Anda di halaman 1dari 260

ACCESS CONTROL

2.14 L i e b e r t
On.SiteIG4TM O n -
USER'S MANUAL Si te/ 10 T"
NOTICE
The information contained in this manual is subject to
change without notice.

Liebert Corporation shall not be held liable for technical or


editorial omissions or errors made herein nor for incidental or con-
sequential damages resulting from the furnishing, performance, or
use of the material.
This document contains proprietary information protected
by copyright. All rights reserved. No part of this document may be
photocopied or reproduced by mechanical, electronic or other
means in any form without prior written permission of Liebert Cor-
poration.
The enclosed materials are provided to you in the ex-
pressed condition that you agree to this software license. By us-
ing the On-Site software, you agree to the following provisions (if
You do not agree with these provisions; return the software to
your Liebert representative in the original packaging within 3 days
from receipt for a refund):
1. The On-Site software and the disk(s) on which it is con-
tained (the Licensed Software) is licensed to you, the end-user
only for your own internal use. You may not transfer, sub-
license, rent, lease, convey, copy, modify, translate, convert to
another programming language, decompile or disassemble the
Licensed Software.
2. The Licensed Software is provided "as is". All warran-
ties and representations of any kind with regard to the licensed
software are hereby disclaimed. Under no circumstances will the
manufacturer or developer of the licensed software be liable for
any consequential, incidental, special, or exemplary damages.

Liebert, the Liebert logo, and On-Site/64 are registered trade-


marks of Liebert Corporation.
MS-DOS is a trademark of Microsoft Incorporated.

IBM XT is a trademark of
International Business Machines Incorporated.

Ventra CS is a trademark of Hewlett-Packard Co.

Sentinel Pro is a trademark of Rainbow Technologies, Inc.


TABLE OF CONTENTS
SECTION I INTRODUCTION

Chapter 1 System/Hardware Overview ....................... 1-1


Introduction .............................................................................. 1-1
The Onsite System .................................................................. 1-1
Hardware .................................................................................. 1-4
Host Processor ..................................................................... 1-4
Printer ................................................................................... 1-6
Card Readers ....................................................................... 1-6
IGMs ..................................................................................... 1-6

Chapter 2 Software Overview ...................................... 2-1


Software Versions .................................................................... 2-1
Software Features .................................................................... 2-1
Files .......................................................................................... 2-3
Commands ............................................................................... 2-5
Polling ...................................................................................... 2-5
Reports ..................................................................................... 2-6

SECTION II PLANNING THE SYSTEM

Chapter 3 Planning the System ................................... 3-1


Site Planning 3-1
Site Diagram ........................................................................ 3-1
Access and Monitoring Considerations ................................... 3-2
Planning Forms ........................................................................ 3-4
Chapter 4 Planning the Database Operating
Files ............................................................... 4-1
Introduction .............................................................................. 4-1
Card Reader Features ............................................................. 4-1
Toggle Card ......................................................................... 4-1
Executive Privilege ............................................................. 4-1
Duress ................................................................................. 4-2
Reader/Door File ...................................................................... 4-3
Card Reader Numbers ......................................................... 4-4
Door Name ......................................................................... 4-4
Unlock Time ........................................................................ 4-4
Open Time 4-5

User's Manual (4/90) i Sievert Incite


Time Code File ...................................................................... 4-6
Time Code name ............................................................... 4-7
Active Days ........................................................................ 4-7
Start/Stop Times ................................................................ 4-7
Holiday File ............................................................................ 4-8
Access Code File ................................................................... 4-9
Access Code Name ......................................................... 4-10
RDR # and Door Name ................................................... 4-10
Time Code Name ............................................................ 4-10
Card File .............................................................................. 4-11
Card Number ................................................................... 4-13
Cardholder Name ............................................................ 4-13
Access Code .................................................................... 4-13
User-Defined Fields ......................................................... 4-13
PIN ................................................................................... 4-13
Chapter 5 Planning Database Monitor and
Control Files .................................................... 5-1
Monitor Point File (IGM Models 45 and 45U Only) 5-1
Group Number ................................................................... 5-3
IGM/Reader ....................................................................... 5-3
Point Number ..................................................................... 5-3
Point Name ........................................................................ 5-3
Opening Point Message .................................................... 5-3
Closed Point Message ....................................................... 5-3
Alarm Condition ................................................................. 5-3
Alarm Message Number .................................................... 5-3
Trace To ............................................................................ 5-4
Alarm Message File (IGM Model 45 Only) ............................ 5-4
This Message Number ...................................................... 5-5
Alarm Message .................................................................. 5-5
Next Message Number ...................................................... 5-5
Control Relay File (IGM Model 45 Only) ............................... 5-6
Group Number ................................................................... 5-7
IGM Number ...................................................................... 5-7
Relay .................................................................................. 5-7
Relay Name ....................................................................... 5-7
On Message ...................................................................... 5-7
Off Message ...................................................................... 5-7
Pulse Message .................................................................. 5-7
Pulse Time ......................................................................... 5-7
Timed Command File ............................................................ 5-8
Time Code Name .............................................................. 5-9
Group Number ................................................................... 5-9
Card Reader Number ........................................................ 5-9

User's Manual (4/90) ii Sievert Incite


Start Command .................................................................... 5-9
Stop Command .................................................................. 5-10
If/Then Command File ........................................................... 5-11
Group Number ................................................................... 5-13
(IGM/Reader Number) ....................................................... 5-13
Message
5-13
Then Condition ...................................................................... 5-14
Group Number ................................................................... 5-14
(IGM/Reader Number) ....................................................... 5-14
Command .......................................................................... 5-14
Time Code Names ............................................................. 5-14

SECTION III GETTING STARTED


Chapter 6 System Set-Up ............................................. 6-1
Introduction .............................................................................. 6-1
Host Processor ........................................................................ 6-1
IGM to Host Processor Connection ..................................... 6-2
Printer ...................................................................................... 6-3
Configuring the IGMs ............................................................... 6-3
IGM Processor Board Setup .................................................... 6-3
IGM Address - Switches 1 - 5 ............................................. 6-3
Card Delete - Switch 6 ......................................................... 6-4
Cards/Transaction Capacity - Switch 7 ............................... 6-4
Control Relay Y Mode - Switch 8
(Model 45 IGM Only) ....................................................... 6-5
Baud Rate Jumper ............................................................... 6-6
Memory Backup Jumper ...................................................... 6-6
IGM Interface Board Setup ...................................................... 6-6
Door Strike Voltage Selection .............................................. 6-6
IGM Trouble Alarm - Jumper P13
(Models 45 and 45U Only) ............................................... 6-7
Unit on Battery Alarm - Jumper P14
(Model 45U Only) ............................................................. 6-7
Lock Override - Jumper P11 ................................................ 6-7
Fire Panel Option - Jumper P12 .......................................... 6-7

Chapter 7 the Onsite Software ..................................... 7-1


I introduction n ......................................................................... 7-1
DOS ......................................................................................... 7-1
The Onsite Software ................................................................ 7-1
Software Protection ................................................................. 7-3

User's Manual (4/90) iii Sievert Incite


Chapter 8 Initializing the System ....................................... 8-1
Introduction ............................................................................ 8-1
Initializing the System ............................................................ 8-1
Logon the System .................................................................. 8-1
Operator Permissions ............................................................ 8-3
Set Time and Date ................................................................. 8-6
Customer Code ..................................................................... 8-8
1/0 Port Configuration
- Hard Wired Loops ............................................................ 8-9
Group Number ................................................................. 8-10
Communication Port Number .......................................... 8-10
IGM/Modem Baud Rate ....................................................... 8-11
1/0 Port Configuration
- Dial-Up Loops ................................................................ 8-12
Group Number ................................................................. 8-12
Communication Port Number .......................................... 8-12
IGM/Modem Baud Rate ................................................... 8-12
Modem Dial Command .................................................... 8-12
Remote Site Identify ........................................................ 8-13
Remote Site Password .................................................... 8-13
Remote Access Telephone Number ................................ 8-13
Remote Initial Call Time .................................................. 8-14
Remote Call Delay Time .................................................. 8-14
Remote Wait Time for Answer ......................................... 8-14
Remote Retry Dial Count ................................................. 8-14
Remote Retry Time Interval ............................................. 8-15

SECTION IV OPERATING THE DATABASE


Chapter 9 Database Operating Files ........................ 9-1
Introduction ............................................................................ 9-1
File Operations ...................................................................... 9-2
Previous Menu ................................................................... 9-2
Modify ................................................................................ 9-3
Prior ................................................................................... 9-3
Next ................................................................................... 9-3
Add ..................................................................................... 9-3
Delete ................................................................................ 9-4
Print ................................................................................... 9-4
Help ................................................................................... 9-5
Sort .................................................................................... 9-5
Search ............................................................................... 9-5
Operating Files ...................................................................... 9-7

User's Manual (4/90) iv Sievert Incite


Reader/Door File ..................................................................... 9-9
Door Name .......................................................................... 9-9
Group Number ................................................................... 9-10
Reader Number ................................................................. 9-10
Unlock Time ....................................................................... 9-10
Door Open Time ................................................................ 9-10
Time Code File ...................................................................... 9-12
A Special Note about Time Codes .................................... 9-13
Time Code Name ............................................................... 9-13
Time code Number ............................................................ 9-13
Day of the Week ................................................................ 9-13
Start Time
9-14
Stop Time
9-14
Holiday File ............................................................................ 9-15
Date ................................................................................... 9-15
Holiday Name .................................................................... 9-16
Access Codes ........................................................................ 9-17
Access Code Name ........................................................... 9-17
Door Name ........................................................................ 9-18
Time Code
9-18
Card File ................................................................................ 9-19
Card Number ..................................................................... 9-20
Name ................................................................................. 9-20
Access Code ...................................................................... 9-20
User Fields
9-20
Trace To ............................................................................ 9-20
Status ................................................................................. 9-21
Chapter 10 Database Monitor and Control Files 10-1
I introduction n ....................................................................... 10-1
Monitor Point File (Model 45 IGM Only) ................................ 10-1
Group Number ................................................................... 10-3
IGM Number ...................................................................... 10-3
Point Number ..................................................................... 10-3
Point Name ........................................................................ 10-3
Opening Point Message .................................................... 10-3
Closing Point Message ...................................................... 10-3
Alarm Condition ................................................................. 10-4
Alarm Message Number .................................................... 10-5
Trace To ............................................................................ 10-5
Alarm Message File (Model 45 IGM only) ............................. 10-6
Message Number .............................................................. 10-7
Alarm Message .................................................................. 10-7
Link to Next Message ........................................................ 10-7
User's Manual (4/90) v Sievert Incite
Control Relay File (Model 45 IGM Only) .............................. 10-8
Group Number ................................................................. 10-9
IGM Reader Number ........................................................ 10-9
Relay "X" or "Y" ............................................................... 10-9
Relay Name ..................................................................... 10-9
On Message ..................................................................... 10-9
Off Message ..................................................................... 10-9
Pulse Message ............................................................... 10-10
Pulse Time ..................................................................... 10-10
Timed Command File ......................................................... 10-11
Time Code Name ........................................................... 10-13
Group Number ............................................................... 10-13
IGM/Reader Number ...................................................... 10-13
Start Command .............................................................. 10-13
Stop Command .............................................................. 10-13
IGM Scheduled Operation ............................................. 10-13
If/Then Command File ....................................................... 10-14
If Group Number ............................................................ 10-15
if IGM/Reader Number ................................................... 10-16
Sends This Message ...................................................... 10-16
Then Group Number ...................................................... 10-16
Then IGM/Reader Number ............................................ 10-16
Receives This Command ............................................... 10-16
During This Time Code .................................................. 10-16
Chapter 11 System Parameters ......................................... 11-1
Introduction .......................................................................... 11-1
Customer Code ................................................................ 11-1
Alarm Definitions .............................................................. 11-2
Titles ................................................................................. 11-5
1/0 Port Configuration ...................................................... 11-7
Operator Permissions File ................................................... 11-8

SECTION V CONTROLS AND REPORTING


Chapter 12 System Control/Commands .......................... 12-1
Introduction .......................................................................... 12-1
Printer Toggle ....................................................................... 12-1
Date and Time ...................................................................... 12-2

User's Manual (4/90) vi Sievert Incite


Commands ............................................................................ 12-3
Reader/Door Commands ...................................................... 12-4
Card and PIN Mode ......................................................... 12-5
Card Only Mode ............................................................... 12-5
Customer Code Only ....................................................... 12-6
Customer Code Only
(Store Transactions) ...................................................... 12-6
Enable Anti-Pass back ..................................................... 12-6
Disable Anti-Pass back .................................................... 12-6
Grant Access ................................................................... 12-6
Unlock Door ..................................................................... 12-6
Lock Door ......................................................................... 12-6
Monitor Point Commands ...................................................... 12-7
Disable Monitor Point ....................................................... 12-7
Enable Monitor Point ........................................................ 12-7
Control Relay Commands ..................................................... 12-9
On .................................................................................... 12-9
Off .................................................................................... 12-10
Pulse ................................................................................ 12-10
Anti-Pass back Commands ................................................... 12-11
Out ................................................................................... 12-12
In ...................................................................................... 12-12
Neutral ............................................................................. 12-12
Load IGM Commands ........................................................... 12-14
Logoff .................................................................................... 12-17
Chapter 13 System History ................................................ 13-1
Introduction ........................................................................... 13-1
Transaction Reports .............................................................. 13-1
Transaction Reports Screen Number .............................. 13-2
Start Date ......................................................................... 13-3
Stop Date ......................................................................... 13-3
Start Time ........................................................................ 13-4
Stop Time ......................................................................... 13-4
Select Name .................................................................... 13-4
Select Card ...................................................................... 13-4
Select Activities ................................................................ 13-4
Select Locations ............................................................... 13-5
Select Monitor Points ....................................................... 13-5
Select Control Relay ........................................................ 13-5
Activity Selection Screen ................................................. 13-6
Door Selection Screen ..................................................... 13-7
Monitor Point Selection Screen ....................................... 13-8
Control Relay Selection Screen ....................................... 13-10

User's Manual (4/90) vii Sievert Incite


Transaction Report Output ................................................. 13-11
The Printed Report ......................................................... 13-11
ASCII File ........................................................................ 13-14
Chapter 14 System Status .................................... 14-1
Introduction ........................................................................ 14-1
Reader/Door Status ...................................................... 14-2
Monitor Point Status (Model 45 IGM Only) ............... 14-5
Control Relay Status (Model 45 IGM Only) ............... 14-7
IGM Status ......................................................................... 14-9

APPENDICES
APPENDIX A Access Control Planning Form s
APPENDIX B Transaction Reports and File Structures
APPENDIX C Menu Overview and Structure
APPENDIX D Glossary of Terms

User's Manual (4/90) viii Sievert Incite


SECTION I INTRODUCTION

Chapter 1 System/Hardware Overview


Chapter 2 Software Overview
CHAPTER 1 SYSTEM/HARDWARE
OVERVIEW
I introduction n ................................................................ 1-1
The Incite system .................................................... 1-1
Hardware ........................................................................ 1-4
Host processor ....................................................... 1-4

Card Readers ........................................................ 1-6


IGMs .................................................................. 1-6

DIAGRAMS, DRAWINGS, TABLES


1-1 Basic System Configuration ....................... 1-2
1-2 Remote System Configuration .................... 1-5
INTRODUCTION
This user manual focuses on the proprietary Onsite (TM)
software developed by Liebert Corporation for its Access
Control and Monitoring System. The Onsite system software
is available in two basic models; Onsite/10 and Onsite/64.
T he Onsite/10 software controls up to 5 IGMs and 10
readers per system. The Onsite/64 software controls up to
32 IGMs and 64 readers per system. All other software
functions and features are the same for both systems. This
manual applies to Version 1.2 of the Onsite software.
lt is assumed that the system is completely installed and
all wiring is thoroughly checked. If this has not been
completed, or if there are questions regarding the installation
requirements of the system, consult the Onsite installation
manual.

THE ONSITE SYSTEM


The Liebert Access Control System is a microprocessor
based network consisting of a Personal Computer or Host
Processor, printer and a combination of one or more IGMs
and Card Readers. See Figure 1-1.
The system utilizes a distributed database technique,
meaning that the information used to authorize access, the
database, is distributed and stored in IGMs throughout the
network.
Eac h IG M c an c ontr ol two Car d Readers . T he Car d
Reader translates encoded data from a magnetic stripe that
has been bonded to a plastic card. The cardholder may also
key in a PIN number (Personal Identification Number) to
provide an additional level of security at Card Readers
equipped with an integral keypad.
T he user creates the system database files on the
Personal Computer, referred to as the host or host processor.
Once created, the host downloads these files to the network
IGMs where the access decisions are made by comparing the
card information with the stored database. The IGM(s) will
then control access to individual cardholders by time of day,
day of week and location at secured doors.

User's Manual 1-1 Sievert Incite


CPU
PRINTER

MODEL 40 IGM COMMUNICATIONS INTERFACE


OR CURRENT LOOP — 20 mA
MODEL 45 IGM MAXIMUM LENGTH — 3000 f

IGM

CARD READER CARD READER


MODEL 20 MODEL 20

MAXIMUM LENGTH COMMUNICATIONS INTERFACE


IGM TO READERS CURRENT LOOP — 20 mA
1000 ft MAXIMUM LENGTH — 3000 f t

CARD READER CARD READER/PIN


IsIODEL 20 TWO READERS PER IGM MODEL 21
ANY COM9INATION (MODEL 20 OR 21)
32 IGM'S MAXIMUM
64 READERS

Figure 1-1 BASIC SYSTEM CONFIGURATION

User's Manual 1-2 Sievert Incite


The host processor continuously polls the network IGMs for
transaction data. Depending on the user instructions, the
host will print, display and/or store the transactions on the
system's hard drive. lf communications with the host are
broken, the network will continue to authorize or deny access,
monitor contacts and control devices, and store transactions
for all events. Once communications are restored, the
network IGMs will send their stored transactions back to the
host.
*** EXCEPTION ***
The host must be on-line to perform "IF/THEN" commands
as explained later in this manual.
A series of commands may be executed from the host
processor to control and monitor devices, determine network
status, make inquiries about defined activities and more.
Commands may also be programmed to automatically control
door strikes, output relays, alarm contacts and so on.
As a user option, every transaction that occurs in the
system can be printed, displayed and stored on a hard disk.
At a later date, a formatted report of all transactions or
specific transactions in a requested time period may be
made.
Transactions accumulated on the computer's hard disk
form a system log. This collection of data may be off loaded
periodically to floppy diskettes to create a continuous
transaction history.

User's Manual 1-3 Sievert Incite


HARDWARE
HOST PROCESSOR
The "host processor" or PC supplied with the Liebert
Onsite system uses the MS-DOS version 3.3 or higher
operating system. Memory capacity is 640Kb of RAM with
one DS/DD floppy drive and a 20Mb hard disk.
The host communicates with the network via a 4 wire, 20
milliamp current loop connected to the host's asynchronous
communications adapter (ACA), which is configured for
current loop protocol.
As an option, a modem may be connected to the host's
serial port (COM1) to allow communications with remote IGM
locations.
The host processor uses the hard disk to store the Onsite
programs, the system database, and to log the system
transactions. The system can store up to 32,000 transactions
on the hard drive. This data may be recalled at any time to
produce reports for activity during any given period. To avoid
a possible loss of data, transactions should periodically be
off-loaded to floppy disks. This also provides a continuous
history for archives.

User's Manual 1-4 Sievert Incite


CPU
PRINTER

1-=-1 1° I

COMMUNICATIONS INTERGACE
CURRENT LOOP - 20 mA MAX/MUM LENGTH - 1174_ MODEM
3000 ft
1
IGM TO IGM 11 dI

ODE 1IIODEA

CARD READER CURRENT


LOOP — CARD READERS
mODEL 20 CONVERTER MODEL 20

IG IG IDA

MODEL 40 IGM
OR
MODEL 45 IGM
32 IGIA•S MAX

IG IGM

IGM TO READER
MAXIMUM LENGTH —C)
1000 11
dld 1H1
CARD READER/P/N CARP READERS MODEL 20
MODEL 21

Figure 1-2 REMOTE SYSTEM CONFIGURATION

User's Manual 1-5 Sievert Incite


PRINTER
All system activity is displayed in a scroll area on the
host's display monitor. As the information scrolls, older
information is replaced with new data. A Parallel Printer
connected to the host processor produces a running
hard-copy printout, which allows the user to view the
information at any time.

CARD READERS
The Card Reader translates magnetically encoded data
from a special plastic card. Card Readers are available in
both PIN (Personal Identification Number) and non-PIN
models. The PIN model has an integral keypad on which the
user enters a four-digit identification number. The Card
Readers have red and green LED indicator lights to prompt
the user to enter a PIN number (on PIN models) and indicate
whether access is granted or denied.

IGMs
The IGM, or Information Gathering Module, interprets the
information sent to it by the Card Reader and is the local
decision maker for granting or denying access, based on its
s tor e d da t ab as e. O ne or t wo C ar d R e ad er s m a y be
c onnec ted to eac h IG M and up to 32 IG Ms m ay be
connected to the system network, for a total of 64 Card
Readers/doors system wide. The IGM also contains the
outputs to monitor and control the electric locks, door monitor
switches, exit request buttons and alarm relays.

User's Manual 1-6 Sievert Incite


IG Ms c om m unic at e o v er a 4- wi r e 20m a c ur r e nt lo o p
communication line and operate on a poll/response mode.
Each IGM has its own unique address and will only respond
to messages sent from the host which contains its address.
This feature allows the IGMs to be connected on a single
loop and pass data along to subsequent IGMs on the loop or
back to the host processor. The four different IGM models
are as follows:
Model 40 - Contains: (2) reader inputs,
(2) door strike outputs
(2) exit request inputs
(2) door monitor switch inputs
(2) door alarm relay outputs
(2) alarm bypass relay outputs
(2) outdoor reader heater
connections
(1) host communication input port
(1) host communication output port
(1) fire panel input

Model 45 - Contains: Same as Model 40 plus


(8) inputs for dry contact monitoring
(2) additional relay outputs

Model 40U - Contains: Same as Model 40 plus


(1) built-in 12 VDC battery supply
(1) built-in battery charging circuit
Model 45U - Contains: Same as Model 45 plus
(1) built-in 12 VDC battery supply
(1) built-in battery charging circuit
The IGM model number is stamped on an identification
label located on the outside of the unit.
Any combination of Model 40 and Model 45 IGMs may be
connected to the system as long as the total number of IGMs
does not exceed the software capacity.
Throughout this manual, the IGM includes both the Models
40, 40U, 45, and 45U IGMs, unless stated otherwise.

User's Manual 1-7 Sievert Incite


I
CHAPTER 2 SOFTWARE OVERVIEW
Software Versions ................................................... 2-1
Software features ........................................................ 2-1
Files ........................................................................... 2-3
Commands .................................................................. 2-5
Polling ........................................................................ 2-5
Reports ..................................................................... 2-6

DIAGRAMS, DRAWINGS, TABLES

2-1 Screen Layout .......................................... 2-2


2-2 Software Menu Tree ................................. 2-4
SOFTWARE VERSIONS
T he Onsite s ystem software is available in two basic
models: Onsite/10 and Onsite/64. The Onsite/10 software
controls up to 5 IGMs and 10 readers per system. The
Onsite/64 software controls up to 32 IGMs and 64 readers
per system. All other software functions and features are the
same for both systems. This manual applies to Version 1.2
of the Onsite software.

SOFTWARE FEATURES
The Onsite user-friendly software is menu-driven and
utilizes on-the-screen prompts to direct the user to select a
function from a list or menu. After each selection, the
software will either execute the selected action or offer
prompts for additional choices and request that data be
entered. No programming knowledge is required, and
software operation can be learned in a short period of time.
Figure 2-1 shows the basic screen layout.

User's Manual 2-1 Sievert Incite


02-26-90 10:38:08 Sievert

LOGON
name [Incite/64
password [

Operator logged on 1 of1


1-ALARM 2-CONTROL ACCESS CONTROL
3-NISTO6Y 4- 10:09:46 onsite/64 startup on 02-26-90
5-DBASE 6-Logoff 10:09:46 LIEBERT Incite/64 Version 1.2
7-PRINT 8-ACC STAT 10:09:46 Copyright (c) 1987 - 1989 All rightsreserved.
9-Meng H1p 10-Quit 10:09:47 Connected group 01 to COM2

Figure 2-1 SCREEN LAYOUT

The system software performs the following functions:


a. creates files
b. executes commands
c. polls the network
d. logs transactions
e. generates reports
Function keys, indicated and labeled at the lower left-hand
corner of the screen, form the menu structure. The function
keys are pre-programmed to perform system operations. For
example, Function key F8 offers "Help" screens which provide
on-line assistance that can be called up and exited anytime
the system is in a database file. Some users may find the
F9-MenuHelp key useful. This feature uses the screen to
display the entire menu system in detail.

User's Manual 2-2 Sievert Incite


FILES
Menu-driven software simplifies the process of creating
files. ln each menu, the length of the data entry field is
defined on the screen. Only the number of characters that fit
within the field length will be accepted. As the user
completes a field entry, the <RETURN> key will move the
prompt to the next entry field.

F1 .....move to previous menu


F2 .....modify a record
F3 .....move to previous record
F4 .....move to next record
F5 .....add a record
F6 .....delete a record
F7 .....print a record or file
F8 .....help
F9 .....sort the records in a file
F10....search for a record
T hese function keys help to create and manage the
database. The functions of each of these keys will change
depending on which part of the system is being used, i.e.
ALARM, CONTROL, HISTORY or DBASE. Each function key
label is either in capitalized or lower case letters. Capitalized
keys indicate further sub-menus under that key. Lower cased
keys do not offer additional menus under that key. Each of
the possible function keys will be explained in detail later on
in this manual. Figure 2-2 shows the software menu tree.

User's Manual 2-3 Sievert Incite


Figure 2-2 SOFTWARE MENU TREE

User's Manual 2-4 Sievert Incite

I
COMMANDS
Com m ands m a y b e ex ec u t ed e i th er m anu a l l y or
automatically. By selecting the COMMANDS menu option,
the user can execute commands manually, for example;
unlock a door or lock a door. The same commands may
a ls o b e pr o gr am m ed t o ex ec u te au tom at ic a l l y b y
programming a "Timed Command" or "If/Then Command".
Automatic commands fall into one of two categories:
"Timed Commands" are programmed to automatically execute
tasks at specified locations on the start and stop times of a
given Time Code. These commands occur at a given time of
day and day of the week.
"If /T h e n Com m ands " o per a te o n t h e c onc e pt
"IF/THEN/WHEN". "IF" a given message is received from a
given location, "THEN" the host issues a specific command to
the same or another specified location, but only "WHEN" a
given Time Code is active.
Commands will be explained in more detail later in this
manual.

POLLING
When on-line with the IGM network, the host continuously
polls each IGM for transactions and prints, displays or stores
these transactions. The host is dedicated to the access
control system and it is not recommended that it be used for
an y o ther pur p os e. T his m ode of oper ation is high l y
advisable, especially in relatively large systems where
immediate reporting of alarms, continuous display or printout
of transactions is desirable. THIS MODE OF OPERATION
MUST BE USED WHEN "IF/THEN COMMANDS" ARE
PROGRAMMED INTO THE SYSTEM.
lf the communication link between the host and network is
disrupted, i.e.; host computer failure or communications wiring
failure, the IGMs will continue to make all access decisions,
and store transactions and alarms. The system may continue
in this mode indefinitely.

User's Manual 2-5 Sievert Incite


When the transaction buffer in the IGM becomes full,
subsequent transactions will write over and destroy the
ear l i es t tr a ns ac t io ns . T o pr e v en t th is los s of d at a ,
communications problems should be corrected as soon as
possible. Once communications are restored, the IGMs will
upload their stored transactions back to the host and be
displayed, printed or stored, depending on how the system
was programmed to handle these transactions.

REPORTS

The software produces formatted transaction reports and


file printouts on the printer, as shown in Appendix B. A log is
created which autonnatically stores all system activity and
describes all operator activity while logged-on to the system.

User's Manual 2-6 Sievert Incite


SECTION II PLANNING THE SYSTEM

Chapter 3 Planning the system


Chapter 4 Planning the database operating files
Chapter 5 Planning the database monitor and
control files
CHAPTER 3 PLANNING THE SYSTEM

Site planning .................................................................. 3-1


Site diagram .................................................................. 3-1
Access and Monitoring considerations .......................... 3-2
Planning forms ........................................................... 3-4
SITE PLANNING

In order to realize maximum benefit from the Onsite


Access Control System attention should be focused on details
when planning the system installation and operation
parameters.
Consult the Onsite installation manual for specific
information on site preparation and installation. The system
capabilities and building access control needs should be
considered before starting a site plan, and all installation and
operational issues should be resolved before beginning to
create the database.
SITE DIAGRAM
A site plan is recommended when planning the system
installation. At a minimum, the plan should identify the
controlled doors, location and logical address of the IGMs
and Card Readers. For more information on how each
logical address is determined, refer to chapter 6.
When creating the site plan, use a numbering system that
will identify the IGM and card reader address and label the
doors that each Card Reader will control. For example, on
the first IGM/READER group "IGM 01" (the first IGM on the
group 1 loop) controls "reader 01" and "reader 02'', which
might control the "Front Door" and "Rear Door", respectively.
"IGM 03" (the second IGM on the group 1 loop) controls
"reader 03" and "reader 04" which m ight control the
"Computer Room" and "Tape Library", respectively. If you
have one or more remote IGM locations, repeat this process
for each remote IGM loop. For example, "Group 02" "IGM
01" controls "reader 01" and "reader 02" at the first remote
site. This process may be repeated for each remote
IGM/READER group, however, the total number of IGMs
within the s ystem must not exceed 5 for the Onsite/10
system and 32 for the Onsite/64 system. This information
will be required for the Reader/Door file when the database is
entered later on.

