Centaur Reference Manual
Centaur Reference Manual
1 REFERENCE MANUAL
01/2004
Centaur is a registered trademark of Position Technology INC. Pro-Report, Tracker, FrontGuard and FrontView are trademarks of Position Technology Inc. 2000-2004 Position Technology Inc.
TABLE OF CONTENTS
USING CENTAUR ..................................................................................................................... 1 Installing the Centaur Software .................................................................................................. 2 Starting the Centaur Software .................................................................................................... 2 Software Modules ...................................................................................................................... 3 Typing Names and Notes .......................................................................................................... 4 Registering the Centaur Software .............................................................................................. 5 Technical Support ...................................................................................................................... 5 SITES ........................................................................................................................................ 7 Adding, Modifying and Deleting a Site ....................................................................................... 8 General Site Properties .............................................................................................................. 9 Sites Communication Settings ................................................................................................ 10 Sites Global Card Settings ..................................................................................................... 14 Sites Floor Settings ................................................................................................................. 16 Sites CCTV Port Settings ........................................................................................................ 17 Communicating with Site ......................................................................................................... 18 HOLIDAYS .............................................................................................................................. 21 Adding, Modifying and Deleting Holidays ................................................................................ 22 General Holiday Properties ...................................................................................................... 22 Holiday Settings ....................................................................................................................... 23 SCHEDULES ........................................................................................................................... 25 Adding, Modifying and Deleting Schedules ............................................................................. 26 General Schedule Properties ................................................................................................... 27 Schedules Periods .................................................................................................................. 27 ACCESS LEVELS ................................................................................................................... 31 Adding, Modifying and Deleting Access Levels ....................................................................... 32 General Access Level Properties ............................................................................................. 32 Access Level Doors and Schedules ........................................................................................ 33 DOORS .................................................................................................................................... 35 Adding, Modifying and Deleting Doors ..................................................................................... 36 General Door Properties .......................................................................................................... 36 Door Settings ........................................................................................................................... 37 Door Inputs and Outputs .......................................................................................................... 44 Floors Public Access Schedule .............................................................................................. 47 Display Door Status and Manual Controls ............................................................................... 48 CARDS .................................................................................................................................... 49 Adding, Modifying and Deleting Cards ..................................................................................... 51 Card Settings ........................................................................................................................... 51 FrontCard ................................................................................................................................. 55 Card Import/Export Wizard ...................................................................................................... 58
CENTAUR I
RELAYS ...................................................................................................................................61 Adding, Modifying and Deleting Relays ....................................................................................62 General Relay Properties .........................................................................................................62 Relay Activation Properties .......................................................................................................63 Display Relay Status and Manual Controls ..............................................................................65 CONTROLLERS ......................................................................................................................67 Adding, Modifying and Deleting Controllers ..............................................................................68 General Controller Properties ...................................................................................................69 Controller Configuration ............................................................................................................71 Controller Anti-passback Settings .............................................................................................75 Door Expansion Module Configuration .....................................................................................77 Online Controller Firmware Upgrades ......................................................................................79 Download ..................................................................................................................................80 Other Controller Management Options .....................................................................................81 INPUTS .....................................................................................................................................83 Connecting Inputs .....................................................................................................................84 Adding, Modifying and Deleting Inputs .....................................................................................87 General Input Properties ...........................................................................................................87 Input Properties ........................................................................................................................88 OUTPUTS .................................................................................................................................93 Overview of Output Programming ............................................................................................94 Adding, Modifying and Deleting Outputs ..................................................................................95 General Output Properties ........................................................................................................96 Output Settings .........................................................................................................................97 Display and Control Output Status .........................................................................................100 EVENTS .................................................................................................................................101 Event Definition Overview .......................................................................................................102 Event Schedules and Device Activation .................................................................................103 Alarm Acknowledgment ..........................................................................................................105 Event-Activated CCTV Control ...............................................................................................106 ELEVATOR CONTROL .........................................................................................................109 Overview of Elevator Control ..................................................................................................110 GROUPS ................................................................................................................................113 What Are Groups? ..................................................................................................................114 Adding, Modifying and Deleting Groups .................................................................................114 General Group Properties .......................................................................................................115 Floor Groups Floors and Schedules ......................................................................................115 Assigning Devices to a Door, Input or Relay Group ...............................................................116 Manual Control of Door and Relay Groups .............................................................................116 OPERATORS .........................................................................................................................119 Overview of Operators ............................................................................................................120 Adding, Modifying and Deleting Security Levels, Permissions and Operators .......................120 II TABLE OF CONTENTS
General Properties for Security Levels, Permissions and Operators ..................................... 121 Security Levels ...................................................................................................................... 122 Permissions ........................................................................................................................... 123 Operators ............................................................................................................................... 124 CCTV COMMANDS ............................................................................................................... 127 Adding, Modifying and Deleting CCTV Commands ............................................................... 128 General CCTV Command Properties .................................................................................... 128 CCTV Command Settings ...................................................................................................... 128 OPTIONS ............................................................................................................................... 131 General Centaur Options ....................................................................................................... 132 Event Colour Definitions ........................................................................................................ 133 Operator Timeout .................................................................................................................. 134 MANUAL CONTROLS .......................................................................................................... 137 Event Display ......................................................................................................................... 138 Manual Controls ..................................................................................................................... 138 DATABASE MANAGEMENT ................................................................................................ 145 What Are the Centaur Databases? ........................................................................................ 146 Database Management Module ............................................................................................. 146 Database Backup Scheduler ................................................................................................. 152 WAVE PLAYER ..................................................................................................................... 155 Wave Player .......................................................................................................................... 156
CENTAUR III
IV TABLE OF CONTENTS
Centaur is an advanced and powerful access control management software. The following chapter contains important information concerning the use of this software.
CENTAUR 1
I n s ta l l i n g t h e C e n ta u r S o f t w a r e
For the most recent information on the Centaur access control software, hardware requirements, operating system requirements and detailed installation instructions, please refer to the Centaur Installation Instructions that are included with the CD.
Sta r t i n g t h e C e n ta u r S o f t w a r e
This section describes how to start the Centaur software from the Centaur Server computer or a networked workstation. During start-up, the software will default to the appropriate edition of Centaur (Lite, Standard, Professional or Enterprise). The edition is determined by the connected hardware key (dongle). A hardware key is not required to start/run the Demo Edition of the Centaur software. 1. Make sure that the appropriate hardware key (dongle) is connected to the computers parallel port before starting the Centaur Service Manager.
Connect the 25-pin hardware key (dongle) to the computers parallel port.
Male Pins
Printer
2. Click Start Programs Position Technology Centaur 3.1 Centaur Service Manager. The Centaur Service Manager window will appear. 3. The Auto-start service when OS starts and Auto-restart service when stopped check boxes in the Centaur Service Manager window are only available when Centaur is set as a service under Windows, refer to the Centaur Installation Guide included with the Centaur CD. 4. From the Centaur Service Manager window, click the Start/Continue button. Once the Centaur Service Manager is running, you can close the Centaur Service Manager window. Also note that when you start the Centaur Service Manager, the Centaur software will automatically start the MSDE or SQL Server. If you get an error message during this step, click OK, and then click the Start/Continue button again.
MSDE (SQL Server) Service Manager Centaur Service Manager
5. Click Start Programs Position Technology Centaur 3.1 Administration Console Administration Console. The Logon window will appear. 6. From the Logon window, type the appropriate Logon ID and Password. The default Logon ID is Admin and the default Password is Admin. If you are trying to logon to a Centaur Server that is on a network, type the Server computers network name or IP address in the Computer text box. From the Language drop-down list, select the desired language. Click OK. 2 INSTALLATION AND USE
Warning: To allow access from remote workstations, DCOM must be configured on the Centaur Server computer (refer to the Centaur Installation Guide included with the Centaur CD). Note: To stop the Centaur Service Manager, click Stop. If the Operator Logon window appears, enter your Centaur Logon ID and Password and then click Ok. The Operator Logon window will not appear if Centaur is a service under Windows (refer to the Centaur Installation Guide included with the Centaur CD).
Software Modules
All of the software modules listed below are now automatically installed with the server or workstation edition of Centaur and no longer require a separate licence (hardware key) to run on a networked workstation with the exception of FrontView. FrontCard: FrontCard provides an easy to use interface to program the card properties without having to deal with long card lists in the tree window and includes an advanced search engine. For more information, refer to FrontCard on page 55. Card Import/Export (server only): The Card Import/Export Utility (server only) enables you to export Centaur card data to a .csv file or import a .csv file containing card data into Centaurs card database. For more information, refer to Card Import/ Export Wizard on page 58. Database Management (server only): The Database Management Utility (server only) allows you to control and manage the often large and complex database files of the Centaur software. You can back up and restore database files, purge events from selected sites during specific periods, limit the size of database files and delete entire database files. For more information, refer to Database Management on page 145. Database Backup Scheduler (server only): The Database Backup Scheduler (server only) enables you to schedule regular backups of the Centaur databases. You can back up the Main database and the Event database separately, specify the location of the backup files and select how often (daily, weekly or monthly) the backup will occur. For more information, refer to Database Backup Scheduler on page 152. FrontGuard: FrontGuard uses events generated in Centaur to retrieve a picture and/ or video feed to help you identify cardholders or to view the location where an event has occurred. For more information, refer to the FrontGuard Operators Manual. Locator: Designed to function with the systems Global Anti-Passback feature, Locator allows you to monitor when cardholders enter and exit designated doors in real-time, retrieve cardholder information and print customizable cardholder access reports. For more information, refer to Locators Online Help. CENTAUR 3
WavePlayer: This utility was designed to enable a .wav file to be played on the computer when an event that requires acknowledgment occurs. The sound can replay at programmed intervals until the alarm is acknowledged. For more information, refer to Wave Player on page 155. Pro-Report: Pro-Report is a user-friendly wizard for generating system reports. Generate quick (one-time), pre-defined and scheduled reports for up to 8 different report types. You can also search, group and sort your reports. For more information, refer to Pro-Reports Online Help. Tracker: An integral part of Pro-Report, Tracker is a time and attendance software that enables you to track employee work hours, overtime, and missed and late punches. You can also program lunch, break and supper times; customize overtime calculation; print reports; and edit the reports punch-in and punch-out times. For more information, refer to Pro-Reports Online Help. FrontView (Network edition requires hardware key): The FrontView real-time graphic interface gives you point -and-click control over doors, relays, inputs, outputs and controllers through a graphical floor plan. For more information, refer to FrontViews Online Help.
Ty p i n g N a m e s a n d N o t e s
1. When changing the name of a system characteristic, which consist of all the elements found in the Tree window (i.e. controllers, events, doors, etc.), Centaur will not immediately refresh the screen. This means that in places where the system characteristics name should appear, Centaur will continue to display the previous name. To rectify this problem, press F5 on your computers keyboard and then return to youre desired window or menu. 2. If a warning message appears when typing in a text field, please note that Centaur 4 INSTALLATION AND USE
does not support more than 50 characters for Name text fields and 255 characters for Notes text fields. 3. Use the drop-down list on the right of certain text fields to type the text in more than one language (see Languages on page 5).
Languages
The Centaur 3.1 software is a trilingual software. Many of the text fields in the property windows (when programming sites, doors, etc.) will have a drop-down list available. Use these drop-down lists on the right of certain text fields to enter item names and notes in more than one language. When a Centaur Administration Console is installed on a workstation computer, you will be asked to select one language. The workstation computer connected to the server via a network will display the item names and notes in the Administration Consoles installed language.
R e g i s t e r i n g t h e C e n ta u r S o f t w a r e
We highly recommend that you register the software. If your software is not registered you will not have access to technical support or any upgrade information. Follow these steps to register the Centaur access control software: 1. Go to www.postech.ca 2. Complete the Registration Form as indicated. You will be required to type a serial number (i.e. PTC3-123456-1234-DEMO-1234), which can be found on the Centaur CDROM package. You must use uppercase characters when entering the serial number. 3. When you have entered the required information, click Submit to register by direct internet connection. If you wish, you can print the Registration Form and fax it to us at (450) 491-2509.
Te c h n i c a l S u p p o r t
For any difficulty during installation or while using the software, contact our technical support team at 1-800-996-9244 or logon to our Web site at www.postech.ca and click Support. You can also review the release .txt file on the CD-ROM.
CENTAUR 5
Chapter 2: Sites
The powerful site-scheduling concept designed for Centaur offers the ability to setup a multi-site installation. As well as controlling local sites connected directly to the access control server, Centaur can also control remote (dial-up) sites through the use of a modem. Depending on the Centaur Edition being used, each site can monitor and operate a specific number of cards, controllers, doors, inputs, relays and multifunction outputs.
CENTAUR 7
Adding a Site
Perform the following to add a site: 1. From Tree window (left-hand portion of your screen), right-click the Sites branch and click Add Site. 2. A dialog box appears requesting if you would like to use the Site Configuration Wizard. The Site Configuration Wizard guides you through the minimum required settings to get the site communicating with its controllers. If you want to use the Site Configuration Wizard, click Yes and follow the steps detailed in Using the Site Configuration Wizard on page 8. If you do not want to use the Site Configuration Wizard, click No and go to step 3. If you do not want to add a site, click Cancel. 3. In the New Site window, type the desired site name. We recommend using a name that is representative of the site such as Manufacturing Plant (Montreal). 4. Click OK.
(depending on the option selected in step 6), set the available options as required. For more information on these options, which include IP Address, Port Number and Input Configuration, refer to Setting the Controllers Input Configuration on page 73 and Configuring the Controllers Communication Settings on page 73. Click Next if you are in the Custom Controller Setup window. 8. Under Door Default Settings or in the Custom Door Setup window (depending on the option selected in step 6), set the available options as required. For more information on these options, refer to Unlock Time on page 42, Selecting the Lock Control Type on page 40 and Reader Type on page 72. Please note that the Door Type option is not yet supported and therefore will be set to Access by default. Refer to Selecting a Door Type on page 38 for more information. 9. Click Finish.
Modifying a Site
To modify an existing site, from the Tree window (left-hand portion of your screen), rightclick the desired site from the Sites branch and then click Properties from the list. The Site Properties window will appear allowing you to configure the site.
