2.14 L i e b e r t
On.SiteIG4TM O n -
USER'S MANUAL Si te/ 10 T"
NOTICE
The information contained in this manual is subject to
change without notice.
IBM XT is a trademark of
International Business Machines Incorporated.
APPENDICES
APPENDIX A Access Control Planning Form s
APPENDIX B Transaction Reports and File Structures
APPENDIX C Menu Overview and Structure
APPENDIX D Glossary of Terms
IGM
1-=-1 1° I
COMMUNICATIONS INTERGACE
CURRENT LOOP - 20 mA MAX/MUM LENGTH - 1174_ MODEM
3000 ft
1
IGM TO IGM 11 dI
ODE 1IIODEA
IG IG IDA
MODEL 40 IGM
OR
MODEL 45 IGM
32 IGIA•S MAX
IG IGM
IGM TO READER
MAXIMUM LENGTH —C)
1000 11
dld 1H1
CARD READER/P/N CARP READERS MODEL 20
MODEL 21
CARD READERS
The Card Reader translates magnetically encoded data
from a special plastic card. Card Readers are available in
both PIN (Personal Identification Number) and non-PIN
models. The PIN model has an integral keypad on which the
user enters a four-digit identification number. The Card
Readers have red and green LED indicator lights to prompt
the user to enter a PIN number (on PIN models) and indicate
whether access is granted or denied.
IGMs
The IGM, or Information Gathering Module, interprets the
information sent to it by the Card Reader and is the local
decision maker for granting or denying access, based on its
s tor e d da t ab as e. O ne or t wo C ar d R e ad er s m a y be
c onnec ted to eac h IG M and up to 32 IG Ms m ay be
connected to the system network, for a total of 64 Card
Readers/doors system wide. The IGM also contains the
outputs to monitor and control the electric locks, door monitor
switches, exit request buttons and alarm relays.
SOFTWARE FEATURES
The Onsite user-friendly software is menu-driven and
utilizes on-the-screen prompts to direct the user to select a
function from a list or menu. After each selection, the
software will either execute the selected action or offer
prompts for additional choices and request that data be
entered. No programming knowledge is required, and
software operation can be learned in a short period of time.
Figure 2-1 shows the basic screen layout.
LOGON
name [Incite/64
password [
I
COMMANDS
Com m ands m a y b e ex ec u t ed e i th er m anu a l l y or
automatically. By selecting the COMMANDS menu option,
the user can execute commands manually, for example;
unlock a door or lock a door. The same commands may
a ls o b e pr o gr am m ed t o ex ec u te au tom at ic a l l y b y
programming a "Timed Command" or "If/Then Command".
Automatic commands fall into one of two categories:
"Timed Commands" are programmed to automatically execute
tasks at specified locations on the start and stop times of a
given Time Code. These commands occur at a given time of
day and day of the week.
"If /T h e n Com m ands " o per a te o n t h e c onc e pt
"IF/THEN/WHEN". "IF" a given message is received from a
given location, "THEN" the host issues a specific command to
the same or another specified location, but only "WHEN" a
given Time Code is active.
Commands will be explained in more detail later in this
manual.
POLLING
When on-line with the IGM network, the host continuously
polls each IGM for transactions and prints, displays or stores
these transactions. The host is dedicated to the access
control system and it is not recommended that it be used for
an y o ther pur p os e. T his m ode of oper ation is high l y
advisable, especially in relatively large systems where
immediate reporting of alarms, continuous display or printout
of transactions is desirable. THIS MODE OF OPERATION
MUST BE USED WHEN "IF/THEN COMMANDS" ARE
PROGRAMMED INTO THE SYSTEM.
lf the communication link between the host and network is
disrupted, i.e.; host computer failure or communications wiring
failure, the IGMs will continue to make all access decisions,
and store transactions and alarms. The system may continue
in this mode indefinitely.
REPORTS
And as an option:
Mo n it or Po i nt F i le
Alarm Message File
Control Relay File
Auxiliary Relay File
T im ed C om m ands
If/Then Commands
4-i
INTRODUCTION
This chapter describes the process of planning the
"Operating Files" using the forms provided in Appendix A.
"Operating Files" make up the portion of the database that
deals with the access control functions of the system. Files
must be completed in the order presented, as later files rely
on information from previous files.
READER/DOOR FILE
The Time Code File sets the time periods for authorized
access for hours of the day and days of the week. This file
also provides for the programming of holidays for access
exceptions.
The Time Code File can accommodate up to 63 Time
Code Names but no more than 99 line entries.
START STOP
TIME CODE ACTIVE DAYS TIME TIME
NAME
MON TUE WED THU FRI SAT SUN
AL WAYS HOL
Y I Y I Y I Y I Y I Y I Y I Y 0,0 0 1 2 , 4 , , 0 , 0
1 1 1 1 1 1 1
MON TUE WED THU FRI SAT SUN
NORMAL HOL 0 7:5 0 1 7:0 0
1 1 1 1 1 1 1
YIY IYIYIY I I I 1 1 1 1 1 1
MON TUE WED THU FRI SAT SUN
HOL 1 7 0 0
S H I F T 2 YIY IYIYIY I I I 1 1 1
2 14 0
MON TUE WED THU FRI SAT S U N 0
HOL 0 0:0 1 0 2:0 0
1 1 1 1 1 1 1 I Y I Y I Y I Y I Y I I 1 1 1 1 1 1
MON TUE WED THU FRI SAT SUN
C y . F , H . O , U , R , S HOL
Y Y Y Y Y
I I I I I 1 I
1 7 : 0 0 2 4:0 0
1 1 1 1 1 1
MON TUE WED THU FRI SAT SUN
1 1 1 1 1 1 1
HOL
1 Y 1 Y I Y 1 YI I 1 0 1 0 0 1 0 7:5 0
1 1 1 1 1
MON TUE WED THU FRI SAT S U N
I [ I HOL
I I Y I Y I Y 0 , 0 0 , 1 2,40,0
1 1 1 1 1 1 1
H O L I D A Y F I L E
M O D A H O L I D A Y N A M E
N T Y
0 1 0 1 N E W Y E A R ' S D A Y
1 1 1 1 1 1 1 1 1 1 1 1 1
I
0 4 1 3 G O O D F R I D A Y
1 1 1 1 1 1 1 1 1 1 1 1 1
M E M O R I A L D A Y I
0 5 3 0
1 1 1 1 1 1 1 1 1 1 1 1 1
0 7 I N D E P E N D E N C E D A IY
I 0 4
1 1 1 1 1 1 1 1 1 1 1 1 1 I
0 9 0 3 L A B O R D A Y
1 1 1 1 1 1 1 1 1 1 1 1 1
I
1 1 2 2
I
T H A N K S G I V I NG
1 1 1 1 1 1 1 1 1 1 1 1 1
2 3 I
1 1 T H A N K S G I V I N G
1 1 1 1 1 1 1 1 1 1 1 1 1 1
I
1 2 2 4 C H R I S T M A S E V E
1 1 1 1 1 1 1 1 1 1 1 1 1
I
1 2 2 5 C H R I S T M A S D A Y
1 1 1 1 1 1 1 1 1 1 1 1 1
1
1 2 3 1 N E W Y E A R " S E V E
1 1 1 1 1 1 1 1 1
1 1 1 1 1
A C C E S S C O D E F I L E
A C C E S S C O D E D O O R N A M E T I M E
N A M E C O D E NAME
M A S T E R F R O N T D O 0 R A L W A Y S
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
B A C K D O O R A L W A Y S
I I I I I I 1 1 1 1 . 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
C 1O M P U T E R R O O M A L W A Y S
I I I I I I 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
P H O N E R O O M A L W A Y S
I I I I I I 1 1 1 1 1 1 I 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
P R O D U C T I O N A L W A Y S
I I I I I I 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
O F F I C E F R O N T D O O R N O R M A L
I I I I I I 1 1 1 1 1 1 1 1 1 1 1 1 i I I 1 1 1 , 1 1
1
B A C K D O 0 R N O R M A L
I I I I I I 1 1 1 1 1 1 1 1 1 1 1 I I 1 1 1 1 1 1
P R O D U C T I O N N O R M A L
I I I 1 1 1 1 1 1 1 ( 1 1 1 1 1 1 1 I I I I 1 1 1 1 1 1
P L A N T 1 B A C K D O 0 R N O R M A L
111111111 1 1 1 1 1 1 1 1 1 1 1 I I I I I l l I t l
P R O D U C T I O N N O R M A L
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 I I I I 1 1 1 1 1 1
P L A N T 2 B A C K D O O R S H I F T 2
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 , 1 1 1 1 1 I I I 1 1 1 1 1 1 1
P R O D U C T I O N S H I F T 2
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 I I I 1 1 1 1 1 1
M I S D E P T F R O N T D O O R N O R M A L
1111111 1 1 1 1 1 1 1 1 1 1 1 1 1 I I 1 1 1 1 1 1
B A C K D O O R A L W A Y S
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 / 1 1 1 1 1 1 I I 1 1 1 1 1 1
C O M P U T E R R O O M A L W A Y S
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 I I 1 1 1 1 1 1
P H O N E R O O M A L W A Y S
1 1 1 1 1 1 1 1 l 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
CARD FILE
C AR D FILE
( nee r -de fine d fle lds )
ACCESS CODE
Eac h c ar dhol der m us t be as s igne d an Ac c es s Code
Name. Enter the appropriate Access Code Name form the
Access Code File. The Access Code Name chosen for each
individual should provide access authorization at the proper
door or location during the desired time period.
