Access Control Essentials
Access Control Essentials
2010, Schneider Electric All Rights Reserved No part of this publication may be reproduced, read or stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without prior written permission of Schneider Electric. This document is produced in the United States of America. Product Names are trademarks of Schneider Electric. All other trademarks are the property of their respective owners. Title: CyberStation Access Control Essentials Guide Revision: C Date: February, 2010 Schneider Electric part number: 30-3001-405 CyberStation version 1.91 The information in this document is furnished for informational purposes only, is subject to change without notice, and should not be construed as a commitment by Schneider Electric. Schneider Electric assumes no liability for any errors or inaccuracies that may appear in this document. On October 1st, 2009, TAC became the Buildings Business of its parent company Schneider Electric. This document reflects the visual identity of Schneider Electric. However, there remain references to TAC as a corporate brand throughout the Andover Continuum software. In those instances, the documentation text still refers to TAC only to portray the user interface accurately. As the software is updated, these documentation references will be changed to reflect appropriate brand and software changes. All brand names, trademarks and registered marks are the property of their respective owners. Schneider Electric One High Street North Andover, MA 01845 (978) 975-9600 Fax: (978) 975-9782 http://www.schneider-electric.com/buildings
February, 2010
Contents
11
11 12
Chapter 1
13
14 19
Chapter 2
21
22 23 23 24 24 25 26 29 31 32 32 33 34 34 35 36 37 39 40
5
SecurityLevel Tab CommPort Editor ..................... Field Bus Controllers Tab CommPort Editor ......... NetController II Model 9680 ................................... ACX 57XX Series ..................................................... Task 5: Designate the Primary Access Server ........................... More about the Primary Access Server ...................... Task 6: Create CyberStation Points .......................................... Create an InfinityInput Point ..................................... Create an InfinityOutput Point .................................. Create an InfinityNumeric Point ................................ More about Points ....................................................... Task 7: Create Areas ................................................................... Factors to Consider When Defining Areas ................. Create an Area ......................................................... More about Areas ..................................................... Task 8: Create Doors ................................................................... When to Create a Door ................................................ Data that Defines a Door ............................................ Create a Door ............................................................... View Doors Assigned to an Area ................................. More about Doors ..................................................... Task 9: Create Personnel ............................................................ Access-Control Information in a Personnel Object .... Methods of Creating Personnel Objects ..................... Open the Personnel Manager for the First Time ....... Create a Personnel Object in the Personnel Manager More about Personnel Objects .................................... Task 10: Create Schedules ......................................................... About Schedule Points ................................................ Create and Configure a Schedule ............................... Attach a Schedule Point to a Door .............................. Attach a Schedule Point to an Area in a Personnel Object ....................................................... More about Schedules ................................................. Task 11: Configure Alarms ......................................................... About Event-Notification Objects ............................... Create an Event-Notification Object .......................... About Notification by E-mail and Pages .................... Creating an EventNotification Distribution List ... About AlarmEnrollment Objects ................................ Create an Alarm-Enrollment Object ..........................
6 Schneider Electric
43 43 44 45 46 46 47 47 50 52 53 54 54 55 55 56 56 56 57 63 64 65 65 66 66 68 69 70 70 71 73 74 76 77 77 78 82 83 84 85
General Expressions for Security ............................... About Attaching Alarms to Objects ............................ Attach an Alarm-Enrollment to a Door ...................... Attaching Alarms to a Point ....................................... Using the Alarms / Advanced Alarms Tab of an Object Editor ........................................................... More about Alarms ...................................................... Task 12: Configure Video ............................................................ About Video Monitor and Video Administrator ......... Video Monitor Main Features ................................. Video Administrator Main Features ....................... About VideoLayouts .................................................... Configuring Video via Video Monitor and Video Administrator .................................................... Allow Access to and Enable Video Monitor and Video Administrator ......................................... Create a VideoServer Object ................................... Configure Video Using Video Administrator ......... More about Video Monitor and Video Administrator Configuring Video Using VideoLayout ....................... Create a VideoServer Object ................................... Create a VideoLayout Object .................................. Add a VideoLayout to the Alarms Tab of an Object More about Video Layouts ....................................... Task 13: Create Graphic Panels and Controls .......................... About Graphic Controls for Access Control ................ Create a Graphics Panel and a Door Control ............. More about Graphics Panels and Controls ................ Task 14: Configure Reports ........................................................ About Report Objects ................................................... Create a Report ............................................................ More about Reports .....................................................
86 88 88 89 90 96 97 97 98 99 101 102 102 105 107 110 110 110 111 112 114 115 115 116 119 120 120 120 124
Chapter 3
Monitoring Live Access Events .................................................. About Creating EventView Objects ............................ More about EventView Objects .................................. Using ListView Windows ............................................................ About Predefined ListView Objects ............................ About Creating ListView Objects ............................... More about ListView Objects ......................................
Chapter 4
133
134 134 135 135 136 137 138 138 139 140 143 144 145 145 146 146 149 150 151 151 152 152 153 154 155 156 156 157 157
Schneider Electric
About Sending Condition Level Values to Individual Controllers ................................................. More about Condition and Clearance Levels ............. Adding FIPS-PIV Card Credentials ........................................... Overview of FIPS-PIV ................................................. PIV Middleware Providers ...................................... Physical Access Control System (PACS) ................ Identity Management System (IDMS) ................... Overview of FIPS-PIV cards and readers .................. FIPS-PIV Cards ....................................................... FIPS-PIV Readers .................................................... Configuring FIPS-PIV on a New System ................... Specifying the Allowed Credentials ........................ Entering or Importing FIPS-PIV Credential Information .............................................................. Configuring a Door/Reader ...................................... Transitioning an Existing system to FIPS-PIV ......... Updating to FIPS-PIV Revision .............................. Specifying the Allowed Credentials ........................ FIPS-PIV Credential Information .......................... Configuring a Door/Reader ...................................... Medium Assurance Profiles .................................... More about FIPS-PIV ..................................................
158 158 159 159 160 160 161 162 162 162 164 164 165 165 166 167 167 168 169 169 170
10
Schneider Electric
11
For complete user-interface details (beyond the scope of the basic tasks in this manual), you must consult the online help and the other CyberStation documents listed in the next section. The procedural information in this manual assumes that your access control hardware and software are installed, online, and ready to be configured.
Related Documentation
For additional or related information, you can refer to these documents. Document CyberStation online help HVAC Essentials Guide CyberStation Installation Guide Continuum Remote Communication Configuration Guide ACX 57xx Series Controller Operation and Technical Reference NetController II Operation and Technical Reference Guide Document Number n/a 30-3001-1000 30-3001-720 30-3001-814 30-3001-999 30-3001-995
12
Schneider Electric
Chapter 1
Getting Started
This chapter offers guidance on planning your access control system and includes the following topics: A review of a sample floor plan for a manufacturing facility, its access control issues, and access control devices in place to address the issues for this sample site A network configuration of controllers, servers, and CyberStation workstations that provides the access control infrastructure for the sample site
13
14 Schneider Electric
The following illustration is a floor plan of a small office and manufacturing facility.
Rear Entrance Loading Dock Emergency Exit
Warehouse
Manufacturing Floor
Office
Main Entrance
The following issues for this sample site determine the access control devices that are needed and the configuration of the system: At the main entrance, a receptionist greets employees and visitors during business hours. The main entrance is locked during off hours, but employees may need to enter and exit at those times. The employer wants to monitor use of this door during off hours. Warehouse and manufacturing employees can use the rear entrance to enter and leave the building.
15
The door in the manufacturing area to the outside is for emergencies only and should be closed and locked under normal circumstances. Only authorized employees are allowed onto the manufacturing floor. The employer wants to monitor manufacturing employees who exit the building through the warehouse to the rear entrance. The following illustration shows the same floor plan, with access control devices in place.
Single Reader at Rear Entrance Loading Dock: Door Switch is Supervised Emergency Exit: Door Switch is Supervised
Dual-Reader Door
Warehouse
Manufacturing Floor
Motion Detector: Unlocks Door during Regular Hours Triggers Video during Off Hours
16 Schneider Electric
The following table describes how these access control devices address the issues identified for this facility. Note that the devices used in this example are only one of many possible access control solutions that can be implemented. Area or Door Main Entrance Access Control Card reader allows access to employees. No access to visitors unless the receptionist is present. Motion detector unlocks door for exiting during regular hours, and triggers alarm with video during off hours. Camera captures video if triggered during off hours. Security guard at CyberStation workstation is alerted and can view video. Supervised input on door detects tampering and trigger an alarm. Door to Manufacturing from Office Card reader allows access only to authorized employees. No access-validation needed to exit Manufacturing through this door. Door to Manufacturing from Warehouse Card reader allows access to Manufacturing only to authorized employees, and requires employees to present access cards to exit Manufacturing through this door. Card reader allows employees access to Warehouse. No access validation needed to exit to the outside using this door. Supervised inputs on door detect opening or tampering during off hours and trigger an alarm.