Deleting a Site
To delete an existing site, from the Tree window (left-hand portion of your screen), rightclick the desired site from the Sites branch, and then click Delete from the list that appears. A dialog box will appear requesting confirmation.
CENTAUR 9
S i t e s C o m m u n i c a t i o n S e t t i n g s
Each site can be connected either locally, remotely or through an ethernet connection, therefore, their communication settings must be programmed appropriately. Note: When a site is communicating (online) with the Access Control Server, you will not be able to modify the sites communication settings. This is to prevent any accidental disconnection from the Access Control Server.
Dialup (Modem)
Select this method if this is a remote site that will communicate with the access control server through a modem. After selecting Dialup (Modem), you are required to set the following site properties: Selecting the Sites Speed on page 12, Selecting the Sites Communication Schedule on page 12, Assigning Dial-up Sites Telephone Number on page 13, and Assigning the Dial-up Sites Modem Type on page 14. If you do not set these properties, you will not be able to exit the Site Properties window. All other settings will be unavailable. To use this method, you must have a Standard, Professional, or Enterprise edition of the Centaur software. Figure 1: Dial-up Site
10 SITE PROGRAMMING
TCP/IP (LAN/WAN)
Select this method to have a sites controllers communicate over an ethernet network. To do so, you must connect one or more server devices as shown in Figure 2 on page 11. Sever devices convert the RS-232 communication protocol into the TCP/IP protocol. After selecting TCP/IP (LAN/WAN), you are required to set the following site properties: Selecting the Sites Speed on page 12, Selecting the Sites Communication Schedule on page 12 and you must also set the TCP/IP communication settings of each controller as detailed in Configuring the Controllers Communication Settings on page 73. All other settings will be unavailable. To use this method you must have a Professional, or Enterprise edition of the Centaur software. Note: Both the Lantronix MSS-100 and the UDS-10 device servers are recommended as they have been tested and found to work well with Position Technology products. The UDS-10 is the most commonly used device server and it is less expensive. Visit their Web site at www.lantronix.com for more information. Figure 2: TCP/IP Connection
CENTAUR 11
and addresses. This setting will only be available if the selected communication type is Direct (Serial Port) on page 11. Figure 3: Example of COM Port Assignment
CENTAUR 13
S i t e s G l o b a l C a r d S e t t i n g s
Each site can be programmed with different global card settings, which include User Definable Card Fields, Unique PIN Numbers, Maximum Family Numbers, Distributed Card Programming and Global Anti-Passback Reset Schedule.
14 SITE PROGRAMMING
Figure 5: Defining User Card Fields Custom fields from the Site Properties window. Date 1 Date 2 T/F1 T/F2 Text 1 Text 2 Text 3 Text 4 Text 5 Text 6 Text 7
Properties window, select the Cards tab and from the Maximum Family Number dropdown list, select the appropriate value as detailed below. 0 family codes = No family code 255 family codes = 1 Byte family code 65,535 family codes = 2 Byte family code 16,777,215 family codes = 3 Byte family code 4,294,967,295 family codes = 4 Byte family code
S i t e s F l o o r S e t t i n g s
The first step in setting up elevator control is to define the number of floors in each site and to give a name to each of these logical floors. Up to 64 floors can be controlled per site.
Number of Floors
When adding or modifying a site (see Adding, Modifying and Deleting a Site on page 8), the Site Properties window will appear. From the Site Properties window, select the Floors tab. Define the number of floors that need to be controlled for the selected site by typing a value between 01 and 64 in the Number of Floors text field.
Floor Definition
When adding or modifying a site (see Adding, Modifying and Deleting a Site on page 8), the Site Properties window will appear. From the Site Properties window, select the Floors tab. Under the Floor Name heading, record the name for each of the enabled floors. To do so, right-click the desired floor, select Rename, type the desired name and press Enter. Please keep in mind that when setting up elevator control, the floors always refer to a buildings logical floors and not their named floors as shown in Figure 6 on page 17.
16 SITE PROGRAMMING
S i t e s C C T V P o r t S e t t i n g s
If a site requires CCTV control, you must activate CCTV control to define through which COM port the CCTV commands will be sent and what communication settings the COM port will use.
CENTAUR 17
Data Bits
In the Data Bits list, select the number of data bits required to communicate with the video switcher connected to the selected COM Port. This value is the number of bits used to represent one character of data. Most forms of data require eight bits.
Parity
In the Parity list, select a parity value thats required to communicate with the video switcher connected to the selected COM Port. Parity check is an error detection technique that tests the integrity of digital data within the computer system or over a network. Each time a byte is transferred or transmitted, the parity bit is tested by the memory controller circuits on the motherboard.
Stop Bits
In the Stop Bits list, select the number of stop bits required to communicate with the video switcher connected to the selected COM Port. The stop bit is transmitted after each character.
Flow Control
In the Flow Control list, select the flow control type required to communicate with the video switcher connected to the selected COM Port. Flow control determines the timing of signals and enables slower-speed devices to communicate with higherspeed ones. There are various techniques, but all are designed to ensure that the receiving station is able to accept the next block of data before the sending station sends it.
the access control server must be completed as described in the CT-V900 Controller Installation Instructions. Also, the sites communication settings must be programmed appropriately as described in Sites Communication Settings on page 10. The communication settings of each controller in the site must also be programmed appropriately as detailed in Configuring the Controllers Communication Settings on page 73.
CENTAUR 19
20 SITE PROGRAMMING
Chapter 3: Holidays
Use holidays to define which days in a specific schedule or period are valid or invalid. Once created, you can assign the holiday to one or more holiday groups.
CENTAUR 21
Modifying a Holiday
From the desired site branch in the Tree window (left-hand portion of your screen), doubleclick the holiday you wish to modify or right-click the holiday, and then click Properties from the list that appears.
Deleting a Holiday
To delete an existing holiday, right-click the holiday from the appropriate Site branch in the Tree window (left-hand portion of your screen), and then click Delete from the list. A dialog box will appear requesting confirmation.
22 HOLIDAY PROGRAMMING
Holiday Settings
You can define which days in a year are holidays and then the holidays can be assigned to a holiday group. If you assign the holiday to one or more holiday groups, schedules are valid or invalid depending on how the holiday group is assigned to a schedules period (see Schedules Periods on page 27). If you do not assign a holiday to a holiday group, schedules are invalid (access denied) on that day.
CENTAUR 23
24 HOLIDAY PROGRAMMING
Chapter 4: Schedules
A schedule can be used to schedule tasks, automate operations and to control access to doors, elevator floors and much more. Schedules play an important role in the operation of many functions and are widely used throughout the software (see Table 1 on page 26). A schedule is made up of up to eight time periods which determine when that schedule will be valid. Each period in a schedule specifies the days and times the schedule will be valid. For example, when programming doors, a schedule can be assigned to a specific door and the schedule will dictate when the door can be accessed without the use of a card.
CENTAUR 25
Table 1: Where Schedules Can Be Used USED IN: Site Programming Access Level Programming Controller Programming Door Programming AFFECTS WHAT: Communications Schedule Global Anti-Passback Reset Schedule Card Programming Anti-Passback Schedule Anti-Passback Reset Schedule Keypad Enabling Schedule Door Unlock Schedule REX Input Enabling Schedule Interlock Input Enabling Schedule Relay Programming Input Programming Event Programming Timed Activation Schedule Activating Schedule Input Enabling Schedule Event Display Schedule Save to Disk Schedule Acknowledge Schedule Device Activation Schedule Elevator Control Programming Floor Group Enabling Schedule Floor Schedules CROSS-REFERENCE page 12 page 16 page 52 page 76 page 76 page 41 page 41 page 45 page 45 page 64 page 64 page 89 page 103 page 104 page 105 page 104 page 115 page 115
Adding a Schedule
If you want to add a schedule and immediately program its properties, right-click Schedules in the desired Site branch and then click New Schedule from the list that appears. After adding a schedule, the Schedule Properties window will appear allowing you to configure the schedule (see General Schedule Properties).
Modifying a Schedule
From the desired Site branch in the Tree window (left-hand portion of your screen), double-click the schedule you wish to modify or right-click the schedule, and then click Properties from the list that appears. You cannot modify the pre-programmed Always and Never schedules. 26 SCHEDULE PROGRAMMING
Deleting a Schedule
To delete an existing schedule, right-click the schedule from the appropriate Site branch in the Tree window (left-hand portion of your screen), and then click Delete from the list. A dialog box will appear requesting confirmation. You cannot delete the pre-programmed Always and Never schedules.
S c h e d u l e s P e r i o d s
Each schedule consists of up to 8 periods and each period defines when the schedule will be valid. Each period can be programmed with a different start and end time. Use the CENTAUR 27
check boxes to define which days of the week and which holiday groups will be used for each period. To define a schedules period: 1. After adding or when modifying a schedule (see Adding, Modifying and Deleting Schedules on page 26), the Schedule Properties window will appear. From the Schedule Properties window, select the Details tab. 2. In the desired periods Start and End text fields, type the periods start and end time using the 24-hour clock. For more information, refer to Setting the Periods Start and End Time on page 28. 3. Select the check box(es) corresponding to the day(s) of the week you wish to assign to the schedule. The schedule will only be valid during the days of the week that have been selected and only at the times specified by the start and end times. 4. To assign the period to a holiday group, select the check box(es) corresponding to the desired holiday groups. For more information, refer to Assigning Holiday Groups to a Schedules Period on page 29. 5. Click OK. Example: In Figure 7 on page 28, the schedule will be valid from Monday to Friday between 7:00AM and 9:00PM and from Saturday to Sunday between 9:00AM and 1:00PM. The schedule will not be valid on any programmed holidays. Figure 7: Example of Programming a Schedules Periods
28 SCHEDULE PROGRAMMING
Warning: The start and end time of a single period cannot crossover into another day, you must use separate periods. For example, 20:00 Monday to 07:00 Tuesday must be programmed as follows: Period 1 = Monday 20:00 to 24:00 Period 2 = Tuesday 00:00 to 07:00 Figure 8: Programming Crossover Periods
CENTAUR 29
30 SCHEDULE PROGRAMMING
Access Levels determine which doors in the system a cardholder will have access to and during which periods. This is done by enabling the desired doors in an Access Level, then assigning a schedule to each selected door and assigning the Access Level to the desired cards. Please note that the 256 Access Levels include two pre-programmed Access Levels (All and None). For information on how the access levels are used, refer to Cards on page 49.
CENTAUR 31
CENTAUR 33
Example: In Figure 9, the Production Entrance door is enabled and has been assigned the General schedule. This means any cardholder assigned with this access level will be granted access to the production entrance only when the General schedule is valid. Figure 9: Example of Access Level Programming
Chapter 6: Doors
Each controller includes 2 reader and 2 keypad inputs, which can monitor the state of up to 2 doors. Each controller also supports up to three 2-Door Expansion Modules (CA-A470-A), which provide an additional 2 reader and 2 keypad inputs each. Therefore, each controller can monitor the state of up to 8 doors. The term Door refers to any access point controlled by a reader and/or keypad such as a door, turnstile, gate, cabinet, etc. To control entry and exit to an access point a reader and/or keypad can be used on both sides of the door. This also provides the ability to setup Interlock (mantrap) or Anti-passback applications. The use of door contacts on all controlled doors is highly recommended since it greatly enhances the level of security provided by an access control system. Many of the doors programmable options can only be used if a door contact is installed. CENTAUR 35
Deleting a Door
To delete an existing door, right-click the door from the appropriate Controller branch in the Tree window (left-hand portion of your screen), and then click Delete from the list. A dialog box will appear requesting confirmation.
Modifying a Door
From the desired controller branch in the Tree window (left-hand portion of your screen), double-click the door you wish to modify or right-click the door, and then click Properties from the list that appears.
36 DOOR PROGRAMMING
Door Settings
Each controller includes 2 reader and 2 keypad inputs, which can monitor the state of up to 2 doors. Each controller also supports up to three 2-Door Expansion Modules (CAA470-A), which provide an additional 2 reader and 2 keypad inputs each. Therefore, each controller can monitor the state of up to 8 doors. CENTAUR 37
The term Door refers to any access point controlled by a reader and/or keypad such as a door, turnstile, gate, cabinet, etc. To control entry and exit to an access point a reader and/or keypad can be used on both sides of the door. This also provides the ability to setup Interlock (mantrap) or Anti-passback applications. Centaur enables you to define a specific configuration for each door as well as set the doors various timers. Figure 11: General Tab in Door Properties Window
Access
Select this Access door type if you plan to use the controlled entry (one reader access) configuration. This means the reader will be located on one side of a door with no reader on the other side.
Elevator
When using CA-A480 Elevator Controllers (refer to Elevator Control on page 109), a reader can be installed inside an elevator. When you select Elevator from the Door Type drop-down list, Centaur tells the controller that the selected doors reader will be installed inside an elevator car for elevator control. The door cannot be used for any other purpose. Also note that options and features located in the Elevator Control tab can only be set when the Door Type is set to Elevator (see Floors Public Access Schedule on page 47). Each controllers door can control up to 64 38 DOOR PROGRAMMING
floors for one elevator car. Please note that the number of floors is defined per site and not per door (see Sites Floor Settings on page 16). For example, if you define a site with 20 floors and set up four doors from the same site for elevator control, each door will represent a different elevator car for the same 20 floors. Warning: The Elevator door type cannot be selected for doors located on a 2Door Expansion Module (doors 3 to 8). Only the CT-V900-A controllers doors can be set with the Elevator door type.
Entry or Exit
Select the Entry door type for the reader located on the entry side of the door and select the Exit door type for the exit reader located on the other side of the door. This configuration must be used to implement the local Anti-passback feature (see Enabling Controller Anti-passback on page 75).
CENTAUR 39
Reader
If you are connecting a reader or a reader and a keypad, select Reader from the drop-down list. The controller will recognize the use of a keypad if a keypad has been setup in the controllers door configuration (see Selecting the Doors Reader and Keypad Configuration on page 72).
Keypad
If you are connecting only a keypad (no reader) to the door input, select Keypad from the drop-down list.
