Académique Documents
Professionnel Documents
Culture Documents
Product Names are trademarks of TAC. All other trademarks are the property of their re-
spective owners.
Revision: A
The information in this document is furnished for informational purposes only, is subject
to change without notice, and should not be construed as a commitment by TAC. TAC as-
sumes no liability for any errors or inaccuracies that may appear in this document.
TAC, Inc.
One High Street
North Andover, MA 01845
(978) 470-0555
Fax: (978) 975-9782
http://www.tac.com
Andover Continuum CyberStation
Access Control Essentials Guide
30-3001-405
Revision A
June, 2007
Contents
6 TAC
About Alarm-Enrollment Objects ............................... 80
Create an Alarm-Enrollment Object .......................... 80
General Expressions for Security ............................... 82
About Attaching Alarms to Objects ............................ 84
Attach an Alarm-Enrollment to a Door ...................... 84
Attaching Alarms to a Point ....................................... 85
Using the Alarms / Advanced Alarms
Tab of an Object Editor ............................................... 86
More about Alarms ...................................................... 92
Task 12: Configure Video Layouts ............................................. 93
Create a VideoServer Object ....................................... 93
Create a VideoLayout Object ...................................... 94
Add a VideoLayout to an Object ................................. 95
More about Video ......................................................... 97
Task 13: Create Graphic Panels and Controls .......................... 98
About Graphic Controls for Access Control ................ 98
Create a Graphics Panel and a Door Control ............. 99
More about Graphics Panels and Controls ................ 102
Task 14: Configure Reports ........................................................ 103
About Report Objects ................................................... 103
Create a Report ............................................................ 103
More about Reports ..................................................... 107
8 TAC
About this Manual
10 TAC
:
Related Documentation
For additional or related information, you can refer to these documents.
Document
Document
Number
12 TAC
Chapter 1
Getting Started
14 TAC
Chapter 1: Getting Started
Office
Main Entrance
The following issues for this sample site determine the access control
devices that are needed and the configuration of the system:
The following illustration shows the same floor plan, with access
control devices in place.
Dual-Reader
Door
Single-Reader
Door
Office
Motion Detector:
Unlocks Door during Regular Hours Main Entrance: Card Reader
Triggers Video during Off Hours for Employee Access
16 TAC
Chapter 1: Getting Started
The following table describes how these access control devices address
the issues identified for this facility. Note that the devices used in this
example are only one of many possible access control solutions that can
be implemented.
18 TAC
Chapter 1: Getting Started
20 TAC
Chapter 2
Configuring an Access
Control System
Navigation Pane
Select an object in
this pane to display
the objects it contains
in the Viewing Pane.
Viewing Pane
22 TAC
Chapter 2: Configuring an Access Control System
24 TAC
Chapter 2: Configuring an Access Control System
Create a Network
When you configure an access control network, the first object you
create is the network itself.
1. In Continuum Explorer, right click Root, select New, and then
select Network.
2. Enter a name for the network for Object Name, and click the
Create button.
CyberStation creates an
alias from the object name
that you enter. You can
edit the alias if you wish.
An alias cannot contain
symbols or spaces.
The UTC offset is the difference between your local time and
Greenwich Mean Time (GMT). Enter - if local time is behind GMT.
Note: “-300” minutes is an example of the Time Zone offset for your
local time.
4. Click OK.
IP Address: 169.254.1.1
Subnet Mask: 255.255.0.0
Prior to changing these values, the PC being used to commission the
controllers must be configured to communicate with the controllers.
The setup values are:
IP Address: 169.254.1.(191-254)
Subnet Mask: 255.255.255.0
1. From Microsoft Internet Explorer, in the Address field, enter the
controllers default IP address.
26 TAC
Chapter 2: Configuring an Access Control System
Username: acc
Password: acc
4. Select OK.
ACCNet ID
IP Address
Subnet Mask
Gateway Address
Web Server Post
PPP IP Address
Transport Type; use the drop down menu to make the proper
selection.
7. In the Miscellaneous section, using the dropdown menu, select
the following information:
IO Configuration
Comm4 Port Line
8. Select Submit to Controller.
Note: Once you have finished commissioning your controller, your PC’s
IP address and Subnet Mask value can be returned to their
normal settings.