USER-DEFINED FIELDS
Four fields in the card file have been reserved for the
specific needs for the user. Pertinent cardholder information
can be stored in the card file for quick reference. Remenber
to reserve the four character field for PIN numbers if you will be
using that feature un the system. If the PIN feature will not be
used, this field must still contain numeric information.
PERSONAL IDENTIFICATION NUMBER (PIN)
The user creates the 4-digit PIN number that is assigned
to each cardholder. Although the number MAY be any four
digits, it is suggested that the number have some significance
for the cardholder, such as a birthday, house number, etc.
The cardholder enters the PIN at the keypad Card Readers.
***SPECIAL NOTE***
POINT NUMBER
This contact to be monitored must be connected to one of
the IGM contact monitor inputs. Enter the number of the
IGM contact input (1 through 8).
POINT NAME
Enter a description of the contact to be monitored.
OPENING POINT MESSAGE
When the IGM senses a contact opening, it will send the
transaction to the host processor where the software will
attach an Open Contact Description. Enter the description to
be displayed on the processor.
WATER UNDER F L O O R ! P L E A
1 1 1 1 1 1 1 1 1 1 1 1 1
SE I N V E S T I G A T E . 04
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
N E C E S S A R Y , C A L L S ERV
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
VI d N T 84 1 6 3 2 7
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
ALARM MESSAGE
Enter the alarm message as you wish it to appear.
There is space for 38 characters to compose a message.
Messages can be extended into longer statements through
"linking" (see NEXT MESSAGE NUMBER)
NEXT MESSAGE NUMBER
Alarm messages may be linked together to create
meaningful instructions. "Linking" is initiated by entering the
number of the message which is to follow the present
message.
Figure 5-3
5 CONTROL RELAY FILE FORM
CONTROL RELAY
The control relays are designated as either CONTROL
RELAY "X" or CONTROL RELAY "Y". Enter the relay
designation that will control the device.
*
CONTROL RELAY NAME
The control relay is usually best described by the name of
the device it controls. Enter a description.
ON MESSAGE
Enter a description of the desired performance of the
control relay under the control of an "ON" command. The
control relay will remain on until it receives an "OFF"
command or power is removed.
OFF MESSAGE
Enter a description of the desired performance of the
control relay under the control of an "OFF" command. The
control relay will remain off until it receives an "ON"
command or "PULSE" command.
PULSE MESSAGE
Enter a description of the desired performance of the
Control relay under a pulse command.
PULSE TIME
The PULSE command momentarily energizes the relay for
a programmable duration of 1 to 99 seconds in one second
increments. Enter the time duration, in seconds, of the pulse
command. (lf the duration is to be 5 seconds, enter 05, etc.)
*** NOTE ***
The control relay name ON and OFF descriptions are
displayed when the user initiates a control relay "STATUS,"
as discussed later in this manual.
N O R M A L
1 1 1 1 1 1 1 1 1 1
N O N W O R K 0 1 2- D P 2 -
II 1 0 1 1
COMMANDS
GA=grant acces s DA=disabIe antipsbk
uD=unloc k door EA=enable antipsbk
LD = lock door rP=pulse relay X or Y
CM = card only m ode rN=relay X or Y on
CP = card = PIN rE=relay X or Y off
=
CU custo mer co de onl y r=X or Y
CS = store CU tr ansact ions D P 3 -- =disable pnt 3
EP ------ 8=enable pnt 8
(IGM/READER NUMBER)
Enter the IGM or Card Reader number that will originate
the message. All messages are doors-related except for the
two contact monitor point messages.
MESSAGE
Enter the message that will be sent by the IGM or Card
Reader identified above. This is the "condition" to which the
system will react.
(IGM/READER NUMBER)
Enter the IGM or Card Reader number that will receive the
Command in response to the "If" condition.
COMMAND
Enter the command that will perform the desired action.
When enabling or disabling a monitor contact, remember to
place the contact number in its proper position in the string
following the two-letter command, similar to the procedure in
the previous Timed Command File.
TIME CODE NAMES
The Time Code Name you enter will define the hours and
the days that the "conditional" commands will occur. Be sure
that the Start and Stop times and the active days satisfy the
period when you want the "cause and effect" to occur.
HOST PROCESSOR
Unpack the Personal Computer and locate it where the
communication cable leading to the first IGM in the loop can
easily reach the back of the computer. Generally, the
computer should be located within a secured area where it
may be easily monitored by the system operator. lf this is
not possible it is advisable to reroute the communication
cable to a more secure and convenient location.
Connect the keyboard and monitor to the computer. If you
are unfamiliar with these connections, consult the Operator's
Manual supplied with the computer for detailed information.
***NOTE***
If the model 40U or 45U IGMs are used, a 12 Volt DC
strike must be used or the strikes will not operate during a
primary power failure.
LOCK OVERRIDE - JUMPER P11
Jumper P11 is used to override the normal lock operation
by setting the door locks in either the continuously "LOCKED"
or "UNLOCKED" position. This feature is useful when
performing service on the IGM which might interfere with
reader operation. During normal operation, Jumper P11
should be left in the "OFF" position.
***NOTE***
Setting Jumper P11 in the "UNLOCK" or "LOCK" positions
affects both doors connected to the IGM.
DOS
The necessary DOS files have been loaded onto the hard
drive at the factory and are located in a subdirectory named
"\DOS".
The Onsite version 1.2 software require MS DOS or PC
DOS version 3.3 or greater. Although a working knowledge
of DOS is not normally required to operate the Onsite
software, a DOS manual is provided with the system.
LOGON
p a s s = [
1 of1
1-ALARM 2-CONTROL ACCESS CONTROL
-HISTORY 4- 10:51:24 Onsite/64 startup on 02-26-90
5-DBASE 6-Logoff 10:51:24 LIEBERT 000ite/64 VersIon 1.2
-PRINT B-ACC STAT 10:51:24 Copyright (c) 1987 - 1989 All rightsreserved.
9-Menu Hlp 10-Quit 10:51:25 Connected group 01 to COM2
OPERATOR PERMISSIONS
name [Incite/64
password [
access code file [N] timed command file [N] anti-pass back commands [N]
alarm message file [N] alarm definitions [N] control relay commands [N]
card file (N] card file titles [N] monitor point commands [N]
control relay file [N] customer code [N] reader/door commands [N]
holiday file [N] load igm [N] control relay status [N]
IF/THEN command file [N] operator permissions [A] monitor point status [N]
monitor point file [N] date and time [N] igm status [N]
reader/door file [N] transaction reports [N] reader/door status [N]
time code file [N] port configuration [N] automatic logoff [N]
1 of 3
ACCESS CONTROL
1-PrevMenu 2-Modify
3-Prior 4-Next 10:09:46 Incite/64 startup on 02-26-90
5-Add 6-Delete 10:09(46 LIEBERT 101ite/64 Version 1.2
7-PRINT 8-Help 10:09:46 Copyright (c) 1987 - 1989 All r1ghts reserved.
9-Sort 10-Search 10:09(47 Connected group 01 to C062
***NOTE***
Your name entered here should match the way your name
will appear in the card file later on, i.e., last name first,
capitals, lower case, etc.
1 of 1
ACCESS CONTROL
1-PrevMenu 2-Send Cmd
3-Prior 4-Next
5- 6-
7-PRINT 8-Help
9-Search 10-618I8
2. lf the correct time and date are not displayed, enter them
at this time.