De-energized
To operate in fail-secure mode (apply power to unlock a door), select De-energized from the Lock Control drop-down list. This means the selected lock output on the controller will remain de-activated. When an Access Granted or Door Unlocked event occurs, the controller will apply power to the lock output. If an electric door strike is used, this mode will keep the door locked during a total power loss.
40 DOOR PROGRAMMING
Energized
To operate in fail-safe mode (remove power to unlock a door), select Energized from the Lock Control drop-down list. This means the lock output on the controller will remain activated. When an Access Granted or Door Unlocked event occurs, the controller will remove power from the lock output. If an electric door strike is used, this mode will unlock the door during a total power loss.
Opened
When the Opened check box is selected, the controller will continue to read cards presented to the doors reader when the door is already opened, but will not reactivate the lock output. This option is commonly used in conjunction with the Controller Anti-passback Settings (see page 75) in high-traffic areas. This prevents Anti-passback errors from occurring due to users forgetting to wait until the door is closed before presenting their card.
Unlocked
When the Unlocked check box is selected, the controller will continue to read cards presented to the doors reader when the door is already unlocked. This option is CENTAUR 41
commonly used in conjunction with the Controller Anti-passback Settings (see page 75) when the door may be unlocked by a schedule. This prevents Antipassback errors from occurring due to a user presenting a card to a reader of a door that has already been unlocked by a schedule.
Unlock Time
In the Unlock Time text field enter a value between 001 and 999 seconds (Default: 5 seconds). This value represents the amount of time the door will remain unlocked when an Access Granted or Unlock event is generated from the door. The door will only remain unlocked for the entire Unlock Time if the Door Input Relock Schedule and REX Input Relock Schedule are disabled or if no Door Input has been programmed. For more information, refer to Door Inputs and Outputs on page 44.
Pre-alarm Time
Before generating an Open Too Long event (see Open Too Long on page 42), the controller can be programmed to generate a pre-alarm as a warning of the upcoming alarm. In the Pre-alarm Time text field type a value between 001 and 999 seconds (Default: 45 seconds). This value represents the amount of time a door can remain open after an Access Granted or Door Unlock event before generating a Door Left Open event. The Pre-alarm Time should always be less than the Open Too Long Time (see Example of Pre-Alarm and Open Too Long Timers on page 43). The controller can also be programmed to activate an output when a Door Left Open event is generated (see Outputs on page 93).
(Default: 60 seconds). This value represents the amount of time a door can remain open after an Access Granted or Door Unlock event before generating an Door Open Too Long event (see Example of Pre-Alarm and Open Too Long Timers on page 43). The controller can also be programmed to activate an output when a Door Open Too Long event is generated (see Outputs on page 93). Also, refer to Prealarm Time on page 42.
Extended Access
When a cardholder is granted access, the controller will unlock the door for the period defined by the Unlock Time (see page 42). Although, if the card has been programmed with the Extended option (see Setting Card Options on page 53), the controller will unlock the door for the duration of the Unlock Time in addition to the value programmed in the Extended Access timer. In the Extended Access text field, type a value between 001 and 999 seconds (Default: 15 seconds). This option is particularly useful for individuals that may require more time to access the door. Example: A card that has the Extended option enabled is granted access to the Front Door. This doors Unlock Time is 15 seconds and its Extended Access timer is 30 seconds. This means the door will remain unlocked for 45 seconds instead of only 15 seconds.
CENTAUR 43
D o o r I n p u ts a n d O u t p u ts
After adding or when modifying a door (see Adding, Modifying and Deleting Doors on page 36), the Door Properties window will appear. From the Door Properties window, select the Inputs and Outputs tab (see Figure 13 on page 44). The Inputs and Outputs tab will allow you to specify the configuration for the doors input, REX input and its interlock (mantrap) input as well as select which output(s) can be activated for the selected door. Figure 13: Inputs and Outputs Tab in Door Properties Window
4. Under the Door Input heading, select the desired input from the Input drop-down list. 5. Select a relock option from the Relock drop-down list under the Door Input heading. The control panel can relock the door as soon as it opens, when the door closes, or if you select Disabled, it will relock when the Unlock Time has elapsed (see Unlock Time on page 42). Also, refer to Selecting the Lock Control Type on page 40.
Perform these steps for each of the two doors being used in the mantrap configuration. 1. Make sure the Door Inputs have been programmed (see Assigning a Door Input on page 44). 2. After adding or when modifying a door (see Adding, Modifying and Deleting Doors on page 36), the Door Properties window will appear. From the Door Properties window, select the Inputs and Outputs tab. 3. From the Input drop-down list under the Interlock Input heading, select the same input that is assigned to the Door Input of the other door in the mantrap configuration (see Figure 14 on page 46). 4. From the Schedule drop-down list under the Interlock Input heading, select the schedule which will define when the Interlock (mantrap) configuration can be used. Figure 14: Programming Interlock Inputs Notice how the input selected for the Interlock Input is the same input used for the opposite doors Door Input. This is how the controller determines which two doors are used for the Interlock (Mantrap) application.
Outputs 13 to 18 belong to Doors 5 and 6 (CA-A470-A: DIP 1 on, DIP 2 off) Outputs 19 to 24 belong to Doors 7 and 8 (CA-A470-A: DIP 1 off, DIP 2 on) The selected door and its selected outputs must be from the same controller or the same expansion module. For example, outputs 7 to 12 can only be used with doors 3 and 4; they cannot be used with doors 1 to 2 or 5 to 8. When a check mark is placed in the appropriate output check boxes under the Output Activation heading, the selected output(s) will operate as defined by the outputs programmed features (refer to Outputs on page 93).
F l o o r s P u b l i c A c c e s s S c h e d u l e
When using CA-A480 Elevator Controllers (refer to Elevator Control on page 109), a reader can be installed inside an elevator. Each controllers door (elevator car) can be programmed with a general/public access schedule by assigning a schedule to each of the doors assigned floors. This defines, for the selected door, which floors are accessible to the general public (no access card required) and during which time period. Please note that to program these schedules, the Door Type must be set to Elevator (see Door Settings on page 37). Warning: The Elevator Floor Schedule cannot be used with doors located on a 2Door Expansion Module (doors 3 to 8). Only the CT-V900 controllers doors can be set for elevator control.
CENTAUR 47
D i s p l a y D o o r Sta t u s a n d M a n u a l C o n t r o l s
When you click on the Door Status icon, from the menu bar, Centaur will display the current (live) status of the doors in the system. If you wish to manually change the status of a door, right-click the desired door. A list of actions will appear. Select one of the following actions from the list.For more information, refer to Displaying and Controlling the Status of a Door on page 138.
48 DOOR PROGRAMMING
Chapter 7: Cards
Programming a card allows you to define the cards specific privileges and any details concerning the cardholder. When setting up the cardholders in the system, you must define WHO has access to WHERE, and WHEN they have access. In order to program the cards, you must first program the Sites (see page 7), Doors (see page 35), Holidays (see page 21), Schedules (see page 25) and Access Levels (see page 31). Please note that the number of cards your system can support is also limited by your hardware setup.
CENTAUR 49
Example: In Figure 16, John Doe will have access to the Production Entrance from 8:00AM to 5:00PM, Monday to Friday including New Years Day. Figure 16: Overview of Card Programming
50 CARD PROGRAMMING
Adding a Card
In the Tree window (left-hand portion of your screen), right-click Cards from the desired Site branch, and then click New Card. The Card window will appear allowing you to configure the card properties. Also, refer to FrontCard on page 55 and Card Import/ Export Wizard on page 58.
Modifying a Card
From the desired Site branch in the Tree window (left-hand portion of your screen), double-click the card you wish to modify or right-click the card, and then click Properties from the list that appears. Also, refer to FrontCard on page 55.
Deleting a Card
In the Tree window (left-hand portion of your screen), right-click the desired card, then click Delete from the list that appears. A dialog box will appear requesting confirmation. Also, refer to FrontCard on page 55.
Card Settings
After adding or when modifying a card (see Adding, Modifying and Deleting Cards on page 51), the Card window will appear. From the Card window, select the Card Holder tab (see step 4 in Figure 16 on page 50). This will allow you to view the site address, assign access levels and program the cardholder details, card numbers and several card options. These can also be programmed using FrontCard (see page 55).
Cardholder Details
After adding or when modifying a card (see Adding, Modifying and Deleting Cards on page 51), the Card window will appear. From the Card window, select the Card Holder tab and use the Last Name, First Name, Company Name and Notes text fields to identify the cardholders name and any additional notes that may be required. All recorded text excluding the Notes field will appear when displaying the Access Events in the Events window (see Display Access Events on page 138).
CENTAUR 51
Card Number
After adding or when modifying a card (see Adding, Modifying and Deleting Cards on page 51), the Card window will appear. From the Card window, select the Card Holder tab and use the Family Number and Card Number text fields to identify which access card will be assigned to the user.
Family Number
The family number can be found printed directly on the card or written on a crossreference sheet. The Family Number is always the first part of the number and is usually followed by a colon (e.g. 247:1234). If you cannot locate the family number, you can present the card to any reader in the system and its family and card number will appear in the Card Holder field of the Event window (see Figure 17). When you have located the correct number, type it into the Family Number text box. This text box will not be available if the maximum family number is set to 0 (see Selecting the Cards Maximum Family Number on page 15).
Card Number
The card number can be found printed directly on the card or written on a crossreference sheet. The card number is always the second part of the number and is usually preceeded by a colon (e.g. 247:1234). If you cannot locate the card number, you can present the card to any reader in the system and its family and card number will appear in the Card Holder field of the Event window (see Figure 17). When you have located the correct number, type it into the Card Number text box. Figure 17: Using the Event Window to Find Out the Card Number
Floor Group
To obtain access to a door defined for elevator control, the desired cards must be assigned a valid floor group. If the selected site has been setup for Elevator Control, a list of existing Floor Groups will appear when you click the Floor Group drop-down list. Select the floor group you wish to assign to the card. This will determine which floors and during which schedule a cardholder will have access. For more information on Floor Groups, refer to Groups on page 113.
Access Level
Up to two access levels can be assigned to each card. When you click one of the 52 CARD PROGRAMMING
Access Level drop-down lists, all active access levels in the selected site will appear. Select the access level(s) you wish to assign to the card. This will determine which doors in the site the cardholder will have access to and during which time periods each door can be accessed. For information, refer to Access Levels on page 31. If two access levels are assigned to a card, access is granted as long as one of the two access levels is valid when the card is presented.
Card Traced
Track a cardholders movements by generating a Card Traced event in addition to the Access Granted/Denied event every time the card is used. To enable this feature, select the Card Traced check box. You can use the Pro-Report software to generate a report of all the Card Traced events. The Card Traced event can also be used to activate a device such as a relay. The relay can be connected to a signalling device, warning the operator that a card with the card traced feature enabled has been presented to a reader. For more information, refer to Events on page 101.
Extended
When a cardholder is granted access to a door, the door will remain unlocked for the period defined by the doors Unlock Time (see page 42). When the Extended check box is selected, the door will remain unlocked for the duration of the doors Extended Access (see page 43) in addition to its Unlock Time. This option is particularly useful for individuals that may require more time to access the door. Example: A cardholder is granted access to the Front Door with an Unlock Time of 15 seconds and an Extended Access time of 30 seconds. If the option is enabled, the door will remain unlocked for 45 seconds instead of only 15 seconds.
Use Keypad
This option is used when a cardholder presents their card to a reader that is accompanied by a keypad on the same side of the door. If the Use keypad check box is selected, the cardholder will have to enter a P.I.N. (see page 53) on the keypad after presenting their card to the reader before being granted access.
P.I.N.
If the Use keypad check box has been selected (see Use Keypad on page 53), the cardholder will have to type the P.I.N. (Personal Identification Number) recorded in P.I.N. text box on the system keypad. The P.I.N. can be from four to eight digits in length and each digit can be any numerical value from zero to nine. The P.I.N. length is also a function of the keypad hardware being used. If desired, Centaur can automatically generate a unique P.I.N. for you. To do so, click the drop-down arrow to the right of the P.I.N. text field and select the desired P.I.N. length. CENTAUR 53
Anti-passback Override
When the Anti-Passback Override check box is selected, all the controllers in the site will ignore the Anti-passback status of the card (see Enabling Controller Antipassback on page 75).
Interlock Override
An interlock installation consists of two doors each controlled by a reader. Access will not be granted to a door in this configuration if the other door is already open. With the Interlock Override feature enabled, the cardholder does not have to wait for both doors to be closed in order to access a door using the Interlock feature. When using this option and access is granted, the controller will generate an Access Granted Interlock Override event. Also refer to Assigning an Interlock Input on page 45. Note: Centaur build 400 or higher and controller firmware version R2-C3-00 or higher are required to support this feature.
Valid
As soon as you click OK, the cards programmed access privileges are valid and the cardholder can begin using their card until the status is changed.
Pending
You can use this status level to create a card prior to the date the card becomes valid or for personnel on contract which would require a card to be active for a specific period of time. When you select Pending from the Status drop-down list, the Start Date and End Date drop-down lists will become active. Use these drop-down lists to select the day, month and year the card becomes valid and the day, month and year the card expires. The card becomes active at 00:00 of the selected Start Date and expires at 24:00 of the selected End Date.
54 CARD PROGRAMMING
For information on how to customize the titles of these fields, refer to Defining the User Definable Card Fields on page 14. 2 Date Fields (drop-down lists) 2 Check Boxes 7 Text Boxes
FrontCard
FrontCard is an application that is automatically installed with the Centaur software. FrontCard provides an easy to use interface to program the card properties (see Card Settings on page 51) without having to deal with long card lists in the Tree window and includes an advanced search engine. You can run FrontCard without having to run Centaur.
Starting FrontCard
The FrontCard Module can be started using one of two methods. To start the module from within Centaur, click the Open FrontCard icon from the main menu bar, or click Modules and then click FrontCard. The FrontCard Site Selection window appears. In the Site list, select the site whose cards you want to view or modify and click OK. To start FrontCard without Centaur running: 1. Click Start, then point to Programs, Position Technology, Centaur 3.1, Administration Console and then click FrontCard Card Editor. 2. From the Logon window, type the appropriate Logon ID and Password. FrontCard uses the same logon IDs and passwords as Centaur. If you are logging on to a networked access control server, type the computers network name or IP address in the Computer text field. Select the desired language from the Language list. 3. Click the Sort Order tab. Select the radio button representing the order in which you want the cards to appear and click OK. 4. The FrontCard Site Selection window appears. In the Site list, select the site whose cards you want to view or modify and click OK.
