Packard Bell EN TM80 – page 7

Packard Bell
EN TM80

Manual for Packard Bell EN TM80

CCTV Alarm

Administration Menu

The CCTV Alarm options opens the CCTV Alarm Form that allows you to link CCTV alarms to Secure

Perfect alarms so that Secure Perfect alarms trigger CCTV events and display on the Secure Perfect

Alarm Monitor Form.

This form is NOT used in the Kalatel Integrated Digital Video option. It is only applicable in the serial

CCTV interface.

CCTV Alarm Assignment

This dialog box allows you to select and assign CCTV alarms to Secure Perfect alarms. Only CCTV

alarms in the operator’s facilities are available for assignment by this operator.

Select, and then click the right arrow to assign an available alarm.

Select, and then click the left arrow to unassign an alarm.

CCTV Tab

Alarm Form

Select this tab to assign CCTV alarms to Secure Perfect alarms. The windowpane displays the CCTV

alarms already assigned to this alarm.

Add/Remove: Click to display the CCTV Alarm Assignment dialog box that allows you to add or remove

items from the list.

CCTV Tab

CCTV Alarm Form

Use this tab to set up a CCTV alarm.

CCTV Interface: Select the Interface from the drop-down list. If there is no interface listed, then it has not

been installed.

CCTV Alarm: Select the alarm number from the drop-down list. When you assign a number, an enable

and disable message is automatically generated.

Enable Message: An enable message is automatically generated when you select a number

in the CCTV Alarm field. You can edit these messages, but any changes to the CCTV alarm

number will overwrite the changes to this message.

Disable Message: A disable message is automatically generated when you select a number

in the CCTV Alarm field. You can edit these messages, but any changes to the CCTV alarm

number will overwrite the changes to this message.

Reset CCTV Alarm:

When the Secure Perfect alarm is cleared from the Alarm Monitor: Select this option if you

want the CCTV alarm to reset when the alarm is cleared from the Secure Perfect Alarm

Monitor.

When the Secure Perfect alarm Resets: Select this option if you want the CCTV alarm to

reset when the alarm is reset in SP.

Change Password

Operations Menu

The Change Password option opens the Change Password Dialog Box that allows you to change your

password.

Secure Perfect 6.1.1 User Manual 119

Change State

If the micro is currently online, this will change the state to offline. If the micro is offline, this will change

the state to online.

Each time a micro is set to online, the database must be downloaded to the micro. If a new micro

database is required, click Download Database as well as Download Badges for the selected micro.

Download Database:

Download Badges:

Check for Update

Reference Topic:

SP Auto Update Configuration Form

File Menu

This item is enabled when the Enable Auto Update option is selected on the SP Auto Update

Configuration Form of the Administration menu.

Each time you log in, your Secure Perfect system checks for updates. Also, at any time, you may select

this item to begin a search of the configured Web site for updates to the Secure Perfect system. This

process searches for new upgrades, compares the version, and if the patch or update needs to be

applied, a dialog box displays a message.

Click OK to close the dialog box and begin the update process.

Click Cancel to close the dialog box and process the upgrade at another time.

If the Web site cannot be reached, a message informs you that communication failed. Recheck your

update configuration settings and try again.

If no new updates are available for your system, a message displays informing you that your system is

up to date.

Clear Archive Tab

Reference Topic:

Archiving

Appending Archive Databases

Parameters Form

Earliest Date in Current Archive DB: If you have an archive database, this date displays when you click

Show Date.

Latest Date in Current Archive DB: If you have an archive database, this date displays when you click

Show Date.

Show Date: If you have an archive database, click Show Date.

The Earliest Date in Current Archive DB and Latest Date in Current Archive DB will display.

If you do not have an archive database, the two date fields will state No Record.

Secure Perfect 6.1.1 User Manual 120

Archive Clean Period:

Start Date: Select the Start Date of the data that you want to remove from your database by

selecting the month, then the day to begin your archive.

End Date: Select the End Date of the data that you want to remove from your database by

selecting the month, then the day to end your archive.

Delete: Press after selecting Start Date and End Date to remove from your database.

The deletion of an archive database takes place in the background. Progress is indicated on the

status bar. This may take hours to complete and is dependent on the size of the Archive database and

the hardware components of your computer.

Clear Button

This option clears all badge transactions from the Activity Monitor Form.

Clicking this icon from the Activity Monitor Form toolbar will access this option:

Clear Search

Search Menu

The Clear Search option clears all data in the current form. Use this option when the form has data and

you want to begin a new search. The option does not conduct a search nor does it affect any data in the

database. It only clears data from the form in preparation for a search or to cancel a change to a record.

The Clear Search option is available only when a form that contains records is open.

