Packard Bell EN TM80 – page 6
Manual for Packard Bell EN TM80

Quick Launch
Select to automatically access live and recorded video from the
camera(s) associated with the alarm’s transaction as defined by its
event trigger. Refer to Video Windows - An Overview for window
management information.
In order to view live and recorded video, the DVR must be
online and available, and not serving another request for playback
of recorded video based on this event.
The following windows open: 1) Digital Video Viewer; 2) Video
window(s) displaying the current live view of the camera(s)
associated with the alarm transaction. Each window displays a
dialog box containing the current date and time. For additional
information, click Help on the Digital Video Viewer window.
Alarm Monitor Form Toolbar
Reference Topic:
Alarm Monitor Form Shortcut Menu
Click To
Remove all alarms from the Alarm Monitor.
Remove an individual alarm from the Alarm
Monitor.
Alarm Notifier
Administration Menu
The Alarm Notifier option opens the Alarm Notifier form, allowing you to accomplish the following:
• Assign the alarms/resets that will trigger an e-mail message.
• Assign people who will receive e-mail notification of the alarm condition.
• Format the e-mail message.
Alarm Response Tab
Reference Topic:
Alarm Monitoring Using the Alarm Monitor Form
Alarm Response Form
Use this tab to enter a predefined alarm response. This multi-line dialog box accepts 64 alphanumeric
characters. The responses you create and save will display as selections on the Alarm Monitor Form.
Alarm Routing and Bumping
Administration Menu Item
The Alarm Routing and Bumping option opens the Alarm Routing and Bumping form, allowing you to
do the following:
• Route alarms to one or more Client Groups by time schedule or at all times.
• Bump alarms to one or more Client Groups following a time lapse of an unacknowledged or
unpurged alarm to the Client Groups selected for bumping.
Secure Perfect 6.1.1 User Manual 99

Alarm Routing Client Group Assignment Dialog Box
This dialog box allows you to select and assign Client Groups for this routing record. Only Client Groups
in the operator’s facilities are available for assignment by this operator.
• Select, and then click the right arrow to assign an available Client Group.
• Select, and then click the left arrow to unassign a Client Group.
Click OK to close this dialog box and display the results in the Routing, Client Groups windowpane.
Alarm Selection Tab
Alarm Notifier Form
The Alarm Selection tab allows you to assign alarms in this operators’ facility that will trigger an e-mail
message.
Assigned Alarms:
This windowpane displays any previously assigned alarms.
Assign Alarms
Click Assign Alarms to display the Alarm Assignment dialog box that allows you to select specific alarms
that will trigger e-mail notifications. Click OK and the selected alarms will display in the Assigned Alarms
windowpane.
Transaction Type
Select one or both transaction types that will trigger an e-mail alarm notification.
• Alarm: E-mail notification is sent at onset of the alarm.
• Reset: E-mail notification is sent when an alarm is reset.
By default, no type is selected when you create a new Alarm Notifier record. A transaction type must be
selected in order to save this record.
Alarm Sense Time
This form allows you to add or edit the link between an event and an alarm sense time. The event
determines when and to what value the sense times for all alarms in the group are changed.
• Event: Select an event from the drop-down list. If there are no events listed, you will need to
configure events using the Event Schedule Form.
• New time: Select or enter a sense time. The value is in seconds and indicates the delay
before triggering an associated digital output or sending in a Secure Perfect alarm if the DI
type is Alarm. This number tells the system how many seconds to wait after sensing the input
has changed to Active State. Enter 00 to immediately send the transaction to the host,
notifying the host of a state change. Increase the Sense Time entry if using noisy or
chattering contacts.
Example: This value could indicate the delay time, in seconds, that elapses between the time a door
contact is broken and the time the output and alarms are triggered. If door contact is re-established
before the sense time elapses, the alarm would not come in to Secure Perfect and the output would not
activate.
Secure Perfect 6.1.1 User Manual 100

