Bosch Access PE Configurator Operation Manual (APE 3.2 Configurator) APE En US 21072810123
User Manual: Bosch Operation Manual (APE 3.2 Configurator) Access Professional Edition 3.2
Open the PDF directly: View PDF .
Page Count: 172
Download | |
Open PDF In Browser | View PDF |
Access Professional Edition en Configuration Manual Access Professional Edition Table of Contents | en 3 Table of contents 1 System Overview 5 1.1 Restrictions and options 6 1.2 Installation on one computer 8 1.3 Installation on multiple computers 9 1.4 System Prerequisites 10 2 General - Configurator 12 2.1 Introduction 12 2.2 User Login 15 2.3 Menu and Tool bar 18 2.4 General system settings 22 2.5 Layout of the main dialog 27 2.6 Menu and tool bar 28 2.7 Layout of the main dialog 32 2.8 Menu and Tool bars 33 2.9 Enrollment Configuration 35 2.9.1 Enrollment via AMC connected readers 37 3 Configurations 43 3.1 Creating new configurations 43 3.2 Opening configurations 45 3.3 Activating a new configuration 46 3.4 Propagating configurations to the controllers 47 4 Controllers 50 4.1 Defining and modifying new controllers 50 4.2 Controller Settings 55 5 Signals 58 5.1 Input signals 58 5.2 Output signals 61 5.3 Defining conditions for output signals 68 5.4 Creating Extension boards 74 6 Entrances 77 6.1 Creating and modifying door models 77 6.2 Display and parameterization 83 6.3 Door models with special settings 92 Bosch Access Systems GmbH 2015-11 | | Configuration Manual 4 en | Table of Contents Access Professional Edition 7 Areas 93 8 Personnel Groups 98 9 Access Authorizations 102 9.1 Create and assign 102 9.2 Special rights 106 10 Special days 111 10.1 Create and modify 111 11 Daymodels 114 11.1 Create and modify 114 12 Timemodels 116 12.1 Create and modify 119 13 Texts 121 13.1 Displaytexts 122 13.2 Event Log messages 123 14 Additional Personnel data 126 15 Map Viewer and Alarm Management 130 15.1 Configuring a map 131 15.2 Adding a device to a map 134 16 Card Definition 137 17 Appendix 141 17.1 Signals 141 17.2 Default Doormodels 143 17.3 Doormodel 01 144 17.4 Doormodel 03 146 17.5 Doormodel 06c 147 17.6 Doormodel 07 147 17.7 Doormodel 10 150 17.8 Doormodel 14 152 17.9 Examples of mantrap configurations 154 17.10 Configuring Entrance Model 07 157 17.11 Display Arming/Disarming 159 17.12 Procedures in Access Control 161 17.13 Access PE ports 165 18 PIN types 167 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition 1 System Overview | en 5 System Overview Access Professional Edition System (hereunder referred to as Access PE) consists of four modules – LAC Service: a process which is in constant communication with the LACs (Local Access Controllers – hereafter referred to as Controllers). AMCs (Access Modular Controllers) are used as Controllers. – Configurator – Personnel Management – Logviewer These four can be divided into server and client modules. The LAC service needs to remain in constant contact with the controllers because firstly it constantly receives messages from them regarding movements, presence and absence of cardholders, secondly because it transmits data modifications, e.g. assignment of new cards, to the controllers, but mainly because it carries out meta-level checks (access sequence checks, anti-passback checks, random screening). The Configurator should also run on the server; however it can be installed on client workstations and operated from there. The modules Personnel Management and Logviewer belong to the Client component and can be run on the Server in addition, or on a different PC with a network connection to the server. The following Controllers can be used. – AMC2 4W (with four Wiegand reader interfaces) - can be extended with an AMC2 4W-EXT – AMC2 4R4 (with four RS485 reader interfaces) Bosch Access Systems GmbH 2015-11 | | Configuration Manual 6 1.1 en | System Overview Access Professional Edition Restrictions and options You can use Access PE for systems that do not exceed the following thresholds for connectable components and manageable data volume. – Max. 10,000 cards – Up to three cards per person – PIN length: 4 to 8 characters (configurable) – PIN types: – – Verification PIN – Identification PIN – Arming PIN – Door PIN Access variants: – Only with card – Only with PIN – PIN or card – Max. 255 time models – Max. 255 access authorizations – Max. 255 area-time authorizations – Max. 255 authorization groups – Max. 16 workstations – Max. 128 readers – Max. one I/O extension board (AMC2 8I-8O-EXT, AMC2 16I-16O-EXT or AMC2 16I-EXT) per Controller – The following restrictions apply to each controller type: 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition System Overview | en Controller AMC2 4W AMC2 4W AMC2 4R4 with AMC2 Readers/entrances Max. readers per 7 4W-EXT 4 8 8 1 1 8 AMC Max. readers per interface/bus Table 1.1: System limits — readers and entrances Video system — restrictions and options – Max. 128 cameras – Up to 5 cameras per entrance – 1 identification camera – 2 back surveillance cameras – 2 front surveillance cameras – You can configure one of these cameras as an alarm and log book camera. Offline Locking System (OLS) — restrictions and options – Max. 256 doors – The number of entrances and authorization groups in the authorizations depends on the dataset length that can be written to the cards. – Max. 15 time models – Up to 4 periods per time model – Max. 10 special days/holidays (from the online system) – The OLS functionality is only given with card No.1. Notice! USB devices which are connected at a remote desktop as e.g. enrollment readers are not supported. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 8 1.2 Access Professional Edition en | System Overview Installation on one computer The following figure shows a complete Access PE system installed on a single computer. Controllers can be connected via a serial interface. If a dialog reader is used then this is also connected via a serial interface. Figure 1.1: System Overview – Single Computer Configuration 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition 1.3 System Overview | en 9 Installation on multiple computers The following figure shows an Access PE system distributed across 2 computers. This is particularly beneficial in cases where the Server to which the Controllers are connected is in a locked computer room, but the personnel data is maintained, for example, by the personnel department elsewhere. The Access PE Client can be installed on up to 16 computers, which access common data on the Server via the network. Client workstations can be configured to use two monitors. Window positions maintained by the operating system, ensure a familiar operators’ environment across login sessions. Notice! After an Unistall for Update check if all files have been removed from the folder .. :\BOSCH\Access Professional Edition with the exception of the folder SaveData. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 10 Access Professional Edition en | System Overview Figure 1.2: System overview – Distributed System 1.4 System Prerequisites The installation of Access PE requires: Operating Systems (one of): – Windows 10 X64 professional – Windows 2008 R2 – Windows 2008 Server – Windows 7 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition System Overview | en 11 Notice! Microsoft Windows XP of all versions is not supported by the Access Professional Edition 3.1 Other software: – To run the AmcIpConfig application supplied (and the Bosch Video SDK), you need the .NET Framework 4.0 platform. – To create and display lists and reports, you must install Crystal Reports applications. Separate setups are available on the installation CD. Hardware Requirements Both Server an Client require a Standard Windows PC with: – 4 GHz CPU – 4 GB RAM at least – 20 GB free disk space (Server) – 1 GB free disk space (Client) – 100 Mbit Ethernet Network Card (PCI) – Graphical adapter with 1024x768 resolution and 32k colors – Resolution support: – 1024 by 768 – 1280 by 1024 – 2048 by 768 – 2560 by 1024 – CD/DVD-ROM Drive – I/O Expansion Option – USB Keyboard and Mouse Bosch Access Systems GmbH 2015-11 | | Configuration Manual 12 en | General - Configurator 2 General - Configurator 2.1 Introduction Access Professional Edition Access PE is an Access Control System which has been designed to offer the highest standards of security and flexibility to small and medium sized installations. Access PE owes its stability and upgradeability to a 3-tier design: The top tier is the administration level with its controlling services. All administrative tasks are carried out here, e.g. the registration of new cards and the assignment of access rights. The second tier is formed by the Local Access Controllers (LACs) which govern each group of doors or entrances. Even when the system is offline a LAC is able independently to make access control decisions. LACs are responsible for controlling the entrances, governing door opening times or requesting PINcodes at critical access points. The third tier consists of card readers which, like the Controllers, are identical across all BOSCH access controls. They provide not only a consistently high degree of security, but also a simple upgrade and expansion path for the system, protecting previous investments. Access PE multi-user version allows multiple workstations to control the system. Customizable user rights levels regulate access and guarantee security. In this way it is possible, for example, to maintain card data from one workstation whilst using another to verify whether an employee is present in the building. Access PE offers exceptionally flexible configuration of access rights, time models and entrance parameters. The following list gives an overview of the most important features: Quick & Easy card Assignment 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition General - Configurator | en 13 Cards (up to three) can be assigned to persons either manually or using a dialog reader connected to a PC via a serial connection. All assigned cards are active. When upgrading cards the old card is automatically overwritten and becomes invalid, thus preventing old cards from gaining access even if those responsible forgot or were unable to cancel them. Access Rights (including Group Privileges) Each person can inherit group privileges as well as having individual rights assigned to him. Privileges can be restricted by area and time to an accuracy of one minute. Group privileges can be used to grant and limit access rights for any or all cardholders simultaneously. Group privileges can be made dependent on time models which restrict their access to certain times of day. Access tracking By defining Areas it is possible to track and enforce a correct sequence of accesses. Even without monitoring, this configuration makes it possible to display a cardholder's location. Anti-Passback When a card has been read it can be blocked for a defined period from entering at the same access point. Hence it is possible to prevent "passback", where a user hands his card back across a barrier to provide access for an unauthorized person. Automatic Cancelation of cards upon Expiration Visitors and temporary staff frequently require access for a limited period only. cards can be registered for a specific time period, so that they automatically lose their validity when that period expires. Time Models and Day Models Bosch Access Systems GmbH 2015-11 | | Configuration Manual 14 Access Professional Edition en | General - Configurator A cardholder can be assigned to specific time models which regulate the hours in which that person has access. Time models can be defined flexibly using day models which determine how specific weekdays, weekends, holidays and special days deviate from normal working days. Identification via PIN-Code Instead of a card a person can use a special PIN-Code to enter. Verification via PIN-Code Particularly sensitive areas can be programmed to require additional PIN-Codes. This protection can in turn be made dependent on time models, so that, for instance, a PIN-Code is only required for access during holiday times or outside of defined working hours. Flexible Door Management Flexible parameterization of individual door models allows an optimum balance between security and comfort. The "shunt" or alarm suppression period can be individually specified to regulate for how long a door may remain open. In cooperation with an alarm system the access point can then optionally be locked. Periodic Door Release In order to facilitate access, door alarms can be shunted to release doors for specific periods. Door release periods can be defined manually or automatically via a time model. Time and Attendance Access points can be parameterized to record ingress and egress for time & attendance purposes. Card Design The graphical add-in module Card Personalization (CP) is fully integrated into the Access Control system to allow the operator to create cards without switching applications. Assignment of Photos If the add-in module Card Personalization (CP) is not activated photographic identification can nevertheless be imported and associated with cardholders. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition General - Configurator | en 15 Offline locking system Areas which are not covered, for whatever reason, by the highavailability online access control system can nevertheless be locked offline. Administration of video devices Entrances can be equipped additionally with cameras to identify and track the movements of persons using them. 2.2 User Login – Start the user applications using the desctop icons: Personnel Management Configurator Logviewer Map and Alarm Management Video Verification or choose the tools via : Start > Programs > Access Professional Edition – Start the : Map & Alarm Management application using the desctop icon or via : Start > Programs > Access Professional Edition > Map & Alarm Management. – Start the : Video Verification application using the desctop icon or via : Start > Programs > Access Professional Edition > Video Verification. – Start the : Configurator application using the desctop icon or via : Start > Programs > Access Professional Edition > Configurator. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 16 Access Professional Edition en | General - Configurator – Start the : Logviewer application using the desctop icon or via : Start > Programs > Access Professional Edition > Logviewer. – Start the : Personnel Management application using the desctop icon or via : Start > Programs > Access Professional Edition > Personnel Management. The system's applications are protected from unauthorized use. A login with a valid username and password is required in order to invoke the dialog-based subsystems. The upper drop-down list can be used to select the desired interaction language. The default is that language which was used to install the application. If there is a change of user without restarting the application then the previous language is retained. For this reason it is possible for a dialog box to appear in an undesired language. In order to avoid this, please log in to Access PE again. Access PE applications can be run in the following languages: – English – German – Russian – Polish – Chinese (PRC) – Dutch – Spanish 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition – General - Configurator | en 17 Portuguese (Brazil) Notice! All facilities such as device names, labels, models and userrights schemes are displayed in the language in which they were entered.Similarly buttons and labels controlled by the operating system may appear in the language of the operating system. If a valid username/password pair are entered then the button : Change Password appears. This can be used to start a new dialog to change the password. The button Start the application checks the user's privileges and, based on these, starts the application. If the system is unable to authenticate the login then the following error message appears: : Wrong username or password! Login via Personnel Management If the user is already logged into the Access PE Personnel Management application, and if the user's rights include the other tools, he can start the : LogViewer, : Configurator, : Alarm Management and : Video Verification using the toolbar buttons. If the user is already logged into the Access PE Personnel Management application, and if the user's rights include : LogViewer, then : LogViewer may be invoked directly using the button in the tools list, without requiring a separate login to the LogViewer application. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 18 Access Professional Edition en | General - Configurator If the user is already logged into the Access PE Personnel Management application, and if the user's rights include : Configurator, then : Configurator may be invoked directly using the button in the tools list, without requiring a separate login to the Configurator application. If the user is already logged into the Access PE Personnel Management application, and if the user's rights include : Video Verification, then : Video Verification may be invoked directly using the button in the tools list, without requiring a separate login to the Configurator application. If the user is already logged into the Access PE Personnel Management application, and if the user's rights include : Alarm Management, then : Alarm Management may be invoked directly using the button in the tools list, without requiring a separate login to the Configurator application. 2.3 Menu and Tool bar The following functions can be invoked via the menus, the icons in the toolbar or specific keyed shortcuts. Function Icon/ Description Shortcut Menu File New Clears all configuration dialog Crtl + N boxes (except for default settings) in order to define a new configuration. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Function General - Configurator | en Icon/ 19 Description Shortcut Open... Opens a dialog box to select a Crtl + O different configuration for loading. Save Saves changes into the current configuration file. Crtl + S Save as... Saves the current configuration into a new file. Activate Activates a loaded configuration Configuration and saves the hitherto active configuration. Send Propagates saved configuration Configuration to changes to the LAC-Service. LAC List recently Opens configurations directly, active circumventing the Open configurations function's selection dialog. Exit Shuts down Access PE Configurator. Function Icon/ Description Shortcut Menu View Tool bar Toggles display of the tool bar (default = on). Status bar Toggles display of the status bar at the bottom edge of the window (default = on). Bosch Access Systems GmbH 2015-11 | | Configuration Manual 20 Access Professional Edition en | General - Configurator Function Icon/ Description Shortcut Menu Configuration General Opens the General Settings dialog for setting up Controllers and general system parameters. Input signals Opens the dialog box for parametrizing input signals. Output signals Opens the dialog box for parametrizing output signals. Entrances Opens the Entrances dialog for parametrizing doors and card readers. Areas Opens the Area Configuration dialog for dividing the protected installation into virtual areas. Holidays Opens the Holidays dialog box for defining holidays and special days. Day Models Opens the Day Models dialog box for defining time periods within a day for the activation of access functions. Time Models Opens the dialog Time Models for defining timezones dependent on days of the week or calendar. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Function General - Configurator | en Icon/ 21 Description Shortcut Personnel Opens the dialog box Personnel Groups Groups for dividing personnel into logical groups. Access Opens the dialog box Access Authorization Authorization Groups for Groups defining groupings of authorizations to entrances. Offline locking Opens the Offline locking system system dialog for configuring special elements of the installation (Entrances, Time models, Authorization groups). Display Texts Opens the dialog box Display texts for editing the texts to be displayed at the card readers. Log Messages Opens the dialog box Log Messages for editing and categorizing log messages. Additional personnel fields Opens the dialog box Additional personnel fields for defining data fields for personnel. Wiegand - cards Opens the dialog box Wiegandcards for defining the structures of card data. Administering Opens the Video devices dialog video devices for configuring cameras to be used in video verification. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 22 Access Professional Edition en | General - Configurator Function Icon/ Description Shortcut Map Viewer and Opens the Map Viewer for an Alarm areal view of maps and control management devices and the alarm list for alarm handling. Menu ? (Help) Help topics Opens this help text. About Access Displays general information Professional about Access Professional Edition - Edition - Configurator Configurator 2.4 General system settings General system settings are displayed below the list of controller settings. These are valid for all installations. Parameter Default Description value Country Code 00 Customer Code 056720 2015-11 | | Configuration Manual Some card data are appended to the manually entered card number. Bosch Access Systems GmbH Access Professional Edition Parameter General - Configurator | en Default 23 Description value Poll interval on 200 The time interval in milliseconds serial between pollings by the LAC- connected LAC Service to verify intact in ms connections to a controller. Read-Timeout 500 on serial 1 to 500 Possible values for read- connected LAC timeout: 1 to 3000 in ms Create TA data Range of values for poll interval: 00:01 at Specification of the time at which the Time & Attendance data file should be created. Export deactivated When activated this option personnel and causes time & attendance data TA data to written continuously to the export file. When not activated the data file is created at the time specified by the parameter Create TA data at. The file containing attendance time-stamps is created in the following directory: C:\Program Files\Bosch\Access Professional Edition\PE\Data \Export Under the name TA_.dat Bosch Access Systems GmbH 2015-11 | | Configuration Manual 24 Access Professional Edition en | General - Configurator Parameter Default Description value Show welcome/ activated Given appropriate reader type leaving and settings (Arriving, Leaving message or Check ok in the Entrances dialog) the reader will display those welcome and leaving texts which are stored for the cardholder in the Personnel Data dialog of the Personnel Management application. Does not apply to Wiegand readers. Show aktiviert Readers with display will show cardholder the Display Name as stored in name in display the cardholder's Personnel Data. Does not apply to Wiegand readers. Number of digits 4 Determines the number of digits a verification or arming PIN requires. This setting applies also to the door PIN which can be set during the configuration of entrances. Possible values: 4 to 8 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Parameter General - Configurator | en Default 25 Description value use separate If no separate IDS PIN is set, IDS PIN then a verification PIN can be used to arm the IDS. Only if the check box is selected do the input fields for the arming-PIN become active in the Personnel dialog screen. In this case the verification PIN can no longer be used to arm the IDS. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 26 Access Professional Edition en | General - Configurator Parameter Default Description value Count of retries 3 Number of failed attempts to before blocking enter the PIN. If the cardholder mistypes the PIN this many times then s/he will incur a system-wide block which can only be removed by an authorized system user (Personnel Management). Possible values: 1 to 9 Directory paths C:\Program These are the default paths. The to: Files directories for import, export Database \BOSCH and image files can be changed. Log file \Access Import files Professiona Export files l Edition\PE DLL files \Data... Image data \Db Test-Logging \MsgLog \Import \Export \Dll \Pictures \Log Notice! When using Wiegand controllers and readers, in order to use Identification-, arming- or door-PINs the Wiegand card definition PIN or Card (Nr. 6) needs to be activated. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition 2.5 General - Configurator | en 27 Layout of the main dialog The dialog consists of the following parts: 1= Menu bar — contains dialog functions displayed according to the menu order. 2= Toolbar — contains shortcut keys for the most important dialog functions. 3= Title bar — conforms to Windows standard and contains buttons for minimizing or closing the dialog window. The name of the registered user appears in square brackets. 4= Personnel table — lists all people known in the system along with their attendance status (authorization and location). Bosch Access Systems GmbH 2015-11 | | Configuration Manual 28 Access Professional Edition en | General - Configurator 5= Dialog field — the first time this field is opened or when no user is logged in, it shows a neutral image (map of the world). When an entry is selected from the Personnel list, this person's data is displayed. 6= Online swipe — lists the last five people (with database image) that have swiped their cards at the entrance selected. 7= Device status — lists the configured devices and entrances along with their connection status. Enables door control functions. 8= Event display — faults are indicated by a flashing red bar (flashes three times) with details on the cause. 9= Status bar — displays information on buttons and menu entries that are controlled with the cursor. Status display on card personalization program (CP), dialog readers and LAC service. When you enable the Video Verification component, additional facilities will be added to this dialog; see Personnel Management. When you enable the Video Verification component, additional facilities will be added to this dialog. 2.6 Menu and tool bar The following functions are available via the menus or the icon buttons. Function Icon Description Menu Options Refresh 2015-11 | | Configuration Manual Refreshes the Personnel list Bosch Access Systems GmbH Access Professional Edition Function Exit General - Configurator | en Icon 29 Description Exits the Access PE Personnel Management application Menu Persons New person Opens a blank personnel and card data dialog Modify person Opens the personnel and card data dialog with the data of the selected person. Delete person Deletes the selected person (after confirming a safety check dialog). Transmit selected Transmits the selected person's person to the LAC data to the LAC service and service reports success. Transmit all Transmits all persons' data to persons to the the LAC service and reports LAC service success. Set all persons Sets all persons absent (after absent confirming a safety check dialog). Set location of all Sets the location of all persons persons present to unknown and deactivates to unknown access tracing for the next booking of each person. View/print reports Calls the dialog for creating report lists. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 30 Access Professional Edition en | General - Configurator Function Icon Description List Restricts the persons shown to control those of the selected group. Menu View Symbol bar Toggles display of the tool bar. Default = on. Status bar Toggles display of the status bar. Default = on. Personnel data: Choice of columns displayed in State the personnel overview in Card No. addition to symbol and name Personnel-No. columns. Company Default = State - Company - Personnel Group Location Phone Location Menu Door management open door These The entrance selected in the functio device list is displayed and can ns are be opened (one-off). also availabl e via 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition General - Configurator | en Function Icon Long-term open the lock door 31 Description The entrance selected in the context device list is displayed and can menu be opened (long-term). (right click on the desired The entrance selected in the device list is displayed and can be locked. door/ entranc e) Menu Tools User logon Log in/off Personnel management. Execute the Executes Configurator and Configurator transfers data from personnel management. Execute log Executes Log viewer and viewer transfers data from personnel management. Execute Video Starts the application for verification executing video verification. Execute Alarm and Starts the Map viewer and Map management Alarm management processing application. Video panel Shows four displays in the dialog field for individual video camera feeds. Properties Opens a dialog box for general system settings. Menu ? (Help) Bosch Access Systems GmbH 2015-11 | | Configuration Manual 32 Access Professional Edition en | General - Configurator Function Icon Description Help topics Opens this help file. About Access Displays information about Professional Personnel Management. Edition Personnel Management 2.7 Layout of the main dialog 1= Menu bar - Contains all dialog functions arranged in menus. 2= Tool bar - Contains the most important dialog functions as icon buttons 3= Title bar - Conforms to Windows standard and contains buttons to minimize and close the main dialog window. The name of the current user is displayed in square brackets. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition 4= General - Configurator | en 33 Device status - List of the configured devices and entrances along with their connection status. 5= Message list - List of messages arrived hitherto. The display can be modified by specific filter settings. 6= Filter selection - Predefined and customized filters can be selected from the combo-box. 7= Alarm activation - Triggers the activation/ deactivation of alarms for messages. An incoming message can be accompanied by an acoustic signal. 8= Status bar - Dates of the log files opened. Status of the LAC Service. Alarm settings. 2.8 Menu and Tool bars The following functions are available for log evaluation via menus and icon buttons. Menu Function Icon Description button File Print... Print the log messages displayed Exit Closes the LogViewer application. Filter Bosch Access Systems GmbH Filter Opens the message definition filtering dialog. 2015-11 | | Configuration Manual 34 Access Professional Edition en | General - Configurator Menu Function Icon Description button Continuous Starts continuous mode on message display. This icon is only active when the function is not already running and the message filter is set to the current day. Continuous message display is the default setting. Continuous Pauses the continuous mode off message display. This icon is only active when continuous message display is running. Events Switch to previous previous day's messages. day View Events next Switch to next day's day messages. Symbol bar Hides/Displays the tool bar. Default = on. Status bar Hides/Displays the status bar. Default = on. without a menuitem 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Menu General - Configurator | en Function Icon 35 Description button ? (Help) 2.9 Help topics Opens this help file. About Opens Help About LogViewer Access PE LogViewer. Enrollment Configuration Enrollment Readers (RS 232) > Tools > Settings calls a dialog in which it is possible to perform basic configuration tasks (activate, modify) from any workstation. – Administrative workplaces, where persons are assigned cards, can be fitted with an enrollment reader. This must be parameterized and configured according to the manufacturer's specifications, or those delivered with the device. If an enrollment reader is set up then manual card checking is deactivated. The required settings for supported readers are: Reader name BAUD D P S DELTA 1200 Prox RS232 9600 8 N 1 DELTA 1200 iClass RS232 57600 8 E 1 DELTA 1200 USB Hitag, Legic, Mifare 9600 8 N 1 DELTA 1200 RS232 Hitag, Legic, Mifare 19200 8 N 1 Rosslare ARD-1200EM USB 9600 8 N 1 LECTUS secure 5000 MD 9600 8 N 1 Bosch Access Systems GmbH 2015-11 | | Configuration Manual 36 Access Professional Edition en | General - Configurator D= Data bits N= none P= Parity E= even S= Stop bits O= odd – Chip card system Displays the card technology — MIFARE classic and Hitag1 can be used for Access PE. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition – General - Configurator | en 37 If the system has been installed with the optional Card Personalization (CP) module then the corresponding check box is selected in settings. Unchecking this box blocks all functions for card design/creation. – In addition the automatic transfer of personnel data via Connection to the LAC Server is also checked. This box should always remain checked. – The display of card information during card assignment can be disabled here. This display is only necessary when, contrary to default settings (see General Settings in Access PE Configurator) card data are required which do not conform to the company standard settings. 2.9.1 Enrollment via AMC connected readers Make sure that at least one reader is configured with a Door Model 06c, which is the door model for enrollment. Start the Configuration Browser and select a Local Access Controller (LAC) (e.g. AMC2…) Bosch Access Systems GmbH 2015-11 | | Configuration Manual 38 en | General - Configurator Access Professional Edition Click the Entrances symbol an add a new Entrance reader: 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition General - Configurator | en 39 The dialog window Define Entrance opens: Bosch Access Systems GmbH 2015-11 | | Configuration Manual 40 en | General - Configurator Access Professional Edition In this dialog: – Enter a Description (e.g. Enrollment Reader AMC) – Select a LAC and a group ID (GID) – Select a reader type (e.g. Wiegand) – Select a number between 1 and 8 as Access Reader Address Click OK to conform the enrollment configuration. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition General - Configurator | en 41 To assign the configured enrollment reader to a specific workstation, you have to change tot he APE client. – Select Tool > Properties. Select an available enrollment reader to activate the enrollment process. Confirm that your enrollment reader is online. If you don’t get an immediate response, restart the Personnel Management dialog. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 42 en | General - Configurator 2015-11 | | Configuration Manual Access Professional Edition Bosch Access Systems GmbH Access Professional Edition 3 Configurations | en 43 Configurations The composition of a system (what entrances there are where, how many readers and of what type, how access authorizations are set up etc.) is saved in special files. Any number of these configuration files can exist — however, only one can apply to the current system. This makes it possible to test new scenarios, carry out test runs and carry out quick system changes. 3.1 Creating new configurations All Access PE configurations are stored in the folder C:\BOSCH \Access Professional Edition\PE\Data\Cfg (unless non-default paths and folder names are chosen during installation). Two configuration files are created by the installation, namely Active.acf and Default.acf. Whereas Active.acf contains example data, which may be helpful to the user, Default.acf contains only predefined system data. System data include: – The area --outside--. – Example holidays and special days – The personnel groups Employees and Visitors – Display texts for readers. – Logbook texts Upon startup Access PE always uses the configuration Active.acf. A configuration may find itself in different states, and it is important to distinguish between them – An Active configuration is one whose definitions, settings etc. are currently being used by the running system. – An Open (aka loaded) configuration is one which is currently being edited by system users. It may later be stored in a separate .acf file and/or later activated, but until it is activated it has no influence on the running system. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 44 Access Professional Edition en | Configurations Any number of configurations can be defined and stored in Access PE. Because new configurations can be created and modified independently of the running system, it is possible, for example, to define new areas which will be included in the monitored installation at a later date. Using the button in the toolbar the default configuration Default.acf, with its basic settings, can be opened (loaded). If modified to create a new configuration it should be saved under a different and appropriate name. The button starts a file-saving dialog in the Cfg directory. The default filename untitled.acf should be replaced by a more explanatory filename. Warning! ! The default configurations active.acf and default.acf should never be renamed or overwritten. Always store modifications of default.acf under a new name. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition 3.2 Configurations | en 45 Opening configurations Configurator is always started with the configuration Active.acf. If a different configuration is to be used, then the button can load an existing configuration from the folder C:\BOSCH\Access Professional Edition\PE\Data\Cfg (by default). If the user wishes to make changes to or expand an existing configuration to be activated at a later date, then s/he can open a basic configuration, modify it and then save it under a different name. In this way it is possible to re-use and expand upon previous configurations, and one does not have to start every time from the very basic settings in default.acf. Notice! The active configuration too can be saved as a working copy under a new name, and this loaded and worked on at a later date. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 46 Access Professional Edition en | Configurations Activating a new configuration 3.3 Configurator offers the possibility of maintaining multiple configurations in multiple .acf files. The active configuration is always stored in the file Active.acf . Caution! ! As active.acf is overwritten when a new configuration is activated, it is urgently recommended that the user make a backup copy of the active configuration under a new filename. Configuration files must be opened before they can be activated. Therefore a previously modified and saved configuration should be opened. In order then to activate the opened configuration please proceed as follows, either: – Menu: File > Activate configuration or – Use the button in the toolbar. The activation then proceeds in stages: – First confirm the safety check. : Do you really want to replace the current configuration with the new configuration? – The hitherto active configuration is backed up as a file with the name format: $yyyyMMddhhmmss -Active.acf (y = year; M = month; d = day; h = hour; m = minute; s = seconds). – The currently open configuration is then stored under the filename Active.acf i.e. the old active configuration will be overwritten! A information box shows the name of the saved file: : New configuration was saved as ! 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition 3.4 Configurations | en 47 Propagating configurations to the controllers After making changes in the active configuration Active.acf it is necessary to propagate these changes down to the controllers. This can be started in two ways: – Menu File > Send configuration to LAC service – Using the button in the toolbar The following dialog appears, in which you can choose which configuration data will be propagated to the controllers. Modified and saved data are preselected. You may select further items or deselect already selected items. When you have selected which data should be propagated to the controllers then click OK. Configuration data Propagation to the LACs becomes necessary if... General refresh ... log messages, additional fields or card definitions have been modified. System parameters ... LAC-Hardware has been modified. Time models ... Holidays, Day or time models have been modified Reader texts Bosch Access Systems GmbH ... Display texts have been modified. 2015-11 | | Configuration Manual 48 Access Professional Edition en | Configurations Configuration data Propagation to the LACs becomes necessary if... Door parameters ... at Entrances, one or more of the following have been modified – the opening time (in 1/10 sec.) – the door contact – data relating to door control (opening times, contacts, time profiles etc.) Reader parameters ... at Entrances, one or more of the following have been modified – data for the entry or departure readers – alarm suppression time (in 1/10 sec.). – anti-passback behavior of the entrance – Door configuration buttons to open the door ... at Entrances, the door model has been modified. Notice: Reinput and modification of the address (serial number, reader-type) can only be carried out in the input mask Define Entrance. Signal definitions ... parametrization of input or output signals has been modified Authorization ... authorization groups without time groups models have been modified, or a new time model added or deleted. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Configuration data Configurations | en 49 Propagation to the LACs becomes necessary if... Personnel data ... personnel data has been added or modified, or access authorization groups or time models have been modified. Complete .. the initial configuration of Access PE configuration has been concluded. A reset of the including LAC controller can also cause the complete service restart configuration to be downloaded to the controllers. LAC service restart ... in general settings the polling interval or the time for saving the TA data file has been modified. LAC service stop This option should only be used in exceptional circumstances, e.g during deinstallation in order to avoid a restart of the computer. Configurator sends a command to the : LAC Service to propagate the configuration data to the controllers. The LAC Service is responsible for the communication to and from the controllers. This program is set up at installation time, as a Windows Service which is automatically started upon booting. Successful propagation to the LAC Service is reported as follows: Bosch Access Systems GmbH 2015-11 | | Configuration Manual 50 4 Access Professional Edition en | Controllers Controllers The Local Access Controllers (LACs) are the points in Access PE at which most access control decisions are made. Except for system-wide control functions, such as the access sequence check, the controllers can take independent decisions regarding who is granted access. For this reason, they have all accessrelated data in their own memory so that limited and restricted offline operation is also possible. In Access PE it is predominantly AMC2 (Access Modular Controller) controllers that are used. For replacements within legacy systems, LACi (Local Access Controller integral) controllers can also be configured. 4.1 Defining and modifying new controllers The buttons (add) and (modify a selected list element) invoke a dialog box for configuring the interfaces between Access PE Server and the controllers. Every controller must have a protocol assigned to it. The following are settings are available: 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition COM Controllers | en 51 Connection via a serial (COM) interface requiring the COM interface number (COMx) CIP Connection via TCP/IP over COM requiring the virtual COM interface number (COMx); only available for LACi with IP/Serial transducer. UDP Connection via UDP requiring the local UDP port and the IP-Address (or the network name under DHCP). Notice! Please ensure that when using CIP or UDP interfaces the DIL address switch on the controller at position 5 is set to ON. Depending on which protocol is chosen different additional settings will be required, as shown in the following table: Bosch Access Systems GmbH 2015-11 | | Configuration Manual 52 Access Professional Edition en | Controllers Paramet COM CIP UDP Note 1 to 8 1 to 8 always 1 When using er Address COM or CIP the DIL-switch on the Controllers must have the same address setting. Local Deacti- UDP-Port vated Deacti- consecutiv The port via vated e which the Access PE server is to receive data from the controller. A new controller will receive the next free port, depending on its position, but this entry can be overwritten. Remote- Deacti- Deacti- IP address In networks IP- vated vated or network using DHCP the Address name newtwork name should be used, otherwise the IP address of the controller. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Paramet Controllers | en 53 COM CIP UDP Note Remote- Deacti- Deacti- unmodifia The port on the IP-Port vated vated ble value controller to 10001 receive data er from the server. COM- Pull-down Pull-down The number of Port list of list of the COM port COM- COM- on the Access Ports Ports PE server to which the controller is connected. LAC-Type Pull-down Pull-down Pull-down list of list of list of Controller Controller Controller s s AMC-Wiegand The following controller types are available: s with Wiegand reader interface AMC-RS485-BG900 with RS485 reader interface AMC-RS485-L-BUS with RS485 reader interface for IBPR reader LACi-BG900 with RS485 reader interface Bosch Access Systems GmbH 2015-11 | | Configuration Manual 54 Access Professional Edition en | Controllers Paramet COM CIP UDP Note er LACi-L-Bus with RS485 reader interface for IBPR reader Program none none none may be used to version specify the (Project) software version Time Combo box for specifying the time offset from the offset server in cases where the AMC is in a different time zone. Possible values are -12:00 to +12:00 in 30 minute intervals. All times transmitted from the server to the AMC (or vice versa) are adjusted by this offset. Local AMC times are used in event messages and can be viewed in the Event Log. Controller (LAC) Test Having made the settings the reachability of each controller can be tested before saving. Thus any incorrect settings can quickly be found and corrected or completed. The Test LAC button at the lower edge of the dialog box attempts to connect to the controller using the current settings. This test can also be performed, after defining the controller, by selecting it in the list box and clicking the button. The test displays one of three results using the icons below, which are also shown in the first column of the list. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Controllers | en 55 The controller has not yet been tested. Test was successful. A connection was made. Test was unsuccessful. Notice! These icons indicate only the result of the last test performed. They are not a continuously updated indicator of the reachability of each controller. A controller test consists of various phases, some of which may be skipped: – Startup the LAC-Services. – Download the LAC-Program – Wait states: – – Read configuration data from the controller. – Receive a status message from the controller Display the result of the connection attempt. Depending on the result, the LAC-Service Status dialog is displayed. After clicking OK the test result is displayed in the list. 4.2 Controller Settings The dialog box General Settings, invoked by the button is where Local Access Controllers (LACs) are defined and configured. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 56 Access Professional Edition en | Controllers Buttons for the following functions are displayed across the top of the list: Add a new controller. Modify the selected controller. Test the selected controller. Delete the selected controller. The list field includes all created controller and shows the following informations: Column Contents , , or Description Result of the LAC Test: negative, not yet tested or successful No. 1 to 128 Number of the controller. Address 1 to 8 The configured address of the controller as set by its DIL switch. In the case of UDP protocol this is always 1. Type AMC-Wiegand, Selected controller AMC-4R4 BG900 type. AMC-4R4 L-Bus LACi BG900 LACi L-Bus 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Controllers | en Column Contents Description Projectversion Example: 37.02 Special project 57 program version loaded by the Controller. Connection Example: Interface parameters: UDP.: 54545>AMC- Protocol: local UDP- DEMO: 10001>NONE Port>Nework name or IP-Address: Remote IPPort>COM-Port Serial-No. Example: 9999 9999 Serial-No. of the controller. Version Example: 37.02 Program version loaded by the Controller. The lower part of the dialog box contains general settings for all devices and applications in the Access PE installation. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 58 5 en | Signals Access Professional Edition Signals The controllers' input and output signals can be used, for example, to determine door states and control doors. Furthermore, these signals can also be used to associate additional control functions with access requests. This allows you to control and activate cameras, optical or acoustic signaling devices, and alarm systems. 5.1 Input signals Whereas door control and other control signals, along with status messages, are configured under Entrances, the Input Signals dialog is concerned with the detailed definition of signal types and their monitoring. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Signals | en 59 When this dialog is invoked the first controller is always displayed. Please use the como-box LAC and the consecutive numbering scheme to select the desired controller. The standard controller definition process creates 8 input and 8 output signals. If the controller is able to handle more than these, then the button : I/O boards +/- can be used to create further signals. All defined signals appear in the list. The settings for each signal are shown in the various columns of the list as well as in the parameter controls for the selected signal which appear below the list. All settings can be carried out both in the list and in the parameter controls below the list, as described in the following table. Column Parameter Description 1 (no - Describes the state of the signal: label) = Signal activated = Signal deactivated By double-clicking on the icon the status can be toggled back and forth Board Board Number of the board where the signal is located. 0 = Base board 1 = Extension board This parameter is not modifiable Signal Signal Number of the signal on the board (1 to 16). This parameter is not modifiable Bosch Access Systems GmbH 2015-11 | | Configuration Manual 60 Access Professional Edition en | Signals Column Parameter Description Signal Name Name of the signal. In the name standard settings each signal receives the name: Signal - A double click in this column allows the user to edit the name. Message Message on... Graphic display of the parameter State change setting in the List: (open / close): Alarm: (only possible for Signal type Analog) A double click in this column cycles through the message icons. Camera A camera from the selection list can be assigned to certain input signals. When the relevant signal is activated, a log book message is created; you can also use this message to retrieve camera images. - only on during time Shows the selected time model. time model A double click in this column model... allows the user to select from a list of time models Signal type The option Analog activates the Digital radio buttons to select the Analog resistance values. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Signals | en 61 Column Parameter Description R serial Serial A double click in this column resistance opens a list of resistance values. R par. Parallel resistance Selecting a serial or parallel resistance value automatically resets the signal type to Analog. Notice! Not all of the listed values can be combined with each other - a statement regarding the use of suitable resistance pairs can be found in the installation manual for the AMC2 device. 5.2 Output signals This dialog box is used to parameterize the output signals and, if necessary, to define further signal boards. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 62 Access Professional Edition en | Signals When this dialog is invoked the first controller is always displayed. Please use the combo-box LAC and the consecutive numbering scheme to select the desired controller. The standard controller definition process creates 8 input and 8 output signals. If the controller is able to handle more than these, then the button : I/O boards +/- can be used to create further signals. All defined signals appear in the list. The settings for each signal are shown in the various columns of the list as well as in the parameter controls for the selected signal which appear below the list. All settings can be carried out both in the list and in the parameter controls below the list, as described in the following table. Along with the settings described here it is possible to define additional conditions which must be fulfilled in order to activate the output signal. Column Parameter 1 (no name) - Description Describes the state of the signal: = Signal activated = Signal deactivated By double-clicking on the icon the status can be toggled back and forth. Board Connection Number of the board where the signal is located. 0 = Base board 1 = Extension board This parameter is not modifiable. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Column Signals | en Parameter Signal 63 Description Number of the signal on the board (1 to 16). This parameter is not modifiable. Signal Name Name Name of the signal. In the standard settings each signal receives the name: Signal - Signals which have been defined and activated in the Define entrance dialog are displayed here with their entrance names and their signal descriptions. A double click in this column allows the user to edit the name. Message Message on... Graphic display of the State change parameter setting in the List: A double click in this column toggles the setting on and off. - only in during time Display and selection of the time time model model. model... Bosch Access Systems GmbH 2015-11 | | Configuration Manual 64 Access Professional Edition en | Signals Column Parameter Description Type Action type: Three action types are available: Momentary Follow state Toggle A double click in this column cycles through the action types in the order shown here. Delay Delay Delay in seconds before the signal is transmitted [0 - 9999]. Duration Duration Delay in seconds before the signal is transmitted [0 - 9999 ; 0 = always or until halted by a cancellation message. Pulse Pulsating Activates pulse transmission, otherwise the signal is transmitted at a constant rate. A double click activates this option but marks it as undefined with a icon until duration and number of pulses have been defined. Thereafter it is marked with a Pulse Duration . Duration of the pulse. duration Pulse count Num. of Number of pulses per second. pulses 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Signals | en 65 Actiontype: Momentary Bosch Access Systems GmbH 2015-11 | | Configuration Manual 66 en | Signals Access Professional Edition Actiontype: Toggle 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Signals | en 67 Actiontype: Follow state A= polled state B= steady C= pulsed 1= delay time 2= action period 3= pulse width 4= pulse count (= 2) Bosch Access Systems GmbH 2015-11 | | Configuration Manual 68 5= 5.3 Access Professional Edition en | Signals max. activation time Defining conditions for output signals The dialog box Output signals offers, apart from settings, a way of defining additional conditions which allow the transmission of output signals only under specific circumstances. These special conditions are defined in the lower-right dialog area for those signals selected in the main list. Press the button to open the dialog below. You can use this dialog to configure the relevant conditions. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Signals | en 69 Depending on which activation condition is chosen it may be necessary to enter further information, e.g. the name of the door reader, before the dialog can be confirmed by clicking OK. You can apply any number of conditions to each signal. You must reopen the dialog for each new condition by pressing the button. Notice! It is only possible to select those signals and installations (entrances, readers, doors) which are connected to the controller whose output signal you are parameterizing. When defining the condition you can choose between the modes normal (if the condition needs to be fulfilled) and not (if the condition must not be fulfilled). Further conditions are made dependent on the first by choosing one of the operators and, and not, or or or not. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 70 Access Professional Edition en | Signals The conditions are processed in the order they are listed. If this order does not reflect the procedure required, conditions can be repositioned. Select the relevant condition from the list and then reposition it by pressing the or button. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Signals | en 71 What supplementary information is required for which condition can be found in the following table: Condition Further information required Input signal will be Information about the device type set where the signal is located. Input signal is set Selection of the board. Selection of the connection. Alert: Short circuit Alert: Connection broken Signal deactivated by time model Signal activated by time model Output signal will be set Output signal will be reset Door will be opened Door will be closed Selection of the entrance. GID (Group ID) is set automatically. Door opening unauthorized Door open too long Access Selection of the reader. Unauthorized, no access Bosch Access Systems GmbH 2015-11 | | Configuration Manual 72 Access Professional Edition en | Signals Condition Further information required time model active Selection of the time model. Sabotage at reader Selection of the reader. Sabotage at LAC No further information necessary. Sabotage at signal Selection of the board. extension board Power failure No further information necessary. Power ok Connection LAC -> APE established Connection LAC -> APE broken Message from reader Selection of the message from the predefined list. Selection of the reader. Message from device Selection of the message from the predefined list. Selection of the board. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Bosch Access Systems GmbH Signals | en 73 2015-11 | | Configuration Manual 74 5.4 Access Professional Edition en | Signals Creating Extension boards You can configure extension boards in the dialogs for both input signals and output signals. The settings configured in one dialog will be activated in the other. You can use and configure three types of extension board in the Access PE access control system — all three types are processed via one of the signal dialogs. – AMC2 4W-EXT - to extend the interfaces of a Wiegand AMC (AMC2 4W) – AMC2 8I-8O-EXT — 8 further signals each – AMC2 16I-16O-EXT — 16 further signals each Above the list window please select the desired Controller from the LAC combo-box. These controllers are created with 8 signals on the main board (=0). To create the extension board click the button marked I/O Board +/- , which will bring up the following dialog: 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Signals | en 75 By checking one or two of the boxes the following settings can be made: – AMC Main Board (Signals 9 - 16) Creates a Wiegand Extension board AMC2 4W-EXT. This board has the same interfaces as an AMC2-4W controller (4 Wiegand reader interfaces, 8 input and 8 output signals). However it can not function independently and must be connected to an AMC2-4W. This extension can only be used with an AMC2-4W. An AMC2 4W-EXT can be configured with one additional IOBoard. In the list field for the input and output signals the extension board, like the controller itself, is given the board number 0, and the signals numbered 9 through 16. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 76 Access Professional Edition en | Signals – AMC Extension Board IO8 Board with 8 input and 8 output signals as an extension to the controller's interfaces. This board can be connected to any AMC2 controller and, when used with an AMC2-4W controller, can even be combined with a Wiegand extension board AMC2 4W-EXT In the list field of the input/output signals the extension board is created with the board number 1 and signals numbered 1 through 8. – AMC Extension Board IO16 Board with 16 input and 16 output signals as an extension to a controller's own interfaces. This board can be connected to any AMC2 controller and, when used with an AMC2-4W controller, can even be combined with a Wiegand extension board AMC2 4W-EXT In the list field of the input/output signals the extension board is created with the board number 1 and signals numbered 1 through 16. Notice! The settings made here for I/O boards apply equally to input and output signals, and can be made in either of the two dialogs. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition 6 Entrances | en 77 Entrances When we talk about entrances, we always mean a whole made up of several components that belong to an access control system. Along with the door (which can also be a turnstile, a mantrap, a barrier or an elevator), the system also includes one or more readers and potentially buttons and control units (bolts, motorlocks etc.). The system can also contain optical or acoustic signaling devices or cameras as additional control functions. 6.1 Creating and modifying door models A new entrance can be defined using the button or via the context menu within the list (right-click and select New Entrance). The entrance name, the door model or device addresses of the selected door can be edited using the button, via double click or again via the context menu (right-click and select Change Entrance). Bosch Access Systems GmbH 2015-11 | | Configuration Manual 78 en | Entrances Access Professional Edition When defing an new entrance a name must be given, which should be unique and as descriptive as possible, because it will be used to define authorization groups and individual access rights in Personnel Management. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Entrances | en 79 It is also necessary to select the number of the controller to which this entrance is connected, and the Group ID (GID). In general only the number of the controller requires attention, because Access PE automatically assigns the next free GID. A suitable door model must be chosen from the combo-box Door model. Please consult the Appendix for a table of predefined door models and their functionalities. Depending on the door model combo-boxes are displayed for entry and exit readers, where reader types must be selected. Each reader must receive a unique address within its controller. For readers with Wiegand interface only the number of its own controller's interface is required. For readers with RS485 interface the assigned DIP-address is essential. The button : Search device data can be used to collect and display a list of the readers on the current controller. When collected these data are stored in cache, and can be retrieved by the : Device data from cache button. If the configuration is changed the cache will no longer be current and the list will need to be re-collected. Notice! Please ensure that the reader addresses concur with the devices actually installed. You can connect a maximum of four readers of type AMCWiegand, and eight of type AMC-RS485 and LACi. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 80 en | Entrances Access Professional Edition Use of reader address 9: Reader address 9 has been set up as an aid to configuration, and serves as a buffer when rearranging parameters. If you have assigned all the reader addresses of a controller but still need to rearrange the parameters, then you can temporarily move a reader to address 9 in order to free another address. Example: You wish to swap readers 4 and 7. As you can not use the same address twice proceed by assigning reader 4 to address 9, move reader 7 to address 4, and finally move reader 9 (originally reader 4) to address 7. Signal definition Having selected the door model, all possible input and output signals are displayed in the list box. By selecting one of the elements and clicking the + button to the left of the list, or by double clicking on the list element, you will invoke a dialog box for the definition of signals. The signal selected from the list box is displayed for orientation. The effect of the signal is defined in the default settings of the parametrized controllers, but can be modified here if required. Additionally displayed are the board from which the signal emanates, and the number of the signal interface. For the enumeration of signals on the controller or an extension board please consult the relevant installation handbook for that device. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Entrances | en 81 Notice! You should ask the installing technician for a wiring plan/listing for the signals, which will enable you to parametrize the signals in Access PE accordingly. False correspondences to physical wiring can cause considerable problems with the control of entrances and the correct processing of their signals. The dialog box requires you to choose between DCU (Door Controler Unit), reader, LAC or AMC. If you choose DCU or reader it will be necessary to enter the GID and DID of the device. The following rules apply here: – Reader – GID = GID of the reader at the entrance – DID = 1 for the first entrance reader, = 2 for the second entrance reader, = 3 for the first exit reader, = 4 for the second exit reader – – – – Signal No. = Signal at the reader 1 ... 4 LAC Signal No. = Signal at the LAC 1 ... 16 AMC – On board = Board No.. 0 or 1 – Signal No. = Signal at the AMC 1 ... 8 or, in the case of extension boards, 1 ... 16 In the list box the parametrized connections are shown in their respective columns. The first colums contains icons representing the status of the signals: Input signal not set Input signal set Output signal not set Output signal set Bosch Access Systems GmbH 2015-11 | | Configuration Manual 82 en | Entrances Access Professional Edition A previously defined signal can be deleted using the - button. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition 6.2 Entrances | en 83 Display and parameterization All those entrances known to the system are shown in a list on the left hand side. By clicking one of the listed entrances the data for that entrance will be shown in the parameter fields on the right. The following buttons are situated along the top of the list box: Add an entrance Modify an entrance. Delete an entrance The following connections are shown at the top of the parameter fields. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 84 Access Professional Edition en | Entrances LAC Sequential number of the controller assigned to this entrance. GID Group Number of this entrance with its door(s) and reader(s) Model The door model and description. These entries can be modified by clicking the button or double clicking on an entrance in the list. The following door parameters can be set: Door Parameter Description Activation time If no door frame contact has been in 1/10 s configured then the door opener will be activated for the duration set here. Otherwise the activation of the door opener will cease as soon as the frame contact sense that the door is open. Default value = 40 Open time in Maximum time for which the door may 1/10 s remain open before sending the signal "Door open too long" . Default value = 300 Camera If the entrance is equipped with a CCTV activation time camera then it will be activated for the in 1/10 s duration set here. Default value = 100 Alarm Duration of alarm supression (shunt) suppression before the door opener is activated. The time for control alarm suppression time is only effective if mechanism in the time set is greater than 0. 1/10 s Default value = 0 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Entrances | en Door Parameter Description Door contact If the door has a frame contact then this 85 can be parametrized to facilitate monitoring the entry of a person. At the same time, the signal to activate the door opener is turned off if the door contact shows that the door is open. This signal is also used to control the alarm suppression time. Bolt contact If the door has a bolt contact sensor then this can be parameterized to show whether the door is really closed. Part of a door- This parameter indicates whether the door complex is part of a door-complex, e.g. a "mantrap" or airlock. In this case the signals for the door-complex can ensure that both doors are never open simultaneously. If only one door is defined as part of a door-complex then the synchronisation is not active. Intrusion events Here you can parameterize whether a signal should be sent in the event of unauthorized door opening. A prerequisite for this is the existence of a door contact. Door status Provided the entrace has a door contact events the system can be parameterized to signal every open/close event. The following reader settings can be parameterized for an entrance: Bosch Access Systems GmbH 2015-11 | | Configuration Manual 86 Access Professional Edition en | Entrances Reader Settings Description Entry and exit readers Access only Only general access events are created by the reader. Arriving When accessing through this card reader a time and attendance (TA) booking is made and the person is booked as being present. Leaving When passing through this card reader a time and attendance (TA) booking is made and the person is booked as being absent. Bookings created by readers which are configured for time and attendance are recorded daily in a file in the directory C: \Bosch\Access Professional Edition\PE\Data\Export (default path). A file named TA_ .dat is created, which can be edited. Fields are separated by a semicolon and can thus be edited by 3rd party spreadsheet applications, for example. Each booking record contains the following data: Last name; First Name; Company; Personnelno.; Card no.; Additional fields 1-10 (if parametrized); Name of the entrance; Date (yyyymmdd); Time (hhmmss plus the letter "s" to indicate daylight-saving time); Direction of passage expressed numerically (1 = Arriving, 2 = Leaving); Direction as a text string (ENTER, LEAVE) 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Reader Settings Entrances | en 87 Description Entry and exit readers Check OK Only for entry readers. This parameter enables a reader to be set up as release reader to unblock the cards of personnel who have been selected for random screening. It is important to ensure that a release reader is not simultaneously configured to be a screening reader which randomly selects personnel for screening. Random personnel This parameter enables a reader to screening - Rate-% be set up as a screening reader to select cards randomly for personnel screening. As well as checking the box it is necessary to enter a percentage rate (1 to 99) for random screening. If no entry is made then all cards will be selected (100% screening). It is important to ensure that a screening reader is not simultaneously configured to be a release reader which unblocks cards blocked by screening readers. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 88 Access Professional Edition en | Entrances Reader Settings Description Entry and exit readers Anti-passback - This option blocks a card for the Timeout - Group id specified timeout period from reentering where it has just entered, unless an exit has been recorded in the meantime. This is to prevent misuse of cards by passing them back across a turnstile. Timeout in minutes between 1 and 999. Several readers can be combined in a group. An anti-passback is valid for each reader with the same group id. Possible values: two characters 0 - 9 and/or A - Z Entry as group - Only for entry readers. required number of This option grants entry only after a persons group consisting of at least this number of persons has presented their cards. Possible values 2-6. With keypad Check this box if the door reader possesses a keypad No time model check By default accesses are checked against time models. This behaviour can be circumvented by setting this parameter. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Reader Settings Entrances | en 89 Description Entry and exit readers Motor move-in This option should be activated when the reader has a card feeder. Push button - always This parameter enables the enabled recognition of a signal to open the door. This signal can come from a push button or from a telephone e.g. if no reader is available. always enabled: If normal settings are configured, the push button does not work when the security system is activated. This means that it is not possible to exit the monitored area. With this option the push button remains operational, even with an armed alarm system. If the push button is activated, this function includes an exit reader, too. Notice! Checks which go beyond the basic verification of authorizations and time models (e.g. access sequence checks, anti-passback checks, random screening) are carried out by the LAC subsystem process. To deliver this functionality the Access PE server must be running round-the-clock (24 x 7). The unlocking of the entrance can be configured with the following parameters: Bosch Access Systems GmbH 2015-11 | | Configuration Manual 90 Access Professional Edition en | Entrances Door unlock type Description Normal The door is locked and will be opened only if its reader is presented with a valid card. Long-term The door is open for a prolonged period, e.g. during daylight hours, or as long as the reception is continuously manned. Per time model The long-term unlocking of the door is linked to a time model in various ways: – Always per time model: The door is unlocked during defined duty periods. – After first use: After the first use within a duty period the door remains unlocked until the end of that period. – Activation via dialog: Long-term opening during a duty period is regulated by a special dialog-capable reader. Activation of This parameter specifies a time model to motor lock govern the activation of a motor lock at the entrance. (usually outside normal business hours). PIN-Code entry at the reader can be parameterized as follows: PIN-Code Description None No PIN-Code necessary. Always PIN-Code always necessary. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition PIN-Code Entrances | en 91 Description Per time model PIN-Code entry is dependent on the time model, as per one of the following variants: – Outside regular hours: Outside of time model periods PIN entry is necessary. – Outside regular hours and at first use: Outside of time model periods and the first time a person crosses the entrance PIN entry is necessary. PIN or card If the function is active, access can be obtained either by entering the door PIN or with a card. Door-PIN option to enter a door PIN — 4 to 8 figures (parameter setting — general system settings) Verification re-enter the door PIN per time model The option of alternative PIN entry can be restricted to certain days or times of day via a time model. Notice! The Identification- and Door-PIN variants cannot be used for door models with security system arming (DM 10 and 14). Bosch Access Systems GmbH 2015-11 | | Configuration Manual 92 6.3 Access Professional Edition en | Entrances Door models with special settings Door models with special settings Some door models require special information for setup or special modes of use. Door model 07: Elevator If this door model is selected then the dialog is expanded by several fields to include the set up of floors. A maximum of 16 floors can be defined. These floors can be assigned as Access Authorizations. Door model 14: Door with IDS rearming The configuration of this door model corresponds to that of all others, except that, along with access authorization for this entrance, authorization to arm and disarm the security system (IDS) itself is also assigned. These authorizations are typically assigned separately. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition 7 Areas | en 93 Areas The configuration of areas enables the system to locate persons and also to enforce a correct access sequence. In this way persons can be prevented from entering particular area by an unauthorized route. In general this function is used only for high security installations. On the left hand side a list of already defined areas is displayed. The following buttons are situated along the top of the list box: Add an area Modify an area Delete an area Bosch Access Systems GmbH 2015-11 | | Configuration Manual 94 en | Areas Access Professional Edition By default the installation process creates the area --outside--. No entrances can be defined for this area, because it denotes unmonitored territory. From this pre-installed area you can now define further areas. These are purely virtual constructs and need not correspond to real-world areas. The areas can consist of one or multiple buildings (e.g. Area Company ACME Inc.), or individual floors or even single rooms. Notice! The definition of a new area is always based on an existing area. The existing area selected in the list box automatically becomes the area source for the new area. This default can not be overridden, therefore it is important to select the correct area source in the list box when creating a new area. The name of the new area can be selected from the combo-box or a new name entered manually. Areas must be configured so that it is in fact possible to move from real source to real destination without gaps or missing entrances between. Example: From the predefined area --outside-- a person passes through the main entrance to the area Reception; from there to builidings A, B or C. Hence the areas in Access PE must be configured so that Reception is the area source for buildings A, B and C. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Areas | en 95 After creating a new area at least one entrance must be assigned to it, so that it is possible to enter the area. Two list boxes are provided on the right hand side of the dialog window for this purpose. The entrances in the not assigned entrances list are those available, i.e. those which have not yet been assigned to any area. By double clicking on the desired entance, or on the button, that entrance is assigned to the area currently selected in the left hand list. The button moves all the entrances in the lower list to the upper. Conversely, double clicking in the upper list, or using the or buttons, undoes the assignment. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 96 Access Professional Edition en | Areas Notice! An entrance can only be assigned to one area. If you have already assigned certain entrances to an area then they will no longer be available in the not assigned entrances list. The columns AM Entry and AM Exit refer to the Access Monitoring. If you wish to use your system for Access Monitoring then the entry and exit readers must be parameterized accordingly. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition – Areas | en 97 Select the entrance you wish to parametrize in the Entries to area list, and configure it as an entrance by clicking , or as an exit by clicking Monitoring. The buttons , to activate the Access and can be used to undo these configurations. The same functions are available through context menus (right click on an entrance in the list). Notice! Checks which go beyond the basic verification of authorizations and time models (z.B. access sequence checks, anti-passback checks, random screening) are carried out by the LAC subsystem process. To deliver this functionality the Access PE server must be running round-the-clock (24 x 7). Bosch Access Systems GmbH 2015-11 | | Configuration Manual 98 8 Access Professional Edition en | Personnel Groups Personnel Groups Personnel groups allow a logical structuring of your company's staff. For example newly created persons in the system can inherit standard bundles of user rights from predefined personnel groups. The list of all previously defined personnel groups appears on the left hand side. The following buttons are situated along the top of the list box: Add a new personnel group Modify the selected personnel group Delete the selected personnel group Two personnel groups are predefined by default: Employees and Visitors. These groups correspond to the default filters in the Personnel Management application of Access PE. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Personnel Groups | en 99 Thus it is possible to differentiate between different types of employee (e.g. white-collar, blue-collar, cleaning staff), and assign to such personnel groups standard bundles of user-rights in the Authorization groups dialog. Whenever a new employee is assigned to a particular personnel group s/he then automatically receives the corresponding group rights. The following parameters, on the right hand side of the dialog box, can be defined for the selected personnel group: Bosch Access Systems GmbH 2015-11 | | Configuration Manual 100 Access Professional Edition en | Personnel Groups Settings Description Deactivated Deactivation is a preparatory phase for deletion. No new persons can be added to the group, but the group continues to exist. A personnel group should not be deleted until all members have been removed from it. Description A detailed description can be stored for each personnel group. Visitor A group can be classified as being of type Visitor. The Personnel Management application is able to filter lists of persons based on the categories All persons, Employees and Visitors. Personnel groups of type Visitor can thus be viewed in isolation from groups of type Employee. Employee Applies only to readers which have been screening: configured as screening readers for always random personnel screening. at random The three options are defined as never follows. = the percentage rate of screening is 100% = this group is screened randomly at the defined percentage rate. = this group is never screened 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Personnel Groups | en Settings Description Badge Layout In order to create cards it is necessary Front to define at least one layout. Back Layouts can be defined per personnel 101 group. A layout for the reverse side of the card is optional. Acknowledgement cards can, if so desired, be handed out Form conditionally upon receipt of a signature on a form. These forms can be designed to be personnel-group specific. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 102 9 Access Professional Edition en | Access Authorizations Access Authorizations Access authorization groups simplify the administrative tasks of the system administrator and operator by grouping together any number of individual entrances that have similar access requirements (group of people, time restrictions etc.) or are close/next to each other in geographical terms. These groups can then be assigned to people in one step. 9.1 Create and assign Authorization groups are logical groupings of entrances. The access rights of a person in the Personnel Management application can consist of one or more such authorization groups. The list box on the left shows all hitherto defined authorization groups. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Access Authorizations | en 103 The following buttons are situated along the top of the list box: Add an authorization group Modify the selected authorization group. Delete the selected authorization group. The button opens a dialog for naming a new authorization group The right hand list boxes can be used to assign entrances to the selected authorization group. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 104 Access Professional Edition en | Access Authorizations The entrances in the NO authorization list are those available, i.e. those which have not yet been assigned to any authorization group. By double clicking on the desired entry, or on the button, the entrance is assigned to the authorization group button moves all currently selected in the left hand list. The the entrances in the lower list to the upper. Conversely, double clicking in the upper list, or using the or buttons, undoes the assignment. Caution! ! Subsequent modifications in the assignments of entrances and time models affect the rights already assigned to persons. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Access Authorizations | en 105 Any authorization group can have a time model assigned to it which limits the user rights; see Use of time models (Timemodels, page 116) in Access PE. Notice! Mark the names of authorization groups which are dependent on time models e.g. with the prefix or suffix DM. This will help when assigning these groups in Personnel Management to distinguish them from unrestricted rights packages. Additionally it is possible to assign the authorization group as the default authorization for a personnel group (e.g. employees or visitors). Thus when creating a new person in Personnel Management the correct authorizations will be assigned according to the person's personnel group. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 106 9.2 en | Access Authorizations Access Professional Edition Special rights Door models 07 and 14 require additional information for their configuration (Door models with special settings, page 92). However they differ from other door models also in their assignment and usage. Door model 07: Elevator The list of available rights contains a separate element for the elevator, as well as for each floor. When creating authorization groups, one reader for the elevator plus at least one floor must be assigned. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Access Authorizations | en 107 Door model 14: IDS-Rearming The list of available rights contains a separate element for the entrance and also one each for the arming and disarming of the system. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 108 en | Access Authorizations Access Professional Edition These two kinds of rights are assigned separately from one another. If a cardholder has only access rights to a particular entrance then s/he cannot arm or disarm the IDS (intrusion detection system) from there. Conversely, if a cardholder has only arm/disarm rights at a particular entrance, then s/he cannot pass through the entrance. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Bosch Access Systems GmbH Access Authorizations | en 109 2015-11 | | Configuration Manual 110 en | Access Authorizations 2015-11 | | Configuration Manual Access Professional Edition Bosch Access Systems GmbH Access Professional Edition 10 Special days | en 111 Special days The special days defined in this dialog have different restrictions from the day of the week upon which they fall. The time models for the holidays and special days override those of the same day of the week in ordinary time. The predefined list of special days can be changed, reduced or enlarged as desired. Holidays which are not required can be deactivated or deleted, in which case the time model for the normal day of the week takes precedence again. Non-existent or customer-specific days can be defined and added at will. In this way it is possible to keep calendars small: Recurring special days are carried over from year to year, and only exceptions and irregular events need be defined specific to an individual year. 10.1 Create and modify In Access PE a number of typical holidays are defined. These need to be altered, added to or deactivated depending on your location. The following buttons are situated along the top of the list box: Bosch Access Systems GmbH 2015-11 | | Configuration Manual 112 Access Professional Edition en | Special days Create a holiday/special day Modify a holiday/special day Delete a holiday/special day Notice! It is recommended that the predefined holidays and special days with variable dates (e.g. Easter) not be deleted but deactivated, if they are not to be used. Holidays and special days with variable dates can not be re-added later via the dialog. If you use the or the button to add or modify holidays, you will be prompted by as follows for a new name: By confirming with the OK button you will enter the new or modified name in the list. To the right of the list box the parameters for the selected list element can be defined. Deactivated Determines whether the holiday/special day is in use or not. Category You can divide active holidays/special days into 11 categories (holiday plus special day types 1..10), and can assign specific day models to each category when defining time models. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Special days | en 113 Priority higher Specifies which option takes priority if an than weekend annually recurring holiday falls on a Saturday or Sunday. If the check-box is ticked then the duty model for the holiday takes precedence, otherwise the time model for the weekend. Date If the special day recurs annually on the same date then an asterisk (*) should be used instead of entering an explicit year. Some holidays (e,g, Christmas) always have the same date. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 114 Access Professional Edition en | Daymodels 11 Daymodels Day models describe an abstract daily schedule. Irrespective of the day of the week a day model defines at which times of the day access should be granted or denied. A separate day model is required for every different daily schedule. A day model can consist of up to three periods with start and end times. By using day models in time models the day models become associated with specific calendar days. 11.1 Create and modify This dialog box is used for the creating and modifying day models which in turn are used in time models. This list box on the left shows the day models defined hitherto. The following buttons are situated along the top of the list box: 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Daymodels | en 115 Create a day model Modify the selected day model Delete the selected day model Use the button to add, or the button to modify day models: By confirming with the OK button you will enter the new or modified name in the list. To the right of the list box the periods which make up the selected day model can now be defined. A day model can consist of up to 3 periods. The start of each subsequent period must be less than its end time. Hence if you wish to define a day model which spans midnight, then you need to define two periods: 1. The period from: ... to 24:00 2. The period from 00:00 to ... Bosch Access Systems GmbH 2015-11 | | Configuration Manual 116 12 en | Timemodels Access Professional Edition Timemodels Time models restrict access at the assigned entrances to specific times of day. This enables the system to deny access, for example, during the night, or to impose additional restrictions on access at weekends. Access PE uses time models in several ways, for example in combination with: – Authorization groups: Time models can be associated with access rights so that these access rights apply only at particular times on particular days. It is equally and simultaneously possible to use access rights with no time limitations. – Persons: Time models assigned to persons restrict the general use of their cards to the defined dates and time periods. – Controllers and extension boards: The generation of entry and exit signals by controllers and extension boards can also be restricted by time models. – Doors: Door opening times can be governed by time models. – PIN codes: PIN code entry is an example of an additional security measure which can be imposed outside of the times defined by a time model. – Activation of a motor lock: A motor lock can be parameterized to be active only within a particular time model. Depending on how they are to be used time models are created in different ways. Example: Supposing time models are to be used to restrict access of persons to weekdays 07:00 to 19:00 and weekends 09:00 to 15:00. Two day models are required: 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Timemodels | en 1. with a period of 07:00 to 19:00 2. with a period of 09:00 to 15:00 117 If at the same time a motor lock is to be activated only outside of these times, then two day models for use by the lock's time model must be defined as follows: 1. with two periods of 00:00 to 07:00 and 19:00 to 24:00. 2. with two periods of 00:00 to 09:00 and 15:00 to 24:00. The application of time models Time models which are associated with personnel data will only be active if the reader's default settings have not been changed, and the option No time model check (Display and parameterization, page 83) thus remains unchecked. Time models can be used in many ways, so in order to understand how the system handles multiple assignments please note the following conflict-resolution rules: – If a person has access to certain entrances via a time model, and if that person is given access to the same entrances without a time model, then the looser restriction prevails. I.e. in this case the time model will not be applied. Example: A person is given the following access rights : – Access to entrances A, B, C and D within a time model of 09:00 to 17:00 every day. – Individual access rights to entrances B and D without time model. This person now has access to entrances A and C between 09:00 and 17:00 every day, and unrestricted access to entrances B and D. – If a person is given different access rights covering the same entrances, but governed by different time models, then the union of the time models is applied. Example: A person is given the following access rights: – Access to entrances A, B, C and D within a time model of 07:00 to 13:00 every day. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 118 Access Professional Edition en | Timemodels – Access to entrances B, D, E and F within a time model of 09:00 to 17:00 every day. The person now has access to entrances A and C from 07:00 to 13:00, to entrances B and D from 07:00 to 17:00 and to entrances E and F from 09:00 to 17:00 – If a person is assigned to an authorization group with time models, and if the same person is given a time model for the use of his card, then the intersection of the defined periods is applied. Example: A person is given the following access rights: – An authorization group with access to entrances A, B, C and D, and a time model of 07:00 to 13:00 every day. – An authorization group with access to entrances B, D, E and F and a time model of 09:00 to 17:00 every day. – And additionally a duty model of 11:00 to 19:00 every day The person now has access to entrances A and C from 11:00 to 13:00, and to entrances B, D, E, and F from 11:00 to 17:00. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition 12.1 Timemodels | en 119 Create and modify This dialog box is used for the creating and modifying time models which, according to their usage activate certain system elements. This list box on the left shows the time models defined hitherto. The following buttons are situated along the top of the list box: Create a time model Modify the selected time model Delete the selected time model If you use the or the button to add or modify a time model, you will be prompted as follows for a new name: Bosch Access Systems GmbH 2015-11 | | Configuration Manual 120 en | Timemodels Access Professional Edition By confirming with the OK button you will enter the new or modified name in the list. To the right of the list box day models for the days of the week and for Holidays and Special Days (1..10) can now be assigned to the selected time model. Time models are defined as repeating periods of one week. The course of each weekday is defined by assigning day models to them. Additionally the day models of these normal weekdays may be overridden by the day models of holidays or special days which happen to fall on those weekdays. Notice! If, when defining a time model, a particular weekday or special day is left without a day mode (i.e. left with the default setting ) then these days will be treated as if they had a day model without periods; i.e. on that day no access would be granted by the time model. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition 13 Texts | en 121 Texts Each application language you selected during installation has its own list with display texts for display readers and log book messages. The texts in the relevant language list are used in the Logviewer, for example in the log book messages created when the application language is selected. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 122 en | Texts 13.1 Access Professional Edition Displaytexts Some of those texts which are displayed at card readers can be modified in this dialog. The reader's display contains of two lines of 20 characters each. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Texts | en 123 Caution! ! In the text for Enter PIN code the underscore "_”r; character should not be removed, as it triggers the reading of the PIN code. The texts here are user-defined and not automatically translated by the application when switching languages. However by selecting a different language from the Language combo-box (above the list box) and re-entering the texts it is possible to define equivalents in every language variant installed in Access PE. Thus even these data can be viewed by a different user in his own language. 