Clicking this icon from the Secure Perfect toolbar can also access this option:

Client

Administration Menu

The Client option opens the Client Form that allows you to merge a client computer to your Secure

Perfect system.

Client Assignment Dialog Box

This dialog box allows you to select and assign Secure Perfect client computers to a Client Group. Only

clients in the operator’s facilities are available for assignment by this operator.

Select, and then click the right arrow to assign an available client.

Select, and then click the left arrow to unassign a client.

Click OK to close this dialog box and display the results in the Clients windowpane.

Client Group

Administration Menu Item

The Client Group option opens the Client Group form, allowing you to assign Secure Perfect client

computers into logical groups. A comment box is available for entry to describe the configuration. Later,

client groups can be assigned to specific alarm routing and bumping configurations.

Secure Perfect 6.1.1 User Manual 121

Client Group Tab - Client Group Form

On this tab, you must assign at least one Secure Perfect client computer in order to save this Client

Group record.

Element Description

Clients:

This windowpane displays the names of client computers

that are assigned to this Client Group.

Assign Clients

Click to display a Client Assignment dialog box that allows

you to assign Secure Perfect clients to this Client Group.

Comments

Use this field to describe the reason for creating this group or

special considerations for this configuration. This field

accepts 256 characters.

Client Monitor

Operations Menu

The Client Monitor option opens the Client Monitor Form that allows you to obtain client information

such as client type, Imaging status, and connection status. The shortcut key combination for the Client

Monitor Form is CTRL+C.

Clicking this icon from the Secure Perfect toolbar can also access this option:

Secure Perfect 6.1.1 User Manual 122

Client Monitor Form Shortcut Menu

Reference Topics:

Client Monitor Form Toolbar

Client Form

Element Description

To disconnect the selected client.

Disconnect

To launch and enable a CCTV interface (other than integrated CCTV).

Launch

To display the Client Form, to add a client to the Secure Perfect network.

Client Form

To initiate recovery of a host that failed, was taken over by a backup client,

Recover

and is now able to host its original devices. When the default client is running,

a manual intervention is required to bring all its devices back to itself.

This option is enabled and available ONLY on the shortcut menu of the

default host that is now ready to be recovered.

- A notification message informs you of a successful recovery. Control of

devices is returned to the default host.

- A notification message informs you of an unsuccessful recovery. Verify

communication with the default host and retry the recovery.

To initiate recovery of a Regional Database Server host that failed, was taken

Recover Region

over by a backup Regional Server, and is now able to host its database.

This option is enabled and available ONLY on the shortcut menu of the

default host that is now ready to be recovered.

- A notification message informs you of an unsuccessful recovery.

To display the Manual Control form, for this operator to manually perform

Manual Control Form

operations on the system.

Client Monitor Form Toolbar

Reference Topics:

Client Monitor Form Shortcut Menu

Click To

Disconnect the selected client.

Enable a CCTV interface (other than integrated

CCTV).

Secure Perfect 6.1.1 User Manual 123

Client Redundancy Overview

The Secure Perfect software system is responsible for processing alarm and badge transactions from

devices like micros and DVRs. The software is responsible for writing these transactions to the database.

A device such as a micro or DVR is hosted by a single Secure Perfect client. The client could potentially

be responsible for hundreds of devices and can be a single point of failure. Although devices like the

micro are designed to run without the host software running for days, eventually memory is going to be

filled up at the micro end. The redundancy feature in SP 6.0 is designed to address this condition. Clients

can be configured to be backed up by other clients so that, in case of the default hosting client (called the

primary client) being disabled, one of the backup clients takes over all its devices. This is designed to

work automatically without any operator intervention so the system continues to work efficiently. One of

the backup clients performs the role of the default client until the default client is back up and running.

The devices that can be taken over at present are all DVRs, network micros, dialup micros, and network

+ dial up micros. Direct micros cannot be hosted by any other than the default client computer.

The table below will assist you to find the areas in this Help system, relating to the redundancy feature.

Reference Topics:

Configuring Client Redundancy:

Am I Licensed for Client Redundancy? About Secure Perfect

How do I configure backup clients for redundancy? Backup Clients Tab

What micros are supported?

Backup Clients Tab, Assign Micro Phone #s

What are the limits on micros and DVRs? Backup Clients Tab

What is not permitted? Backup Clients Tab

When a Failover Occurs:

Messages Displayed

Backup Clients Tab, Display Redundancy

Notification

Client Monitoring

Client Monitoring, Active Client

How long should I wait when a failover occurs?

Backup Clients Tab , Database Connection

Heartbeat

What alarms display on the Alarm Monitor?

Alarm Tab

What is the behavior on the Digital Video Viewer

and Network List?

Digital Video Viewer

Recovery:

Recovery Notification Messages

Backup Clients Tab, Display Redundancy

Notification

Client Monitoring Client Monitoring

How do I recover? Client Monitor Form Shortcut Menu

What happens when a default client is back up?