Rear Entrance
17
Access Control Supervised inputs on door detect opening or tampering during off hours and trigger an alarm. Supervised inputs on door detect opening or tampering and trigger an alarm.
Emergency Exit
18 Schneider Electric
The following components are standard in a security setup: CyberStation ACX 57xx Controller NetController II web.Client Server Integral DVMS (Digital Video Management System) Badge Printer
19
20 Schneider Electric
Chapter 2
Configuring an Access Control System
This chapter contains step-by-step procedures for configuring an access control network in CyberStation using ACX 57xx and NetController II controllers. The chapter presents basic configuration tasks in the sequence that you typically perform them. So that you can more readily understand how the elements of an access control network work together, the procedures in this chapter cover basic setup tasks for a simple network. Each procedure provides cross references to the CyberStation online help so that you can obtain complete, detailed information about all the options associated with a configuration task.
21
Navigation Pane Select an object in this pane to display the objects it contains in the Viewing Pane.
Viewing Pane
22 Schneider Electric
23
24 Schneider Electric
Create a Network
When you configure an access control network, the first object you create is the network itself. 1. In Continuum Explorer, right click Root, select New, and then select Network. 2. Enter a name for the network for Object Name, and click the Create button.
CyberStation creates an alias from the object name that you enter. You can edit the alias if you wish. An alias cannot contain symbols or spaces.
3. In the Network editor, enter the Universal Time Coordinate (UTC) offset in minutes for Time Zone. The UTC offset is the difference between your local time and Greenwich Mean Time (GMT). Enter - if local time is behind GMT. Note: -300 minutes is an example of the Time Zone offset for Eastern Standard time. 4. Click OK.
CAUTION It is required that you locate Continuum controllers and workstations and Pelco video system in the same time zone. You should also ensure that they are time synchronized with each other. The system manager can act as a time server. Since the system manager is essentially a PC, however, be aware that the time of the PC may drift.
25
3. In the login dialog enter the default controller user name and password: Username: acc Password: acc Note: The password can be changed by right clicking the Continuum task icon 4. Select OK. and selecting Change your password...
27
5. Select Controller Configuration. 6. In the Configurable Properties section enter the following information: ACCNet ID IP Address Subnet Mask Gateway Address Web Server Port PPP IP Address Transport Type; use the drop down menu to make the proper selection. 7. In the Miscellaneous section, using the dropdown menu, select the following information: IO Configuration Comm4 Port Line 8. Select Submit to Controller.
28 Schneider Electric
9. Exit the configuration setup. Note: Once you have finished commissioning your controller, your PCs IP address and Subnet Mask value can be returned to their normal settings.
Create a Controller
Note: Before performing this procedure, you must first install the controller, connect it to your Ethernet network, and then commission the controller. Refer to Web Configuration for Controllers on page 26. 1. In Continuum Explorer, right click the existing network object, select New, and then select InfinityController. 2. Enter a controller name for Object Name, and click the Create button. 3. In the InfinityController editor, enter a unique number from 1 to 190 for ACCNetID. Note: This must match what was entered in the web configuration page. The ACCNetID value uniquely identifies the controller within the access control network. 4. Select the controller model from the Controller Type dropdown menu.
29
Serial Number and Version will be read from the controller after the Teach operation.
5. Select the Network tab. 6. Enter the IP address of the controller and subnet mask, and if required, enter the default router. You obtain this information from your IT administrator. 7. Click Apply. 8. Select the General tab, and then click the Teach button. 9. In the Select Teach Mode dialog, select the InfinityController Teach radio button, and click OK. Note: To confirm that the Comm Status is online, click the Refresh button. 10. Click OK to close the InfinityController editor. 11. Proceed to Task 5: Designate the Primary Access Server on page 46.
30 Schneider Electric
31
32 Schneider Electric
Description
The description is optional, but a good description of the IOUModule object helps others when they need to test, modify or manipulate the network. To enter a description, type up to 32 characters (including spaces) in the text field. Enter the IOU number here. You must manually assign a unique number (between 1 and 32) for each IOU module on a network controller. Physically label the IOU modules with the numbers you assign. This number is not the same as the 12digit module ID # assigned to the individual module at the factory. You will use this number when you configure points on this controller.
IOU Number
Model Number
The model number identifies the type of the IOUModule and is read from the module.
33
This displays Online or Offline, depending on whether the controller is in communication with the module. These Schneider Electric-assigned numbers appear after the Learn process. The only time you will need these numbers is when speaking to a Schneider Electric Support Representative. These numbers will help our staff to answer your questions. You may manually enter the Module ID number in this field, (if you know it), rather than following the Learn process. Use the Learn button to commission the IOU module on the network. See Commissioning an IOU Module on page 35 later in this chapter. Use the Wink button after commissioning the IOU module to confirm that your system recognizes the IOU module. Click the Wink button. The Status light on the IOU module should flash. This indicates the IOU module was successfully commissioned.
Learn
Wink
Update IOU
Click the Update IOU button to browse for a *.iou file (a Schneider Electric-provided Flash File for individual modules) when updating IOU modules with new firmware.
34 Schneider Electric
1. In the IOUModule editor, click the Learn button. A dialog displays requesting the operator to press the Commission button on the physical module. 2. At the IOU Module, press the Commission button on the front panel. The dialog at the workstation should disappear indicating that it received the information from the module. If the module is not easily accessible, you can enter the module ID found on the label inside the cover of the module into field, and click the Apply button. 3. In the IOUModule editor, click the Refresh button. The ModuleID for commissioned module, the ProgramID field, and the IO model type (i.e., AO-4-8) are automatically entered. This information was received from the module. Also, the Comm Status should be Online.
Andover Continuum CyberStation Access Control Essentials Guide 35
36 Schneider Electric
37
. Default Mode Printer XDriver (XDriver option must be enabled to support this function) Description Select this option when connecting a serial printer to this port. Select this option to use a customized external equipment driver to connect to a third-party device. Note: Before you can select the XDriver, you must first install it using the instructions provided with the software. To select an XDriver file, click the browse button to locate and select the file for the XDriver. NotConfigured Select this option if the comm port is available. Indicates that the port is not preset to any other default mode configuration.
38 Schneider Electric
Status
Displays the status of the device, or XdrvNotInstalled when no XDriver file has been selected. Displays the last error to occur on the device. Displays the time and date that the last error occurred on the device. Displays the number of errors that have occurred on the device since you last set it to zero. Increments to 255 errors and remains set at 255 until you reset it to zero by clicking the Reset Count button.
39
Baud Rate
The Baud rate is the speed, measured in bits per second, at which the controller sends information to the device that you are connecting to the comm port. Select the baud rate that matches that required by the equipment connected to this port.
40 Schneider Electric
Track CXD
This option monitors a communications carrier detect signal called CXD. When selected, it enables the controller to detect when communication with connected objects has been lost. Depending on your modem configuration, the CXD (sometimes called DCD) signal (pin 8 on an RS_232 connector) is asserted high when the communications link is established between modems. Once the carrier signal is lost, CXD goes low. Track CXD looks for the high-to-low transition and makes the controller reset this comm port to its default mode. Track CXD cleans up the comm port by logging off the last user. Track CXD is selected by default, and it is required for comm ports that are connected to modems. If Track CXD is not selected, the controller cannot respond to the loss of the CXD signal.
Flow Control
The flow control type determines how the comm port handles the flow of data between the controller and its attaches device (usually a printer, modem, or terminal). This process is also known as handshaking. Select one of the following options from the dropdown menu: NoFlowControl: Select this flow control type if you do not want to regulate the flow of information between the controller and its attached printer, modem, or terminal. Without a flow control type, buffers that hold data that is being transmitted or received could overflow, and some data could get lost.
41
CtsRts: This flow control type uses hardware signals to send clear to send (Cts) and request to send (Rts) messages. Both of these messages must be acknowledged by the controller and its attached device before information can be transmitted. XonXoff: This control flow type uses software signals in the form of characters that are sent as part of the data being transmitted. When the controller or its attached device detects that it has been sent an Xon character, it makes itself available to receive data. It considers all data received after the Xon character as valid. When it detects an Xoff character at the end of the data steam, the controller or attached device knows the transmission is complete. XonXoff CtsRts: This flow control type uses both the software (XonXoff) and hardware (CtsRts) handshake methods for regulating the flow of information between the controller and its attached device. Current Mode This is a read-only attribute that shows you the default mode selected in the General tab.