*** NOTE ***
Date is entered as the prompt shows, month-day-year.
Use <ENTER> to move between the dashes (-). Be sure to
enter the time using a 24-hour clock, for instance, 1:30p.m. is
entered as 13:30. Use <ENTER> to move between colons
At this point the system is in the main menu , but the time
screen is still present. The screen presented at any given
point in time is always the last file which was opened by
the operator. If desired, the operator may change the
screen by using the log-off key. Logging off the system
will bring up the logon screen prompt for name and
password and ready the system for the next operator
session.
02-26-90 1 0 43 . 08 Sievert
CUSTOMER CODE
customer code number [100341]
1 of 1
ACCESS CONTROL
I-PrevMenu 2-Modify
Modify
3- 4-
5- 6-
7-PRINT 8-Help
Help
0- 10-
-MAIN
Figure 8-4
8 CUSTOMER CODE SCREEN
GROUP NUMBER
This entry field defines the group number of the IGM group
you will connect to. Enter "01" here and press the <ENTER>
key to define your local "hard wired" group of IGMs.
COMMUNICATION PORT NUMBER
This entry field determines which COM port the host will
poll the IGMs from. Enter "2" here and press the <ENTER>
key to define COM2 as the communications port that will be
used to poll your local "hard wired'' group of IGMs.
9-i
DIAGRAMS, DRAWINGS, TABLES
Enter
FILE OPERATIONS
The Onsite software creates files from the information you
enter about the system. Once a file has been created, it can
be manipulated to suit any changes that are required.
There are ten different operations in the database file
menus:
F1-PrevMenu F2-Modify
F3-Prior F4-Next
F5-Add F6-Delete
F7-PRINT F8-Help
F9-Sort F1 0-Search
Fl -PrevMenu F2-Modify
F3 F4
F5 F6
F7-PRINT F8-Help
F9 F1 0-MAIN
LOGON
name [
password [
1 of1
1-ALARM 2-CONTROL ACCESS CONTROL
3-HISTORY 4- 10:51(24 000ite/64 startup on 02-26-90
5-DBASE 6-Logoff 10:51:24 LIEBERT 000ite/64 Version 1.2
7-PRINT 8-ACC STAT 10(51:24 Copyright (c) 1987 - 1989 All rightsreserved.
9-Menu Hlp 10-Quit 10:51:25 Connected group 01 to COM2
1of 2
1-PrevMenu 2-Modify ACCESS CONTROL
3-Prior 4-Next 10:51:24Incite/64 startup on 02-26-90
5-044 6-Delete 10:51,24LIEBERT Incite/64 Version 1.2
7-PRINT 8-Help 10:51,24Copyright (c) 1987 - 1989 All rightsreserved.
9-Sort 10-Search 10:51.25Connected group 01 to COM2
Pr
02-26-90 1 0 59 , 01 Sievert
HOLIDAY FILE
DATE (4 CHARACTERES)
Enter the month and date for your holiday or "special" day.
Be sure to fill zeros to the left for the single-digit months; i.e.,
enter January 1 as 0101.
CARD FILE
card number [000001]
name [CLARK, HAL access code name
[MASTER
PIN [1011]
DEPARTMENT [SITE PROD.
CARD SERIAL# [001514
PHONE (2105 ]
trace to [SF ] F(ile) P(rinter) S(creen)
status [A] A(ctive) I(nactive)
***NOTE***
If the person you are entering will also be allowed to logon
to the system, enter the name exactly as it will appear in the
"operator permissions file".
ACCESS CODE (8 CHARACTERS)
Enter the name of the access code that defines the readers
and time code the cardholder will be allowed access.
USER FIELDS, 1ST THROUGH 4TH
Enter the information you desire in the user-defined fields.
See the TITLES section in chapter 11 to define the user fields.
Remember to reserve the "1st user field" for PIN numbers if
you will be using them for keypad Card Readers. If you will
not be using the PIN feature, you must enter any other 4 digit
number, such as ext. no. The other 3 user fields are optional.
User fields 1 through 4 have a character length of 4, 12, 12,
and 6, respectively.
TRACE TO (3 CHARACTERS)
Enter "S", "F", "P" or any combination. An "S" sends the
transactions to the host processor screen; "F" sends
transactions to the log file on the hard drive, and "P" sends
transactions to the printer.
10-i
DIAGRAMS, DRAWINGS, TABLES
10-1 Monitor Point File ...................................... 10-2
10-2 Alarm Message File .................................. 10-6
10-3 Control Relay File ..................................... 10-8
10-4 Timed Command File ............................. 10-12
10-5 If/Then Command File ............................ 10-15
10-ii
INTRODUCTION
This chapter contains information related to the monitoring
and automatic control capabilities of the system. Three of the
files, "Monitor Point", "Alarm Message" and the "Control
Relay" file, apply to the model 45 IGM only. If you do not
have a model 45 IGM in your system, you may skip those
sections.
The "Timed Command" and "If/Then" files apply to both
the model 40 and 45 IGMs.
From the Main Selection Menu, select "DBASE" by
pressing F<5>. From this menu select F2-Mon Ctl.
The Monitor and Control Files menu appears on the lower
left portion of the screen. Select the "Monitor Point File" by
pressing Fl-MonPoint. The MONITOR POINT FILE appears
on the screen.
1of 8
-PrevMenu 2-Modify ACCESS CONTROL
3-Prior 4-Next 105124 Incite/64 startup on 02-26-90
S-Add 6-Delete 105124 LIEBERT Incite/64 Version 1.2
7-PRINT 8-Help 1 0 51 : 24 Copyright (c) 1987 - 1989 All rightsreserved.
9-Sort 10-Search 105125 Connected group 01 to COM2
1of 8
1-PrevMenu 2-Modify ACCESS CONTROL
3-Prior 4-Next 10:51(24 Incite/64 startup on 02-26-90
5-044 6-Delete 10:51:24 LIEBERT 000ite/64 Version 1.2
7-PRINT 8-Help 10:51:24 Copyright (c) 1987 - 1989 All rightsreserved.
9-Sort 10-Search 10:51:25 Connected group 01 to COM2
02-26-90 1 1 (1 1 13 Sievert
1 o 2
ACCESS CONTROL
1-PrevMenu 2-Modify
3-Prior 4-Next 1 0 (5 1 24 Onsite/64 startup on 02-26-90
5-Add 6-Delete 1 0 5 1 2 4 LIEBERT Onsite/64 Version 1.2
7-PRINT 8-11elp 1 0 5 1 2 4 Copyright (c) 1987 - 1989 All ghts res ed.
9-Sort 10-Search 1 0 ( 5 1 2 5 connected group 01 to COM2
***NOTE***
lf switch 1-8, on the IGM, is on, the "Y" relay will
automatically energize for three seconds in response to any
monitor point alarm within the same IGM.
Once you have completed your entry for the first control
relay, press the <ENTER> key to return the cursor back to
the "group number" field and then press the F5-Add key.
The message "record added" will appear just above the menu
in the lower left-hand portion of the screen.
You may continue adding the rest of your control relay
entries by typing over the existing information. Be sure to
use the space bar to blank out any remaining characters
when typing over existing entries.
CONTROL 1of 13
ACCESS
1- 2-Modify
PrevMenu
3-Prior 4-Next 1 0 :5 1 24 Incite/64 startup on 02-26-90
5-Add 6-Delete 105124 LIEBERT 0056te/64 Version 1.2
7-PRINT 8-Help 1 0 :5 1 24 Copyright (c) 1987 - 1989 All rightsreserved.
9-Sort ]0-Search 105125 Connected group tó COM2
01
COMMANDS
T H E N g r o u p n u m b e r [ 0 1 ] THEN
.
IGM/reader number [ 0 1 ] receives this command [XN
1 of 4
ACCESS CONTROL
1-PrevMenu 2-Modify
3-Prior 4-Next 10:51:24 Onsite/64 startup on 02-26-90 10:51:24 LIEBERT
5-Add 6-Delete Onsite/64 Version 1.2
7-PRINT 8-Help 10(51:24 Copyright (c) 1987 - 1989 All rights reserved.