CENTAUR 55
Using FrontCard
After starting FrontCard (see Starting FrontCard on page 55) all actions are performed using the icon toolbar at the top of the FrontCard window. At any time you can use the Cardholder, User Defined Data and Photo tabs to view and/or edit the current card. For more information on the settings available in these tabs, refer to Card Settings on page 51.
Delete A Card
To delete the currently selected card, click the Delete card record button (-).
Save Changes
To save any changes made to the currently selected card, click the Save Changes button ( ).
Undo Changes
To undo any changes made to the currently selected card, click the Cancel Changes button (\).
Refresh
To update the list of cards with any cards that may have been added to the database using another method, click the Refresh button.
Search
To search for a card using specific criteria: 1. 2. Click the Find Card Record icon (binoculars). The Find Card window appears (see Figure 19 on page 57). In the Field list, select the desired criterion. The criteria that can be selected are as follows: Family Number, Card Number, P.I.N., First Name, Last Name, Company, or any of the text fields found in the User Defined Data tab. In the Find text field, type the text that FrontCard will search for. The text should be representative of the criterion selected in step 2. If you want the search to match exactly what is typed in the Find field, select the Exact Match check box. Click the Find button. From the Results list, highlight the desired card and click the Go to button to edit the card.
3. 4. 5. 6.
56 CARD PROGRAMMING
Use these buttons to scroll through the list of cards that are saved in the database.
Figure 18: FrontCard Window Add a Save new card. changes. Delete the currently displayed card. Cancel changes (undo).
Cards are sorted by last name or by card number depending on the option selected in Starting FrontCard on page 55.
* Use the Refresh button in the case where cards were added to the database using another method.
CENTAUR 57
C a r d I m p o r t / E x p o r t Wi z a r d
Centaur includes a card import and export application enabling you to export Centaur card data to a .csv file or import a .csv file containing card data into Centaurs card database. This application can be useful, for example, if you require several cardholders to have access to more than one site. After creating all the cards in one site, export the cards into a .csv file from the site containing the desired cards. Then import the .csv file created when you exported the data into the desired sites.
Exporting Cards
1. After starting the Card Import/Export Wizard Module (see Starting the Card Import/ Export Wizard on page 58), click Next. 2. Select the Export Cards radio button, click Next and then click Next again. 3. Select the site that contains the card data that you want to export and click Next. 4. Type the name of the .csv file that you want to create or click the ... button to select a file name and location. Click Next. 5. Select a delimiter that will separate the card data fields. If you want the name of each field to appear in the first row (i.e. last name, card number, etc.), select the First row contains field names check box. Click Next. 6. Items in the right list box represent data fields that will be exported into the .csv file. Highlight the data fields and use the > (add) and < (remove) buttons until the desired data fields appear in the right list box. Click Next. 7. Click Finish. A message appears indicating that information has been successfully exported. Click OK.
Importing Cards
Warning: If the site you are importing the cards into already contains cards that are also in the .csv file, errors may occur. 1. After starting the Card Import/Export Wizard Module (see Starting the Card Import/ Export Wizard on page 58), click Next. 2. Select the Import Cards radio button, click Next and then click Next again. 3. Select the site that you want to import the card data into and click Next. 4. Type the name of the .csv file that you want to import or click the ... button to select a 58 CARD PROGRAMMING
file name and location. Click Next. 5. Select a delimiter that separates the card data fields in the selected .csv file. If the .csv file contains a colon delimiter between the family and card number, select the Use : delimiter for Family/Card number check box. If the .csv file contains field names in the first row, select the First row contains field names check box. If the .csv file contains hexadecimal family numbers, select the Hex Family number check box. Click Next. 6. Select the default Access Levels and Floor Group you wish to assign to all the imported cards and click Next. These can be changed afterwards. 7. Items in the right list box represent data fields that will be imported into the selected site. Highlight the data fields and use the > (add) and < (remove) buttons until the desired data fields appear in the right list box. Click Next. 8. You can click Preview to review the data fields that will be imported into the selected site. Click Finish when you are done. A message appears indicating that information has been successfully imported. Click OK. Note: You must close and restart the Centaur administration console for all the changes to take effect.
CENTAUR 59
60 CARD PROGRAMMING
Chapter 8: Relays
Each controller includes two 5A 30VDC form C relays. Up to 14 relays can be added to each controller with the use of the CA-A460 Relay Expansion Modules. This allows you to program up to 16 relays per controller. Typically, the relays are used to activate alarm sounders or other devices such as lighting control units and air conditioners. The relays can be programmed to follow a schedule or to activate upon the validity of a schedule and disable after a programmed timer has elapsed.
CENTAUR 61
Deleting a Relay
To delete an existing relay, right-click the relay from the appropriate Controller branch in the Tree window (left-hand portion of your screen), and then click Delete from the list. A dialog box will appear requesting confirmation.
Modifying a Relay
From the desired Controller branch in the Tree window (left-hand portion of your screen), double-click the relay you wish to modify or right-click the relay, and then click Properties from the list that appears.
CENTAUR 63
when activated manually (see Displaying and Controlling the Status of a Relay on page 140).
De-energized
The relay output is energized when activated. This means the selected relay output on the controller will remain de-energized until activated by a schedule or manually (see Displaying and Controlling the Status of a Relay on page 140). When activated, the controller will apply power to the relay output.
Energized
The relay output is de-energized when activated. This means the selected relay output on the controller will remain energized until activated by a schedule or manually (see Displaying and Controlling the Status of a Relay on page 140). When activated, the controller will remove power from the relay output.
D i s p l a y R e l a y Sta t u s a n d M a n u a l C o n t r o l s
When you click on the Relay Status icon from the menu bar, Centaur will display the current (live) status of the relays in the system. If you wish to manually change the status of a relay, right-click the desired relay. A list of actions will appear. Select one of the following actions from the list. For more information, refer to Displaying and Controlling the Status of a Relay on page 140.
CENTAUR 65
66 RELAY PROGRAMMING
Chapter 9: Controllers
The controllers are the heart of the access control system. Position Technology controllers operate with a 16-bit RISC processor and include 256K of RAM with dynamic memory allocation to maximize event buffer capacity. The database is distributed to all controllers allowing them to make decisions in a fraction of a second, whether or not the managing computer is on-line. These controllers also feature on-line upgradable firmware and a real-time clock. Program each controller individually by defining its door and input configuration as well as setting its anti-passback options. For additional communication settings, refer to Sites on page 7.
CENTAUR 67
Door 2 REX respectively. Automatically creates output addresses 1 and 3; labels them as Door 1 Green LED and Door 2 Green LED respectively; and sets the outputs to activate for 5 seconds upon an Access Granted event and to remain latched during the Door Unlocked event. Automatically creates output addresses 2 and 4; labels them as Door 1 Red LED and Door 2 Red LED respectively; and sets the outputs to remain on at all times except during the Access Granted and Door Unlocked events, and to flash for 5 seconds upon an Access Denied event. Automatically creates output addresses 5 and 6; labels them as Door 1 Buzzer and Door 2 Buzzer respectively; and doesnt assign them to an event, and therefore are always off. Automatically adds Door 1, labels it as Door 1, assigns input address 1 (Door 1 Contact) as its Door Input, assigns input address 3 (Door 1 REX) as its REX input, enables the Unlock on REX (Normal) check box and enables output 1, 2 and 5 activation. Automatically adds Door 2, labels it as Door 2, assigns input address 9 (Door 2 Contact) as its Door Input, assigns input address 11 (Door 2 REX) as its REX input, enables the Unlock on REX (Normal) check box and enables output 3, 4 and 6 activation.
Modifying a Controller
To modify an existing controller, double-click the desired controller from the Controllers branch or right-click the desired controller and click Properties from the list. The Controller Properties window will appear allowing you to configure the controller. For more information on controller properties refer to General Controller Properties on page 69, Controller Configuration on page 71, Controller Anti-passback Settings on page 75, and Door Expansion Module Configuration on page 77.
Deleting a Controller
To delete an existing controller, right-click the desired controller from the Controllers branch and click Delete from the list. A dialog box will appear requesting confirmation.
CENTAUR 69
located on the controller (see Table 2 on page 70). Also, refer to Figure 22 on page 71. Warning: The controller addresses are greatly affected by the controllers COM port assignment, please refer to Assigning COM Ports to Controller Addresses on page 12 for more information. Table 2: Assigning Controller Addresses Via Dip Switches Cont. Add. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 Controller Dip Switches Cont. Controller Dip Switches Add. 1 2 4 8 16 32 1 2 4 8 16 32 OFF OFF OFF OFF OFF OFF 33 OFF OFF OFF OFF OFF ON ON OFF OFF OFF OFF OFF 34 ON OFF OFF OFF OFF ON OFF ON OFF OFF OFF OFF 35 OFF ON OFF OFF OFF ON ON ON OFF OFF OFF OFF 36 ON ON OFF OFF OFF ON OFF OFF ON OFF OFF OFF 37 OFF OFF ON OFF OFF ON ON OFF ON OFF OFF OFF 38 ON OFF ON OFF OFF ON OFF ON ON OFF OFF OFF 39 OFF ON ON OFF OFF ON ON ON ON OFF OFF OFF 40 ON ON ON OFF OFF ON OFF OFF OFF ON OFF OFF 41 OFF OFF OFF ON OFF ON ON OFF OFF ON OFF OFF 42 ON OFF OFF ON OFF ON OFF ON OFF ON OFF OFF 43 OFF ON OFF ON OFF ON ON ON OFF ON OFF OFF 44 ON ON OFF ON OFF ON OFF OFF ON ON OFF OFF 45 OFF OFF ON ON OFF ON ON OFF ON ON OFF OFF 46 ON OFF ON ON OFF ON OFF ON ON ON OFF OFF 47 OFF ON ON ON OFF ON ON ON ON ON OFF OFF 48 ON ON ON ON OFF ON OFF OFF OFF OFF ON OFF 49 OFF OFF OFF OFF ON ON ON OFF OFF OFF ON OFF 50 ON OFF OFF OFF ON ON OFF ON OFF OFF ON OFF 51 OFF ON OFF OFF ON ON ON ON OFF OFF ON OFF 52 ON ON OFF OFF ON ON OFF OFF ON OFF ON OFF 53 OFF OFF ON OFF ON ON ON OFF ON OFF ON OFF 54 ON OFF ON OFF ON ON OFF ON ON OFF ON OFF 55 OFF ON ON OFF ON ON ON ON ON OFF ON OFF 56 ON ON ON OFF ON ON OFF OFF OFF ON ON OFF 57 OFF OFF OFF ON ON ON ON OFF OFF ON ON OFF 58 ON OFF OFF ON ON ON OFF ON OFF ON ON OFF 59 OFF ON OFF ON ON ON ON ON OFF ON ON OFF 60 ON ON OFF ON ON ON OFF OFF ON ON ON OFF 61 OFF OFF ON ON ON ON ON OFF ON ON ON OFF 62 ON OFF ON ON ON ON OFF ON ON ON ON OFF 63 OFF ON ON ON ON ON ON ON ON ON ON OFF 64 ON ON ON ON ON ON
70 CONTROLLER PROGRAMMING
Controller Configuration
After adding or when modifying a controller (see Adding, Modifying and Deleting Controllers on page 68), the Controller Properties window will appear. From the Controller Properties window, select the Configuration tab. The Configuration tab will allow you to program some of the communication settings as well as select the Door and Input configurations that will be used with the selected controller. Note: For more information on how to setup doors located on the 2-Door Expansion Modules, please refer to Door Expansion Module Configuration on page 77. CENTAUR 71
Reader Type
From the Reader drop-down list, select the type of reader used. If no reader is being used on the selected Door, select None. Note: Upon request, Position Technology can create custom reader formats to meet your installation needs.
Keypad Type
From the Keypad drop-down list, select the type of keypad used. If the controllers door is not using a keypad, select None. When both a reader and a keypad are used, only cardholders with the Use Keypad option enabled (see Use Keypad on page 53) have to use both to gain access.
72 CONTROLLER PROGRAMMING
NC Inputs
This setup will not support tamper and wire fault (short circuit) recognition, but will generate an alarm condition when the state of the input is breached. All inputs on the selected controller and its 2-Door Expansion Modules must be connected using the NC Input Connection Method described in NC Input Connection on page 84.
ATZ 2R
This setup will not support wire fault (short circuit) recognition, but will generate an alarm condition when the state of the input or its tamper switch is breached. This method also requires the connection of two devices to each controllers input for a total of 16 inputs. The 2-Door Expansion Modules do not support input doubling. All inputs on the selected controller and its 2-Door Expansion Modules must be connected using the ATZ 2R Input Connection Methods described in ATZ 2R Connection on page 85.
ATZ 3R
This setup generates an alarm condition when the state of the input or its tamper switch is breached. An alarm condition is also generated when a wire fault (short circuit) occurs. This method requires the connection of two devices to each controllers input for a total of 16 inputs. The 2-Door Expansion Modules do not support input doubling. All inputs on the selected controller and its 2-Door Expansion Modules must be connected as described in ATZ 3R Connection Method on page 86.
address and port number for each device server, which should be provided by your Network Administrator. You will then need to program each device server with an IP address and a port number. In the IP Address and Port Number text fields, type the IP address and port number programmed into the UDS-10 device server that is connected to the controller. If there are several CT-V900-A controllers wired to one UDS-10 device server, then each controller on that loop must be programmed with the same IP address as detailed in the example below. The first time you program a UDS-10 device server, it will be done either via a serial port using a null modem cable or via a Telnet connection. If using the serial port method, the easiest way to enter the configuration mode is to hold down the "x" key on the PC keyboard while powering up the UDS-10. Once programmed, you will be able to access the configurations easily by using a web browser and simply typing in the IP address and port number that was previously programmed. To program the Com Port #, the range is from 1 - 65535, however do not use 0, 7, 9999, 14000 14009 as they are reserved.For further details please consult the Lantronix UDS-10 Installation Guide. Example: In Figure 24 on page 74, the IP Address for controller #1 and #2 would be 123.123.123.123 and the IP Address for controller #3 and #4 would be 222.222.211.233. The port number for controller #1 and #2 would be 16450 and the port number for controller #3 and #4 would be 18350. Figure 24: Example of TCP/IP Controller Settings
74 CONTROLLER PROGRAMMING
Active
When this check box is selected, communication between the access control server and the controller is possible. Clear the selection to cancel any communication between the control panel and the managing computer.