42 Schneider Electric
When a controller is Offline, it is not in communication with the rest of the network. This information is read only.
Andover Continuum CyberStation Access Control Essentials Guide 43
Comm Port Infinet Port User Port COMM1 COMM2 COMM3 COMM4 COMM16 Custom Port
Other Modes Printer; Infinet; Lbus; LON; PPP; Wireless; XDriver Printer; Infinet; Wireless; XDriver Printer; PP; XDriver Printer I; Lbus; XDriver XDriver -
44 Schneider Electric
Note: For additional information, in the Comm Port editor, see the help topics: Configure Settings for Infinet, Default Modes for Controller Comm Ports, and Summary of Comm Port Characteristics
45
3. When prompted to teach the controllers and workstations about this workstation, click Yes. 4. Proceed to Task 6: Create CyberStation Points on page 47.
46 Schneider Electric
Digital InfinityOutput Used to specify a digital (On or Off) value, allowing CyberStation to change the status of a switch or a contact. InfinityNumeric InfinityDateTime InfinityString Software point that stores a number value, including an On/Off value (1 or 0). Software point that stores a date and time value. Software point that stores text.
Points enable you to monitor and control access events. You use these points with schedules, alarms, and other objects to establish routine access control and to respond to unauthorized access events.
47
You create a supervised input point for each input (for example, from a contact sensor) from the devices wired to channels at each controller in your network. 1. In Continuum Explorer, right click the controller where you want to create the point, select New, and then select InfinityInput. 2. Enter a point name for Object name, and click the Create button. 3. In the General tab of the InfinityInput editor, enter the units for this point. For example, define the meaning of the On value: On = Closed. Leave the Value field at 0. The system updates the value with the input from the associated controller channel.
Entering a description helps other users identify what this point represents.
4. Select the Settings tab. 5. Select Supervised for Elec Type. 6. Enter the controller channel number (marked on the controller) to which this input is wired. 7. Enter $####### for Format.
48 Schneider Electric
$ indicates a text value. Each # is a placeholder for one character. This format enables On, Off, or Trouble to be reported for the value.
$ indicates a text value. Each # is a placeholder for one character. Use a period to indicate the position of the decimal point, if needed An example for the Format value is $#####.# 8. Select the appropriate input type based on the wired configuration of the switch (normally open with a resistor in series, normally closed with a resistor in series). 9. Click OK.
49
6. Enter the controller channel number (marked on the controller) to which this output is wired. 7. Enter $### for Format. $ indicates a text value. Each # is a placeholder for one character. This format enables On or Off to be reported for the value.
8. Click OK.
51
1. In Continuum Explorer, right click the controller where you want to create the point, select New, and then select InfinityNumeric. 2. Enter a point name for Object name, and click the Create button. 3. In the General tab of the InfinityNumeric editor, enter the units for this point. For example, define the meaning of the point value: Max. Occupancy = 100 or On=Occupied. 4. Leave Value empty, or enter a value, depending on how you intend to use this point. For example, if the point will be a constant, enter the number. If the value will be the result of a calculation, do not enter anything in the field. 5. Enter the format of the value for Format. $ indicates a text value. Each # is a placeholder for one character. Use a period to indicate the position of the decimal point, if needed
52 Schneider Electric
53
Lobby/Offices
Manufacturing Floor
Stock Room
For example, the manufacturing floor of a small facility might have doors leading to other areas of the facility, such as an office area, stock room, and emergency exit to the outside.
The degree of access control that you require for the movement of personnel within the facility The types of personnel who need access to various locations in your facility and when access is needed After you create an area object, you configure doors that access the area. You also assign the area to personnel who need access to it. In addition, you can attach schedule points to Door and Personnel objects to determine when access can occur.
Create an Area
Because the doors accessing an area may be managed by different controllers, you typically create a folder for Area objects from Root. 1. In Continuum Explorer, right click Root, select New, and then select Folder. 2. Enter a folder name, and click the Create button. 3. Right click the folder, select New, and then select Area. 4. Enter an area name, and click the Create button. 5. In the Area editor, click OK. You can now assign doors and personnel to this area. 6. Proceed to Task 8: Create Doors on page 56.
55
56 Schneider Electric
Create a Door
You create Door objects in the controller to which the door and reader inputs and outputs are wired. 1. In Continuum Explorer, right click the controller where you want to add the door, select New, and then select Door. 2. Enter a door name, and click the Create button. 3. In the Door editor, select the Card Formats tab. 4. If you use Wiegand cards, enter the site code(s) used with your access cards. Note: You can have up to four site codes per door.
57
5. Select the card format, Wiegand or ABA, and then select the individual formats that you want the reader to recognize. Note: The FIPS-PIV options are included in the Wiegand Formats section. Cyberstation version 1.9 and higher supports this special personnel category for federal employees and contractors whose security identification must comply with the Federal Information Processing Standard for Person Identity Verification (FIPS-PIV). In Cyberstation you can configure door and Personnel objects to accommodate FIPS-PIV card or credential holders and FIPSPIV card readers. For more information, see Adding FIPS-PIV Card Credentials in Chapter 4, Advanced Topics for Access Control. Refer also to the CyberStation help topic, Defining a Custom FIPS-PIV String Format. 6. Select the Entry Reader tab. 7. Enter the channel number on the controller that is connected to the card reader at this door. 8. Select the area to which the door provides access.
58 Schneider Electric
10. If the door has readers on both sides, select the Exit Reader tab, and repeat steps 7 - 9 to configure the second reader.
59
12. Enter the channel number where each input or output is wired.
Channel Door Output ADA (Americans with Disabilities Act) Output Alarm Output Exit Request Input
Description Channel to which the door lock is wired. Channel to which an electronic door opener is wired. Channel that will be energized when an alarm condition is active at this door. Channel that receives input from a motion detector, request-to-exit (REX) button, or other REX device.
60 Schneider Electric
Description Channel to which the door switch is wired. The door switch monitors whether the door is open or closed. You also select the resistor type for the switch. Channel to which a bond sensor is wired. A bond sensor determines the physical position of the door latch. You also select the resistor type for the sensor. Channel for input that requests that the door be opened for a person to leave the area accessed by this door. Channel for input indicating that the card holder has ADA access enabled on his or her access card.
ADA (Americans with Disabilities Act) Exit Request Input ADA (Americans with Disabilities Act) Input
61
62 Schneider Electric
14. Under Send Access Events, select the events you want to log for this door. The events that you select for this door can be shown in logs, ListView and EventView windows, and reports. Events not selected here are not captured and cannot be retrieved for later viewing and reporting. 15. Click OK. Note: Cyberstation version 1.9 and higher supports a special personnel category for federal employees and contractors whose security identification must comply with the Federal Information Processing Standard for Person Identity Verification (FIPS-PIV). In Cyberstation you can configure door and Personnel objects to accommodate FIPS-PIV card or credential holders and FIPSPIV card readers. For more information, see Adding FIPS-PIV Card Credentials in Chapter 4, Advanced Topics for Access Control.
63
The door you created now appears in the list. The list indicates whether the door provides access to the area, exits the area, or both.
64 Schneider Electric
Schedules points that determine when the person can access assigned areas More advanced access control settings, such as area clearance levels and executive privilege, can also be defined in a Personnel object. These are described in greater detail in the CyberStation online help. In addition, if you have purchased the badging option, you can create ID badges for Personnel objects. The badges can include a photo, signature, fingerprint, etc., to identify the card holder.
66 Schneider Electric
4. Enter a name for the Personnel object (for example, you might want to enter the last name and first initial of the person), and click the Create button. The Personnel Manager opens.
5. In the Details tab, enter the persons full name. 6. Select the card format for Card Type. 7. For Wiegand cards, enter the site code for the card. For FIPS-PIV cards, enter agency code and system code. 8. Enter the card number. For FIPS-PIV cards, enter credential number. 9. Under Access Rights, expand the UnAssigned areas list.
67
10. Select the check box next to areas this person can access.
You can expand an area to attach a schedule point. Schedule points are described in Task 10: Create Schedules on page 70. 11. Click Apply. Note: Cyberstation version 1.9 and higher supports a special personnel category for federal employees and contractors whose security identification must comply with the Federal Information Processing Standard for Person Identity Verification (FIPS-PIV). In Cyberstation you can configure door and Personnel objects to accommodate FIPS-PIV card or credential holders and FIPSPIV card readers. For more information, see Adding FIPS-PIV Card Credentials in Chapter 4, Advanced Topics for Access Control.
