click the right arrow to

assign.

Select one or more computer names from the assigned list and then click the left arrow to

unassign.

Click OK to accept the selections and close this window.

Secure Perfect 6.1.1 User Manual 111

Backup Regions Tab - Region Form

Reference Topic:

Backup Region Assignment Dialog Box

Global Editions systems can be configured for database redundancy, at the Regional level. A Regional

Database Server can assign another for backup in the event of a failure at the default Regional Database

Server.

Regional database redundancy and fileserver redundancy operate independently. One or the other, or

both can fail at the same time, whether they reside on the same server computer or are configured to

reside on separate computers. Secure Perfect initiates three tries to fail over to another fileserver. This

process is taking place in the background. After three tries with no success, an SPFileServer interface

attempts to locate an available fileserver. If all attempts fail, the interface generates an alarm.

If you select a failover Regional Server and want your clients to failover to the backup Server, you

must also select the Client Region Failover checkbox on the Client form, Client tab.

Element Description

Backup Regions

This list box displays those Regional Database Server

computers that you have assigned to take over control in

the event of a failure at the default Regional Database

Server. The order in which the computer names display,

determines which Server is next in line to take over.

Move Up

Select and click to move this Regional Server up the list.

Move Down

Select and click to move this Regional Server down the list.

Assign

Click to display a Backup Region Assignment dialog box,

listing available Regional Database Servers found on your

Secure Perfect Global Edition system. Those computers

selected and assigned when you close the dialog box, will

display in the Backup Regions list.

Badge

Personnel Menu

The Badge option opens the Badge Form that allows you to define a badge in the system. The badge

can then be linked to a person record in the system. More than one badge can be assigned to a person.

Badge

Reports Menu

The Badge option opens the Badge Report Form that allows you to create a report on the badges in your

Secure Perfect system.

Secure Perfect 6.1.1 User Manual 112

Badge Alias

Reference Topic:

Badge Alias Form

Personnel Menu

The Badge Alias option displays the Badge Alias Form that allows you to assign an alias number to the

physically encoded badge number (available only if an alias was assigned during installation).

Badge Alias Tab

Badge Alias Form

Use this tab to assign alias numbers to badge encoded numbers.

Encoded Number

Displays the badge’s encoded number.

Badge Alias

If you selected Manual aliasing during installation, enter the new number for the badge.

If you selected Automatic aliasing during installation, the number will be entered for you.

Find Badge

Click to display a Find Badge dialog box, select a reader, and present a badge at that reader. The record

is displayed that is associated with the badge presented.

Click Save.

Alias badge numbers saved to the system are automatically preceded with a ‘1-

If this is a Global Edition system, the badge alias number is preceded by the Region ID number that

uniquely identifies the Region. Therefore, the same alias number can be assigned across regions,

because the number is uniquely identified by the Region ID.

Badge Assignment Dialog Box

This window displays when you click Assign Tour Badges, enabling you to select and assign tour badges

to a tour.

Multiple badges can be assigned to a guard tour, but if a badge is assigned to a tour, the

same badge cannot be assigned to any other tours.

The same badge must be used to complete the entire tour.

When a badge is assigned to a guard tour, the badge is downloaded to all micros that have

reader type tour points for that guard tour.

If any reader is assigned as a tour point, at least one badge must be assigned to the tour.

If all tour points are DIs, you do not need to assign a badge to the tour.

Click OK to display the results in the Tour Badges windowpane.

Secure Perfect 6.1.1 User Manual 113

Badge Definition Tab

Badge Form

Use this tab to define a badge.

Element Description

Assigned to

Select the name of the person to whom this badge is assigned. If this

badge is not yet assigned, select <UNASSIGNED>.

Refresh: Click to update the person list with the most up-to-date

information.

Click the Show me icon to view a

step-by-step animated demo.

