Avigilon Access Control Manager - Avigilon Workflow Guide User Manual

Browse online or download User Manual for Software Avigilon Access Control Manager - Avigilon Workflow Guide. Avigilon Access Control Manager - Avigilon Workflow Guide User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 119
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - Access Control Manager

Access Control ManagerApplication Configuration and Work Flow Guide

Page 2 - Version 5.0/AV01-1213

6Login: adminPassword: adminNOTE: We highly recommend that you change the login and password for the system administrator account as part of the confi

Page 3 - Getting Help

96• Linkages page• Devices page• Events page•Actions pageFor more information on each page, refer to the online help.6. When you're finished, cli

Page 4 - Table of Contents

97Elevator Access LevelsAccess Control Manager enables the qualified operator to define access for floors accessed by one or more elevators.NOTE: Thi

Page 5 - Overview

985. When you're finished, click . The new access level appears on the listing page.

Page 6 - Flowchart

99Appliance Back-UpTo schedule a back up of your Access Control Manager database, click on the Backup icon and enter the required data. You have two c

Page 7 - Appliance

1005. Click to save your new backup.The new backup is saved.Host If you are using Windows Share, enter the IP address of the computer on which the s

Page 8 - Crossover Cable

101MonitoringWhen you click the Monitor option on the icon task bar of the home page, the Monitor feature appears with the Event page uppermost. The p

Page 9

102These statistics are a list of current events detected by the security system this server supervises. The default columns on this page include:Clic

Page 10 - Control Manager system

103Monitoring AlarmsWhen you click on the Alarms tab on the Monitor screen, a page like this appears:Any alarms detected are listed in the Acknowledge

Page 11

104• Unacknowledged Alarms window includes all those alarms recorded by the system that have not yet been acknowledged or addressed.• Acknowledged Ala

Page 12

105Searching for Events and AlarmsWhen you click the Search tab, a page like this example appears:The search and navigation tray appears at the bottom

Page 13

7Host Name This is the DNS name for this appliance and is identified as such under the 'DNS Name' field on the Appliance Listing page.Domain

Page 14

106The buttons on this screen include these:To search for a specific transaction – event, alarm, or item – within the monitor database, do this:1. Go

Page 15 - Check the appropriate

107The string you enter can represent any item that appears in the “Source Location”, “Source Name”, “Last Name”, “Message” or “Event Name”. The wildc

Page 16 - Enterprise

108The Verification page appears as detailed in the Operator’s Guide and the online help.2. Click one of the button. A list of available doors appea

Page 17 - Lenel Mercury

109Monitoring Hardware StatusWhen you click the HW Status tab from the Monitor screen, a page like this example appears:This page displays the current

Page 18

110Rx Indicates the number of data packets the designated Access Control Manager server port has received.Tx Indicates the number of data packets the

Page 19

111All / None Check the individual box next to the door to indicate that the door on this line should be included in the control panel above. If you c

Page 20 - Click this button

112Name The name assigned to the panel.To expand this panel and review the dependent components -- such as subpanels, inputs, and outputs - controlled

Page 21 - Panel Add Summary

113Sub-Panel StatusIndicates the number of the sub-panels attached to this panel. Each relevant subpanel is displayed together with its current status

Page 22

114This is the color legend used by both the doors and panels.Monitoring MapsWhen you click the Map tab, a page like this example appears.This page li

Page 23

115To view a map of interest, simply click on the map name and the map appears. A map like this example appears with all available security points.For

Page 24 - These fields include:

811. Click the button to save changes. Mercury Client Port Specify the port number used to set the port you wish this appliance to use in order to l

Page 25

912. Click the button.13. Once the appliance reboots, click the About tab. The About page appears like the following example. The essential informa

Page 26

10The Software Terms and Conditions form appears like this example:15. Review the terms then enter the name of this company, the name of the administr

Page 27

11If you need to change any other values, they include:21. Save your changes, reboot the appliance, and log out.22.Log into the appliance again and cl

Page 28

12a. Remove the crossover cable and move the appliance to its required position in the system.b. Using a standard Ethernet cable, connect one end of t