Controller Time-out
Enter the length of time the controller will wait for a response from the access control server before generating a Communication Failure locally at the controller.
C o n t r o l l e r A n t i - pa s s b a c k S e t t i n g s
You can use local anti-passback to closely monitor the movements of the cardholders and prevent any tailgating. Tailgating occurs when a cardholder does not use a card at the reader and enters through the door opened by another cardholder who has already used their card. To use this feature, the controller must have its doors configured as Entry and Exit doors. For more information, refer to Doors on page 35. When a card is presented to an Entry reader, the controller labels the card as in. The next time the card is used, it must be presented to an Exit reader. In which case it will be labeled as out. Please note that the cardholder must exit from the Exit door that is associated with the Entry door previously used. Two subsequent Entries or two subsequent Exits will cause the controller to generate the appropriate Access Denied Anti-passback violation event. Centaur also supports Global Anti-Passback, which functions independently of the local anti-passback settings defined in the following sections. For more information, refer to Global Entry or Global Exit on page 39.
CENTAUR 75
Enabling Hard-passback
After adding or when modifying a controller (see Adding, Modifying and Deleting Controllers on page 68), the Controller Properties window will appear. From the Controller Properties window, select the Anti-passback tab and select the Hardpassback check box to deny access to the door when the Access Denied - Antipassback violation event occurs. Clear this check box to grant access to the door when the Access Denied - Anti-passback violation event occurs. Please note that to enable hard-passback you must also enable Controller Anti-Passback (see Enabling Controller Anti-passback on page 75).
76 CONTROLLER PROGRAMMING
D o o r E x pa n s i o n M o d u l e C o n f i g u r a t i o n
After adding or when modifying a controller (see Adding, Modifying and Deleting Controllers on page 68), the Controller Properties window will appear. From this window, select the Expander tab to program door and keypad configurations that will be used with the selected controllers 2-Door Expansion Modules (CA-A470-A). A maximum of three 2-Door Expansion Modules can be used with each CT-V900 controller.
two Keypad drop-down lists appear for each 2-Door Expansion Module. Use these fields to configure the readers and/or keypads connected to the 2-Door Expansion Modules. In the Expander tab, each Reader and Keypad drop-down list is associated to a predetermined input on a specific 2-Door Expansion Module, which is determined by its DIP switch settings as shown in Figure 25 on page 79.
Reader
From the Reader drop-down list, select the type of reader used. If no reader is being used on the selected Door input, select None. Note: Upon request, Position Technology can create custom reader formats to meet your installation needs.
Keypad
From the Keypad drop-down list, select the type of keypad used. If the door is not using a keypad, select None. When both a reader and a keypad are used, only cardholders with the Use Keypad option enabled (see Use Keypad on page 53) have to use both to gain access.
78 CONTROLLER PROGRAMMING
CENTAUR 79
Download
The Centaur software can download the following system characteristics to one or all controllers in a site: Access Levels, Cards, Controllers, Doors, Holidays, Inputs, Input Groups, Outputs, Output Timings, Relays, Relay Groups, and Schedules. If any system characteristics are set when a controller is online, Centaur will automatically download the information to all controllers in the site.
80 CONTROLLER PROGRAMMING
CENTAUR 81
82 CONTROLLER PROGRAMMING
Each controller includes eight inputs which can be connected using ATZ Zone Doubling to monitor up to 16 input devices. Each controller also supports up to three 2-Door Expansion Modules (CA-A470-A), which provide an additional 4 inputs each. Therefore, each controller can monitor the state of up to 28 inputs. Typically, the inputs are used to monitor and control the status of door contacts and request for exit devices installed on the controlled door. The inputs can be programmed to follow a schedule, or to activate relays and/or bypass other inputs when triggered. For additional information on how inputs can be used, refer to Door Inputs and Outputs on page 44.
CENTAUR 83
C o n n e c t i n g I n p u ts
Each controller and its assigned 2-Door Expansion Modules can monitor the state of up to 28 inputs such as magnetic contacts, motion detectors, temperature sensors or other devices. Inputs can be installed to a maximum distance of 1000m (3300ft.) from the controller when using AWG #22 wire. The controller and its assigned 2-Door Expansion Modules can only use one of the following input connection methods.
NC Input Connection
When this option is selected (see Setting the Controllers Input Configuration on page 73), the controller will generate an alarm condition when the state of an input is toggled (opened). This setup will not support tamper or wire fault (short circuit) recognition. The even-numbered inputs on the CT-V900-A controller (i.e. 2, 4, 6, etc.) are not used and should not be programmed. Connect one device to each input. For address assignment of the 2-Door Expansion Modules inputs, refer to Viewing the Inputs Address on page 87. Figure 26: N.C. Input Connection Methods
84 INPUT PROGRAMMING
ATZ 2R Connection
When this option is selected (see Setting the Controllers Input Configuration on page 73), the controller will generate an alarm condition when the state of an input is toggled (opened). An alarm condition will also be generated when a cut in the line occurs, but will not recognize a wire fault (short circuit). Connect two devices to each controllers input, but only one device to each 2-Door Expansion Modules input. For address assignment of the 2-Door Expansion Modules inputs, refer to Viewing the Inputs Address on page 87. Figure 27: ATZ 2R Input Connection Method
CENTAUR 85
86 INPUT PROGRAMMING
A d d i n g , M o d i f y i n g a n d D e l e t i n g I n p u ts
In order to add one or more inputs, at least one site and one controller must be created. If you have not created a site, please refer to Sites on page 7. For more information on setting up a controller, refer to Controllers on page 67. When adding inputs using the methods described in the following sections, you will be required to select an address for each input. These addresses represent a specific input on the selected controller as described in Connecting Inputs on page 84.
Deleting a Input
To delete an existing input, right-click the input from the appropriate Controller branch in the Tree window (left-hand portion of your screen), and then click Delete from the list. A dialog box will appear requesting confirmation.
Modifying an Input
From the desired Controller branch in the Tree window (left-hand portion of your screen), double-click the input you wish to modify or right-click the input, and then click Properties from the list that appears.
Table 3: Overview of Input Addresses CT-V900-A Input Addresses 1 to 16 (see Connecting Inputs on page 84) Z1 = Input Address 17 Z2 = Input Address 18 Z3 = Input Address 19 Z4 = Input Address 20 Z1 = Input Address 21 Z2 = Input Address 22 Z3 = Input Address 23 Z4 = Input Address 24 Z1 = Input Address 25 Z2 = Input Address 26 Z3 = Input Address 27 Z4 = Input Address 28
CA-A470-A DIP 1 = OFF DIP 2 = OFF CA-A470-A DIP 1 = ON DIP 2 = OFF CA-A470-A DIP 1 = OFF DIP 2 = ON
Input Properties
After adding or modifying an input (see Adding, Modifying and Deleting Inputs on page 87), the Input Properties window will appear. From this window, select the Details tab. The Details tab will allow you to configure the inputs timers, normal state, schedule and whether a triggered input will bypass an input or activate a relay.
88 INPUT PROGRAMMING
Groups, refer to Groups on page 113. 5. When an input is programmed to bypass other inputs, the Bypass Delay determines how long the input(s) selected in steps 3 and 4 will remain bypassed. The controller will use the Bypass Delay of the input being bypassed, not the Input Bypass Delay timer of the triggered input. In the Bypass delay text field, type a value from 1 to 65,535 seconds. If you type a value of 0 seconds, the controller no longer follows the timer and becomes latched. This means that the input(s) will be bypassed until the selected input is triggered again. Figure 29: Example of Bypassing Inputs
90 INPUT PROGRAMMING
CENTAUR 91
92 INPUT PROGRAMMING
Each controller includes six multi-function outputs. Each controller also supports up to three 2-Door Expansion Modules (CA-A470-A), which provide an additional 6 outputs each. Therefore, each controller can monitor the state of up to 24 outputs. Typically, the controllers outputs are used to control the built-in LEDs and buzzers of the card readers and keypads in the system. For example, a red/green indicator on the reader will inform the card user that access has been granted (changes from red to green), or the reader buzzer will inform the card user that the door has been left open or the door has been forced open. You can individually program each output to follow a specific event as well as determine whether the output will be timed, pulsed or latched.
CENTAUR 93
94 OUTPUT PROGRAMMING
A d d i n g , M o d i f y i n g a n d D e l e t i n g O u t p u ts
In order to add one or more outputs, at least one site and one controller must be created. If you have not created a site, please refer to Sites on page 7. For more information on setting up a controller, refer to Controllers on page 67. When adding outputs using the methods described in the following sections, you will be required to select an address for each output. These addresses represent a specific output on the selected controller as described in Figure 32. Figure 32: Output Addresses DIP switch settings on each 2-Door Expansion Module determine the address assignment of its output terminals.
Deleting an Output
To delete an existing output, right-click the output from the appropriate Controller branch in the Tree window (left-hand portion of your screen) and click Delete. A dialog box will appear requesting confirmation.
Modifying an Output
From the desired controller branch in the Tree window (left-hand portion of your screen), double-click the output you wish to modify or right-click the output and click Properties from the list that appears. CENTAUR 95
96 OUTPUT PROGRAMMING
Table 4: Overview of Output Addresses CA-A470-A DIP 1 = OFF DIP 2 = OFF OUT1 = Address 7 OUT2 = Address 8 OUT3 = Address 9 OUT4 = Address 10 OUT5 = Address 11 OUT6 = Address 12 OUT1 = Address 13 OUT2 = Address 14 OUT3 = Address 15 OUT4 = Address 16 OUT5 = Address 17 OUT6 = Address 18 OUT1 = Address 19 OUT2 = Address 20 OUT3 = Address 21 OUT4 = Address 22 OUT5 = Address 23 OUT6 = Address 24
Output Settings
Each controller includes six multi-function outputs. Each controller also supports up to three 2-Door Expansion Modules (CA-A470-A), which provide an additional 6 outputs each. Therefore, each controller can monitor the state of up to 24 outputs. Typically, the controllers outputs are used to control the built-in LEDs and buzzers of the card readers and keypads in the system. You can individually program each output to follow a specific event as well as determine whether the output will be timed, pulsed or latched. Also, refer to Overview of Output Programming on page 94. Determine how the six outputs will be used. Typically they are set up as follows: Output 1 - Access Granted for Door 1 (green LED) Output 2 - Access Denied for Door 1 (red LED) Output 3 - Access Granted for Door 2 (green LED) Output 4 - Access Denied for Door 2 (red LED) CENTAUR 97
Output 5 - Beeper for Door 1 (buzzer) Output 6 - Beeper for Door 2 (buzzer)
Anti-passback Status
If the Anti-passback feature is enabled (see Controller Anti-passback Settings on page 75) and a controller registers two subsequent Entries or two subsequent Exits, the appropriate Access Denied - Anti-passback violation event will be generated. When the is event is generated, the output can be activated.
Access Granted
The output can activate when access has been granted to the door following the presentation of a valid card or keypad code.
Access Denied
The output can be activated when access has been denied to the door following the 98 OUTPUT PROGRAMMING
REX Granted
The output can activate when a request for exit device (vertical detector) assigned to a doors REX input (see Assigning a REX Input (Request for Exit) on page 45) has been triggered.
REX Denied
The output can be activated when a REX denied event occurs other than the REX Denied - Schedule Invalid event (i.e. interlock enabled).
Access Time-out
The output can be activated when access has been granted, but the door was never opened during the unlock period (see Unlock Time on page 42 and Extended Access on page 43).
Keypad Time-out
When both a reader and a keypad are required for access (see Use Keypad on page 53), the output can be activated when the reader granted access, but after 30 seconds no P.I.N. was entered on the keypad.
Door Open
The output can be activated whenever an access control door is opened (see Assigning a Door Input on page 44). Also, when using this event, the output can be latched.
Reader Disabled
The output can be activated whenever a programmed door has been manually disabled (see Displaying and Controlling the Status of a Door on page 138). Also, when using this event, the output can be latched.
CENTAUR 99
Door Unlocked
The output can be activated whenever an access control door is unlocked. Also, when using this event, the output can be latched.
D i s p l a y a n d C o n t r o l O u t p u t Sta t u s
When you click on the Display Output Status icon, from the menu bar, Centaur will display the current (live) status of the outputs in the system. If you wish to manually change the status of an output, right-click the desired output. A list of actions will appear. Select one of the following actions from the list. For more information, refer to Displaying and Controlling the Status of an Output on page 142.
Every event that occurs in the system can be programmed to perform a series of actions. Schedules can be assigned to each event defining when the event will be displayed on the screen and when it will be saved in the database. Select which device (i.e. relay) can be activated, when it can be activated and for how long. A schedule defines when an event will require operator acknowledgement while providing the operator with detailed instructions.
CENTAUR 101
the General, Alarms and CCTV Control tabs will apply to the highlighted device whose check box is selected. Figure 35: Programming Device-Specific Event Definitions
Screen
From the Screen drop-down list, select the schedule that will define when the event will be displayed in the Event window. If the event occurs when the schedule is valid, the event will appear in the Event window (right-hand portion of your screen).
CENTAUR 103
Disk
From the Disk drop-down list, select the schedule that will define when the event will be logged in Centaurs databases. If the event occurs when the schedule is valid, the event will be saved.
Action
From the Action drop-down list located below the Device Activation heading, select the type of device or group of devices that will be activated when the event occurs. You can activate/deactivate outputs or relays, lock/ unlock doors and enable/disable door groups. Also refer to Groups on page 113.