Backup Clients Tab, Display Redundancy

Notification

What is the timing on the recovery? Takeover and Recovery Timing

Secure Perfect 6.1.1 User Manual 124

Client Tab

Client Form

Element Description

When creating a new client record, click Browse to display a Select Client

PC Name

window, listing all computers found on your network by PC name. (Secure

Perfect uses PC names only.) To add a client, select the computer name from

the list and click OK. You can add as many clients as you want but you are

limited to the number of licensed clients connected to the network at one time.

The number of client licenses presently active and connected to the Secure

Perfect system can be found on the Client Monitor form.

By default, when an existing client record displays, PC Name is read-only and

not available for edit

Client computers to which devices are associated, cannot be deleted. The

devices must be removed or assigned to another client before this client can

be deleted.

Client computers assigned as backup clients cannot be deleted. You must first

un-assign this client from the Backup Clients list on the Backup Clients tab,

and then delete.

OS Type

When adding a Secure Perfect client to your system, accept the default OS Type

as Windows. When conducting a search, select either Windows or CCTV from

the drop-down list.

Region

This field is available only when you first open the Client form, and BEFORE you

initiate a Search. To locate a particular Server or client, you are able to select a

Server name from the Region drop-down list. The field default displays the

Database Server computer name. The clients associated with the selected

Region display in the right windowpane. (If you click Search immediately after

you open the Client form, this field displays the default Server name and is

unavailable for selection.)

Disabled: Select if you want to disable Imaging in order to enable another

Imaging Status

client computer.

Enabled: Select to enable Imaging here but you are limited to the number of

licensed Imaging stations enabled at one time. The number of Imaging

licenses presently active can be found on the Client Monitor form.

Thin Client

A Secure Perfect client computer can also be a thin client. A thin client has

Status

Terminal Services and/or Citrix Server software installed. If the Secure Perfect

client has Thin Client Status of Enabled, other computers can connect to the

Terminal or Citrix Server on the Secure Perfect client and run Secure Perfect.

Disabled: Select if you want to disable the thin client option.

Enabled: Select to enable the thin client option at this Secure Perfect client.

The number of thin clients you can enable is controlled by the number of thin

client licenses you have. Refer to the Client Monitor form, which displays the

number of thin client licenses presently available and in use.

Auto Logoff

Select the number of minutes the system will wait since the last action was taken

before logging off the current operator. To turn off the auto logoff feature and

remain permanently logged in, enter 0 (zero). The default setting is 20 minutes.

You must restart the Secure Perfect client program for changes to the Auto

Logoff selection to take effect.

Display Alarm

Enable this field if you want an alarm dialog box to display whenever an alarm

Notification

occurs, based on facilities available to the current operator.

Secure Perfect 6.1.1 User Manual 125

Client Region

This checkbox displays only on a Global Editions system.

Failover

This checkbox is applicable to Secure Perfect Global Edition systems. When

displayed, the default state of this checkbox is selected and grayed out. If a

database failure occurs at the default Regional Database Server, this client would

automatically fail over to a configured backup Regional Database Server.

Backups are configured on the Region Form, Backup Regions tab.

Click the checkbox to clear and disable the automatic failover option. You might

choose to clear this checkbox to prevent nonessential client failover.

Enable Auto

Secure Perfect services will automatically shut down when a client closes the

Shutdown

Secure Perfect application and meets all the Auto Shutdown criteria.

Ping Time

Interval: This is the interval of time a broadcast message will be sent,

(msec)

indicating a client is online. (Default is 40,000. This field will not accept an

entry less than 5,000 msec.)

Timeout: The amount of time that will elapse between broadcast message and

response before the system considers a client offline. The client status will

display on the Client Monitor form. (Default is 120,000. This field will not

accept an entry less than three times the Interval amount specified.)

ACTIVITY PRINTING

CAUTION: Windows 2003 or Win/XP Professional Operating Systems: If the printer you have

selected is hosted by a computer running a Windows 2003 or Win/XP Professional operating system,

you must add permissions to share this printer to the Secure Perfect network. At the host computer,

navigate to your printer property settings. On the Security tab, add ANONYMOUS LOGON or

NETWORK to the Security permissions.

Printers can be connected to the Server or any client computers. The defaults of the activity printer

selections are cleared on any newly configured system. Any system with a newly converted database

will require reconfiguration of these activity printer selections at each client workstation.

Alarm and

You must enable, select a printer, and route alarms to a printer in order for

Guard Tour DI

alarm activity to print.

Activity Printing

Enable: Select this check box to print alarm activity. If you select to enable

alarm activity printing, you must select a printer in order to save this record.