68 Schneider Electric
69
70 Schneider Electric
71
4. Under Point Configuration, use the browse button to locate each of the following points: An InfinityDateTime point that the schedule updates with the next occupancy time (the date and time at which an area will next be occupied) An InfinityDateTime point that the schedule updates with the next unoccupancy time (the date and time at which an area will next be unoccupied) 5. Use the browse button to locate the InfinityNumeric point that the schedule will set for Occupancy Point. The value of this point will be set to On (Occupancy Time is now.) or Off (Unoccupancy Time is now.). 6. Check the Automatic Download check box, and select the day of the week and the time you want CyberStation to download the schedule to the controller. 7. Click OK. 8. In Continuum Explorer, right click the workstation that you want to perform the schedule download, and select Open. 9. In the General tab of the Device editor, click the Auto Download check box, and click OK.
Each week, at the day and time you selected in the schedule, this workstation downloads the next seven days of the schedule to the controller.
72 Schneider Electric
73
A schedule point is attached to the person can access the area only an area in the Personnel object when the schedule associated with the point is active. No schedule point is attached to an area in the Personnel object the person can access the area as determined by schedules (if any) that are attached to doors to the area.
1. In Continuum Explorer, double click the Personnel object that you want to edit. 2. In the Personnel Manager, under Access Rights, expand Assigned, and then expand an area where you want to attach a schedule point.
74 Schneider Electric
3. Click the icon next to Add Schedule to display the Add Schedule dialog.
Click here to display the Add Schedule dialog.
4. Select the browse button next to Schedule Points Location to locate, and select the controller with the schedule point that you want to add. 5. Select a schedule point, select the area(s) where you want to attach the point, and click OK.
. . . And in this pane, select the check box for each area that you want to use the point. Select a schedule point in this pane . . .
75
76 Schneider Electric
An AlarmEnrollment object specifies the conditions that define the alarm state and the return to normal state. You attach an AlarmEnrollment object to the objects, such as doors and points, to configure the alarm for that object.
These AlarmEnrollment objects define some typical door-related alarm conditions.
77
Displaying a video layout that shows video from cameras in locations affected by the alarm Displaying a graphics panel associated with the alarm You can also specify the notification actions that occur when the conditions that triggered the alarm return to normal.
78 Schneider Electric
Priority is used to sort events in the Active Alarm View window, with higher-priority events (events with a smaller priority number) at the top of the list. For example, a certain kind of alarm may be priority 1, while the return to normal for the alarm is priority 10. You can choose how you want to assign priorities to alarms.
6. Under Colors and Fonts, right click to select the colors and fonts used to display the alarm in the Active Alarm View window and the Alarm Status bar. 7. If you want the notification to be reissued if the alarm continues, enter the number of minutes between notifications for Repeat. 8. Select the Actions tab.
79
9. Click the check box next to each action you want the system to take in notifying users of the alarm and the return to normal. Note: You can receive an email notification of an alarm by choosing one of the email selections from the checklist. For more information about email notification of alarms see About Notification by Email and Pages on page 82.
10. Select the Delivery tab. 11. Click the Add Recipient button. 12. In the Recipients Configuration dialog, click the browse button to locate and select the CyberStation workstation to be notified of the alarm. Note: The recipients referred to in this dialog are the CyberStation workstations that you want to be notified of the alarm and that will then take the actions you selected in the Actions tab. 13. Specify the days and times of day that this workstation should receive the messages.
80 Schneider Electric
For example, you might designate Workstation 1 as the recipient of alarm notification during office hours Monday through Friday. You might then designate another workstation as the recipient of notification at night and on weekends.
14. Click the check box next to the actions the workstation should take if it receives notification during the times you selected. If you want the workstation . . . Always to perform the action To perform the action only if a workstation that was designated as primary for this action is offline To perform the action only if a repeat of the alarm has occurred Then . . . Select the check box under Primary for the action. Select the check box under Secondary for the action.
81
15. Click OK. 16. Select the Deactivate tab. 17. Select when to remove the alarm from the Active Alarm View window. 18. Click OK. You can now create an AlarmEnrollment object that uses this EventNotification object.
82 Schneider Electric
Each EventNotification object associated with the alarms that you wish to E-mail or page must have its own E-mail distribution list in the personal address book or Contacts list of the client E-mail application using a specified naming convention as outlined in Step 4 below. This E-mail distribution list must be stored in the first address book shown in the list of available address books in the E-mail client application. For example, if you create an EventNotification distribution list in the Personal Address Book in Microsoft Outlook, then the Personal Address Book must be the first one showing in the address list dropdown menu when you open the Address Book.
83
For example, if your EventNotification object is named Severe, the personal distribution list for E-mail deliveries should be named: ACC.Severe. Likewise, your personal distribution list for page deliveries should be named: ACC.page.Severe. Note: Use the EventNotification object Name not the Alias, for example, Critical Temp, not CriticalTemp. 5. Add members (the E-mail addresses or pager and service numbers of those to whom the notification of the alarm will be sent) to your personal distribution lists. 6. Set address book options so that the address book where your personal distribution lists are stored is the first one to be searched when sending E-mails or pages. For example, in Microsoft Exchange, select Options from the Tools menu. Click the Addressing tab. When sending mail, check names using these address lists in the following order area, use the Add button, then the up or down arrow buttons to add the correct address book to this field and position it at the top of the list.
84 Schneider Electric
4. Select Value for Alarmed Attribute. This is the attribute that triggers the alarm, based on the parameters you define for Value in the Algorithms tab. 5. Select Expression for Alarm Type. You define the expression used to define the alarm condition in the Algorithms tab. Most access control alarms use the Expression alarm type.
Andover Continuum CyberStation Access Control Essentials Guide 85
6. Under Send, select the Alarm check box. If you want to be notified at the return to normal, select this check box as well. 7. Select the Algorithms tab. 8. In the Expression field, enter the alarm condition that triggers the alarm. For example, enter DoorAjar = True to generate an alarm that occurs when the value for the attribute DoorAjar is equal to 1, indicating that the door has been left open.
Description An alarm is generated when a user disables this object. An alarm is generated when this object has been manually overriden. The door is held open for longer than the DoorAjar time and the Door Strike Time.
86 Schneider Electric
Expression ForcedEntry is True InvalidAttempt is True Value = Trouble Doorswitch = Trouble ExitRequest = Trouble and Point1 = On
Description The door switch is open without a Valid Access, Request to Exit or Operator command. An individual without access to this area attempted to card in at this door. A wiring fault on Supervised InfinityInput. A wiring fault on the door switch input of the door. A wiring fault on a Exit Request switch for the door. Add to any of above expressions, only if true when a linked point for Point1 is on.
9. Select the Feedback tab. 10. Enter the messages that you want to be displayed in the Active Alarm View or the Alarm Status bar.
87
Use wildcards as placeholders for the object name and description of the object to which you attach this alarm: Enter %n in place of the object name. Enter %d in place of the object description (entered in the General tab of the object editor). Using wildcards enables you to attach the same AlarmEnrollment object to multiple objects while still providing an alarm message that is unique to the object where the alarm has occurred. 11. Click OK.
Note: Unless the Enabled check box next to an alarm is checked, the alarm does not become active, even if the alarm condition occurs. 5. Click OK. 6. Proceed to Task 12: Configure Video on page 97.
88 Schneider Electric
89
90 Schneider Electric
Additional information you can add from the Alarms tab include the following attributes: Graphic Click the browse button in the Graphic field to search for the desired graphic panel that you want to appear when the alarm goes off. Select the page number of the graphic panel you want first to appear. Click the browse button in the Program field to search for the desired report program or any other Plain English program to this object. Note: You cannot select an HTML report directly. To associate an HTML report with an object, you must select a program that uses the SHOWREPORT keyword to run an HTML report. An example of the SHOWREPORT keyword is: SHOWREPORT: C:\PROGRAM FILES\CONTINUUM\REPORTS\SYSTEMCH K.HTM. Note: For additional information on Plain English (PE) refer to the Andover Continuum CyberStation Plain English Language Reference guide, 303001-872.