Alarm Tab
Alarm Form
The Alarm Tab configures the alarm.
Group: Displays the alarm group to which this alarm was assigned. The default is alarm group 0. You
can change to any other alarm group available on that micro, displayed on the drop-down list.
Owner Type: This is a read-only field and displays the object to which the alarm belongs or refers.
• API: Alarm is bi-directional and owned by the external interface.
• Board: Alarm is owned by the microcontroller.
• CCTV Interface: Alarm is owned by an interface.
• Client: Alarm is owned by a Regional Database client.
th
• Digital Input: Alarm is owned by the digital input, such as a motion sensor. (The 11
DI on a
Micro/PX-2000 or M/PXN-2000 is owned by the micro; it is a low-battery alarm from the
micro.)
• Failover: Alarm is owned by the host client.
• Guard Tour: Alarm is owned by a reader or digital input.
• Kalatel Camera: Alarm is owned by a Kalatel camera.
• Kalatel DVMR: Alarm is owned by a Kalatel DVR.
• Micro: Alarm is owned by a micro.
• Reader: Alarm is owned by a reader.
• Region Failover: Alarm is owned by the host Regional Database Server.
Settings:
• Monitor (Alarm, Short, Cut, Reset): If selected, this alarm, when triggered, will display all
alarm conditions available to this alarm on the Alarm Monitor Form. You have the option to
schedule alarm monitoring on the Schedule Tab of this form. If this option is NOT selected
but a schedule is in place, the schedule will monitor alarms only for the time that monitoring
th
is on. (Although the option to monitor is displayed for the 11
DI on a Micro/PX-2000 (low-
battery alarm), an alarm is not generated for Cut and Short.)
An operator can see alarms on the Alarm Monitor Form only for facilities that are currently
active and assigned to the current operator.
The option to monitor an alarm must be selected on the Alarm Form in order for a specific
alarm to display on the Alarm Monitor Form.
Alarms do not display on the Alarm Monitor Form if the selection to monitor an alarm is
removed, even though Alarm Routing and Bumping may be configured.
• Always monitor (Short, Cut, Reset): If selected, this alarm will always display Cut, Short, and
Reset conditions of alarms on the Alarm Monitor Form. Select this option if a schedule
prevents monitoring an alarm/reset condition during certain periods of the day but you still
want Short, Cut, and Reset to be monitored and displayed. (Although the option to monitor is
th
displayed for the 11
DI on a Micro/PX-2000 (low-battery alarm), an alarm is not generated
for Cut and Short.)
• Micro dial host: If selected, an alarm occurring on a dial-up micro, or micros downstream
from a dial-up micro, will cause the micro to dial the host in order to report the alarm.
• Operator acknowledge: If selected, the operator must acknowledge the alarm on the Alarm
Monitor Form before the alarm can be cleared.
• Priority: Select a number from 0 to 9 by clicking on the up and down arrow buttons to the
right of the field. This number indicates the priority of this alarm and tells the system (host) in
which order it should alert the operator should multiple alarms occur at the same time. The
lower the number, the higher the priority; therefore, 0 has the highest priority and 9 the
lowest.
Route alarms to history: If selected, alarm activity is written to the alarm history.
Print alarms: If selected, the alarm history transaction is printed on a selected system parallel/serial
printer when the alarm changes state between alarm and reset. Alarm transactions will print only if the
transaction is routed to the printer and the alarm transaction printer is selected. The selection of the alarm
transaction printer is done on the Client tab of the Client form.
If you modified this record, save before you exit the form.
Secure Perfect 6.1.1 User Manual 101

Alarms Tab - Alarm Routing and Bumping Form
Element Description
Alarms:
This windowpane displays the names of Alarms assigned to
this Routing and Bumping record.
Assign Alarms:
Click to display an Alarm Assignment dialog box that allows
you to assign Secure Perfect alarms to this Routing and
Bumping record.
Alarms Tab
Reference Topic:
Enable Alarm Video Pop-Up
Event Trigger Form
This tab allows you to select alarm(s) and alarm transaction type(s) that will become the source for this
Event Trigger.
Element Description
Transactions
Select one or both options as types of alarm transactions
to trigger an event. The alarm must be set for monitoring.
Alarm: An event is triggered as a result of an alarm.
Reset: An event is triggered as a result of an alarm reset.
Tag Selection
Select one of the Tag Selection options:
None: No tag is sent to the DVR for marking recorded
video or manipulating record rate.
Tag only: A tag is sent to the DVR for marking recorded
video at the camera(s) current record rate.
Tag as event: A tag is sent to the DVR for marking
recorded video and for changing the camera(s) record rate
to its event record rate settings.
Assign Alarms
Click to display an Alarm Assignment window, enabling
you to select and assign/unassign an alarm record for this
Event Trigger record. You can also unassign an alarm for
an Event Trigger.
Auto Pop-up
Select this checkbox to enable an automatic live video
pop-up window when an alarm occurs associated with this
alarm trigger. Additionally, the Enable Alarm Video Popup
must be enabled on the Operations menu. If this operators’
Permission for Digital Video Viewer is not made available,
this option will not activate even though selected here.
Secure Perfect 6.1.1 User Manual 102