28 TAC
Chapter 2: Configuring an Access Control System
Create a Controller
Note: Before performing this procedure, you must first install the
controller, connect it to your Ethernet network, and then
commission the controller. Refer to “Web Configuration for
Controllers” on page 26.
1. In Continuum Explorer, right click the network object, select New,
and then select InfinityController.
2. Enter a controller name for Object Name, and click the Create
button.
Serial Number
and Version
will be read
from the
controller after
the Teach
operation.
Note: To confirm that the Comm Status is online, click the Refresh
button.
5. Select the Network tab.
7. Click Apply.
8. Select the General tab, and then click the Teach button.
30 TAC
Chapter 2: Configuring an Access Control System
Use the General tab to enter basic information about the IOU module.
32 TAC
Chapter 2: Configuring an Access Control System
The SecurityLevel tab shows the object security level and access
privileges for the object. For more information, see Chapter 4, Security,
in the CyberStation Configurator’s Guide.
34 TAC
Chapter 2: Configuring an Access Control System
5. Click OK.
In the General tab, enter basic information about the comm port.
Note: When Infinet, MS/TP, or Wireless is selected in the Default
Mode field, another tab, Field Bus Controllers, appears. See Field
Bus Controllers Tab, later in this chapter.
Description Type in a description for the comm port. You can use
up to 32 alphanumeric characters. This attribute is
optional, but providing a good description can aid
other users.
Comm Port The CommPort attribute displays the number of the
Number comm ports you are editing.
Note: In the event of a controller reset, each comm port reverts to it’s
original default mode. for a complete list of default modes for
each comm port on each controller, please see see the help topics:
Configure Settings for Infinet, Default Modes for Controller
Comm Ports, and Summary of Comm Port Modes.
36 TAC
Chapter 2: Configuring an Access Control System
.
Default Mode Description
Printer Select this option when connection a serial
printer to this port.
Infinet (Comm 1 Select this option to set up this comm port as an
and 2 Only) Infinet port. An Infinet port connects an Infinity
controller to an Infinet network. When the
default mode is set to Infinet, another tab is
added to the CommPort editor: Field Bus
Controllers.
Wireless Select this option to use a Wireless Adapter on a
NetController II, communication over a wireless
subnetwork.
Lbus Select this option to set up communications
between your controller and one or more IOU
boards on an LBus. Lbus is supported for
comm4 on a CX9200 or CX9300 controller and
comm1 on a NetController II.
TankNet Select this option to connect to an Infinity level-
sensing probe.
XDriver Select this option to use a customized external
(Support for an equipment driver to connect to a special piece of
XDriver must be equipment.
purchased)
Note: Before you can select the XDriver, you
must first install it using the instructions
provided with the software.
To select an XDriver file, click the browse button
to locate and select the file for the XDriver.
Depending on how you installed the XDriver,
the file may or may not have a file extensions of
.xdr.
NotConfigured Select this option if the comm port is available.
Indicates that the port is no preset to any other
default mode configuration.
In the General tab, click the XDriver Status button to view the
status of the device that is using the XDriver. The XDriver Status
button displays the following read-only information:
38 TAC
Chapter 2: Configuring an Access Control System
The Settings tab is where you view or edit the communications speed
and handshaking settings for the mode that you have chosen for the
port.
Depending on which Default Mode you select on the General tab, some
of the attributes on this tab may be unselectable (appear gray).
Baud Rate The Baud rate is the speed, measured in bits per
second, at which the controller sends
information to the device that you are
connecting to the comm port. Select the baud
rate that matches that required by the
equipment connected to this port.
40 TAC
Chapter 2: Configuring an Access Control System
When you set Default Mode on the General tab to Infinet, MS/TP, or
Wireless, on the Field Bus Controllers tab is added to the
CommPort editor appears.
This tab displays the controllers that reside on their respective field
bus network — Infinet, BACnet MS/TP, or Wireless — connected to
this comm port. The controllers will not display, however, until you
click the Learn button on the Settings tab.
The CommStatus column displays either Online or Offline for
controllers listed in the Name column. When a controller is Online, it
is communicating with the rest of the network. When a controller is
42 TAC
Chapter 2: Configuring an Access Control System
Infinet Port - -
User Port - -
Custom Port - -
44 TAC
Chapter 2: Configuring an Access Control System
Note: For additional information, in the Comm Port editor, see the
help topics: Configure Settings for Infinet, Default Modes for
Controller Comm Ports, and Summary of Comm Port Modes.