Program
91
Alarm Points
Alarm points allow any expression alarm that you attach on this tab to reference up to four "alarm points," named Point 1, Point 2, Point 3, and Point 4. Using alarm points saves you the trouble of having to change the expression (via the Algorithms tab of the AlarmEnrollment editor for that alarm object) every time you attach an expression alarm to a different point:
Note: For additional information on the Algorithm expressions refer to General Expressions for Security on page 86.
92 Schneider Electric
To configure these alarm points for an attached expression alarm, click the Alarm Points button to bring up the Alarm Points dialog:
Using the Alarm Points dialog, you must specify the actual point names for every alarm point the attached expression alarm references.
93
Follow this procedure: 1. In the General tab of the AlarmEnrollment editor, for the alarm you want to attach, make sure that you select Expression for the Alarm Type. Any attached alarm to which you want to apply alarm points must be an expression alarm. 2. In the Algorithms tab of the AlarmEnrollment editor, enter the expression in the Expression field. When you want to use alarm points, the alarm point name (point1, point2, point3, or point4) must be part of the expression. For example: ...value > point1 + 2... 3. Save the AlarmEnrollment object after making these expression-alarm changes. 4. On this tab of this editor, click the Alarm Points button to search for and select the name of an object for every alarm point referenced by attached expression alarm. The Alarm Points dialog appears, showing fields where you may specify up to four point names, Point 1 through Point 4. 5. Click the browse button in one of the point's fields. 6. Once you have found the point you want, click the Select button. That point specified in the field will be associated with that alarm point and applied to the attached expression alarm, which references the point. 7. Click OK.
94 Schneider Electric
Video Points
Click the Video Points button to bring up the Video Points dialog, shown on the next page. Note: If Endura video support is enabled in Setting 18 of the General Preferences tab, you will be unable to access the Video Points dialog. For more information, see the following topics in the CyberStation online help:
Using the General Preferences Dislog Using Video Points
Use the Video Points dialog to assign cameras to doors and points and configure parameters that control video images displayed in a VideoLayout or in the Video Monitor, during alarm conditions. Note: At Cyberstation Version 1.9 and higher, the Video Points dialog lists 16 video points. If you are using a VideoLayout, you can configure only points 1 through 4. If you are using the Video Monitor, you can configure points 1 through 16. See Task 12: Configure Video. Use the Video Points dialog to assign "video point" cameras. Use the Video Servers dropdown menu to select a video server on which the camera is located. Use the Cameras dropdown menu to select a camera for the numbered video point. (The camera must be configured and enabled on the selected video server.) Check the Rec. checkbox to enable the recording of a video clip from the selected camera. Recording begins at the moment the alarm goes off. In the Duration field, use the up and down arrows to select the number of seconds to record a video clip, once you check the Rec. checkbox. In the PTZ field, select the number of the preset camera view. These PTZ (pan, tilt, zoom) capabilities are configured on the Integral video servers, using Integral software.
95
If you are associating a VideoLayout with the video points for this object, then you must first reference these video points from the General tab of the VideoLayout editor. See Task 12: Configure Video.
96 Schneider Electric
The Video Monitor applications main screen comprises the following main sections. Active Video Events List The Active Video Events list, located along the top of the Video Monitor, lists recent alarm events (both door events and point events) as they happen. For each event, detailed information is displayed. In a door event listing, you can also actually unlock the door, momentarily. (The number of seconds the door is momentarily unlocked is determined by what was set in the Door Strike Seconds attribute on the Channels tab in the Door editor for that Door object.) Video Control Frames The video control frames section, located in the middle of the Video Monitor, comprises the two frames in which video images are displayed. For the camera associated with a door or point, the right-hand frame displays live video images, while the lefthand frame displays recorded (or live) images. This frame area also has video-image search, record, and playback buttons, and controls for video resolution and visual aesthetics. Door Events, Door Status, and Person Events These three tabs along the bottom of the Video Monitor display access-event and current-status information about a door and/or a person. Specifically, Door Events displays the latest access events for the door in alarm. Person Events displays access events of a person associated with doors. Video Monitor is shown on the next page
98 Schneider Electric
99
such as motion detection and loss of video images, and generate alarm messages established for Pelco brand video servers. Settings tab This tab allows you to specify an executable program, so that you can execute it from Video Monitor's Run button. Video Administrator is shown below:
100
Schneider Electric
About VideoLayouts
A video layout is CyberStations other video-surveillance monitoring tool (version 1.7 and higher) represented as a CyberStation VideoLayout object. You configure a VideoLayout object via the VideoLayout editor, as well as via the Alarms tab (or Advanced Alarms tab) of the Door editor and various CyberStation point editors. You assign cameras to up to four video points for a Door object or a CyberStation point. A VideoLayout is launched when a door or point goes into alarm.
102
Schneider Electric
For the Run Video Monitor row, under the user group you want, assign a key to grant access or assign a lock to deny access. For the Run Video Administrator row, under the user group you want, assign a key to grant access to a user group with appropriate system administrators, and assign a lock to deny access to everyone else. Click OK. Note: For each logged on user, a lock overrides the CyberStation security key and prevents the application from running. 3. Grant system administrators at your site permission to access and configure video servers, as follows: Open the Security editor, select the Actions tab. Beneath the Actions column, scroll down to VideoServer. Under the Locks column, scroll horizontally to the user group(s) containing system administrators. Click OK. See also Create a VideoServer Object 4. Grant system administrators at your site permission to access and configure Door objects and all points to which you must assign video. Use the Security editor Actions tab to do so, as you did in the last step. 5. Enable Video Monitor and Video Administrator. From the Preferences tab of the workstations Device editor, ensure that the Use Video Monitor setting is set to TRUE. This launches Video Monitor (instead of a VideoLayout) on an alarm event or manually when you click the video button on an alarm in Active Alarm View. When this preference is set to FALSE, VideoLayouts are used. Note: Video will only launch on an alarm event if the Display Video checkbox on the Actions tab of the EventNotification editor is checked. For more details, see Step 8.
6. Create one VideoServer object for every video server (for example, DVR, or Endura System Manager) at your site. If you create at least one Endura video server object, then workstations that do not have Endura video support enabled will not launch Video Monitor or Video Administrator. Error messages will appear when both Video Monitor and Video Administrator are launched indicating that Endura video support is not enabled. Note: As long as you have one Endura system with video enabled, video support becomes a site-wide requirement. Thus, you must ensure that all on-site workstations have Endura video support enabled. 7. Set the IP address, user name, and password. Note: A video server may have multiple users with different permissions. Ensure that the user entered when creating a video server object is able to search for and play back recorded video. Click the Test Connection or Learn Cameras button to verify connection to the video server. All of the recorded video clips are stored in DVR (Digital Video Recording) format. The supported platforms are: Digital Sentry including DS NVR, DS Express, and DS RealVue products Pelco Endura System version 1.x and 2.0 Note: If your video system integrates with Pelco Endura and video does not display properly, be aware that you may need to install Windows Media Player version 11. See your system administrator or refer to the CyberStation Installation Guide, part number 30-3001-720, for more information. 8. On the Actions tab of the EventNotification editor, for the EventNotification associated with each alarm, check the Display Video checkbox if you want the Video Monitor to launch when an alarm event occurs. (Video Monitor appears on those workstations where the alarm is delivered.)
104
Schneider Electric
Note: If you do not check the Display Video checkbox, Video Monitor must be opened manually, via the video button on an alarm, in the Active Alarm View. 9. Assign cameras to each door or point using the Video Administrator. (See Configure Video Using Video Administrator.)
10. Click the Learn Cameras button to learn the available cameras on the server whose IP address appears. Note: When you initially configure a new video server, you must press Learn Cameras in order to discover the cameras on the video server. When pressed, this button initiates a connection to the server, builds a camera list, and populates the database with that camera list. If you make any subsequent changes to your video network, such as adding or removing cameras, you must relearn the video server object by clicking Learn Cameras once more. Should you fail to do so, the current cameras on the video server will not be available. If the learn operation is successful, Learn Cameras Found (#) (where # is the number of cameras) displays. Should you learn Type 2 cameras, a Learn Endura Cameras dialog box displays with a progress bar showing the learn operation as it occurs.
Green indicators in the Camera, Encoder, Recorder, and Connection columns indicate that the video equipment is functioning normally. If there are any red indicators, you should check your Endura system to ensure it is operational, troubleshoot and make any necessary changes, and then attempt the learn operation again.
106 Schneider Electric
Any camera that has a red indicator in any column will not be 'learned.' As long as their status indicators are green, the remaining cameras in the list will be added, however. If the learn is not successful, Learn Cameras Failed appears instead. 11. Verify that you entered the correct IP address, username, and password for the server, and that the server is online if the error messages in Steps 9 and 10 display. 12. Click Close.