Number

This number must be unique to Secure Perfect. It may be already

encoded into the card (if you are using a card) or you can assign a

number in this dialog box no more than 20 digits. This number will be

entered into a keypad reader when there is no card.

If you are using badge aliasing: The alias displays here as a read-only

number and cannot be changed. An alias number is assigned on the

Badge Alias Form. The encoded number will be entered into a keypad

reader.

Status

Only badges with the status of Active will be granted access through

readers.

Active: The badge has been assigned to a person and may gain

access. An Active badge can be re-assigned as a Guard Tour

badge.

Guard Tour: The badge has been assigned to a person and will be

used as a guard tour badge. A Guard Tour badge can be re-

assigned as an Active badge.

Issuable: The badge has not yet been assigned to a person.

Lost: The badge has been reported as lost.

Remake: This badge has been damaged.

Suspended: This badge was assigned to a person who no longer

works at the facility.

PIN Number

If this badge will be used with a badge-and-keypad reader, enter a

personal identification number here. This number will have to be entered

at the keypad in order to gain access with this badge.

This number must be four digits.

Select this option to enforce ‘Extend Unlock Time’ for this badge

Follow Extend

record. If you assigned this badge to a person from the ‘Assigned to’

Unlock Time

drop-down list, this person is now allowed extra time to gain access

to an entry or exit point in the Secure Perfect system. Time

limitations are configured on the Door Functions tab of the Reader

Form.

If this badge is being assigned to a person whose existing record

indicates that Extend Unlock Time is enforced, this checkbox will

display as already selected.

Example: An extended time limit beyond normal can be configured for

an employee who enters a motorized door by wheelchair.

Manual Control:

Resets the APB or T&A status of the current badge to neutral.

Reset APB and

T&A Status

Dates Click Calendar to select a date:

Issue: The date the badge was assigned and issued to a person.

Secure Perfect 6.1.1 User Manual 114

Expiration: The first date on which the badge will no longer grant

access. A blank value means the badge never expires.

Return: The date the badge was returned.

Last Valid Access Date: Date the last valid access was granted to the badge, as stored in

the Secure Perfect database.

Time: Time the last valid access was granted to the badge, as stored in

the Secure Perfect database.

Reader: Reader at which the last valid access was granted to the

badge, as stored in the Secure Perfect database.

Find Badge

Click to display a Find Badge dialog box, select a reader, and present a

badge at that reader. The record displays that is associated with the

badge presented.

Badge Design

Personnel Menu

The Badge Design option opens the Badge Design Form that allows you to create or format what will

print on your badge.

Badge Format

Administration Menu

The Badge Format option opens the Badge Format form that allows an operator to design, import, or

export custom badge formats into the micro. Custom magnetic stripe or Wiegand formats can be loaded

to your Secure Perfect system.

Badge Formats in 40-Bit and 55-Bit Wiegand Protocol

4002 - 40-Bit Wiegand Format

The 40 bits of transmission consist of two parity bits and 38 code bits. The first bit transmitted is the first

parity bit, P1; it is even parity calculated over the first 20 bits. The last bit transmitted is the second parity

bit, P2; it is odd parity calculated over the total 40 bits.

Code format:

F = Facility – 0 Digits

B = Badge Number (99.999.999.999 possible) 12 digits

This format was created to enable identical badge identification numbers to be produced in either

S-F/2F or Wiegand mode. These numbers are derived from the 40-bit binary code in the proximity

chip. The badge number is comprised of the 38 least significant bits. The most significant bit is set at

0.

5502 - 55-Bit Wiegand Format

The 55 bits of transmission consist of two parity bits and 53 code bits. The first bit transmitted is the first

parity bit, P1; it is even parity calculated over the first 27 bits. The last bit transmitted is the second parity

bit, P2; it is odd parity calculated over the total 55 bits.