Select this
check box.
46 TAC
Chapter 2: Configuring an Access Control System
Points enable you to monitor and control access events. You use these
points with schedules, alarms, and other objects to establish routine
access control and to respond to unauthorized access events.
Create an InfinityInput Point
Supervised points can have one of three values: On, Off, or Trouble.
You create a supervised input point for each input (for example, from a
contact sensor) from the devices wired to channels at each controller in
your network.
1. In Continuum Explorer, right click the controller where you want
to create the point, select New, and then select InfinityInput.
2. Enter a point name for Object name, and click the Create button.
3. In the General tab of the InfinityInput editor, enter the units for
this point.
Leave the Value field at 0. The system updates the value with the
input from the associated controller channel.
Entering a description
helps other users
identify what this point
represents.
48 TAC
Chapter 2: Configuring an Access Control System
2. Enter a point name for Object name, and click the Create button.
Leave the Value field at 0. The system updates the value with the
input from the associated controller channel.
50 TAC
Chapter 2: Configuring an Access Control System
8. Click OK.
Value Example
2. Enter a point name for Object name, and click the Create button.
6. Click OK.
52 TAC
Chapter 2: Configuring an Access Control System
Lobby/Offices
z The degree of access control that you require for the movement of
personnel within the facility
z The types of personnel who need access to various locations in your
facility and when access is needed
After you create an area object, you configure doors that access the
area. You also assign the area to personnel who need access to it. In
addition, you can attach schedule points to Door and Personnel objects
to determine when access can occur.
Create an Area
3. Right click the folder, select New, and then select Area.
54 TAC
Chapter 2: Configuring an Access Control System
You create Door objects only for doors that have access control devices
associated with them. If you want to monitor a door that is simply
closed or locked under normal circumstances, such as a fire door, you
can do this by setting up supervised input points for the door switch
and contacts.
Data that Defines a Door
Create a Door
4. If you use Wiegand cards, enter the site code(s) used with your
access cards.
5. Select the card format, Wiegand or ABA, and then select the
individual formats that you want the reader to recognize.
56 TAC
Chapter 2: Configuring an Access Control System
10. If the door has readers on both sides, select the Exit Reader tab,
and repeat steps 7 - 9 to configure the second reader.
12. Enter the channel number where each input or output is wired.
Channel Description
58 TAC
Chapter 2: Configuring an Access Control System
Channel Description
ADA Exit Request Channel for input that requests that the
Input door be opened for a person to leave the area
accessed by this door.
60 TAC
Chapter 2: Configuring an Access Control System
14. Under Send Access Events, select the events you want to log for
this door.
The events that you select for this door can be shown in logs,
ListView and EventView windows, and reports. Events not selected
here are not captured and cannot be retrieved for later viewing and
reporting.
The door you created now appears in the list. The list indicates
whether the door provides access to the area, exits the area, or
both.
3. Click Cancel.
You can specify the following access control information for each
person:
z Card format
z Site code
z Card number
z Card expiration date
z Areas to which the person has access rights
62 TAC
Chapter 2: Configuring an Access Control System
7. Right click the folder, select New, and then select Personnel.
8. Enter a name for the Personnel object (for example, you might want
to enter the last name and first initial of the person), and click the
Create button.
11. For Wiegand cards, enter the site code for the card.
64 TAC
Chapter 2: Configuring an Access Control System
14. Select the check box next to areas this person can access.
66 TAC
Chapter 2: Configuring an Access Control System
You create schedules in the controller where the schedule will be used.
(Later, you can use the Schedule editor’s Mass Create feature to copy
the schedule to other controllers in your network, if needed.)
Note: Before creating a schedule, you must create the points called for
in the schedule. See “Task 6: Create CyberStation Points” on
page 47.
1. In Continuum Explorer, right click the controller, select New, and
then select Schedule.
6. Check the Automatic Download check box, and select the day of
the week and the time you want CyberStation to download the
schedule to the controller.
7. Click OK.
Each week, at the day and time you selected in the schedule, this
workstation downloads the next seven days of the schedule to the
controller.
