Résumé du contenu de la page N° 1
SE 6000
SE 6000
SECURITY
MANAGEMENT
SYSTEM
STANDARD
PRODUCT
MANUAL
Westinghouse
Security Electronics
an ISO 9001 certified company
5452 Betsy Ross Drive
Santa Clara, CA 95054-1184
(408) 727-5170
FAX (408) 727-6707
P/N 66107919001, Rev. F
Résumé du contenu de la page N° 2
LIMITED WARRANTY Westinghouse Security Electronics (WSE) warrants to the original user the equipment manufactured by WSE as described herein (the equipment) to be free from defects in material and workmanship for a period of one year from the date of purchase by such user or fifteen (15) months from the date of shipment from the factory, whichever is sooner, provided: I WSE has been notified within such period by return of any alleged defective equipment, free and clear of any liens and encumbra
Résumé du contenu de la page N° 3
iii TABLE OF CONTENTS SECTION 1: INTRODUCTION .................................................... 1-1 MANUAL ORGANIZATION ............................................................................... 1-1 System Main Menu ..................................................................................... 1-1 Documentation Methods ............................................................................. 1-2 DEFINITIONS ......................................................................
Résumé du contenu de la page N° 4
iv Doors .......................................................................................................... 2-6 Select Zone ................................................................................................. 2-6 REVIEW TRANSACTIONS (FULL SCREEN) ................................................... 2-7 ALARM SERVICING ......................................................................................... 2-8 REAL TIME CONTROL MAPS ...........................................
Résumé du contenu de la page N° 5
v Keyholder Access Entry [empgentr] ............................................................ 4-5 Project Assignment [epj_entr] ..................................................................... 4-6 COPY KEYHOLDERS ....................................................................................... 4-7 Copy Keyholder Information ........................................................................ 4-7 ACCESS ASSIGNMENT .................................................................
Résumé du contenu de la page N° 6
vi Reader Access Assignment ........................................................................ 5-5 Reader Assignment Sample Report ....................................................... 5-5 ACCESS DEFINITION ...................................................................................... 5-6 Access Code Master ................................................................................... 5-6 Access Group Master .................................................................
Résumé du contenu de la page N° 7
vii SECTION 6: SYSTEM ADMINISTRATION ................................. 6-1 INTRODUCTION............................................................................................... 6-1 SECTION ORGANIZATION .............................................................................. 6-1 ADDITIONAL INFORMATION ........................................................................... 6-2 ADD USERS [ADDUSERS] ............................................................................... 6-2 M
Résumé du contenu de la page N° 8
SECTION 1: INTRODUCTION 1-1 SECTION 1 INTRODUCTION MANUAL ORGANIZATION This manual follows the order of the seven standard product items in the system main menu, with the Key Inventory and Parking Stickers items merged into the System Administration section: Section 2: Monitor Security Activity Section 3: Security Management Reports Section 4: Master File Entry Section 5: Master File Reports Section 6: System Administration System Main Menu The system main menu is the departure point f
Résumé du contenu de la page N° 9
1-2 SECTION 1: INTRODUCTION Documentation Methods To avoid repetition and to reduce document size, detailed explanations for the system's principal data items are given only in Section 4: Master File Entry, which is used when creating the system database. For introductory information concerning the data items, see Definitions below. Further, with the exception of the screens presented in Basic System Usage in this section, and the introductory menu screens for Sections 2 through Section 5, all
Résumé du contenu de la page N° 10
SECTION 1: INTRODUCTION 1-3 Keyholder ID. Keyholder's ID number. The unique ID number is used by the computer to keep track of all activity for that person. Once entered, the keyholder ID cannot be changed. Location. Location of the office or branch of the company to which a keyholder is assigned. Tenant. One of several distinct occupants of a facility with a single access control system. The data for each tenant using the system appears separate from that of all other tenants. Time Code.