Antipassback
Set the antipassback status to neutral for all badges in this micro.
Clicking this icon from the Micro Utility Form toolbar will access this option:
Antipassback Definitions
Antipassback (APB) is an access control feature designed and configured to reduce the chance of users
‘passing back’ their credential to another person attempting to gain access. When readers are designated
as entry (IN) or exit (OUT), the system is able to record whether a user in inside or outside at any time by
noting the last place their credential was used. If the last time it was used was at an IN reader, then the
system knows that they are inside. If the last time it was used was at an OUT reader, then the system
knows that they are outside.
• Active APB does not let a person re-enter unless they first exit. The user is unable to ‘pass back’ their
credential to allow a friend to gain entry.
• Passive APB records the status but does not enforce the status. The system knows where a person is
but does not stop them from entering twice. This type of system is often applied with time and
attendance.
• Tailgating refers to a user following another user through a door without presenting a credential. They
follow closely enough so they can get through the door or gate before it closes. Only the first user is
recorded as IN or OUT.
• Timed APB refers to a system where users are ‘forgiven’ after a certain length of time, configured in
minutes. After the configured time is expired, the user status is set to ‘neutral’ and the system allows
them to re-enter. This eliminates the need for an OUT reader and prevents a badge holder from re-
entering for that time period.
• Global APB tracks the user throughout the entire Secure Perfect network and across all micros. No
matter where a user is, their APB status is recorded.
• Regional APB (Secure Perfect Global Edition Systems) tracks the user within a Region. The user is
active in that Region only and inactive in all other Regions.
Secure Perfect 6.1.1 User Manual 103

APB Region Configuration Tab - Region Form
Use this tab to identify APB IN and APB OUT readers, and configure the APB behavior across Regions.
APB Entering Region: This listbox displays those readers that have been selected as APB IN readers
for the selected Region.
Assign: Click to assign APB IN readers to this region. Only readers previously configured as APB IN
readers are displayed for selection.
APB Exiting Region: This listbox displays those readers that have been selected as APB OUT readers
for the selected Region.
Assign: Click to assign APB OUT readers for this region. Only readers previously configured as APB
OUT readers are displayed for selection.
It may not be required or significant for the micros in a Region to report status to another Region. Select
from one of the following notification options:
1. Retain APB Status Across Regions: This is the default of three status options. If selected, the APB
status is recognized across all Regions in the Secure Perfect Global system. A badge can be
presented at an APB IN reader in one Region and at an APB OUT reader in a second Region. (Enable
Global APB must be selected on the Parameter Form.)
2. Invalidate Badge Across Regions: If selected, this option disables the badge in all other regions
when a person enters the selected Region by presenting the badge at an APB IN reader. The Activity
Monitor displays ‘Invalid APB IN’ or ‘Invalid APB OUT’ if you attempt to enter in or out of any other
Region. When a person exits the selected Region and the badge is presented at an APB OUT reader,
the badge becomes enabled in all other Regions. (Enable Global APB must be selected on the
Parameter Form.)
Example: Employees badging IN at a Miami office are tracked and not allowed to badge IN to another
location until they have presented their badge at an APB OUT reader in Miami.
3. Ignore APB Status Across Regions: If selected, the APB status is local to the selected Region and
status is retained within the Region. Regions are independent of each other and the status is not
recognzed by another Region.
API Connections
Reference Topic:
About Secure Perfect
Administration Menu
This option opens the API Connections form that allows you to define an interface license for external
application integration by assigning a description of the API (Application Program Interface), and then
assigning an application login, password, and host computer.
This option is unavailable if you are not licensed for an API connection.
Secure Perfect 6.1.1 User Manual 104

Appending Archive Databases
If you have a backup of a SecurePerfectArchive 3.x or later database, the data can be restored
using the SP Maintenance Utility. Backup and Restore functions are detailed in the Secure Perfect
Installation Guide.
The SP Maintenance Utility will also append badge history, alarm history, operator history, and where
appropriate, Digital Input history, Zone history, and DVR history data to the current
SecurePerfectArchive database. Current SecurePerfectArchive data will not be affected.
In order to use the Append utility, you must meet the following criteria:
• Backup SecurePerfectArchive files must be restored to a local or mapped network
directory folder.
• Free disk space that equals at least three times the size of your database backup file.
• The ‘sa’ password.
• Sufficient time and patience to complete the procedure.
To append data:
1. Open the SP Maintenance Utility and select Append from the menu bar.
2. Navigate to the Drive on the local computer where the backup file is located.
3. Select the Folder in which the backup file is located.
4. Select SecurePerfectArchive from the Backup Source File list.
5. Drag and drop the backup SecurePerfectArchive file to the Secure Perfect Archive Databases
Only: dialog box.
6. Enter the ‘sa’ password.
7. Click Append.
8. The Append process can take a considerable amount of time, depending on the size of the backup.
During the Append process, the application looks like it is not responding. This is normal.
9. When you have finished using the data, we recommend that you delete the appended data using
the Secure Perfect Parameter Form, Clear Archive tab. This will keep the current
SecurePerfectArchive file from becoming too large in size.
Archiving
Reference Topic:
Backing Up Data
An archive is a history of transactions. The archive is created automatically by Secure Perfect, based on
the time interval that you selected on the Parameters Form (Daily, Weekly, or Monthly). When you select
Weekly, you must also select a day of the week.)
If you select:
• Daily: The archive is appended every day beginning at 11:59:58 P.M.
• Weekly: The archive is appended every week on the day that you select, beginning at
11:59:58 P.M. (You must select a day of the week.) Any change in the scheduling occurs
immediately. For example, if archiving is taking place on Tuesdays and the schedule is
revised to archive on Wednesday, the archiving will occur one day later, on Wednesday.
• Monthly: The archive is appended on the last day of the month beginning at 11:59:58 P.M.
The Secure Perfect services do NOT have to be running. Archiving will occur as long as SQL Server
Agent services are running. Archiving process takes place independently of Secure Perfect. As long as
the SQL Server Agent services are running, the archive process will occur.
Determine the status of the SQL Server Agent service by navigating to Settings, Control Panel, then
Component Services through Windows Explorer. Check the Status of SQLAgent$SPSQL.
Archiving is performed on the database Server computer only.
Archiving creates a copy of the latest history transactions and then removes all the data from the history
Secure Perfect 6.1.1 User Manual 105