68 TAC
Chapter 2: Configuring an Access Control System
After you create and configure a schedule, you attach the point you
selected for the Occupancy Point to the objects you want the schedule to
control.
1. In Continuum Explorer, double click the door to which you want to
attach the schedule point.
3. Click the browse button next to one of the schedule fields, and
navigate to and select the schedule point you want to attach.
You can use schedule points to control the door in two ways:
5. Click OK.
If . . . Then . . .
A schedule point is attached to the person can access the area only
an area in the Personnel object when the schedule associated with
the point is active.
70 TAC
Chapter 2: Configuring an Access Control System
3. Click the icon next to Add Schedule to display the Add Schedule
dialog.
5. Select a schedule point, select the area(s) where you want to attach
the point, and click OK.
6. Click OK.
72 TAC
Chapter 2: Configuring an Access Control System
You can also specify the notification actions that occur when the
conditions that triggered the alarm return to normal.
About Notification by E-mail and Pages
74 TAC
Chapter 2: Configuring an Access Control System
3. Select the entry type Personal Distribution List and put this
entry in the Personal Address Book.
4. In the Name field enter a name for the distribution list using the
following format:
List
Format of List Name Example
Type
Note: Use the EventNotification object Name not the Alias, for
example, Critical Temp, not CriticalTemp.
6. Set address book options so that the address book where your
personal distribution lists are stored is the first one to be searched
when sending E-mails or pages. For example, in Microsoft
Exchange, select Options from the Tools menu. Click the
Addressing tab. When sending mail, check names using these
address lists in the following order area, use the Add button, then
the up or down arrow buttons to add the correct address book to
this field and position it at the top of the list.
76 TAC
Chapter 2: Configuring an Access Control System
6. Under Colors and Fonts, right click to select the colors and fonts
used to display the alarm in the Active Alarm View window and the
Alarm Status bar.
9. Click the check box next to each action you want the system to take
in notifying users of the alarm and the return to normal.
78 TAC
Chapter 2: Configuring an Access Control System
14. Click the check box next to the actions the workstation should take
if it receives notification during the times you selected.
To perform the action only Select the check box under Backup
if a repeat of the alarm has for the action.
occurred
17. Select when to remove the alarm from the Active Alarm View
window.
An AlarmEnrollment object:
z Defines the conditions that your access control system uses to
determine that a point is in the alarm state
z Defines the conditions that the system uses to determine that the
point has returned to its normal state
z Contains the text messages that are displayed in the Active Alarm
View window or the Alarm Status bar
z Has an attached EventNotification object that defines how the
system responds to the alarm and notifies the appropriate people
You attach an AlarmEnrollment object to points, doors, and other
objects that you want to alarm.
Create an Alarm-Enrollment Object
2. Enter a name for the alarm (for example, doorisajar), and click
the Create button.
80 TAC
Chapter 2: Configuring an Access Control System
You define the expression used to define the alarm condition in the
Algorithms tab. Most access control alarms use the Expression
alarm type.
6. Under Send, select the Alarm check box. If you want to be notified
at the return to normal, select this check box as well.
Expression Description
DoorAjar is True The door is held open for longer than the
DoorAjar time and the Door Strike Time.
82 TAC
Chapter 2: Configuring an Access Control System
Expression Description
10. Enter the messages that you want to be displayed in the Active
Alarm View or the Alarm Status bar.
3. Click the browse button in one of the empty fields, and locate and
select the AlarmEnrollment object you want to attach.
Note: Unless the Enabled check box next to an alarm is checked, the
alarm does not become active, even if the alarm condition occurs.
5. Click OK.
84 TAC
Chapter 2: Configuring an Access Control System
Use the Alarms tab (or Advanced Alarms tab) to browse for up to
eight AlarmEnrollment objects to attach to the point.
To attach an alarm to an object:
1. Click the browse button in one of the empty alarm fields.
2. Search and find the alarm you want.
3. Click the Select button.
4. Check the Enabled checkbox.
To delete an attached alarm, select its name in the text field and press
the Delete key on your keyboard.