9-Sort 10-Search 10(51:25 Connected group 01 to COM2
ALARM DEFINITIONS
access oranted [E] wrong customer code [A]
(trace to [ ] 18 card file) trace to [SF )
card at wrong door [E] card at wrong time [E]
trace to [SF ] trace to [SF ]
PIN entry error [E] excessive PIN errors [A]
trace to [SF ] trace to [SF ]
anti-pass back violation [A] door forced open [A]
trace to [SF ] trace to [SF ]
door open too long [D] door closed [E]
trace to [ ] trace to [SF ]
tamper switch open [A] tamper switch closed [E]
trace to [SF ] trace to [SF ]
1of 1
1-PrevMenu 2-modify ACCESS CONTROL
3- 4-' 10:51)24 050ite/64 startup on 02-26-90
5- 6- 10.51)24 LIEBERT Incite/64 Version 1.2
7-PRINT 8-Help 10:51,24 Copyright (c) 1987 - 1989 All rightsreserved.
9- 10-MAIN 10:51:25 Connected group 01 to COM2
access granted -
When a valid card is used at the correct reader at the
correct time of day, a "granted access" message is sent to
the host processor. Note that there is not a "Trace To" field
for this transaction. "Trace To" is handled in the card file on
an individual basis for the "granted access" transaction.
wrong customer code -
This message is generated if a card encoded in the
Liebert format is used but does not belong to your system.
***NOTE***
This feature requires the use of door contacts.
***NOTE***
This feature requires the use of door contacts.
door closed -
This message is generated when the door closes after a
"door forced open" or "door open too long" transaction.
TITLES [F3-Titles]
T he card file contains four us er fields that can be
used to store additional inform ation about eac h
cardholder. T he fields are identified here as “ first
user defined field”, “second user defined field”, “thir d
user defined field”, and “fourth us er defined field” .
Field length is 4, 12, 12 and 6 characters,
respectivel y. You m ay define these fields to suit your
needs, but obser ve one rule: If you ass ign PIN
num bers to the c ardholders, dedicate the “firs t user
defined field” for storing the PIN num ber. Onc e you
have com pleted your entries, press the <ENTER> key
to return the cursor back to the "first user defined field"
field and then press the F2-Modify key. The message
"record added" will appear just above the menu in the lower
left-hand portion of the screen.
1 of 1
ACCESS CONTROL
1-PrevMenu 2-Modify
Modify
3- 4- 10:5124 005ite/64 startup on 02-26-90 1 0 : 5 1 2 4 LIEBERT
5- 6- onsite/64 Version 1.2
7-PRINT Help
8-Help 1 0 : 5 1 2 4 Copyright (c) 1987 - 1989 All rights reserved.
9- 10- MAIN 1 0 : 5 1 2 5 Connected group 01 to COM2
OPERATOR PERMISSIONS
name [CLARK, HAL 1
password [ 1
access code file [A] timed command file [A] anti-pass back commands [A]
alarm message file [A] alarm definitions [A] control relay commands [A]
card file [A] card file titles [A] monitor point commands [A]
control relay file [A] customer code [A] reader/door commands [A]
holiday file [A] load igm [A] control relay status [A]
IF/THEN command file [A] operator permissions [A] monitor point status [A]
monitor point file [A] date and time [A] igm status [A]
reader/door file [A] transaction reports [A] reader/door status [A]
time code file [A] port configuration [A] automatic logoff [Y]
2 of 3
ACCESS CONTROL
1-PrevMenu 2-Modify
-Prior 4-Next 10.51:24Incite/64 startup on 02-26-90
5-Add 6-Delete 10:51:24 LIEBERT Incite/64 Version 1.2
7-PRINT 8-Help 10.51:24Copyright (c) 1987 - 1989 All rights reserved.
9-Sort 10-Search 10.51:25Connected group 01 to COM2
1of 1
1-PrevMenu 2-Send Cmd ACCESS CONTROL
3-Prior 4-Next 10:51:24 Incite/64 startup on 02-26-90
5- 6- 10:51:24 LIEBERT 005ite/64 Version 1.2
7-PRINT 8-0e1p 10:51:24 Copyraght (c) 1987 - 1989 All rightsreserved.
9-Search 10-MAIN 10:51:25 Connected group 01 to COM2
COMMANDS
From the "Control" menu, pressing the F6-Commands key
will bring up the "Commands" menu.
READER/DOOR COMMANDS
door name (FRONT DOOR
1of 2
1-PrevMenu 2-Send Cmd ACCESS CONTROL
3-Prior 4-Next 10(51:24 Incite/64 startup on 02-26-90
5- 6- 10:51:24 LIEBERT 000ite/64 Version 1.2
7-PRINT 8-Help 10:51:24 Copyright (c) 1987 - 1989 All rightsreserved.
9-Search 10-MAIN 10:51:25 Connected group 01 to COM2
ACCESS 1of 2
CONTROL
1-PrevMenu 2-Send Cmd
3-Prior 4-Next 10:51:24000ite/64 startup on 02-26-90
5- 6- 10:51:24LIEBERT Incite/64 Version 1.2
7-PRINT 8-Help 10:51:24Copyright (c) 1987 - 1989 All rightsreserved.
9-Search 10-MAIN 10:51)25Connected group to COM2
01
ON [N]
This command will turn the specified "X" or "Y" relay on.
PULSE [P]
This command will turn the specified "X" or "Y" relay on
for the "pulse time" specified in the control relay file.
Commands may be sent to a single control relay by using
the <F3> or <F4> keys to move to the relay name you wish
to control, or by typing the control relay name or the IGM
number you wish to control and pressing <F9> to search.
W hen the correct relay name or IGM number is on the
screen, enter the appropriate command letter in the "enter
selection" field and press the "send Cmd" function key. The
message "command sent" will appear in the lower left hand
portion of the screen just above the function keys menu.
Commands may be sent globally to all "X" or "Y" relays
on a group by entering asterisks (**) in the IGM number field.
ANTI-PASSBACK COMMANDS
card number to set [001011]
(or) name to set
[CLARK HAL
enter selection [I]
I(n) N(eutral) 0(ut)
IN [I]
This command sets a card whose present status is "out"
to "in" status so that it may be allowed through the "out"
reader.
LOGON
name [ password [
1 of1
1-ALARM 2-CONTROL ACCESS CONTROL
3-HISTORY 4- 10:09:46 000ite/64 startup on 02-26-90
5-DBASE 6-Logoff 10:09:46 LIEBERT Incite/64 Version 1.2
7-PRINT 8-ACC STAT 10:09(46 Copyright (c) 1987 - 1989 All rightsreserved.
9-Menu Hlp 10-Quit 10:09:47 Connected group 01 to COM2
TRANSACTION REPORTS
Transaction reports are a detailed and organized record of
the system's history and may be formatted to provide
information by:
− a specific date
− a specific time of day
− a specific cardholder name or card number
− a specific activity
-a specific location
− a specific monitor point
− a specific control relay
The Transaction Report menu consists of multiple entry
fields, so you may configure your report according to the
information parameters shown above. If desired, you can
output the contents of the entire LOG file by accepting the
default settings of the Transaction Report screen.
02-26-90 1 1 (3 4 26 Sievert Pr
TRANSACTION REPORT
start date [A (yymmdd or A(11) days)
stop date [A (yymmdd or A(11) days)
start time [A (hhmm or A(11) times)
stop time [A (hhmm or A(11) times)
select card name(s) [A ] A(11) N(one)
select card number(s) [A 0(11) N(one)
select activity(ies) [A] 0(11) P(artial) N(one)
select location(s) [A] 0(11) P(artial) N(one)
select monitor point(s) [A] 0(11) P(artial) N(one)
select control Felay(s) [A] A(11) P(artial) N(one)
1 of 1
ACCESS CONTROL
1-PrevMenu 2-Search
3-Prior 4-Next 10(51(24 Onsite/64 startup on 02-26-90 10(51(24 LIEBERT
S-Entry 6-Diskette Onsite/64 Version 1.2
7-PRINT 8-Help 1 0 51 ( 24 Copyright (c) 1987 - 1989 All rights reserved.
9-Menu HIp 10-MAIN 10(51(25 Connected group 01 to COM2
START DATE
Enter the date (year, month, and day) for the start of the
time period you wish to report. To report information from
the start of the LOG file, leave the "A" in the field and press
<ENTER>.
STOP DATE
Enter the date (year, month, and day) for the end of
the period. To report information up to the current date,
leave the "A" in the field and press <ENTER>.
STOP TIME
Enter the time (hours and minutes in 24 hour format. i.e.,
1:00P.M. = 1300) for the end of the time period. To report
information up to the current time, leave the "A" in the field
and press <ENTER>.