Résumé du contenu de la page N° 11
1-4 SECTION 1: INTRODUCTION Readers Digital Key Reader. Reads the unique number of 1 to 5 digital command keys simultaneously at a range of up to 36 inches. Keypad Controllers. The keypad controllers, normally used in conjunction with an ACU, provide additional security by requiring a personal identification number (PIN) entry. Magnetic Card Readers. Reads the card number from information coded into the magnetic strip on the card. Card must be moved physically through the reader to work. Rea
Résumé du contenu de la page N° 12
SECTION 1: INTRODUCTION 1-5 Multiple Switch Monitor (MSM). The MSM is a four-contact switch box that is connected to a WSE ACU and the MSM provides four contact-closure inputs. Points. A point is any basic element of an access control system, such as a door switch, an alarm contact, an output switch. Point IDs uniquely identify all system elements. Request-to-Exit (REX) Sensor. Used when both entry and exit control is required. REX points, usually push-button devices, motion detectors, or p
Résumé du contenu de la page N° 13
1-6 SECTION 1: INTRODUCTION Response Time. The SE 6000 is capable of fast response times in both single and multiple site configurations. Fast response times are important for security personnel who monitor alarms and are always appreciated by keyholders wishing to enter locked doors. Principal System Functions Access Control Anti-Passback Control. The SE 6000 has anti-passback features (applies to zones only) to prevent tailgating or unauthorized key use. Anti-passback is possible across mu
Résumé du contenu de la page N° 14
SECTION 1: INTRODUCTION 1-7 Multiple Occupancy Feature. Similar to the two-man rule except that it requires that two keyholders enter and leave a specified zone together; refer to Section 4 for details. File Maintenance To perform its access control functions, the system must know the unique ID numbers of all keyholders and the doors and times they can enter. Further, the SE 6000 maintains other keyholder data to facilitate scheduling and reporting. The system also needs to know details of the
Résumé du contenu de la page N° 15
1-8 SECTION 1: INTRODUCTION SE 6000 Pollers 1234 5678 Alarm Access Control Unit— Monitoring ACU Switcher Device (Up to 16 per poller) (Up to 16 per poller) Sensor Connections Multiple Switch Contact Relays 1 2 3 4 5 6 7 8 Monitor—MSM (1—16) CCTV Contacts Camera 1 2 3 4 Contact Switch REX (Point) (Point) Reader Door Switch (Point) One Complete Door BASIC SE 6000 SYSTEM CREATING THE DATABASE Once the system is in place, first obtain the following
Résumé du contenu de la page N° 16
SECTION 1: INTRODUCTION 1-9 1. Following the System Interconnect Diagram, number each element in turn with a four-digit number, including numbers for devices, pollers, and readers. 2. Use the following ID groupings for average-sized system: 0001-0010 Computers 2000-2999 Door switches 0011-0099 Pollers 3000-3999 REX contacts 0100-0999 Devices 4000-5999 Input points 1000-1999 Sensors 6000-7999 Outputs Data Entry Sequence Note that although the zoom feature (described later in this
Résumé du contenu de la page N° 17
1-10 SECTION 1: INTRODUCTION System Screens There are two basic screen types: Menu and Application: Menu Screens Menu screens list application selections by group according to function (exception Monitor Security Activity see Section 2). All menu screen IDs end in menu (example: [fmntmenu] Master File Entry). The menu screens have three elements: the list of choices, the highlight bar, and the Enter Selection field. The highlight bar, controlled by the arrow keys, is used to make a selecti
Résumé du contenu de la page N° 18
SECTION 1: INTRODUCTION 1-11 Indicates replace or insert mode. With replace, entries overwrite existing data. With insert, entries push existing data to the right. Toggle between the modes by pressing insert. Indicates if the information displaying is stored. Indicates the current screen mode (see Finding, Adding, and Storing Data in this section). In some systems, this window is in reverse video. Indicates if the zoom feature exists for a field (see Zoom Feature in this section). Displays t
Résumé du contenu de la page N° 19
1-12 SECTION 1: INTRODUCTION USING SCREENS AND FIELDS Selecting Screens There are three screen selection methods: 1. Use the arrow keys to select the menu choice. Press Enter to place it in the Enter Selection field, and press Enter again to display the selection. 2. Use the arrow keys to select the menu choice, and press F2 to display the selection. 3. Press Enter anywhere in the list of choices to move the highlight bar to the Enter Selection field. Press Ctrl + y to clear the field and t
Résumé du contenu de la page N° 20
SECTION 1: INTRODUCTION 1-13 Moving to Prior Screens Press F1 to return to the previous screen displayed. If required, continue to press F1 to return to the system main menu. FINDING, ADDING, AND STORING DATA Finding Data Use the find mode to locate and select data. A specific record (a single keyholder ID, for example) or a group of records (all keyholders in a particular job category, for example) can be found. For example, assume we need to find all keyholders assigned to tenant 2 who bega