86 TAC
Chapter 2: Configuring an Access Control System
Additional information you can add from the Alarms tab include the
following attributes:
SHOWREPORT: “C:\PROGRAM
FILES\CONTINUUM\REPORTS\SYSTEMCH
K.HTM”
88 TAC
Chapter 2: Configuring an Access Control System
90 TAC
Chapter 2: Configuring an Access Control System
92 TAC
Chapter 2: Configuring an Access Control System
4. Right click the folder, select New, and then select VideoServer.
5. Enter a name for the server, and click the Create button.
7. Click Apply.
9. Click OK.
In a VideoLayout object, you define video control frames, which are the
viewing areas for video feeds from selected cameras.
You create VideoLayout objects in Root or in a folder that was created
in Root.
1. In Continuum Explorer, right click the folder that contains your
video objects, select New, and then select VideoLayout.
2. Enter a name for the video layout, and click the Create button.
Note: If you are creating a layout for use with alarms in multiple
objects, each requiring different cameras, assign cameras in the
alarmed objects instead of in the layout. Bypass step 4, and
proceed to step 5 in this procedure.
4. Right click a video frame, select Video Servers, select the video
server, and then select the camera to assign to this frame. Repeat
to assign cameras to the other frames in the layout.
94 TAC
Chapter 2: Configuring an Access Control System
The frames selected for video points will show the video feed when
the video layout is displayed in response to an alarm.
6. Click OK.
After you create a VideoLayout object and assign video points in it, you
can add the video layout to the Alarms tab of an object so that the video
layout is displayed when an alarm is triggered for the object.
Note: The EventNotification object referenced in the AlarmEnrollment
object(s) must have the Display Video option selected in the
Actions tab of the EventNotification editor for a video layout to
be displayed when the alarm occurs.
Display Video is at the bottom of the list of
actions in the Actions tab of the
EventNotification editor.
3. Click the Video browse button, and locate and select the video
layout you want to attach to this object.
5. In the Video Points dialog, select the video server and the camera
to display video in up to four frames.
6. To record video from a camera, select the Rec check box for that
camera, and enter the number of seconds for Duration.
8. Click OK.
96 TAC
Chapter 2: Configuring an Access Control System
Pinpoint has several dynamic controls that are intended for access
control:
Personnel photo
control
98 TAC
Chapter 2: Configuring an Access Control System
Video control
Other Pinpoint controls and tools let you customize the appearance and
operation of graphics panels as needed. For example:
z Use an image file of a floor plan as the panel background, and
arrange door and area controls based on the physical location of the
objects they represent.
z Use text, switch, button, and other controls to display information
or perform specific actions, such as opening a Listview window.
Create graphics panels in the controller that you want to own the
panels. Typically, this controller also owns the doors that are shown in
the graphics panel.
1. In Continuum Explorer, right click a controller, select New, and
then select Graphics.
6. In the General tab, select the set of door graphics you want to use
for Style.
7. Select the User Entry check box if you want to be able to execute
commands from the control.
If the User Entry check box is not checked, the control is view-
only.
100 TAC
Chapter 2: Configuring an Access Control System
8. Select the Switch Animation check box if you want to door control
to reflect the state of the door switch, open or closed.
If the check box is not checked, the control reflects the state of the
door lock, indicating whether the door is locked or unlocked.
10. Select the attributes that you want displayed, and select the check
box next to each attribute to enable it.
11. In the Standard toolbar, click the Run Mode icon , and if
prompted, save changes to the panel.
12. Right click the door control to display a menu of actions you can
take to control the door and obtain information about access events
at the door.
13. To close the Pinpoint editor, click the close button in the upper-
right corner of the window.
102 TAC
Chapter 2: Configuring an Access Control System
In a Report object, you specify the characteristics of the report that you
want to generate:
z The data to include
z The report format (text, bar chart, pie chart, etc.)
z The output format, including whether the report is viewed on
screen, printed, or saved to a file
z Whether the report is generated automatically or manually
z Whether the report is automatically e-mailed to a list of recipients
Create a Report
3. Right click the folder, select New, and then select Report.
Report Data
Description
Source
104 TAC
Chapter 2: Configuring an Access Control System
12. Select the Log Filter radio button, and select a predefined filter for
the time interval of the report.
13. Select the Path browse button, and locate and select the controller
with the objects that you want to include in the report.
14. Click the Add button to locate and select the objects in this
controller that you want to include in the report.
16. Options in this tab allow you to define the output format.
106 TAC
Chapter 2: Configuring an Access Control System
19. Click the View Report button to generate the report and display
the content in the Report Viewer window.