1 of 1
ACCESS CONTROL
1-PrevMenu 2-Search
3-Prior 4-Next 1051:24 Onsite/64 startup on 02-26-90 10:51:24 LIEBERT
5-Entry 6-Diskette 001ite/64 Version 1.2
7-PRINT 8-Help 1 0 5 1 2 4 Copyright (c) 1987 - 1989 All rights reserved.
9-Menu Hlp 10-MAIN 1 0 5 1 : 2 5 Connected group 01 to COM2
1of 1
1-PrevMenu 2-Search ACCESS CONTROL
3-Prior 4-Next 1 0 51 [ 24 Incite/64 startup on 02-26-90
5-Entry 6-Diskette 1051[24 LIEBERT 090ite/64 Version 1.2
7-PRINT 8-Help 1051.24 Copyright (c) 1987 - 1989 All rightsreserved.
9-Menu Hlp 10-MAIN 1051[25 Connected group to COM2
01
1of 1
1-PrevMenu 2-Search ACCESS CONTROL
3-Prior 4-Next 105124 005ite/64 startupon 02-26-90
5-Entry 6-Diskette 105124 LIEBERT Incite/64Version 1.2
7-PRINT 8-Help 1 0 :5 1 24 Copyright (c) 1987- 1989 All rightsreserved.
9-Menu Hlp 10-MAIN 10:51:25 Connected group to COM2
01
1 of 1
1-PrevMenu 2-Search ACCESS CONTROL
3-Prior 4-Next 10.51:24Incite/64 startup on 02-26-90
5-Entry 6-Diskette 10.51:24LIEBERT Incite/64 Version 1.2
7-PRINT 8-Help 10:51:24Copyright (c) 1987 - 1989 All rights reserved.
9-Menu Hlp 10-MAIN 10:51.25Connected group 01 to COM2
ACTIVITIES
No activities
LOCATIONS
No locations
MONITOR POINTS
No monitor points
CONTROL RELAYS
No control relays
mode -
"(Card only (no PIN number))" indicates that the reader is
set for the card only mode and does not require a PIN
entry after the card is swiped.
lock status -
"Locked" indicates that the door locking device controlled
by the IGM is in the locked position.
READER/DOOR STATUS
door name [FRONT DOOR
group number [01]
reader number [01]
mode Card only (no PIN number)
tamper switch status Closed
lock status Unlocked
door status Closed
1of 2
1-PrevMenu 2-Get Stat ACCESS CONTROL
3-Prior 4-Next 1 0 5 1 , 2 4 005ite/64 startup on 02-26-90
5- 6- 1 0 5 1 2 4 LIEBERT 005ite/64 Version 1.2
7-PRINT 8-Help 10:51,24 Copyright (c) 1987 - 1989 All rightsreserved.
9-Search 10-MAIN 1 0 5 1 2 5 Connected group 01 to COM2
1of 2
1-PrevMenu 2-Get Stat ACCESS CONTROL
3-Prior 4-Next 105124 005ite/64 startup on 02-26-90
5- 6- 1051:24 LIEBERT Incite/64 Version 1.2
7-PRINT 8-Help 10:5124 Copyright (c) 1967 - 1989 All rightsreserved.
9-search 10-MAIN 105125 Connected group 01 to COM2
message pending -
"Global message received" indicates that the date and time
was downloaded to the IGM.
"Send Card File" indicates that the IGM does not have the
card file database.
"Send Time Code File" indicates that the IGM does not
have the time code file database.
"Send Holiday File" indicates that the IGM does not have
the holiday file database.
buffer status -
"Empty" indicates that the IGM transaction buffer does not
have any alarms or events to report.
anti-pass back
status "Disabled" indicates that the IGM is not
s et f or t he a n ti - p as s b ac k m ode of
operation.
I 1 1 1 1 1 1 1 1 1 _ _ J _ _ _ L _ I I i 1 1
i I I l l i i i i i l l , J _ _ 1 _ 1 1 1 1
I 1 1 1 1 , _ L _ L _ L I I I I I I i i
I I l L I l I I l i L I I I J _ _ L I I I I I
I 1 1 I I I 1 1 1__L_I
1__
I _ 1 __L_L__I
I I J___1_ L1_,1 I I
1_L__1_L_ 1 1 1
i I i 1 I I I
1 L_J_ t_ J L , 1 1 I
_L
1 1.1_ J. 1 1 J__LL
I 1 1 I I
_L_J_ _LJ_
1_1. 1 1 1 1 L__1_1_
1 J___1 L_ L J__
.1_ _L__L
I 1 _1LL__L L _ _ 1
_L _L _L _ L 1 1 1J1_ 1 I 1
1 L J__ L_ J 1_1L
I i
_Ll _L__I _1, _1 -L I 1
i i 1 I. 1_ 1__1_L_L L__1
I L 1 JL_L I -.1-
LJ LL_I_1__ t_L 1.__1
1._ 1_ J L__ _J.
_ L_L _L
I 1_ J_ I 1 J 1___I_L 1 I 1
1
I _L _I _L __1 __I__ _t
I i 1 J. 1_ 1___L J_
L i ____I L_
_l_ _ _ _ L _ _ 1 _ _ _ L _ 1_ L__l L
_
1._ 1 JL_J JL__J___I 1 L_
I I L _L. 1...__L. L J ._L___
1 1 1 L__L I 1 L 1 1_ t J _L___
_J _l__J _.1
1 __1_ I
1 1 I_J__JL J_ 1 1 I
I I. I I
_J _1 _L _1 _L _L_L
1 1 J J_ _L _L_1 L _L 1L _1_1 .___I_
i I 1 1 _1_ 1 _
TIME CODE FILE
1111111 1111111 :
MON TUE WED THU FRI SAT SUN HOL
1 I I I
:
1111111 :
MON TUE WED THU FRI SAT SUN HOL
:
1 1 1 1 1 1 1 1 I I I
1111111 :
MON TUE WED THU FRI SAT SUN HOL
:
I I I I I I 1 1 I I I
MON TUE WED THU FRI SAT SUN HOL
1 1 1 1 1 1 1111111 :
1 I I I
t
IIIIII1 :
MON TUE WED THU FRI SAT SUN HOL
_ _ _ 1 _ 1 1
1 1 1 1
11111 1111111
MON TUE WED THU FRI SAT SUN HOL
1 I I 1111111 :
1 I I
:
s I I
1111111 :
MON TUE WED THU FRI SAT SUN HOL
1 1
:
ILI1111
MON TUE WED THU FRI SAT SUN HOL
,
1 s1 1 1 1
1111111 :
MON TUE WED THU FRI SAT SUN HOL
1 1 1 1 :
IIIIL11 :
MON TUE WED THU FRI SAT SUN HOL
:
s I I 1__I 11
MON TUE WED THU FRI SAT SUN HOL
l 1 1 1 1 1 1 1 1 1 1 I I I I
111111L 1
:
_ I J _ _ _ _ 1 _
Lill_LL :
_ L 1
MBH T11 WKB *1111 l'..hf Shi 111 WHL
:
I
J _ L _ _ 1 1 1 1 1 1 I I I
1 1
HOLIDAY FILE
HOLIDAY FILE
I 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
I I I 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1
I 1 1 1 1 1 . . L . _ _ _
1 I i 1 1 1 1 1 J I i : s s
1 1 I I I I I I I I I I
I i , 1 I I I I 1 1 I I I
I s 1 s s I I I I I I I
I , 1 1 1 1 I I I 1 1 I I I
1 1 , 1 1 1 1 1 I I I I _ I _ L I I I
I I I illill u A
1 _L_ _l _1_
I 1 1 u I _ J _ I I I I J
_ I . 1
I u 1 1 1
I 1 1 1 1 1 1 I I I _ L _ I I 1 I I I
1 1 I u 1 1 I 1 I 1
1
1 _ L L _ _ _ L _
i _ J . _ _ . I .
