Access Control ManagerApplication Configuration and Work Flow Guide
6Login: adminPassword: adminNOTE: We highly recommend that you change the login and password for the system administrator account as part of the confi
96• Linkages page• Devices page• Events page•Actions pageFor more information on each page, refer to the online help.6. When you're finished, cli
97Elevator Access LevelsAccess Control Manager enables the qualified operator to define access for floors accessed by one or more elevators.NOTE: Thi
985. When you're finished, click . The new access level appears on the listing page.
99Appliance Back-UpTo schedule a back up of your Access Control Manager database, click on the Backup icon and enter the required data. You have two c
1005. Click to save your new backup.The new backup is saved.Host If you are using Windows Share, enter the IP address of the computer on which the s
101MonitoringWhen you click the Monitor option on the icon task bar of the home page, the Monitor feature appears with the Event page uppermost. The p
102These statistics are a list of current events detected by the security system this server supervises. The default columns on this page include:Clic
103Monitoring AlarmsWhen you click on the Alarms tab on the Monitor screen, a page like this appears:Any alarms detected are listed in the Acknowledge
104• Unacknowledged Alarms window includes all those alarms recorded by the system that have not yet been acknowledged or addressed.• Acknowledged Ala
105Searching for Events and AlarmsWhen you click the Search tab, a page like this example appears:The search and navigation tray appears at the bottom
7Host Name This is the DNS name for this appliance and is identified as such under the 'DNS Name' field on the Appliance Listing page.Domain
106The buttons on this screen include these:To search for a specific transaction – event, alarm, or item – within the monitor database, do this:1. Go
107The string you enter can represent any item that appears in the “Source Location”, “Source Name”, “Last Name”, “Message” or “Event Name”. The wildc
108The Verification page appears as detailed in the Operator’s Guide and the online help.2. Click one of the button. A list of available doors appea
109Monitoring Hardware StatusWhen you click the HW Status tab from the Monitor screen, a page like this example appears:This page displays the current
110Rx Indicates the number of data packets the designated Access Control Manager server port has received.Tx Indicates the number of data packets the
111All / None Check the individual box next to the door to indicate that the door on this line should be included in the control panel above. If you c
112Name The name assigned to the panel.To expand this panel and review the dependent components -- such as subpanels, inputs, and outputs - controlled
113Sub-Panel StatusIndicates the number of the sub-panels attached to this panel. Each relevant subpanel is displayed together with its current status
114This is the color legend used by both the doors and panels.Monitoring MapsWhen you click the Map tab, a page like this example appears.This page li
115To view a map of interest, simply click on the map name and the map appears. A map like this example appears with all available security points.For
811. Click the button to save changes. Mercury Client Port Specify the port number used to set the port you wish this appliance to use in order to l
912. Click the button.13. Once the appliance reboots, click the About tab. The About page appears like the following example. The essential informa
10The Software Terms and Conditions form appears like this example:15. Review the terms then enter the name of this company, the name of the administr
11If you need to change any other values, they include:21. Save your changes, reboot the appliance, and log out.22.Log into the appliance again and cl
12a. Remove the crossover cable and move the appliance to its required position in the system.b. Using a standard Ethernet cable, connect one end of t
13PanelsAfter setting up the appliance, your next step is to configure the panels to which this appliance is connected. For this document, we are only
146. Leave the rest of the fields at their default settings and click to save your settings.The Sub-panels page appears like this example:7. Choose
1510. Click on the Host tab and configure the host communication settings.11. Enter the primary IP address for the panel. Leave the rest of the settin
Access Control ManageriiVersion 5.0/AV01-1213Version 5.0Copyright© 2012-2013 Avigilon Inc.Avigilon Inc.Box 378#101-1001 West BroadwayVancouver, Britis
1612. Click to save your settings.Once the previous settings have been saved, the system returns to the Panels Listing page. You should see that the
17The Firmware listing like this example:15. Locate the firmware for the panel you installed and configured, then click the green check mark to downlo
186. Proceed to add Areas (page 19).If you do not require areas in order to define the doors, you can skip Areas and go directly to Doors (page 21).