User's Manual 3-1 Sievert Incite


Other system functions should also be included on the site
plan, if any, that will connect to the system such as alarm
devices, exit push-button or sensors, door monitor contacts,
etc. Also, label the IGM input positions for contacts that will
be monitored by the system and include devices that will be
controlled by the IGM output relays. Label the device and the
output control relay ("X" or "Y") for each IGM.

ACCESS AND MONITORING


CONSIDERATIONS
The intended use of the system is the most important
consideration when planning the database. Because the
system controls access and monitors security points, these
functions need to be carefully planned to be used to the best
advantage.
The following are some basic questions to consider when
planning the database. Consider:
How is each access location controlled?
Is ingress reader controlled and egress free?
lf so, will an exit device be used?
Or will both ingress and egress be reader controlled?
If so, will the anti-pass back mode be utilized?
What types of Card Readers? Swipe only or swipe with
PIN entry?
Will the location remain unlocked at certain times?

When will access be allowed?


24 hours a day?
Or only certain hours of the day?
O n c er tain days of the week ?
On weekends?
On holidays?
Who will be allowed access to each location?
Certain individuals?
Certain groups of individuals?
All individuals?

User's Manual 3-2 Sievert Incite


Will other non-reader related alarm points be
monitored?
What locations will need to be monitored?
Will monitoring be continuous?
Or will monitoring be required only during restricted hours?
W hic h c o n t ac t c o n d i t i o n s wi l l b e e v e n t s ? A l a r m s ?
What alarm messages will be necessary?
Will output relays be used to control other non-door
related devices?
Will the output relays be turned "ON", "OFF" or "pulsed"?

Will they be controlled on a time schedule?


Will they operate in response to some specific alarm?
The answers you develop for these questions will assist
you when developing a database and with overall system
operation.

User's Manual 3-3 Sievert Incite


PLANNING FORMS
After determining the "what" and "how" of the system, you
will be ready to build the database. As the heart of the
system, the database will greatly affect system operation.
A set of recommended planning forms is included in this
manual to assist in designing database files. Make copies of
these worksheets and save the originals. After completing
the forms, you will be ready to enter the database into the
computer and download it to the IGMs.
Because the database files are interrelated, files must be
created and entered in a set order. The following is the
order in which the files should be completed:
Reader/Door
Time Code
Holiday File
Access Code File
Card File

And as an option:
Mo n it or Po i nt F i le
Alarm Message File
Control Relay File
Auxiliary Relay File
T im ed C om m ands
If/Then Commands

User's Manual 3-4 Sievert Incite


CHAPTER 4 PLANNING THE DATABASE
OPERATING FILES

Introduction ............................................................................................ 4-1


Card Reader features ........................................................................ 4-1
Toggle Card ..................................................................................... 4-1
Executive Privilege ....................................................................... 4-1
Duress 4-2
Reader/Door file ................................................................. 4-3
Card Reader numbers .................................................. 4-4
Door name .................................................................... 4-4
Unlock time ................................................................... 4-4
Open time ..................................................................... 4-5
Time Code file .................................................................... 4-6
Time Code name .......................................................... 4-7
Active days ................................................................... 4-7
Start/Stop times ............................................................ 4-7
Holiday file 4-8
Access Code file ................................................................ 4-9
Access Code name ............................................................................... 4-10
RDR # and Door name ....................................................................... 4-10
Time Code name .................................................................................... 4-10
Card file ................................................................................................................................ 4-11
Card number .............................................................................................. 4-13
Cardholder name .................................................................................... 4-13
Access code ............................................................................................... 4-13
User-defined fields ................................................................................. 4-13
PIN ................................................................................................................... 4-13

DIAGRAMS, DRAWINGS, TABLES


4-1 Reader/Door File Form ................................ 4-3
4-2 Time Code File Form ..................................... 4-6
4-3 Holiday File Form ......................................... 4-8
4-4 Access Code File Form ................................. 4-9
4-5 Card File Form ..................................................................... 4-11
4-6 Card File (continued) ................................................ 4-12

4-i
INTRODUCTION
This chapter describes the process of planning the
"Operating Files" using the forms provided in Appendix A.
"Operating Files" make up the portion of the database that
deals with the access control functions of the system. Files
must be completed in the order presented, as later files rely
on information from previous files.

CARD READER FEATURES


Before planning the Reader/Door File, consider the
following information about Card Reader modes. Card
Readers can operate in different modes which can be
affected by the configuration of some of the database files
and how the cardholder uses them.
TOGGLE CARD
ln toggle mode, the Card Reader functions much like a
light switch. When a light switch is toggled ON, it stays ON
until you switch it OFF.
Swiping a valid card toggles the Card Reader so the Door
Unlock relay and the Alarm Bypass relay are energized. At
the same time, the green LED display on the Card Reader
remains lit while the door remains unlocked. The Card
Reader stays in this condition until the same or another valid
card is swiped in the Card Reader, at which time the relays
become de-energized, the green light goes out and the red
light comes on, indicating that the door is now locked.
A Card Reader may be set in toggle mode by entering
zeros for both the Door Unlock time and the Door Open time
in the Reader/Door File.
EXECUTIVE PRIVILEGE
This feature and the duress feature which follows operate
with a keypad Card Reader that has been programmed in the
"Card plus PIN" mode. Entries in the Reader/Door File do
not control these features, but it is helpful to know about
them when planning the system.

User's Manual 4-1 Sievert Incite


Executive Privilege affects only a keypad Card Reader
that is in the "Card plus PIN" mode. The Card Reader will
grant access to any valid card that has been assigned the
PIN number of 0000. No PIN entry is required, and the
access decision is based on the validity of the card for that
location and time.
DURESS
Normally, a cardholder swipes a valid card and enters an
assigned PIN number to gain access to an area. If a
cardholder is forced to allow unauthorized personnel ínto a
secured area under the threat of physical harm, the user can
set an alarm with the "duress" feature.
After swiping a valid card, the cardholder would enter a
zero followed by the first three numbers of his assigned PIN
number. This immediately tells the IGM that this is a
"duress" condition. As the IGM grants access, the alarm
relay is energized which may operate an external alarm
device.
***NOTE***
The duress feature cannot be used on cards that are
assigned "executive privilege"!

User's Manual 4-2 Sievert Incite


READER/DOOR FILE
The first file to be created is the Reader/Door File. This
file associates each Card Reader number with the door name
or location it controls. lt also establishes the times, in
seconds, for Unlock Time and Open Time.

READER/DOOR FILE

GRP RDR UNLC OPE


NBR NHR K N
DOOR NAME TIM E TIM E
01 01 FRON T DO 0 R 05 10
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 l l 1
02 B A C K DO 0 R 05 1,0
I 1 1 1 1 1 1 1 1 1 1 1 1 1 1 I I 1
03 C O M P U T E R ROOM 05 I 10
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 I I
0 4 I PHONE ROOM 0 5 0 7 L
1 1 1 1 1 1 1 1 1 1 1 1 1 1 I I 1
05 P R O D U C T I O N 05 I 30 I
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

Figure 4-1 READER/DOOR FILE FORM

User's Manual 4-3 Sievert Incite


CARD READER NUMBERS
Enter a two-digit Card Reader number on the planning
form. Card Readers take their assigned numbers from the
address of the IGM they are connected to. As an example,
"Reader A" on the IGM with the address of 05 (IGM
addresses are always "odd") would be "Reader 05". "Reader
B", on the same IGM, would be "Reader 06". The number
assigned to "Reader A" is always the same as the IGM
address (always "odd"). The number assigned to "Reader B"
is always the IGM address, plus one.
Car d R ea d er s wh ic h a r e c o nn ec t e d o n th e s am e
communications loop comprise a group. All readers
connected on a local "hard wired" loop would be labeled
group 01. If there are one or more remote loops on the
system, then these would be labeled as "group 02", "group
03", "group 04", etc. lf you have remote reader groups, be
sure to label them as such on the top of the planning form.
DOOR NAME
Enter the name of the door that is controlled by the Card
Reader number in the left column. Ideally, the name should
relate to the door's function or location, such as "front door"
or "Manager's office," as shown on the sample form.
UNLOCK TIME
Unlock Time is the length of time that the IGM energizes
the Door Unlock Relay which operates the electric door strike.
Unlock Time may be programmed for a duration of 1 second
to 99 seconds.

User's Manual 4-4 Sievert Incite


OPEN TIME
Open Time is the duration of time that a door may remain
open after access has been granted. lf the door remains
open after this time expires, the IGM records the transaction
as, "Door Open Too Long". This transaction may be defined
as an event or an alarm under Alarm Definitions (see
Chapter 5).
The IGM includes an Alarm Relay that can drive an
external device. If the transaction "door open too long" is
defined as an alarm, the Alarm Relay will energize for 3
seconds if a door monitor contact is connected to the Door
Monitor Contact input.
Open Time also affects the operation of the Alarm Bypass
R e l a y. T yp i c a l l y, t h e A l a r m B yp a s s R e l a y s h u n t s a
door-mounted contact connected to a primary alarm system.
Energized at the same time as the Door Unlock Relay, the
Alarm Bypass Relay allows access without triggering the
primary alarm system. This relay remains energized until
Open Time expires. At this point, it triggers the primary
alarm system if the door remains open. Also, the event (or
alarm) transaction, "Door Open Too Long" occurs as
explained above.
Termination of Unlock and Open times is affected by a
door contact connected to the Door Monitor Contact input of
the IGM. When a valid entry occurs and the door contact is
closed before the expiration of either time, the remaining
time(s) cancels immediately. For example, if the Unlock time
is set for 5 seconds and a cardholder enters and closes the
door in 3 seconds; the remaining 2 seconds are immediately
canceled. Someone following close behind the person who
gained access can not open the closed door in the two
remaining seconds.

User's Manual 4-5 Sievert Incite


TIME CODE FILE

The Time Code File sets the time periods for authorized
access for hours of the day and days of the week. This file
also provides for the programming of holidays for access
exceptions.
The Time Code File can accommodate up to 63 Time
Code Names but no more than 99 line entries.

TIME CODE FILE

START STOP
TIME CODE ACTIVE DAYS TIME TIME
NAME
MON TUE WED THU FRI SAT SUN
AL WAYS HOL
Y I Y I Y I Y I Y I Y I Y I Y 0,0 0 1 2 , 4 , , 0 , 0
1 1 1 1 1 1 1
MON TUE WED THU FRI SAT SUN
NORMAL HOL 0 7:5 0 1 7:0 0
1 1 1 1 1 1 1
YIY IYIYIY I I I 1 1 1 1 1 1
MON TUE WED THU FRI SAT SUN
HOL 1 7 0 0
S H I F T 2 YIY IYIYIY I I I 1 1 1
2 14 0
MON TUE WED THU FRI SAT S U N 0
HOL 0 0:0 1 0 2:0 0
1 1 1 1 1 1 1 I Y I Y I Y I Y I Y I I 1 1 1 1 1 1
MON TUE WED THU FRI SAT SUN
C y . F , H . O , U , R , S HOL
Y Y Y Y Y
I I I I I 1 I
1 7 : 0 0 2 4:0 0
1 1 1 1 1 1
MON TUE WED THU FRI SAT SUN
1 1 1 1 1 1 1
HOL
1 Y 1 Y I Y 1 YI I 1 0 1 0 0 1 0 7:5 0
1 1 1 1 1
MON TUE WED THU FRI SAT S U N
I [ I HOL
I I Y I Y I Y 0 , 0 0 , 1 2,40,0
1 1 1 1 1 1 1

Figure 4-2 TIME CODE FILE FORM

User's Manual 4-6 Sievert Incite


TIME CODE NAME
Time Code should be identified by an easily recognizable
name, such as Shift 1, Shift 2, etc., which people can
translate to understand the Active Da ys and hours
represented.
ACTIVE DAYS
Active days in the TIME CODE FILE are the days of the
week. A "Y" marks the day as active, when access will be
authorized; a "blank" represents a nonactive day.
This file allows the user to define the holidays observed
by the organization (see Holiday File). The user also
determines how holidays will be handled by the system. For
example, in the Time Code Name, "NORMAL", above,
Saturdays, Sundays and holidays are nonactive days. There
is no authorized access from 7:50 to 17:00 hours for any
defined holiday that falls on an Active Day. Compare this to
the "ALWAYS" Time Code which authorizes access 24 hours
a day, 7 days a week and holidays.
The access code file and the card file need the Time
Code Name to complete their information.
START and STOP TIMES
The Start and Stop times establish the hours during the
Active Days that access will be authorized. The time period
entered will be effective for each Active Day.
lf a Time Code requires more than one active time period
per day, a separate entry can be made to handle that time
period. The Time Code Name OFF HOURS, for example,
includes three different active periods for different days of the
week. Two time periods are accommodated on Monday
through Friday, and one time period for Saturday, Sunday,
and Holidays. This built-in flexibility may also be used for
other applications.

User's Manual 4-7 Sievert Incite


HOLIDAY FILE
Working in conjunction with the Time Code File, the
Holiday File lets the user define holidays which can be
programmed for the organization's needs. ln effect, the
holiday can become the "eighth" day of the week.
The Holiday File may also be used to identify "special"
days, such as a year-end shutdown, when special access
rules might apply. See Time Code File for details on how
the holiday mode works in the Time Code File. Up to 32
holidays or "special" days can be defined in the Holiday File
for specific access within each time code.

H O L I D A Y F I L E

M O D A H O L I D A Y N A M E
N T Y
0 1 0 1 N E W Y E A R ' S D A Y
1 1 1 1 1 1 1 1 1 1 1 1 1
I
0 4 1 3 G O O D F R I D A Y
1 1 1 1 1 1 1 1 1 1 1 1 1
M E M O R I A L D A Y I
0 5 3 0
1 1 1 1 1 1 1 1 1 1 1 1 1
0 7 I N D E P E N D E N C E D A IY
I 0 4
1 1 1 1 1 1 1 1 1 1 1 1 1 I
0 9 0 3 L A B O R D A Y
1 1 1 1 1 1 1 1 1 1 1 1 1
I
1 1 2 2
I
T H A N K S G I V I NG
1 1 1 1 1 1 1 1 1 1 1 1 1
2 3 I
1 1 T H A N K S G I V I N G
1 1 1 1 1 1 1 1 1 1 1 1 1 1
I
1 2 2 4 C H R I S T M A S E V E
1 1 1 1 1 1 1 1 1 1 1 1 1
I
1 2 2 5 C H R I S T M A S D A Y
1 1 1 1 1 1 1 1 1 1 1 1 1
1
1 2 3 1 N E W Y E A R " S E V E
1 1 1 1 1 1 1 1 1
1 1 1 1 1

Figure 4-3 HOLIDAY FILE FORM

User's Manual 4-8 Sievert Incite


Completing the Holiday File is self-explanatory and quite
easy to do. Simply enter:
− the day of the month the holiday occurs
− the month the holiday occurs
− the name of the holiday

ACCESS CODE FILE


The Access Code File establishes a relationship between
information in the Reader/Door File and the Time Code File.
Refer to these files for the information needed to complete
this file.

A C C E S S C O D E F I L E

A C C E S S C O D E D O O R N A M E T I M E
N A M E C O D E NAME
M A S T E R F R O N T D O 0 R A L W A Y S
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
B A C K D O O R A L W A Y S
I I I I I I 1 1 1 1 . 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
C 1O M P U T E R R O O M A L W A Y S
I I I I I I 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
P H O N E R O O M A L W A Y S
I I I I I I 1 1 1 1  1 1 I 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
P R O D U C T I O N A L W A Y S
I I I I I I 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
O F F I C E F R O N T D O O R N O R M A L
I I I I I I 1 1 1 1 1 1 1 1 1 1 1 1 i I I 1 1 1 , 1 1
1
B A C K D O 0 R N O R M A L
I I I I I I 1 1 1 1 1 1 1 1 1 1 1 I I 1 1 1 1 1 1
P R O D U C T I O N N O R M A L
I I I 1 1 1 1 1 1 1 ( 1 1 1 1 1 1 1 I I I I 1 1 1 1 1 1
P L A N T 1 B A C K D O 0 R N O R M A L
111111111 1 1 1 1 1 1 1 1 1 1 1 I I I I I l l I t l
P R O D U C T I O N N O R M A L
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 I I I I 1 1 1 1 1 1
P L A N T 2 B A C K D O O R S H I F T 2
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 , 1 1 1 1 1 I I I 1 1 1 1 1 1 1
P R O D U C T I O N S H I F T 2
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 I I I 1 1 1 1 1 1
M I S D E P T F R O N T D O O R N O R M A L
1111111 1 1 1 1 1 1 1 1 1 1 1 1 1 I I 1 1 1 1 1 1
B A C K D O O R A L W A Y S
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 / 1 1 1 1 1 1 I I 1 1 1 1 1 1
C O M P U T E R R O O M A L W A Y S
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 I I 1 1 1 1 1 1
P H O N E R O O M A L W A Y S
1 1 1 1 1 1 1 1 l 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

Figure 4-4 ACCESS CODE FILE FORM

User's Manual 4-9 Sievert Incite


ACCESS CODE NAME
The Access Code Name identifies the relationship
between a specific Card Reader location and a given period
of time for authorized access. The Access Code should be
labeled so it reflects a group of locations, a time period, or a
group of people. In the example above, the Access Code
Name, "MASTER", says:
card numbers in the Card File that are assigned to
this Access Code ("Always") will be granted access
at all the doors listed under Door Name during the
times defined by the Time Code Name "Always"
(see Time Code File).
ln the case of "MAST ER," when a card is swiped at a
Card Reader the IGM searches its Card File for the card
number and the assigned the Access Code Name "MASTER".
"MASTER" contains one or more Reader/Doors and the Time
Code Name "Always". The IGM then searches its Time Code
F ile f or the T im e Code Nam e "Al wa ys " and it s tim e
p a r am e t e r s . If t h e c u r r e n t d a y a n d t i m e i s wi t h i n t h e
"Always" parameters, the swiped card will be granted access
at the Card Reader where the card was read.

RDR # and DOOR NAME


Enter the desired Card Reader Number and its
corresponding Door Name from the Reader/Door File.

TIME CODE NAME


Enter the Time Code Name that includes the Active Days
and the Start/Stop times desired for access at the
Reader/Door.

User's Manual 4-10 Sievert Incite


CARD FILE
The Card File contains information for every card entered
into the system. At a minimum, this file contains:
- the encoded number on the magnetic stripe card
− the cardholder's name
− the cardholder's assigned access code
− the cardholder's assigned PIN number
Information from the Access Code File will be necessary
for this file.

CARD FILE

CARD NAME ACCESS


NUMBE 0 0 0 0 0 1 C L A R K , CODE NAME
HAL MASTER
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
0 0 0 0 0 2 O R L I C H , MASTER
t 1 1 1 1 MIKE 1 1 1 1 1 1 1 1
0 10 1 01 10 1 01 13 1P 1A 1U 1L 1U 1S 1, 1 1 1 MASTER
1 1 1 1 1 KURT 1 1 1 1 1 1 1 1
0 1 01 1 01 10 1 10 1 4 1K1 R1 I 1S 1T 1A 1N1 , 1 OFFICE
1 1 1 1 1 KEN 1 1 1 1 1 1 1 1
0 10 10 10 1 01 15 M 1 1O 1Y 1N 1I 1H 1A 1N 1, 1 1 OFFICE
1 1 1 1 1 TIM 1 1 1 1 1 1 1 1
0 10 1 01 10 1 01 16 1T H 1 1 O 1M1P15 1 1 1 1 OFFICE
1 1 1 1 1 0 N, PAULA 1 1 1 1 1 1 1 1
0 1 01 10 1 10 1 01 17 lH1A1R1V1 E1 Y1 , 1 1 OFFICE
1 . 1 1 1 1 M I D GE 1 1 1 1 1 , 1 1 1
0 1 01 10 1 01 10 1 61S 1H 1U1M1 A1 K1 E1 R1 , 1 P L A N T 1
i l l 1 1 MATT 1 1 t 1 1 1 1 1
010 30 10 10 19 1M 1I 1L 1L 1E 1R1 , 1 1 I I
PLANT 1
1 1 1 1 1 JEFF 1 1 1 1 1 1 1 1
010 10 10 11 10 1D 1I 1P 1A 1O 1L 1O1 , 1 I I
PLANT 1
1 1 1 1 1 RICK 1 1 1 1 1 1 1 1
01 10 1 10 1 01 l 11 1 1 S1 H1 E1 E1 H1 A N ,I I
P L A N T 2
1 1 1 1 1 PAUL 1 1 1 1 1 1 1 1
01 10 1 1 0 10 1 11 12 1M 1C 1E 1V 1O1Y , I I P L A N T 2
1 1 1 1 1 JOHN 1 1 1 1 1 1 1 1
010 10 10 11 )3 1D1 O1 L1 L1 I1 S1 O1 N1 , i l
MIS DEPT
1 1 1 1 1 DON 1 1 1 1 1 1 1 1
0 0 0 0 1 4 1 1 1 1 1 1 1S 1T 1E 1V 1E 1 1 1 1 1
MIS DEPT
S A R K ,
1 1 1 1 1 010 10 10 11 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
5 D E E C E , MIS DEPT
1 1 1 1 1 ERIC 1 1 1 1 1 1 1 1
1 1 1 1 1 1 l 1 1 1  1 1 1 1 1 1

Figure 4-5 CARD FILE FORM

User's Manual 4-11 Sievert Incite


The Card File contains four (4) user-defined fields. In the
order shown on the form, the fields are four (4), twelve (12),
twelve (12) and six (6) characters in width, respectively. With
the exception of assigning PINs (Personal Identification
Numbers), the fields may be used to store any information.
See the chapter on Titles for details about changing the
user-defined field headings.
*** NOTE ***
When assigning PIN numbers, reserve the four (4)
character field for that purpose only.

C AR D FILE
( nee r -de fine d fle lds )

PIN 2nd FIELD 3rd FIE LD 4th


# DEPAR TM ENT C AR D SER IAL#PHONE
1 1 1 1 1 1 1 1 1 ' 1 1 1 1 1 1 1 1 1 / 1 1 1 1 1 1 1 1
1 0 1 0 0 1 5 4 1 2 10
1 1 1 1 1 1 1 1 1 1 1 1
1M ANAGER S 5
1012M ANAGER S 001 542 2128
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 1 1
11 0 0 0 1 5 4 3 2 1 0
1 1 1 1 1 1 1 1 1 1 1 1
3M ANAGER S 8
1014 SALES 001561 2113
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1015 SA LES 001562 2114
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 0 1 6 A LES 001563 2115
5 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 0 1 7 S A L E S
I I I
001567 2116
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 I I 1 1 1 1
1 0 1 0 0 1 5 7 0 4148
1 1 1 8PR ODUC TI 1 1 1 1 1 1 1 1 1 1 1 1
1 0 1 9 R O D U C T I 0O N 001571 4149
P 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
10 R ODUC T 106 001572 4150
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
20P
10 R O D U C T I0 N 00 1573 4148
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
21P 10 2 2PR ODUC T 00 157 4 4150
1 1 1 I 0 N 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1
1023 . P. 00 157 5 5 4
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
D 55
1 0 2 . P. 00 1576 5456
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
4D
1 0 2 5 . P. 00 1577 5458
D 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

Figure 4-6 CARD FILE (continued)

This example of user-defined fields shows the PIN


number, social security number, home telephone number and
department name of each cardholder in the file.

User's Manual 4-12 Sievert Incite


CARD NUMBER
T he Card Num ber is the six digit num ber that is
magnetically encoded on the card. Cards are encoded by a
special Encoder/Reader at the factory. Consult the card data
sheet supplied with your encoded cards for the sequencing of
card numbers for your system.
CARDHOLDER NAME
Enter the cardholder's name, preferably in "last name,
first name" order. By entering data in this format, it is
possible to sort the file and obtain a hard printout of the
card file in alphabetical order.

ACCESS CODE
Eac h c ar dhol der m us t be as s igne d an Ac c es s Code
Name. Enter the appropriate Access Code Name form the
Access Code File. The Access Code Name chosen for each
individual should provide access authorization at the proper
door or location during the desired time period.
USER-DEFINED FIELDS
Four fields in the card file have been reserved for the
specific needs for the user. Pertinent cardholder information
can be stored in the card file for quick reference. Remenber
to reserve the four character field for PIN numbers if you will be
using that feature un the system. If the PIN feature will not be
used, this field must still contain numeric information.
PERSONAL IDENTIFICATION NUMBER (PIN)
The user creates the 4-digit PIN number that is assigned
to each cardholder. Although the number MAY be any four
digits, it is suggested that the number have some significance
for the cardholder, such as a birthday, house number, etc.
The cardholder enters the PIN at the keypad Card Readers.

User's Manual 4-13 Sievert Incite


When a cardholder is assigned a PIN number of zero
(0000), the IGM does not prompt the cardholder for a PIN
number. Instead, access is granted immediately, as long as
the parameters for time and location are satisfied. Therefore,
any cardholder who is assigned the PIN number 0000 will
enjoy "Executive Privilege".
The user-defined PIN number is not encoded on the card
so it may be quickly and easily changed or canceled, if
necessary.

User's Manual 4-14 Sievert Incite


CHAPTER 5 PLANNING DATABASE
MONITOR and CONTROL FILES

Monitor point file (IGM models 45 and 45U only) 5-1


Group number ............................................................ 5-3
IGM number ............................................................... 5-3
Point number .............................................................. 5-3
Point name ................................................................. 5-3
Opening point message ............................................. 5-3
Closed point message ............................................... 5-3
Alarm condition .......................................................... 5-3
Alarm message number ............................................. 5-3
Trace to ...................................................................... 5-4
Alarm message file (IGM models 45 and 45U only) 5-4
This message number ............................................... 5-5
Alarm message .......................................................... 5-5
Next message number ............................................... 5-5
Control relay file (IGM models 45 and 45U only) . 5-6
Group number ............................................................ 5-7
IGM number ............................................................... 5-7
Control relay ............................................................... 5-7
Control relay name .................................................... 5-7
On message ............................................................... 5-7
Off message ............................................................... 5-7
Pulse message .......................................................... 5-7
Pulse time .................................................................. 5-7
Timed command file .......................................................... 5-8
Time code name ........................................................ 5-9
Group number ............................................................ 5-9
Card reader number .................................................. 5-9
Start command ........................................................... 5-9
Stop command .................................................................................... 5-10
If/then command file ................................................................................................ 5-11
IF condition ........................................................................................................ 5-13
Group number ...................................................................................... 5-13
(IGM/reader number) ...................................................................... 5-13
Message .................................................................................................. 5-13
Then condition ................................................................................................ 5-14
Group number ...................................................................................... 5-14
(IGM/reader number) ...................................................................... 5-14
Command ............................................................................................... 5-14
Time code names .............................................................................. 5-14
5-i
DIAGRAMS, DRAWINGS, TABLES

5-1 Monitor Point File Form .............................. 5-2


5-2 Alarm Message File Form ........................... 5-5
5-3 Control Relay File Form .............................. 5-6
5-4 Timed Command File Form ........................ 5-8
5-5 If/Then Command File Form ..................... 5-12
MONITOR POINT FILE
(IGM models 45 and 45U only)

The Monitor Point File supports sensing or monitoring


devices that provide a dry contact output. Each IGM can
monitor up to eight (8) contacts. The user creates
descriptions for the "open" and "closed" conditions of the
contact. (See figure 5-1, page 5-2).
An IGM may be programmed to report, or not report, any
change in the contact condition (open to closed, or closed to
open) to the host processor. The monitor point transactions
can be programmed as "events" or "alarms".

***SPECIAL NOTE***

MP #6 - IGM tamper switch


MP #7 or #8 - IGM trouble
MP #8 - Unit on Battery (45U Only)
If desired, these monitor points may be used for other
external alarms and the built-in alarms disabled. For details,
consult the IGM and Reader Installation Manual.

User's Manual 5-1 Sievert Incite


MONITOR POINT FILE

HROUP IG PT POINT NAME


, 0 1 01 6 I G M # 1 T A M P E R
1
1 _ _ _ _ _ , _
1 1 1 1 1 1 / 1 1 1 1 1 1 1 1 1
OPENING POINT MESSAGE
N O R M A L
1 1 1 1 1 1 1 1 1 I I
CLOSING POINT MESSAGE
L I D O P E N
AIA I M
I t J IJ I I I I I
CON 0IIION:(0)pen/(C)
losed/(B)oth/(N)o
ne: S E
C ALARM MESSAGE P
i- NUMBER:
IGROUP IGM # POINT NAME
PT I G M T R
1 1 1
1 0 1 01 7
OPENING POINT MESSAGE
C L E A R
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
CLOSING POINT MESSAGE
A L A R M C O N D I T I O N
ALA 2 M
CON / I T I O N : ( 0 ) p e losed/(B)oth/(N)one: C ALARM MESSAGE 0 1
n/(C NUMBER:
S 1 F P
TRACE TO:
GROUP IGM PT POINT NAME
I G M # 1 P O W E R
01 01 8 1

OPENING POINT MEOOAOE U N I T 0


N 1 A /
1 1 I I
CLOSING POINT MESSAGE
U N I T 0 N B A T T E R Y
ALA RM [ ] I I I I I l i i i
CON DITION:(0)pen/(C)losed/
(B)othhhijone: 01
C ALARM MESSAGE S F
NUMBER:
TRACE TO: P

Figure 5-1 MONITOR POINT FILE FORM

User's Manual 5-2 Sievert Incite


GROUP NUMBER
If your system has more than one group of IGMs, be sure
to identify the group number that contains the monitor points
you want to define.
IGM NUMBER
Enter the address of the IGM that will monitor the contact
number identified below.

POINT NUMBER
This contact to be monitored must be connected to one of
the IGM contact monitor inputs. Enter the number of the
IGM contact input (1 through 8).

POINT NAME
Enter a description of the contact to be monitored.
OPENING POINT MESSAGE
When the IGM senses a contact opening, it will send the
transaction to the host processor where the software will
attach an Open Contact Description. Enter the description to
be displayed on the processor.