20. Click the close button to close the Report Viewer window.
108 TAC
Chapter 3
Monitoring an Access-
Control System
Responding to Alarms
When you configure alarms, you typically specify that an alarm
message be displayed at one or more CyberStation workstations. At a
workstation, alarm messages appear either in the Alarm Status bar or
in the Active Alarm View window, depending on settings in the
EventNotification object associated with the alarm.
The Active Alarm View window notifies you of alarms and provides
information about current alarm conditions. The window displays
automatically when an alarm occurs if you selected the Display Alarm
View option in the EventNotification object associated with the alarm.
110 TAC
Chapter 3: Monitoring an Access-Control System
This window updates in real time as alarms occur, are responded to,
and/or the affected objects return to their normal state.
Use buttons to the left of the entries in the list to respond to alarm
notifications:
Button Description
Acknowledge the alarm. Click this button when you have seen the alarm
message and have taken the appropriate action to address the alarm
condition. Your username is recorded in the Acknowledged by field for
the alarm.
If the workstation was beeping or playing audio, and if the alarm
message was flashing, these stop when you click the Acknowledge
button.
Silence the audio associated with the alarm at all workstations that
received the notification. Silencing an alarm does not acknowledge the
alarm. Your username is recorded in the Silenced by field for the
alarm.
Additional toolbar buttons and menu options enable you to obtain more
information about alarms and the objects associated with them.
See the “Active Alarm View” topic in the CyberStation online help.
You create EventView objects in the EventView editor. You can create
multiple EventView objects, each customized to display selected events
from specific doors.
112 TAC
Chapter 3: Monitoring an Access-Control System
ListView objects are highly customizable. Settings that you can define
include:
114 TAC
Chapter 3: Monitoring an Access-Control System
z “ListView Editor”
z “CyberStation Main Screen”
116 TAC
Chapter 4
Advanced Topics for
Access Control
z User objects
z Security groups
z Security-level objects
The security group assignments of each user determine the objects and
data the user can view and edit, and well as other actions they can
perform, such as deleting objects.
You can further define each user’s interaction with the CyberStation
application by specifying the following in User objects:
118 TAC
Chapter 4: Advanced Topics for Access Control
You use the Security editor to specify the privileges of each security
group. CyberStation provides 1024 security groups in which you can
define access privileges. By default, the Security editor displays the
first 128 of these.
Each column corresponds to one security group. The lock and key icons
indicate whether the security group has the access privilege ( ) or is
denied the privilege ( ).
Each column
corresponds to
one security
group. Move the
cursor over a
column to
display a tooltip
showing the
name of the
security group.
An object, such as a
door, can have only
one SecurityLevel
object attached to it.
120 TAC
Chapter 4: Advanced Topics for Access Control
z “User Editor”
z “Security Group Editor”
z “SecurityLevel Editor”
122 TAC
Chapter 4: Advanced Topics for Access Control
Only personnel who are assigned executive privilege access and are
assigned access rights to the area can enter or exit through a door in
the Lockdown state. You select executive privilege access and assign
area access rights in the Personnel object for each person that you want
to have this access.
Enable the Executive Privilege attribute in
personnel profiles to display and edit the
value in Personnel objects.
z “Area Editor”
z “Personnel Manager”
z “Area Control” in the “Pinpoint Graphics” topics
Clearance Level
DHS Level DHS Color Condition Level
Needed for Access
You can quickly change the condition level at all controllers by sending
them a new value for the ConditionLevel variable using the Global
Condition Level dialog. This is a faster method of changing the values
124 TAC
Chapter 4: Advanced Topics for Access Control
than manually changing the condition level at each controller. You can
also restore the previous condition level at all controllers using this
dialog.
You can set up highly customized access that is tailored to the needs of
your facility and the people who need access in normal and emergency
situations. You can use up to 255 condition levels and clearance levels:
z 1 is the clearance level that allows the most access. That is, when
the condition level is 1 (most severe alert), only personnel with a
clearance level of 1 who are assigned to the area will have access.
z 255 is the clearance level that allows the least access. That is, the
condition level must be 255 for personnel with a clearance level of
255 to be allowed access.
126 TAC
Andover Continuum CyberStation
Access Control Essentials Guide
Document Number: 30-3001-405
Revision A