Printer: Displays the currently selected printer to which alarm activity will

print. This may be the same or a different printer than that used for badge

transactions.

Select Printer: Click this button to select a printer to which alarm activity will

print.

Print Alarms At Host must be selected on the Alarm Form in order for alarm

activity to print.

Badge and Zone

You must enable, select a printer, and route badge activity to a printer in order

Activity Printing

to print badge transactions.

Enable: Select this check box to print badge activity. If you select to enable

badge and zone activity printing, you must select a printer in order to save

this record.

Printer: Displays the currently selected printer to which badge transactions

will print. This may be the same or a different printer than that used for alarm

activity.

Select Printer: Click to select a printer to which badge transactions will print.

1) Printer options must be selected on the Reader Form in order for badge

transactions to print. 2) All zone activity transactions print and do not follow

routing or schedules assigned to a reader.

Secure Perfect 6.1.1 User Manual 126

Comments Tab

Micro Form

This tab and windowpane are provided to enter information about this micro, such as location data.

Communication Settings Tab

Reference Topic:

Dial-Up Troubleshooting

Parameters Form

Use this tab to select the modems that will be used for dial-up micros.

Installed Modems: Displays all modems currently installed on the PC. To designate a modem for use

with a dial-up micro, enable it by clicking in the box to the left of the modem name so that a check

displays. If you have a modem installed for support use, DO NOT SELECT THAT MODEM.

Disconnect After Idle: Select the number of minutes you want the system to wait before disconnecting

from the micro when the connection is idle (there is no history or database information being exchanged).

If you select 0, the connection will remain active indefinitely and the host will never drop communication

with the micros.

Network Port Range:

If you communicate with your micros over a local intranet, this does not apply. Ignore these

remarks.

If you must cross a firewall to communicate with your micros, you will need to read the

following:

Low end:/High end: You will be required to open up a range of ports sufficient to support the number of

micros with which you must communicate outside a firewall. The first ten port addresses are reserved for

client-to-client communication. Anything beyond the first ten port addresses can be used for micro

communication.

Example Addresses:

Default Low end: 6700

Default High end: 6709

(These are the 10 internal port addresses reserved for client-to-client communication.)

Change High end: to: 6710 = Assign address to 1 micro outside the firewall.

6711 = Assign addresses to 2 micros outside the firewall.

6712 = Assign addresses to 3 micros outside the firewall.

Communications Settings Tab

Digital Video Recorder Form

Use this tab to assign or edit a TCP/IP address, PTZ control, event tagging, and clock time

synchronization.

TCP/IP Address

Assign or edit the TCP/IP network address for the DVR.

PTZ Control

Select TCP/IP or None. The default is None. TCP/IP is to be selected if cameras with PTZ capability are

configured on this DVR and require control from SP. None is to be selected if all cameras on this DVR

are either fixed or if no control of PTZ cameras is desired.

Secure Perfect 6.1.1 User Manual 127

Event Tagging

Select TCP/IP or None. The default is None. Select TCP/IP if event triggers are required to tag recorded

video upon activity from defined readers and alarms. Select None if no tagging of recorded video is

required for event triggers and only access to live video is desired upon activity from defined readers and

alarms.

Time Sync Interval

The DVR date and time clock can be syncronized by its host computer to ensure that access control,

alarm, and video events across the entire system are time stamped in sync. When DVRs on a centralized

system reside in different time zones, the DVRs should be hosted by computers in their same time zone.

The Secure Perfect hosting computers will synchronize their DVR clocks at the interval selected as well

as immediately manage any system date and time changes including daylight savings time. Select one:

None (default)

1 Hour

4 Hours

8 Hours

12 Hours

24 Hours

If DVRs are required to be synchronized with the Secure Perfect system date and time clock, 12 Hours is

a recommended setting for most systems.

Conditions of Mass Update

The time to process a mass update depends on your system performance, number, and type of

updates. Specifically, the badge learn and alarm processing functions may be influenced. We

recommend that you schedule mass update processing during off-peak hours for your company.

GE Security has set 200 as the default maximum number of records that can process

updates at one time. However, this number is configurable. Call GE Security Customer

Support for assistance if you want to reconfigure the default.

ONLY those fields or dialog boxes that are available for mass update changes are enabled in

Mass Update mode.

Navigating from any form to another form in Mass Update mode will take that form out of

Mass Update mode.

Person Form:

The following fields are available for mass update: Facility, Personnel Type, Department, and

Access Rights.

Badge Form:

The following fields are available for mass update: Assign To, Status, Dates – Issue, Dates –

Expiration, and Dates – Return.

When changing an assigned badge to unassigned, the status automatically changes to

Issuable.

When changing status to Issuable, a message displays a Yes or No option. If Yes, the status

automatically changes to Issuable and selected badges are unassigned.