database. The data will be appended to the archive database until you decide the archive database has
grown too large.
The factors in determining whether the archive database is too large can be:
• The size of your hard drive.
• The performance you receive when running history reports.
• The length of time you need to keep data.
• Other factors specifically related to your installation.
To remove data from the archive database:
1. BACK UP YOUR SECURE PERFECT ARCHIVE DATABASE! You will have to back up the Secure
Perfect Archive database using utilities provided by SQL Server 2000 or by using the Secure
Perfect Maintenance Utility. After you perform the backup, label and store the media in a safe
place.
If you do not back up the SecurePerfectArchive, you will lose all the data stored in it.
2. Select the Administration menu, then Parameters.The Parameter Form opens with the Settings
tab displayed.
3. Select the Clear Archive tab. The Earliest Date in Archive DB and Latest Date in Archive DB
fields will indicate dates once you have clicked the Show Date button. If you do not have any
records in your archive database, the two date fields will state No Record.
4. Choose the Start Date of the data that you want to remove from your archive database by
selecting the month, then the day to begin your archive.
5. Choose the End Date of the data that you want to remove from your archive database by selecting
the month, then the day to end your archive.
6. Click Delete.
7. Click OK.
The deletion of an archive database is taking place in the background. Progress is indicated on
the status bar in the lower right side of the screen. The process may take hours to complete. The
length of time is dependent on the size of the archive database and the hardware components of
your computer.
8. Upon completion, a message displays: The records from the Archive database has been
successfully deleted! Click OK.
Arm/Disarm an Intrusion Zone
Arm/Disarm an Intrusion Zone Using Access Rights
Any card and keypad reader or keypad within a defined zone can be used to arm and disarm the zone
with a valid access right for the reader and an Intrusion Zone assigned.
Click the Show me icon to view a step-by-step animated demo.
Arm = * 1 # followed by a valid card read.
• If all alarm points are reset (not in an active state of alarm) and all doors closed, then all
readers are placed offline (doors locked) and alarm points are monitored on. The
corresponding Digital Output is fired as selected on the Intrusion Zone Form.
• When the zone is successfully armed, all readers in the zone provide visual indication that
the zone is armed.
We recommend using CASI brand readers, configured to display the PIN light ON or
flashing, depending on the selected reader model. A Zone armed transaction is generated
and displays on the Activity Monitor Form.
• When a zone is not successfully armed due to an invalid zone configuration on the Access
Right Form, an Arm/Disarm Failed, Invalid Access Right transaction is generated.
• If any alarm points are set (in an active state of alarm) or a door is open, the zone does not
become armed. An Arm/disarm Failed Zone not secure transaction is generated and
displayed on the Activity Monitor Form.
Secure Perfect 6.1.1 User Manual 106

Disarm = * 0 # followed by a valid card read.
• All alarm points in the zone are monitored off and readers in the zone are placed online for
normal operation.
We recommend using CASI brand readers, configured to display the PIN light switching
from ON or flashing to OFF, depending on the selected reader model. A Zone disarmed
transaction is generated and displays on the Activity Monitor Form.
• When a zone is not successfully disarmed due to an invalid badge, an Arm/disarm Failed,
Invalid Access Right transaction is generated.
• When a zone is disarmed, all normal access control rules apply for gaining access.
Arm/Disarm an Intrusion Zone Using Arm/Disarm Intrusion DI
All of the same rules apply as if arming or disarming using an access right.
• When the zone is successfully armed, all readers in the zone should provide visual indication
that the zone is armed and a Zone Armed transaction is generated on the Activity Monitor
Form.
• When a zone is not successfully armed, an Arm/disarm Failed transaction is generated.
• When a zone is disarmed, all normal access control rules apply for gaining access and a
Zone Disarmed transaction is generated.
Arrange Icons
Windows Menu
This option allows you to control multiple windows or forms. If you have several forms in progress, you
can temporarily minimize a form from view. Select this option to arrange the minimized form icons across
the bottom of your Secure Perfect display screen.
Assign Micro Phone Numbers Dialog Box
This dialog box allows you to select a micro from the Dial-Up Micro drop-down list and assign telephone
numbers used by this micro to reach the selected backup client.
• Click to display a list of only Dial-Up and Network + Dial-Up micros for the client record
displayed.
• When you select a micro from the drop-down list, the Phone numbers to reach backup client
xxxxxx fields become available for entry (where xxxxxx = name of selected client in the
Backup Clients list box ).
• When you enter a number in the first field, the Save button becomes available.
• All Number fields must contain a telephone number of up to 20 digits. If there is only one
telephone number for this micro to reach the backup client, repeat this number in all four
fields. (If you click Save after completing the first Number field, the system will automatically
complete all Number fields with a duplicate number.)
• Click Save to save the list of telephone numbers. The micro will dial the number in Number 1:
and then try the others in numerical order until connection it made.
• Click Close to exit the dialog box.
• Repeat the process for each micro in the Dial-up Micro drop-down list.
• Click Save to save this client record.
Secure Perfect 6.1.1 User Manual 107