4. For every video server (DVR or System Manager for Pelco Endura) at your site, create a VideoServer object. (For instructions, see Create a VideoServer Object.) 5. Determine how many new doors/points you need to configure for use with Video Monitor in your CyberStation system. Write down the names of these doors/points, and make a note of where in the system they are located. 6. Determine the primary camera for each door/point, as well as how many additional cameras need to be assigned to that door/point. Write down the names of those cameras and note the doors/points to which they need to be assigned. Note: Be sure to name the cameras in advance at the video system front-end since you will be unable to change those names in Video Administrator. 7. Add a door or a point to Video Administrator. Click the Add Point button on the Points tab menu bar, and add the door or point for which you want to configure video. Note: Existing doors and points configured with camera assignments already in the database are automatically added to Video Administrator when it is launched. 8. Add a primary camera to the door or point in Video Administrator. Note: The first camera you add (that is, the primary) is the default camera displayed when Video Monitor launches for that point. Click the Add Camera button on the Points tab menu bar. Set its configuration properties, and see a preview of this camera's images, in the configuration properties pane. These include server name, camera name, record times, and PTZ (pan-tilt-zoom) presets. 9. Repeat Step 8 to add secondary cameras to the point or door. Note: The maximum number of 16 cameras is allowed for each door or point 10. Repeat Steps 7, 8, and 9, to add more doors and points to Video Administrator.
11. Choose a view, or customize your own view, for the way in which doors/points, cameras, servers, and so on, are grouped and listed in the "pivot table" on the Points tab. You accomplish this task using the View dropdown menu, as well as the Select All, Expand All, and Collapse All buttons on the Points tab menu bar. You also use the drag-and-drop customization features in the Points tab pivot table. 12. Select the Alarms tab. On the Alarms tab, for every video server and for every camera belonging to a video server, designate certain types of alarm events to monitor (and if necessary send alarm messages). These events include such conditions as loss of video images, motion detection, video server offline/online transitions, and so on. Note: These are not CyberStation alarms, although they do appear in CyberStation's Active Alarm View. Rather, these are Pelco brand video server alarms, intrinsic to Pelco video system functionality. The Alarms tab simply allows you to activate these video alarms, if you wish to receive messages based on these types of events. 13. Select the Settings tab. On the Settings tab, you may specify an executable program (such as a Plain English program or a calculator or Note Pad) so that it runs in Video Monitor when you click the Run button in the Video Monitor's Video Events section. 14. In the Video Administrator application, click Apply or OK. Note: If your video system integrates with Pelco Endura and video does not display properly, be aware that you may need to manually install Windows Media Player 10 or 11 on all CyberStation workstations using video. See your system administrator or refer to the CyberStation Installation Guide, part number 30-3001-720, for more information.
Create a VideoServer
Creating a VideoServer enables you to then assign any of the cameras managed by the server to video layouts in CyberStation. You create VideoServer objects in the Root or in a folder that was created in the Root. For instructions, see Create a VideoServer Object, covered previously in this chapter.
Note: If you are creating a layout for use with alarms in multiple objects, each requiring different cameras, assign cameras in the alarmed objects instead of in the layout. Bypass step 4, and proceed to step 5 in this procedure. 4. Right click a video frame, select Video Servers, select the video server, and then select the camera to assign to this frame. Repeat to assign cameras to the other frames in the layout. 5. To assign video points to up to four frames in the layout, right click a frame, select Video Points, and then select one of the available numbers (video points 1 through 4 only). Repeat to assign video points to additional frames.
The frames selected for video points will show the video feed when the video layout is displayed in response to an alarm .
Right click a frame to display the menu where you assign video points.
Note: Although 16 video points are listed, you may use only video points 1 through 4 with a VideoLayout. 6. Click OK.
112
Schneider Electric
If this option is not selected, the video layout attached to the object is not displayed, even if the alarm occurs. See Create an Event-Notification Object for more information about actions in EventNotification objects. 1. In Continuum Explorer, double click the object to which you want to attach a video layout. 2. In the object editor, click the Alarms tab. 3. Click the Video browse button, and locate and select the video layout you want to attach to this object. 4. If the VideoLayout is configured using the video points, click the Video Points button. Note: In the Video Points dialog, select the video server and the camera to display video in up to four frames. At Cyberstation Version 1.9 and higher, the Video Points dialog lists 16 video points, but only points 1 through 4 are used with a VideoLayout.
5. To record video from a camera, select the Rec check box for that camera, and enter the number of seconds for Duration. 6. Click OK to return to the object editor.
7. Click OK.
114
Schneider Electric
Area control
Other Pinpoint controls and tools let you customize the appearance and operation of graphics panels as needed. For example: Use an image file of a floor plan as the panel background, and arrange door and area controls based on the physical location of the objects they represent. Use text, switch, button, and other controls to display information or perform specific actions, such as opening a Listview window.
Select a door in the Continuum Explorer window, and drag it to the Pinpoint window. A door control is created for you in Pinpoint and is associated with the Door object you selected in Continuum Explorer.
5. Click the door control to open the Door Control dialog. 6. In the General tab, select the set of door graphics you want to use for Style. 7. Select the User Entry check box if you want to be able to execute commands from the control. If the User Entry check box is not checked, the control is viewonly.
8. Select the Switch Animation check box if you want to door control to reflect the state of the door switch, open or closed.
If the check box is not checked, the control reflects the state of the door lock, indicating whether the door is locked or unlocked. 9. Select the Personnel Data tab. 10. Select the attributes that you want displayed, and select the check box next to each attribute to enable it.
The selected attributes will be displayed in the Details dialog, which you access from a door control by right clicking the control. The dialog also shows the photo, if available, of the last person requesting access at the door.
11. In the Standard toolbar, click the Run Mode icon prompted, save changes to the panel.
, and if
12. Right click the door control to display a menu of actions you can take to control the door and obtain information about access events at the door. 13. To close the Pinpoint editor, click the close button in the upperright corner of the window. 14. Proceed to Task 14: Configure Reports on page 120.
Create a Report
You can create reports in a folder or a controller. You may want to create a folder that stores all your reports.
1. In Continuum Explorer, right click Root, select New, and then select Folder. 2. Enter a folder name, and click the Create button. 3. Right click the folder, select New, and then select Report. 4. Enter a report name, and click the Create button. 5. In the Source tab of the Report editor, select a data source. The following data sources are intended for access control: Report Data Source Access Event Description Data associated with valid and invalid attempts to access doors or areas. If you select this data source, you can choose from 22 report types related to access events, such as most accessed doors, invalid attempts of an area, and most active person. Data from the AlarmEvent log in the CyberStation database. If you select this data source, you can choose from 22 report types related to alarms, such as most active alarmed object and active alarms per object. Data from the ActivityEvent log in the CyberStation database. If you select this data source, you can choose from 11 report types, such as login attempts per user and most common activities.
Alarm Event
Activity Event
6. Select a report type. 7. Select a chart type and subtype, which determine the presentation of your data.
8. Click the Configure Columns button. 9. In the Selectable Columns dialog, select column settings: Columns to include or exclude Sequence of columns Sort order of the data 10. Click OK. 11. Select the Filter tab. 12. Select the Log Filter radio button, and select a predefined filter for the time interval of the report OR The Time Interval radio button allows you to specify a custom time interval. 13. Select the Path browse button, and locate and select the controller with the objects that you want to include in the report.
14. Click the Add button to locate and select the objects in this controller that you want to include in the report.
15. Click the Output tab. 16. Options in this tab allow you to define the output format. You can use wildcards for the following data: %r represents the report type. %t represents the report date and time. %p represents the page number. 17. Select options for e-mailing the report and saving the report to a file, as needed. 18. Click Apply.
19. Click the View Report button to generate the report and display the content in the Report Viewer window.
20. Click the close button to close the Report Viewer window. 21. Click OK.
124
Schneider Electric
Chapter 3
Monitoring an Access Control System
When your access control system is configured and operating, CyberStation has numerous features that enable you to monitor access control activity. This chapter introduces the following features: Alarm Status bar and Active Alarm View window EventView windows ListView windows
Responding to Alarms
When you configure alarms, you typically specify that an alarm message be displayed at one or more CyberStation workstations. At a workstation, alarm messages appear either in the Alarm Status bar or in the Active Alarm View window, depending on settings in the EventNotification object associated with the alarm.
Buttons to the left of the message enable you to silence, mute, or acknowledge the alarm, and to perform other related actions.
This window updates in real time as alarms occur, are responded to, and/or the affected objects return to their normal state.