When changing an unassigned badge (status is Issuable) to an assigned person, the status

changes to Active.

Records selected for mass update with a status changing to anything other than Issuable will

cause a check for badge assignment.

If any badge in the mass update selection is not currently assigned, these badge records

become unavailable and a message displays indicating they are unavailable.

Secure Perfect 6.1.1 User Manual 128

Create Default Template

File Menu

Select this option to create a default Report template. This option is available only when a Report Form is

displaying.

If a specific date is part of this template, whenever this report is run, it will use that date; therefore, it is

important to update the calendar criteria as needed.

Creating a Dial-Up Micro Record

Reference Topic:

Records Generation

Set up your modem(s) through the Server or client computer’s operating system. Refer to the

documentation you received with your modem.

1. Select the Administration menu, then select Parameters.

2. Select the Communication Settings tab, and enable the modem(s) that will be used for micros. You

will need to stop the SP Server computer and then restart it.

3. Once you restart Secure Perfect and log in, select the Device menu, then Micro.

4. On the Micro Definition tab, default values will be filled in for the following fields: Head of line and

Badge Loading.

Enter the address of the micro.

Enter the type of micro.

If this micro is the first micro on a string of micros, select Yes under Head of line. Otherwise,

select No and select the head of line micro. If this is a downstream micro that you are adding,

the micro directly upstream (towards the host) from it will need to be reset in order for it to

recognize the micro you are adding.

Example:

If your line of micros looks like this:

Host – Micro 1 – Micro 2

And you want to add Micro 3 to the end of the line so that it now looked like this:

Host – Micro 1 – Micro 2 – Micro 3

Then you would need to reset Micro 2 in order for Micro 3 to be recognized.

For Connection type, select Dial-up.

Select a Badge Loading method.

5. On the Password tab, if you do not enter passwords, the default passwords (one-1, two-2, three-3,

and four-4) are used. If you want to change the passwords, you may do so at any time.

6. On the Time Zone tab, verify and adjust time zone settings as necessary.

7. On the Comments tab, you may enter any information you want or leave this tab blank.

8. On the Events tab, you may want to schedule when APB and T&A are reset and when the host

dials the micro. If you select an event for the Dial field (host dials the micro), you must stop and

restart the SP Server before the host will recognize the event settings.

9. Select the Status tab to view information about the micro such as the firmware version. You can

request the latest information by clicking Refresh.

10. On the Settings to Reach Host tab:

Enter the telephone number(s) that the micro will dial to reach the host.

Enter the interval at which the micro will automatically dial the host.

Enter the number of times the micro will try the same number.

Enter the number of intervals that the micro will wait before trying a telephone number again.

11. On the Settings to Reach Micro tab:

Enter the telephone number(s) that the host will dial to reach the micro.

Enter the interval at which the host will automatically dial the micro.

Enter the number of times the host will try the same number.

Enter the number of intervals that the host will wait before trying a telephone number again.

Secure Perfect 6.1.1 User Manual 129

12. On the Micro Configuration tab, select the boards that are in the micro you are setting up. Click the

desired board in the Boards and drag to the Configuration column. To delete a board from the

Configuration column, select then right-click and select Delete.

13. Click Save to save the record. If there is any required information missing, a message will display

listing those items that are incorrect or missing. Do not forget to save the record again once you fix

those items.

14. When the micro record is created, the records for the associated readers, alarms, alarm groups,

digital outputs, and digital output groups are also created with default data based on the boards you

added on the Micro Configuration tab.

15. Use the Micro Utilities Form to set the micro online.

Creating a Direct-Connect Micro Record

Reference Topic:

Records Generation

1. On the Micro Definition tab of the Micro Form, default values will be filled in for Head of line and

Badge Loading. Complete the following:

Enter the address of the micro.

Enter the type of micro.

If this micro is the first micro on a string of micros, select Yes under Head of line. Otherwise,

select No and select the head of line micro. If this is a downstream micro that you are adding,

the micro directly upstream (towards the host) from it will need to be reset in order for it to

recognize the micro you are adding.

Example:

If your line of micros looks like this:

Host – Micro 1 – Micro 2

And you want to add Micro 3 to the end of the line so that it now looked like this:

Host – Micro 1 – Micro 2 – Micro 3

Then you would need to reset Micro 2 in order for Micro 3 to be recognized.

For connection type, select Direct.

Set Host keep alive time interval.

Enter the PC name of the host computer or navigate and select.

Select a method.

2. On the Password tab, if you do not enter passwords, the default passwords (one-1, two-2, three-3,

and four-4) are used. If you want to change the passwords, you can do so at any time.

3. On the Time Zone tab, a default time zone is filled in. Verify and adjust time zone settings as

necessary.