I 1 L_ L 1 1 I I 1 _ _ _ 1 . L _
J__ , L____1
1 I 1 L
, . _ _ L _ _ _ 1 _ _ L _ _ I . _l_
_ L I I I
s _L___1 s , . _ _ J _ _ L _ _ _ L _ L_ 1_
L_ J_ _L___L___L _L L I L
Month abbreviationss
J A N F EE M A R A PR M A Y JU N JU L A U G S EP O CI NO V D EC
0 1 0 2 0 2 0 4 0 5 0 0 0 7 1 8 0 9 1 0 1 1 1 2
ACCESS CODE FILE
1 1 1 1 1 1 1 II
I I
_ _ _ _ _ _ 1 1 1 1 I I
I I I
1 1 1 1 1 1
l l 1 l l l i i i i i i i i i
1 1 1 1 1 1 1 1 1 1
J_ L 1 1 LI 1
CARD FILE
C A RD FILE
1 1 1 111111111111 1 1111111
1 1 1 1 1 1 1 1 1 1111111111
1 1 1 1 1111111111
1 1 1 1 1 1 1 1 1 1 111
1 1 11 1 1 1 1 1 1 1 1 1 111
1 1 11
1 1 1 1 1 1 1 1 1 1 111
1 1 1 1 1 1 1 1
_ J J _ I l l i
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 111
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 111 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1 11.1 1 1 1 1 1 1 1 1 1
I I I I I 1 I I I I I 1 1 1 111 I 1 I
1 1
1
1 1
1 1 1 1 1 1
1 1 1 1 1 1 1 / 1 1 1 1 1 1 111 1 1 111111
1 1
1 1 11 1
1 1 1 1_3_____________
________________________________
___________________________________ _L._J_
1 1 1 1 1 1 1 1 1 1 1 1 1 1111111 1 1
111111
• 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1
1 1 1.3. 1 1 1
1 1 1 1 1 _ 1 1 1 l L _ _ 1 1 I
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
i i i 1 1 1 1
J_L 11
1 1 1 1 1 1 1 1 1 1
I 1 1 1 1 1 1 J A A _
I
CARD FILE
(user-defined fields)
CARD FILE
(user-defined flelds)
I 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 I 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 . _ L J _ 1 1 1 1 _ 1 _
_ L _ 1 1 1
I I I I 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
I I I I _ L - 1 . - - 1 -
I I I I 1 1 1 1 1 1 U I I 1 1 . _ 1 1 1 1 1 1 1
I I I I 1 1 1 1 1 1 I I 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 _ 1 1 I _ L L -
1 1 1 l _ j _ _ - . 1 - 1 1 1 L - -
I I I I 1 1 1 1 1 1 I I 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
I I _ I _ J - 1 - - -
I I I I 1 1 1 1 1 1 1 1 1 L _ I I I . L _ L _ 1 1 1 1 1
I I I I 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 I I I I I
1
I I I l i l l i l i l i l I I I J__L-L- 1- 1 I
-1.-1J- _J
. _L__I_J_
I I I 1 1 1 1 1 1 1 1 1 _ 1 _ 1 1 . 1 1 1 1 _ _ 1 _ 1 1 1 1 _ L l l I l
1 I i I
I I I I U I I I 1 1 ,1 L I L I I 1 1 _L__
i I
_L__L _1 _I
I I I I I I I I I I _ _ 1
i J . I t i l I i I I I I . J _ I - - , , J I I
I I I 1 1 1 1 1 1 1 1 1 1 1 1 1 , J _ 1 _ _ _ _ _ I _ _ 1 1 1 _ 1 1 1 _
_ 1 1 1 1 1
J_-..1__L
I I I 1 1 1 1 1 1 I _ J I I _ _ J__J__L_J_-L_ 1 1_J___I 1
.1.-_L-1
I I I I I I 1 1 1 1 1 1 1 1 I I I I I _ L : I I I I _L_IlIJ___
J L- , , I
--L I I
1 I I
_l1.I
i t I , 1. L
_l_l _L__L _L_
_L _L _L_
I I , _ l _ _ L _ _ L I I I i l L i i l i l i i i i i i i _ i 1 1 1 1 1
I J 1 J__ J_ LL-J
I _ L L _ L _ _ . 11 J . - -L J J J _ _ 1 _1 L _ J _ 1 _ . 1 _ 1 _ _ J . I 1
_L
1_11J I I I I I I I I I I I I I I I I i i i I _ _ j _
1 1_ 1 J J__ 1 J--1 1
L__
_
I L L _L 1
L_ I
_ _L
1
..1_
J 1 1 1 __
.1_1 .1_ _L
I I I_ L _l_L_I. , _l__I __L__L 4- _L I I I
I I I 1__I_1_ I J___L I I I J__1
A-6
MONITOR POINT FILE
G R O U P I G M P T * POINT NAME
1 1 1 1 1 1 1 1 1 1 . 1 1 1 1 1 1 1
Trace To,
Trace To:
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
CLOSING POINT MESSAGE
1 1 1 1 1 1 1 1111
11
Trace To,
ALARM MESSAGE FILE
1 1 1 1 1 1 1 1 1 1 . 1 1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1 t 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 t 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 / 1 1 1 1 1 1 1 1 1 1 I
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 /
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 / 1 1
1 1
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 / 1 ,
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
I
II t l l I l
1
t 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
I 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 / 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 t
, 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
I 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
CONTROL RELAY FILE
QN MESSAGE
OFF MESSAGE
ON MESSAGE
, 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
OFF MESSAGE
1 1 1 1 1 1 1 1 . 1 1 1 1 1 1 1
PULSE MESSAGE TIME
________________ _ L 1 1 1 . L _ _ L _ _ L _
OFF MESSAGE
1 1 1 1 1 1 1 111
PULSE MESSAGE TIME
TIMED COMMAND FILE
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
I I 1 1 1 1 1 I I I I
1 1 1 1 1 1 1
1 1 I I 1 1 1 , 1 1 1
I I I I 1 1 1 , I I
1 1 1 1
1 1 1 1 1 1 I I I I
1 1 l J I 1 1 1 1 1 1 1 1 1 1 I I
1 1 1 1 1 1 1 1 1 I I I I I
1 1 I i 1 I I I
1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1
1
1 _
1 1 J J J L 1 1 1 1
I 1 1 1 1 1
1
1 _ 1 1 1 1 1 1
1 _ L _I 1
1 1 1 J l 1 1 1 1 1 . L L L U 1 1 1
I I I 1 1 _ _ _ 1
1 1 1 1 1 1 1 _ _ L 1 1 1 1 1
A-10
IF/THEN COMMAND FILE
IF THEN
GRP IGM SENDS GRF IGM RECIEVES THIS DURING
NBR NBR MSG NBR NBR COMMAND TIME CODE NAME
1111111111 _L
1 II
III INNI
III I I I 1 1 1 1 1 11
II III L_ I
J_
I I 1
J___I. J
_ L _ I _ _ L _ L _1
111 11 1111111
_L_J___L I
11111.J1_11 1 i 1 1 1 1 ]
11 . 1 1 _ . L _IL 1 L I1. 1I_
L L _L
J 1J __ 1J __
_L
1 _L
_L__L
I I
11 J__J__L _ L . L _I1 _I
I
I
J_J__L__1_1
1._L_ I I I
I J_
I L__L__L_
11 11 I - 1 - 1 1 - - 1 L . . . 1 - 1 1 _ ,_
L L_L , L
_t,_
I 1 1 1 1 1 1 1
A-11
APPENDIX B TRANSACTION REPORTS and
FILE STRUCTURES
Transaction report ........................................................................... B-1
Reader/door file .............................................................. B-2
Time code file ................................................................. B-3
Holiday file B-4
Access code file ............................................................. B-5
Card file B-6
Monitor point file ............................................................. B-7
Alarm message file ......................................................... B-8
Control relay file ............................................................. B-9
Timed command file ..................................................................................... B-10
If/then command file ........................................................................................... B-11
i
APPENDIX B
TRANSACTION REPORTS and FILE STRUCTURES
TRANSACTION REPORT
READER/DOOR ElLE
d t
o
o in d t
e u i
o
g n r n u r e
e n
o o a m l o
n b d b o p
p e e e u e
door name r r r k. n
+ + +
FRONT DOOR 0101 05 10
BACK DOOR 0102 05 10
COMPUTER ROOM 0103 05 10
RHONE ROOM 010 4 0 5 07
PRODUCTTON 0101 05 10
TIME CODE FILE
t n
i u e t s
mm t d h a h
e b m u n u f t s o
e p e e r r u u l s t
c r n s s s i r n i t i s t
o d d d d d d d d a m t i
d a a a a a a a a r e om
time code namee y y y > y y y y t
P e
ALWAYS 01 YYYYYYYY0001
2400
hmliday name
0101 NEW YEAR'S DAY
0413 GOOD FRIDAY
0 5 7 . 0 MEMORIAL DAY
0704 INDEPENDENCE DAY
0903 LADOR DAY
1122 THANKSGIVING
1123 THANKSGIVING
1224 CHRISTMAS EVE
1225 CHRISTMAS DAY
1231 NEW YEAR'S EVE
ACCESS CODE FILE
CARD FILE
PH
ON
card access CARD SERIAL# E
number name code name PINDEPARTMENT t r a c e to status
+ --------------------------- + + + -------- -----------