Page 29

13PanelsAfter setting up the appliance, your next step is to configure the panels to which this appliance is connected. For this document, we are only

Page 30

146. Leave the rest of the fields at their default settings and click to save your settings.The Sub-panels page appears like this example:7. Choose

Page 31

1510. Click on the Host tab and configure the host communication settings.11. Enter the primary IP address for the panel. Leave the rest of the settin

Page 32 - Click on the

Access Control ManageriiVersion 5.0/AV01-1213Version 5.0Copyright© 2012-2013 Avigilon Inc.Avigilon Inc.Box 378#101-1001 West BroadwayVancouver, Britis

Page 33

1612. Click to save your settings.Once the previous settings have been saved, the system returns to the Panels Listing page. You should see that the

Page 34

17The Firmware listing like this example:15. Locate the firmware for the panel you installed and configured, then click the green check mark to downlo

Page 35 - EOL Resistance

186. Proceed to add Areas (page 19).If you do not require areas in order to define the doors, you can skip Areas and go directly to Doors (page 21).

Page 36

19AreasAreas are zones the Access Control Manager assigns to define a physical area within a secured location. This area can be relatively small, like

Page 37 - Schedules

20These fields include:5. Click to save these values. A message appears “Area was successfully created” and the Areas Listing page reappears with th

Page 38

21DoorsAfter you have configured both the appliance and the panels it controls, it is time to create and configure each door associated with the creat

Page 39 - Holidays

22The Door Add page expands to include basic door configuration values, like the following example:The fields on this page include:Name Enter the name

Page 40

23Offline Mode Specifies the entry mode used for the door if the door controller is no longer communicating with the panel. Note: In many cases, the l

Page 41 - Policies

247. Choose the following for basic door configurations values:• Access Type: Single• Door Mode: Card Only• Offline Mode: Facility Code Only• Unlock D

Page 42

25Alt Name Identifies an alternate name for the door. If there is an additional name the door is identified by, enter this alternate name.Location Id

Page 43

Access Control ManageriiiGetting HelpIf you encounter a problem that is not discussed in available Avigilon Access Control Manager user guides or onli

Page 44

2610. Configure these door attributes as required: •Anti-passback settings• PIN attributes•Strike Mode• Access times• Card format settings Other field

Page 45 - Card Formats

27The Hardware page appears like this example:The fields on this page include:If a sub-panel has been assigned as the option for any of the following

Page 46

2812. On this page, you can configure these door attributes:• Reader (entry and/or exit)• REX (Request-to-exit button or bar)• Door Contact•StrikeIf y

Page 47

29The Interlocks page appears like this example:Interlocks allow you to configure inputs and outputs connected to this door.NOTE: For more on interloc

Page 48 - Event Types

30•The Access page is a quick reference by door to show what access groups, roles and identities have access to that door. •The Events page provides a

Page 49

31EOL ResistanceEnd-of-line resistance refers to resistance levels that must be maintained for input points. Input devices used with doors from vendor

Page 50

326. When you're finished, click . The EOL Resistance Listing page reappears with the newly defined option listed.to: Select from the drop-down

Page 51

33SchedulesA schedule is a time period defined for use by the system. It is an editable, reusable time template that can be used to control such thing

Page 52

344. When you are finished, click the button. If the schedule addition is successful, the Schedule Listing page appears the new schedule listed and

Page 53

35HolidaysHolidays are those days during the year when normal security policy may not be followed, either because it is a vacation or because a differ

Page 54

1Table of ContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1Flowchart . . . . . . .

Page 55 - Access Groups

365. When you're finished, click the button. The Holiday Listing page reappears with the new holiday listed and the confirmation message “Holid

Page 56

37PoliciesPolicies are limits that can be imposed on people and security devices within the Access Control Manager system. A policy is an aggregation

Page 57 - Delegation Groups

384. Click the button. The confirmation message, “Policy was successfully created.” displayed. The Policy properties edit screen appears like this e

Page 58 - Move available features to

39GroupsGroups combine one or more existing policies with the members (identities) who can use them.In order to create a group, you must first create

Page 59 - Partitions

405. Click the button. The confirmation message, “Group was successfully created.” displayed. The Group properties edit screen appears like this exa