19AreasAreas are zones the Access Control Manager assigns to define a physical area within a secured location. This area can be relatively small, like
20These fields include:5. Click to save these values. A message appears “Area was successfully created” and the Areas Listing page reappears with th
21DoorsAfter you have configured both the appliance and the panels it controls, it is time to create and configure each door associated with the creat
22The Door Add page expands to include basic door configuration values, like the following example:The fields on this page include:Name Enter the name
23Offline Mode Specifies the entry mode used for the door if the door controller is no longer communicating with the panel. Note: In many cases, the l
247. Choose the following for basic door configurations values:• Access Type: Single• Door Mode: Card Only• Offline Mode: Facility Code Only• Unlock D
25Alt Name Identifies an alternate name for the door. If there is an additional name the door is identified by, enter this alternate name.Location Id
Access Control ManageriiiGetting HelpIf you encounter a problem that is not discussed in available Avigilon Access Control Manager user guides or onli
2610. Configure these door attributes as required: •Anti-passback settings• PIN attributes•Strike Mode• Access times• Card format settings Other field
27The Hardware page appears like this example:The fields on this page include:If a sub-panel has been assigned as the option for any of the following
2812. On this page, you can configure these door attributes:• Reader (entry and/or exit)• REX (Request-to-exit button or bar)• Door Contact•StrikeIf y
29The Interlocks page appears like this example:Interlocks allow you to configure inputs and outputs connected to this door.NOTE: For more on interloc
30•The Access page is a quick reference by door to show what access groups, roles and identities have access to that door. •The Events page provides a
31EOL ResistanceEnd-of-line resistance refers to resistance levels that must be maintained for input points. Input devices used with doors from vendor
326. When you're finished, click . The EOL Resistance Listing page reappears with the newly defined option listed.to: Select from the drop-down
33SchedulesA schedule is a time period defined for use by the system. It is an editable, reusable time template that can be used to control such thing
344. When you are finished, click the button. If the schedule addition is successful, the Schedule Listing page appears the new schedule listed and
35HolidaysHolidays are those days during the year when normal security policy may not be followed, either because it is a vacation or because a differ
1Table of ContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1Flowchart . . . . . . .
365. When you're finished, click the button. The Holiday Listing page reappears with the new holiday listed and the confirmation message “Holid
37PoliciesPolicies are limits that can be imposed on people and security devices within the Access Control Manager system. A policy is an aggregation
384. Click the button. The confirmation message, “Policy was successfully created.” displayed. The Policy properties edit screen appears like this e
39GroupsGroups combine one or more existing policies with the members (identities) who can use them.In order to create a group, you must first create
405. Click the button. The confirmation message, “Group was successfully created.” displayed. The Group properties edit screen appears like this exa
41Card FormatsReaders that control access to and exit from doors come in many varieties and use many different card protocols. The most commonly used
425. When you're finished, click .The Card Formats Listing page reappears with the new card format displayed.Offset The offset number for this c
43Once you have defined a card format, the format appears on the Door Operators page as a card format option, as shown in this example:
44Event TypesEvent types are classifications of events that may occur during the operation of the Access Control Manager system. Event types are assoc
45These fields include:5. When you're finished, click .The Event Types Listing page reappears with a message saying the event was successfully c
1OverviewThank you for your purchase of the Access Control Manager software.This configuration and workflow guide will walk you through the steps requ
46EventsEvents include all messages and alarms issued by specific devices within the Access Control Manager system. Events are categorized by Event Ty
47The Edit Event screen appears like this example:4. Make changes to these fields as required.These fields include:Name Enter a name for this event.Re
485. When you're finished, click .The Events Listing page reappears with a message saying the event was successfully changed.Masked Check this b
49RolesRoles limit or regulate the number of tasks that a specific user can perform within the Access Control Manager system. That is, use the Roles f
504. Click on the button. Upon successfully adding a role, the Role Edit property screen appears like the following example:5. Click each of the rem
51Access GroupsBefore creating a role, we recommend that you define your required access groups. Access Groups combine a schedule (time) with doors wi
52This includes adding doors from the ‘Available’ window to the ‘Members’ window by selecting the selected door, then click the icon.9. Click the Ac
53Delegation GroupsDelegation (permissions) authorizes certain persons or groups of persons within the Access Control Manager database to perform pred
54The Delegation Groups Edit page appears like this example:7. Define this group by adding features in this manner:a. In the ‘Available’ window, click
55PartitionsAccess Control Manager utilizes partitions to limit the access of operators, devices, and users to only specified roles. This enables Acce
2FlowchartThe flowchart below shows the basic steps you should follow to complete the setup process.page 3page 93page 21page 19page 37page 35page 33pa
566. When, you're finished, click again.You are returned to the Partitions Listing page with the newly-defined partition on the list.For more o
57Badge DesignerThe Badge Designer is the utility the Access Control Manager uses to design badge templates for inclusion in badge holder credentials.