4. On the Comments tab, enter any information you want or leave blank.

5. On the Events tab, you may want to schedule when APB and T&A are reset.

6. Select the Status tab to view information about the micro such as the firmware version. You can

request the latest information by clicking Refresh.

7. On the Micro Configuration tab, select the boards that are in the micro you are setting up. Click the

board you want and drag to the Configuration column.

8. To delete, select a board from the Configuration column, right-click and select Delete.

9. Click Save. If there is any required information missing, a window will display listing those items

that are incorrect or missing. Don’t forget to save the record again once you fix those items.

10. When the micro record is created, the records for the associated readers, alarms, alarm groups,

digital outputs, and digital output groups are also created with default data based on the boards you

added on the Micro Configuration tab.

11. Use the Micro Utility Form to set the micro online.

Secure Perfect 6.1.1 User Manual 130

D

Database Tab - Reports

Alarm History, Badge History, Zone History, DI History, Time and Attendance, or Operator History

Reports

Use this tab to select the history database to use for this report. The file name displayed on the tab is the

currently selected archive database.

Select archive database: Click to select the archive history database.

Use default: Click to use the current history database.

Database Utilites

The Integrity utility runs automatically, following a database creation or conversion and upgrade from a

previous version of Secure Perfect. No user interaction is required.

The utility can be run manually if you want to check your database integrity. The system compares and

validates the integrity of your database schema. If selected, the system will automatically correct missing

or incorrect schema properties such as columns, keys, constraints, indexes, triggers, and tables. The

executable file is installed with Secure Perfect and resides in the Secure Perfect program folder.

1. Locate and double-click the DatabaseIntegrity.exe file to manually run the utility.

2. Enter the Server Name or click the browse button and navigate to the appropriate Server Name.

3. Enter the SQL system administrator ‘sa’ Database Password or accept the encrypted database

password of the default Server.

4. Click Connect to locate and connect to the Secure Perfect databases. The remaining selections are

now enabled. Accept the default options or review and disable selections.

5. Select one of two options:

Verify that Check Database Integrity is selected.

OPTIONAL: Select the Autocorrect checkbox. This feature runs only once and

corrects obvious schema in the database. Results display in a report.

Autocorrect is not available on a Global Edition system.

Select which databases to check.

Select Start to begin. Wait as the Database Integrity tool compares and validates the

integrity of your database. Messages generate to an IntegrityCheck.html file in

your Secure Perfect application Logs folder.

OR

Select Unlock Database Mutex to unlock the shared resource. Select Unlock to

unlock the database mutex for SPSQL.

6. Click OK when the Application Success window displays.

Secure Perfect 6.1.1 User Manual 131

7. Click View Integrity Report to review the messages generated to an IntegrityCheck.html file in your

Secure Perfect application Logs folder. Review the file to determine if database errors were detected.

OR

Click Close to close the window and exit.

The Replication tab is applicable to systems that have Secure Perfect Global Edition installed. We

recommend that you call GE Security Customer Support for assistance in setting the parameters for the

Global Edition database replication.

Date Range Tab - Reports

Roll Call, Alarm History, Badge History, Zone History, DI History, Time and Attendance History, or

Operator History Reports

Use this tab to select a date and time range on which to base this report.

Daily time range: Will report on transactions that occurred between the start and stop time

each day in the date range. For example, you select a start time of 8:00 a.m., a stop time of

5:00 p.m., a start day of April 1 and a stop day of April 5. You will receive a report of badge

transactions occurring between 8:00 a.m. through 5:00 p.m. each day of the day range.

Continuous time span: Continuous will report on transactions that occurred between the start

time on the start day to the stop time on the stop day. For example, you select a start time of

8:00 a.m., a stop time of 5:00 p.m., a start day of April 1 and a stop day of April 5. You will

receive a report of alarm transactions occurring between 8:00 a.m. on April 1 through 5:00

p.m. on April 5.

Start Date: Select the start date range by clicking the desired day on the calendar. To move

ahead or back by a month, click the arrows on either side of the name of the month. To move

ahead or back by a year, click the arrows on either side of the year.

Start Time: Accept the default start time as displayed or enter a start time.

Stop Date: Enter an end date range by clicking the desired day on the calendar. To move

ahead or back by a month, click the arrows on either side of the name of the month. To move

ahead or back by a year, click the arrows on either side of the year.

Stop Time: Accept the default stop time as displayed or enter a stop time.

Definition Tab - Alarm Routing and Bumping Form

This tab allows you to configure the routing of alarms to selected Client Groups according to a schedule

or at all times. Additionally, you can select Client Groups and set a time to bump the alarm to an

additional location.

You can configure both Routing and Bumping, only a Routing record, or only a Bumping

record.

Client Groups can be part of any Region in a Secure Perfect Global Edition system.