CLOSED POINT MESSAGE


When the IGM senses a contact closure, it will send the
transaction to the host processor where the software will
attach a closed contact description. Enter the description to
be displayed on the processor.
ALARM CONDITION
Enter the contact description to be identified as an alarm
(0 = open, C = closed, B = both, N = none). Accordingly,
the IGM will create an alarm transaction and give it priority
for transmission to the host processor.
ALARM MESSAGE NUMBER
An alarm message may be created to supplement the
alarm condition. If so, an alarm message file will be created
along with this file. As the alarm conditions are created,
alarm messages need to be assigned. Enter the message
number from the alarm messages file to be assigned to the
Alarm condition you just established.

User's Manual 5-3 Sievert Incite


TRACE TO
Enter the appropriate "Trace To" codes. An "S" (screen)
displays the transaction to the screen, and an "F" (file) logs
the transaction to the log file on the hard drive, and a "P"
(printer) prints the transaction to the printer. Any combination
of "S", "F", and "P" may be entered.

ALARM MESSAGE FILE


(IGM models 45 and 45U only)

The Alarm Message File stores the alarm messages


created and assigned to the contact monitor alarm conditions
in the Contact Monitor File. By carefully structuring this file, it
is possible to "link" message segments. To avoid causing a
message loop, do not link alarm messages so the Next MSG.
No. is that of a previous message in the same chain. Also,
for the last message in the chain, leave the NEXT MSG NO.
blank.
One approach to managing the creation of this file is to
write down all of the alarm messages on paper first. When
that is completed, pick out those messages that repeat in two
or more messages. Enter those "trailers" in the file. W hat
remains are the primary alarm messages. Through "linking"
the trailing messages to the appropriate primary alarm
messages, the original messages will be re-composed.

User's Manual 5-4 Sievert Incite


ALARM MESSAGE FILE
ALARM MESSAGE LIN
MSG K
NBR TO
C A L L , S E ,R ,V ,I C E Fy, E X T E N S I
0 N 6 3 27 .
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
I N T R U S I O N A L E R T IN B A S E
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
MENT A R E A !
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

WATER UNDER F L O O R ! P L E A
1 1 1 1 1 1 1 1 1 1 1 1 1
SE I N V E S T I G A T E . 04
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
N E C E S S A R Y , C A L L S ERV
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
VI d N T 84 1 6 3 2 7
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

Figure 5-2 ALARM MESSAGE FILE FORM

THIS MESSAGE NUMBER


Alarm m ess ages c an be num ber ed in any or der or
scheme. Use only digits, no alphabetic or special characters.

ALARM MESSAGE
Enter the alarm message as you wish it to appear.
There is space for 38 characters to compose a message.
Messages can be extended into longer statements through
"linking" (see NEXT MESSAGE NUMBER)
NEXT MESSAGE NUMBER
Alarm messages may be linked together to create
meaningful instructions. "Linking" is initiated by entering the
number of the message which is to follow the present
message.

User's Manual 5-5 Sievert Incite


CONTROL RELAY FILE
(IGM models 45 and 45U only)

The CONTROL RELAY FILE supports the operation of the


two Control Relays, designated as "X" and Y. Under
commands from the host processor, these relays can control
external devices.
Each control relay operates a set of dry contacts in
response to commands from the host processor. The
command ON operates the relay as continuously energized;
OFF operates as continuously de-energized.
de The PULSE
c om m and e n er gi ze s t h e r e la y m om e nt ar il y f o r a
programmable time from 1 to 99 seconds.

1GRP # IGM # RELAY RELAY NAME


CT 1 01
X S, E, C, U, R, I, T, Y, 1 1 1 1 1 1 1 1 1
ON MESSAGE
N, 0 , T I F I E D
OFF MESSAGE
N O R M A L
1 1 1 1 1 1 1 1
PULSE MESSAGE TIME
A L A R M T E S T
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

GRP # IGM # RELAY RELAY NAME


0 1 01  U T S I
1 1 1 1
ON MESSAGE
N
1 1 1 1 1 1 1 1 1 1 1
OFF MESSAGE
 F F
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
PULSE MESSAGE TIME
L, I, G, H, T, S, H E N O F 03
1 1 1 1 1

Figure 5-3
5 CONTROL RELAY FILE FORM

User's Manual 5-6 Sievert Incite


GROUP NUMBER
lf your system has more than one group of IGMs, be sure
to identify the group number that contains the control relays
you want to define.
IGM NUMBER
Enter the address of the IGM that contains the relay to
be programmed.

CONTROL RELAY
The control relays are designated as either CONTROL
RELAY "X" or CONTROL RELAY "Y". Enter the relay
designation that will control the device.
*
CONTROL RELAY NAME
The control relay is usually best described by the name of
the device it controls. Enter a description.

ON MESSAGE
Enter a description of the desired performance of the
control relay under the control of an "ON" command. The
control relay will remain on until it receives an "OFF"
command or power is removed.
OFF MESSAGE
Enter a description of the desired performance of the
control relay under the control of an "OFF" command. The
control relay will remain off until it receives an "ON"
command or "PULSE" command.

PULSE MESSAGE
Enter a description of the desired performance of the
Control relay under a pulse command.

PULSE TIME
The PULSE command momentarily energizes the relay for
a programmable duration of 1 to 99 seconds in one second
increments. Enter the time duration, in seconds, of the pulse
command. (lf the duration is to be 5 seconds, enter 05, etc.)
*** NOTE ***
The control relay name ON and OFF descriptions are
displayed when the user initiates a control relay "STATUS,"
as discussed later in this manual.

User's Manual 5-7 Sievert Incite


TIMED COMMAND FILE
The Timed Command File stores commands that are
executed automatically under the control of a time code.
Timed commands can control Card Readers, monitor points
and control relays at the start and/or stop times on the active
days of a given time code. The two-letter commands listed
below represent the actions available for Timed Commands.

TIMED COMMAND FILE

T/ME GRP IGM


CODE NAM E # RDR START CO MMAND STOP COM MAND
N O R M A L D l 01 1 U D L D
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

N O R M A L
1 1 1 1 1 1 1 1 1 1
N O N W O R K 0 1 2- D P 2 -
II 1 0 1 1

COMMANDS
GA=grant acces s DA=disabIe antipsbk
uD=unloc k door EA=enable antipsbk
LD = lock door rP=pulse relay X or Y
CM = card only m ode rN=relay X or Y on
CP = card = PIN rE=relay X or Y off
=
CU custo mer co de onl y r=X or Y
CS = store CU tr ansact ions D P 3 -- =disable pnt 3
EP ------ 8=enable pnt 8

Figure 5-4 TIMED COMMAND FILE FORM

User's Manual 5-8 Sievert Incite


TIME CODE NAME51
The Time Code Name determines the start and stop
times of the active days the commands will be executed.
Enter the Time Code Name that includes the times and days
for the desired actions to occur. Refer to the time code file.
GROUP NUMBER
If your system has more than one group of IGMs, be sure
to identify the group number that you want to define the
timed commands for.
CARD READER NUMBER
Enter the reader number from the READER/DOOR file
that will receive the command. If the commands affect the
Monitor contacts or Control relays, enter the IGM number
where they are located.
START COMMAND
Enter the two-letter command for the desired action to
occur at the Start Time of the Time Code Name. W hen
enabling or disabling a monitor contact, enter the contact
num ber in its proper position in the string following the
two-letter command. Fill the remainder of the eight positions
with dashes.
For reference, see the Time Code Name "NORMAL" in
Figure 5-4. Reader number 1 of IGM number 1 will
UNLOCK at the Start Time of the Time Code and LOCK at
the Stop Time of the Time Code on the active days of the
Time Code.

User's Manual 5-9 Sievert Incite


At the Time Code Name "NON WORK", Monitor Point
numbers 1 and 2 of IGM number 1 will be ENABLED at the
Start Time of the Time Code and DISABLED at the Stop
Time of the Time Code of the active days of the Time Code.
Note on the entries for Monitor Point numbers 1 and 2 that
they occupy position numbers 1 and 2 in the string after the
two-letter commands EP and DP.
STOP COMMAND
Enter the two-letter command for the action you wish to
occur at the Stop Time of the Time Code Name. In the case
of contact Monitor Points, follow the same scheme as
described in Start Command above.

User's Manual 5-10 Sievert Incite


IF/THEN COMMAND FILE
The IF/THEN Command file executes a command in
response to a condition during a specified time period and is
based on a "cause and effect" relationship as follows:

• If a specified IGM or Reader sends a specified


message
• Then a specified command is send the same or
another IGM/READER
• When a specified TIME CODE is active.

*** NOTE ***


Because this ‘file is not downloaded to the IGMs, the host
processor must be on to execute “If/Then” commands.

User's Manual 5-11 Sievert Incite


IF/THEN COMMAND FILE
IF THEN
GRP IGM SENDS GRP IGM RECIEVES THIS DURING
NBR NBR MSG NBR NBR COMMAND TIME COD E NAME
0 5 1 O P 0 1 0 1 X 1 N1 N N 0 R K
1 1 1 1 1 1 1
0 1 0 1 N N W O R K
I 0 2 I I I 0 1 1 1 1 1 1 1 1 1 1 I I I
O 1 O A L W A Y S
1 P O I I 1 1 1 1 1 1 1 1 1

------- MESSAGE S - ---------------- COMMAND S ----------


DF =door forced open GA=grant acces s DA=disable antipsbk
DO =door open too long UD=unloc k door EA-enable antipsbk
DC -door closed LD=lock door rP=pulse relay X or Y
P0x=point x opened CM=card only mode rN=relay X or Y on
PCx=point x closed CP=card PIN rF=relay X or Y off
TS =tamper sw. opened CU-customer code only (r=X or Y)
TN =tamper sw. normal CS=store CU transactions
DP 3 ----- =disable pnt 3
EP -------- 8=enable pnt 8

Figure 5-5 IF/THEN COMMAND FILE FORM

User's Manual 5-12 Sievert Incite


"IF" CONDITION
GROUP NUMBER
If your system has more than one group of IGMs, be sure
to identify the group number of the IGM/READER group that
will originate the message.

(IGM/READER NUMBER)
Enter the IGM or Card Reader number that will originate
the message. All messages are doors-related except for the
two contact monitor point messages.
MESSAGE
Enter the message that will be sent by the IGM or Card
Reader identified above. This is the "condition" to which the
system will react.

User's Manual 5-13 Sievert Incite


"THEN" CONDITION
GROUP NUMBER
If your system has more than one group of IGMs, be sure
to identify the group number of the IGM/READER group that
will receive the Command in response to the "If" condition.

(IGM/READER NUMBER)
Enter the IGM or Card Reader number that will receive the
Command in response to the "If" condition.

COMMAND
Enter the command that will perform the desired action.
When enabling or disabling a monitor contact, remember to
place the contact number in its proper position in the string
following the two-letter command, similar to the procedure in
the previous Timed Command File.
TIME CODE NAMES
The Time Code Name you enter will define the hours and
the days that the "conditional" commands will occur. Be sure
that the Start and Stop times and the active days satisfy the
period when you want the "cause and effect" to occur.

User's Manual 5-14 Sievert Incite


SECTION III GETTING STARTED

Chapter 6 System Set-up


Chapter 7 The Onsite Software
Chapter 8 Initializing the System
CHAPTER 6 SYSTEM SET-UP

Introduction ........................................................................ 6-1


Host processor ................................................................... 6-1
IGM to host processor connection ................................. 6-2
Printer
6-3
Configuring the IGMs ......................................................... 6-3
IGM processor board setup ............................................... 6-3
IGM address - switches 1 - 5 ......................................... 6-3
Card delete - switch 6 .................................................... 6-4
(model 45 and 45U IGMs only) .............................. 6-5
Baud rate jumper ............................................................ 6-5
Memory backup jumper .................................................. 6-5
IGM interface board setup ................................................. 6-6
Door strike voltage selection .......................................... 6-6
Lock override - jumper P11 ............................................ 6-6
(model 45U IGM only) ............................................ 6-7

DIAGRAMS, DRAWINGS, TABLES

6-1 Wiring IGM to Host Processor Connections 6-2


,
INTRODUCTION
This chapter describes the host processor connections and
briefly reviews each of the IGM setup parameters. For
details concerning the IGM configuration switches and
jumpers, consult the IGM and Reader Installation Manual.

HOST PROCESSOR
Unpack the Personal Computer and locate it where the
communication cable leading to the first IGM in the loop can
easily reach the back of the computer. Generally, the
computer should be located within a secured area where it
may be easily monitored by the system operator. lf this is
not possible it is advisable to reroute the communication
cable to a more secure and convenient location.
Connect the keyboard and monitor to the computer. If you
are unfamiliar with these connections, consult the Operator's
Manual supplied with the computer for detailed information.

User's Manual 6-1 Sievert Incite


IGM TO HOST PROCESSOR CONNECTION
The four wire communication loop from the IGM network is
connected to the host processor's Asychronous
Communications Adapter (ACA) via a female DB25 to four
wire adapter. Connect the four wires to the screw terminals
on the adapter as shown in figure 6-1 below. After the wires
are connected, plug the adapter into the ACA port.

First IGM DB25/4 wire


Loop en Adapter
PORT 1 TX- 10 RX-
TX+ 11 RX+ ---> To Host
RX- 12 TX- Processor
RX+ 13 TX+ ACA (COM 2)

Figure 6-1 Communications Wiring - IGM to HostProcessor

Figure 6-1 WIRING IGM TO HOST PROCESSOR

Plug the processor and monitor power cords into a


standard grounded 120 VAC 60 Hz outlet.

User's Manual 6-2 Sievert Incite


PRINTER
Unpack the printer and remove all packaging materials
from inside the printer. Install the printer ribbon cartridge and
continuous feed tractor paper using the printer Operator's
manual as a guide.
Plug the power cord into a standard grounded 120 VAC
60 Hz outlet. Connect the printer cable (supplied) to the
back of the printer, but do not connect the cable to the
processor at this time.

CONFIGURING THE IGMs


Each IGM in the system must be properly configured prior
to system start-up and downloading of database files. This
involves the setting of several switches and jumpers as
defined below. Detailed information on these settings may be
found in the IGM and Reader Installation Manual.

IGM PROCESSOR BOARD SETUP


Each IGM contains an 8 position DIP switch and 2 berg
stick jumpers located on the m ain processor board.
Positioning of these switches and jumpers must be completed
prior to applying power to the IGM. Once power is applied to
the IGM, it will "read" these new settings.

IGM ADDRESS - SWITCHES 1-5


Each IGM must be set to it's own unique address. The
IGM address is always set to an odd number. For example,
a system having 3 IGMs on the communications loop would
be addressed as follows:
1st IGM = address 01
2nd IGM = address 03
3rd IGM = address 05

User's Manual 6-3 Sievert Incite


CARD DELETE - SWITCH 6
The IGM may be set to delete a card from its database if
the cardholder makes 4 consecutive PIN entry errors after
swiping his card. This feature provides an additional level of
security in the event that a card is lost or stolen and helps
prevent a would-be intruder from having unlimited attempts at
finding the correct PIN number.
This feature applies only to PIN type card readers and
operates at an IGM level. When the card is deleted, it
remains at the other IGM locations until 4 consecutive PIN
entry errors are made at those locations.
To make the card delete feature active, set switch #6 to
the on position.
CARDS/TRANSACTION CAPACITY - SWITCH 7
Switch 7 determines the amount of RAM (Random Access
Memory) that will be allocated to card storage and the
transaction storage buffer. If a larger card capacity is
required, the amount of memory used for the transaction
buffer is reduced. Switch #7 allocates the RAM as follows:
MODEL 40/40U IGM:
Switch 7 off = 500 cards and 900 transactions max.
Switch 7 on = 1000 cards and 150 transactions
max.
MODEL 45/45U IGM:
Switch 7 off = 2500 cards and 4000 transactions
max.
Switch 7 on = 4500 cards and 1000 transactions
max.
It is recommended that the switch be left in the off
position if the expected card population will not exceed 500
for the Model 40/40U IGM and 2500 for the Model 45/45U
IGM. This allows the maximum transaction storage.

User's Manual 6-4 Sievert Incite


CONTROL RELAY "Y" MODE - SWITCH 8
(Model 45 and 45U IGMs only)
The relay designated as “CONTROL RELAY Y” can be
set up to operate as an alarm output in response to any
monitor point alarm. When switch 8 is turned on, an alarm
condition on any of the 8 monitor point inputs within the
same IGM will cause the “Y” relay, within the same IGM,
to momentarily energize for 3 seconds.
When switch 8 is off, the “Y” relay will respond only to
“on”, “off”, and “pulse” commands from the host.

BAUD RATE JUMPER


The baud rate jumper selects the communications speed
between the IGM and host processor. The jumper is factory
set to 9600 baud. This is the recommended setting when
IGMs are connected on a local "hard wired" loop.
If the IGM is connected on a remote dial-up loop, it will be
necessary to change this jumper to the 1200 baud position.
All IGMs on the same loop must be set to the same baud
rate.

MEMORY BACKUP JUMPER


T he IGM database files and transaction buffers are
contained in volatile memory. This means that all data is lost
when power is removed from the IGM. ln order to prevent
this potential loss of data, a small battery on the main
processor board is used to back up the IGM memory.
The IGM is shipped from the factory with this battery
disconnected. To engage the battery, set the jumper to the
"BT (battery connected) position just prior to turning on power
to the IGM.

User's Manual 6-5 Sievert Incite


IGM INTERFACE BOARD SETUP
DOOR STRIKE VOLTAGE SELECTION
Two rotary switches are provided to select the proper
voltage to the door strike as follows:

Switch "SW1 A" selects voltage for door strike "A"


Switch "SW2 B" selects voltage for door strike "B"

Use a medium flat blade screwdriver to select either the


12 VDC, 24 VDC, 12 VAC or 24 VAC position.

***NOTE***
If the model 40U or 45U IGMs are used, a 12 Volt DC
strike must be used or the strikes will not operate during a
primary power failure.
LOCK OVERRIDE - JUMPER P11
Jumper P11 is used to override the normal lock operation
by setting the door locks in either the continuously "LOCKED"
or "UNLOCKED" position. This feature is useful when
performing service on the IGM which might interfere with
reader operation. During normal operation, Jumper P11
should be left in the "OFF" position.
***NOTE***
Setting Jumper P11 in the "UNLOCK" or "LOCK" positions
affects both doors connected to the IGM.

FIRE PANEL OPTION - JUMPER P12


The IGM may be wired to a building fire alarm panel
which signals the IGM to unlock both of its doors in the event
of a fire alarm? Jumper P12 selects whether fire alarm panel
contact, used to signal the IGM, is "NORMALLY OPEN" or
"NORMALLY CLOSED" in the non-alarm state.
lf the fire alarm contact is "NORMALLY OPEN" and closes
on alarm, set jumper P12 to the "NO" position. If the fire
alarm contact is "NORMALLY CLOSED" and opens on alarm,
s et j um per P 12 t o t he "N C " p os it i on . If t h e f i r e p an e l
interface option is not used, leave jumper P12 in the "NO"
position.

User's Manual 6-6 Sievert Incite


IGM TROUBLE ALARM - JUMPER P13
(Model 45 and 45U IGMs only)
Both the Model 45 and 45U IGMs allow the ability to
transmit an "IGM Trouble" alarm back to the host processor
in the event that any one of the built-in circuit breakers are
tripped or open. Jumper P13 selects either MP7 or MP8 as
the Monitor Point number that will monitor for the IGM
Trouble alarm.

UNIT ON BATTERY ALARM - JUMPER P14


(Model 45U IGM only)
The Model 45U IGM allows the ability to transmit an IGM
"Unit On Battery" alarm back to the host processor should
primary AC input power be lost and the IGM transfers over to
battery power. Jumper P14 either disables this alarm or
selects MP8 as the Monitor Point number that will monitor for
the "Unit On Battery" alarm.

User's Manual 6-7 Sievert Incite


CHAPTER 7 THE ONSITE SOFTWARE

Introduction ....................................................................... 7-1


DOS .................................................................................. 7-1
The Incite Software ................................................... 7-1
Software Protection ...................................................... 7-3
INTRODUCTION
This chapter describes how the system software is set up
from the factory on the host processor's hard disk drive. It is
assumed that the system has been completely installed and
that all wiring has been completed and thoroughly checked.
lf this is not the case, consult the Onsite Installation Manual
for system installation requirements. Also, ensure that the
printer, monitor, and communications loop from the IGM(s) to
the host processor are connected, as described earlier in this
manual.

DOS
The necessary DOS files have been loaded onto the hard
drive at the factory and are located in a subdirectory named
"\DOS".
The Onsite version 1.2 software require MS DOS or PC
DOS version 3.3 or greater. Although a working knowledge
of DOS is not normally required to operate the Onsite
software, a DOS manual is provided with the system.

THE ONSITE SOFTWARE


There are two versions of the Onsite software; Onsite/10,
which allows input of up to 10 reader definitions and
Onsite/64, which allows input of up to 64 reader definitions.
The software is loaded onto the drive and tested at the
factory. It is therefore not necessary to load the software
again.
The software is located in three subdirectories as follows:
\ONSITE64 (or 10) The directory where the
main program files are
stored
\ONSITE64\SCREEN (or 10) = The directory where all
screen files are stored
\ONSITE64\DBASE (or 10) = The directory where the
system database files you
create and the log file is
stored

User's Manual 7-1 Sievert Incite


The Onsite software is also provided on backup disk(s) on
either a single 3-1/2" 720 Kb micro floppy disk or two 5-1/4"
360 Kb floppy diskettes.
Should it ever become necessary to reload the software,
the following procedure would be used:
1. Turn on the computer and monitor and wait for the C\>
prompt to show.

2. Insert either the 3-1/2" disk or the 5-1/4" disk labeled


"DISK 1" into Drive A and type: A:INSTALL

Press the CARRIAGE RETURN key labeled (<--IENTER)


and follow the on-screen prom pts. A batch file will
automatically create the appropriate subdirectories and load
all files to the hard disk.

3. If your system uses the 3-1/2" micro disk, the software is


now loaded. If your system uses the 5-1/4" diskettes,
proceed to step 4.
4. When the computer has finished loading "Disk 1", a screen
prompt will appear, instructing you to remove Disk 1 and
insert Disk 2. Again, type: A:INSTALL

Press the CARRIAGE RETURN key labeled (<--enter) and


follow the on-screen pr om pts. A batch file will
automatically create the appropriate subdirectories and load
all files to the hard disk.
5. When the computer has finished loading "Disk 2, a screen
prompt will appear instructing you that the software
installation is complete.

User's Manual 7-2 Sievert Incite


SOFTWARE PROTECT1ON
The Onsite system uses a "hardware key" software
protection device called a SentinelPro(TM) manufactured by
Rainbow T ec hnologies, Inc . T his devic e pr events
unauthorized use of the proprietary Liebert Onsite software.
This device must be present on the host processor's parallel
printer port or the Onsite software will not run.
At this time, plug the end of the SentinelPro(TM) device
labeled ''COMPUTER" into the parallel port on the host
processor and then connect the printer cable to the
SentinelPro(TM) device.

User's Manual 7-3 Sievert Incite


CHAPTER 8 INITIALIZING THE SYSTEM

Introduction ....................................................................... 8-1


initializing the system ........................................................ 8-1
Logon the system ............................................................. 8-1
Operator permissions ....................................................... 8-3
Set date and time ............................................................. 8-6
- Hard wired loops ......................................................... 8-9
Group number ............................................................. 8-10
Communication port number ...................................... 8-10
- Dial-up loops ............................................................. 8-12
Group number ............................................................. 8-12
Communication port number ...................................... 8-12
IGM/Modem baud rate ................................................ 8-12
Modem dial command ................................................ 8-12
Remote site identify .................................................... 8-13
Remote site password ................................................ 8-13
Remote access telephone number ............................. 8-13
Remote initial call time ................................................ 8-14
Remote call delay time ............................................... 8-14
Remote wait time for answer ...................................... 8-14
Remote retry dial count .............................................. 8-14
Remote retry time interval .......................................... 8-15

DIAGRAMS, DRAWINGS, TABLES


8-1 Logon Screen ......................................................... 8-2
8-2 Operator Permissions File ...................................... 8-3
8-3 Date and Time Screen ............................................ 8-6
8-4 Customer Code Screen .......................................... 8-8
8-5 1/0 Port Configuration File ...................................... 8-9
8-6 1/0 Port Configuration File (continued) ................. 8-10
INTRODUCTION

This chapter will help you when starting up the Onsite


software for the very first time. It is assumed that all system
hardware has been connected as described in the previous
chapters. lf this is not the case, it will be necessary to
complete all hardware connections and set-up before
proceeding with this chapter. All IGM power switches should
be on at this time.

INITIALIZING THE SYSTEM


Turn on the power to the computer, monitor and printer.
After approximately 30 seconds, the Onsite logon screen
should appear. lf this is not the case, type "START" at the
C\> prompt.
Wait until the logon screen appears and the blinking cursor
is in the name field before typing any additional keys.

LOGON THE SYSTEM


The system is now waiting for a valid name and password.
For this initial logon, you must use the name and password
that has been factory set. Once you have logged-on, you will
change the name and password to your own name and a
password of your choosing. Use the following steps to logon
to the system:
1. With the cursor in the name field of the screen, type:
"Onsite/64" or "Onsite/10" and press the <ENTER>
key.
2. The cursor, even though you can not see it, is now in
the password field. Type: "Liebert" and press the
<ENTER> key. You will note that you can not see the
characters you are typing in the password field.
3. The status line just above the menu keys in the lower
left-hand corner of the screen should show "Operator
Logged on". lf not, repeat steps 1 & 2, observing the
combination of capital and lower case letters. See
figure 8-1.

User's Manual 8-1 Sievert Incite


02-26-90 10:52:08 Sievert

LOGON

p a s s = [

1 of1
1-ALARM 2-CONTROL ACCESS CONTROL
-HISTORY 4- 10:51:24 Onsite/64 startup on 02-26-90
5-DBASE 6-Logoff 10:51:24 LIEBERT 000ite/64 VersIon 1.2
-PRINT B-ACC STAT 10:51:24 Copyright (c) 1987 - 1989 All rightsreserved.
9-Menu Hlp 10-Quit 10:51:25 Connected group 01 to COM2

Figure 8-1 LOGON SCREEN

User's Manual 8-2 Sievert Incite


OPERATOR PERMISSIONS
A file called "OPERATOR PERMISSIONS" will eventually
contain the names and passwords of all other system
operators, and will control which files they may access.
Presently, the name "Onsite/64" or "Onsite/10" which you
logged-on with is the only operator listed in this file. ln
addition, the only file "Onsite/64" is allowed access to is the
"OPERATOR PERMISSIONS" file. You can now change this
to your own name and password so you may gain access to
all files.
1. Press the function key labeled F5. Notice that the menu
has changed in the lower left-hand corner of the screen.
This is because you have entered the DBASE menu.
2. Now press the F4 function key which is identified as
OpPerms on the menu. The "OPERATOR PERMISSIONS
FILE" is now displayed on the screen.

02-26-90 103945 Sievert Pr

OPERATOR PERMISSIONS
name [Incite/64
password [
access code file [N] timed command file [N] anti-pass back commands [N]
alarm message file [N] alarm definitions [N] control relay commands [N]
card file (N] card file titles [N] monitor point commands [N]
control relay file [N] customer code [N] reader/door commands [N]
holiday file [N] load igm [N] control relay status [N]
IF/THEN command file [N] operator permissions [A] monitor point status [N]
monitor point file [N] date and time [N] igm status [N]
reader/door file [N] transaction reports [N] reader/door status [N]
time code file [N] port configuration [N] automatic logoff [N]
1 of 3
ACCESS CONTROL
1-PrevMenu 2-Modify
3-Prior 4-Next 10:09:46 Incite/64 startup on 02-26-90
5-Add 6-Delete 10:09(46 LIEBERT 101ite/64 Version 1.2
7-PRINT 8-Help 10:09:46 Copyright (c) 1987 - 1989 All r1ghts reserved.
9-Sort 10-Search 10:09(47 Connected group 01 to C062

Figure 8-2 OPERATOR PERMISSIONS FILE

User's Manual 8-3 Sievert Incite


3. Change the name in the name field by typing your own
name over the name "Onsite/64" (or "Onsite/10") and
press <ENTER>.

***NOTE***
Your name entered here should match the way your name
will appear in the card file later on, i.e., last name first,
capitals, lower case, etc.

4. Change the password to a password that you can easily


remember. The password may be any combination of
alphabetical or numeric characters that will fit in the
password field. Use the space bar to delete any trailing
characters that might remain from the previous password
(Liebert) and press the <RETURN> key.
*** NOTE ****
When choosing a password, take note of all pertinent
details (upper and lower case letters, periods, spaces).
When entering your name and the password at subsequent
logons, the entry must match exactly or your logon will not be
accepted.
5. With the cursor in the "access code file" column, enter an
"A" and press the <ENTER> key. Continue this procedure
for all of the file designations.
6. The last entry field allows you to select the "automatic
logoff" feature of the system. If you enter a "Y" in this
field, the system will automatically log you off unless you
make a keystroke within the next 5 minutes. This feature
is highly desirable because it helps to prevent another
operator from having access to files, should you walk
away from the keyboard without logging off. lf you do not
desire automatic logoff, leave an "N" in this field.

User's Manual 8-4 Sievert Incite


*** NOTE ***
You may change the access assignments later, if you
wish, but for now, give yourself full access to the system.
Later you may go back and add other operators and their
access assignments.
7. With an "A" in all the file description fields and the cursor
again in the name field, press the F2 function key
which will Modify the record. "Record Modified" will
appear on the status line.
8. Press Fl-PrevMenu then F6-Logoff. The system will
return to the Logon screen. Enter your name and
password exactl y as yo u did in the "OPERAT OR
PERMISSIONS" file. You are now logged on and may
access any file.

User's Manual 8-5 Sievert Incite


SET DATE AND TIME
1. Press F2-Control then F5-Set Time. The time and date
screen is now displayed.