Timed
If the device selected in the Device Activation drop-down list is labelled timed, you can type a value from 0 to 65535 seconds in the Timed text field. The device will activate or deactivate for the period programmed in the Timed text field. If the selected device is not timed, the Timed text field will be unavailable.
Device
After selecting an Action (see page 104), use the Device drop-down list to select which device or group of devices will be affected by the selected action.
Schedule
The selected device(s) will only activate or deactivate when the schedule selected from the Schedule drop-down list is active. Also refer to Schedules on page 25. Example: In Figure 36, any time (1) door 1:1 (2) is forced open (3), relay 1:3 (4B) will activate (4A) for 30 seconds (5).
Alarm Acknowledgment
Alarm acknowledgment allows you to program an event to give operators a warning and/ or instructions concerning the event that just occurred. These instructions will appear in the Alarm window. The operator can then acknowledge the event and provide details concerning the event. To program an events alarm acknowledgement properties: 1. Select the desired event as described in Event Definition Overview on page 102. 2. Select the Alarms tab. 3. Enable the feature by selecting the Requires acknowledgement check box. For more information, refer to Enabling Alarm Acknowledgment on page 105. 4. In the Schedule drop-down list, select the desired schedule. For more information, refer to Selecting the Alarm Acknowledgement Schedule on page 105. 5. Type the desired warnings and details that the operator will see on the screen into the Instructions text field. For more information, refer to Typing the Instructions for the Selected Alarm on page 106.
refer to Schedules on page 25. For this feature to function, you must enable alarm acknowledgment (see Enabling Alarm Acknowledgment on page 105).
Acknowledging Alarms
The following details how an operator can acknowledge an alarm. 1. If the event meets the programmed criteria (see Alarm Acknowledgment on page 105), the event and its programmed instructions appear in the Alarm window (lower right-hand portion of your screen. To play a sound file every time the event occurs, refer to Wave Player on page 155. 2. The operator can acknowledge one event and type any comments or the operator can acknowledge all events without providing any comments. To acknowledge one event, right-click the event in the alarm window and select Acknowledge from the list. Go to step 3. To acknowledge all events, right-click any event in the alarm window and select Acknowledge all from the list. Go to step 4. 3. The Acknowledge Alarm window appears. Type any comments in the Comments text field and click Acknowledge. 4. The Operator Acknowledge event appears in the Event window. View all acknowledged events by clicking the Acknowledged Events icon from the menu bar. To view any recorded comments, click the Acknowledged Events icon, then right-click the desired event in the event window and click View Comments.
CENTAUR 107
Using the Centaur software you can control the access of up to 64 floors per site. Each of Position Technologys CA-A480 Elevator Controllers can control up to 16 floors and up to eight elevator controllers can be supported by each CT-V900 controller. You can interface the elevator cars floor buttons with the elevator controllers relays and program them to follow a public access schedule (no card required) or to limit access to individuals with a valid card. Only the floors that have been assigned to the elevator cars public access schedule or to a floor group assigned to a card will be active.
CENTAUR 109
and Schedules on page 115). 5. In the Card window, select the Cardholder tab and assign a floor group to the card (see Card Settings on page 51). Figure 38: Example of Elevator Control
CENTAUR 111
In the Centaur Access Control System you are often required to select one specific device (i.e. door or relay). Centaur provides you with the added option of creating a group. A group consists of more than one device. Therefore, instead of just selecting one device, you can select a group, which would represent, for example, relays 3, 4 and 5. There are four types of groups: Floor Groups, Door Groups, Input Groups and Relay Groups.
CENTAUR 113
W h a t A r e G r o u ps ?
When a card is presented to a reader programmed for elevator control, Centaur ignores the cards assigned access levels and instead verifies the cards assigned floor group. If the floor groups assigned schedule (see Selecting a Floor Group Schedule on page 115) is valid, Centaur will allow access to the floor groups assigned floors (see Assigning Floors to a Floor Group on page 115). The Door, Input and Relay groups enable you to create groups of devices, such as relays, that can be activated or deactivated together when specified event occurs. Table 5: Where are the Groups Used GROUP TYPE Floor Groups Door Groups Input Groups USED IN Card Properties Event Definitions Input Properties Event Definitions Relay Groups Input Properties Event Definitions CROSS-REFERENCE Assigning Access to a Card on page 52 Action on page 104 Bypassing Inputs with an Input on page 89 Action on page 104 Activating Relays with an Input on page 91 Action on page 104
A d d i n g , M o d i f y i n g a n d D e l e t i n g G r o u ps
In order to program a floor, door, input, or relay group, you must first program the Sites on page 7 and the Schedules on page 25.
Adding a Group
In the Tree window (left-hand portion of your screen), double-click Groups from the desired Site branch, then right-click the desired type of group and select New Group from the list. The appropriate Properties window will appear.
Modifying a Group
From the desired Site branch in the Tree window (left-hand portion of your screen), double-click Groups, then double-click the desired type of group you wish to modify or right-click the desired group and click Properties from the list that appears.
Deleting a Group
From the desired Site branch in the Tree window (left-hand portion of your screen), double-click Groups, then right-click the desired type of group and click Delete from the list that appears.
114 GROUPS
Addresses
At the top of the Group tab, Centaur will display the groups address, as well as the address of the site to which it belongs. The first group created is assigned xxx group:3 as its address. Every time a group is added, Centaur increments the groups address by one. Addresses 1 and 2 are reserved for the All and None groups.
Name
Use the Name text field in the Group tab to identify your groups. We recommend using a name that is representative of the group such as Management Floor Group. Also, refer to Typing Names and Notes on page 4.
Notes
Use the Notes text field in the Group tab to record any additional notes that may be required. We recommend that you keep a log of what settings were changed and when the were changed. Also, refer to Typing Names and Notes on page 4.
F l o o r G r o u p s F l o o r s a n d S c h e d u l e s
The Floor Group Properties window will appear when Adding, Modifying and Deleting Groups (see page 114). From this window select the Floors tab. This will allow you to define which floors in a site that a cardholder has access to and when access can be granted to these floors. The floor groups are then assigned to cards in the system (see Floor Group on page 52). For more information on elevator control, refer to Elevator Control on page 109.
CENTAUR 115
A s s i g n i n g D e v i c e s t o a D o o r, I n p u t o r R e l a y Group
The appropriate groups properties window will appear when Adding, Modifying and Deleting Groups (see page 114). From this window select the Doors, Inputs, or Relays tab. All the devices that have been programmed in the current site will be listed. Assign the desired devices to the group by selecting their associated check box. Example: In the example shown below, the selected relay group has been assigned relays 3, 4, and 5 from controller 1. Figure 39: Example of Programming a Group of Devices
M a n u a l C o n t r o l o f D o o r a n d R e l a y G r o u ps
The following sections describe how you can remotely control a group of doors or relays.
116 GROUPS
command from the list that appears. For more information on the available commands, refer to Displaying and Controlling the Status of a Door on page 138.
CENTAUR 117
118 GROUPS
Operators are personnel authorized to program and/or monitor the Centaur Access Control System through the Centaur software. Each operator authorized to access the Centaur system can be defined with different permissions and security levels. Security levels determine whether an operator can view, modify and/or delete system characteristics. The system characteristics consist of all the elements found in the Tree window (left-hand portion of your screen) such as controllers, doors and events. After creating a security level, it is assigned to a permission, and then the permission is assigned to an operator.
CENTAUR 119
Overview of Operators
Operators are personnel authorized to program and/or monitor the Centaur Access Control System through the Centaur software. Each operator authorized to access the Centaur system can be defined with different permissions and security levels. To create an operator you must setup the following items in the order specified below: Security Levels determine whether an operator can view, modify and/or delete system characteristics and whether the operator can perform manual controls, such as such as locking and unlocking doors remotely. The system characteristics consist of all the elements found in the Tree window (left-hand portion of your screen), such as controllers, doors and events. For more information, refer to Security Levels on page 122. Security Levels are then assigned to a Permission. Permissions determine which sites the operator is authorized to access and the operators Security Level for each site. For more information, refer to Permissions on page 123. Permissions are then assigned to an Operator. Operators determine who can access the Centaur software to program and monitor the access control system. Define the Login ID and Password, assign a Permission, and select which software modules will be accessible. For more information, refer to Operators on page 124.
After adding a security level, permission, or operator, appropriate Properties window will appear allowing you to configure the selected item.
Security Levels
Security Levels determine whether an operator can view, modify and/or delete system characteristics and whether the operator can perform manual controls, such as such as locking and unlocking doors remotely. The system characteristics consist of all the elements found in the Tree window (left-hand portion of your screen), such as controllers, doors and events. Security Levels are then assigned to Permissions (see page 123).
View
If you select the View check box, the operator assigned with this security level will be able to view the details of the associated characteristic. For example, if the View check box located next to Access Levels is selected, the operator assigned with this security level will be able to view all the programmed Access Levels in the site.
Modify
If you select the Modify check box, the operator assigned with this security level will be able to view, add, and edit any elements of the associated characteristic. For example, if the Edit check box located next to Controllers is selected, the operator assigned with this security level will be able to view, add and edit the sites controllers. 122 SETTING UP OPERATORS
Delete
If you select the Delete check box, the operator assigned with this security level will be able to view and delete elements of the associated characteristic. For example, if the Delete check box located next to Cards is selected, the operator assigned with this security level will be able to view and delete any of the sites cards.
All
Click the All button to select all of the View, Modify and Delete check boxes of every system characteristic.
None
Click the None button to clear all of the View, Modify and Delete check boxes of every system characteristic.
Permissions
Permissions determine which sites the operator is authorized to access and the operators Security Level for each site. Permissions are then assigned to Operators (see page 124).
5. Return to step 3 to assign another site and security level or click OK to save and exit.
Operators
Operators enable you to determine which personnel are authorized to program, control, and/or monitor the Centaur Access Control System through the Centaur software. Define the Login ID and Password, assign a Permission, and select which software modules will be accessible for each operator.
FrontCard
FrontCard provides an easy to use interface to program the card properties without having to deal with long card lists in the tree window and includes an advanced search engine. For more information, refer to FrontCard on page 55.
Card Import/Export
The Card Import/Export Utility (server only) enables you to export Centaur card data to a .csv file or import a .csv file containing card data into Centaurs card database. For more information, refer to Card Import/Export Wizard on page 58.
Database Management
The Database Management Utility (server only) allows you to control and manage the often large and complex database files of the Centaur software. You can back up and restore database files, purge events from selected sites during specific periods, limit the size of database files and delete entire database files. For more information, refer to Database Management on page 145.
FrontGuard
FrontGuard uses events generated in Centaur to retrieve a picture and/or video feed to help you identify cardholders or to view the location where an event has occurred. For more information, refer to the FrontGuard Operators Manual.
Locator
Designed to function with the systems Global Anti-Passback feature, Locator allows you to monitor when cardholders enter and exit designated doors in real-time, retrieve cardholder information and print customizable cardholder access reports. For more information, refer to Locators Online Help.
WavePlayer
This utility was designed to enable a .wav file to be played on the computer when an event that requires acknowledgment occurs. The sound can replay at programmed intervals until the alarm is acknowledged. For more information, refer to Wave Player on page 155.
Pro-Report
Pro-Report is a user-friendly wizard for generating system reports. Generate quick (one-time), pre-defined and scheduled reports for up to 8 different report types. You can also search, group and sort your reports. For more information, refer to ProReports Online Help. CENTAUR 125
Tracker
An integral part of Pro-Report, Tracker is a time and attendance software that enables you to track employee work hours, overtime, and missed and late punches. You can also program lunch, break and supper times; customize overtime calculation; print reports; and edit the reports punch-in and punch-out times. For more information, refer to Pro-Reports Online Help.
FrontView
The FrontView real-time graphic interface gives you point -and-click control over doors, relays, inputs, outputs and controllers through a graphical floor plan. For more information, refer to FrontViews Online Help.
When you activate CCTV control, Centaur can send a detailed CCTV command to a video switcher whenever an event, assigned with that command, occurs. The CCTV command will tell the video switcher to switch to a specific camera and monitor. You can even set the cameras to tilt pan and or zoom.
CENTAUR 127
that event occurs within its assigned schedule (refer to Selecting the CCTV Control Schedule for an Event on page 107), Centaur sends the assigned command to the video switcher connected to the COM port selected in the site properties (refer to Selecting a Computers COM Port for CCTV on page 17).
CENTAUR 129
The Centaur software can be programmed to provide visual and/or auditory feedback when specific events or alarms occur in the system. You can also determine at what frequency (in seconds) that Centaur will update the Event window. The colours of each event that appear in the event window can be customized to your needs. You can also set the Centaur User Interfaces to automatically log off if no actions have occurred after a specified amount of time.
CENTAUR 131
G e n e r a l C e n ta u r O p t i o n s
From Centaurs main menu bar, select the Options menu and select the Options command. The Options window will appear allowing you to set Centaurs visual and/or auditory feedback options as well as determine how often Centaur will update the Event display window. The options are detailed below. Figure 40: General Options
selected, your computer will beep every time an event appears in the Event window.
Update events
This option determines at what intervals the Centaur access control software will refresh the Event window. From the Update events every drop-down list, select the desired interval of time.
CENTAUR 133
O p e r a t o r Tim e o u t
The Centaur administration consoles (workstations) can be programmed to log off automatically when no actions have occurred within the software (i.e. programming, viewing system status, etc.) for a specified amount of time. 1. From Centaurs main menu bar, select the Options menu name and select the Operator Timeout command. 2. The Operator Timeout window will appear. In the Timeout text field, type a value 134 OPTIONS
from 0 to 9999 minutes. To disable this feature, type 00000. 3. Click OK. Figure 42: Operator Timeout
CENTAUR 135
136 OPTIONS
Centaur includes an intuitive toolbar that you can use to display the status of specific output and input devices as well as control the activation and deactivation of those devices. In each site you can view and control the status of the controllers, doors, inputs, outputs and relays.
CENTAUR 137
Event Display
The following sections describe how an operator can view some or all of the events in the system. For details on how they are displayed, refer to Events on page 101. Make sure you select the appropriate site from the site drop-down list. Appropriate operator Permissions and Security Levels must be enabled (see Operators on page 119).