Page 60

41Card FormatsReaders that control access to and exit from doors come in many varieties and use many different card protocols. The most commonly used

Page 61 - Badge Designer

425. When you're finished, click .The Card Formats Listing page reappears with the new card format displayed.Offset The offset number for this c

Page 62

43Once you have defined a card format, the format appears on the Door Operators page as a card format option, as shown in this example:

Page 63 - Changing a Background

44Event TypesEvent types are classifications of events that may occur during the operation of the Access Control Manager system. Event types are assoc

Page 64 - Adding Pictures

45These fields include:5. When you're finished, click .The Event Types Listing page reappears with a message saying the event was successfully c

Page 65 - Adding Database Fields

1OverviewThank you for your purchase of the Access Control Manager software.This configuration and workflow guide will walk you through the steps requ

Page 66 - Adding Text

46EventsEvents include all messages and alarms issued by specific devices within the Access Control Manager system. Events are categorized by Event Ty

Page 67

47The Edit Event screen appears like this example:4. Make changes to these fields as required.These fields include:Name Enter a name for this event.Re

Page 68 - Adding Graphics

485. When you're finished, click .The Events Listing page reappears with a message saying the event was successfully changed.Masked Check this b

Page 69 - Badge Camera Configuration

49RolesRoles limit or regulate the number of tasks that a specific user can perform within the Access Control Manager system. That is, use the Roles f

Page 70

504. Click on the button. Upon successfully adding a role, the Role Edit property screen appears like the following example:5. Click each of the rem

Page 71

51Access GroupsBefore creating a role, we recommend that you define your required access groups. Access Groups combine a schedule (time) with doors wi

Page 72

52This includes adding doors from the ‘Available’ window to the ‘Members’ window by selecting the selected door, then click the icon.9. Click the Ac

Page 73

53Delegation GroupsDelegation (permissions) authorizes certain persons or groups of persons within the Access Control Manager database to perform pred

Page 74

54The Delegation Groups Edit page appears like this example:7. Define this group by adding features in this manner:a. In the ‘Available’ window, click

Page 75 - User-Defined Fields and Lists

55PartitionsAccess Control Manager utilizes partitions to limit the access of operators, devices, and users to only specified roles. This enables Acce

Page 76 - User Lists

2FlowchartThe flowchart below shows the basic steps you should follow to complete the setup process.page 3page 93page 21page 19page 37page 35page 33pa

Page 77

566. When, you're finished, click again.You are returned to the Partitions Listing page with the newly-defined partition on the list.For more o

Page 78 - Move available event

57Badge DesignerThe Badge Designer is the utility the Access Control Manager uses to design badge templates for inclusion in badge holder credentials.

Page 79 - Move available

58The designated badge template add page appears like this example:4. Enter a name for this badge template in the ‘Name’ field.5. Specify the size of

Page 80 - Collaboration

5910. When you're finished customizing this template, click once again. A message appears indicating the success of the badge template creation

Page 81 - Identities

60The number in the Color field changes to reflect your choice.4. If required, slide up or down the vertical slide bar to change the color still furth

Page 82

61NOTE: None of the values entered here are reflected on the canvas until you have saved the screen by clicking . Once saved, the preview pane displ

Page 83

62When you select a Data Field option, the placeholder for that option appears on the canvas as shown in the following example.Use your mouse to drag

Page 84 - 7. Click the Tokens tab

63When you click the button, a Text field appears, like this example:Notice that a text placeholder appears on the canvas. Use your mouse to drag th

Page 85

64NOTE: None of the values entered here are reflected on the canvas until you have saved the screen by clicking . The Preview pane appears with the

Page 86

65NOTE: None of the values entered here are reflected on the canvas until you have saved the screen by clicking . The Preview pane appears with the

Page 87

3Access Control Manager WorkflowThe following workflow is divided into sections and subsections representing the steps you will take in configuring th

Page 88

66The IP Camera Listing page appears like this example.3. Select one of the currently available device types:• For an IP-based camera, go to step 4.•

Page 89

67Preview URL Enter the URL or web address, if required, of this camera's web-based application showing a preview of the finished picture.Device