Auto Shutdown of Client Services
Services will automatically shut down when a client closes the Secure Perfect application and meets ALL
of the following criteria:
1. Does not host any micros or DVRs.
2. Does not have any API connections.
3. Is not a Thin Client.
4. Is not a backup client or have any backup clients of its own.
5. Is not a CCTV client.
6. Is not hosting a Guard Tour.
7. Client form Enable Auto Shutdown is selected.
The shutting down of a particular client computer designates that license capacity unused. Now, that
license is available for another computer that can now be designated a Secure Perfect client.
Auto Update
Administration Menu
The Auto Update option opens the SP Auto Update Configuration Form that allows you to configure your
Secure Perfect network computer for automatic notification and installation of the latest Quick Fixes and
Service Packs.
Secure Perfect 6.1.1 User Manual 108

B
Backing Up Data
Reference Topics:
Appending Archive Databases
Archiving
Restoring Secure Perfect Databases
A backup is a copy of selected data. Since Secure Perfect does not contain a backup option, you can use
any method you like to back up the data. Because the Server computer contains the database, there is
no need to back up your Secure Perfect folder on your client computers.
You should keep two sets of backups, of the following Server computer files:
Secure Perfect Data: The data includes the following:
• Database: Contains configuration data such as badges and micros.
• History: Contains current history including badge transactions and operator history.
• Archive: Contains the latest copy of Secure Perfect history data.
• Images: Backup needed if you have Imaging installed. Contains the picture files of badge
holders.
• Signatures: Backup needed if you have Imaging installed. Contains the signature files of
badge holders.
• Graphics: Backup needed if you are using Alarm Graphics. Contains the alarm graphics
maps.
The SP Server program MUST NOT BE RUNNING when you attempt a backup of images,
signatures, or graphics!
You should back up this data more often since it changes so frequently. While your internal policies may
dictate your backup requirements, we recommend that you create a backup at least every week.
Entire Secure Perfect Installation
• The entire Secure Perfect folder should be backed up when you first set up the system and
have confirmed that it is working, and any time you upgrade. It is very important that you also
back up the registry settings. In most backup programs, you will be prompted to back up
these settings.
• ALWAYS MAINTAIN A CURRENT BACKUP. Should you have any problems with your
system, you can always restore your backup.
SP Enterprise Edition Systems use SQL Server utilities to back up the Secure Perfect database,
Secure Perfect History, and Secure Perfect Archive.
Click the Show me icon to view a step-by-step animated demo.
Secure Perfect Professional Edition Systems use the Secure Perfect Maintenance Utility to back up
the Secure Perfect database, Secure Perfect History, and Secure Perfect Archive information (tables and
queries).
Click the Show me icon to view a step-by-step animated demo.
Secure Perfect 6.1.1 User Manual 109