Manual Controls
The following sections describe how an operator can view the status of the devices in the system and how they can remotely control these devices (i.e. enable or disable a relay, etc.). Make sure you select the appropriate site from the site drop-down list. Appropriate operator Permissions and Security Levels must be enabled (see Operators on page 119).
actions will appear. Select one of the following actions from the list. Also, refer to Figure 43 on page 140.
Lock Door
Locks the selected door if it was unlocked on schedule, manually or by a user.
Unlock Door
Unlocks the selected door for the period specified by the doors Unlock Timer (see Setting the Doors Timers on page 42).
Enable Door
When an operator manually bypasses a door (see Disable Door below), this command will reinstate the active state of the selected door.
Disable Door
Allows the operator to manually bypass the selected door. The active state of the door is reinstated when the operator uses the Enable Door command (see above) or when enabled by the doors enabling schedule (see Selecting the Doors Unlock Schedule on page 41).
CENTAUR 139
Activate Relay
Activates (toggles) the selected relay for the period specified by the relays Activation Time (see Setting the Relays Activation Timer on page 64). If a relays Delay on Activation Time is programmed (see Setting the Relays Delay Before Activating Timer on page 65), the relay will only activate after this delay has elapsed.
Deactivate Relay
Deactivates the selected relay. 140 OPERATOR MANUAL CONTROLS
Enable Input
When an operator manually bypasses (disables) an input, this command will reinstate the active state of the selected input. CENTAUR 141
Disable Input
Allows the operator to manually bypass the selected input. The active state of the input is reinstated when the operator uses the Enable Input command or when enabled by the inputs enabling schedule (see Selecting the Inputs Enabling Schedule on page 89). Figure 46: Display Input Status
Activate Output
Activates the selected output for the period specified by the outputs activation time (see Setting the Outputs Activation Events on page 98).
Deactivate Output
Deactivates the selected output.
CENTAUR 143
The Centaur Database Utility is automatically installed with Centaur. This database utility was designed to control and manage the often large and complex database files of the Centaur software. You can back up and restore database files, purge events from selected sites during specific periods, limit the size of database files and delete entire database files.
CENTAUR 145
W h a t A r e t h e C e n ta u r D a ta b a s e s ?
Before starting you need to understand how the Centaur databases are used and what information is saved in them. These databases are attached to the SQL Server application used by Centaur. Whenever something is programmed or an event occurs in the system, the information is downloaded to the SQL Server and saved in these Main database and the Event database (see below). These files are saved on your hard drive in the following default path C:\Program Files\Position Technology\Centaur 3.1\Data. The default path may be changed during installation of Centaur. Only databases currently used by SQL and Centaur will be saved in the above mentioned directory path. The backup files can be saved wherever you wish.
Main Database
The main database (Centaur3Main) contains all the system characteristics of the Centaur software (i.e. sites, controllers, schedules, cards, etc.). The more sites, cards and controllers you have programmed, the bigger this file will be.
Event Database
The event database (Centaur3Events) contains all events that have occurred in the system (i.e. access granted, door forced, alarms, etc.). For more information on how you can manage the size of the Event database, please refer to Limiting the Event Databases Size on page 149. Also, refer to Disk on page 104.
D a ta b a s e M a n a g e m e n t M o d u l e
The Centaur Database Management Module is automatically installed with Centaur and can only be run on the Server. This database utility was designed to control and manage the often large and complex database files of the Centaur software. You can back up and restore database files, purge events from selected sites during specific periods, limit the size of database files and delete entire database files.
Backing Up Databases
Performing a back up will save and compress all information in the selected database(s) into a file with a .bak extension. These files can later be restored to the SQL Server application used by Centaur (see Restoring Databases on page 148). Also refer to What Are the Centaur Databases? on page 146. We highly recommend that you back up your databases regularly and that these backup files are saved on a form of removable media (i.e. tape back up, zip disk, etc.) as well as on your computers hard drive. This safety precaution is an important part of keeping your data safe. If for any reason a database becomes corrupt, you will be able to restore a backed up file. Creating a backup is also useful for keeping a log of events (especially if the size of the Event database is limited, see Limiting the Event Databases Size on page 149) or to save as a default programming database for future applications. 1. After starting the Database Management Module as described in Starting the Database Management Module on page 146, the SpxDBase (Centaur Database Utility) window will appear. 2. From this window, select the Backup tab. 3. Select the databases you wish to back up by clicking the Main Database and/or the Event Database check boxes. For more information refer to What Are the Centaur Databases? on page 146. 4. In the text field corresponding to the selected database(s), type the full path (location where you would like to save the backup) and desired file name. You can also click the ... button to browse for the desired file. 5. Click the Backup button. Figure 48: How to Backup Databases
CENTAUR 147
Restoring Databases
A restore will bring back all information saved in a backed up database file (.bak) so it can be used with the Centaur software. Performing a restore will decompress the back up files, attach them to the SQL Server application and save them in C:\Program Files\Position Technology\Centaur 3.1\Data. This will overwrite any databases currently attached. If you are having problems with a database, or if you have experienced a loss of data, or if your database is corrupted due to a computer hardware failure, you can restore any database that you have backed up. Please note that you will have to add any programming changes that were done since the last back up was created. Also, all events that have occurred since the last back up will be lost. 1. After starting the Database Management Module as described in Starting the Database Management Module on page 146, the SpxDBase (Centaur Database Utility) window will appear. 2. From this window, select the Backup tab. 3. Select the databases you wish to restore by clicking the Main Database and/or the Event Database check boxes. For more information refer to What Are the Centaur Databases? on page 146. 4. In the text field corresponding to the selected database(s), type the full path and the name of the file from which you want to restore the database. You can also click the ... button to browse for the desired file. 5. Click the Restore button. Figure 49: How to Restore Databases
Truncating Events
When the Event database has reached its maximum size (see Limiting the Event Databases Size on page 149), each subsequent event will be followed by a Failed to Process Event event which will appear in the event window. At this point, events will not be saved because the database has exceeded its maximum size. When the Event database becomes too large, you can use the Truncate feature to delete all records (including events and alarms) from the Event database. This will reduce the database file to its original size. The Truncate feature will not affect the Main database, only the Event database. Perform the following to truncate events from the Event database: 1. After starting the Database Management Module as described in Starting the Database Management Module on page 146, the SpxDBase (Centaur Database CENTAUR 149
Utility) window will appear. 2. From this window, select the Size tab. 3. Click the Truncate button. 4. Click Yes to confirm the truncate action, or click No to cancel the truncate operation.
Note: We recommend you make a backup of the database before truncating it. For more information, see Backing Up Databases on page 147. Figure 51: How to Truncate Events
Attaching Databases
This feature is for advanced users only and should not be used frequently. Attaching a database will tell the SQL Server application used by Centaur to begin using the databases located in C:\Program Files\Position Technology\Centaur 3.1\Data. Make sure that the Centaur3Main.mdb, Centaur3Events.mdb and the spxDBase.exe files are located in the above mentioned path. Please note that before attaching the database, the database files currently used by Centaur need to be detached or removed (see Detaching Databases on page 150 or Removing Databases on page 151). Verify that Centaur and the Centaur Service Manager applications are closed and that the SQL Server is running. Perform the following to attach the database: 1. After starting the Database Management Module as described in Starting the Database Management Module on page 146, the SpxDBase (Centaur Database Utility) window will appear. 2. From this window, select the Advanced tab. 3. Click the Attach button.
Detaching Databases
This feature is for advanced users only and should not be used frequently. Before attaching a database (see Attaching Databases on page 150), you must tell the SQL Server application used by Centaur to stop using the current databases by detaching them. Detaching the database will allow you to keep a manual backup of the current 150 DATABASE MANAGEMENT MODULE
databases. If you perform a detach, the databases will be detached from SQL, but will still exist. You must move them from the current path C:\Program Files\Position Technology\Centaur3.1\Data to another path. Perform the following to detach the database: 1. After starting the Database Management Module as described in Starting the Database Management Module on page 146, the SpxDBase (Centaur Database Utility) window will appear. 2. From this window, select the Advanced tab. 3. Click the Detach button.
Removing Databases
If you remove the databases, it will detach the database and delete it completely. You will not be able to restore or re-attach databases that have been removed. Perform the following to remove the database: 1. After starting the Database Management Module as described in Starting the Database Management Module on page 146, the SpxDBase (Centaur Database Utility) window will appear. 2. From this window, select the Advanced tab. 3. Click the Remove button.
Purging Databases
Using this feature, you can delete events that occurred between a specified period of time and within a selected site or within all sites. The purge feature will not affect the Main database, only the Event database. Perform the following to purge events from the Event database: 1. After starting the Database Management Module as described in Starting the Database Management Module on page 146, the SpxDBase (Centaur Database Utility) window will appear. 2. From this window, select the Advanced tab and click the Purge Events button. 3. From the Purge Events window, use the Start Date and End Date drop-down lists to select the period. 4. In the Site Name text box, type the exact name of the desired Site as recorded in Centaur, or click the All Sites check box. 5. Click OK. Centaur will delete events that occurred in the selected site(s) during the selected period. Note: Do not use the Purge feature to reduce the size of the database or to delete large numbers of events. Instead, use the Truncate feature (see Truncating Events on page 149). Also, any alarms that require acknowledgement (see Alarm Acknowledgment on page 105) that have not been acknowledged will not be deleted.
CENTAUR 151
D a ta b a s e B a c k u p S c h e d u l e r
The Database Backup Scheduler enables you to schedule regular backups of the Centaur databases. You can back up the Main database and the Event database separately, specify the location of the backup files and select how often (daily, weekly or monthly) the backup will occur. Warning: When the Database Backup Scheduler saves the backup file, it will overwrite the previous file. If you want to create backup files that do not overwrite each other, contact Technical Support (see Technical Support on page 5).
3. Click the Schedule backup button from the main menu bar. The Create Database Backup Wizard window will appear. 4. Click Next. 5. From the Database drop-down list, select the database you would like to backup. For more information, refer to What Are the Centaur Databases? on page 146. Click Next. 6. In the Name text box, type the job name of the scheduled backup. In the Description text box, type the description of the backup. Click Next. 7. In the Select backup file text field, type the full path (location where you would like to save the backup) and the desired file name. You can also click the ... button to browse for the desired path and/or file. Click Next. 8. Select Create a scheduled job to be performed periodically. A text field will appear indicating the current schedule. Click the Change button to change the schedule and then click OK. After changing the schedule, click Next. 9. Click Finish.
CENTAUR 153
This utility was designed to enable a .wav file to be played on the computer when an event that requires acknowledgment occurs. The sound can replay at programmed intervals until the alarm is acknowledged.
CENTAUR 155
Wa v e P l a y e r
This utility was designed to enable a .wav file to be played on the computer when an event that requires acknowledgment occurs (see Alarm Acknowledgment on page 105). The sound can replay at programmed intervals until the alarm is acknowledged.
Auto-login
The Wave Player utility can be programmed to automatically login every time the software is started. 1. From Wave Players main menu bar, select File and click Settings. The Wave Player Settings window appears. 2. Select the Auto-Login check box. 3. In the Logon ID and Password text field, type the logon ID and password that will be used every time Wave Player is started. If required, type the computers network name or IP address in the Computer text field. 4. Click Apply.