Element Description

ROUTING:

Client Groups

This windowpane displays the names of Client Groups

assigned to this Routing record.

Assign Client Groups

Click to display an Alarm Routing Client Group Assignment

dialog box that allows you to assign Secure Perfect Client

Groups to this Routing record.

Select one of the following options:

Always

Select this option if you always want this Client Group to

receive alarms.

Time Schedule

Select this option to enable the Time Schedule drop-down list

and then select a Time Schedule from the list.

Secure Perfect 6.1.1 User Manual 132

BUMPING:

Client Groups

This windowpane displays the names of Client Groups

assigned to this Bumping record. Typically, the Client Groups

displayed here are different than those assigned to Routing.

Assign Client Groups

Click to display an Alarm Bumping Client Group Assignment

dialog box that allows you to assign Secure Perfect Client

Groups to the Bumping record.

Time To Bump:

Minutes

Select the number of minutes to wait before bumping this

alarm notification to an additional location, if the alarm is not

acknowledged or purged at the Routing work station. The

Alarm Monitor form will indicate that this alarm is bumped.

The minimum setting is one minute. The default and

maximum is 30 minutes.

Seconds

Select the number of seconds to wait before bumping this

alarm notification to an additional location. The default is

zero.

Comments

Use this field to describe the reason for creating this record

or special considerations for this configuration. This field

accepts 256 characters. It is not necessary to complete an

entry in this field.

Definition Tab - API Connections Form

Enter information that defines an interface license for external application integration to Secure Perfect.

Application Login: Enter the login used by the external application to connect and access the API. Each

login must be unique.

Password: We recommend a noncryptic password. The password must be greater than four

alphanumeric or wildcard characters, with no spaces. The password is NOT case sensitive.

Confirm Password: Enter the password a second time.

PC Name: From the drop-down list, select the Secure Perfect computer that will host the external

application.

Definition Tab - Camera Form

This tab displays the camera channel address, with which DVR this camera is associated, and camera

type configurable for Fixed or PTZ. The camera can be enabled or disabled for viewing and managing

from within SP. Use this form to edit the parameters of the selected camera record.

Address

This is a read-only field. The address of the camera is automatically assigned. The address is a 2-digit

number that corresponds to the camera channel on the back of the DVR.

DVMR

This is a read-only field. This field displays the corresponding DVR with which this camera is associated.

Camera Type

Select a type of camera behavior as Fixed or PTZ from the drop-down list.

Enable Camera

By default, this checkbox is selected. The camera can be enabled or disabled for viewing and managing

from within Secure Perfect and setting accessibility from the Digital Video Viewer. Disabled cameras will

not display on the Digital Video Viewer.

Secure Perfect 6.1.1 User Manual 133

Definition Tab - Camera Preset Form

Preset

In this text field, enter a number within the range of 1 to 32. This number will only reference the preset

number programmed and stored in a camera with PTZ capability. Click Save. This preset is now

available for assignment, to a specific camera.

Definition Tab - Digital Video Recorder Form

Use this tab to assign or edit a bus address, type, host computer, or poll time.

Field Description

DVR

Enter a DVR Address, a unique Secure Perfect logical address

Address

associated with this DVR (from 1 to 255). This field will not be

available to edit existing records. This number is used in Secure

Perfect software to uniquely identify the DVR and its related

records.

DVR Type

Select a DVR type from the drop-down list. Secure Perfect currently

supports: 4, 10, and 16-camera channel multiplexer/recorder

models from Kalatel. This field will not be available for edit on

existing records. When you click Save, the number of camera

records will be created equivalent to the type of DVR you selected.

Bus

The bus address is a 2-digit field in the range of 1 to 32. The bus

Address

address refers to the physical DVR device address on the RS-485

bus and must be entered when multiple DVRs exist on a single bus

and/or for controlling camera(s) with PTZ capability.

Host

Select a Default Hostname from the drop-down list that will host

Computer

the defined DVR and act as its communications server.

If the Default Hostname computer is in a failover condition, you

cannot re-assign this DVR to any other Host computer except the

Active Client that is presently hosting this device.

Enter Poll Interval as the length of time in seconds that will

Poll Time

elapse prior to a staus request being sent to the DVR for

(seconds)

verification of communications and processing of error and/or

alarm messages since the last poll.

Enter Timeout as a length of time to wait for a response after a

request prior to retrying (if no response has been returned).

Enter Retry Interval as the length of time to wait between

retries.

Enter Retry Count as the number of retries to attempt before

qualifying a communications failure.

Delete Record

File Menu Item

The Delete Record option deletes the current record from the database. BE CAREFUL when selecting

this option, as deleted records cannot be recovered! The Delete Record option is available only when a

form is open, contains records, and you have been given all permissions.