Backup Clients Assignment Dialog Box
This dialog box allows you to select and assign backup clients associated with the selected client. This
list includes only clients available for assignment by the current operator and defined as a client that does
not exceed the limit of micros and DVRs allowed. When you select a client from the list, you will note that
the client statement defines the total combined number of DVRs and micros of the default client and
backup client. (The total number of micros cannot exceed 64. The total number of DVRs cannot exceed
16.)
• Select, and then click the right arrow to assign an available client.
• Select, and then click the left arrow to unassign a client.
Click OK to display results in the Backup Clients list box.
Backup Clients Tab
Reference Topic:
Client Monitoring
Takeover and Recovery Timing
Client Form
This tab displays ONLY at client computers that are licensed for Client Redundancy. Use this tab to
configure your backup clients that would take over the devices in case of a failure at the default client
computer.
Backup Clients:
This list box displays those clients you have assigned to take over control of any nondirect micros and
DVRs in the event of a failure at the default client computer. The order in which the client names display,
determines which client is next in line to take over. The timing of the takeover is a variable. Backup
clients must be online (Secure Perfect services are running). In the event of a failover, the client entry
includes the client computer name, and then the total combined number of DVRs and micros of the
default client and backup client.
• Move Up: Select and click to move this client up the list.
• Move Down: Select and click to move this client down the list.
• Assign: Click to display a Backup Clients Assignment dialog box, listing client computers
found on your Secure Perfect system. Those computers selected and assigned when you
close the dialog box, will display in the Backup Clients list box.
Database Connection Heartbeat
The Secure Perfect system validates communication with backup clients by pinging (sending continuous
broadcast messages). If there is a communication failure between the default client and the backup
client, the backup client looks for a Heartbeat (time stamp in the database) as an indication that the
default client is online and connected. a) If a Heartbeat exists, the default client is "alive" and the backup
client will not initiate takeover of the devices from the default client. b) If a Heartbeat does NOT exist, the
backup client initiates takeover of devices from the default client. The backup client will use the following
values:
• Heartbeat (seconds): Select a computer from the Backup Clients list box and assign an
interval of seconds (the range is 10 to 180) between Heartbeat checks. The default number
is 60 seconds. This number can be reset at any time.
• Heartbeat Retries: Select the number of times (the range is 1 to 3) this backup client checks
for a Heartbeat stamp in the database, before initiating takeover of devices from the default
client. The default number of retries is 2.
Assign Micro Phone #s
This button is only available after completing the following:
• Backup clients have been assigned.
• The currently displayed client is host to Dial-up and/or Network + Dial-up micros.
Secure Perfect 6.1.1 User Manual 110

In the event of a system failure, the micros associated with the failed client must have available telephone
numbers to reach the backup client. Click to display an Assign Micro Phone Numbers dialog box.
Redundancy
Display Redundancy Notification:
By default, this check box is checked. If licensed for Client Redundancy, this check box must be selected
to generate a notification message, that will display at all clients (based on facilities available to the
current operator), when:
• A client failure occurs.
• A device takeover succeeded.
• A device takeover did not succeed. [Select Details button for explanation.]
(If the first-in-line backup client is not available, a second backup client will take over control
of devices and a notification message displays, updating you.)
• Recovery of the default client and transfer of devices failed. [Select Details button for
explanation.]
• Recovery succeeded.
If you clear this check box, you will not receive a notification message; however, indication of a take over
displays on the Client Monitor Form.
Perform Backup on Normal Shutdown: This check box is unchecked or clear by default. Select this
check box to trigger the takeover, by a specified backup client, of devices associated with a client during
a normal shut down.
If your system is not licensed and you are operating in demo mode, this option is not available for
selection.
Backup Region Assignment Dialog Box
A list displays, of available backup Regional Database Server computers.
• Select one or more computer names from the available list and then click the right arrow to
assign.
• Select one or more computer names from the assigned list and then click the left arrow to
unassign.
Click OK to accept the selections and close this window.
Secure Perfect 6.1.1 User Manual 111

Backup Regions Tab - Region Form
Reference Topic:
Backup Region Assignment Dialog Box
Global Editions systems can be configured for database redundancy, at the Regional level. A Regional
Database Server can assign another for backup in the event of a failure at the default Regional Database
Server.
Regional database redundancy and fileserver redundancy operate independently. One or the other, or
both can fail at the same time, whether they reside on the same server computer or are configured to
reside on separate computers. Secure Perfect initiates three tries to fail over to another fileserver. This
process is taking place in the background. After three tries with no success, an SPFileServer interface
attempts to locate an available fileserver. If all attempts fail, the interface generates an alarm.
If you select a failover Regional Server and want your clients to failover to the backup Server, you
must also select the Client Region Failover checkbox on the Client form, Client tab.
Element Description
Backup Regions
This list box displays those Regional Database Server
computers that you have assigned to take over control in
the event of a failure at the default Regional Database
Server. The order in which the computer names display,
determines which Server is next in line to take over.
Move Up
Select and click to move this Regional Server up the list.
Move Down
Select and click to move this Regional Server down the list.
Assign
Click to display a Backup Region Assignment dialog box,
listing available Regional Database Servers found on your
Secure Perfect Global Edition system. Those computers
selected and assigned when you close the dialog box, will
display in the Backup Regions list.
Badge
Personnel Menu
The Badge option opens the Badge Form that allows you to define a badge in the system. The badge
can then be linked to a person record in the system. More than one badge can be assigned to a person.
Badge
Reports Menu
The Badge option opens the Badge Report Form that allows you to create a report on the badges in your
Secure Perfect system.
Secure Perfect 6.1.1 User Manual 112