+ + --------------------------- e +
000001 CLARK, HAL MASTER 1011MANASERS 001541 2105
SF A
000002 ORLICH, MIKE MASTER 1012MANAGERS 001542 2128
SF A
000003 FAULUS, KURT MASTER 1013MANAGERS
001543 SF 2108 n
000004 KRISTAN, KEN OFFICE 1014SALES 001561 2113
SF A
000005 MOYNIHAN, TIM OFFICE 1015SALES 001562 2114
SF A
000006 THOMPSON, PAULA OFFICE 1016SALES 001563 2115
SF A
000007 HARVEY, MIDGE OFFICE 1017SALES 001567 2116
SF A
000008 SHUMAKER, MATT FtANT 1 1018PRODUCTION 001570 4149
SF A
000009 MILLER, JEFF PLAN1 1 1019PRODUCTION 001571 SF 4149 n
000010 DIPAOLO, RICK PLANT 1 1020 PRODUCTION 001572 4150
SF A
000011 SHEEHAN, PAUL PLANT 2 1021PRODUCTION 001573 4148
SF A
000012 McEVOY, jOHN pLnNT 2 1022PRODUCTION 001574 4150
SF' A
000013 DOLLTSON, DON MIS DEPT 1023D.P. 001575 5455
SF A
000014 SARK, STEVE MIS DEPT 1024D.P. 001576 5456
SF A
000015 DEECE, ERIC MIS DEPT 001577 5458
SF A ~0/
MONITOR POINT FILE
M O NI TO R PO I NT FI LE
a c 1
o
a n a m n
g n I n o n r d l e u
u G u o m m i a s m t t
o m M m i m t r s b r o
ub b n b i m a e a
p e e t e o p e n i n g p o i n t me s s age o g r c
r r p oI nt n ame c l o s i n g p o i n t me ss age n e e
+ +- ---------- +
01 0 1 1 UPS ROOM DOO R OPEN 0 01 SFF'
DOO R CLOS ED
01 01 2 MO TIO N D ETECTO R A LA RM D 02 SFP
NO RMA L
Od 01 3 COM PU TER RO OM DRY C 03 SFP
WA TER D ETECTED
01 0 1 . 4 I NTRU SIO N S YS TEM A LA RM C SFP
NO RMA L
SFP
01 0 1 . 5 HA LO N S YS TEM A LA RM C
NO RMA L
SFP
01 0 1 6 COM PU TER Ro o m HIG hl TEM P A LA RM 0
TEM F' NO RMA L SFP
01 0 1 7 BA TTERY RO OM DOO R OPEN 0
DOO R CLOS ED qFP
01 0 1 8 G ENERA TO R O N LINE N
OFF
ALARM MESSAGE FILE
0 4 IF N EC ES SA RY , C ALL S ERVI C E A T 8 4 1 - ,5 3 27
CONTROL RELAY F1LE
g n I n
r u G u r pt
omMme 11 1
ub b 1 on message 1 m
p e e a uff message ee
r r yrelay name pulse message
+ +- -+ + -------------- +- -----------------------------
01 01 XSECURITY NOTIFIED 03
NORMAL
ALARM TEST
01 01 YWATER ALARM BELL ON 03
BELL OFF
BELL TEST
TIMED COMMAND FILE
TIMED COMMAND FILE
In
G u 1 so
Mm 6cp
/ b Mhe
gnre er
e da
• friU t
u bd 11
pee start command e0
rr reader name stop uummand time code name dn
+ + - ----------------------
01 01 EP12 ------------------------------ NON WORE
enable point
disable point
01 01 FRONT DOOR UD NOR AL
unlock door
LD
lock. door
01 05 PRODUCTION CM NORMAL
card only mode
CF'
card and PIN mode
B-10
IF/THEN COMMAND FILE
I n
F
m
Tb
He
In Er
F o N
/ m
T b I
H eG
E rM
N /
g e
o d
u e IF reader name s e n d p t h i s me s s a g e
p r- THEN reader- name r e c i e v e s t h i s command d u r i n g time code name
+ + + ----------------------------------------
01 01 FRONT DOOR DF NON WORK
door forced op,n
01 01 XN
X relay on
01 01 POZ ALWAYS
point opened
YN
Y relay on
01 02 BAC DOOR DF NON WORK
door forced open
01 01 XN
X re/ay on
B-11
APPENDIX C MENU OVERVIEW
and STRUCTURE
Main selection menu ..................................................................... C-1
Alarm menu .................................................................... 0-2
Control menu .................................................................. C-2
History menu .................................................................. C-2
Data base menu ............................................................. C-3
Status menu ................................................................... C-3
APPENDIX C
MENU OVERVIEW and STRUCTURE
EF-CONTROL
FI-ALARM F3-
HISTORY F5-
MENU HLP
ALARM MENU
F 1 -ALARM
F 1 - SILENCE F3-AKNOWLEDGE
ALARM ALARM
CONTROL MENU
F2 -CONTROL
F 1 -READER/ F2-MONITOR
F2 F3-CONTROL F4-ANT I - F 4 - LOAD F6- LOGOFF
DOOR POINT RE LAY PASSBACK IGM
COMMANDS COMMANDS COMMANDS COMMANDS
H I STORY MENU
F3-HI STORY
F6-TRANSACT I ON
REPORT S
DATABASE MENU
F5
DATABASE
Fl-OPERATING F2
F2-MONITOR F4-OPERATOR F6 -LOGOFF
F3 -PAREMETERS
FILES AND PERMISIONS
CONTROL
Fl-MONITOR
Fl F2-ALARM F3-CONTROL F4-TIMMED F5-IF/THEN
POINT MESSAGE RELAY COMMAND COMMAND
FILE FILE FILE FILE FILE
STATUS MENU
F8-ACCESS
STATUS
Fl-READER
READER F2-MONITOR F3-CONTROL F4-IGM
/DOOR POINT RELAY STATUS
STATUS STATUS STATUS
APPENDIX D GLOSSARY OF TERMS
ACA
An abbreviation for Asynchronous Communications Adapter.
The ACA is configured as one of the 1/0 ports on the host
processor and is used to communicate with the local hard
wired group of IGMs by converting RS232 signals to current
loop protocol.
access
The process of entering a secured area through a door which
is controlled by a card reader.
access authorizations
Permission granted to a cardholder to enter a location based
on a programmed time schedule.
address
A unique designation for the identity of an IGM or reader.
An IGM will respond only to messages, containing its own
address, sent from the host processor.
alarm
A transaction in the Access Control system that has been
designated by the user as an "alarm." Alarms cause an
audible signal at the host processor.
Alarm Bypass Relay
A relay in the IGM that is used to shunt or bypass the door
alarm contacts of an existing alarm s ystem to allow
authorized access without causing an alarm.
Alarm Relay
A relay in the IGM which energizes for 3 seconds in
response to any reader or door related alarm transaction.
The alarm relay may, in turn, be used to annunciate the
alarm to another location.
anti-pass back
A mode of operation where the two readers connected to an
IGM are used as "In" and "Out" readers. Once a card is
used at the "In" card reader, that card will be denied access
at the "In" reader until it is used at the "Out" reader. This
prevents an individual who has entered at an "In" Card
Reader from passing back" his other card to another person
for unauthorized access. Anti-pass back is best used where
entry to the secured area is possible through only one door.
D-1
archive
An ongoing collection of transaction data stored on floppy
diskettes.
buffer
A portion of RAM within the IGM which is dedicated to
storing transactions when the IGM is not being polled by the
host processor.
cardholder
An individual who has been issued an access control card.
COM
The designation given to the communications port of a
computer or asynchronous communications adapter.
Computers using DOS typically can communicate with COM 1
or COM 2.
command
A message sent by the host processor which initiates a
specific action at a reader or IGM. Commands may be either
manual or automatic.
communication
The process of transferring data between the host processor
and IGMs.
control relay
An extra relay output contained in a Model 45 IGM which
may control an external device on a timed or if/then basis.
The Model 45 IGM has two control relays designated as "X"
and "Y."
Current Loop
A type of serial communication in which the presence or
absence of an electrical signal indicates the state of the bit
being transmitted. The Liebert Access Control system uses a
20 milliamp current loop for communication with the IGMs
and Card Readers.
cursor
The movable pointer on the host processor's display screen
which identifies where the next character entered on the
keyboard will be typed.