Page 90 - Searching for Identities

68File to Upload Either enter the name of the file required to run this server or click the button and find the required file.Username If required,

Page 91 - Identity Profiles

69VidProxyUrl The URL used as a translator between the appliance and the server. VidProxyImageUrl The URL used to store the video captured by the Avig

Page 92

706. Once you’ve selected the field values you need, click to save these changes.The new device appears on the listing page.Username The name the us

Page 93

71User-Defined Fields and ListsUser-defined fields are custom fields added to the Identity or other custom forms that the user can use to capture info

Page 94

72You can also use this feature to create additional tabbed pages for an identity form. For more on this, refer to the Access Control Manager online h

Page 95

73RoutingThe routing group is a method for associating specific event types with designated access groups that are effective during a specified time i

Page 96

745. When you're finished, click . The Routing Group Edit property sheet appears like this example:6. Check the values on the Schedule page and

Page 97

75The Groups page appears like this example:10. Associate available access groups with this routing group as required.11. When you're finished, c

Page 98 - Global Actions

42. Connect the Access Control Manager appliance to a computer using the crossover cable to Port 2 of the appliance.3. On your connected computer, ope

Page 99 - Global Linkages

76CollaborationCollaboration provides the ability to exchange data between the Access Control Manager appliance application and a large number of othe

Page 100

77IdentitiesThe Identities feature is used to enroll employees and all other workers and service personnel who require access to a facility or locatio

Page 101 - Elevator Access Levels

78The Identity Add page appears like this example:The fields on this page include:Identity InformationPhoto If you have either imported an image or ca

Page 102

79Status Select the option from the pick list that describes the current status of this new user.Active - this is a current user. Expired - this user&

Page 103 - Appliance Back-Up

804. Fill out the fields on this page as required.5. When you've filled out the required field, click the button. The extended Identities tabs

Page 104 - The new backup is saved

81The Tokens page appears like this example:The fields on this page include:Embossed NumberEnter the number embossed on the card that will be issued t

Page 105 - Monitoring

828. Customize tokens for this identity as required.9. Click the Groups tab. The Groups page appears like this example:10. Assign groups to this perso

Page 106

83If the capture device has been secured by a user name and password, this page will not appear until you have supplied the required values to the aut

Page 107 - Monitoring Alarms

8421. If you need to upload another photo, repeat Steps 17 through 19.Once a photo is uploaded, it appears on this page as shown in this example:22.Wh

Page 108

8524.Enter the required fields.25.Click the Transactions tab.The Transactions page appears like this example:This page enables the qualified operator

Page 109 - Search button

5At this point, you will probably see a message indicating that you are trying to reach an unknown or insecure site, like these examples:4. Do one of

Page 110

86A badge for this person is printed to the designated badge printer.28.If needed, click the Audit tab to display and review the Audit page.29.When yo

Page 111

87Identity ProfilesDefining an identity can take a long time. The identity page alone contains more than 25 fields. Assigning attributes to that ident

Page 112

88ReportsThe qualified operator can generate reports, in either PDF or CSV format, concerning many areas of Access Control Manager system function inc

Page 113 - Monitoring Hardware Status

89The Reports Listing page appears like this example:2. At the required report line, do one of these: • Click the icon to generate a PDF.• Click the

Page 114

90• Click OK to display immediately the required report in the specified format.• Select the ‘Save File’ radio button then click OK. This will save th

Page 115

91MapsUsing the Access Control Manager’s Map Designer, the qualified operator can import maps and blue prints into the application, place the inputs,

Page 116

92The Map Edit page appears like this example:8. Using the Map Details on the left side, click next to the point category you want to specify.A pick

Page 117

9312. When you're finished, click to save your modifications.At any point, you can expand the Map Details panel on the left to review the point

Page 118 - Monitoring Maps

94Global ActionsGlobal actions enable the qualified operator to associate an action -- defined by either a macro or a Exacq soft trigger -- with a tri

Page 119

95Global LinkagesGlobal linkages are the final step in the process that defines specific actions for triggering events at specific doors. What separat

Comments to this Manuals

No comments