02-26-90 10:40:18 Operator violation: Date and time


02-26-90 10:40:44 Liebert Pr

DATE AND TIME


date [02-26-90) (mm-dd-yy)
time [10:40) (hh:mm 00:01 - 23:59)

1 of 1
ACCESS CONTROL
1-PrevMenu 2-Send Cmd
3-Prior 4-Next
5- 6-
7-PRINT 8-Help
9-Search 10-618I8

Figure 8-3 DATE AND TIME SCREEN

2. lf the correct time and date are not displayed, enter them
at this time.
*** NOTE ***
Date is entered as the prompt shows, month-day-year.
Use <ENTER> to move between the dashes (-). Be sure to
enter the time using a 24-hour clock, for instance, 1:30p.m. is
entered as 13:30. Use <ENTER> to move between colons

User's Manual 8-6 Sievert Incite


3. Press the <ENTER> key to return to the date field. Now
press the F2-Send Cmd key. The time and date is now
set in the computer, and later will be set in the IGMs as
well.
4. Press F10-MAIN to return to the main menu.

At this point the system is in the main menu , but the time
screen is still present. The screen presented at any given
point in time is always the last file which was opened by
the operator. If desired, the operator may change the
screen by using the log-off key. Logging off the system
will bring up the logon screen prompt for name and
password and ready the system for the next operator
session.

User's Manual 8-7 Sievert Incite


CUSTOMER CODE
1. Press F5-DBASE
DBASE then F3-Parameters
F3 then F1-Cust
Cust Code.
The customer code file is now displayed.

02-26-90 1 0 43 . 08 Sievert

CUSTOMER CODE
customer code number [100341]

1 of 1
ACCESS CONTROL
I-PrevMenu 2-Modify
Modify
3- 4-
5- 6-
7-PRINT 8-Help
Help
0- 10-
-MAIN

Figure 8-4
8 CUSTOMER CODE SCREEN

2. Enter the 6 d igit c us to m er c ode enc oded o n yo ur


magnetic stripe cards and press <ENTER>. You can find
this number on the cross
cro reference sheet that was
provided with your cards.
3. Press F2--Modify to set the customer code.

User's Manual 8-8 Sievert Incite


1/0 PORT CONFIGURATION
- HARD WIRED LOOPS
This section describes the proper 1/0 Port file entries for
the "hard wired" or local group of IGMs. If you also have
additional group(s) of IGMs that will be on a dial-up schedule
over phone modems, follow the instructions shown in the
"dial-up" section as well. Otherwise you may skip that
section.
Press Fl-Prev Menu to return back to the parameters
menu, then press F4-1/0 Port to open the 1/0 port
configuration file.

02-26-90 10:46:38 Sievert Pr

I/O PORT CONFIGURATION

group number [01]


communication port number [2] IGM/modem
baud rate [9600]
modem dial command remote site
identity remote site password
remote access telephone number
remote initial call time remote
call delay time ]
remote wait time for answer ] (hhmm) (hhmm)
remote retry dial count (in seconds)
remote retry dial trme interval (in minutes)
1 of 1
ACCESS CONTROL
1-PrevMenu 2-Modify
3-Prior 4-Next
5-Add 6-Delete
7-PRINT 8-Help
9-sort 10-Search

Figure 8-54 1/0 PORT CONFIGURATION FILE

User's Manual 8-9 Sievert Incite


02-26-90 1048[37 Sievert Pr

I/O PORT CONFIGURATION


group number [021 communication port
number [1]
IGM/modem baud rate [12001
modem dial command [T85,6148416700
remote site identity [Columbus] remote site
password [Liebert 2457
remote access telephone number [T85,6148416710
remote initial call time [0800] remote
call delay time [0400] ]
remote wait time for answer [30] (hhmm) (hhmm)
remote retry dial count [2] (in seconds)
remote retry dial ttme interval [1] (in minutes)
1 of 1
ACCESS CONTROL
1-PrevMenu 2-Modify
3-Prior 4-Next
5-Add 6-Delete
7-PRINT 8-Help
9-Sort 10-Search

Figure 8-5B 1/0 PORT CONFIGURATION FILE (continued)

GROUP NUMBER
This entry field defines the group number of the IGM group
you will connect to. Enter "01" here and press the <ENTER>
key to define your local "hard wired" group of IGMs.
COMMUNICATION PORT NUMBER
This entry field determines which COM port the host will
poll the IGMs from. Enter "2" here and press the <ENTER>
key to define COM2 as the communications port that will be
used to poll your local "hard wired'' group of IGMs.

User's Manual 8-10 Sievert Incite


IGM/MODEM BAUD RATE
This entry field defines the communications speed between
the host processor and the IGM group. Enter "9600" here
and press the <ENTER> key to set the baud rate to 9600
bps communication speed between the host processor and
your local "hard wired" group of IGMs.
Press the F5-Add key and the status line will show "record
added". The above settings you entered will become
effective when you logoff the system or go to a different file.
The remaining fields in the 1/0 Port file pertain to remote IGM
groups that are on a dial-up schedule over a modem. lf you
do not have any remote IGM groups, you may skip the rest
of this chapter.

User's Manual 8-11 Sievert Incite


1/0 PORT CONFIGURATION
- DIAL-UP LOOPS
The following information is required in the 1/0 port file if
you have one or more remote groups of IGMs that will be on
a dial-up schedule over phone modems. If this is not the
case, you may skip this section.
GROUP NUMBER
This entry field defines the group number of the IGM group
the host will call. Enter "02" here and press the <ENTER>
key to define the first remote group of IGMs.

COMMUNICATION PORT NUMBER


This entry field determines which COM port the host will
call the IGMs from. Since the modem is connected to the
host's COM port 1, enter a "1" here and press the <ENTER>
key to define COM1 as the communications port that will be
used to dial the remote group of IGMs from.
IGM/MODEM BAUD RATE
This entry field defines the communications speed between
the host processor and the remote IGM group. Since the
maximum modem communications speed is 1200 baud enter
"1200" here and press the <ENTER> key to set the baud
rate to 1200 bps communication speed.
MODEM DIAL COMMAND
This entry field defines the phone number of the remote
IGM group to be called. The phone number may be up to
19 characters long. Enter a "T" for touch tone dialing
followed by the phone number to be called. If you desire
pulse dialing such as used on rotary phone lines, do not
enter a "T".
Since the host uses the Hayes command format, you may
separate numbers with comas to provide a 1 second delay
between numbers that are dialed. This is useful when a
certain sequence of numbers must be dialed to access an
outside line and a delay is needed before a dial tone is
obtained. Example: T85,6148416700.
Once you have entered the phone number, press the
<ENTER> key to move to the next entry field.

User's Manual 8-12 Sievert Incite


REMOTE SITE IDENTITY
This entry field defines a site identity so that when the
remote group calls the host, because of an alarm condition,
the host can determine which remote site is calling. The site
identity can be up to 8 characters long. Enter any
combination of alphabetic and numeric characters for the site
identity. Example: Columbus.
Once you have entered the site identity, press the
<ENTER> key to move to the next entry field.
REMOTE SITE PASSWORD
This entry field defines a password for the remote IGM
group. When the host calls the remote IGM group, it logs on
to the remote group with a password. If the password is not
c o r r ec t , t h e r em o t e gr o u p h a n g s u p t h e p h o n e . T h e
password can be up to 16 characters long. Enter any
combination of alphabetical or numeric characters for the
password. Example: Liebert 2457
Once you have entered the password, press the <ENTER>
key to move to the next entry field.
REMOTE ACCESS TELEPHONE NUMBER
This entry field determines the host phone number the
remote IGM group will call if it has an alarm to report. The
phone number may be up to 30 characters long. Enter a "T"
for touch tone dialing followed by the phone number to be
called. If you desire pulse dialing such as used on rotary
phone lines, do not enter a "T".
Since the IGM uses the Hayes command format, you may
separate numbers with comas to provide a 1 second delay
between numbers that are dialed. This is useful when a
certain sequence of numbers must be dialed to access an
outside line and a delay is needed before a dial tone is
obtained. Example: T85,6148416700.
Once you have entered the phone number, press the
<ENTER> key to move to the next entry field.

User's Manual 8-13 Sievert Incite


REMOTE INITIAL CALL TIME
This field defines the time of day the host is to begin
calling the remote IGM group. Examples: To begin calling at
8:00A.M., enter "0800". To begin calling at 1P.M. enter,
"1300.
***NOTE***
If the host will be calling more than one remote IGM group,
be sure to stagger the initial call times to avoid dialing
conflicts. Example: Call group number 02 at 0800 and group
number 03 at 0815.
Once you have entered the initial call time, press the
‹ENTER> key to move to the next entry field.
REMOTE CALL DELAY TIME
This entry field defines the number of hours/minutes the
host will wait after the initial call time (above) before it calls
the remote group again. Examples: To call every 4 hours
enter "0400". To call every 30 minutes enter "0030".
Once you have entered the call delay time, press the
‹ENTER> key to move to the next entry field.
REMOTE WAIT TIME FOR ANSWER
This entry field defines the length of time (in seconds) the
host should wait for an answer from the remote group before
hanging up the phone. Typically this time should be set for
at least 30 seconds. lf the phone is not answered after this
period of time, the host will hang up.
Once you have entered the wait time, press the ‹ENTER>
key to move to the next entry field.
REMOTE RETRY DIAL COUNT
This entry field defines the number of times the host
should attempt to redial the remote group if a "failure to
connect" occurs after a scheduled dial up period. This value
may be set up to 9 retries.

User's Manual 8-14 Sievert Incite


***NOTE***
Remote retry dial count applies to the host only. lf the
remote group is trying to initiate the call and encounters a
"failure to connect" with the host, the remote group will
continue to retry indefinitely until the host answers.
Once you have entered the retry dial count, press the
<ENTER> key to move to the next entry field.
REMOTE RETRY TIME INTERVAL
This entry defines the number of minutes the host should
wait before initiating a retry dial (above) when a "failure to
connect" from the host to the remote group is encountered.
This value may be up to 9 minutes.
Once you have entered the retry time interval, press the
<ENTER> key to move back to the "group number" entry
field. Press the F5-Add key and the message "record added"
will appear.
lf you have additional remote groups, repeat the above
steps for groups 03, 04, 05, etc. When you logoff the
system, or go to a different file, the 1/0 port settings will
become effective.

User's Manual 8-15 Sievert Incite


SECTION IV OPERATING THE DATABASE

Chapter 9 Database Operating Files


Chapter 10 Database Monitor and Control Files
Chapter 11 System Parameters
CHAPTER 9 DATABASE OPERATING FILES
Introduction .............................................................................................. 9-1
File operations .................................................................... 9-2
Previous menu ............................................................... 9-2
Modify ............................................................................ 9-3
Prior ............................................................................... 9-3
Next ............................................................................... 9-3
Add ................................................................................ 9-3
Delete ............................................................................ 9-4
Print ............................................................................... 9-4
Help ............................................................................... 9-5
Sort ................................................................................ 9-5
Search ........................................................................... 9-5
Operating files ..................................................................... 9-7
Reader/door file .................................................................. 9-9
Door name ..................................................................... 9-9
Group number ........................................................................................... 9-10
Reader number ......................................................................................... 9-10
Unlock time .................................................................................................. 9-10
Door open lime .......................................................................................... 9-10
Time code file .................................................................................................... 9-12
A special note about time codes ................................................... 9-13
Time code name ...................................................................................... 9-13
Time code number ................................................................................. 9-13
Day of the week ........................................................................................ 9-13
Start time ....................................................................................................... 9-14
Stop time ....................................................................................................... 9-14
Holiday file ........................................................................................................... 9-15
Date .................................................................................................................. 9-15
Holiday name ............................................................................................. 9-16
Access codes .................................................................................................... 9-17
Access code name ................................................................................. 9-17
Door name ................................................................................................... 9-18
Time code ..................................................................................................... 9-18
Card file ................................................................................................................. 9-19
Card number .............................................................................................. 9-20
Name ............................................................................................................... 9-20
Access code ............................................................................................... 9-20
User fields .................................................................................................... 9-20
Trace to .......................................................................................................... 9-20
Status ............................................................................................................................... 9-21

9-i
DIAGRAMS, DRAWINGS, TABLES

9-1 Logon Screen & Main Menu ................................ 9-7


9-2 Reader/Door File .................................................. 9-9
9-3 Time Code File ................................................... 9-12
9-4 Holiday File ........................................................ 9-15
9-5 Access Code File ............................................... 9-17
9-6 Card File ............................................................. 9-19
INTRODUCTION
The Onsite Access Control system controls access by
comparing information stored in the system's distributed
database to data read from an encoded magnetic stripe card.
Access is granted or denied on the basis of the card data, the
location where the card was read, and time of day.
Encoded card data is read by a magnetic type swipe card
reader. The card reader immediately sends the data to the
IGM, where it is compared with stored database information that
has been downloaded from the host processor.
Database files are created for:
*Card Readers and the doors they control
*the time of day and days of the week
*designated holidays
*access codes
*encoded cards

Other files establish parameters for:

*contact monitoring (Model 45 only)


*auxiliary relays (Model 45 only)
Together, these files form the system "database". The
chapters that follow will help you create your own database files
at the host processor and download them to the IGMs.
Before proceeding, review the following list of key functions
used with this software. These keys help you to enter
information and execute system functions. This list shows the
most commonly used keys and how they are represented in this
manual.
<ENTER> = Carriage Return key. This key is located on the
right side of the typewriter portion of the keyboard. lt tells the
computer that you have completed your entry. ENTER also
moves the cursor from one data field to another.

Enter

User's Manual 9-1 Sievert Incite


<Fx> = Function keys F1, F2, F3,....F10 are located along
the top of the keyboard. These keys are not only used to
move from one menu to another, they are also used to
per f or m f il e m a in te n a n c e as ex p la i ne d u n der F IL E
OPERATIONS.
Each file screen uses field brackets to prompt you to
[ENTER] information, or to draw your attention to [file
information] the system has retrieved. These brackets
represent a data field and define the length of the field.
Note that from the Main Menu, F10-Quit will display a
menu that includes utilities to back-up or restore database
files, after you have created them. Follow the on-screen
prompts.

FILE OPERATIONS
The Onsite software creates files from the information you
enter about the system. Once a file has been created, it can
be manipulated to suit any changes that are required.
There are ten different operations in the database file
menus:

F1-PrevMenu F2-Modify
F3-Prior F4-Next
F5-Add F6-Delete
F7-PRINT F8-Help
F9-Sort F1 0-Search

Each time a given database file is opened, the menu


changes to the above set of "maintenance" keys which allow
certain file operations for database management. These
operations are basically the same for all files:
Fl -PrevMenu
The function key <F1> will return the screen back to the
menu you were in previous to the present file.

User's Manual 9-2 Sievert Incite


F2-Modify
Any record in a database file may be modified. Use the
Function keys <F3> or <F4> (Prior and Next), or <F7> (Search)
to bring the record to the screen. Enter the new information
in the appropriate field(s) by typing over the existing entry.
Type spaces over any remaining characters in the field and
press the <RETURN> key after all new entries in each field.
Press <F2> to modify.
When you have finished modifying records in a file, the data
will be downloaded to the IGMs when you exit the menu by
pressing <F1> and entering ANY OTHER FILE or by LOGGING
OFF the system. This is confirmed by a series of messages
beginning with the message "Sort (Key Extraction Phase)".
*** NOTE ***
When you modify, add to or delete from a database file, the
change will not download to the IGMs until you open another
file or logoff the system. Therefore, it is important that you
logoff the system each time you are finished updating the
database files.
F3-Prior and F4-Next
When you open a file, the first file record, if any, will be
displayed. To move within the file, press the Function key
<F3> or <F4>. The <F3> key will move you back to the
previous record, going toward the beginning of the file. The
<F4> key moves you ahead to the next record, going toward
the end of the file.
For example, if you are at "RECORD 5", <F3> will move
you to "RECORD 4" and <F4> will move you to "RECORD
6". Each depression of either key moves you one record.
F5-Add
When a file is opened, the first record in the file, if any,
will appear. To add a new record, enter all the
required
information, then press the <F5> Function key. The message
"record added" will appear in the lower left corner of the screen
just above the menu display.
When you have finished adding new records to the file,
the data will be downloaded to the IGMs when you exit the
menu by pressing <F1> and entering ANY OTHER FILE or
by LOGGING OFF the system. This is confirmed by a series of
messages beginning with the message "Sort (Key Extraction
Phase)".

User's Manual 9-3 Sievert Incite


*** NOTE ***
When you modify, add to or delete from a database file, the
change will not download to the IGMs until you open another
file or logoff the system. Therefore, it is important that you
logoff the system each time you are finished updating the
database files.
F6-Delete
To delete a record in a file, open the file menu and bring
the record to the screen; use either the PRIOR and NEXT
Function keys <F3> and <F4>, or the SEARCH Function key
<F10> (the description for this follows). When the record to be
deleted is displayed, press the Function key <F6>. The
message "marked for deletion" will display in the lower left
corner of the screen just above the menu display.
When you have finished deleting records from a file, the data
will be downloaded to the IGMs when you exit the menu by
pressing <F1> and entering ANY OTHER FILE or by LOGGING
OFF the system. This is confirmed by a series of messages
beginning with the message "Sort (Key Extraction Phase)".
NOTE: If you have marked a record for deletion by mistake,
you may cancel the deletion by pressing F2-Modify before
exiting the file.
*** NOTE ***
When you modify, add to or delete from a database file, the
change will not download to the IGMs until you open another
file or logoff the system. Therefore, it is important that you
logoff the system each time you are finished updating the
database files.
F7-PRINT
Any file may be printed. You can print the file in the order
the system stores it, or you can resort it to suit your own needs
(explained below). Press Function key <F7> and the menu will
offer the option to print a LONG REPORT or a SNAPSHOT.
Press F7-SnapShot to print the contents of the screen or
F8-Long Rpt to print the entire contents of the file.

User's Manual 9-4 Sievert Incite


F8-Help
The software menus have been designed to make data entry
and other operations as easy as possible, but from time to time
some help may be required. "HELP" screens accompany the
menus, and while they can not be as detailed and instructional
as the manual, they are designed to give you critical information
to get you through the menu process quickly. "HELP" screens
are available when any file is opened by pressing the Function
key <F8>.
F9-Sort
The system keeps each file in a certain sequence. For
example, it keeps the Card File in ascending order by card
number. However, you may want to resort the file into a
sequence that is useful to you (by name, for example) so you
can obtain a printout of the card file listed in alphabetical order.
To do this, open the card file and place the cursor on the name
field. Press Function key <F9> and the file will be sorted by
the name field in alphabetical order. This procedure may be
used on any multiple record file on any field.
Once you exit the file and enter any other file, the system
will sort the file back to its original order.
Fl 0-Search
By using the PRIOR and NEXT Function keys, <F3> and
<F4>, you can search the file record-by-record. For a file of
any size, however, the SEARCH <F10> key offers a faster way.
To do a SEARCH, place the cursor on the field you wish to
search and enter the appropriate information.- lf the whole item
is not known, enter as much of the information as possible,
followed by an asterisk (*)• Press the Function key <F10> and
the system will find the requested record. Example: ln the card
file, you want to find the record for "Johnston, Steve". You are
not sure if the name is spelled "Johnston" or "Johnson" so you
would enter John* in the name field and press the F10-Search
key. The system the finds the first record beginning with
"John". This procedure may be used on any multiple record file
on any field.

User's Manual 9-5 Sievert Incite


***NOTE***
When in a single record file such as the CUSTOMER CODE,
ALARM DEFINITIONS, or TITLES files (explained later on) an
abbreviated set of maintenance keys will appear as shown
below:

Fl -PrevMenu F2-Modify
F3 F4
F5 F6
F7-PRINT F8-Help
F9 F1 0-MAIN

The functions of these keys remain as explained above


except the F2-Modify key is used to add or modify the file and
the F10-MAIN key is added and will take you back to the main
menu.

User's Manual 9-6 Sievert Incite


OPERATING FILES
If you have not completed your System Planning Worksheets,
go to the Section on "PLANNING THE SYSTEM". If you have
completed the worksheets, but have not initialized the system
or logged on, go to the Section on "GETTING STARTED" and
perform those routines.
***IMPORTANT***
The operating files must be completed in the order shown.
Since information in the file is interrelated, creation of any one
file will depend on information in previous files. The system
forces you to establish files in the required order by not
accepting an entry if a previous file, or entry to a previous file,
does not exist.

02-26-90 11:33:16 Sievert Pr

LOGON

name [
password [

1 of1
1-ALARM 2-CONTROL ACCESS CONTROL
3-HISTORY 4- 10:51(24 000ite/64 startup on 02-26-90
5-DBASE 6-Logoff 10:51:24 LIEBERT 000ite/64 Version 1.2
7-PRINT 8-ACC STAT 10(51:24 Copyright (c) 1987 - 1989 All rightsreserved.
9-Menu Hlp 10-Quit 10:51:25 Connected group 01 to COM2

Figure 9-1 LOGON SCREEN & MAIN MENU

User's Manual 9-7 Sievert Incite


The main menu should now be present, showing the logon
screen.
If you have not already logged on, do so now. The system
will not allow you to open the database files unless you are
logged on with a valid name and password.
All files pertaining to the system database are located under
the DBASE sub-menu. Since you will be starting with the
operating files press F5-DBASE then Fl-OPERATING.

User's Manual 9-8 Sievert Incite


READER/DOOR FILE
Press <F1> to select the Reader/Door file. As you gain
experience with the files, you will be able to reach a menu
quickly from the Main Menu by rapidly pressing the function
keys. ln this case, <F5> <F-I> <F-I> moved you to the
reader/door file.
The Reader/Door File allows you to assign the Card Reader
the numbers and names of the doors they control. You will
also be able to set the "unlock time" and the "door open time."

02-26-90 10:53,14 Sievert pr

group number [01]


reader number [01]
door unlock time [05] (in seconds) (in seconds)
door open time (10]

1of 2
1-PrevMenu 2-Modify ACCESS CONTROL
3-Prior 4-Next 10:51:24Incite/64 startup on 02-26-90
5-044 6-Delete 10:51,24LIEBERT Incite/64 Version 1.2
7-PRINT 8-Help 10:51,24Copyright (c) 1987 - 1989 All rightsreserved.
9-Sort 10-Search 10:51.25Connected group 01 to COM2

Figure 9-2 READER/DOOR FILE

DOOR NAME (18 CHARACTERS)


Enter the door name from your Reader/Door planning sheet
for the first card reader in your system.

User's Manual 9-9 Sievert Incite


GROUP NUMBER (2 CHARACTERS)
Enter the group number of the IGM/Reader group you are
defining the reader for. Example: The local "hard wired" group
of IGMs would be group "01". If you have one or more remote
IGM/Reader groups, they would be groups "02", "03", "04", etc.
READER NUMBER (2 CHARACTERS)
Enter the 2-digit reader number from your Reader/Door
planning sheet. Example: Readers "01" and "02" would be
connected to the first IGM on the group (IGM address 01).
Readers "03" and "04" would be connected to the second IGM
on the group (IGM address 03), etc.
UNLOCK TIME (2 CHARACTERS)
Enter the desired unlock time in seconds from 1 to 99.
Example: Enter "05" for a unlock time of 5 seconds. This is
how long the door will remain unlocked after a valid card swipe
or request to exit is made. If door contacts are used, any
remaining unlock time is canceled. Example: If the unlock time
is set for 5 seconds and the door is opened 2 seconds after a
card swipe, the remaining 3 seconds are canceled and the door
locks. This helps prevent "tailgating".
DOOR OPEN TIME (2 CHARACTERS)
Enter the desired door open time in the same manner as
"unlock time". This value sets how long the door can remain
open after a valid card swipe or exit request is made. If the
door is open longer than this time, the message "door open too
long" can be displayed as an alarm as discussed later on in
Chapter 11.
Once you have completed your entry for the first reader,
press the <ENTER> key to return the cursor back to the "door
name" field and then press the F5-Add key. The message
"record added" will appear just above the menu in the lower
left-hand portion of the screen.
You may continue adding the rest of your reader/door entries
by typing over the existing information. Be sure to use the
space bar to blank out any remaining characters when typing
over existing entries.

User's Manual 9-10 Sievert Incite


***NOTE***
Modifying an existing door name or reader number is not
allowed by the system. if you must change the name of a
reader or the reader number of an existing door, you must first
delete any access code which contains the reader name you
wish to change and then delete the record from the reader/door
file. At this point, you may add the new reader information.

User's Manual 9-11 Sievert Incite


TIME CODE FILE
The Time Code File sets the periods of access by the time
of day and days of the week. A time code will be "active" only
during the days and times you establish. During all other times,
the time code will be "inactive".
A t im e c od e m a y c o n s is t of s e v er a l l i ne e ntr i es t o
accommodate different access periods in the same day, or
different days. A time code entry can not overlap from one day
to the next. The period must be broken into two entries.

Pr
02-26-90 1 0 59 , 01 Sievert

TIME CODE FILE


time code name [ALWAYS ] t1me code
number 02
mon tue wed thu fri sat sun hol start stop
[Y] [Y] [Y] [Y] [Y] [Y] [Y] [Y] [0000] [2400]
[ 1 [ 1 [ 1 [ 1 [ 1 [ 1 [ 1 ( 1 [ 1 [
[ 1 [ 1 ( 1 [ 1 [ 1 [ 1 [ 1 [ 1 [ 1 [
1 1 1 1 [ 1 ( 1 1 1 1 1 1 1 E l (
[ 1
( 1 [ 1 [ 1 [ 1 1 1 [ 1 1 1 [ 1 ] 1 [ 1
[ 1 [ 1 [ 1 [ 1 1 1 [ 1 [ 1 [ 1 [ 1 E
1 of 7
ACCESS CONTROL
1-PrevMenu 2-Modify
3-Prior 4-Next 10:51:24 Onsite/64 startup on 02-26-90 10:51,24 LIEBERT
5-Add 6-Delete Onsite/64 Version 1.2
7-PRINT 8-Help 10:51:24 Copyright (c) 1987 - 1989 All rights reserved.
9-Sort 10-Search 10:51:25 Connected group 01 to COM2

Figure 9-3 TIME CODE FILE

• User's Manual 9-12 Sievert Incite


The software will accommodate up to 63 Time Code
Numbers, and no more than 99 total Time Code line entries.
For example, if you create two time codes, each a one line
entry, you have used two time code numbers and two line
entries. lf you have created two time codes, each with two line
entries, you have now used two time code numbers and four
line entries. So whichever you use first, 63 time code numbers
or 99 line entries, that will limit the size of your Time Code File.
A SPECIAL NOTE ABOUT TIME CODES
A time code can not have a stop time that is earlier than the
start time. This would occur when a time code spans the end
of one day and the beginning of the next day; such as a third
Shift that starts at 10P.M. on Monday and ends at 6:30A.M. on
Tuesday. ln this case the stop time (06:30) would be earlier
than the start time (22:00).
To accommodate this kind of situation, create two time code
entries for the third Shift. The first time code entry for the third
Shift is "active" from 22:00 (10:00P.M.) to 24:00 (12 midnight)
for active days Monday through Friday. A second time code
entry, again called third Shift, is active from 00:00 (12midnight)
to 06:30 (6:30A.M.) for ACTIVE DAYS Tuesday through
Saturday. Together these two entries will handle the third Shift
for the period of 10:00P.M. to 6:30A.M, Monday through
Saturday. Time codes may consist of multiple entries to handle
periods that overlap the end of one day and the beginning of
the next.
TIME CODE NAME (8 CHARACTERS)
The time code should be given a name that makes sense
and generally describes the "active" period; i.e., Shift 1, Always,
Nights, etc. Use the <ENTER> key to move the cursor to the
next entry field. W hen you modify a name, be sure to type
spaces over any remaining characters in the field.
TIME CODE NUMBER
You do not make an entry here. The software will
automatically enter a number for each time code you enter.

DAY OF THE WEEK (1 CHARACTER)


Enter a "Y", for yes, for those days that you want the time
code to be "active". A non-entry, or a blank, means the time
code will be "inactive" on those days.

User's Manual 9-13 Sievert Incite


START TIME (4 CHARACTERS)
Enter the start time in the 24-hour format; i.e., 8A.M. is 0800.
The start time entered will be the same for all "active" days.
STOP TIME (4 CHARACTERS)
Enter the stop time in the same format as above. The stop
time will also be the same for all "active" days. Remember, the
stop time can not be earlier than the start time. See "SPECIAL
NOTE ABOUT TIME CODES" above.
Once you have completed your entry for the first time code,
press the <ENTER> key to return the cursor back to the "time
code name" field and then press the F5-Add key. The
message "record added" will appear just above the menu in the
lower left-hand portion of the screen.
You may continue adding the rest of your time codes by
typing over the existing information. Be sure to use the space
bar to blank out any remaining characters when typing over
existing entries.

User's Manual 9-14 Sievert Incite


HOLIDAY FILE
ln the Holiday File, you will identify holidays or "special" days
observed by your organization. The holiday file works in
conjunction with the time code file above. lf a "Y" is in the
"hol" field of a given time code, then any holidays you enter will
be effective for that time code. The holiday file will override the
time code file if the "hol" field of a given time code is blank.
Example: A person is normally allowed access Monday through
Friday but not on holidays. lf you have a holiday that is on a
Monday, the person will be denied access on that Monday.

02-26-90 10:58:01 Sievert Pr

HOLIDAY FILE

holiday date [0101]


(mmdd)
holiday name [NEW YEAR'S DAY ]

ACCESS CONTROL 1of 2


1-PrevMenu 2-Modify
3-Prior 4-Next 10:51:24 Incite/64 startupon 02-26-90
5-Add 6-Delete 10:51:24 LIEHERT Incite/64Version 1.2
7-PRINT 8-Help 10:51:24 Copyright (c) 1987- 1989 All rightsreserved.
9-Sort 10-Search 10:51:25 Connected group to COM2
01

DATE (4 CHARACTERES)
Enter the month and date for your holiday or "special" day.
Be sure to fill zeros to the left for the single-digit months; i.e.,
enter January 1 as 0101.

User's Manual 9-15 Sievert Incite


HOLIDAY NAME (18 CHARACTERS)
Enter the name of the holiday or your "special" day.
Once you have completed your entry for the first holiday,
press the <ENTER> key to return the cursor back to the
"holiday date" field and then press the F5-Add key. The
message "record added" will appear just above the menu in the
lower left-hand portion of the screen.
You may continue adding the rest of your holiday entries by
typing over the existing information. Be sure to use the space
bar to blank out any remaining characters when typing over
existing entries.