D-2
customer code
A six-digit number encoded on the access control card. The
customer code is common to all cards used within a facility
or system.
database
A collection of data used by the host processor and IGMs to
limit access to secured doors and to control input, output and
reporting functions.
database maintenance
The task of expanding, updating and otherwise keeping the
database information intact.
de-energized
Refers to the state of an electrical device when power is not
applied; usually a relay.
default
An assumption made by the system when no specific choice
is given by the program or the user.
dial-up loop
A group or string of remote IGMs connected on the same
communications line which connects to the host processor via
dial-up modem over the standard telephone network.
directory
An organized grouping of related files on a hard or floppy
disk.
DIP switch
A switch which may be opened or closed and is used to
program an IGM to perform in a certain way.
diskette
A floppy disk. A low cost bulk storage medium for mini and
microcomputers. See floppy disk.
distributed database
A technique by which the system database is downloaded
from the host processor and stored at the IGM level. This
technique allows the IGM to continue to function when the
host processor is not online.
D-3
door contact
A normally closed magnetic or mechanical switch mounted to
a door which signals the IGM as to the open or closed status
of the door.
door strike
An electromechanical device used to lock and unlock a door
under electrical control.
DOS
An abbreviation for "Disk Operating System" and is a series
of programs which are used to keep track of files, save and
retrieve files, allocate disk storage space and manage other
control functions associated with disk storage.
download
The transfer of database information from the host processor
to the network IGMs.
dry contact
A contact that is isolated or not connected to any electrical
source.
DS/DD
Double Sided/Double Density. Refers to the recording density
and configuration of a floppy disk.
dual/quad density
Refers to the amount of information that can be recorded for
a given area in accordance with an accepted standard for
computer disk drives. For example, single, dual or quad
density.
enable
The process of turning on a device or function. An enable
monitor point command (EP), for example.
encoded
The result of transferring information in a coded form to a
medium, such as magnetic stripe.
D-4
energized
The state of a relay or door strike when power is applied.
event
Transactions reported by the Access Control system that
have been defined by the user as "non-alarm" conditions.
exit request
A contact closure which signals the IGM to unlock a door
without causing an alarm. Exit request is independent of a
normal card swipe.
field
A group of related characters treated as a unit; for example,
the name of a cardholder.
file
The orderly arrangement of related data or information. Files
may contain multiple records.
floppy disk
A disk which may be inserted and removed from the host
processor and is used to magnetically store data.
format
In a computer, format generally refers how the machine
arranges information on a disk. Also applies to a printout.
group
The collection of IGMs and readers on a single
communications line.
hard disk
The non-removable disk in the host processor where all
programs and database information are magnetically stored.
hard wired
The method of wiring a local group of IGMs directly to the
host processor without the use of a modem or telephone line.
holiday
Any scheduled non-work day observed by a company. Does
not necessarily have to conform to any national, state, or
regional observed holiday.
D-5
host processor
A personal computer used to program and download
database information to the network IGMs. The host
processor also polls the network and stores transaction data.
IBM PC-XT compatible
A personal computer not manufactured by IBM but by another
company designed to be functionally equivalent and operate
the same software as the IBM. Also called a clone.
input
The introduction of data into a computer's internal storage
unit(s) from an external device; i.e., the data received from
an IGM is input data. Contrast with output.
1/0 port
Short for input/output port and is the connection on the host
processor through which data is routed to or from the
network IGMs.
Kb
Kilobyte, or one thousand bytes or characters of information.
Defines the measure of memory capacity; i.e., 64 Kb or 64
Kilobytes.
D-6
log
The collection of transaction data in a file on the host
processor's hard disk drive. Also, the process of writing
transaction data to the log file.
logoff
The act of terminating or ending a session with the host
processor by the user.
logon
The act of entering a name and password on the host
processor before viewing or changing the system database is
allowed.
loop
A communication path in which data being sent from the host
is transmitted on one set of wires and data being sent from
an IGM is transmitted on another set of wires. This, in
essence, forms a communications loop.
magnetically encoded
Coded information (usually digital) that has been recorded on
magnetic material. Information on the Access Control
magnetic stripe cards has been magnetically encoded.
Mb
Megabyte, or one million bytes or characters of information.
Defines the measure of memory capacity; i.e., 20 Mb or 20
M megabytes.
monitor point
A dry contact which is monitored by a Model 45 IGM.
MS-DOS
A disk operating system for microcomputers developed by
Microsoft Corporation. See DOS.
network
The total series of points connected by communications
channels. The IGMs and Card Readers of the Access
Control system constitute a network.
D-7
on-line
Des c r i b es eq u i pm ent , de v ic es a nd per s o ns i n d ir ec t
communication with the central processing unit of a computer.
Condition of computer peripheral equipment that is physically
connected to the computer and ready to function.
Onsite/64 (TM)
The proprietary software developed by Liebert Corporation for
its Access Control and Monitoring System. Runs on an IBM
PC-XT compatible computer that uses the MS-DOS operating
system.
open a menu
The act of selecting a file to view through a menu in the
access control software.
operator permissions
A file which contains the names and passwords of the
persons who are allowed to logon to the host and change or
view database and status information.
output
Data transferred from a computer's internal storage to some
external device. For example, the output to a printer.
password
A special word, code or symbol that must be presented to
the computer system to gain access to its resources.
Identifies the user to the computer system.
PIN
Personal Identification Number. Used as an individualized
personal ID that must be entered at keypad type card
readers after the card is swiped.
poll
A request made by the host processor for transaction data
from IGMs on the network.
port
That portion of a computer through which a peripheral device
may communicate.
program
A sequence of instructions that permits a computer to perform
a particular task.
D-8
pulse
The process of momentarily energizing a control relay for a
predetermined period of time.
RAM
An abbreviation for Random Access memory in which
information can be written to, read from and erased from
computer chips located in the host processor and IGMs.
RAM typically is volatile memory, which means it loses its
contents when power is removed. Therefore, RAM is battery
backed in the IGM.
record
A single entry containing related information to describe a
complete action, function or parameter in a database file.
relay
A magnetically operated mechanical switch.
remote
Refers to a group of IGMs and readers which are on a dial-
up communication loop, via modem, to the host processor.
RS232C
A data communications industry standard for the serial
transmission of data to a peripheral device, such as a printer,
modem, etc. Most computers provide an RS232C interface.
secured door
A door which is controlled by a card reader.
software
A set of programs, procedures, routines and/or documents
associated with the operation of a computer system.
Software is the name given to the programs that induce a
computer to carry out particular operations. The software for
a computer system may be classified as applications
programs or systems programs. Contrast with hardware.
subdirectory
An organized grouping of related files on a hard or floppy
disk that branches or subordinates from a main directory.
D-9
ON SITE
A World Leader in
Computer Support
Systems
Environmental Control
Power Protection
Site Monitoring/
Control Deluxe Systemr3
Environmental
Fire Suppression Control System
System Buikting Chiller
Liebert Corporation Diesel
Generator
designs, manufactures
and markets complete UPS System
and Battery
systems for improve-
ment of computer
uptime and perfor- nao
mance. The result is
improved business
operations, increased
productivity and higher
return on the computer
investment. Liebert
CSU3000
Systems provide Coolant Supply
Unit
dependable environ-
mental control and Power Conditioning
SiteScan Computer Room System
Monitoring and Control
electrical power pro-
tection, combined with
centralized monitoring
and control. This
approach represents a
single-source inte-
grated computer
support network.
Based on over two
decades of experience
and over 80,000
installations world-
wide, Liebert is Sievert
committed to offering
the highest quality
Liebert Corporation
products and services 1050 Dearborn Drive, P.O. Box 29186
for applications requir- Columbus, Ohio 43229
Telephone: 614-888-0246 While every precaution has been taken
ing computer support. Facsimile: 614-841-6973 to ensure accuracy and completene
Telex: 6874616 in this manual, Liebert Corporatior
assumes no respcnsibility, end
disclaims all liability for damages
Liebert Group resulting from use of this information
Cherry Orchard North or for any errors or omissions.
Kembrey Park t1990 Liebert Corporation
Swindon
Wiltshire SN2 6UH All rights reserved throughout the world.
United Kingdom Specifications sub(ect to change without
Telephone: (44-793) 491-777 notice.
Facsimile: (44-793) 491-701 Liebert and the Liebert logo are
Telex: 449716 G registered trademarks of Liebert
Corporation.
Printed in U.S.A.
SL-28027 (R4/90)