Badge Alias
Reference Topic:
Badge Alias Form
Personnel Menu
The Badge Alias option displays the Badge Alias Form that allows you to assign an alias number to the
physically encoded badge number (available only if an alias was assigned during installation).
Badge Alias Tab
Badge Alias Form
Use this tab to assign alias numbers to badge encoded numbers.
Encoded Number
Displays the badge’s encoded number.
Badge Alias
If you selected Manual aliasing during installation, enter the new number for the badge.
If you selected Automatic aliasing during installation, the number will be entered for you.
Find Badge
Click to display a Find Badge dialog box, select a reader, and present a badge at that reader. The record
is displayed that is associated with the badge presented.
Click Save.
• Alias badge numbers saved to the system are automatically preceded with a ‘1-‘
• If this is a Global Edition system, the badge alias number is preceded by the Region ID number that
uniquely identifies the Region. Therefore, the same alias number can be assigned across regions,
because the number is uniquely identified by the Region ID.
Badge Assignment Dialog Box
This window displays when you click Assign Tour Badges, enabling you to select and assign tour badges
to a tour.
• Multiple badges can be assigned to a guard tour, but if a badge is assigned to a tour, the
same badge cannot be assigned to any other tours.
• The same badge must be used to complete the entire tour.
• When a badge is assigned to a guard tour, the badge is downloaded to all micros that have
reader type tour points for that guard tour.
• If any reader is assigned as a tour point, at least one badge must be assigned to the tour.
• If all tour points are DIs, you do not need to assign a badge to the tour.
Click OK to display the results in the Tour Badges windowpane.
Secure Perfect 6.1.1 User Manual 113

Badge Definition Tab
Badge Form
Use this tab to define a badge.
Element Description
Assigned to
Select the name of the person to whom this badge is assigned. If this
badge is not yet assigned, select <UNASSIGNED>.
Refresh: Click to update the person list with the most up-to-date
information.
Click the Show me icon to view a
step-by-step animated demo.
Number
This number must be unique to Secure Perfect. It may be already
encoded into the card (if you are using a card) or you can assign a
number in this dialog box no more than 20 digits. This number will be
entered into a keypad reader when there is no card.
If you are using badge aliasing: The alias displays here as a read-only
number and cannot be changed. An alias number is assigned on the
Badge Alias Form. The encoded number will be entered into a keypad
reader.
Status
Only badges with the status of Active will be granted access through
readers.
• Active: The badge has been assigned to a person and may gain
access. An Active badge can be re-assigned as a Guard Tour
badge.
• Guard Tour: The badge has been assigned to a person and will be
used as a guard tour badge. A Guard Tour badge can be re-
assigned as an Active badge.
• Issuable: The badge has not yet been assigned to a person.
• Lost: The badge has been reported as lost.
• Remake: This badge has been damaged.
• Suspended: This badge was assigned to a person who no longer
works at the facility.
PIN Number
If this badge will be used with a badge-and-keypad reader, enter a
personal identification number here. This number will have to be entered
at the keypad in order to gain access with this badge.
This number must be four digits.
• Select this option to enforce ‘Extend Unlock Time’ for this badge
Follow Extend
record. If you assigned this badge to a person from the ‘Assigned to’
Unlock Time
drop-down list, this person is now allowed extra time to gain access
to an entry or exit point in the Secure Perfect system. Time
limitations are configured on the Door Functions tab of the Reader
Form.
• If this badge is being assigned to a person whose existing record
indicates that Extend Unlock Time is enforced, this checkbox will
display as already selected.
Example: An extended time limit beyond normal can be configured for
an employee who enters a motorized door by wheelchair.
Manual Control:
Resets the APB or T&A status of the current badge to neutral.
Reset APB and
T&A Status
Dates Click Calendar to select a date:
Issue: The date the badge was assigned and issued to a person.
Secure Perfect 6.1.1 User Manual 114

Expiration: The first date on which the badge will no longer grant
access. A blank value means the badge never expires.
Return: The date the badge was returned.
Last Valid Access Date: Date the last valid access was granted to the badge, as stored in
the Secure Perfect database.
Time: Time the last valid access was granted to the badge, as stored in
the Secure Perfect database.
Reader: Reader at which the last valid access was granted to the
badge, as stored in the Secure Perfect database.
Find Badge
Click to display a Find Badge dialog box, select a reader, and present a
badge at that reader. The record displays that is associated with the
badge presented.
Badge Design
Personnel Menu
The Badge Design option opens the Badge Design Form that allows you to create or format what will
print on your badge.
Badge Format
Administration Menu
The Badge Format option opens the Badge Format form that allows an operator to design, import, or
export custom badge formats into the micro. Custom magnetic stripe or Wiegand formats can be loaded
to your Secure Perfect system.
Badge Formats in 40-Bit and 55-Bit Wiegand Protocol
4002 - 40-Bit Wiegand Format
The 40 bits of transmission consist of two parity bits and 38 code bits. The first bit transmitted is the first
parity bit, P1; it is even parity calculated over the first 20 bits. The last bit transmitted is the second parity
bit, P2; it is odd parity calculated over the total 40 bits.
Code format:
F = Facility – 0 Digits
B = Badge Number (99.999.999.999 possible) 12 digits
This format was created to enable identical badge identification numbers to be produced in either
S-F/2F or Wiegand mode. These numbers are derived from the 40-bit binary code in the proximity
chip. The badge number is comprised of the 38 least significant bits. The most significant bit is set at
0.
5502 - 55-Bit Wiegand Format
The 55 bits of transmission consist of two parity bits and 53 code bits. The first bit transmitted is the first
parity bit, P1; it is even parity calculated over the first 27 bits. The last bit transmitted is the second parity
bit, P2; it is odd parity calculated over the total 55 bits.
Code format:
F = Facility – 0 digits
B = Badge Number – 16 digits
P = Parity Bit
Secure Perfect 6.1.1 User Manual 115