User's Manual 9-16 Sievert Incite


ACCESS CODES
Access codes are used by the system to determine the cards
that will be allowed access through specified readers during a
specified time period. T h e ac c es s c o d e d o e s t h i s b y
associating a "door name" or location with a "time code name".
Later, you will assign the Access Code Names to each card
number in the file. This tells the card reader(s) when to grant
access for each particular card.

02-26-90 105943 Sievert Pr

ACCESS CODE FILE


access code name [OFFICE ]
door name [BACK DOOR
time code name [OFFICE ]

ACCESS CONTROL 1of 4


1-PrevMenu 2-Modify
3-Prior 4-Next 10[51[24 Incite/64 startup on 02-26-90
5-Add 6-Delete 10[51[24 LIEBERT Incite/64 Version 1.2
7-PRINT 8-Help 1 0 [5 1 24 Copyright (c) 1987 - 1989 All rightsreserved.
9-Sort 10-Search 1 0 5 1 : 2 5 Connected group 01 to COM2

Figure 9-5 ACCESS CODE FILE

ACCESS CODE NAME (10 CHARACTERS)


Enter the access code name from your Access Code
planning sheet. The access code name should be one that
makes sense and generally describes the group of people who
will gain access: i.e., MANAGERS, PLANT, SALES, OFFICE,
etc.

User's Manual 9-17 Sievert Incite


DOOR NAME (18 CHARACTERS)
Enter the name of the door from your Access Code planning
sheet. The door name you enter here must appear exactly as
you entered it in the reader/door file.
TIME CODE (8 CHARACTERS)
Enter the name of the time code that contains the desired
time period to be applied to this door location. The time code
name you enter here must appear exactly as it does in the time
code file.
Once you have completed your entry for the first access
code, press the <ENTER> key to return the cursor back to the
"access code name" field and then press the F5-Add key. The
message "record added" will appear just above the menu in the
lower left-hand portion of the screen.
You may continue adding the rest of your access code
entries by typing over the existing information. Be sure to use
the space bar to blank out any remaining characters when
typing over existing entries.

User's Manual 9-18 Sievert Incite


CARD FILE
The Card File will contain all information pertaining to a card
number and the cardholder.
The card file also contains 4 user-defined fields which may
be used for information like PIN no., Social Security no., phone
no., employee no., etc. These fields may be labeled as
explained in the "TITLES" section of Chapter 11. The system
does not use this information to determine access restrictions
so therefore, these fields are optional with the exception of the
first 4 character field which must contain a PIN number. lf the
PIN feature of the system is not used, this field must still
contain a 4 digit number, such as ext. no.

02-26-90 11:02:27 Sievert Pr

CARD FILE
card number [000001]
name [CLARK, HAL access code name
[MASTER
PIN [1011]
DEPARTMENT [SITE PROD.
CARD SERIAL# [001514
PHONE (2105 ]
trace to [SF ] F(ile) P(rinter) S(creen)
status [A] A(ctive) I(nactive)

ACCESS CONTROL 1of 7


1-PrevMenu 2-Modify
3-Prior 4-Next 10:51:24 Incite/64 startup on 02-26-90
-Add 6-Delete 10:51:24 LIEBERT Incite/64 Version 1.2
-PRINT 8-Help 10:51:24 Copyright (c) 1987 - 1989 All rightsreserved.
9-Sort 10-Search 10:51:25 Connected group 01 to COM2

Figure 9-6 CARD FILE

User's Manual 9-19 Sievert Incite


CARD NUMBER (6 CHARACTERS)
Enter the magnetically encoded card number from your Card
File planning sheet. A cross reference sheet was provided with
your cards which lists the card serial number, stamped on the
back of the card, and it's corresponding encoded card number.
***NOTE***
Be sure of the encoded number before entering the card in
the file and giving it to a cardholder. Card serial numbers are
not always in sequence so therefore, do not make the
assumption that you can subtract a certain number from the
serial number to determine the encoded card number.
NAME (18 CHARACTERS)
Enter the name of the individual, preferably last name first,
who will be issued the above card number.

***NOTE***
If the person you are entering will also be allowed to logon
to the system, enter the name exactly as it will appear in the
"operator permissions file".
ACCESS CODE (8 CHARACTERS)
Enter the name of the access code that defines the readers
and time code the cardholder will be allowed access.
USER FIELDS, 1ST THROUGH 4TH
Enter the information you desire in the user-defined fields.
See the TITLES section in chapter 11 to define the user fields.
Remember to reserve the "1st user field" for PIN numbers if
you will be using them for keypad Card Readers. If you will
not be using the PIN feature, you must enter any other 4 digit
number, such as ext. no. The other 3 user fields are optional.
User fields 1 through 4 have a character length of 4, 12, 12,
and 6, respectively.
TRACE TO (3 CHARACTERS)
Enter "S", "F", "P" or any combination. An "S" sends the
transactions to the host processor screen; "F" sends
transactions to the log file on the hard drive, and "P" sends
transactions to the printer.

User's Manual 9-20 Sievert Incite


STATUS (1 CHARACTER)
Enter "A" for "active" or "I" for "inactive". "Inactive" status
retains the card number record in the host but deletes it from
the IGMs. An inactive record can be made active by changing
the status, whereupon it will be downloaded to the IGMs.
Once you have completed your entry for the first cardholder,
press the <ENTER> key to return the cursor back to the "card
number" field and then press the F5-Add key. The message
"record added" will appear just above the menu in the lower
left-hand portion of the screen.
You may continue adding the rest of your card entries by
typing over the existing information. Be sure to use the space
bar to blank out any remaining characters when typing over
existing entries.

User's Manual 9-21 Sievert Incite


CHAPTER 10 DATABASE MONITOR
AND CONTROL FILES

Introduction ...................................................................... 10-1


Monitor point file (Model 45 IGM only) ............................ 10-1
Group number ............................................................ 10-3
IGM number ............................................................... 10-3
Point number .............................................................. 10-3
Point name ................................................................. 10-3
Opening point message ............................................. 10-3
Closing point message ............................................... 10-3
Alarm condition ........................................................... 10-4
Alarm message number ............................................. 10-5
Trace to ...................................................................... 10-5
Alarm message file (Model 45 IGM only) ........................ 10-6
Message number ........................................................ 10-7
Alarm message .......................................................... 10-7
Link to next message ................................................. 10-7
Control relay file (Model 45 IGM only) ............................. 10-8
Group number ............................................................ 10-9
IGM reader number .................................................... 10-9
Relay "X" or "Y" .......................................................... 10-9
Relay name ................................................................ 10-9
On message ............................................................... 10-9
Off message ............................................................... 10-9
Pulse message ........................................................... 10-10
Pulse time ................................................................... 10-10
Timed command file ........................................................ 10-11
Time code name ......................................................... 10-13
Group number ............................................................ 10-13
IGM/Reader number .................................................. 10-13
Start command ........................................................... 10-13
Stop command ........................................................... 10-13
IGM scheduled operation ........................................... 10-13
If/Then command file ....................................................... 10-14
If group number .......................................................... 10-15
lf IGM/Reader number ................................................ 10-16
Sends this message ................................................... 10-16
Then group number .................................................... 10-16
Then IGM/Reader number ......................................... 10-16
Receives this command ............................................. 10-16
During this time code ................................................. 10-16

10-i
DIAGRAMS, DRAWINGS, TABLES
10-1 Monitor Point File ...................................... 10-2
10-2 Alarm Message File .................................. 10-6
10-3 Control Relay File ..................................... 10-8
10-4 Timed Command File ............................. 10-12
10-5 If/Then Command File ............................ 10-15

10-ii
INTRODUCTION
This chapter contains information related to the monitoring
and automatic control capabilities of the system. Three of the
files, "Monitor Point", "Alarm Message" and the "Control
Relay" file, apply to the model 45 IGM only. If you do not
have a model 45 IGM in your system, you may skip those
sections.
The "Timed Command" and "If/Then" files apply to both
the model 40 and 45 IGMs.
From the Main Selection Menu, select "DBASE" by
pressing F<5>. From this menu select F2-Mon Ctl.
The Monitor and Control Files menu appears on the lower
left portion of the screen. Select the "Monitor Point File" by
pressing Fl-MonPoint. The MONITOR POINT FILE appears
on the screen.

MONITOR POINT FILE (Model 45 IGM only)


The Monitor Point File allows you to define each of the 8
monitor point inputs that are contained in a model 45 IGM.
The monitor point inputs are used to monitor dry contacts
from other devices which are not necessarily associated with
the access control system. For example; you may have a
perimeter door or fire exit that is not controlled with a card
reader and is rarely used but, you want to know when the
door is opened.
You will identify the contact by group number, IGM
address, contact input number and a recognizable name.
You will also be able to enter a description to represent the
open and closed state of the contact.

User's Manual 10-1 Sievert Incite


02-26-90 11:0428 Sievert Pr

MONITOR POINT FILE


group number [01]
IGM number [01]
monitor point number [1] (1 through 8)
monitor point name [UPS ROOM
opening point message [DOOR OPEN
closing point message [DOOR CLOSED
alarm condition [0] B(oth) C(losed) N(one) 0(pen)
alarm message number [01]
trace to [SF ] F(ile) P(rinter) S(creen)

1of 8
-PrevMenu 2-Modify ACCESS CONTROL
3-Prior 4-Next 105124 Incite/64 startup on 02-26-90
S-Add 6-Delete 105124 LIEBERT Incite/64 Version 1.2
7-PRINT 8-Help 1 0 51 : 24 Copyright (c) 1987 - 1989 All rightsreserved.
9-Sort 10-Search 105125 Connected group 01 to COM2

Figure 10.1 MONITOR POINT FILE

Monitored contacts are synonymous with alarms. The


Monitor Point File allows you to define the alarm condition for
each monitored contact (open, closed, both, or none). For
each alarm condition, you can compose a message or
instruction for operating personnel. These will be created
later in the Alarm Message File, but the number of the alarm
message is referenced in the Monitor Point File. Alarm
messages can be linked with one another to form a flexible
and extensive message structure.
Finally, alarm conditions can be "traced" to one, or any
combination of three outputs: the host processor screen, the
log file on the hard disk, and the printer.

User's Manual 10-2 Sievert Incite


GROUP NUMBER (2 CHARACTERS)
Enter the group number of the IGM group you are defining
the monitor point for. Example: The local hard-wired group of
IGMs would be group "01". lf you have one or more remote
IGM groups, they would be groups "02", "03", "04", etc.
IGM NUMBER (3 CHARACTERS)
Enter the address of the IGM that will be monitoring the
contact.

POINT NUMBER (1 CHARACTER)


Enter the number of the input (1 through 8) that will be
connected to the contact you want to monitor.

POINT NAME (18 CHARACTERS)


Enter a name for the contact you want to monitor. The
name should reflect the location or object being monitored,
e.g.: "Fire Exit" or "Basement".
OPENING POINT MESSAGE (18 CHARACTERS)
Enter the message that describes the open condition of
the contact, e.g.: "Door Open".
CLOSING POINT MESSAGE (18 CHARACTERS)
Enter the message that describes the closed condition of
the contact, e.g.: "Door Closed".

User's Manual 10-3 Sievert Incite


ALARM CONDITION (B/C/O/N) (1 CHARACTER)
Enter the contact condition ((B)oth, (C)losed, (0)pen, or
(N)one) that you want to designate as an alarm. The IGM
will respond to these conditions as follows:
Both - When the contact opens or closes, the
IGM sends an alarm condition to the host
processor. The "opening point message"
or "closing point message" you defined
above will appear, in red, on the screen
and an alarm sounds on the host.
Closed - When the contact closes, the IGM sends
an alarm condition to the host processor.
The "closing point message" you defined
above will appear, in red, on the screen
and an alarm sounds on the host.
Open - When the contact opens, the IGM sends
an alarm condition to the host processor.
The "opening point message" you defined
above will appear, in red, on the screen
and an alarm sounds on the host.
None - W hen the contact opens or closes, the
IGM sends an event condition to the host
processor. The "opening point message"
or "closing point message" you defined
above will appear, in yellow, on the screen
but the host does not sound an alarm.

User's Manual 10-4 Sievert Incite


ALARM MESSAGE NUMBER (2 CHARACTERS)
Since you have not yet created any alarm messages in
the "alarm message" file, leave this field blank for now. lf
the alarm message number is entered before the alarm
message number exists, the system will respond with "Alarm
message number does not exist".
Read the section which explains the alarm message file
first and then come back to the monitor point file and modify
each record in the monitor point file with the appropriate
message number.
TRACE TO (3 CHARACTERS)
Enter "S", "F", "P" or any combination. An "S" sends the
alarm to the host processor screen; "F" sends the alarm to
the log file on the hard disk, and "P" sends the alarm to the
printer.
Once you have completed your entry for the first monitor
point, press the <ENTER> key to return the cursor back to
the "group number" field and then press the F5-Add key.
The message "record added" will appear just above the menu
in the lower left-hand portion of the screen.
You may continue adding the rest of your monitor point
entries by typing over the existing information. Be sure to
use the space bar to blank out any remaining characters
when typing over existing entries.

User's Manual 10-5 Sievert Incite


ALARM MESSAGE FILE (Model 45 IGM only)
The alarm message file allows you to compose messages
which will display on the host processor's screen when a
monitor point alarm is received from the IGM. Typically,
these messages are used to provide supplemental information
or instructions about the alarm when the "opening point" or
"closing point" message in the monitor point file is not enough
information. Example; "Call Security at extension 9999.
Should more than one line of text be required, "linking"
enables you to connect messages together to minimize
repetitious phrases and maximize clarity.

02-26-90 11:06(35 Liebert Pr

ALARM MESSAGE FILE

alarm message number [01]


alarm message [CHECK FOR UNAUTHORIZED ENTRY AT UPS ROOM DOOR.]
link to message number [ ]

1of 8
1-PrevMenu 2-Modify ACCESS CONTROL
3-Prior 4-Next 10:51(24 Incite/64 startup on 02-26-90
5-044 6-Delete 10:51:24 LIEBERT 000ite/64 Version 1.2
7-PRINT 8-Help 10:51:24 Copyright (c) 1987 - 1989 All rightsreserved.
9-Sort 10-Search 10:51:25 Connected group 01 to COM2

Figure 10-2 ALARM MESSAGE FILE

User's Manual 10-6 Sievert Incite


MESSAGE NUMBER (2 CHARACTERS)
Enter de number for this alarm message. Do not
duplicate message number.

ALARM MESSAGE (46 CHARACTERS)


Enter de alarm message as you want it to appear. If
your message must exceed the 46 characters, you can
extend it by creating a supplementary message and
“linking”.

LINK TO NEXT MESSAGE (2 CHARACTERS)


Enter the number of the message you want to follow
this message, if any. Be careful not to create a loop. If
this message is the last in a string where no message
follow, leave this field blank.
Once you have completed your entry for the first
alarm message, press the <ENTER> key to return the
cursor back to the "alarm message number" field and
then press the F5-Add key. The message "record added"
will appear just above the menu in the lower left-hand
portion of the screen.
You may continue adding the rest of your alarm
message entries by typing over the existing information.
Be sure to use the space bar to blank out any remaining
characters when typing over existing entries.

User's Manual 10-7 Sievert Incite


CONTROL RELAY FILE (Model 45 IGM only)
The Control Relay File allows you to define the two control
relays which are labeled "X" and "Y" on a model 45 IGM.
The "X" and "Y" relays can be used to operate some
external device. For example, to activate an autodialed in
response to an alarm condition or turn a light on or off by
time of day.

02-26-90 1 1 (1 1 13 Sievert

CONTROL RELAY FILE

group number [01]


IGM number [01]
control relay [X] (X or Y)
control relay name [SECURITY
on message [NOTIFIED 1
off message [NORMAL pulse 1
message [ALARM TEST pulse time 1
[15] (in seconds)

1 o 2
ACCESS CONTROL
1-PrevMenu 2-Modify
3-Prior 4-Next 1 0 (5 1 24 Onsite/64 startup on 02-26-90
5-Add 6-Delete 1 0 5 1 2 4 LIEBERT Onsite/64 Version 1.2
7-PRINT 8-11elp 1 0 5 1 2 4 Copyright (c) 1987 - 1989 All ghts res ed.
9-Sort 10-Search 1 0 ( 5 1 2 5 connected group 01 to COM2

Figure 10-3 CONTROL RELAY FILE

User's Manual 10-8 Sievert Incite


Once these relays are defined, they may be operated
through either a manual entry from the keyboard, Tinned
Command or If/Then command as explained later in this
manual.
GROUP NUMBER (2 CHARACTERS)
Enter the group number of the IGM group you are defining
the relay for. Example: The local hard-wired group of IGMs
would be group "01". lf you have one or more remote IGM
groups, they would be groups "02, "03", "04", etc.

IGM READER NUMBER (2 CHARACTERS)


Enter the address of the IGM that contains the control
relay.

RELAY "X" OR "Y" (1 CHARACTER)


Enter the letter designation, "X" or "Y", of the control relay.

RELAY NAME (18 CHARACTERS)


Enter the name of the relay that will control the external
device. Usually, the name identifies the name or location of
the device being controlled. For example: "Loading Dock".

"ON" MESSAGE (18 CHARACTERS)


Enter the message the system will display when the relay
is "ON". For example: "Light On".
The message you enter here will be displayed when the
relay is on and you do a "control relay status" as explained
later in this manual.
"OFF" Message (18 characters)
Enter the message the system will display when the relay
is "OFF". For example: "Light Off".
The message you enter here will be displayed when the
relay is off and you do a "control relay status" as explained
later in this manual.

User's Manual 10-9 Sievert Incite


"PULSE" MESSAGE (18 CHARACTERS)
The "PULSE" message is optional because it is never
displayed when you do a "control relay status" (explained
later in this manual).
The message you enter here is for reference within the
control relay file only. Therefore, if desired, you may leave
this field blank.
"PULSE TIME" (SEC) (2 CHARACTERS)
T he devic e yo u ar e c o ntr oll ing m a y onl y r eq u ir e a
momentary contact. For example, you may be using the
relay to activate an autodialed which may only require a 3
second contact closure. In this case, the relay will turn on
for the duration of the "pulse time" when the host processor
sends a "pulse" command and the automatically turn back off.

Enter the time, in seconds, for the pulse duration of the


relay. Up to 99 seconds are allowed.

***NOTE***
lf switch 1-8, on the IGM, is on, the "Y" relay will
automatically energize for three seconds in response to any
monitor point alarm within the same IGM.
Once you have completed your entry for the first control
relay, press the <ENTER> key to return the cursor back to
the "group number" field and then press the F5-Add key.
The message "record added" will appear just above the menu
in the lower left-hand portion of the screen.
You may continue adding the rest of your control relay
entries by typing over the existing information. Be sure to
use the space bar to blank out any remaining characters
when typing over existing entries.

User's Manual 10-10 Sievert Incite


TIMED COMMAND FILE
The Tinned Command File sets up commands to be
executed automatically on the start and stop times of a Time
Code. For example, you may have a reader on a lobby door
which you would like to have unlocked during the workday
and then automatically lock it after hours.
For the above example, you would build a timed command
that sends an unlock door ("UD") command to that particular
reader at the beginning of a time code and sends a lock
door ("LD") command at the end of the time code.

User's Manual 10-11 Sievert Incite


02-26-90 11:1243 Sievert Pr

group number [01]


IGm/reader number [01]
start command[EP12
stop command[0P12
IGM scheduled operatlon [Y] N(o)
or Y(es)

CONTROL 1of 13
ACCESS
1- 2-Modify
PrevMenu
3-Prior 4-Next 1 0 :5 1 24 Incite/64 startup on 02-26-90
5-Add 6-Delete 105124 LIEBERT 0056te/64 Version 1.2
7-PRINT 8-Help 1 0 :5 1 24 Copyright (c) 1987 - 1989 All rightsreserved.
9-Sort ]0-Search 105125 Connected group tó COM2
01

Figure 10-4 TIMED COMMAND FILE

COMMANDS

GA = grant access DA = disable antipsbk


UD = unlock door EA = enable antipsbk
LD = lock door rP = pulse relay X or Y
CM = card only mode rN = relay X or Y on
CP = card + PIN rF = relay X or Y off
CU = customer code only CS = r = X or Y
store CU transactions EP 8 DP------- 3 _ disable pnt 3
- enable pnt 8

User's Manual 10-12 Sievert Incite


TIME CODE NAME (8 CHARACTERS)
Enter the time code that contains the start and stop times
to execute the commands.
GROUP NUMBER (2 CHARACTERS)
Enter the group number of the IGM/reader group you
want the command sent to. Example: The local hard-wired
group of IGMs would be group "01". If you have one or
more remote IGM groups, they would be groups "02", "03",
"04", etc.
IGM/READER NUMBER (2 CHARACTERS)
Enter the address number of the IGM or reader that will
receive the command.

START COMMAND (20 CHARACTERS)


Enter the command that you want to automatically send
at the start time of the time code. See figure 10-4 for a list of
available commands.
STOP COMMAND (20 CHARACTERS)
Enter the command that you want to automatically send
at the stop time of the time code. See figure 10-4 for a list of
available commands.

IGM SCHEDULED OPERATION


The two possible entries for this field are "N" (no) or
"Y" (yes). If an "N" is entered, the host processor must be
on line to perform the timed command function. If a "Y" is
entered, the timed command function is downloaded to the
IGM and the host processor does not have to be on line to
perform the timed command function.
When a timed command is downloaded to the IGM, as
described above, it becomes a "Scheduled Operation". Each
IGM may contain a maximum of 16 scheduled operations.
Once you have completed your entry for the first timed
command, press the <ENTER> key to return the cursor back
to the "time code name" field and then press the F5-Add key.
The message "record added" will appear just above the menu
in the lower left-hand portion of the screen.
You may continue adding the rest of your timed command
entries by typing over the existing information. Be sure to use
the space bar to blank out any remaining characters when
typing over existing entries.

User's Manual 10-13 Sievert Incite


IF/THEN COMMAND FILE
This file sets up the automatic execution of commands to
an IGM or reader on a conditional basis. If a specific IGM or
reader sends a specific message to the host processor, Then
the host processor sends a specific command to an IGM or
reader but, only when a specified time code is active. The
command may be sent to the same IGM or reader that
initiated the message or to any other IGM or reader.
For example, you have a perimeter door that is monitored
by one of the monitor point inputs on the system. lf that
door is opened during evening hours, you want to pulse the
"X" relay which, in turn, sounds a buzzer to alert the person
inside that the door was opened.
See figure 10-5 for a list of the possible messages and
commands that can be used.

User's Manual 10-14 Sievert Incite


02-26-90 11(14:25 Liebert

IF/THEN COMMAND FILE


I F g r o u p n u m b e r [ 0 1 ] I F I G M / r e a d e r
n u m b e r [ 0 1 ] sends this message [P01]

T H E N g r o u p n u m b e r [ 0 1 ] THEN
.
IGM/reader number [ 0 1 ] receives this command [XN

during time code name [NON WORK]

1 of 4
ACCESS CONTROL

1-PrevMenu 2-Modify
3-Prior 4-Next 10:51:24 Onsite/64 startup on 02-26-90 10:51:24 LIEBERT
5-Add 6-Delete Onsite/64 Version 1.2
7-PRINT 8-Help 10(51:24 Copyright (c) 1987 - 1989 All rights reserved.
9-Sort 10-Search 10(51:25 Connected group 01 to COM2

Figure 10-5 IF/THEN COMMAND FILE


MESSAGES COMMANDS
DF =door forced open GA=grant access DA=disable antipsbk
DC =door closed LD=lock door rP=pulse relay X or Y
P0x=point x opened CM=card only mode rN=relay X or Y on
PCx=point x closed CP=card + PIN rF=relay X or Y off TS
=tamper sw. opened CU=customer code only (r=X or Y)
TN =tamper sw. normal CS=store CU transactions
DP ----- 3=disable pnt 3
EP------ 8=enable pnt 8

IF GROUP NUMBER (2 CHARACTERS)


Enter the group number of the IGM/Reader group that
must send the message to the host processor. Example: The
local hard-wired group of IGMs would be group "01". If you
have one or more remote IGM groups, they would be groups
"02", "03", "04", etc.

User's Manual 10-15 Sievert Incite


IF IGM/READER NUMBER (2 CHARACTERS)
Enter the address of the IGM or reader that must send
the message.

SENDS THIS MESSAGE


Enter the message that you want the "Then" condition to
respond to.
THEN GROUP NUMBER
Enter the group number of the IGM/reader group that you
want the host processor to send the command to. Example:
The local hard-wired group of IGMs would be group "01". If
you have one or more remote IGM groups, they would be
groups "02", "03", "04", etc.
THEN IGM/READER NUMBER (2 CHARACTERS)
Enter the address of the IGM or reader that will receive
the command.

RECEIVES THIS COMMAND


Enter the command you wish to execute in response to
the "If" message.
DURING THIS TIME CODE (8 CHARACTERS)
Enter the Time Code Name during which this command
will be executed.
Once you have completed your entry for the first If/Then
command, press the <ENTER> key to return the cursor back
to the "If group number" field and then press the F5-Add key.
The message "record added" will appear just above the menu
in the lower left-hand portion of the screen.
You may continue adding the rest of your If/Then
commands by typing over the existing information. Be sure
to use the space bar to blank out any remaining characters
when typing over existing entries.

User's Manual 10-16 Sievert Incite


CHAPTER 11 SYSTEM PARAMETERS
Introduction .................................................................... 11-1
Customer code ...................................................... 11-1
Alarm definitions
........................................................................................
Titles ........................................................................ 11-5
1/0 Port configuration ........................................... 11-7
Operator permissions file ........................................... 11-8

DIAGRAMS, DRAWINGS, TABLES


11-1 Alarm Definitions File ......................... 11-3
11-2 Card File Titles ................................... 11-6
11-3 1/0 Port Configuration File ................. 11-7
11-4 Operator Permissions File ................. 11-8
INTRODUCTION
The system requires a series of files located under the
"PARAMETER" sub-menu. These files are: Customer Code,
Alarm definitions, Card File Titles and the 1/0 port file.
When in a single record file such as the CUSTOMER
CODE, ALARM DEFINITIONS, or TITLES files, an
abbreviated set of maintenance keys will appear as shown
below:
F1 -PrevMenu F2-Modify
F3 F4
F5 F6
F7-PRINT F8-Help
F9 F1 0-MAIN
The functions of these keys remain as explained in
Chapter 8 except the F2-Modify key is used to add or modify
the file and the F10-MAIN key is added and will take you
back to the main menu.
From the "DBASE" sub-menu, the F3-PARAMETER key
brings up the system parameters menu.

CUSTOMER CODE [F-I-CustCode]


The customer code is a 6-digit number that is encoded on
each of your cards. Before any card will be recognized by
the system, the correct customer code must be entered.
Consult the card data sheet that came with your system for
the correct customer code.
Your customer code should already be entered as
explained in Chapter 8. If it is not, consult Chapter 8 and
enter it at this time.

User's Manual 11-1 Sievert Incite


ALARM DEFINITIONS [F2-AlarmDef]
The alarm definitions file allows you set "reader" and
"door" related transactions as an alarm (A), event (E) or
disable (D) for each transaction type. You may also select
where the transaction message is sent by setting the "Trace
T o" fields. An "S" sends the transactions to the host
processor screen, "F" sends transactions to the log file on the
hard drive, and "P" sends transactions to the printer.
lf the transaction is set as an alarm an audible alarm
sounds at the host and the corresponding door alarm relay in
the IGM will energize for 3 seconds. Also, if the "Trace To"
field includes an "S", the appropriate transaction message is
displayed in red on the host processor's screen.
lf the transaction is set as an event and the "Trace To"
field includes an "S", the appropriate transaction message is
displayed in yellow on the host processor's screen.
If the transaction is disabled, nothing will be reported.

User's Manual 11-2 Sievert Incite


02-26-90 111849 Sievert

ALARM DEFINITIONS
access oranted [E] wrong customer code [A]
(trace to [ ] 18 card file) trace to [SF )
card at wrong door [E] card at wrong time [E]
trace to [SF ] trace to [SF ]
PIN entry error [E] excessive PIN errors [A]
trace to [SF ] trace to [SF ]
anti-pass back violation [A] door forced open [A]
trace to [SF ] trace to [SF ]
door open too long [D] door closed [E]
trace to [ ] trace to [SF ]
tamper switch open [A] tamper switch closed [E]
trace to [SF ] trace to [SF ]
1of 1
1-PrevMenu 2-modify ACCESS CONTROL
3- 4-' 10:51)24 050ite/64 startup on 02-26-90
5- 6- 10.51)24 LIEBERT Incite/64 Version 1.2
7-PRINT 8-Help 10:51,24 Copyright (c) 1987 - 1989 All rightsreserved.
9- 10-MAIN 10:51:25 Connected group 01 to COM2

Figure 11-1 ALARM DEFINITIONS FILE

An explanation of each transaction type is as follows:

access granted -
When a valid card is used at the correct reader at the
correct time of day, a "granted access" message is sent to
the host processor. Note that there is not a "Trace To" field
for this transaction. "Trace To" is handled in the card file on
an individual basis for the "granted access" transaction.
wrong customer code -
This message is generated if a card encoded in the
Liebert format is used but does not belong to your system.

User's Manual 11-3 Sievert Incite


card at wrong door -
This message is generated when a card is used at a
reader it is not assigned access privileges to.
card at wrong time -
This message is generated when a card is used outside of
its assigned time period.

PIN entry error -


This message is generated when an incorrect PIN number
is entered at a PIN reader set to the PIN mode of operation.

excessive PIN errors -


This message is generated when 4 consecutive incorrect
PIN numbers are entered at a PIN reader set to the PIN
mode of operation.
anti-pass back violation -
This message is generated when the anti-pass back mode
of operation is selected and a card is used at an "in" reader
before it is used at an "out" readers or vise versa.

door forced open -


This message is generated if a door is opened without a
valid card transaction or request to exit.