58The designated badge template add page appears like this example:4. Enter a name for this badge template in the ‘Name’ field.5. Specify the size of
5910. When you're finished customizing this template, click once again. A message appears indicating the success of the badge template creation
60The number in the Color field changes to reflect your choice.4. If required, slide up or down the vertical slide bar to change the color still furth
61NOTE: None of the values entered here are reflected on the canvas until you have saved the screen by clicking . Once saved, the preview pane displ
62When you select a Data Field option, the placeholder for that option appears on the canvas as shown in the following example.Use your mouse to drag
63When you click the button, a Text field appears, like this example:Notice that a text placeholder appears on the canvas. Use your mouse to drag th
64NOTE: None of the values entered here are reflected on the canvas until you have saved the screen by clicking . The Preview pane appears with the
65NOTE: None of the values entered here are reflected on the canvas until you have saved the screen by clicking . The Preview pane appears with the
3Access Control Manager WorkflowThe following workflow is divided into sections and subsections representing the steps you will take in configuring th
66The IP Camera Listing page appears like this example.3. Select one of the currently available device types:• For an IP-based camera, go to step 4.•
67Preview URL Enter the URL or web address, if required, of this camera's web-based application showing a preview of the finished picture.Device
68File to Upload Either enter the name of the file required to run this server or click the button and find the required file.Username If required,
69VidProxyUrl The URL used as a translator between the appliance and the server. VidProxyImageUrl The URL used to store the video captured by the Avig
706. Once you’ve selected the field values you need, click to save these changes.The new device appears on the listing page.Username The name the us
71User-Defined Fields and ListsUser-defined fields are custom fields added to the Identity or other custom forms that the user can use to capture info
72You can also use this feature to create additional tabbed pages for an identity form. For more on this, refer to the Access Control Manager online h
73RoutingThe routing group is a method for associating specific event types with designated access groups that are effective during a specified time i
745. When you're finished, click . The Routing Group Edit property sheet appears like this example:6. Check the values on the Schedule page and
75The Groups page appears like this example:10. Associate available access groups with this routing group as required.11. When you're finished, c
42. Connect the Access Control Manager appliance to a computer using the crossover cable to Port 2 of the appliance.3. On your connected computer, ope
76CollaborationCollaboration provides the ability to exchange data between the Access Control Manager appliance application and a large number of othe
77IdentitiesThe Identities feature is used to enroll employees and all other workers and service personnel who require access to a facility or locatio
78The Identity Add page appears like this example:The fields on this page include:Identity InformationPhoto If you have either imported an image or ca
79Status Select the option from the pick list that describes the current status of this new user.Active - this is a current user. Expired - this user&
804. Fill out the fields on this page as required.5. When you've filled out the required field, click the button. The extended Identities tabs
81The Tokens page appears like this example:The fields on this page include:Embossed NumberEnter the number embossed on the card that will be issued t
828. Customize tokens for this identity as required.9. Click the Groups tab. The Groups page appears like this example:10. Assign groups to this perso
83If the capture device has been secured by a user name and password, this page will not appear until you have supplied the required values to the aut
8421. If you need to upload another photo, repeat Steps 17 through 19.Once a photo is uploaded, it appears on this page as shown in this example:22.Wh
8524.Enter the required fields.25.Click the Transactions tab.The Transactions page appears like this example:This page enables the qualified operator
5At this point, you will probably see a message indicating that you are trying to reach an unknown or insecure site, like these examples:4. Do one of
86A badge for this person is printed to the designated badge printer.28.If needed, click the Audit tab to display and review the Audit page.29.When yo
87Identity ProfilesDefining an identity can take a long time. The identity page alone contains more than 25 fields. Assigning attributes to that ident
88ReportsThe qualified operator can generate reports, in either PDF or CSV format, concerning many areas of Access Control Manager system function inc
89The Reports Listing page appears like this example:2. At the required report line, do one of these: • Click the icon to generate a PDF.• Click the
90• Click OK to display immediately the required report in the specified format.• Select the ‘Save File’ radio button then click OK. This will save th
91MapsUsing the Access Control Manager’s Map Designer, the qualified operator can import maps and blue prints into the application, place the inputs,
92The Map Edit page appears like this example:8. Using the Map Details on the left side, click next to the point category you want to specify.A pick
9312. When you're finished, click to save your modifications.At any point, you can expand the Map Details panel on the left to review the point
94Global ActionsGlobal actions enable the qualified operator to associate an action -- defined by either a macro or a Exacq soft trigger -- with a tri
95Global LinkagesGlobal linkages are the final step in the process that defines specific actions for triggering events at specific doors. What separat
Comments to this Manuals