Some forms such as the Reader Form do not have a delete option.

Clicking this icon from the Secure Perfect toolbar can also access this option:

Secure Perfect 6.1.1 User Manual 134

Delete Template

File Menu

Select this option to delete the current Report template. This option is available only when a Report Form

is displaying with a loaded template.

<deleted> Displays After I Delete All the Records

To correct this, click Clear, and then click Add.

Department

Personnel Menu

The Department option opens the Department form that allows you to create departments that can then

be assigned to person records.

Department Tab

Department Form

Click Search to display or modify a list of existing departments. Click Add to create additional department

records of your own, based on your company.

DES/DES III Data Encryption Standards

Data Encryption is additional security assigned to protect the Host-to-micro exchange of information. The

data messages are encrypted.

Methods of Encryption

DES: This option uses a single pass of authentication and 16 unique hex characters are

required.

DES III: This method of encryption uses a three-pass authentication process. Starting at the

left, the first pass authenticates 16 hex characters. The second pass authenticates 16 hex

characters. The third pass authenticates all 48 hex characters.

Secure Perfect 6.1.1 User Manual 135

Design Tab

Badge Design Form

Use this tab to create a new badge design record. If you are editing an existing design, these options are

not available.

Select one of the following:

Select Default Layout: Select a badge default layout as Portrait or Landscape.

Select Import Layout: Select Import Layout to make available the option to Browse to the Secure

Perfect designs folder and import an existing design. If you have already chosen a default layout,

this option is unavailable.

Click Save to enable the Edit Badge Design button.

Edit Badge Design: Click to open the badge designer program that allows you to draw the graphics that

comprise the badge design. If you had a previous version of badge designer that created files with a

.gdr extension, you will be prompted to save the file as a .dgn when you edit a badge design for the

first time. Access the extensive Online Help system from the Badge Designer toolbar. Additionally, refer

to the Badge Designer User Manual, and review the "What’s New" section. A PDF file of the manual is

provided on your documentation CD.

Each workstation where badge design or badge printing is to be performed must have its own

license. Refer to your Secure Perfect Installation Guide for additional details.

If Imaging Status is not enabled for this client workstation, this feature is unavailable.

Device Configuration

Reports Menu

The Device Configuration option opens the Device Report Form that allows you to create a report on

devices such as micros, readers, alarms, alarm groups, digital outputs, digital output groups, digital

inputs, DVRs, cameras, and elevators.

Device Menu Selections

The following selections display in the Device drop-down menu:

Micro

Reader

Alarm

Alarm Group

Digital Output

Digital Output Group

Digital Input

Elevator

Digital Video Recorder

Camera

Secure Perfect 6.1.1 User Manual 136

Diagnostic Setting

Administration Menu

The Diagnostic Setting option opens the Diagnostic Setting Form that allows you to select items for

which diagnostic information will be recorded in the diagnostics log, as created on the LogFile Form. This

is a good place to start troubleshooting.

Diagnostic Viewer

Administration Menu

The Diagnostic Viewer option opens the DiagView program. The items you selected on the Diagnostic

Setting Form determine the debug messages displayed by the DiagView program.

The DiagView program has its own Help system for additional details.

Diagnostic Viewer

When you select Diagnostic Viewer on the Administration menu, the DiagView program opens. The

activities of your selected component are displayed. (Those items with the COM # and Line # as part of

the component name have the highest effect on system performance and hard drive usage.)

The DiagView Help system provides additional details of the program.

Dial-Up/Hangup

If the dial-up micro is currently connected, this option will disconnect from the micro.

Clicking this icon from the Micro Utility Form toolbar will access this option:

Secure Perfect 6.1.1 User Manual 137

Dial-Up Troubleshooting

Reference Topic:

Micro Utility Form

Your DiagView program logfile will indicate modem status by displaying one of two possible messages:

Message 1: The following modem is not functioning properly: <modem name>.

Message 2: The following modem is functioning properly: <modem name>.

Where <modem name> is the name of the modem, such as Hayes Accura 33.6.

Message 1 will display on the logfile every 90 seconds following a period when the modem is NOT

operating, until the modem is available and operational again. Verify the following:

Selected modem on Parameters Form is identical to the modem you want to use. (If the

modem you want to use is not on the list of available modems, you may have to reinstall the

driver for the modem or select another modem.)

Modem is turned on.

Comm port connection is complete.

Connection is plugged in properly.

Modem settings are correct. (Maximum speed value of 9600 applies to MOST modems. If

you are having problems using this setting, refer to your modem manual for more

information.)

Message 2 will display ONE time only, and that is when your modem returns to operational after a period

when the modem was NOT operational.

The Micro Utility Form will indicate that the micro dedicated to a modem is in an error state.

Secure Perfect 6.1.1 User Manual 138