***NOTE***
This feature requires the use of door contacts.

door open too long -


This message is generated after a valid card transaction or
request to exit if the door is held open longer than the
specified "door open time" in the reader/door file .

***NOTE***
This feature requires the use of door contacts.

door closed -
This message is generated when the door closes after a
"door forced open" or "door open too long" transaction.

tamper switch open -


This message is generated if a mag-stripe type reader is
removed from it's mounting plate.

User's Manual 11-4 Sievert Incite


tamper switch closed -
This message is generated when the tamper switch
closes after a “tamper switch open” transaction.
Once you have completed your entries, press the
<ENTER> key to return the cursor back to the "access
granted" field and then press the F2-Modify key. The
message "record added" will appear just above the menu in
the lower left-hand portion of the screen.
The values you set will become effective when you open
the next file. Press F1-PrevMenu then F3-Titles to move to
the card file titles screen.

TITLES [F3-Titles]
T he card file contains four us er fields that can be
used to store additional inform ation about eac h
cardholder. T he fields are identified here as “ first
user defined field”, “second user defined field”, “thir d
user defined field”, and “fourth us er defined field” .
Field length is 4, 12, 12 and 6 characters,
respectivel y. You m ay define these fields to suit your
needs, but obser ve one rule: If you ass ign PIN
num bers to the c ardholders, dedicate the “firs t user
defined field” for storing the PIN num ber. Onc e you
have com pleted your entries, press the <ENTER> key
to return the cursor back to the "first user defined field"
field and then press the F2-Modify key. The message
"record added" will appear just above the menu in the lower
left-hand portion of the screen.

User's Manual 11-5 Sievert Incite


The values you set will become effective when you open
the next file. Press F1-PrevMenu
F1 then F4-1/0
1/0 Port to move
to the 1/0 Port configuration file.

02-26-90 111950 Sievert

CARD FILE TITLES


first gser defined field [PIN ] Personal identification number
second user defined field [DEPARTMENT
third user defined field [CARD SERIALfl
fourth user defined field [PHONE ]

1 of 1
ACCESS CONTROL
1-PrevMenu 2-Modify
Modify
3- 4- 10:5124 005ite/64 startup on 02-26-90 1 0 : 5 1 2 4 LIEBERT
5- 6- onsite/64 Version 1.2
7-PRINT Help
8-Help 1 0 : 5 1 2 4 Copyright (c) 1987 - 1989 All rights reserved.
9- 10- MAIN 1 0 : 5 1 2 5 Connected group 01 to COM2

Figure 11-2 CARD FILE TITLES

User's Manual 11-6 Sievert Incite


1/0 PORT CONFIGURATION [F4-1/0 Port]
T he 1/ 0 p or t c onf ig ur a ti o n f il e es ta b l is h es t h e
communication parameters between the host processor and
IGMs. Specifically, this file is used to define the COM port
being used and the communication speed. If remote IGM
groups are connected to the system, additional parameters
define the remote site telephone number, identity, and
password as well as setting up a dialing schedule.
The 1/0 port configuration file should already be entered as
explained in Chapter 8. lf it is not, consult Chapter 8 and
enter it at this time.

02-26-90 1121)05 Sievert

I/0 PORT CONFIGURATION


group number[01)
communication port number[2]
IGM/modem baud rate[9600]
modem dial command
remote site identity
remote site password
remote access telephone number (
( 1

remote initial call time[ 1 (hhmm)


remote call delay time[ 1 (hhmm)
remote wait time for answer[ 1
remote retry dial count[ 1
(in seconds)
remote retry dial time interval
[ 1 (in minutes)
1of 1
1-PrevMenu 2-Modify ACCESS CONTROL
3-Prior 4-Next 10:51)24 Incite/64 startup on 02-26-90
5-Add 6-Delete 10:51,24 LIEBERT Incite/64 Version 1.2
7-PRINT 8-Help 10:51:24 Copyright (c) 1987 - 1989 All rightsreserved.
9-Sort 10-Search 10)51)25 Connected group 01 to COM2

Figure 11-3 1/0 PORT CONFIGURATION FILE

User's Manual 11-7 Sievert Incite


OPERATOR PERMISSIONS FILE [F4-OpPerms]
The "operator permissions" file defines the system
operators who will be allowed to logon to the host processor.
it also defines whether or not the operator will be able to
view or change a file, issue system commands and run
transaction reports. This file may contain up to 32 different
operators.
In Chapter 8, you entered yourself as one of the system
operators with full control of all software functions. If desired,
you may enter other system operators now using Chapter 8
as a guide, or at a later time.

02-26-90 11.22:34 Sievert

OPERATOR PERMISSIONS
name [CLARK, HAL 1
password [ 1

access code file [A] timed command file [A] anti-pass back commands [A]
alarm message file [A] alarm definitions [A] control relay commands [A]
card file [A] card file titles [A] monitor point commands [A]
control relay file [A] customer code [A] reader/door commands [A]
holiday file [A] load igm [A] control relay status [A]
IF/THEN command file [A] operator permissions [A] monitor point status [A]
monitor point file [A] date and time [A] igm status [A]
reader/door file [A] transaction reports [A] reader/door status [A]
time code file [A] port configuration [A] automatic logoff [Y]

2 of 3
ACCESS CONTROL
1-PrevMenu 2-Modify
-Prior 4-Next 10.51:24Incite/64 startup on 02-26-90
5-Add 6-Delete 10:51:24 LIEBERT Incite/64 Version 1.2
7-PRINT 8-Help 10.51:24Copyright (c) 1987 - 1989 All rights reserved.
9-Sort 10-Search 10.51:25Connected group 01 to COM2

Figure 11-4 OPERATOR PERMISSIONS FILE

User's Manual 11-8 Sievert Incite


SECTION V CONTROLS AND REPORTING

Chapter 12 System Control/Commands


Chapter 13 System History
Chapter 14 System Status
CHAPTER 12 SYSTEM CONTROL/
COMMANDS

Introduction ....................................................................... 12-1


Printer toggle .................................................................... 12-1
Date and Time .................................................................. 12-2
Commands ....................................................................... 12-3
Reader/Door commands .................................................. 12-4
Card and PIN mode ...................................................... 12-5
Card only mode ............................................................ 12-5
Customer code ,only ..................................................... 12-6
Customer code only
(store transactions) ................................................. 12-6
Enable anti-pass back .................................................. 12-6
Disable anti-pass back ................................................. 12-6
Grant access ................................................................ 12-6
Unlock door .................................................................. 12-6
Lock door ...................................................................... 12-6
Monitor point commands .................................................. 12-7
Disable monitor point .................................................... 12-7
Enable monitor point .................................................... 12-7
Control relay commands .................................................. 12-9
On 12-9
Off 12-10
Pulse ............................................................................. 12-10
Anti-pass back commands ............................................... 12-11
Out 12-12
In 12-12
Neutral .......................................................................... 12-13
Load IGM commands ....................................................... 12-14
Logoff 2-17
DIAGRAMS, DRAWINGS, TABLES

12-1 Date and Time Screen ............................... 12-3


12-2 Reader Door Commands Screen . .. ......... 12-5
12-3 Monitor Point Commands .......................... 12-8
12-4 Control Relay Commands Screen ............. 12-9
12-5 Anti-Pass back Commands ..................... 12-12
12-6 Load IGMs Command Screen ................. 12-14
12-7 Log off Screen .......................................... 12-18
INTRODUCTION
The Onsite software provides a "Control" menu which
allows you to turn your printer on or off and set the time and
date. A "commands" menu is also located under the control
menu which allows the operator to manually send a series of
direct commands to the IGMs and readers. Since this gives
the operator control of the facility, keep this in mind when
assigning people to the operator permissions file.
From the Main Menu press the F2-CONTROL key to bring
up the control menu.

PRINTER TOGGLE [F4-Prt Tog]

Press F4 to deactivate the printer, which is a desirable


mode while you are printing reports. Pressing F4 again will
activate the printer. Each time you press <F4>, the message
"printer deactivated" or "printer activated" will appear in the
bottom scroll area. Also, printer status is given in the top
right-hand portion of the screen. A "Pr" status means the
printer is active (new transactions will automatically be
printed) and a "Pd" status means the printer is deactivated
(new transactions will not be printed).

User's Manual 12-1 Sievert Incite


DATE AND TIME [F5-Set Time]
This key brings up a screen which allows you to set the
correct time and date.
Enter the time in 24-hour format with hours first (22:00
hours for 10:00P.M.). Enter the date in the format shown
(month-day-year). Use the <RETURN> key after each entry.
W he n yo u h a v e e n t e r e d t h e t im e a n d d a t e , p r e s s t h e
F2-Send Cmd key. The system clock at the top right-center
portion of the screen and the clocks in the IGMs will be
updated to the new time.
Once the time and date have been set, the system sends
the time and date once every 15 minutes to the local group
of IGMs. IGMs on a remote dial-up group are updated each
time the host is connected to the remote group.

User's Manual 12-2 Sievert Incite


02-26-90 11:23:46 Sievert Pr

DATE AND TIME


date [02-26-90] (mm-dd-yy)
time [11:23] (hh:mm 00:01 - 23:59)

1of 1
1-PrevMenu 2-Send Cmd ACCESS CONTROL
3-Prior 4-Next 10:51:24 Incite/64 startup on 02-26-90
5- 6- 10:51:24 LIEBERT 005ite/64 Version 1.2
7-PRINT 8-0e1p 10:51:24 Copyraght (c) 1987 - 1989 All rightsreserved.
9-Search 10-MAIN 10:51:25 Connected group 01 to COM2

Figure 12-1 DATE AND TIME SCREEN

COMMANDS
From the "Control" menu, pressing the F6-Commands key
will bring up the "Commands" menu.

User's Manual 12-3 Sievert Incite


READER/DOOR COMMANDS
From the COMMANDS menu, press the F1-Rdr/door key.
The READER/DOOR COMMANDS screen will appear with
the first door name and reader number that is listed in the
reader/door file showing and the blinking cursor in the "enter
selection" field.
Commands may be sent to a single reader by using the
<F3> or <F4> keys to move to the door name you wish to
control, or type the door name or the reader number you
wish to control and press <F9> to search. When the correct
door name or reader number is on the screen, enter the
appropriate command letters in the "enter selection" field and
press the "send Cmd" function key. The message "command
sent" will appear lower left hand portion of the screen just
above the function keys menu.

User's Manual 12-4 Sievert Incite


Commands may be sent globally to all readers on a group
by entering asterisks (**) in the reader number field.

02-26-90 11(24(52 Liebert Pr

READER/DOOR COMMANDS
door name (FRONT DOOR

group number [01] reader number


[01]
enter selection [GA]
C(ard) and P(in) mode G(rant) A(ccess)
C(ard) only M(ode) L(ock) D(oor)
CU(stomer) code only U(nlock) D(oor)
C(ustomer) code only S(tore) transactions
D(isable) A(nti-passback)
E(nable) A(nti-passback)

1of 2
1-PrevMenu 2-Send Cmd ACCESS CONTROL
3-Prior 4-Next 10(51:24 Incite/64 startup on 02-26-90
5- 6- 10:51:24 LIEBERT 000ite/64 Version 1.2
7-PRINT 8-Help 10:51:24 Copyright (c) 1987 - 1989 All rightsreserved.
9-Search 10-MAIN 10:51:25 Connected group 01 to COM2

Figure 12-2 READER DOOR COMMANDS SCREEN

The nine possible Reader/Door commands are as follows:

CARD AND PIN MODE [CP]


This command will set a PIN reader to the PIN mode.
When in the PIN mode, the user must swipe his card and
then enter his 4 digit PIN number.
CARD ONLY MODE [CM]
This command will set a PIN reader to the card only mode.
When the user swipes his card, the four digit PIN number is
not required.

User's Manual 12-5 Sievert Incite


CUSTOMER CODE ONLY [CU]
This command allows any card with the correct customer
code to be granted access at that reader. Any time or
location restrictions that are normally associated with the
reader are automatically overridden and the card transactions
are not logged.
CUSTOMER CODE ONLY (STORE TRANSACTIONS)
[CS]
T his command works in the same manner as the
Customer Code Only command above, except this command
will log card transactions as specified in the card file.

ENABLE ANTI-PASSBACK [EA]


This command puts the IGM in the anti-pass back
mode. It assumes that one of the readers is an "in" reader
and the other reader, on the same IGM, is an "out" reader.
When the card is swiped through the "in" or the "out" reader,
it may not be used at the same reader again until it is used
at the opposite reader.
DISABLE ANTI-PASSBACK [DA]
This command takes the IGM/Reader out of the
anti-pass back mode.

GRANT ACCESS [GA]


This command will unlock the door for the duration of the
"unlock time" defined in the reader/door file.

UNLOCK DOOR [UD]


This command unlocks the door for an indefinite period of
time. The door remains unlocked until a Lock Door [LD]
command is executed or, power is removed from the IGM.
The strike used in this application should be the continuous
duty type.
LOCK DOOR [LD]
This command locks a door that is unlocked.

User's Manual 12-6 Sievert Incite


MONITOR POINT COMMANDS
These commands are only effective on the model 45 IGM.
From the COMMANDS menu, press the F2-MonPoint key.
The MONITOR POINT COMMANDS screen will appear with
the first monitor point name and IGM number that is listed in
the monitor point file showing and the blinking cursor will
appear in the "enter selection" field.
Two possible monitor point commands are as follows:

DISABLE MONITOR POINT [DP]


This command disables a monitor point alarm or event
condition as defined in the monitor point file. When the point
is disabled, the change in state of the contact the point is
monitoring will not be reported. Also, any If/Then commands
that would normally occur in response to the change of state
will not take place.
ENABLE MONITOR POINT [EP]
This command re-enables a monitor point that has been
disabled.

User's Manual 12-7 Sievert Incite


monitor point name [UPS ROOM
group number [01)
enter selection [ ]
D(isable) monitor P(oint) E(nable) monitor P(oint)

ACCESS CONTROL 1of 8


1-PrevMenu 2-Send Cmd
3-Prior 4-Next 10:51:24 Incite/64 startup on 02-26-90
5- 6- 10:51:24 LIEBERT Incite/64 Version 1.2
7-PRINT 8-Help 10:51(24 Copyright (c) 1987 - 1989 All rightsreserved.
9-Search 10-MAIN 10(51(25 Connected group 01 to COM2

Figure 12-3 MONITOR POINT COMMANDS

Commands may be sent to a single monitor point by using


the <F3> or <F4> keys to move to the point name you wish
to control, or type the point name or the IGM number you
wish to control and press <F9> to search. When the correct
point name or IGM number is on the screen, enter the
appropriate command letters in the "enter selection" field and
press the "send Cmd" function key. The message "command
sent" will appear lower left hand portion of the screen just
above the function keys menu.
The command may be sent to all 8 monitor points on an
IGM by entering an asterisk (*) in the point number field.

User's Manual 12-8 Sievert Incite


CONTROL RELAY COMMANDS
These commands are only effective for the model 45 IGM.
Control Relay Commands allow the "X" or "Y" relays to be
turned on, off or be pulsed.
From the COMMANDS menu, press the F3-Ctl Rely key.
The Control Relay Commands screen will appear with the
first relay name and IGM number that is listed in the control
relay file showing, and the blinking cursor will appear in the
"enter selection" field.

02-26-90 11)26:56 Liebert Pr

CONTROL RELAY COMMANDS


control relay name [SECURITY
group number [01]
IGM number [01]
control relay [X]
enter selection [P]
YELLOW LIGHT ON (o)N
YELLOW LIGHT OFF (of)F
LIGHT ON THEN OFF
P(uls
e)

ACCESS 1of 2
CONTROL
1-PrevMenu 2-Send Cmd
3-Prior 4-Next 10:51:24000ite/64 startup on 02-26-90
5- 6- 10:51:24LIEBERT Incite/64 Version 1.2
7-PRINT 8-Help 10:51:24Copyright (c) 1987 - 1989 All rightsreserved.
9-Search 10-MAIN 10:51)25Connected group to COM2
01

Figure 12-4 CONTROL RELAY COMMANDS SCREEN

The three possible control relay commands are as follows:

ON [N]
This command will turn the specified "X" or "Y" relay on.

User's Manual 12-9 Sievert Incite


OFF [F]
This command will turn the specified "X" or "Y" relay off.

PULSE [P]
This command will turn the specified "X" or "Y" relay on
for the "pulse time" specified in the control relay file.
Commands may be sent to a single control relay by using
the <F3> or <F4> keys to move to the relay name you wish
to control, or by typing the control relay name or the IGM
number you wish to control and pressing <F9> to search.
W hen the correct relay name or IGM number is on the
screen, enter the appropriate command letter in the "enter
selection" field and press the "send Cmd" function key. The
message "command sent" will appear in the lower left hand
portion of the screen just above the function keys menu.
Commands may be sent globally to all "X" or "Y" relays
on a group by entering asterisks (**) in the IGM number field.

User's Manual 12-10 Sievert Incite


ANTI-PASSBACK COMMANDS
Anti-pass back commands apply to readers on a given IGM
that have the anti-pass back option enabled. Once a card
has been granted access at an "In" Card Reader, it will not
be granted access again at that same "In" Card Reader until
it has been granted access at the "Out" Card Reader
connected to the same IGM. However, the card will be
granted access at any Card Readers connected to other
IGMs. If for some reason the card becomes "out" when it
actually is "in", the anti-pass back commands can be used to
change the card to the correct status.
From the COMMANDS menu, press the F4-Antipass key.
The Anti-pass back commands screen will appear with the first
card number and name that is listed in the control relay file
showing, and the blinking cursor will appear in the "enter
selection" field.

User's Manual 12-11 Sievert Incite


02-26-90 113049 Sievert

ANTI-PASSBACK COMMANDS
card number to set [001011]
(or) name to set
[CLARK HAL
enter selection [I]
I(n) N(eutral) 0(ut)

ACCESS CONTROL 1of 7


1-PrevMenu 2-Send Cmd
3-Prior 4-Next 105124 Incite/64 startup on 02-26-90
5- 6- 1051:24 LIEBERT Incite/64 Version 1.2
7-PRINT 8-Help 1 0 :5 1 24 Copyright (c) 1987 - 1989 All rightsreserved.
9-Search 10-MAIN 105125 Connected group 01 to COM2

Figure 12-5 ANTI-PASSBACK COMMANDS

The three possible anti-pass back commands are as


follows.
OUT [O]
This command sets a card whose present status is "in" to
"out" status so that it may be allowed through the "in" reader.

IN [I]
This command sets a card whose present status is "out"
to "in" status so that it may be allowed through the "out"
reader.

User's Manual 12-12 Sievert Incite


NEUTRAL [N]
This command can be used if you don't know the "out"
or "in" status of the card. lt will allow the card through the
"out" or "in" reader the next time the card is used.
The anti-pass back status of a person's card may be
changed by using the <F3> or <F4> keys to move to the
person's name or card number you wish to change or by
typing in the person's name or card number you wish to
change and pressing <F9> to search. W hen the correct
name or card number is on the screen, enter the appropriate
command letter in the "enter selection" field and press the
"send Cmd" function key. The message "command sent" will
appear in the lower left hand portion of the screen just above
the function keys menu.

User's Manual 12-13 Sievert Incite


LOAD INFORMATION GATHERING MODULE
(IGM) [F5-Load IGM]
Normally, when you add, delete or modify a file, the
changes you make are automatically downloaded to the
IGM(s) when you logoff or open another file.
If for som e r eas on the IG M(s ) did not r ec eive the
database changes or the IGM database becomes corrupt, the
Load IGM command is provided as a backup means to
download the necessary files to the IGM(s).
From the COMMANDS menu, press the F5-Load IGM key.
The Load Information Gathering Module (IGM) screen will
appear with the first door name and reader number that is
listed in the reader/door file showing, and the blinking cursor
will appear in the "enter selection" field.

02-26-90 11(3155 Sievert

LOAD INFORMATION GATHERING MODULE (IGM)

door name [FRONT DOOR


g r o u p n u m b e r [ 0 1 ]
r e a d e r n u m b e r [ 0 1 ]
enter selection [A ]
A(larm) D(efinitions) file C(ard) file C(ustomer) C(ode) file
D(ate) and T(ime) H(oliday) file M(onitor) P(oint) file
R(eader)/door file T(ime) code file T(imed) C(ommand) file
6(11) files

ACCESS CONTROL 1of 2


1-PrevMenu 2-send Cmd
3-Prior 4-Next 10(51(24 Incite/64 startup on 02-26-90
5- 6- 10(51(24 LIEBERT Incite/64 Version 1.2
7-PRINT 8-He1p 10(51(24 Copyr1ght (c) 1987 - 1989 All rightsreserved.
9-Search 10-MAIN 1 0 ( 5 1 2 5 Connected group 01 to COM2

Figure 12-6 LOAD IGMs COMMAND SCREEN

User's Manual 12-14 Sievert Incite


The possible files you may download and their letter
designations are as follows:
AD = Alarm definitions file
DT = Date and Time
R = Reader/Door file
A = All files
C = Card file
H = Holiday File
T = Time Code file
CC = Customer code file
MP = Monitor point file
TC = Timed Command file
Files may be downloaded to a single reader by using the
<F3>, or <F4> keys to move to the door name you wish to
download to, or by typing the door name or the Reader
number you wish to control and pressing <F9› to search.
When the correct door name or reader number is on the
screen, enter the appropriate file letters in the "enter
selection" field and press the "send Cmd" function key. A
message corresponding to the files you are downloading will
appear in the lower left hand portion of the screen just above
the function keys menu.
Files may be globally downloaded to all readers on a
group by entering asterisks (**) in the reader number field.

User's Manual 12-15 Sievert Incite


LOGOFF [F6-Logoff]
The F6-Logoff key is found in two menus, here in the
commands menu and in the Dbase menu.
When you logoff, the system returns to the logon screen
and downloads any changes you may have made that are
not already downloaded. The system continues to poll the
network for transactions. At this point, changes will not be
allowed to the system database until an operator logs on with
a valid name and password.
'NOTE'
if the automatic logoff feature was selected in the "operator
permissions" file for the last operator who logged on, the
system will automatically logoff after 5 minutes of keyboard
inactivity.

User's Manual 12-16 Sievert Incite


02-26-90 10(32(45 Sievert Pr

LOGON

name [ password [

1 of1
1-ALARM 2-CONTROL ACCESS CONTROL
3-HISTORY 4- 10:09:46 000ite/64 startup on 02-26-90
5-DBASE 6-Logoff 10:09:46 LIEBERT Incite/64 Version 1.2
7-PRINT 8-ACC STAT 10:09(46 Copyright (c) 1987 - 1989 All rightsreserved.
9-Menu Hlp 10-Quit 10:09:47 Connected group 01 to COM2

Figure 12-7 LOGOFF SCREEN

User's Manual 12-17 Sievert Incite


,
CHAPTER 13 SYSTEM HISTORY

Introduction ..................................................................... 13-1


Transaction reports ......................................................... 13-1
Transaction reports screen
number ................................................................. 13-2
Start date ................................................................... 13-3
Stop date ................................................................... 13-3
Start time ................................................................... 13-4
Stop time ................................................................... 13-4
Select name ............................................................... 13-4
Select card ................................................................. 13-4
Select activities .......................................................... 13-4
Select locations ......................................................... 13-5
Select monitor points ................................................. 13-5
Select control relay .................................................... 13-5
Activity selection screen ............................................ 13-6
Door selection screen ................................................ 13-7
Monitor point selection screen ................................... 13-8
Control relay selection screen ................................. 13-10
Transaction Report output ............................................ 13-11
The printed report .................................................... 13-11
ASCII file ............................................................................
...................................................................................... 13-14

DIAGRAMS, DRAWINGS, TABLES


13-1 Transaction Reports Screen ................................... 13-3
13-2 Transaction Report Activity Screen ........................ 13-6
13-3 Transaction Report Location Screen ...................... 13-7
13-4 Transaction Report Monitor Point Selection
Screen ............................................................... 13-9
13-5 Transaction Report Control Relay Selection
Screen ............................................................. 13-10
13-6 Transaction Report ............................................... 13-12
13-7 Transaction Report Header Page ........................ 13-13
1
INTRODUCTION
An outstanding feature of the access control system is its
ability to log all alarm and event transactions to the host
processor's hard disk. The system has the capability to store
up to 32,000 transactions.
When the host is online, it polls the IGMs for transactions.
All transactions collected from the IGMs are stored on the
hard disk in a file named LOG. This file also stores all
operator activity at the host processor. Activities include all
logon and logoff activity, changes to the database files, and
ot h er ac t i v it i es . LO G i s l oc at e d i n th e s u bd ir ec t or y
ONSITE64\DBASE along with all other database files.

TRANSACTION REPORTS
Transaction reports are a detailed and organized record of
the system's history and may be formatted to provide
information by:
− a specific date
− a specific time of day
− a specific cardholder name or card number
− a specific activity
-a specific location
− a specific monitor point
− a specific control relay
The Transaction Report menu consists of multiple entry
fields, so you may configure your report according to the
information parameters shown above. If desired, you can
output the contents of the entire LOG file by accepting the
default settings of the Transaction Report screen.

User's Manual 13-1 Sievert Incite


Generating transaction reports on a regular basis provides
a continuous record or "archive" of all transactions and
operator activity. These reports can be output to the system
printer or diskette drive. If the diskette output is selected, the
system will produce a file named PRNTDLOG. This file is a
printable ASCII file of the report which can be printed on any
compatible computer. Because the system uses the file
name PRNTDLOG for each transaction report, only one report
at a t im e c an be o u tp u t t o a d is k e tt e. Su bs eq ue n t
transaction reports to the same diskette will overwrite the
previous report.
TRANSACTION REPORTS SCREEN NUMBER
T o cr eate a trans ac tion r eport, s elect func tion k ey
F3-HISTORY from the main menu, then press F6-Transact.
The TRANSACTION REPORT screen and menu will appear.
The TRANSACTION REPORT screen will come up in the
"default" mode, indicated by a letter "A" in each entry field.
The "A" means all the information for that category in the
LOG file will be sent to the diskette or printer. Make the
appropriate entries in each of the fields to configure the
transaction report for the information you need.
lf you want a report on a specific person, activity, location,
monitor point or control relay, make sure that you enter an
"N" (None) in the categories you do not want. For example,
if you want a report on all activities that happened at the
"Front Door" only then you would enter an "N" in the card
names, card numbers, activities, monitor points and control
relays fields and enter a "P" in the location field. When the
locations screen comes up, you would select the front door
only.

User's Manual 13-2 Sievert Incite


By using the above method, you will get all activity for the
"Front Door" on the selected date and times.

02-26-90 1 1 (3 4 26 Sievert Pr

TRANSACTION REPORT
start date [A (yymmdd or A(11) days)
stop date [A (yymmdd or A(11) days)
start time [A (hhmm or A(11) times)
stop time [A (hhmm or A(11) times)
select card name(s) [A ] A(11) N(one)
select card number(s) [A 0(11) N(one)
select activity(ies) [A] 0(11) P(artial) N(one)
select location(s) [A] 0(11) P(artial) N(one)
select monitor point(s) [A] 0(11) P(artial) N(one)
select control Felay(s) [A] A(11) P(artial) N(one)

1 of 1
ACCESS CONTROL
1-PrevMenu 2-Search
3-Prior 4-Next 10(51(24 Onsite/64 startup on 02-26-90 10(51(24 LIEBERT
S-Entry 6-Diskette Onsite/64 Version 1.2
7-PRINT 8-Help 1 0 51 ( 24 Copyright (c) 1987 - 1989 All rights reserved.
9-Menu HIp 10-MAIN 10(51(25 Connected group 01 to COM2

Figure 13-1 TRANSACTION REPORTS SCREEN

START DATE

Enter the date (year, month, and day) for the start of the
time period you wish to report. To report information from
the start of the LOG file, leave the "A" in the field and press
<ENTER>.
STOP DATE
Enter the date (year, month, and day) for the end of
the period. To report information up to the current date,
leave the "A" in the field and press <ENTER>.

User's Manual 13-3 Sievert Incite


START TIME
Enter the time (hours and minutes in 24 hour format. i.e.,
1:00P.M. = 1300) for the start of the time period you wish to
report. To report information from the start of the LOG file,
leave the "A" in the field and press <ENTER>.

STOP TIME
Enter the time (hours and minutes in 24 hour format. i.e.,
1:00P.M. = 1300) for the end of the time period. To report
information up to the current time, leave the "A" in the field
and press <ENTER>.

*** A NOTE ABOUT DATES AND TIMES ***


The start/stop date fields, and the start/stop time fields
allows the selection of a time segment on each of the days
beginning from the start date and ending with the stop date.
For example, the period of January 1 through January 3 from
8A.M. to 5A.M. start date [860101] stop date [860103] start
time [0800] stop time [1700] will select information only for
the 9 hours between 8A.M. and 5A.M. on Jan. 1, 2, and 3.
SELECT NAME
lf you leave an "A" in this field, the report will show all
cardholder activity. If you desire a single cardholder enter
the cardholder's name for the person you wish to report and
press F2-Search. You may also use the "wild card" method
to search for a cardholder name. For example, enter SM*
and press <F2>. The first name in the file beginning with
SM, if any, will be found. NOTE: To format a report on a
single cardholder's name only, you must enter an "N" in the
activity, location, monitor point, and control relay fields.
SELECT CARD
If you left an "A" in the previous "card name filed", leave
an "A" here. If you desire a single cardholder and do not
know the cardholder's name, enter the card number of the
person you wish to report and press F2-Search. NOTE: To
format a report on a single cardholder's number and name
only, you must enter an "N" in the activity, location, monitor
point, and control relay fields.
SELECT ACTIVITIES
Leave the "A" in this field if you want all activities to
report, or press "N" for none. Enter a "P" to make a partial
selection of activities.