By default, alarms are sorted by priority. Alarms with a priority of 1 are considered the most urgent. They appear at the top of the list. Use buttons to the left of the entries in the list to respond to alarm notifications:
Button Description Acknowledge the alarm. Click this button when you have seen the alarm message and have taken the appropriate action to address the alarm condition. Your username is recorded in the Acknowledged by field for the alarm. If the workstation was beeping or playing audio, and if the alarm message was flashing, these stop when you click the Acknowledge button. Silence the audio associated with the alarm at all workstations that received the notification. Silencing an alarm does not acknowledge the alarm. Your username is recorded in the Silenced by field for the alarm. To silence audio at your workstation only, click in the toolbar, or click Mute! in the menu bar at the top of the Active Alarm View window. Additional toolbar buttons and menu options enable you to obtain more information about alarms and the objects associated with them.
You can customize ListView windows using menu options in the windows. You can create and edit ListViews in the ListView editor.
Columns included in the ListView window, their arrangement, fonts, and colors Qualifiers that further refine the selection of objects whose data is shown in the ListView window
Chapter 4
Advanced Topics for Access Control
This chapter briefly describes additional features of CyberStation that can help you manage your access control system: Security Groups for CyberStation Users Using Area Lockdown Controlling Access with Condition Levels Adding FIPS-PIV Card Credentials
Programs that start when the user logs in or out A graphics panel that is displayed when the user logs in A CyberStation menu page that is displayed when the user logs in A report program that runs when the user logs in For example, you might assign a graphics panel representing a floorplan of your building, with Pinpoint controls for doors, areas, and other objects, to be displayed when a security guard logs in to CyberStation.
You can also enter personal information for the user. Perform the following steps to create a User object: 1. In Continuum Explorer, right click the Root. 2. Select New, and then select User from the popup menu. 3. In the New dialog, enter the username in the Object name field. CyberStation fills in the Alias field, but you can change it if needed. 4. Click the Create button.
Each column corresponds to one security group. The lock and key icons indicate whether the security group has the access privilege ( ) or is denied the privilege (
Each column corresponds to one security group. Move the cursor over a column to display a tooltip showing the name of the security group.
).
Security groups are displayed to the right of the action or the tab name. The icon used to identify each group indicates whether the group has access privileges for it: The Lock icon indicates that the users in the security group do not have access privileges; that is, the action or tab is locked for this security group.
The Key icon indicates that the users in the security group have access privileges; that is, the action or tab is unlocked for this security group. Position your cursor over an icon to display the name of the security group and the action or editor tab it represents. Group names are defined in the Group Names tab. You can edit the names as needed, and also select the number of security groups that are displayed.
Delete Users belonging to security groups with this privilege can delete objects of this class. Edit Users belonging to security groups with this privilege can open the editors of objects of this class, and modify object values in the editor. View Users belonging to security groups with this privilege can open the editors of objects of this class, but cannot modify any values unless they also have Edit privileges. These users will also be able to view the class folder for any objects for which they have view access (provided the users also have access to Continuum Explorer). Send To Text File Users belonging to security groups with this privilege can import and export object data to text files. 2. Assign or remove access privileges. If you want to... assign an access privilege for an action or an editor tab to a security group Then... In the row that contains the action or tab name, click the Lock icon for the security group that you want to have the privileges. The Key icon is now displayed for this security group, indicating that the group has access to the action or tab. remove an access privilege for an action or an editor tab from a security group In the row that contains the action or tab name, click the Key icon for the security group where you want to remove the privileges. The Lock icon is now displayed for this security group, indicating that the group does not have access to the action or tab.
assign access privileges to all actions within a view, object class, or folder
Right click the view, object class, or folder, and select Unlock Actions from the popup menu. In the Unlock Actions for Groups dialog, select the checkbox next to each security group that you want to have access, and click OK. The Key icon is now displayed for the selected security groups, indicating that the groups have access to all the actions (and editor tabs) in the view, object class, or folder.
remove access privileges to all actions within a view, object class, or folder
Right click the view, object class, or folder, and select Lock Actions from the popup menu. In the Lock Actions for Groups dialog, select the checkbox next to each security group that you do not want to have access, and click OK. The Lock icon is now displayed for the selected security groups, indicating that the groups do not have access to any of the actions (and editor tabs) in the view, object class, or folder.
3. Click OK.
4. If needed, use the horizontal scroll bar to display the icon for the security group where you want to paste the access privileges. 5. Right click the security group where you want to paste the privileges, and select Paste Group from the popup menu.
6. Assign or remove privileges as needed for the security group where you copied the access privileges. 7. Click Apply or OK.
Andover Continuum CyberStation Access Control Essentials Guide 143
For example, by creating SecurityLevel objects that you attach to the controllers in each of your buildings, you could allow security guards in one building access to the doors in their building but not to doors in buildings monitored by other security staff.
Use the vertical scroll bar to locate the action for which you would like to assign access privileges. In addition to actions specific to that object class, if any, the following actions are listed for most object classes: Change Out of Service Users belonging to security groups with this privilege can enable and disable objects of this class. Create Users belonging to security groups with this privilege can create objects of this class. Delete Users belonging to security groups with this privilege can delete objects of this class. Edit Users belonging to security groups with this privilege can open the editors of objects of this class, and modify object values in the editor. View Users belonging to security groups with this privilege can open the editors of objects of this class, but cannot modify any values unless they also have Edit privileges. These users will also be able to view the class folder for any objects for which they have view access (provided the users also have access to Continuum Explorer). Send To Text File Users belonging to security groups with this privilege can import and export object data to text files. 2. Assign or remove access privileges. If you want to... assign an access privilege for an action or an editor tab to a security group Then... In the row that contains the action or tab name, click the Lock icon for the security group that you want to have the privileges. The Key icon is now displayed for this security group, indicating that the group has access to the action or tab.
remove an access privilege for an action or an editor tab from a security group assign access privileges to all actions within a view, object class, or folder
In the row that contains the action or tab name, click the Key icon for the security group where you want to remove the privileges. The Lock icon is now displayed for this security group, indicating that the group does not have access to the action or tab. Right click the view, object class, or folder, and select Unlock Actions from the popup menu. In the Unlock Actions for Groups dialog, select the checkbox next to each security group that you want to have access, and click OK. The Key icon is now displayed for the selected security groups, indicating that the groups have access to all the actions (and editor tabs) in the view, object class, or folder.
remove access privileges to all actions within a view, object class, or folder
Right click the view, object class, or folder, and select Lock Actions from the popup menu. In the Lock Actions for Groups dialog, select the checkbox next to each security group that you do not want to have access, and click OK. The Lock icon is now displayed for the selected security groups, indicating that the groups do not have access to any of the actions (and editor tabs) in the view, object class, or folder.
3. Click OK. You attach a SecurityLevel object to individual CyberStation objects in the SecurityLevel tab in their respective object editors. For more information, see the help topics for SecurityLevel tabs in the editors.
4. If needed, use the horizontal scroll bar to display the icon for the security group where you want to paste the access privileges.
5. Right click the security group where you want to paste the privileges, and select Paste Group from the popup menu.
6. Assign or remove privileges as needed for the security group where you copied the access privileges. 7. Click Apply or OK.
When the Lockdown state is in effect, only personnel with executive privilege access to the area can enter or leave it. You can also lock down individual doors instead of an entire area.
When the Lockdown state is cleared from an area, routine access resumes at doors to the area (if adjacent areas are not in the Lockdown state).
3. To verify that all doors to the area are locked down, select the Doors to Area tab, and view the lockdown status of each door: A door is locked down when the value for ForceLock is True. A door is not locked down when the value for ForceLock is False. The value may be false because the controller for the door did not receive the lockdown message, or because the controller does not support the area lockdown feature. If a door could not respond to the lockdown message (for example, because its controller was temporarily offline), in the General tab you can click the Lockdown Area button to send the message again. 4. To remove the Lockdown state from the area, in the General tab, click the Clear Lockdown Area button. When you remove the Lockdown state, all doors to the area resume their normal states. A door that provides access to another area that is still locked down remains locked down until the Lockdown state is cleared from the other area.
A door is locked down when the value for ForceLock is True. A door is not locked down when the value for ForceLock is False. The value may be false because the controller for the door did not receive the lockdown message, or because the controller does not support the area lockdown feature. If a door could not respond to the lockdown message (for example, because its controller was temporarily offline), in the General tab you can click the Lockdown Selected Doors button to send the message again. 5. To remove the Lockdown state from doors, select one or more doors, and click the Clear Lockdown Selected Doors button. When you remove the Lockdown state, doors resume their normal states. A door that provides access to an area that is locked down remains locked down until the Lockdown state is cleared from the other area.