13.2 Event Log messages In this dialog you can change not only texts of log messages, but also their categories. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 124 Access Professional Edition en | Texts The desired category can be chosen from a pull-down list which is invoked by double clicking in Category column in the line you wish to change. Each category is represented by a unique symbol in the first column. These symbols are also used to categorize incoming messages in the event log. The following symbols and categories can be used: Event log unavailable Information Message Error Alarm Arriving Leaving No access No authorization Malfunction 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Texts | en 125 OK IDS armed IDS not armed Program startup Program shutdown Operator action In the second column (headed by a !) select those messages which are to serve as special alarm messages in the Alarm Management dialog. Double-click in the corresponding cell to set or remove the alarm symbol . The installation procedure defines messages of categories Alarm and Error as alarm messages by default. The desired text can be modified by double clicking Log text column in the line you wish to change. The texts here are user-defined and not automatically translated by the application when switching languages. However by selecting a different language from the Language combo-box (above the list box) and re-entering the texts it is possible to define equivalents in every language variant installed in Access PE. Thus even these data can be viewed by a different user in his own language. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 126 14 Access Professional Edition en | Additional Personnel data Additional Personnel data Ten freely definable extra fields are provided in addition to the default personnel data fields. The list box already contains 10 lines for your use. By double clicking on a field in the column Name of additional personnel data field you render the field editable and can enter a name for it. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Additional Personnel data | en 127 Notice! Entering a name does not activate the field for use. Activation is done by double clicking on the in the leftmost column, or clicking on the button. When the field is active the is replaced by a . When at least one additional data field has been defined then a new tab called Additional data appears in the Personnel Management application (personal data and authorizations dialog). The order of fields need not be maintained as gaps will be left for inactive fields. Each field can contain up to 40 arbitrary characters. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 128 Access Professional Edition en | Additional Personnel data Notice! Each text entry field is assigned a field in the database so that the data can be stored, selected and included in reports. This means however that changes to additional data fields which are in use will lead to the loss from the database of the data they contain . The names of additional data fields are user-defined and not automatically translated by the application when switching languages. By selecting a different language from the Language combo-box (above the list box) it is possible to define equivalents in every language variant installed in Access PE. Thus even these data can be viewed by a different user in his own language. Activation/Deactivation of additional fields As well as receiving a name additional data need to be activated. To do this double click the symbol in the leftmost column or click the button. The symbol is changed from to . The Additional data tab in the Personnel Management application will not appear until at least one additional data field has been activated. Notice! Fields without names can also be activated. Activated fields can be deactivated by double clicking or by clicking . A security pop-up message is then displayed offering two variants of deactivation: Notice! Deactivation of fields deletes corresponding personnel data only if the field description is also deleted. Do you wish to delete the field description and thus the personnel data also? 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition No Additional Personnel data | en 129 = Deactivate the field but keep its name and contents. Yes = Deactivate the field and delete its name and contents. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 130 15 Access Professional Edition en | Map Viewer and Alarm Management Map Viewer and Alarm Management The Access PE Map Viewer enables to control devices as entrances, readers, cameras directly from a map. The Access PE alarm list shows all incoming alarms to the operator. Alarms can be accepted by the operator. In case of an alarm, the location map will be displayed. The icon of the device that triggered the alarm is highlighted by animation. Related video live views are shown to verify the alarm. 1. Map tree 2. Active location map 3. Device control from the map; controls are shown in the map 4. Alarm list with event information (incl. video) 5. Device tree with status overview and control elements Mapviewer features: – Home map for easy navigation – Navigation between photo views and floor plans via hyperlink – Navigation via device tree structure up to three levels 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition – Map Viewer and Alarm Management | en 131 Interactive Graphical Maps for alarms with integrated alarm list 15.1 – Live view and door control from the map and device tree – 128 maps per system – 64 devices per map – 64 hyperlinks per map – Max 2 MB per map – Map viewer use a standard image format .bmp, .jpg, .png Configuring a map Start the Map Editor Klick the Bosch Access Systems GmbH button to add a map. 2015-11 | | Configuration Manual 132 en | Map Viewer and Alarm Management Access Professional Edition The map is shown on the dialog. – Optionally configure this map as Home Map Add a detail view, e.g. the canteen, to the map tree. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition – Map Viewer and Alarm Management | en 133 To connect the new Canteen map with the main map, go to the Shape Tab and select a Rectangle. – Place the rectangle over the area of the main map that should be shown as a detail view (shown as a red rectangle in the example below). – In the Link to Map Display select the respective detail view, which is “Canteen” in this example. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 134 en | Map Viewer and Alarm Management 15.2 Access Professional Edition Adding a device to a map Select the Device Tab and add Devices to the map by pulling them with the mouse into the map. In the example below the following devices have been added: – One Access point – One Reader – Two Cameras 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition – Map Viewer and Alarm Management | en 135 Click a device in the map and resize by holding the mouse button pressed, – Click a device and rotate as required using the scroll wheel of your mouse. Device Types Access Point Control elements Open door (Entrance) Open door long-term / Reset door longterm Lock door / Unlock door Front Identification Camera Back Identification Camera Bosch Access Systems GmbH 2015-11 | | Configuration Manual 136 Access Professional Edition en | Map Viewer and Alarm Management Device Types Control elements Back camera Front camera Reader All Entrance Controls Camera Live Video Device Types Access Point Alarms Door opened without authorization (Entrance) Door opened too long (* All Reader alarm also reflect as Entrance Alarm) Reader Reader error Camera N.A. *) These alarm events can be customized by the user. That means, a user can configure any event as an alarm event using AcConfig -> Event Log message (Double click on second column will cause an alarm). 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition 16 Card Definition | en 137 Card Definition This dialog defines the data which the reader transmits, so that new card definitions can be entered into the system at a later date. The list control contains existing card definitions. Default system settings include six standard entries, of which the first four are active (have a green tick in the first column). Apart from the setting Input Mode all others are write-protected and can neither be modified or deleted. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 138 Access Professional Edition en | Card Definition Notice! When using Wiegand controllers and readers, in order to use Identification-, arming- or door-PINs the Wiegand card definition PIN or Card (Nr. 6) needs to be activated. A new entry is initiated by clicking . Depending on the manufacturer's information the number of bits and their encoding are selected and displayed. Notice! The maximum number of bits is limited to 64 for all definitions. The maximum number for any coding part (facility, version, customer, country and code number) is 32 bits. A unique name and a description should be entered to distinguish the new card definition from others. Entering a value in the No. of bits field changes the number of columns in the list box underneath accordingly. Five rows are displayed and the resulting matrix enables you to activate/ deactivate individual bits as desired. The interpretation of the code can now be specified by entering the following possible values in the cells of the Field row. F Facility: earmarks those bits for encoding the facility. V Version: earmarks those bits for encoding the version variant. K Earmarks those bits for encoding the customer. L Land: earmarks those bits for encoding the country code. C Code No.: earmarks those bits for encoding the card number. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition E1 E2 Card Definition | en Even 1: Cancelling bit for the Entering a value in first Even Parity Mask one of these fields activates the check Even 2: Cancelling bit for the box for the second Even Parity Mask O1 139 corresponding row. Odd 1: Cancelling bit for the first Odd Parity Mask O2 Odd 2: Cancelling bit for the second Odd Parity Mask 1 0 Bit values which make up the code itself When defining Manual Mode or creating any new example, you can specify the Mode that will determine how the code is to be read; e.g. if you select PIN or card mode, only the code number will be read i.e. only those parts marked C. You can choose from the following mode variants: Serial Mode Code parts checked 0 Facility + Code no. F,C 1 Bosch Code L,K,C,V 100 Manual C 200 PIN or card C number Explanation: The "telegram" sent by a reader when presented with a card is a series of zeros and ones. For each card/reader type the length of the telegram (the number of bits) is precisely defined. A telegram of this kind contains, in addition to user data, control data to identify the telegram type and to verify correct data transfer. Correct data transfer is verified by parity bits which represent a checksum over selected bits in the mask, either a zero (even parity) or a one (odd parity). Controllers can be Bosch Access Systems GmbH 2015-11 | | Configuration Manual 140 Access Professional Edition en | Card Definition configured to calculate one or 2 checksums for even parities, and one or two checksums for odd parities. In the list box you can mark, in those lines reserved for parity check sums (Even1, Even2, Odd1 and Odd2), which bits should be included in the checksum. In the topmost line (Field) one bit is designated for each checksum used to balance out the checksum depending on its parity type. If a parity type (Even1, Even2, Odd1, Odd2) is not used then its row is simply left blank. Activation/Deactivation of card definitions The symbol in the first column of the list box reflects the activation status of each card definition. activated deactivated The activation status can be toggled by double clicking on the symbol. Safety checks warn about the consequences of deleting a card definition that is in use. Notice! Incorrect card encoding or a bad combination may lead to all cards become unreadable! Do you really wish to activate the selected card encoding?. Notice! All current cards using this encoding will become unreadable! Do you really wish to deactivate the selected card encoding?. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition 17 Appendix | en 141 Appendix The section that follows collates interesting and often important (additional) information that does not belong to any particular topic in the preceding documentation, but may be applicable at several places. 17.1 Signals A list of the available signals for inputs and outputs. Input signals Description Door sensor Request to exit Button to open the door. button Bolt sensor Is used for messages, only. There is no control function. Entrance locked Is used to lock the opposite door in sluices temporarily. But can also be used forpermanently locking. Sabotage Sabotage signal of an external controller. Turnstile in normal Turnstile is closed. position Passage A passage was completed successfully. completed This is a pulse of an external controller. IDS: ready to arm Will be set by the IDS, if all detectors are in rest and the IDS can be armed. IDS: is armed Bosch Access Systems GmbH The IDS is armed. 2015-11 | | Configuration Manual 142 Access Professional Edition en | Appendix Input signals Description IDS: request to Button to arm the IDS. arm button Local open enable Will be used if a doorway arrangement opens the door without involving the AMC. The AMC sends no intrusion message but "door local open". Output signals Description Door opener Sluice: lock Locks the other side of the sluice. Is set opposite direction when the door opens. Alarm suppression ... to the IDS. Is set as long as the door is open, to avoid that the IDS createsan intrusion message. Indicator green Indicator lamp - will be controlled as long as the door is open. Door open too Pulse of three seconds. If the door is long open too long. Camera activation Camera will be activated at the beginning of a passage. Open turnstile inbound Open turnstile outbound Door is permanent Display that the door is permanent open. open 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Appendix | en Output signals Description IDS: arm Pulse or permanent contact to arm the 143 IDS. IDS: disarm 17.2 Pulse to disarm the IDS. Default Doormodels Standard door models The following door models are available by default: 01a Normal door with entry and exit reader 01b Normal door with entry reader and push button 01c Normal door with entry reader 03a Reversible turnstile with entry and exit reader 03b Reversible turnstile with entry reader and push button 03c Turnstile with entry reader 06c Enrollment via AMC – no entrance control! 07a Elevator with max. 16 floors 07b Elevator with max. 16 floors 10a Normal door with entry and exit reader and IDS rearming 10b Normal door with entry reader, push button and IDS rearming 10c Normal door with entry reader and IDS rearming 10d Normal door with entry and exit reader and decentral IDS rearming 10e Normal door with entry reader, push button and decentral IDS rearming Bosch Access Systems GmbH 2015-11 | | Configuration Manual 144 Access Professional Edition en | Appendix 10f Normal door with entry reader and decentral IDS rearming 14a Normal door with entry and exit reader and IDS rearming (arming authorization) 14b Normal door with entry reader, push button and IDS rearming (arming authorization) 14c Normal door with entry reader and IDS rearming 14d Normal door with entry and exit reader and decentral IDS rearming 14e Normal door with entry reader, push button and decentral IDS rearming 14f Normal door with entry reader and decentral IDS rearming 17.3 Doormodel 01 Normal door Signals: Input signals Output signals Door sensor Door opener Pushbutton: door open Sluice: lock opposite direction Bolt sensor Alarm suppression Entrance locked Indicator green 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Appendix | en Input signals Output signals Sabotage signal Camera activation 145 Door open too long Model variants: 01a Normal door with entry and exit reader 01b Normal door with entry reader and push button 01c Normal door with entry reader Note: Man-trap locking is only active if the door is parameterized as part of a man-trap. If the door is not configured as part of a man-trap then input signal 03 is interpreted as a reader lock. In such a case if input signal 03 is set the reader will be locked. Alarm suppression is only activated when the alarm suppression time before door opening is greater than 0. Optional secondary readers can be connected. In combination with a second door and man-trap locking it is possible to control both doors together as a man trap. This usage can also be advantageous for vehicle entrances, in which case a secondary reader for trucks and cars is also recommended. Notice! Singling function can be parametrized with DM 03, only. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 146 Access Professional Edition en | Appendix 17.4 Doormodel 03 Reversible turnstile Signals: Input signal Output signals Turnstile in normal Open turnstile inbound position Pushbutton: door open Open turnstile outbound Entrance locked Sluice: lock opposite direction Sabotage signal Alarm suppression Camera activation Door open too long Model variants: 03a Reversible turnstile with entry and exit reader 03b Reversible turnstile with entry reader and push button 03c Turnstile with entry reader Note: Man-trap locking is only active if the door is parameterized as part of a man-trap. If the door is not configured as part of a man-trap then input signal 03 is interpreted as a reader lock. In such a case if input signal 03 is set the reader will be locked. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Appendix | en 147 In combination with a second door and man-trap locking it is possible to control both doors together as a man trap. Depending on the construction the entrance can perform a singling function. 17.5 Doormodel 06c The doormodel 06c configures a reader connected to the AMC as enrollment device. It does not control an entrance. 17.6 Doormodel 07 Model variants: 07a Elevator 07b Elevator with reader input Bosch Access Systems GmbH 2015-11 | | Configuration Manual 148 Access Professional Edition en | Appendix Notice! As standard, one AMC2 can be used for 8 floors. It is possible to connect more entrances under the following preconditions: 32 floors when using Wiegand (AMC2 W + AMC2 WE + AMC2 16ION) 24 floors when using RS 485 (AMC2 4R4 + AMC2 16ION) Signals of entrance model 07a: Input signal Output signals Free Floor 01 Free Floor 02 Free Floor 03 Free Floor 04 ... ... Free Floor 16 Procedure: First, the cardholder summons the elevator. This can be done either via the elevator's own hardware button, or via a card reader (e.g. Door model 01c). Next, inside the elevator is another card reader (Door model 07a). This reader grants access to those floors for which the user's card contains authorizations. The authorized floors can be indicated to the user, for example, by illuminating only the buttons for those floors. The user can then select only one of the authorized floors. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Appendix | en 149 Signals of entrance model 07b: Input signal Output signals Input key - floor 01 Floor 01 Input key - floor 02 Floor 02 Input key - floor 03 Floor 03 Input key - floor 04 Floor 04 ... ... Input key - floor 16 Floor 16 Procedure: First, the cardholder summons the elevator. This can be done either via the elevator's own hardware button, or via a card reader (e.g. Door model 01c). Next, inside the elevator the user presents his/her card to another card reader (Door model 07b), and then presses the button for the desired floor. The AMC checks whether the user is authorized for the selected floor and, if so, the lift takes the user there. In addition this door model possesses the parameter Public Access, which can be set for each floor individually. If this parameter is set then authorizations for this floor are not checked, i.e. any user may proceed to this floor. Moreover Public Access can be made dependent on a particular time model, so that authorizations are only checked by the AMC outside of that time model's designated hours. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 150 Access Professional Edition en | Appendix 17.7 Doormodel 10 Normal door with IDS (intrusion detection system) arming/ rearming Signals: Input signals Output signals Door sensor Door opener Pushbutton: door open IDS: Disarm [only for models d and f with a pulse of 1 sec.] IDS: Ready to arm Camera / motorlock IDS: Arrmed IDS: Arm [only for models d and f with a pulse of 1 sec.] Sabotage signal Door open too long (intrusion) IDS: Arming Model variants: 10a Normal door with entry and exit reader and IDS rearming 10b Normal door with entry reader, push button and IDS rearming 10c Normal door with entry reader and IDS rearming 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition 10d Appendix | en 151 Normal door with entry and exit reader and decentral IDS rearming 10e Normal door with entry reader, push button and decentral IDS rearming 10f Normal door with entry reader and decentral IDS rearming Notes: The E button at the entry reader can arm the IDS (intrusion detection system). An authorized card and the entry of a PIN code are required. The IDS will be disarmed upon the first authorized entry, whereby PIN-code identification will also be required. In the case of models a to c this is controlled by the output signal arm/disarm IDS. In the case of models d to f the arming or disarming is triggered by a separate pulse of 1 second. A connected bistable relay can control the IDS for several doors (DCUs / Door control units), whereby the signals require a logical OR connection to the relay. The signals IDS is armed and IDS is disarmed must be double connected at all the relevant DCUs. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 152 Access Professional Edition en | Appendix 17.8 Doormodel 14 Door with IDS control Signals: Input signals Output signals Door sensor Door opener Pushbutton: door open IDS: Disarm [only for models d and f with a pulse of 1 sec.] IDS: Ready to arm Camera / motorlock IDS: Arrmed IDS: Arm [only for models d and f with a pulse of 1 sec.] Sabotage signal Door open too long (intrusion) IDS: Arming Model variants: 14a Normal door with entry and exit reader and IDS arming / disarming 14b Normal door with entry reader, push button and IDS arming / disarming 14c Normal door with entry reader and IDS arming / disarming 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition 14d Appendix | en 153 Normal door with entry and exit reader and decentral IDS arming / disarming 14e Normal door with entry reader, push button and decentral IDS arming / disarming 14f Normal door with entry reader and decentral IDS arming / disarming Notes: In contrast to door model 10, door model 14 can use readers with or without a keypad. A further difference exists in the assignment of IDS arming rights: only cardholders with sufficient rights are able to arm or disarm the IDS. The arming/disarming process is not governed here by use of a PIN code, but by a button close to the reader which has the same function as key 7 on the readers with keypads. After pressing this button the status of the IDS is displayed by the colored LEDs of the reader. – Disarmed = alternating green/red blinking light – Armed = continuous red light The IDS is armed when presented with a valid card. Disarming is carried out by pressing the button and presenting a valid card. The door does not unlock immediately. To unlock, present the card once more after disarming. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 154 Access Professional Edition en | Appendix 17.9 Examples of mantrap configurations Turnstiles are the most common means of singling cardholders' access. In the following examples we have therefore used door model 3a (turnstile with entry and exit reader). Mantrap configuration with two turnstiles (DM 03a) Connections to the door locks for the opposite direction ensure that only one of the turnstiles can be opened at any one time. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Appendix | en 155 Notice! The output signal (Out 3) is to be set potential free (dry mode). The signal "door lock of opposite direction" must be closed (resistance=0) when de-energized. Use the "normally closed" (NC) contact of outputs 3 and 7. Mantrap configuration with two turnstiles (DM 03a) which are distributed across two controllers. Connections to the door locks for the opposite direction ensure that only one of the turnstiles can be opened at any one time. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 156 en | Appendix Access Professional Edition Notice! The output signal (Out 3) is to be set potential free (dry mode). The signal "door lock of opposite direction" must be closed (resistance=0) when de-energized. Use the "normally closed" (NC) contact of outputs 3 and 7. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition 17.10 Appendix | en 157 Configuring Entrance Model 07 The following illustrates the wiring of an elevator using Door Model 07a Legend: A = Floor buttons inside elevator B = (solid line) AMC-output signals C = (dashed line) Connection to elevator control D = An I/O extension board (AMC2 8I-8O-EXT, AMC2 16I-EXT or AMC2 16I-16O-EXT) can be connected E = Data- and power supply from the AMC to the I/O boards F = Elevator control G = Reader (Door model 07a) The following illustrates the wiring of an elevator using Door Model 07b Bosch Access Systems GmbH 2015-11 | | Configuration Manual 158 en | Appendix Access Professional Edition Legend: A = Floor buttons inside elevator B = (solid line) AMC input signals C = (dashed line) AMC output signals D = An I/O extension board (AMC2 8I-8O-EXT, AMC2 16I-EXT or AMC2 16I-16O-EXT) can be connected E = Data and power supply from the AMC to the I/O boards F = Elevator control G = Reader (Door model 07b) Notice! When wiring individual floors (up to 16) to the AMC's outputs, connect first the controller's own signals and then, if present, the first eight outputs of any I/O extension boards in ascending order. [Where Wiegand extension boards(AMC2 4W-EXT) are in operation, use their outputs in ascending order after those of the AMC2 controller, and before the outputs of any I/O extension board.] For this reason it is not possible to configure any other kinds of door, or any further elevators, to an AMC that is used for elevator control. 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition 17.11 Appendix | en 159 Display Arming/Disarming Comparison between arming an alarm system in Entrance (Door) models 10 and 14. Comparison between disarming an alarm system in Entrance (Door) models 10 and 14. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 160 en | Appendix 2015-11 | | Configuration Manual Access Professional Edition Bosch Access Systems GmbH Access Professional Edition 17.12 Appendix | en 161 Procedures in Access Control Flow charts of procedures in Access Control Door model DM01 Bosch Access Systems GmbH 2015-11 | | Configuration Manual 162 en | Appendix Access Professional Edition Door model DM10 - arming 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Appendix | en 163 Door model DM10 - disarming Bosch Access Systems GmbH 2015-11 | | Configuration Manual 164 en | Appendix Access Professional Edition Door model DM14 - arming 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition Appendix | en 165 Door model DM14 - disarming 17.13 Access PE ports The individual processes and applications in Access PE use the following ports. Bosch Access Systems GmbH 2015-11 | | Configuration Manual 166 Access Professional Edition en | Appendix Connection Client/AMC Server Client - LacSp Undefined 43434/tcp AcPers - CP Undefined 20005/tcp LacSp - AMC 10001/udp 54545/udp and above between... 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition 18 PIN types | en 167 PIN types Access Professional Edition provides each cardholder with up to three Personal Identification Numbers (PINs) which can be used for different purposes: – Verification-PIN This PIN can be requested from cardholders as an extra security feature at special entrances. The verification PIN is compared with stored data for the cardholder to ensure that s/he is the real owner of the card presented. Each person can choose his/her own 4-8 digit PIN in accordance with certain general rules (e.g. no numerical sequences and no palindromes). [The parameter for the length of the PIN applies equally to verification-, armingand door-PINs]. A verification-PIN does not have to be unique in the system. If no separate arming-PIN has been defined [i.e. as long as the check box use separate IDS-PIN is not selected in the dialog Configurator > Settings] then the verification PIN may also be used to arm/disarm the IDS. – Arming-PIN / IDS-PIN This special PIN is used exclusively to arm and disarm the alarm system. With door models 10 and 14 first press the 7 key or the door’s push-button. Each person can choose his/her own 4-8 digit PIN in accordance with certain general rules (e.g. no numerical sequences and no palindromes). [The parameter for the length of the PIN applies equally to verification-, armingand door-PINs]. An arming-PIN does not have to be unique in the system. If the cardholder wishes simply to pass through the door, and is required to enter a PIN, then the verification-PIN must be used. If the the check box use separate IDS-PIN is selected (Configurator > General settings) then the Bosch Access Systems GmbH 2015-11 | | Configuration Manual 168 en | PIN types Access Professional Edition verification-PIN can no longer be used to arm/disarm the IDS. It is only then that the relevant input fields become visible in the Personnel dialog. Notice! In order to ensure compatibility with previous Access PE versions the check box for use of separate IDS-PIN is cleared by default. – Identification-PIN/ ID-PIN This PIN identifies a person’s card and must therefore be unique within the system. Once input this PIN grants access to the person in accordance with all his/her defined authorizations. To ensure uniqueness the PIN is generated by the system and assigned to the person, whereby the system adheres to the general rules (no numerical sequences and no palindromes). Like a physical credential the Identification-PIN enforces the restrictions assigned to its owner (blocks, time models, authorizations etc.). Depending on the reader protocol, you must enter the Identification PIN on the reader, along with the additional characters required. In the case of readers enter the pin as follows: 4 # (Enter) PIN # (Enter). For all other protocols, the PIN is entered immediately and followed by # (Enter). The length of this PIN is configurable to between 4 and 8 digits. [Note: The length of ID-PINs should bear relation to the size of the installation, in order to render active PINs harder to guess. For instance, if the installation has 1000 cardholders then the PINs should be at least 6 digits long in order to make the guessing of a valid PIN sufficiently improbable, and random guesses more likely to generate alarms.] 2015-11 | | Configuration Manual Bosch Access Systems GmbH Access Professional Edition PIN types | en 169 The PIN types described above are all person-related and therefore defined and maintained along with other personnel data. A fourth type is the so-called door-PIN. – Door-PIN The PIN belongs to an entrance (Configurator > Entrances). It must be known by all persons authorized to use it. instead of the PIN a card may also be used at such entrances (see = Function PIN or card). This PIN too can be 4 to 8 digits long. If the use of the doorPIN is deactivated (e.g. by a time model) then access is only by card. An identification-PIN will not work either in this case. Notice! The Identification- and door-PIN-types can not be used with IDS-arming door models 10 and 14. Bosch Access Systems GmbH 2015-11 | | Configuration Manual Bosch Access Systems GmbH Charlottenburger Allee 50 52068 Aachen Germany www.boschsecurity.com © Bosch Access Systems GmbH, 2015
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.4 Linearized : No Create Date : 2015:12:02 08:41:18+01:00 Modify Date : 2015:12:02 08:41:18+01:00 Creator : AH Formatter V5.3 MR3 (5,3,2011,1116) for Windows (x64) Producer : Antenna House PDF Output Library 2.6.0 (Windows (x64)) Title : Access PE - Configurator Trapped : False Page Count : 172 Page Mode : UseOutlinesEXIF Metadata provided by EXIF.tools