User's Manual 13-4 Sievert Incite


SELECT LOCATIONS
Leave the "A" in this field if you want all locations to
report, or press "N" for none. Enter a "P" to make a partial
selection of locations.
SELECT MONITOR POINTS
Leave the (A) in this field if you want all monitor points
to report, or press N for none. Enter a “P” to make partial
selection of monitor points.
SELECT CONTROL RELAY
Leave the (A) in this field if you want all control relays
to report, or press N for none. Enter a “P” to make a partial
selection of control relays.
lf you did not enter a "P" in the "activities", "locations",
"monitor points" or "control relays" fields, you are ready to
print the report. Press the <ENTER› key to return the cursor
back to the "start date" field.
To send the report to diskette, press <F6>. To print the
report on the printer, press F7-Print then F8-Long rpt.
If you entered a “P” in the “activities”, “locations”, “monitor
points” or “control relays” fields, press F5-Entry which will bring
up the first screen you requested a partial selection on. Each of
these screens are explained as follows:

User's Manual 13-5 Sievert Incite


ACTIVITY SELECTION SCREEN
Enter "Y" next to the activities you want to report, and "N"
for those you do not. Use the <ENTER> key to move the
cursor across the screen. Press F5-Entry to bring up the
next screen you requested a partial selection on.

02-26-90 11.3535 Sievert Pr

TRANSACTION REPORT - ACTIVITY SELECTION(S)


utilities [Y] (date and
granted access [Y] wrong PIN [Y] time)
wrong customer code [Y] card deleted [Y] status [Y]
card at wrong door [Y] commands [Y] (control relay,
card at wrong time [Y] (anti-pass back, IGM,
anti-pass back error [Y] control relay, monitor point,
alarm [Y] monitor point, reader/doorl added to
event [Y] reader/door) file [Y]
logged off [Y] logged on [Y]
deleted from file [Y] modified file [Y]

1 of 1
ACCESS CONTROL
1-PrevMenu 2-Search
3-Prior 4-Next 1051:24 Onsite/64 startup on 02-26-90 10:51:24 LIEBERT
5-Entry 6-Diskette 001ite/64 Version 1.2
7-PRINT 8-Help 1 0 5 1 2 4 Copyright (c) 1987 - 1989 All rights reserved.
9-Menu Hlp 10-MAIN 1 0 5 1 : 2 5 Connected group 01 to COM2

Figure 13-2 TRANSACTION REPORT ACTIVITY SCREEN

User's Manual 13-6 Sievert Incite


DOOR SELECTION SCREEN
This screen will allow you to select up to three different
door locations. When the screen first appears, each of the
three door selections will display the first door that is entered
in the reader/door file.

02-26-90 11[36:47 Sievert Pr

TRANSACTION REPORT - DOOR SELECTION(S)


door name [FRONT DOOR
group number [01] reader number [01]
door name [BACK DOOR
group number [01] reader number (02)

door name group number 1 reader number [

1of 1
1-PrevMenu 2-Search ACCESS CONTROL
3-Prior 4-Next 1 0 51 [ 24 Incite/64 startup on 02-26-90
5-Entry 6-Diskette 1051[24 LIEBERT 090ite/64 Version 1.2
7-PRINT 8-Help 1051.24 Copyright (c) 1987 - 1989 All rightsreserved.
9-Menu Hlp 10-MAIN 1051[25 Connected group to COM2
01

Figure 13-3 TRANSACTION REPORT - DOOR SELECTION

You may change each selection individually by placing the


cursor on one of the "door name" fields and using the PRIOR
and NEXT keys to search for the desired door. You may
also search for a "door name" or "reader number" by typing
the correct information in the appropriate field and pressing
F2-Search. The system will automatically find the requested
door name and card reader number. You may repeat this
process for up to three separate doors. lf you want only one
selection, type spaces in the fields for the other two locations.
After you have completed all information, press F5-Entry to
bring up the next screen you requested a partial selection on.

User's Manual 13-7 Sievert Incite


MONITOR POINT SELECTION SCREEN
This screen will allow you to select up to two different
monitored points. When the screen first appears, each of the
two monitor point selections will display the first monitor point
that is entered in the monitor point file.
You may change each selection individually by placing the
cursor on one of the "monitor point name" fields and using
the PRIOR and NEXT keys to search for the desired monitor
point. You may also search for a "monitor point name", "IGM
number" or "point number" by typing the correct information in
the appropriate field and pressing F2-Search. The system
automatically finds the requested point name, IGM number,
and point number. You may repeat this process for the other
point. If you want only one selection, type spaces in the
other fields. After you have completed all information, press
F5-Entry to bring up the next screen you requested a partial
selection on.

User's Manual 13-8 Sievert Incite


02-26-90 1 1 :3 7 58 Sievert Pr

TRANSACTION REPORT - MONITOR POINT SELECTION(S)


monitor point name [UPS ROOM
group number [01]
IGM number [01]
monitor point number [1]
monitor point name [BATTERY ROOM
group number [01]
IGM number [01]
monitor point number [2]

1of 1
1-PrevMenu 2-Search ACCESS CONTROL
3-Prior 4-Next 105124 005ite/64 startupon 02-26-90
5-Entry 6-Diskette 105124 LIEBERT Incite/64Version 1.2
7-PRINT 8-Help 1 0 :5 1 24 Copyright (c) 1987- 1989 All rightsreserved.
9-Menu Hlp 10-MAIN 10:51:25 Connected group to COM2
01

Figure 13-4 TRANSACTION REPORT MONITOR POINT


SELECTION SCREEN

User's Manual 13-9 Sievert Incite


CONTROL RELAY SELECTION SCREEN
This screen will allow you to select two different control
relays. When the screen first appears, each of the two
control relay selections will display the first control relay that
is entered in the control relay file.
You may change each selection individually by placing the
cursor on one of the "control relay name" fields and using the
PRIOR and NEXT keys to search for the desired control
relay. You may also search for a "control relay name", "IGM
number" or relay "X" or "Y" by typing the correct information
in the appropriate field and pressing F2-Search. The system
will automatically find the requested control relay name IGM
number and relay designation. You may repeat this process
for the other relay. lf you want only one selection, type
spaces in the fields for the other relay.

02-26-90 11,39,08 Liebert Pr

TRANSACTION REPORT - CONTROL RELAY SELECTION(S)


control relay name (SECURITY
group number [01]
IGM number [01]
control relay [X]
control relay name [OUTSIDE LTGHTS

group number [01]


IGM number [01]
control relay [Y]

1 of 1
1-PrevMenu 2-Search ACCESS CONTROL
3-Prior 4-Next 10.51:24Incite/64 startup on 02-26-90
5-Entry 6-Diskette 10.51:24LIEBERT Incite/64 Version 1.2
7-PRINT 8-Help 10:51:24Copyright (c) 1987 - 1989 All rights reserved.
9-Menu Hlp 10-MAIN 10:51.25Connected group 01 to COM2

Figure 13-5 TRANSACTION REPORT CONTROL RELAY


SELECTION SCREEN

User's Manual 13-10 Sievert Incite


TRANSACTION REPORT OUTPUT
The transaction report output my be either to the printer or
the diskette "A" drive. lf the report is sent to diskette, is it
written to a file named "PRNTDLOG" (printed log) in ASCII
format.
To print the report to diskette, press F6-Diskette. To print
the report on the printer, press F7-PRINT then F8-Long rpt.
When formatting a transaction report, as explained on the
previous pages, it is important to keep in mind that the report
function uses "or" logic as opposed to "and" logic. For
example, if you select a single cardholder and the "granted
access" selection in the activities screen, the report will show
all activity for the cardholder you selected plus the "granted
access" transactions for all other cardholders during the time
period you selected. This logic applies to all items that can
be selected in the transaction report.
THE PRINTED REPORT
Information configured in the Transaction Report menu can
be sent to the printer for work copies and archive records.
Before pressing the "print" key, be sure the printer is
connected and supplied with paper.

User's Manual 13-11 Sievert Incite


The printer will form feed the first page and then print a
header page. The header confirms the information you
selected in the first menu/screen. ln the sample below, the
default condition of the T ransaction Report menu was
selected. This is indicated by the O's and 9'5 in the start and
stop fields, the asterisks in the name, card and location fields,
and the Y's for every activity.

TRANSACTION REPORT 08-22-89 14:45:27 PAGE 002

name activity location timedate


------- +
CLARK, HAL granted acceee FRONT TOOR 08:5289-08-22
CLARK, HAL PIN entry error FRONT DOOR 08:5289-08-22
CLARK, HAL PIN entry error FRONT DCOR 08:5389-08-22
CLARK, HAL granted access BACK W O R 08:5389-08-22

Figure 13-6 TRANSACTION REPORT

After the printer completes the header page, it will form


feed and start the report on a new page. There may be a
wait period from several seconds to several minutes before
any printing takes place. This is necessary while the system
searches the LOG file for the selected information.

User's Manual 13-12 Sievert Incite


name activity location time date
BRAKE WILLIE logged on 16:51 86-09-01
SELLMAN DAVE granted access front door 17:00 86-09-01
AYRE EUGENE wrong door employee door 17:01 86-09-01
FIXET WILLY granted access front door 17:30 86-09-01
BOSS IAN D granted access front door 07:00 86-09-02
GREEN SELMA granted access employee door 07:02 86-09-02

The following sample shows the header page that would


print if you had configured the Transaction Report menu for a
specific cardholder. in this case, an entry was made in the
start and stop fields for time and date, a specific cardholder
and card number, and an "N" for activities, locations, monitor
points, and control relays.

TRANSACTION REPORT 08-22-89 14:45:25 PAGE 101

start = 890822 0000 stop = 890822 9999

name = CLARK, HAL card number = 000001

ACTIVITIES

No activities

LOCATIONS

No locations

MONITOR POINTS

No monitor points

CONTROL RELAYS

No control relays

Figure 13-7 TRANSACTION REPORT HEADER PAGE

User's Manual 13-13 Sievert Incite


ASCII FILE
When the transaction report output is to diskette, it is
written to an ASCII file called "PRNTDLOG". The information
in this file is identical to what would be printed on the printer.
You can take this file to any computer capable of reading the
diskette to print ASCII files.

User's Manual 13-14 Sievert Incite


CHAPTER 14 SYSTEM STATUS

Introduction ................................................................. 14-1


Reader/Door status ................................................ 14-2
Monitor Point status (Model 45 IGM only) ............ 14-5
Control Relay status (Model 45 IGM only) ............ 14-7
IGM status ................................................................ 14-9

DIAGRAMS, DRAWINGS, TABLES


14-1 Reader/Door Status Screen ........................ 14-3
14-2 Monitor Point Status Report .................... 14-5
14-3 Control Relay Status Screen ..................... 14-8
14-4 IGM Status Screen ................................. 14-11
1
INTRODUCTION
During normal operation, the host processor continuously
polls the system IGMs for alarm and event transactions.
These transactions are then displayed in the scroll area on
the monitor, the printer, or written to the log file. ln addition
to the normal polling process, a menu is provided to allow
the operator to check the status of a specific item or location.
For example, whether a certain door is currently open or
closed.
The F8-ACC STAT key selects the "status" menu which
allows the following selections:
− Reader/door status
− Monitor point status
- Control relay status
− IGM status

From the main menu, select the F8-ACC STAT key to


bring up the status menu.

User's Manual 14-1 Sievert Incite


READER/DOOR STATUS [Fl-Rdr/Door]
This menu selects the reader/door status screen and will
display the first "door name" defined in the reader/door file
along with the appropriate reader and group number. The
following status information will be displayed:

mode -
"(Card only (no PIN number))" indicates that the reader is
set for the card only mode and does not require a PIN
entry after the card is swiped.

"Card and PIN number" indicates that the reader will


require a PIN entry after the card is swiped.

"Customer code no storage" indicates that the reader will


pass any card with the correct customer code without
regard to the time of day. Card transactions will not be
logged when in this mode.
"Customer code with storage" same as above only all card
transactions will be logged.

"No reader connected" indicates that the reader is defined


in the reader/door file but is not physically connected to
the IGM.
tamper switch -
"Closed" indicates that the reader is in its correct mounting
position.

“Open" indicates that the reader is removed from its


correct mounting position.

lock status -
"Locked" indicates that the door locking device controlled
by the IGM is in the locked position.

"Unlocked" indicates that the door locking device controlled


by the IGM is in the unlocked position.
door status -
"Closed" indicates that the door controlled by the reader is
closed.

User's Manual 14-2 Sievert Incite


"Open" indicates that the door controlled by the reader is
open.
***NOTE***
in order for the system to recognize the correct door
status (i.e. open or closed), door contacts must be used.

02-26-90 11,40.54 Liebert

READER/DOOR STATUS
door name [FRONT DOOR
group number [01]
reader number [01]
mode Card only (no PIN number)
tamper switch status Closed
lock status Unlocked
door status Closed

1of 2
1-PrevMenu 2-Get Stat ACCESS CONTROL
3-Prior 4-Next 1 0 5 1 , 2 4 005ite/64 startup on 02-26-90
5- 6- 1 0 5 1 2 4 LIEBERT 005ite/64 Version 1.2
7-PRINT 8-Help 10:51,24 Copyright (c) 1987 - 1989 All rightsreserved.
9-Search 10-MAIN 1 0 5 1 2 5 Connected group 01 to COM2

Figure 14-1 READER/DOOR STATUS SCREEN

When you press the F1-Rdr/door key, the reader/door


status screen will appear with the first door name and Card
Reader number that is listed in the READER/DOOR FILE.
Use the <F3> and <F4> keys or the search function to select
the desired reader/door location.

User's Manual 14-3 Sievert Incite


When the desired door name and Card Reader number
appear on the screen, the status of that location will
automatically appear. If the status of the location should
change, the status information WILL NOT be automatically
updated. Instead, press the F2-Get Stat key to update to the
current status. If the door you select is on a remote dial-up
group, you must first press the F2-Get Stat key which will
initiate the dial sequence and obtain the status for that
location.
***NOTE***
If the status message "Unknown response" appears, it
indicates a communication problem between the IGM and
host processor. Communications problems should always be
corrected as soon as possible.

User's Manual 14-4 Sievert Incite


MONITOR POINT STATUS [F2-MonPoint]
(Model 45 IGM only)
This menu selects the monitor point status screen and will
display the "monitor point name" and the "opening point
message" or "closing point message" you defined in the
monitor point file.

02-26-90 11:42:06 Sievert Pr

MONITOR POINT STATUS


monitor point name (UPS ROOM DOOR
group number [01]
IGM number[01]
first monitor pointPOINT 1 POINTCLOSED
second monitor pointPOINT 2 POINTCLOSED
third monitor pointPOINT 3 POINTCLOSED
fourth monitor pointPOINT 4 POINTCLOSED
fifth monitor pointPOINT 5 POINTOPEN
sixth monitor pointPOINT 6 POINTOPEN
seventh monitor pointPOINT 7 POINTOPEN
eighth monitor pointPOINT 8 POINTOPEN
1of 8
1-PrevMenu 2-Get Stat ACCESS CONTROL
3-Prior 4-Next 10:51:24 Incite/64 startup on 02-26-90
5- 6- 10:51:24 LIEBERT Incite/64 Version 1.2
7-PRINT S-Help 10:51:24 Copyright (c) 1987 - 1989 All rightsreserved.
9-Search 10-MAIN 10:51:25 Connected group 01 to COM2

Figure 14-2 MONITOR POINT STATUS REPORT

User's Manual 14-5 Sievert Incite


When you press the F2-MonPoint key, the monitor point
status screen will appear with the first monitor point that is
listed in the monitor point file along with the appropriate IGM
and group number. Use the <F3> and <F4> keys or the
search function to select the desired monitor point name or
location.
When the desired monitor point name and/or location
appears on the screen, the status of all monitor points
defined on that particular IGM will appear. If the status of
the monitor point should change, the status information WILL
NOT be automatically updated. Instead, press the F2-Get
Stat key to update to the current status. lf the monitor point
you select is on a remote dial-up group, you must first press
the F2-Get Stat key which will initiate the dial sequence and
obtain the status for that monitor point.
"NOT E***
If the status message "Unknown response" appears, it
indicates a communication problem between the IGM and
host processor. Communications problems should always be
corrected as soon as possible.

User's Manual 14-6 Sievert Incite


CONTROL RELAY STATUS [F3-CtIRelay]
(Model 45 IGM only)
This menu selects the control relay status screen and will
display the "control relay name" and the "on message" or "off
message" you defined in the control relay file.
When you press the F3-CtIRelay key, the control relay
status screen will appear with the first control relay that is
listed in the control relay file along with the appropriate IGM
and group number. Use the <F3> and <F4> keys or the
search function to select the desired control relay name or
location.
W hen the desired control relay name and/or location
appears on the screen, the status of both the "X" and "Y"
relays defined on that particular IGM will appear. If the
status of the c ontrol r elay s hould change, the status
information W ILL NOT be automatically updated. Instead,
press the F2-Get Stat key to update to the current status. lf
the control relay you select is on a remote dial-up group, you
must first press the F2-Get Stat key which will initiate the dial
sequence and obtain the status for that control relay.

User's Manual 14-7 Sievert Incite


***NOTE***
If the status message "Unknown response" appears, it
indicates a communication problem between the IGM and
host processor. Communications problems should always be
corrected as soon as possible.

02-26-90 114507 Sievert Pr

group number [01] IGM


number [01]
control relay X SECURITY NORMAL OFF
control relay Y OUTSIDE LIGHTS

1of 2
1-PrevMenu 2-Get Stat ACCESS CONTROL
3-Prior 4-Next 105124 005ite/64 startup on 02-26-90
5- 6- 1051:24 LIEBERT Incite/64 Version 1.2
7-PRINT 8-Help 10:5124 Copyright (c) 1967 - 1989 All rightsreserved.
9-search 10-MAIN 105125 Connected group 01 to COM2

Figure 14-3 CONTROL RELAY STATUS SCREEN

User's Manual 14-8 Sievert Incite


IGM STATUS [F4-IGM]
This menu selects the IGM status screen and will display
the first "door name" defined in the reader/door file along with
the appropriate IGM and group number. The following status
information will be displayed:

message pending -
"Global message received" indicates that the date and time
was downloaded to the IGM.

"Alarm Message Pending" indicates that the IGM has an


alarm message in its transaction buffer which has not yet
been uploaded to the host.

"Global and Alarm" indicates that both the above


conditions exist.

"Send Card File" indicates that the IGM does not have the
card file database.

"Send Time Code File" indicates that the IGM does not
have the time code file database.

"Send Holiday File" indicates that the IGM does not have
the holiday file database.

"Nothing to report" is displayed when none of the above


conditions are present.

buffer status -
"Empty" indicates that the IGM transaction buffer does not
have any alarms or events to report.

"< 75°/0 Full" indicates that the IGM transaction b uffer


contains one or more alarm or event transactions which
have not yet been uploaded to the host.
“>75°/0 Full" indicates that the number of transact ions in
the IGM buffer is greater than 75")/0 of the transaction
buffer capacity.

User's Manual 14-9 Sievert Incite


"Full" indicates that the IGM transaction buffer is full. At
this point newer transactions will overwrite the oldest
transaction within the buffer.

anti-pass back
status "Disabled" indicates that the IGM is not
s et f or t he a n ti - p as s b ac k m ode of
operation.

"Enabled" indicates that the IGM is set for


the anti-pass back mode of operation.

relay x The "relay name" and "on" or "off"


message is displayed as defined in the
control relay file. (Model 45 IGM only).

relay y The "relay name" and "on" or "off"


message is displayed as defined in the
control relay file. (Model 45 IGM only).
When you press the F4-Ignn key, the IGM status screen
will appear with the first "door name" defined in the
reader/door file along with the appropriate IGM and group
number. Use the <F3> and <F4> keys or the search function
to select the desired door name or IGM number.
When the desired door name and/or IGM number appears
on the screen, the status of that particular IGM will appear.
If the status of the IGM should change, the status information
W ILL NOT be automatically updated. Instead, press the
F2-Get Stat key to update to the current status. lf
the IGM you select is on a remote dial-up group, you must
first press the F2-Get Stat key which will initiate the dial
sequence and obtain the status for that IGM.
***NOTE***
If the status message "Unknown message" appears, it
indicates a communication problem between the IGM and
host processor. Communications problems should always be
corrected as soon as possible.

User's Manual 14-10 Sievert Incite


02-26-90 11[46[42 Sievert Pr

INFORMATION GATHERING MODULE (IGM) STATUS


door name [FRONT DOOR group number 101]
IGM number [01]
message pending Nothing to report
buffer status Empty
anti-pass back status Disabled
control relay X SECURITY NORMAL
control relay Y OUTSIDE LIGHTS OFF

ACCESS CONTROL 1of 2


1-PrevMenu 2-Get Stat
3-Prior 4-Next 10[51,24 051ite/64 startup on 02-26-90
5- 6- 10[51[24 LIEBERT 0051te/64 Version 1.2
7-PRINT B-Help 10[51[24 Copyright (c) 1987 - 1989 All rightsreserved.
9-Search 10-MAIN 10,51:25 Connected group to 00M2
01

Figure 14-4 IGM STATUS SCREEN

User's Manual 14-11 Sievert Incite


APPENDIX A ACCESS CONTROL
PLANNING FORMS
Reader/door file ............................................................. A-1
Time code file ................................................................ A-2
Holiday file ..................................................................... A-3
Access code file ............................................................ A-4
Card file ......................................................................... A-5
Card file (user-defined fields) ........................................ A-6
Monitor point file ............................................................ A-7
Alarm message file ........................................................ A-8
Control relay file ............................................................ A-9
Timed command file .................................................... A-10
If/Then Command file .................................................. A-11
APPENDIX A
ACCESS CONTROL PLANNING FORMS
READER/DOOR FILE

RE ADE R/DO O R F ILE

GRP RDR UNLCI,:: OPEN


NBR NBR TIME TIME
DOOR NAME

I 1 1 1 1 1 1 1 1 1 _ _ J _ _ _ L _ I I i 1 1

i I I l l i i i i i l l , J _ _ 1 _ 1 1 1 1

I 1 1 1 1 , _ L _ L _ L I I I I I I i i

I I l L I l I I l i L I I I J _ _ L I I I I I
I 1 1 I I I 1 1 1__L_I
1__
I _ 1 __L_L__I
I I J___1_ L1_,1 I I
1_L__1_L_ 1 1 1
i I i 1 I I I
1 L_J_ t_ J L , 1 1 I
_L
1 1.1_ J. 1 1 J__LL
I 1 1 I I
_L_J_ _LJ_ 

1_1. 1 1 1 1 L__1_1_
1 J___1 L_ L J__
.1_ _L__L
I 1 _1LL__L L _ _ 1
_L _L _L _ L 1 1 1J1_ 1 I 1
1 L J__ L_ J 1_1L
I i
_Ll _L__I _1, _1 -L I 1
i i 1 I. 1_ 1__1_L_L L__1
I L 1 JL_L I -.1-
LJ LL_I_1__ t_L 1.__1
1._ 1_ J L__ _J.
_ L_L _L
I 1_ J_ I 1 J 1___I_L 1 I 1
1
I _L _I _L __1 __I__ _t
I i  1 J. 1_ 1___L J_
L i ____I L_
_l_ _ _ _ L _ _ 1 _ _ _ L _ 1_ L__l L
_
1._ 1 JL_J JL__J___I 1 L_
I I L _L. 1...__L. L J ._L___
1 1 1 L__L I 1 L 1 1_ t J _L___
_J _l__J _.1
1 __1_ I
1 1 I_J__JL J_ 1 1 I
I I. I I
_J _1 _L _1 _L _L_L
1 1 J J_ _L _L_1 L _L 1L _1_1 .___I_
i I 1 1 _1_ 1 _
TIME CODE FILE

TIME CODE FILE

START STOP TIME


TIME
TIME CODE NAME ACTIVE DAYS

1111111 1111111 :
MON TUE WED THU FRI SAT SUN HOL

1 I I I
:

1111111 :
MON TUE WED THU FRI SAT SUN HOL
:
1 1 1 1 1 1 1 1 I I I

1111111 :
MON TUE WED THU FRI SAT SUN HOL
:
I I I I I I 1 1 I I I
MON TUE WED THU FRI SAT SUN HOL

1 1 1 1 1 1 1111111 :
1 I I I
t

IIIIII1 :
MON TUE WED THU FRI SAT SUN HOL
_ _ _ 1 _ 1 1
1 1 1 1

11111 1111111
MON TUE WED THU FRI SAT SUN HOL

MON TUE WED THU FRI SAT SUN HOL


.
1 I 1
:

1 I I 1111111 :
1 I I
:

s I I
1111111 :
MON TUE WED THU FRI SAT SUN HOL

1 1
:

ILI1111
MON TUE WED THU FRI SAT SUN HOL
,
1 s1 1 1 1

1111111 :
MON TUE WED THU FRI SAT SUN HOL

1 1 1 1 :

IIIIL11 :
MON TUE WED THU FRI SAT SUN HOL
:

s I I 1__I 11
MON TUE WED THU FRI SAT SUN HOL
l 1 1 1 1 1 1 1 1 1 1 I I I I

MON TUE WED THU FRI SAT SUN HOL


I
_
1 I
J 1_ 11111_11MON TUE WED THU FRI snT SUN HOL
L J
I
_ J
1 __ _
_ L

111111L 1
:
_ I J _ _ _ _ 1 _

Lill_LL :
_ L 1
MBH T11 WKB *1111 l'..hf Shi 111 WHL
:
I
J _ L _ _ 1 1 1 1 1 1 I I I
1 1
HOLIDAY FILE

HOLIDAY FILE

MONTH DAY HOLIDAY NAME

I 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

I I I 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1
I 1  1 1 1 1 . . L . _ _ _

1 I i 1 1 1 1 1 J I i : s s

1 1 I I I I I I I I I I

I i , 1 I I I I 1 1 I I I

I s 1 s s I I I I I I I

I , 1 1 1 1 I I I 1 1 I I I

1 1 , 1 1 1 1 1 I I I I _ I _ L I I I

I I I illill u A
1 _L_ _l _1_

I 1 1 u I _ J _ I I I I J
_ I . 1
I u 1 1 1

I 1 1 1 1 1 1 I I I _ L _ I I 1 I I I
1 1 I u 1 1 I 1 I 1
1
1 _ L L _ _ _ L _
i _ J . _ _ . I .
I 1 L_ L 1 1 I I 1 _ _ _ 1 . L _
J__ , L____1

1 I 1 L
, . _ _ L _ _ _ 1 _ _ L _ _ I . _l_
_ L I I I
s _L___1 s , . _ _ J _ _ L _ _ _ L _ L_ 1_
L_ J_ _L___L___L _L L I L

Month abbreviationss
J A N F EE M A R A PR M A Y JU N JU L A U G S EP O CI NO V D EC
0 1 0 2 0 2 0 4 0 5 0 0 0 7 1 8 0 9 1 0 1 1 1 2
ACCESS CODE FILE

ACCESS CODE FILE

TIME CODE NAME

1 1 1 1 1 1 1 II

I I
_ _ _ _ _ _ 1 1 1 1 I I

I I I

1 1 1 1 1 1

l l 1 l l l i i i i i i i i i

1 1 1 1 1 1 1 1 1 1

J_ L 1 1 LI 1
CARD FILE

C A RD FILE

CARD NUMBER NAME ACCESS CODE NAME

1 1 1 111111111111 1 1111111

1 1 1 1 1 1 1 1 1 1111111111
1 1 1 1 1111111111

1 1 1 1 1 1 1 1 1 1 111

1 1 11 1 1 1 1 1 1 1 1 1 111
1 1 11
1 1 1 1 1 1 1 1 1 1 111
1 1 1 1 1 1 1 1
_ J J _ I l l i
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 111

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1 1 1 1 111 1 1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1 1 1 1 1 11.1 1 1 1 1 1 1 1 1 1

I I I I I 1 I I I I I 1 1 1 111 I 1 I

1 1

1
1 1
1 1 1 1 1 1

1 1 1 1 1 1 1 / 1 1 1 1 1 1 111 1 1 111111

1 1
1 1 11 1
1 1 1 1_3_____________
________________________________
___________________________________ _L._J_

1 1 1 1 1 1 1 1 1 1 1 1 1 1111111 1 1
111111
• 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1
1 1 1.3. 1 1 1
1 1 1 1 1 _ 1 1 1 l L _ _ 1 1 I
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
i i i 1 1 1 1
J_L 11
1 1 1 1 1 1 1 1 1 1
I  1 1 1 1 1 1 J A A _
I
CARD FILE
(user-defined fields)

CARD FILE
(user-defined flelds)

F' IN 2nd F IELD —I 4th


13rd FIELD FIELD
#

I 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

1 1 1 I 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 . _ L J _ 1 1 1 1 _ 1 _
_ L _ 1 1 1
I I I I 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
I I I I _ L - 1 . - - 1 -
I I I I 1 1 1 1 1 1 U I I 1 1 . _ 1 1 1 1 1 1 1

I I I I 1 1 1 1 1 1 I I 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 _ 1 1 I _ L L -
1 1 1 l _ j _ _ - . 1 - 1 1 1 L - -

I I I I 1 1 1 1 1 1 I I 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
I I _ I _ J - 1 - - -
I I I I 1 1 1 1 1 1 1 1 1 L _ I I I . L _ L _ 1 1 1 1 1

I I I I 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 I I I I I
1
I I I l i l l i l i l i l I I I J__L-L- 1- 1 I
-1.-1J- _J
. _L__I_J_
I I I 1 1 1 1 1 1 1 1 1 _ 1 _ 1 1 . 1 1 1 1 _ _ 1 _ 1 1 1 1 _ L l l I l
1 I i I
I I I I U I I I 1 1 ,1 L  I L I I 1 1 _L__
i I
_L__L _1 _I
I I I I I I I I I I _ _ 1
i J . I t i l I i I I I I . J _ I - - , , J I I

I I I 1 1 1 1 1 1 1 1 1 1 1 1 1 , J _ 1 _ _ _ _ _ I _ _ 1 1 1 _ 1 1 1 _
_ 1 1 1 1 1
J_-..1__L
I I I 1 1 1 1 1 1 I _ J I I _ _ J__J__L_J_-L_ 1 1_J___I 1
.1.-_L-1