Code format:

F = Facility – 0 digits

B = Badge Number – 16 digits

P = Parity Bit

Secure Perfect 6.1.1 User Manual 115

Badge Format Tab

Reference Topics:

Micro Flash and Micro Parameter Configuration

Badge Formats in 40-Bit and 55-Bit Wiegand Protocol

Badge Format Form

This tab allows you to identify the pattern of the data bits (mask) combination, in the badge numbers that

you will import or export to your micro and store in the Secure Perfect database.

Element Description

Format Type

Select from two data masks.

Magnetic Stripe: The number is a mask embedded into a magnetic tape

strip and usually adhered to badges or credit cards.

Wiegand: A pulse-generating mask sensed by a pickup coil (the reader).

This is a complex system to manufacture and virtually impossible to

duplicate making it one of the most secure access control technologies.

The number is a mask of a digital 0 or 1.

Position

Indicates the location or position of the bit where your mouse pointer is

presently positioned, in the mask combination.

Magnetic Stripe:

Badge data layout

N = Badge or facility/site bit

(B,F,P,0,1)

B = Start character (With few exceptions, the start character is ‘B’ the

majority of the time.)

0 to 9, A, C, D, E. = Constant characters

= Space

Wiegand: The following characters are acceptable. Also refer to the

Legend group box:

B = Badge identification (BID) bit

F = Facility/site code bit

P = Parity bit (an extra bit added for error detection or integrity testing)

0 or 1 = Constant characters

E = Parity layout - Even

O = Parity layout - Odd

= Space

The following settings apply to Wiegand Format ONLY:

Parity layout 1 (E, O): Indicates the first parity bit in the data mask. The entry must be an even (0) or

odd (a) parity bit.

Parity layout 2 (E, O): Indicates the second parity bit in the data mask. The entry must be an even

(0) or odd (1) parity bit.

Parity layout 3 (E, O): Indicates the third parity bit in the data mask. The entry must be an even (0)

or odd (1) parity bit.

Parity layout 4 (E, O): Indicates the fourth parity bit in the data mask. The entry must be an even (0)

or odd (1) parity bit.

Number of facility

The number of facility code bits in the data mask.

characters:

Numbers of badge

The number of badge number (BID) bits in the data mask.

characters:

Secure Perfect 6.1.1 User Manual 116

The following applies to all formats:

Import format from file This selection is enabled when you click New to add a new record. Click to

navigate to a network drive, CD, diskette, or a local drive of your computer

and import a Wiegand or magnetic stripe file.

(Example Wiegand File Name: *.wgd)

Export format to file

Click to navigate to a network drive, CD, diskette, or local drive of your

computer and export a Wiegand or magnetric stripe file.

Comments:

Enter text as an explanation or details of this procedure. The field accepts

256 characters.

Badge History

Reports Menu

The Badge History option opens the Badge History Report Form that allows you to create a report

based on the history of badge transactions in the system.

Secure Perfect 6.1.1 User Manual 117

C

Calendar Dialog

Select the day, month, and year of badge issue, return, or expiration. Click OK to accept the selected

date and close the form. Click Cancel to close the Calendar form without making any changes. Click

None to clear the date currently in the field.

Camera

Device Menu

The Camera option displays the Camera Form that allows you to edit the parameters of the selected

camera record. Camera records are automatically created when a DVR is defined.

Camera Preset

Administration Menu

The Camera Preset option opens the Camera Preset Form that allows you to label a preset camera

position and assign a number to that preset.

Camera Preset Assignment Dialog

A list of available camera presets displays. These presets were previously defined on the Camera Preset

Form.

Select one or more presets from the available list and then click the right arrow to assign.

Select one or more presets from the assigned list and then click the left arrow to unassign.

Click OK to accept the selections and close this window.

Can I Customize the Toolbar?

No. The toolbar cannot be customized.

Cascade

Window Menu

The Cascade option allows you to control multiple windows or forms. If you have several forms open but

not visible, select this option for a cascading view of your forms with the active form taking precedence on

the display screen.

Secure Perfect 6.1.1 User Manual 118