In Personnel objects, you can specify clearance levels that correspond to these condition levels.
Enable the Default Clearance Level attribute in personnel profiles to view and edit the value in Personnel objects.
Overview of FIPS-PIV
In 2004, Homeland Security Presidential Directive 12 (HSPD 12), entitled Policy for a Common Identification Standard for Federal Employees and Contractors, mandated executive departments and agencies to require secure and reliable forms of identification for federal employees and contractors when they attempt to gain physical access to controlled facilities and logical access to controlled information systems.
The HSPD 12 standard further specified that secure and reliable identification must be: Issued based on sound criteria for verifying an employees identity. Strongly resistant to identity fraud, tampering, counterfeiting, and terrorist exploitation. Rapidly authenticated electronically. Issued only by providers whose reliability has been established by an official accreditation process. FIPS 201-1 Standard for Personal Identity Verification (PIV) In response to HSPD 12, the National Institute of Standards and Technology (NIST) developed the Federal Information Processing Standard 201-1 for Personal Identity Verification (FIPS-PIV). This standard includes two parts: PIV I Meets the control objectives of HSPD 12 PIV II Meets the technical interoperability requirements of HSPD 12
The PIV credential is securely stored on the smart card in the Card Holder Unique Identifier (CHUID) container. Contactless readers, used in PACS applications, operate in transparent mode and retrieve the Federal Agency Smart Credential Number (FASC-N) from the PIV smart card and present the FASC-N via Wiegand output to the access control panel. (The output format of the contactless readers may vary and must be supported by the PACS.
The PIU provides direct integration between the IDMS/CMS middleware (ImageWare Corp.) and the Continuum database. You can configure the PIU to import into the Continuum database any additions, changes, or updates to FIPS-PIV credential data stored in the ImageWare IDMS. You can also configure the PIU to monitor changes from the IDMS continuously to keep the Continuum database up to date. For more information on the PIU, see the CyberStation help topic Personnel Import Utility (PIU).
FIPS-PIV Cards
A FIPS-PIV card must be issued by a vendor that has been approved by the United States General Services Administration (GSA) and it must conform to the FIPS-201-1 standard for layout and printing requirements. To be considered secure and reliable identification, FIPS-PIV cards must be: Issued based on sound criteria for verifying a person's identity Strongly resistant to identity fraud, tampering, counterfeiting, and terrorist exploitation Rapidly authenticated electronically Issued only by providers whose reliability has been established by an official accreditation process The physical credential is a smart credential that contains a processor, memory, storage capacity, and an interface for accessing the credential data.
FIPS-PIV Readers
Physical access control systems typically use a contactless FIPS-PIV reader to read credential information from a FIPS-PIV card. Several vendors provide contactless FIPS-PIV readers. These readers must be on the GSA-approved list to conform to the FIPS-201-1 standard.
162 Schneider Electric
Contactless FIPS-PIV readers read the CHUID data from the FIPSPIV credential via a 13.65 mHz radio-frequency interface. The reader's output to the access control panel is a Wiegand signal that contains the credential information that is verified in access control decisions. FIPS-PIV readers may be purchased with various Wiegand output formats. The most common output formats are: 75-bit Wiegand signal 200-bit Wiegand signal An Andover Continuum system can be configured to handle either of these default outputs. A Continuum system may also be configured to handle a custom output Wiegand signal from the FIPS-PIV reader. For more information on custom FIPS-PIV format, see the CyberStation help topic, Defining a Custom FIPS-PIV String Format. The 75-bit Wiegand signal provides the access control panel with the following elements of the FASC-N on the FIPS-PIV card: Agency Code System Code Credential Number Expiration date The 200-bit Wiegand signal provides the access control panel with all of the elements of the FASC-N, but does not provide the expiration date of the credential. Some readers also provide the ability to read multiple card formats. These readers are typically known as multi-technology readers that read older credentials, as well as FIPS-PIV credentials. This provides flexibility when transitioning an existing system to use FIPS-PIV credentials.
Note: FIPS-PIV readers typically have higher power requirements than standard proximity readers. Be sure to check the power requirements of the readers, before they are installed, to determine if the Andover Continuum hardware (ACX 57xx controller, AC-1, AC-1 Plus) can supply ample power to your particular reader. In some cases, the readers may need to be externally powered.
Right click the Continuum icon in the system tray, and select Allowed Credentials, to display the Allowed Credentials dialog. For more information, please see the CyberStation help topic, Allowed Credentials Dialog. If you are configuring the site for access control using FIPS-PIV credentials only, the appropriate Allowed Credentials global setting would be: CredentialFIPS-PIV If the site uses a mix of FIPS-PIV and non-FIPS-PIV readers and credentials, the Allowed Credentials global setting may be set to: Credential1andFIPS-PIV or Credential2andFIPS-PIV Assigning dual credentials to a Personnel object allows you to configure the system so that a user may be configured with both a FIPS-PIV credential and a legacy credential (for example, Infinity37 proximity card).
Configuring a Door/Reader
When configuring the reader(s) of a door that is under the control of a FIPS-PIV reader, you must specify the output format of the FIPS-PIV reader. You may only specify one of the FIPS-PIV reader formats per reader. You may specify additional Wiegand formats if the physical reader attached to the panel is a multi-technology reader. All readers that are attached to a single network controller (ACX 57xx series or NetController II via IO Modules) must have the same FIPSPIV output format.
Andover Continuum CyberStation Access Control Essentials Guide 165
The following selections are available on the Card Formats tab of CyberStation's Door editor: FIPS_PIV_75 Bit Physical reader outputs 75 bit Wiegand signal FIPS_PIV_Full_FASC-N Physical reader outputs 200 bit Wiegand signal FIPS_PIV_Custom Physical reader outputs 75-254 bit Wiegand signal For more information, please see the CyberStation help topic, Defining a Custom FIPS-PIV String Format.
You access the Allowed Credentials global setting via the Allowed Credentials dialog. Right click the Continuum icon in the system tray. (For more information, please see Allowed Credentials.) If you are configuring the site for access control using FIPS-PIV credentials only, the appropriate Allowed Credentials global setting would be: CredentialFIPS-PIV If the site uses a mix of FIPS-PIV and non-FIPS-PIV readers and credentials, the Allowed Credentials global setting may be set to: Credential1andFIPS-PIV orCredential2andFIPS-PIV Note: Changing Allowed Credentials to a new value that does not include Credential1 causes all personnel information stored in Credential1 to be permanently deleted. Assigning dual credentials to a Personnel object allows you to configure the system so that a user may be configured with both a FIPS-PIV credential and a legacy credential (for example, Infinity37 proximity card).
Any readers that have not yet been updated with a FIPS-PIV reader may still be used with the Infinity37 credential.
Configuring a Door/Reader
When configuring the reader(s) of a door that is under the control of a FIPS-PIV reader, you must specify the output format of the FIPS-PIV reader. You may only specify one of the FIPS-PIV reader formats per reader. You may specify additional Wiegand formats if the physical reader attached to the panel is a multi-technology reader. All readers that are attached to a single network controller (ACX 57xx series or NetController II via IO Modules) must have the same FIPSPIV output format. The following selections are available on the Card Formats tab of CyberStation's Door editor: FIPS_PIV_75 Bit Physical reader outputs 75 bit Wiegand signal FIPS_PIV_Full_FASC-N Physical reader outputs 200 bit Wiegand signal FIPS_PIV_Custom Physical reader outputs 75-254 bit Wiegand signal For more information, please see the CyberStation help topic, Defining a Custom FIPS-PIV String Format.
For more information on configuring the PIVReaderFormat system variable, please see the CyberStation help topic, Defining a Custom FIPS-PIV String Format. Once the PIVReaderFormat system variable is set appropriately, you must specify the HMAC value in each Personnel object's FIPS-PIV credential. To do this, you must read the person's FIPS-PIV credential via a FIPS-PIV reader that generates the HMAC. Schneider Electric recommends you assign a FIPS-PIV reader as an enrollment reader for this purpose. Once the enrollment reader is created, add the door to a CyberStation Active Event View and present a FIPS-PIV credential to the reader. From the Cyberstation Active Event View, you must then copy the HMAC for the invalid attempt and add it to the Personnel object's HMAC value in the person's FIPS-PIV credential.
Andover Continuum CyberStation Access Control Essentials Guide Document Number: 30-3001-405 Revision C