1. Start Wave Player as detailed in Starting Wave Player on page 156. 2. From Wave Players main menu bar, select File and click Settings. The Wave Player Settings window appears. 3. In the Repeat Sound Every text field, type a value between 1 and 60 minutes. This value applies to all events with an associated .wav file. 4. In the Event Definition list, double-click the event to which you wish to assign a .wav file. The Select Wave file path window appears. 5. Click the ... button and select the .wav file and location. Click OK. 6. Repeat steps 2 and 3 until you are done. Click Apply
CENTAUR 157
INDEX
Numerics
2R Connection 85 3R Connection 86 Security Levels, Permissions and Operators 120 Adding Multiple Controllers 68 Adding One Controller 68 Adding, Modifying and Deleting Access Levels 32 Cards 51 CCTV Commands 128 Controllers 68 Doors 36 Groups 114 Holidays 22 Inputs 87 Operators 120 Outputs 95 Permissions 120 Relays 62 Schedules 26 Security Levels 120 Sites 8 Address Access Level 32 Controller 69 Doors 36 Groups 115 Holiday 22 Inputs 87 Operator 121 Outputs 96 Relays 62 Schedules 27 Security Level 121 Site 9 Alarm Acknowledgement 105 Alarm Acknowledgement Options 132 Alarm Acknowledgment Enabling 105 Schedule 105 All Events, Displaying 138 Alternate Floor Group 116 Anti-passback Override 54 Anti-passback Reset Input 76 Anti-passback Reset Schedule 76 Anti-passback Schedule 76 Anti-passback Status, Output Activation Events 98 CENTAUR 159
A
Abnormal Events 138 Access Denied, Output Activation Events 98 Access Events 138 Access Granted, Output Activation Events 98 Access Level Active 33 Access Level Assignment, Cards 52 Access Level Programming 31 Access Level Properties Access Level Tab 32, 122 Doors & Schedules Tab 33 Access Rights, Operator 124 Access Time-out, Output Activation Events 99 Access, Door Type 38 Acknowledged Events 105, 138 Acknowledging Alarms 106 Action 104 Activate a Relay Group 117 Activate Relay, Anti-passback 76 Activating Devices via Events 104 Outputs Manually 100, 142 Relay Groups 91 Relays Manually 140 Activating Outputs, Door Programming 46 Activating Schedule Relays 64 Timed Relays 64 Activation Tab, Relays 63 Activation Time, Outputs 98 Activation Timer Delay for Relays 65 Activation Timer for Relays 64 Active Access Level 33 Controller Communications 75 Schedules 27 Add a New Card, FrontCard 56 Adding Multiple Doors at One Time 36 Multiple Inputs at One Time 87 Multiple Outputs at One Time 95 Multiple Relays at One Time 62
Anti-passback Tab 75 ASCII Command 106 Assigning a .wav File to an Event 156 Assigning Access Levels, Cards 52 Assigning Controller Addresses 70 Assigning Floor Groups, Cards 52 Attaching Databases 150 ATZ 2R 73 ATZ 2R Connection 85 ATZ 3R 73 ATZ 3R Connection 86 Auto-login, Wave Player 156
B
Backing up Databases 147 Backup Scheduler 152 Baud Rate 12 Beep On Alarms 132 On All Abnormal Events 133 On All Access Events 133 On All Events 132 bling 33 Buffering, Offline 14 Bypass input group 89 Bypassing Inputs 89
C
Camera, CCTV Command 129 Card Fields 14 Card Import/Export 3, 125 Card Import/Export Wizard 58 Card Number 52 Card Options 53 Card Properties Card Tab 51 Card Settings 51 Card Status 54 Card Traced 53 Card, Distributed Programming 15 Cardholder Details 51, 54 Cards 49 Photo 55 CCTV Command Properties General Tab 128 CCTV Control Enabling for an Event 106 Protocol 107 160 INDEX
Schedule for an Event 107 Centaur Database Management Tools 145 Centaur Databases 146 Colour Definitions, Events 133 COM Port Assignment 12 Command, CCTV 107 Communication Baud Rate Setting 12 COM Port Assignment 12 Controller Options 73 Dialup 10 Direct (serial port) 11 Phone Number 13 Speed 12 TCP/IP 11 Update CTL Every 15 Minutes 14 Communication Schedule 12, 107 Configuration Tab, Controllers 71 Configuring Doors 72, 77 Configuring Inputs 73, 88 Connecting and Disconnecting 16 Connecting Inputs 84 Control Input Status 141 Control Output Status 100, 142 Control Type, Lock 40 Controller Addresses, Dip Switches 70 Controller Configuration Wizard 68 Controller Properties Anti-passback Tab 75 Configuration Tab 71, 77 Controller Tab 69 Controller Reset 81 Controller Response Delay 75 Controller Status 81, 141 Controller Time-Out 75 Controllers 67 Controlling Database Sizes 149 Crossover Periods 29 Custom CCTV Command 129 Customizing Event Colours 134
D
Database Backup Scheduler 3, 125, 152 Database Management 3, 125, 145 Database Management Module 146 Database Size 149 Database Tab, Security Levels 122 Databases, description 146 Deactivate a Relay Group 117
Deactivate Relays Manually 140 De-energized, Lock Control 40 De-energized, Relay State 65 Default Event Definition 102 Default Logon ID and Password 2 Default System Event Colours 133 Definable Card Fields 14 Defining Holidays 23 Delay Controller Response 75 Delay on Activation Time 65 Delete A Card, FrontCard 56 Deleting Access Levels 32 Cards 51 CCTV Commands 128 Controllers 69 Doors 36 Groups 114 Holidays 22 Inputs 87 Outputs 95 Relays 62 Schedules 27 Security Levels , Permissions or Operators 121 Sites 9 Deleting Databases 149, 151 Deleting Databases. See also Purging Databases and Removing Databases Detaching Databases 150 Details Tab, Holiday Programming 23 Details Tab, Schedule Programming 27 Details, Cardholder 51 Device 104 Device Activation, Events 104 Device-Specific Event Definition 102 Dial-up Number 13 Dialup Site 10 Dip Switches, Controllers 70 Direct (Serial Port) Connection 11 Disable a Door Group 117 Disable Door Manually 139 Disable Input Manually 142 Disconnecting 18 Disk, Event Definitions 104 Display Abnormal Events 138 Access Events 138 Acknowledged Events 138
All Events 138 Controller Status 141 Door Status 48 Input Status 141 Output Status 142 Relay Status 65, 140 Display Notification Message 132 Displaying Events 138 Distributed Card Programming 15 Door Configuration 72 Door Expanders Configuration 77 Door Forced Open, Output Activation Events 99 Door Groups also see Groups 116 Assigning Doors to a Door Group 116 Enable or Disable 117 Lock or Unlock 116 Door Input 44 Door Open Pre-alarm, Output Activation Events 100 Door Open Too Long, Output Activation Events 100 Door Open, Output Activation Events 99 Door Properties Door Tab 36 Elevator Control 47 General Tab 37 Inputs and Outputs 44 Door Tab 36 Door Timers 42 Door Type 38 Door Unlock Schedule 41 Door Unlocked, Output Activation Events 100 Doors 35 Doors & Schedules, Access Levels 33 Download 80
E
Editing a Scheduled Database Backup 153 Elevator Control 47, 109 Elevator, Door Type 38 Enable a Door Group 117 Enable Door Manually 139 Enable Input 141 Enabling a Schedule 27 Enabling Schedule for Inputs 89 Enabling the Access Level 33 End Time 28 CENTAUR 161
Energized, Lock Control 41 Energized, Relay State 65 Entry, Door Type 39 Entry, Global 39 Entry/Exit, Unlock Both 77 Event Colour Definitions 133 Event Database 146 Event Database Size 149 Event Definition 101 Alarms Tab 105 CCTV Control tab 106 Command 107 General Tab 103 Instructions 106 Requires Acknowledgement 105 Schedule 103, 104, 105, 107 Selecting Events 102 Video Switcher Protocol 107 Event Display 138 Event Options 132 Event Request 75 Events Display Abnormal 138 Display Access 138 Display Acknowledged 138 Display All 138 WAV file assignment 156 Events, Output Activation 98 Exit, Door Type 39 Exit, Global 39 Exporting Cards 58 Extended Access Time 43 Extended Timer Option, Cards 53
Schedules for each 47 FrontCard 3, 55, 125 FrontGuard 3, 125 FrontView 4, 126
G
General Centaur Options 132 General Controller Properties 69 General Door Properties 36 General Holiday Properties 22 General Properties Schedules 27 General Properties for Security Levels, Permissions and Operators 121 General Tab, Door Programming 37 Generate Unique PIN 15 Global Entry/Exit 39 Groups 113, 114 Floors 52 Groups, Are Used Where 114 Groups, Holiday 23
H
Hard-passback 76 Holiday Groups in Schedules 29 Holiday Properties Details Tab 23 Holiday Tab 22 Holiday Tab 22 Holidays 21 Holidays and Holiday Groups 23
I
Importing Cards 58 Input Configuration 73 Input Configuration for Anti-passback Reset 76 Doors 44 Interlock 45 Mantrap 45 REX 45 Input Connections 84 Input Groups also see Groups 116 Assigning Inputs to an Input Group 116 Input Properties Bypassing Inputs 89 Details Tab 88
F
Family Number 52 Family Number, Maximum 15 Fast Event Request 75 Firmware Update 79 Floor Group Properties Floors 115 Floor Group, Alternate 116 Floor Groups Assigning Floors 115 Selecting a Schedule 115 Setting an Alternate Floor Group 116 Floors 115 Definition 16 Number of 16 162 INDEX
Input Configuration 88 Input Enabling Schedule 89 Input Response Time 89 Input Tab 87 Input Speed 89 Input Status Display 141 Input Tab 87 Inputs 83 Inputs and Outputs Tab 44 Installation & Use 1 Installing the Centaur Software 2 Instructions 106 Interlock Inputs 45 Interlock Override 54 Invalid, Cards 54 Inverted, Output 98 IP Address 73
K
Keypad Schedule 41 Keypad Time-out, Output Activation Events 99 Keypad Type 72 Keypad Type, Door Expansion Module 78 Keypad, Controllers 72
L
LAN 11 Languages 5 Latched Relay Activation (Manually) 140 Late to Open, Unlock On 42 Launching Centaur 2 Limiting the Event Databases Size 149 Locator 3, 125 Lock a Door Group 116 Lock Control 40 Lock Control Entry/Exit Doors 77 Lock Door 139 Logon ID, Setting the Operators Access Rights 124 Lost Cards 54
Mantrap Inputs 45 Manual Control of Door and Relay Groups 116 Manual Controls 137, 138 Doors 48 Relays 65 Manual Controls, Security Levels 123 Maximum Family Number 15 Modem 14 Modify, Security Levels 122 Modifying Access Levels 32 Cards 51 CCTV Commands 128 Controllers 69 Doors 36 Groups 114 Holidays 22 Inputs 87 Outputs 95 Relays 62 Schedules 26 Security Levels, Permissions or Operators 121 Modules Tab, see Software Modules 124 Monitor, CCTV Command 129 MSDE Management. See also Database Backup Scheduler
N
Name Access Level 33 Controllers 71 Doors 37 Holidays 22 Outputs 97 Relays 63 Schedules 27 Security Level, Permission or Operator 122 NC Input Connection 84 NC Inputs 73 Non-activated Status, Relays 65 None, Security Levels 123 Normal State (NO/NC), Inputs 88 Notes Access Level 33 Controller 71 Doors 37 Holidays 22 CENTAUR 163
M
Main Database 146 Make a Beep on Alarms 132 Make a Beep on All Abnormal Events 133 Make a Beep on All Access Events 133 Make a Beep on all Events 132
R
Reader 40 Reader Disabled, Output Activation Events 99 Reader Type 72 Reader Type, Door Expansion Module 78 Reader, Controllers 72 Reading Device 40 Reading Type Options 41 Referesh, FrontCard 56 Registering the Centaur Software 5 Relay Activation Time 64 Relay Delayed Activation Time 65 Relay Groups Activate or Deactivate 117 also see Groups 116 Assigning Relays to a Relay Group 116 Relay Properties Activation Tab 63 Relay Tab 62 Relay State 65 Relay Tab 62 Relay, Activate with Anti-Passback 76 Relays 61 Repeat Sound Every 157 Requires Acknowledgment 105 Reset Anti-passback Status 76 Reset Anti-Passback, Scheduled 76 Reset Controller 81 Reset Events Definition to Default 103 Response Delay, Controller 75 Response Time, Inputs 89 Restore Time 89 Restoring Databases 148 REX Denied, Output Activation Events 99 REX Granted, Output Activation Events 99 REX Input 45 Running the Database Managment Module 146 Running Wave Player 156
O
Offline Buffering 14 Open Too Long Time 42 Opened, Reading Type 41 Opening the Centaur Software 2 Operations Tab, Security Levels 123 Operators 119, 124 Options 131 Alarm Acknowledgement 132 Events 132 Status Display 133 Options, Cards 53 Outbox 14 Output Activation 46 Output Programming 94 Output Properties ActivationTime 98 Events Tab 97 Inverted 98 Output Tab 96 Output Status 100, 142 Output Timing Properties Timings 100 Outputs 93 Override Anti-passback 54 Override Interlock 54 Overview of Output Programming 94
P
P.I.N. 53 Generate Unique 15 Password, Setting the Operators Access Rights 124 Pending Cards 54 Periods 27 Photo 55 Poll Door Expander Status Non-Stop 78 Poll Timeout 74 Port Number 73 Pre-alarm Time 42 Preset, CCTV Command 129 Programming Rights, Security Levels 122 164 INDEX
S
Save Changes, FrontCard 56 Saving Events to Disk 104 Schedule
Activating Relays 64 Alarm Acknowledgement 105 Anti-Passback 76 Anti-passback Reset 76 CCTV Control 107 Communications 12 Event Definitions 103, 104 Floor Groups 115 Floors 47 Inputs 89 Keypad 41 Timed Activation, Relays 64 Unlock 41 Schedule Active 27 Schedule Database Backups 152 Schedule Properties Details 27 Schedule Tab 27 Schedule Tab 27 Schedules 25 Schedules and Doors, Access Levels 33 Schedules Can Be Used, Where 26 Screen 103 Scrolling Through the Sites Cards 56 Search for a Card in FrontCard 56 Security Level Properties Operations Tab 123 Security Level Tab 121 Security Levels 122 Selecting Events 102 Send ASCII Command 106 Serial Port Connection 11 Site Address 9 Site Configuration Wizard 8 Site Programming 7 Site Properties Cards Tab 14 Communications Tab 10 Site Tab 9 Size of Event Database 149 Software Modules 3, 124 Speed 12 SpxDBase, see Database Management Module 146 Start Time 28 Starting FrontCard 55 Starting Software Modules 4 Starting the Database Managment Module 146
Starting Wave Player 156 State, Relays 65 Status Options 133 Status, Cards 54 Status, Controllers 141 Status, Inputs 141 Status, Output 100, 142 Stolen Cards 54
T
TCP/IP 11 Telephone Number 13 This input activates relay 91 This input bypasses input 89 Time and Attendance 42 Time Out, Poll 74 Time, Update Controller 81 Timed Event Definition 104 Timed Activation Schedule 64 Timed Relay Activation (Manually) 140 Timeout 134 Time-Out, Controller 75 Timers Delay on Relay Activation Time 65 Extended Access 43 Open Too Long 42 Pre-alarm 42 Relay Activation 64 Unlock 42 Trace Cards 53 Tracker 4, 126 Tracker LCD Display Option 77 Tracker Software 42 Truncating Events 149 Type 10 Type, Door 38
U
Undo Changes, FrontCard 56 Unique PIN Numbers 15 Unlock a Door Group 116 Unlock Both Doors 77 Unlock Door 139 Unlock Door (Latched) 139 Unlock Door (Timed) 139 Unlock on Late to Open, Reading Type 42 Unlock Schedule 41 CENTAUR 165
Unlock Time 42 Unlocked, Reading Type 41 Update Controller Every Fifteen Minutes 14 Update CTL Time Automatically Every 15 Minutes 14 Update events 133 Update Firmware 79 Update Time 81 Use Keypad 53 Use System Colours 133 User Definable Card Fields 14 User Defined Data 54 Using Centaur 1 Using FrontCard 56
W
Waiting for Keypad, Output Activation Events 99 WAV File Assignment 156 Wave Player 155 WavePlayer 4, 125 What Are Groups 114 What are the Centaur Databases? 146 Where Are the Groups Used 114 Where Schedules Can Be Used 26 Wizard Controller Configuration 68 Site Configuration 8 Wrong Code on Keypad, Output Activation Events 99
V
Valid Cards 54 Video Switcher Protocol for an Event 107 View Controller Status 81 View, Security Levels 122 Viewing Events on Screen 103
Z
Zone Speed 89 Zones Input Speed 89
166 INDEX
780 Industrial Blvd., St-Eustache, Qc., Canada, J7R 5V3 www.postech.ca C3_MAN_ENG_06 01/2004