I I I I I I 1 1 1 1 1 1 1 1 I I I I I _ L : I I I I _L_IlIJ___
J L- , , I
--L I I
1 I I
_l1.I
i t I , 1. L
_l_l _L__L _L_
_L _L _L_
I I , _ l _ _ L _ _ L I I I i l L i i l i l i i i i i i i _ i 1 1 1 1 1
I J 1 J__ J_ LL-J
I _ L L _ L _ _ . 11 J . - -L J J J _ _ 1 _1 L _ J _ 1 _ . 1 _ 1 _ _ J . I 1
_L

1_11J I I I I I I I I I I I I I I I I i i i I _ _ j _
1 1_ 1 J J__ 1 J--1 1
L__
_
I L L _L 1
L_ I
_ _L
1
..1_
J 1 1 1 __
.1_1 .1_ _L
I I I_ L _l_L_I. , _l__I __L__L 4- _L I I I
I I I 1__I_1_ I J___L I I I J__1

A-6
MONITOR POINT FILE

MONIT. POINT FILE

G R O U P I G M P T * POINT NAME
1 1 1 1 1 1 1 1 1 1 . 1 1 1 1 1 1 1

OPENING POINT MESSAGE


1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
CLOSING POINT MESSAGE
1 1 1 1 1 1 l l l l l 1 /
LARM, (0)pen/(C l o s e d / M o t h / ( N ) o n e L ALARM MESSAGE NUMBER,

Trace To,

GPOIIP PTa POINT NAME


1 1 1 1 1 1 1 1 1 1 1 1

OPENING POINT MESSAGE


1 1 1

CLOSING POINT MESSAGE


iiiitt ][11.111
AL RM, (0)pen/ICIlosed/(1)oGh/(N)one:L] ALARM MESSAGE NUMBER,

Trace To:

GROUP IGM PTIF POINT NAME

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

OPENING PO/NT MESSAGE

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
CLOSING POINT MESSAGE
1 1 1 1 1 1 1 1111
11

LARM, (0)pen/(Cliosed/(WoCh/INIone, AI.APII MESSAGE NUMBER,

Trace To,
ALARM MESSAGE FILE

ALARM MESSAGE FILE

MSG ALARM MESSAGE LINK


NBR TO

1 1 1 1 1 1 1 1 1 1 . 1 1 1 1 1 1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1 1 1 1 1 t 1 1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1 1 1 1 t 1 1 1 1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1 1 1 1 / 1 1 1 1 1 1 1 1 1 1 I

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 /
1 1 1 1 1  1 1 1 1 1 1 1 1 1 1 1 1 1 / 1 1
1 1

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 / 1 ,

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

I
II t l l I l
1

t 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1 1 1 1 1  1 1 1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

I 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 / 1 1 1

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 t

, 1 1 1 1 1 1 1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

I 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
CONTROL RELAY FILE

GONTROL RELAY FILE

GRP O RELAY RELAY NAME

QN MESSAGE

OFF MESSAGE

PULSE ME5500E TIME


1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

GRP # IGM RELAY RELAY NAME

ON MESSAGE
, 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
OFF MESSAGE
1 1 1 1 1 1 1 1 . 1 1 1 1 1 1 1
PULSE MESSAGE TIME

________________ _ L 1 1 1 . L _ _ L _ _ L _

GRP GM RELAY RELAY NAME


1 1 1 1 1 1 1 1 1
ON ME5900E
I I I 1 1 1 1 1

OFF MESSAGE
1 1 1 1 1 1 1 111
PULSE MESSAGE TIME
TIMED COMMAND FILE

TIMED COMMAND FILE"

TIME GRP IGM


CODE NAME RDR START COMMAND STOP COMMAND

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

I I 1 1 1 1 1 I I I I
1 1 1 1 1 1 1

1 1 I I 1 1 1 , 1 1 1

I I I I 1 1 1 , I I
1 1 1 1

1 1 1 1 1 1 I I I I

1 1 l J I 1 1 1 1 1 1 1 1 1 1 I I

1 1 1 1 1 1 1 1 1 I I I I I

1 1 I i 1 I I I

1 1 1 1 1 1 1 1 1 1 1

1 1 1 1 1 1 1 1 1 1
1
1 _
1 1 J J J L 1 1 1 1
I 1 1 1 1 1
1
1 _ 1 1 1 1 1 1
1 _ L _I 1

1 1 1 J l 1 1 1 1 1 . L L L U 1 1 1
I I I 1 1 _ _ _ 1
1 1 1 1 1 1 1 _ _ L 1 1 1 1 1

A-10
IF/THEN COMMAND FILE

IF/THEN COMMAND FILE

IF THEN
GRP IGM SENDS GRF IGM RECIEVES THIS DURING
NBR NBR MSG NBR NBR COMMAND TIME CODE NAME

IIIIIIIIII 1111 L1__ 11 _ _ L _ L1 1 _ lJ__l __ L_ 1 _


I i 1 II 1111111
III II I l I
IIIIIIIIII IIIIIIII 1111111
1111111111
I1 1 1 1 1 1 1 1 11
1_, . L S
1_1_ 1 I I
1 11 1 I I I I I _ L
1 I
i

1111111111 _L
1 II
III INNI
III I I I 1 1 1 1 1 11

II III L_ I
J_
I I 1
J___I. J
_ L _ I _ _ L _ L _1

111 11 1111111
_L_J___L I
11111.J1_11 1 i 1 1 1 1 ]
11 . 1 1 _ . L _IL 1 L I1. 1I_
L L _L
J 1J __ 1J __
_L
1 _L


_L__L
I I
11 J__J__L _ L . L _I1 _I
I
I
J_J__L__1_1
1._L_ I I I
I J_
I L__L__L_
11 11 I - 1 - 1 1 - - 1 L . . . 1 - 1 1 _ ,_
L L_L , L
_t,_
I 1 1 1 1 1 1 1

I 1 1. L _ I. 1 L _1L I__L .I_J_ 1__L L 1 _ _ 1 1 _ _


111
1 _L_ .1-1-..11111 I I J I I I I
J 1.....1._ J__L__L
.1._..1. 1__ 1

A-11
APPENDIX B TRANSACTION REPORTS and
FILE STRUCTURES
Transaction report ........................................................................... B-1
Reader/door file .............................................................. B-2
Time code file ................................................................. B-3
Holiday file B-4
Access code file ............................................................. B-5
Card file B-6
Monitor point file ............................................................. B-7
Alarm message file ......................................................... B-8
Control relay file ............................................................. B-9
Timed command file ..................................................................................... B-10
If/then command file ........................................................................................... B-11
i
APPENDIX B
TRANSACTION REPORTS and FILE STRUCTURES
TRANSACTION REPORT

TRANSACTION REPORT 08:01:20 PAGE 002

name act i vi ty 08-23-89 locatIon timedate

CLARK, HAL granted access FRONT DOOR 07:4089-08-22


PAULUá, KURT PIN entry er,or FRONT DOOR 07:4489-08-22
PAULUS, 11JRT granted access BACK DOOR 07:4489-08-22
SHUMAKER, MATT granted access BACK DOOR 07:5989-08-22
DIFAOLO, RICK granted access BACK DOOR 07:5989-08-22
MILLER, JEFF granted access BACK DOOR 07,5989-08-22
KRISTAN, KEN granted access BACK DOOR 08:1089-08-22
MOYNIHAN, TIM granted access BACK DOOR 08:1589-08-22
HARVEY, MIDGE granted access BACK DOOR 08:4589-08-22
THOMPSON, PAULA granted access BACK DOOR 08:4589-08-22
ORLICH, MIKE granted access BACK DOOR 09:1089-08-22
DOLLISON, DON PIN entry error COMPUTER ROOM 09:1089-08-22
DOLLISON, DON granted access COMPUTER ROOM 09:1089-08-22
point closed BATTERY ROOM 09:1189-08-22
DEECE, ERIC granted access COMPUTER ROOM 09:1189-08-22
SARK, STEVE granted access COMPUTER ROOM 09:1289-08-22
CLARK, HAL granted access COMPUTER ROOM 09:1389-08-22
CLARK, HAL logged on 09:4489-08-22
access code add MASTER 09:4589-08-22
access code add MASTER 09:4589-08-22
CLARK, HAL logged off 09:4689-08-22
CLARK, HAL granted access PRODUCTION 09:5289-08-22
HARVEY, MIDGE granted access PRODUCTION 10:0389-08-22
PAULUS, KURT granted access PRODUCTION 10:0989-08-22
ORLICH, MIKE granted access COMPUTER ROOM 10:1189-08-22
point opened HALON SYSTEM 10:4489-0e-22
ORLICH, MIKE granted access PRODUCTION 10:4589-08-22
THOMPSON, EAULA granted access PRODUCTION 11:5389-08-22
PAULUS, KURT granted access BACK DOOR 11:5389-08-22
door open too lung BACK DOOR 11:5489-08-22
pcint opened GENERATOR 12:2389-08-22
KRISTAN, KEN granted access COMPUTER ROOM 13:0189-08-22
MOYNIHAN, TIM granted access PRODUCTION 13:4489-08-22
FAULUS, KURT granted access COMPUTER ROOM 13:5389-08-22
MILLER, JEFF granted access BACK DOOR 13:5589-09-22
ORLICH, MIKE granted access COMPUTER ROOM 14:0489-08-22
DOLLISON, DON granted access COMPUTER ROOM 14:1889-08-22
ORLICH, MIKE granted access BACK DOOR 14:3489-08-22
READER/DOOR FILE

READER/DOOR ElLE

d t
o
o in d t
 e u i
o
g n r n u r e
 e n
o o a m l o
n b d b o p
p e e e u e
door name r r r k. n
+ + +
FRONT DOOR 0101 05 10
BACK DOOR 0102 05 10
COMPUTER ROOM 0103 05 10
RHONE ROOM 010 4 0 5 07
PRODUCTTON 0101 05 10
TIME CODE FILE

TIME CODE FILE

t n
i u e t s
mm t d h a h
e b m u n u f t s o
e p e e r r u u l s t
c r n s s s i r n i t i s t
o d d d d d d d d a m t i
d a a a a a a a a r e om
time code namee y y y > y y y y t
P e

ALWAYS 01 YYYYYYYY0001
2400

NON WORK 04Y Y Y Y Y 1700 2400


Y Y YY 0001 0750
Y Y Y0001 2400

NORMAL 02Y Y Y Y Y 0750 1700

SHIFT 2 0 3 Y Y Y Y Y 1700 2400


HOLIDAY FILE
HOLIDAY FILE
hd
a
1 t
i e

hmliday name
0101 NEW YEAR'S DAY
0413 GOOD FRIDAY
0 5 7 . 0 MEMORIAL DAY
0704 INDEPENDENCE DAY
0903 LADOR DAY
1122 THANKSGIVING
1123 THANKSGIVING
1224 CHRISTMAS EVE
1225 CHRISTMAS DAY
1231 NEW YEAR'S EVE
ACCESS CODE FILE

ACCESS CODE FILE

a c c e s s code name door name time co de n ame

MASTER BACK DOOR ALWAYS


MASTER COMPUTER ROOM ALWAYS
MASTER FRONT DOOR ALMAYS
MASTER PHONE ROOM ALWAYS
MASTER PRODUCTION ALWAYS
MIS DEPT BACK DOOR ALWAYS
MIS DEPT COMPCTER ROOM ALWAYS
MIS DEPT FRONT DOOR NORMAL
MIS DEPT PHONE ROOM ALWAYS
OFFICE BACK DOOR NORMAL
OFFICE FRON1 DOOR NORMAL
OFFICE PRODUCTION NORMAL
PLANT 1 BACK: DOOR NORMAL
PLANT 1 PRODUCTION NORMAL
PLANT 2 BACK DOOR SHIFT 2
FtANT 2 PRODUCTION SHIFT 2
CARD FILE

CARD FILE

PH
ON
card access CARD SERIAL# E
number name code name PINDEPARTMENT t r a c e to status
+ --------------------------- + + + -------- -----------
+ + --------------------------- e +
000001 CLARK, HAL MASTER 1011MANASERS 001541 2105
SF A
000002 ORLICH, MIKE MASTER 1012MANAGERS 001542 2128
SF A
000003 FAULUS, KURT MASTER 1013MANAGERS
001543 SF 2108 n
000004 KRISTAN, KEN OFFICE 1014SALES 001561 2113
SF A
000005 MOYNIHAN, TIM OFFICE 1015SALES 001562 2114
SF A
000006 THOMPSON, PAULA OFFICE 1016SALES 001563 2115
SF A
000007 HARVEY, MIDGE OFFICE 1017SALES 001567 2116
SF A
000008 SHUMAKER, MATT FtANT 1 1018PRODUCTION 001570 4149
SF A
000009 MILLER, JEFF PLAN1 1 1019PRODUCTION 001571 SF 4149 n
000010 DIPAOLO, RICK PLANT 1 1020 PRODUCTION 001572 4150
SF A
000011 SHEEHAN, PAUL PLANT 2 1021PRODUCTION 001573 4148
SF A
000012 McEVOY, jOHN pLnNT 2 1022PRODUCTION 001574 4150
SF' A
000013 DOLLTSON, DON MIS DEPT 1023D.P. 001575 5455
SF A
000014 SARK, STEVE MIS DEPT 1024D.P. 001576 5456
SF A
000015 DEECE, ERIC MIS DEPT 001577 5458
SF A ~0/
MONITOR POINT FILE

M O NI TO R PO I NT FI LE

a c 1
o
a n a m n
g n I n o n r d l e u
 u G u o m m i a s m t t
o m M m i m t r s b r o
ub b n b i m a e a
p e e t e o p e n i n g p o i n t me s s age o g r c
r r p oI nt n ame c l o s i n g p o i n t me ss age n e e
+ +- ---------- +
01 0 1 1 UPS ROOM DOO R OPEN 0 01 SFF'
DOO R CLOS ED
01 01 2 MO TIO N D ETECTO R A LA RM D 02 SFP
NO RMA L
Od 01 3 COM PU TER RO OM DRY C 03 SFP
WA TER D ETECTED
01 0 1 . 4 I NTRU SIO N S YS TEM A LA RM C SFP
NO RMA L
SFP
01 0 1 . 5 HA LO N S YS TEM A LA RM C
NO RMA L
SFP
01 0 1 6 COM PU TER Ro o m HIG hl TEM P A LA RM 0
TEM F' NO RMA L SFP
01 0 1 7 BA TTERY RO OM DOO R OPEN 0
DOO R CLOS ED qFP
01 0 1 8 G ENERA TO R O N LINE N
OFF
ALARM MESSAGE FILE

ALARM MESSAGE FILE


mn I mn
e ue u
s m nsm
s b ksb
ae ae
t g r
e alarm message o e
+ + -------------------------------------------------------------------------------------------- -+
01 CH ECK FOR UNA U THO RIZED ENTRY AT U PS ROOM DOO R.
0 2 I N T R U S I O N A L E R T I N D A S EM E N T A R EA !

• WATER UNDER FLOOR! FEEASE INVESTIGATE. 04

0 4 IF N EC ES SA RY , C ALL S ERVI C E A T 8 4 1 - ,5 3 27
CONTROL RELAY F1LE

CONTROL RELAY FILE

g n I n
r u G u r pt
omMme 11 1
ub b 1 on message 1 m
p e e a uff message ee
r r yrelay name pulse message
+ +- -+ + -------------- +- -----------------------------
01 01 XSECURITY NOTIFIED 03
NORMAL
ALARM TEST
01 01 YWATER ALARM BELL ON 03
BELL OFF
BELL TEST
TIMED COMMAND FILE
TIMED COMMAND FILE
In
G u 1 so
Mm 6cp
/ b Mhe
gnre er
 e da
• friU t

u bd 11
pee start command e0
rr reader name stop uummand time code name dn
+ + - ----------------------
01 01 EP12 ------------------------------ NON WORE
enable point

disable point
01 01 FRONT DOOR UD NOR AL
unlock door
LD
lock. door
01 05 PRODUCTION CM NORMAL
card only mode
CF'
card and PIN mode

B-10
IF/THEN COMMAND FILE

IF/THEN COMMAND FILE

I n
F
m
Tb
He
In Er
F o N
/ m
T b I
H eG
E rM
N /
g e
o d
u e IF reader name s e n d p t h i s me s s a g e
p r- THEN reader- name r e c i e v e s t h i s command d u r i n g time code name
+ + + ----------------------------------------
01 01 FRONT DOOR DF NON WORK
door forced op,n
01 01 XN
X relay on
01 01 POZ ALWAYS
point opened
YN
Y relay on
01 02 BAC DOOR DF NON WORK
door forced open
01 01 XN
X re/ay on

B-11
APPENDIX C MENU OVERVIEW
and STRUCTURE
Main selection menu ..................................................................... C-1
Alarm menu .................................................................... 0-2
Control menu .................................................................. C-2
History menu .................................................................. C-2
Data base menu ............................................................. C-3
Status menu ................................................................... C-3
APPENDIX C
MENU OVERVIEW and STRUCTURE

MAIN SELECTION MENU

EF-CONTROL
FI-ALARM F3-

HISTORY F5-

DEASE F7- E6-


F8-ACC STAT
PRINT F9-

MENU HLP
ALARM MENU

F 1 -ALARM

F 1 - SILENCE F3-AKNOWLEDGE
ALARM ALARM

CONTROL MENU

F2 -CONTROL

F4-PRINTER F5- SET F6-COMMANDS


TOGGLE T IME

F 1 -READER/ F2-MONITOR
F2 F3-CONTROL F4-ANT I - F 4 - LOAD F6- LOGOFF
DOOR POINT RE LAY PASSBACK IGM
COMMANDS COMMANDS COMMANDS COMMANDS

H I STORY MENU

F3-HI STORY

F6-TRANSACT I ON
REPORT S
DATABASE MENU

F5
DATABASE

Fl-OPERATING F2
F2-MONITOR F4-OPERATOR F6 -LOGOFF
F3 -PAREMETERS
FILES AND PERMISIONS
CONTROL

Fl-CUSTOMER F2-ALARM F3-TITLES F 4 - 1 / 0 PORT


CODE DEF. USER DEF. FILE
FILE FILE FIELDS

Fl-MONITOR
Fl F2-ALARM F3-CONTROL F4-TIMMED F5-IF/THEN
POINT MESSAGE RELAY COMMAND COMMAND
FILE FILE FILE FILE FILE

Fl-READER F2--TIME F3-HOLIDAY F4-ACCESS F5-CARD


/DOOR CODE FILE CODE FILE
FILE FILE FILE

STATUS MENU

F8-ACCESS
STATUS

Fl-READER
READER F2-MONITOR F3-CONTROL F4-IGM
/DOOR POINT RELAY STATUS
STATUS STATUS STATUS
APPENDIX D GLOSSARY OF TERMS
ACA
An abbreviation for Asynchronous Communications Adapter.
The ACA is configured as one of the 1/0 ports on the host
processor and is used to communicate with the local hard
wired group of IGMs by converting RS232 signals to current
loop protocol.
access
The process of entering a secured area through a door which
is controlled by a card reader.

access authorizations
Permission granted to a cardholder to enter a location based
on a programmed time schedule.

address
A unique designation for the identity of an IGM or reader.
An IGM will respond only to messages, containing its own
address, sent from the host processor.

alarm
A transaction in the Access Control system that has been
designated by the user as an "alarm." Alarms cause an
audible signal at the host processor.
Alarm Bypass Relay
A relay in the IGM that is used to shunt or bypass the door
alarm contacts of an existing alarm s ystem to allow
authorized access without causing an alarm.

Alarm Relay
A relay in the IGM which energizes for 3 seconds in
response to any reader or door related alarm transaction.
The alarm relay may, in turn, be used to annunciate the
alarm to another location.
anti-pass back
A mode of operation where the two readers connected to an
IGM are used as "In" and "Out" readers. Once a card is
used at the "In" card reader, that card will be denied access
at the "In" reader until it is used at the "Out" reader. This
prevents an individual who has entered at an "In" Card
Reader from passing back" his other card to another person
for unauthorized access. Anti-pass back is best used where
entry to the secured area is possible through only one door.

D-1
archive
An ongoing collection of transaction data stored on floppy
diskettes.

buffer
A portion of RAM within the IGM which is dedicated to
storing transactions when the IGM is not being polled by the
host processor.

cardholder
An individual who has been issued an access control card.

COM
The designation given to the communications port of a
computer or asynchronous communications adapter.
Computers using DOS typically can communicate with COM 1
or COM 2.

command
A message sent by the host processor which initiates a
specific action at a reader or IGM. Commands may be either
manual or automatic.

communication
The process of transferring data between the host processor
and IGMs.

control relay
An extra relay output contained in a Model 45 IGM which
may control an external device on a timed or if/then basis.
The Model 45 IGM has two control relays designated as "X"
and "Y."
Current Loop
A type of serial communication in which the presence or
absence of an electrical signal indicates the state of the bit
being transmitted. The Liebert Access Control system uses a
20 milliamp current loop for communication with the IGMs
and Card Readers.

cursor
The movable pointer on the host processor's display screen
which identifies where the next character entered on the
keyboard will be typed.

D-2
customer code
A six-digit number encoded on the access control card. The
customer code is common to all cards used within a facility
or system.
database
A collection of data used by the host processor and IGMs to
limit access to secured doors and to control input, output and
reporting functions.

database maintenance
The task of expanding, updating and otherwise keeping the
database information intact.

de-energized
Refers to the state of an electrical device when power is not
applied; usually a relay.

default
An assumption made by the system when no specific choice
is given by the program or the user.

dial-up loop
A group or string of remote IGMs connected on the same
communications line which connects to the host processor via
dial-up modem over the standard telephone network.

directory
An organized grouping of related files on a hard or floppy
disk.

DIP switch
A switch which may be opened or closed and is used to
program an IGM to perform in a certain way.

diskette
A floppy disk. A low cost bulk storage medium for mini and
microcomputers. See floppy disk.
distributed database
A technique by which the system database is downloaded
from the host processor and stored at the IGM level. This
technique allows the IGM to continue to function when the
host processor is not online.

D-3
door contact
A normally closed magnetic or mechanical switch mounted to
a door which signals the IGM as to the open or closed status
of the door.

door open time


The time allowed for a secured door to remain open after a
valid entry. If the door remains open after this time, the
system records a "door open too long" transaction which may
be defined as an alarm.

door strike
An electromechanical device used to lock and unlock a door
under electrical control.

DOS
An abbreviation for "Disk Operating System" and is a series
of programs which are used to keep track of files, save and
retrieve files, allocate disk storage space and manage other
control functions associated with disk storage.
download
The transfer of database information from the host processor
to the network IGMs.

dry contact
A contact that is isolated or not connected to any electrical
source.

DS/DD
Double Sided/Double Density. Refers to the recording density
and configuration of a floppy disk.

dual/quad density
Refers to the amount of information that can be recorded for
a given area in accordance with an accepted standard for
computer disk drives. For example, single, dual or quad
density.

enable
The process of turning on a device or function. An enable
monitor point command (EP), for example.

encoded
The result of transferring information in a coded form to a
medium, such as magnetic stripe.

D-4
energized
The state of a relay or door strike when power is applied.
event
Transactions reported by the Access Control system that
have been defined by the user as "non-alarm" conditions.

exit request
A contact closure which signals the IGM to unlock a door
without causing an alarm. Exit request is independent of a
normal card swipe.

field
A group of related characters treated as a unit; for example,
the name of a cardholder.

file
The orderly arrangement of related data or information. Files
may contain multiple records.

floppy disk
A disk which may be inserted and removed from the host
processor and is used to magnetically store data.

format
In a computer, format generally refers how the machine
arranges information on a disk. Also applies to a printout.

group
The collection of IGMs and readers on a single
communications line.

hard disk
The non-removable disk in the host processor where all
programs and database information are magnetically stored.

hard wired
The method of wiring a local group of IGMs directly to the
host processor without the use of a modem or telephone line.

holiday
Any scheduled non-work day observed by a company. Does
not necessarily have to conform to any national, state, or
regional observed holiday.

D-5
host processor
A personal computer used to program and download
database information to the network IGMs. The host
processor also polls the network and stores transaction data.
IBM PC-XT compatible
A personal computer not manufactured by IBM but by another
company designed to be functionally equivalent and operate
the same software as the IBM. Also called a clone.

IGM (Information Gathering Module)


A microprocessor based component used to control card
readers, locking devices and also, stores database information
and transaction data. Sometimes referred to as a node.
IGMs are available in two different models, Model 40 and
Model 45.
initialize
To establish an initial condition or set values. Typically the
term for the process of making a computer ready to operate
a particular software program or routine.

input
The introduction of data into a computer's internal storage
unit(s) from an external device; i.e., the data received from
an IGM is input data. Contrast with output.
1/0 port
Short for input/output port and is the connection on the host
processor through which data is routed to or from the
network IGMs.

Kb
Kilobyte, or one thousand bytes or characters of information.
Defines the measure of memory capacity; i.e., 64 Kb or 64
Kilobytes.

keypad card reader


A card reader with an integral keypad which is used to enter
a 4 digit PIN number after the card is swiped.
local
Refers to a group of IGMs and readers which are on a hard
wired communication loop to the host processor.

D-6
log
The collection of transaction data in a file on the host
processor's hard disk drive. Also, the process of writing
transaction data to the log file.
logoff
The act of terminating or ending a session with the host
processor by the user.

logon
The act of entering a name and password on the host
processor before viewing or changing the system database is
allowed.

loop
A communication path in which data being sent from the host
is transmitted on one set of wires and data being sent from
an IGM is transmitted on another set of wires. This, in
essence, forms a communications loop.
magnetically encoded
Coded information (usually digital) that has been recorded on
magnetic material. Information on the Access Control
magnetic stripe cards has been magnetically encoded.

magnetic stripe card


Refers to the type of card used on the Liebert access control
system where the access information has been encoded on a
magnetic strip bonded to the card.

Mb
Megabyte, or one million bytes or characters of information.
Defines the measure of memory capacity; i.e., 20 Mb or 20
M megabytes.

monitor point
A dry contact which is monitored by a Model 45 IGM.

MS-DOS
A disk operating system for microcomputers developed by
Microsoft Corporation. See DOS.
network
The total series of points connected by communications
channels. The IGMs and Card Readers of the Access
Control system constitute a network.

D-7
on-line
Des c r i b es eq u i pm ent , de v ic es a nd per s o ns i n d ir ec t
communication with the central processing unit of a computer.
Condition of computer peripheral equipment that is physically
connected to the computer and ready to function.

Onsite/64 (TM)
The proprietary software developed by Liebert Corporation for
its Access Control and Monitoring System. Runs on an IBM
PC-XT compatible computer that uses the MS-DOS operating
system.

open a menu
The act of selecting a file to view through a menu in the
access control software.

operator permissions
A file which contains the names and passwords of the
persons who are allowed to logon to the host and change or
view database and status information.

output
Data transferred from a computer's internal storage to some
external device. For example, the output to a printer.

password
A special word, code or symbol that must be presented to
the computer system to gain access to its resources.
Identifies the user to the computer system.

PIN
Personal Identification Number. Used as an individualized
personal ID that must be entered at keypad type card
readers after the card is swiped.

poll
A request made by the host processor for transaction data
from IGMs on the network.

port
That portion of a computer through which a peripheral device
may communicate.

program
A sequence of instructions that permits a computer to perform
a particular task.

D-8
pulse
The process of momentarily energizing a control relay for a
predetermined period of time.

RAM
An abbreviation for Random Access memory in which
information can be written to, read from and erased from
computer chips located in the host processor and IGMs.
RAM typically is volatile memory, which means it loses its
contents when power is removed. Therefore, RAM is battery
backed in the IGM.
record
A single entry containing related information to describe a
complete action, function or parameter in a database file.

relay
A magnetically operated mechanical switch.
remote
Refers to a group of IGMs and readers which are on a dial-
up communication loop, via modem, to the host processor.

RS232C
A data communications industry standard for the serial
transmission of data to a peripheral device, such as a printer,
modem, etc. Most computers provide an RS232C interface.

RS232/Current Loop Converter


A device that converts RS232/C signals to 20 milliamp
Current Loop and vice versa.

secured door
A door which is controlled by a card reader.

software
A set of programs, procedures, routines and/or documents
associated with the operation of a computer system.
Software is the name given to the programs that induce a
computer to carry out particular operations. The software for
a computer system may be classified as applications
programs or systems programs. Contrast with hardware.
subdirectory
An organized grouping of related files on a hard or floppy
disk that branches or subordinates from a main directory.

D-9
ON SITE

A World Leader in
Computer Support
Systems
Environmental Control
Power Protection
Site Monitoring/
Control Deluxe Systemr3
Environmental
Fire Suppression Control System
System Buikting Chiller
Liebert Corporation Diesel
Generator
designs, manufactures
and markets complete UPS System
and Battery
systems for improve-
ment of computer
uptime and perfor- nao
mance. The result is
improved business
operations, increased
productivity and higher
return on the computer
investment. Liebert
CSU3000
Systems provide Coolant Supply
Unit
dependable environ-
mental control and Power Conditioning
SiteScan Computer Room System
Monitoring and Control
electrical power pro-
tection, combined with
centralized monitoring
and control. This
approach represents a
single-source inte-
grated computer
support network.
Based on over two
decades of experience
and over 80,000
installations world-
wide, Liebert is Sievert
committed to offering
the highest quality
Liebert Corporation
products and services 1050 Dearborn Drive, P.O. Box 29186
for applications requir- Columbus, Ohio 43229
Telephone: 614-888-0246 While every precaution has been taken
ing computer support. Facsimile: 614-841-6973 to ensure accuracy and completene
Telex: 6874616 in this manual, Liebert Corporatior
assumes no respcnsibility, end
disclaims all liability for damages
Liebert Group resulting from use of this information
Cherry Orchard North or for any errors or omissions.
Kembrey Park t1990 Liebert Corporation
Swindon
Wiltshire SN2 6UH All rights reserved throughout the world.
United Kingdom Specifications sub(ect to change without
Telephone: (44-793) 491-777 notice.
Facsimile: (44-793) 491-701 Liebert and the Liebert logo are
Telex: 449716 G registered trademarks of Liebert
Corporation.
Printed in U.S.A.
SL-28027 (R4/90)

Anda mungkin juga menyukai