Badge Format Tab
Reference Topics:
Micro Flash and Micro Parameter Configuration
Badge Formats in 40-Bit and 55-Bit Wiegand Protocol
Badge Format Form
This tab allows you to identify the pattern of the data bits (mask) combination, in the badge numbers that
you will import or export to your micro and store in the Secure Perfect database.
Element Description
Format Type
Select from two data masks.
• Magnetic Stripe: The number is a mask embedded into a magnetic tape
strip and usually adhered to badges or credit cards.
• Wiegand: A pulse-generating mask sensed by a pickup coil (the reader).
This is a complex system to manufacture and virtually impossible to
duplicate making it one of the most secure access control technologies.
The number is a mask of a digital 0 or 1.
Position
Indicates the location or position of the bit where your mouse pointer is
presently positioned, in the mask combination.
• Magnetic Stripe:
Badge data layout
N = Badge or facility/site bit
(B,F,P,0,1)
B = Start character (With few exceptions, the start character is ‘B’ the
majority of the time.)
0 to 9, A, C, D, E. = Constant characters
= Space
• Wiegand: The following characters are acceptable. Also refer to the
Legend group box:
B = Badge identification (BID) bit
F = Facility/site code bit
P = Parity bit (an extra bit added for error detection or integrity testing)
0 or 1 = Constant characters
E = Parity layout - Even
O = Parity layout - Odd
= Space
The following settings apply to Wiegand Format ONLY:
Parity layout 1 (E, O): Indicates the first parity bit in the data mask. The entry must be an even (0) or
odd (a) parity bit.
Parity layout 2 (E, O): Indicates the second parity bit in the data mask. The entry must be an even
(0) or odd (1) parity bit.
Parity layout 3 (E, O): Indicates the third parity bit in the data mask. The entry must be an even (0)
or odd (1) parity bit.
Parity layout 4 (E, O): Indicates the fourth parity bit in the data mask. The entry must be an even (0)
or odd (1) parity bit.
Number of facility
The number of facility code bits in the data mask.
characters:
Numbers of badge
The number of badge number (BID) bits in the data mask.
characters:
Secure Perfect 6.1.1 User Manual 116

The following applies to all formats:
Import format from file This selection is enabled when you click New to add a new record. Click to
navigate to a network drive, CD, diskette, or a local drive of your computer
and import a Wiegand or magnetic stripe file.
(Example Wiegand File Name: *.wgd)
Export format to file
Click to navigate to a network drive, CD, diskette, or local drive of your
computer and export a Wiegand or magnetric stripe file.
Comments:
Enter text as an explanation or details of this procedure. The field accepts
256 characters.
Badge History
Reports Menu
The Badge History option opens the Badge History Report Form that allows you to create a report
based on the history of badge transactions in the system.
Secure Perfect 6.1.1 User Manual 117

C
Calendar Dialog
Select the day, month, and year of badge issue, return, or expiration. Click OK to accept the selected
date and close the form. Click Cancel to close the Calendar form without making any changes. Click
None to clear the date currently in the field.
Camera
Device Menu
The Camera option displays the Camera Form that allows you to edit the parameters of the selected
camera record. Camera records are automatically created when a DVR is defined.
Camera Preset
Administration Menu
The Camera Preset option opens the Camera Preset Form that allows you to label a preset camera
position and assign a number to that preset.
Camera Preset Assignment Dialog
A list of available camera presets displays. These presets were previously defined on the Camera Preset
Form.
• Select one or more presets from the available list and then click the right arrow to assign.
• Select one or more presets from the assigned list and then click the left arrow to unassign.
Click OK to accept the selections and close this window.
Can I Customize the Toolbar?
No. The toolbar cannot be customized.
Cascade
Window Menu
The Cascade option allows you to control multiple windows or forms. If you have several forms open but
not visible, select this option for a cascading view of your forms with the active form taking precedence on
the display screen.
Secure Perfect 6.1.1 User Manual 118